Patent classifications
H04L2463/082
DOCUMENT IMPORTATION INTO SECURE ELEMENT
Techniques are disclosed relating to authenticate a user with a mobile device. In one embodiment, a computing device includes a short-range radio and a secure element. The computing device reads, via the short-range radio, a portion of credential information stored in a circuit embedded in an identification document issued by an authority to a user for establishing an identity of the user. The computing device issues, to the authority, a request to store the credential information, the request specifying the portion of the credential information. In response to an approval of the request, the computing device stores the credential information in the secure element, the credential information being usable to establish the identity of the user. In some embodiments, the identification document is a passport that includes a radio-frequency identification (RFID) circuit storing the credential information, and the request specifies a passport number read from the RFID circuit.
Automatic account protection
Apparatuses, systems, methods, and computer program products are disclosed for automatic account protection. A method includes detecting a trigger indicating one or more of a potential and an actual security breach at one or more websites where a user has an account that is accessible using electronic credentials. A method includes logging into the one or more websites for the user using the electronic credentials. A method includes performing one or more actions at the one or more websites associated with the electronic credentials to protect the user's account.
Multi-factor authentication using confidant verification of user identity
In some implementations, a server device may receive, from a client device, a login credential associated with a user and a request to access a resource. The server device may identify a confidant associated with the user and a confidant device associated with the confidant, wherein the confidant device is different from a user device associated with the user. The server device may transmit, to the confidant device, a request to verify an identity of the user. The server device may determine whether a verification of the identity of the user is received from the confidant device. The server device may grant or deny access to the resource based on determining whether the verification of the identity of the user is received from the confidant device.
Adaptive biometric authentication
Systems and methods are presented for adaptive biometric authentication. According to one example method, a failure of a first type of biometric authentication is detected. In response to detecting the failure of the first type of biometric authentication, an alternative type of authentication is completed. In response to completing the alternative type of authentication, a biometric characteristic of a biometric signature is selectively modified in a stored user profile for processing a subsequent attempt of the first type of biometric authentication.
System, method, and apparatus for authenticating a user device
Provided is a method, system, and apparatus for authenticating a user device. The method includes registering a device identifier with at least one transformation rule, receiving a request for authentication comprising a device identifier associated with a user device, obtaining a one-time password (OTP) in response to receiving the request, communicating the OTP to the user device, receiving a transformed OTP from the user device, and authenticating the user device based on the OTP, the transformed OTP, and the at least one transformation rule.
System and method for securely storing and sharing information
The present application generally relates to systems, devices, and methods to conduct the secure exchange of encrypted data using a three-element-core mechanism consisting of the key masters, the registries and the cloud lockboxes with application programming interfaces providing interaction with a wide variety of user-facing software applications. Together the mechanism provides full lifecycle encryption enabling cross-platform sharing of encrypted data within and between organizations, individuals, applications and devices. Further the mechanism generates chains of encrypted blocks to provide a distributed indelible ledger and support external validation. Cross-verification among users, applications and the mechanism deliver both enterprise and business ecosystem cyber security features. Crowdsourcing of anomaly detection extends to users and to subjects of the data. Robust identity masking offers the benefits of anonymization while retaining accountability and enabling two-way communications. The mechanism may also provide high availability through multi-level fail over or operations to multiple instances of the core mechanism.
Trusted Identification of Enrolling Users Based on Images and Unique Identifiers Associated with Sponsoring Users
Provided is a method for providing trusted identification of an enrolling user. The method may include communicating a unique identifier to a sponsor device of a sponsoring user. Image data associated with an image of an enrolling user may be received from the sponsor device, and the image data may include the unique identifier. The first image data may be recorded in a ledger. An edge may be generated in a tree based on the first image data and the first unique identifier, and the edge may connect a first node associated with the sponsoring user to a second node associated with the enrolling user. A trust score for the second node may be determined based on a respective trust score of each node (including the first node) connected to the second node by a respective edge. A system and computer program product are also disclosed.
Wearable HCI device
An audio generation device includes a housing adapted to be worn by a user, memory, and a processor configured to execute computer-executable instructions. The device includes at least two of the following: an adhesive located on an outer surface of the housing to removably couple the housing to the body of the user, a transducer coupled to receive an electrical signal from the processor, convert the electrical signal to an audio signal, and supply the audio signal to the body of the user, a six degrees of freedom (6DOF) sensor coupled to detect translation of the housing along three perpendicular axes, and rotation of the housing about the three perpendicular axes, a biometric sensor coupled to detect at least one biometric parameter of the body of the user, a rechargeable battery removably coupled with the housing, and a wireless interface to transmit data via a wireless network.
Sponsor delegation for multi-factor authentication
Disclosed are methods, systems, and non-transitory computer-readable media for using a sponsor as a proxy for multi-factor authentication of a first user account for a first user when a primary multi-factor authentication mechanism is unavailable to the first user account, comprising registering the sponsor in a multi-factor authentication chain of trust associated with the first user account; requesting verification of an identity of the first user from the sponsor; receiving, from the sponsor, a verification of the identity of the first user; and granting access to a service to the first user account.
SYSTEMS AND METHODS FOR ACCOUNT SYNCHRONIZATION AND AUTHENTICATION IN MULTICHANNEL COMMUNICATIONS
Disclosed embodiments provide a framework to enable automatic identification and authentication of users to allow for multichannel communications in an authenticated state. In response to an authentication request from an end agent engaged in a communications session with a user, a current authentication state associated with the user is determined. Based on the current authentication state and a set of authentication rules associated with the end agent, a set of authentication challenges are identified and executed by an application implemented on the user’s computing device. Data corresponding to completion of these authentication challenges is used to determine a new authentication state, which can be used to update the communications session.