H04L2463/082

ARCHITECTURE HAVING A PROTECTIVE LAYER AT THE DATA SOURCE
20220255935 · 2022-08-11 ·

A method and system for performing at least one service are disclosed. The method and system include receiving a communication for a data source at a wrapper. The wrapper includes a dispatcher and at least one service. The dispatcher receives the communication and is data agnostic. The method and system also include providing the communication from the dispatcher to the data source and to the at least one service. The at least one service inspects the communication and may perform additional functions.

Establishing access sessions

A method includes receiving an indication of a request from a client device. The request is for establishing an access session to perform one or more actions on data of a data processing platform. The method includes receiving data indicative of a context of the access session request and establishing a challenge session associated with the request that indicates one or more challenges required of a user associated with a client device to successfully respond to in order to establish the requested access session, a number or a type of the one or more challenges being determined based on the context, and establishing an access session to enable the user to perform the one or more actions on the data of the data processing platform if responses to all challenges in the challenge session are successful.

Variable-step authentication for communications in controlled environment
11388159 · 2022-07-12 · ·

A variable-step authentication system and a method for operating for performing variable-step authentication for communications in a controlled environment is disclosed. The variable-step authentication system may include a communication device and a server. The variable-step method includes steps for determining an authentication process that involves a number of authentication steps. The number of authentication steps is variable and dependent on a trust level associated with each participant in the communication.

AUTHENTICATION DATA GENERATION DEVICE, AUTHENTICATION DEVICE, AUTHENTICATION DATA GENERATION METHOD, AND RECORDING MEDIUM

The authentication data generation device controls a single image-taking device to take images of a plurality of authentication parts of the authentication target person with different settings. Then, the authentication data generation device outputs taken images of the plurality of authentication parts obtained by the image-taking as authentication data for the authentication parts.

Method and system for improved data control and access
11416601 · 2022-08-16 · ·

A method for backing up data includes: receiving, by a driver in a host controller of a data storage device, an indication of a threatening event identifying one or more data files in the data storage device; delaying, by the driver, the threatening event; and backing up, by the driver, the one or more data files in the data storage device, prior to allowing the threatening event.

SYSTEM AND METHOD FOR GENERATING AND IMPLEMENTING A REAL-TIME MULTI-FACTOR AUTHENTICATION POLICY ACROSS MULTIPLE CHANNELS
20220232035 · 2022-07-21 · ·

Systems and methods for generating and implementing a real-time multi-factor authentication policy across multiple channels, are configured to: during a pre-authentication stage: receive, via a user interface, information defining one or more scenarios; receive, via the user interface, information defining one or more authentication flows; for each of the one or more scenarios, map one of the one or more authentication flows to a given scenario; and generate a multi-factor authentication policy associated with each of the one or more scenarios; and during a real-time authentication stage: upon receiving an interaction, identify, by a decision engine, a relevant scenario of the one or more scenarios; implement, by the decision engine, the multi-factor authentication policy associated with the relevant scenario; and determine, by the decision engine, an authentication result.

Systems and methods for verifying credentials to perform a secured operation in a connected system
11394705 · 2022-07-19 · ·

Systems and methods for verifying credentials to perform a secured operation in a connected system are provided. Such systems and methods may include a cloud server determining whether a face in an image and an activation code valid or invalid. When the cloud server determines that both the face in the image and the activation code are valid, systems and methods may include the cloud server transmitting an instructional signal to the connected system to execute the secured operation. However, when the cloud server determines that the face in the image is invalid, the activation code is invalid, or the image fails to include the face, systems and methods can include the cloud server refraining from transmitting the instructional signal to the connected system to execute the secured operation.

Automatic identity management with third party service providers

Disclosed herein are system, method, and computer program product embodiments for updating identification information of a user with service providers. An embodiment operates by a computing device sending a first piece of identification information describing a user to a service provider requiring a credential to update a user profile unique to the user. Upon receiving an indication that the piece of identification information sufficiently describes the user, the computing device generates an identifier unique to the particular user to identify the user when the computing device communicates with the service provider. Thereafter, the computing device sends an instruction to the service provider to update their user profile with a second piece of identification information. With the request, the computing device sends the identifier unique to the user, which allows the service provider to bypass the user credential and update the user profile with the second piece of identification information.

MULTI FACTOR AUTHENTICATION
20220224692 · 2022-07-14 · ·

A method of multi-factor authentication, the method comprising computer executed steps, the steps comprising: from a computer of a cloud service, receiving data identifying a user logged-in to the cloud service after being successfully authenticated using a first authentication factor, communicating with a client device of the logged-in user, for receiving a second authentication factor from the logged-in user, determining whether the second authentication factor received from the logged-in user is valid, based on a result of the determining, determining a first user-permission policy for the logged-in user, and communicating the determined first user-permission policy to the computer of the cloud service, for the cloud service to base a restriction of usage of the cloud service by the logged-in user on.

Device and method for receiving a temporary credit token

A computer implemented method, device and computer program device are provided including one or more processors and an input to collect credential related content including a first network resource identifier related to a first one of multiple network resources, the credential related content further including a master password that is associated with the first network resource identifier and that is associated with network resource identifiers for a remainder of the multiple network resources. Responsive to execution of the program instructions, the processor converts the master password and the first network resource identifier into a first hash code to receive a temporary credential token from the authentication service in connection with the first hash code.