H04L2463/082

Peripheral landscape and context monitoring for user-identify verification

Disclosed are methods, systems, and non-transitory computer-readable media for determining a trust score associated with a user, comprising detecting entities near a user device operated by the user; calculating the trust score for the user based on a policy that incorporates data about the entities near the user device, the trust score being a score that is indicative of a trust worthiness of data received from the user device, wherein trusted entities near the user device result in an increased trust score, and untrusted entities near the user device result in a decreased trust score; and permitting access to a resource when the trust score is above a threshold.

SYSTEMS AND METHODS FOR MULTI-STAGE, IDENTITY-BASED, DIGITAL AUTHENTICATION
20230379321 · 2023-11-23 ·

Systems and methods for multi-stage, identity-based, digital authentication are provided. Methods include a first and a second stage of authentication. The first stage may include a user profile submitting a first request to access a first digital application; the computing device receiving, as input, one or more authenticating factors; the computing device transmitting, to a central server, the one or more authenticating factors; the central server processing and authenticating the user profile to the first digital application. The second stage of authentication may include: the user profile submitting a second request to access the second digital application that utilizes a separate authentication from the first application; in response to the second request, the first digital application: determining authentication parameters needed to satisfy authentication for the second digital application; determining a gap between the authentication parameters needed to satisfy authentication for the second digital application and information about the user profile stored in the database at the central server; and generating and transmitting an actionable request to the user profile for information that fills the gap; and based on information about the user profile stored in the database at the central server combined with a response received for the actionable request, the first digital application communicating to the second digital application the authentication parameters to achieve authentication of the user profile for the second digital application.

SYSTEMS AND METHODS FOR MULTI-STAGE, BIOMETRIC-BASED, DIGITAL AUTHENTICATION
20230379324 · 2023-11-23 ·

Systems and methods for multi-stage, biometric-based, digital authentication are provided. Methods include a first and a second stage of authentication. The first stage may include a user profile submitting a first request to access a first digital application, receiving one or more authenticating factors, transmitting, to a central server, the one or more authenticating factors, processing the one or more authenticating factors to authenticate the user profile to the first digital application. The second stage of authentication may include the user profile submitting a second request to access the second digital application, wherein the first and second digital applications utilize separate authentications; in response to the second request, the first digital application activating sensors that are connected to a computing device; measuring, via the sensors, a biometric parameter of a user that is associated with the user profile; the first digital application transmitting the biometric parameter to the central server for comparison with biometric information stored in the database; and in response to the comparison achieving a threshold match, the first digital application communicating to the second digital application authentication parameters to achieve authentication of the user profile for the second digital application.

SYSTEMS AND METHODS FOR MULTI-FACTOR AUTHENTICATION BY A COMMERCE PLATFORM USING A CLOUD SERVICES PROVIDER
20230379336 · 2023-11-23 ·

A method and apparatus for performing multi-factor authentication of a merchant system by a commerce platform are described. The method may include authenticating the commerce platform to a cloud services provider, the cloud services provider providing a private communications network for use by the commerce platform and the merchant system. The method may also include receiving, by the commerce platform, an authentication request from the merchant system, wherein the request received from the merchant system originates from the private communications network provided by the cloud services provider, and wherein the authentication request uses an encryption key. Furthermore, the method may include determining, by the commerce platform, validity of the encryption key used in the authentication request for the merchant system, and in response to origination of the authentication request occurring from within the private communications network and determining validity of the API key, authenticating the merchant system as an authorized system for performing an operation requested by the authentication request using the commerce platform.

Multi-Modal Transportation Service Planning and Fulfillment

The present disclosure provides systems and methods for real-time planning and fulfillment of multi-modal transportation services in a multi-modal ride sharing network. In particular, aspects of the present disclosure are directed to a computing system that creates an end-to-end multi-modal itinerary responsive to a user request for transportation service between an origin and a destination. The multi-modal itinerary can include two or more transportation legs that include travel via two or more different transportation modalities such as, as examples, via a car and via an aircraft.

Network access control system

A network access control system includes a communication device and an authorization system. The communication device is configured to communicate time-critical messages through a time-sensitive network during scheduled time windows. The communication device is further configured to be communicatively connected to a candidate device and to receive a network access request from the candidate device while blocking the candidate device from communicating through the time-sensitive network. The authorization system is communicatively connected to the communication device and configured to authorize the candidate device via a multi-factor authentication protocol that requires a user of the candidate device to successfully provide multiple identification factors. In response to the authorization system authorizing the candidate device, the communication device is configured to grant the candidate device restricted access to one or more of send or receive approved messages through the time-sensitive network.

Smart storage and vending system
11715340 · 2023-08-01 · ·

Embodiments relate to a system comprising a drug storage comprising a container to hold a drug; a communication module; and a cyber security module. The system is operable to log record of access to the drug and maintain a ledger of the record of access to the drug using a blockchain technology. The access to the drug is secured by the cyber security module.

Frictionless authentication for logging on a computer service
11714891 · 2023-08-01 · ·

A login authentication process to access a computer service includes displaying a virtual keyboard on a display screen of a computer. A user enters a password by clicking on the virtual keyboard. The manner the user clicked on the virtual keyboard to enter the password is compared to the manner an authorized user of the computer service clicked on the virtual keyboard to enter an authorized password during a learning phase. The login authentication is deemed to be a success when the password matches the authorized password, and the manner the user clicked on the virtual keyboard to enter the password matches the manner the authorized user clicked on the virtual keyboard to enter the authorized password.

Login and authentication methods and systems

Systems, methods, and apparatuses for authenticating requests to access one or more accounts over a network using authenticity evaluations of two or more automated decision engines are discussed. A login request for access to a user account may be submitted to multiple decision engines that each apply different rulesets for authenticating the login request, and output an evaluation of the authenticity of the login request. Based on evaluations from multiple automated decision engines, the login request may be allowed to proceed to validation of user identity and, if user identity is validated, access to the user account may be authorized. Based on the evaluations, the login attempt may also be rejected. One or more additional challenge question may be returned to the computing device used to request account access, and the login request allowed to proceed to validation of identity if the response to the challenge question is deemed acceptable.

AUTHENTICATION SCHEME IN A VIRTUAL PRIVATE NETWORK

A method including determining, by a first server, an encrypted authentication packet, the determining including, determining a crypted code field to indicate a type associated with the encryption authentication packet and that at least a portion of the encryption authentication packet is encrypted, and determining a crypted payload based at least in part on encrypting one or more fields of an initial authentication packet; and transmitting, by the first server to a second server, the encrypted authentication packet to enable the first server and the second server to conduct an authentication process. Various other aspects are contemplated.