Patent classifications
H04L2463/082
Application for requesting multi-person authentication
A first user device includes a camera. The first user device receives a challenge-response message following a request for access to a secure server. The first user device captures a first image of the first user. The first image includes an image of at least a portion of a face of the first user. An authentication result from facial recognition scan of the second user is received. Facial recognition is used to determine that the face of the first user is a face of an authorized user of the secure server. The first user device generates and sends a response to the challenge-response message based on results of facial recognition and the received authentication results.
Accessing user accounts and data from any computing device
The present disclosure describes techniques for accessing user accounts and data from any computing device. It may be determined whether an account of a user exists in a cloud service in response to receiving information associated with the user from any computing device. Data associated with the account may be stored by the cloud service. There may be a plurality of types of data associated with a plurality of security levels. The plurality of security levels may correspond to different security requirements. The data associated with the account may belong to at least one of the plurality of types of data. An instance of the account may be deployed to the computing device in response to determining that the account exists in the cloud service. The instance of the account may enable the user to access services via the computing device.
Code-based Two Factor Authentication
Authenticating a user account to access a remote service from a user device includes: capturing a machine-readable image code displayed on the user device using a mobile device, wherein the image code is provided by the remote service; extracting and calling a corresponding session code embedded in the image code; determining whether a phone token is in storage; one of: (a) sending the phone token to the remote service, if the phone token is in the storage; or (b) prompting a user to enter credentials including username and password and sending the entered credentials to the remote service, if the phone token is not in the storage; and receiving access to the remote service for the user device, when the session code is valid and either the credentials are valid or the phone token is confirmed.
SYSTEM AND METHOD FOR FACILITATING A VIRTUAL SCREENING
A system for facilitating a virtual screening is disclosed. The system identifies a user for participating in a virtual screening of media content. The system generates a unique link for the user to facilitate access to the media content. When the user interacts with the link, the system prompts the user to authenticate with the system and determines whether the authentication was successful. If authentication is successful, the link is associated with an identifier of the user and/or a user device. A request for a key for decrypting the media content and a request for a digitally signed file accessing the media content pursuant to parameters are made. If the digitally signed file is valid, the system applies a watermark to the media content to track the use of the media content and streams the media content to the user. Feedback on the media content is obtained from the user.
SYSTEMS AND METHODS FOR ANONYMOUS PASS-PHRASE AUTHENTICATION
Disclosed are systems and methods for anonymous, hands-free voice authentication to network resources. The framework can operate and provide a secure authenticated operating environment for any type of computerized platform, device and/or service while preserving anonymity of both the user and the user's login credentials. Once authenticated, the user is then permitted to perform desired operations, such as, CRUD (create, read, update, delete) operations. The disclosed framework operates in a three stage process, which involves single-sign on (SSO)/virtual private network (VPN) connectivity, which is then followed by a 4way voice matching user-device integrated “conversation” and a proof of work macro-micro problem verification step. The framework enables a user to login and access a system by responding to randomly verifiable requests output by the system dependent on the user's current surroundings.
CYBERSECURITY SYSTEM TO MANAGE SECURITY OF A COMPUTING ENVIRONMENT (CE)
The present invention relates management of security of a computing environment. The method may include; monitoring and learning, through a master computer, a data traffic of the each of the coupled connecting node to alter a security design to speed up the communications; analysing, through the master computer, the data traffic to categorize the each of the coupled connecting node into a first category of node, which is accessed by a human and a second category of node, which is accessed by a bot; utilizing, at the master computer, one or more secured hidden servers for determining a first data communication route to speed up data traffic for the human and a second data communication route to prevent data traffic above a pre-set limit, for the bot.
System and method for dynamic multifactor authentication
A method of authenticating a user. The method comprises the step of sending an authentication request to a remote authentication device and generating a first piece of authentication information. A mobile device receives the first piece of authentication information from either an access terminal or the remote authentication device. The mobile device of the user generating a second piece of authentication information which is at least partially based on the received first piece of authentication information. The second piece of authentication information is sent to the remote authentication devices and the second piece of authentication information validated. If the second piece of authentication information is successfully validated an authentication signal is generated.
METHODS AND SYSTEMS FOR IP-BASED NETWORK INTRUSION DETECTION AND PREVENTION
An authentication system includes an authentication module maintaining a store of credentials for a set of users. In response to an identity specified by credentials provided from a requestor address not being found in the store of credentials, the authentication module transmits an authentication failure response. In response to the provided credentials matching selected credentials, the authentication module transmits an authentication success response. The authentication system includes an analyzer module configured to determine a number of identity-not-found failures corresponding to a first address, identify a triggering event in response to the number exceeding a predetermined threshold, and, in response to the triggering event, add the first address to a block list. The authentication system includes a query module configured to, in response to a query for a specified address, determine whether the specified address is present in the block list and, if so, instruct transmission of the authentication failure response.
Verification Method, Electronic Device, and Non-Transitory Computer-Readable Storage Medium
A verification method, includes: in a case that the first operation does not meet a verification condition, adjusting a current value of a first sub-region in the verification region, or increasing an area of the first sub-region in the verification region, or adjusting a current value of a second sub-region in the verification region. The verification region includes the first sub-region and the second sub-region, and after the current value of the first sub-region or the current value of the second sub-region is adjusted, the current value of the first sub-region is greater than the current value of the second sub-region.
SYSTEMS AND METHODS FOR TWO-FACTOR AUTHENTICATION USING VIBRATION
A two-factor authentication system includes a mobile device having a vibration element configured to generate a vibration sequence based on a unique vibration code received by the mobile device. A two-factor authentication server is communicatively coupled to the mobile device and is configured to send the unique vibration code to the mobile device in response to the two-factor authentication server receiving a two-factor authentication request. A vibration receiver is configured to support the mobile device and communicatively coupled to the two-factor authentication server. The vibration receiver includes a vibration sensor configured to detect the vibration sequence generated by the mobile device based on the unique vibration code and generate a vibration authentication signal based on the detected vibration sequence. the two-factor authentication server is configured to receive the vibration authentication signal generated by the vibration receiver and authenticate the two-factor authentication request based on the received vibration authentication signal.