H04L2463/082

ENHANCED MULTI-FACTOR AUTHENTICATION BASED ON PHYSICAL AND LOGICAL PROXIMITY TO TRUSTED DEVICES AND USERS

This disclosure describes techniques for performing enhanced authentication of a device based on physical and logical proximity of the device to one or more other authenticated devices. An example method includes performing, at a first time, a first authentication of a first device or a first user of the first device and determining that the first device is connected to at least one second device in a communication session. The at least one second device or at least one second user of the at least one second device are authenticated. The example method further includes determining a reauthentication interval based on the first device being connected to the at least one second device in the communication session and initiating, at a second time that is after the first time by the reauthentication interval, a second authentication of the first device or the first user of the first device.

Personal Health Record System and Method using Patient Right of Access

Methods and systems for managing access to patient healthcare data, using a patient right of access called for in relevant industry law, simplifies processes of digitally identifying, granting, querying, extracting, and transforming a personal health record (PHR). An identity of the patient, an execution of a right of access form by the patient, and presence of the right of access form within memory of the system, are verified by the system. A query for healthcare data pertaining to the patient may be relayed by the system from a querying entity to a possessing entity in possession of the requested healthcare data. The requested data may be received by the system and stored within a database associated with the patient, creating or augmenting a PHR for the patient. The requested data may be anonymized by the system for a researcher studying a pool of patients.

VERIFICATION PUSH NOTIFICATIONS THROUGH WEB-BROWSER
20220255759 · 2022-08-11 ·

Disclosed are systems, methods, and non-transitory computer-readable media for verification push notifications provided through a web-browser application. An authentication system provides a web-client Software Development Kit (SDK) to enable verification push notifications through a client-side application. Some client-side applications, such as web-browser applications (e.g., Chrome, Firefox, etc.) may not support certain features to provide for secure storage of data and encryption keys that are used to provide for verification push notifications. For example, some client-side applications may utilize a local storage that stores data in plain text that can be easily accessed and read, thereby presenting a security threat. The web-client SDK provided by the authentication system provides for secure storage of data and encryption keys to enable a client-side application to securely provide verification push notifications.

AUTHENTICATING AND VERIFYING USERS WITH UNIQUE IDENTIFICATION NUMBERS AND FINGER VEIN PATTERNS
20220253512 · 2022-08-11 ·

Techniques for executing authenticated and verified transactions using a finger vein pattern in combination with a Unique Identification Number (UIN) is disclosed. The techniques may be used to process one or more payment transactions between a registered customer and a registered merchant. The UIN and the finger vein pattern of the customer authorize payment to a merchant once a match is authenticated and verified based on the UIN and finger vein pattern.

Systems and Methods for Using Typing Characteristics for Authentication
20220253511 · 2022-08-11 ·

Disclosed herein are methods, devices, and systems for provide a new two-factor or user authentication procedure. In a scenario in which a user is enrolled in the verification system, a method can include receiving, at a network-based server, a unique identifier associated with a user that desires to access a service from an application or a website, identifying a typing profile associated with the unique identifier and presenting a reference text on a user device of the user. The method can include receiving a typing pattern of the user and determining whether there is a match between the typing pattern and one or more previously recorded typing patterns for the user. When the determination indicates that the user is verified, the method includes presenting a one-time password on a display of the user device. The user enters the one-time password into an input field and validating, via the network-based server, the one-time password.

PERIPHERAL LANDSCAPE AND CONTEXT MONITORING FOR USER-IDENTIFY VERIFICATION

Disclosed are methods, systems, and non-transitory computer-readable media for determining a trust score associated with a user, comprising detecting entities near a user device operated by the user; calculating the trust score for the user based on a policy that incorporates data about the entities near the user device, the trust score being a score that is indicative of a trust worthiness of data received from the user device, wherein trusted entities near the user device result in an increased trust score, and untrusted entities near the user device result in a decreased trust score; and permitting access to a resource when the trust score is above a threshold.

MULTI-FACTOR AUTHENTICATION USING CONFIDANT VERIFICATION OF USER IDENTITY

In some implementations, a server device may receive, from a client device, a login credential associated with a user and a request to access a resource. The server device may identify a confidant associated with the user and a confidant device associated with the confidant, wherein the confidant device is different from a user device associated with the user. The server device may transmit, to the confidant device, a request to verify an identity of the user. The server device may determine whether a verification of the identity of the user is received from the confidant device. The server device may grant or deny access to the resource based on determining whether the verification of the identity of the user is received from the confidant device.

COLLABORATION APPLICATION INTEGRATION FOR USER-IDENTITY VERIFICATION

Disclosed are methods, systems, and non-transitory computer-readable media for utilizes a collaboration application to provide data beneficial to the authentication of the user. The present application discloses receiving at least one item of personal identifying information for a user from a primary multi-factor authentication device. The present application further discloses receiving at least one item of personal identifying information for a user from a conferencing service in which the user is engaged in a conference. The present application also discloses determining whether to authenticate the user based on the items of personal identifying information from the primary multi-factor authentication device and from the conferencing service.

ADJUSTING SECURITY POLICIES BASED ON ENDPOINT LOCATIONS
20220255922 · 2022-08-11 ·

This disclosure describes techniques for setting and/or adjusting a security policy associated with a device based on the physical locations of endpoint devices exchanging data with the device. An example method includes performing, at a first time, a first authentication of a first device connecting to a service; determining addresses of second devices exchanging data with the first device; determining physical locations of the second devices based on the addresses; and defining a reauthentication interval based on the physical locations of the second devices. At a second time that is after the first time by the reauthentication interval, the example method further includes disconnecting the first device from the service; and based on disconnecting the first device from the service, triggering a second authentication of the first device.

MULTI-FACTOR APPROACH FOR AUTHENTICATION ATTACK DETECTION

Disclosed are methods, systems, and non-transitory computer-readable media for detecting a presentation attack in a biometric factor domain, such as a multi-factor authentication environment. The methods, systems, and non-transitory computer-readable media comprise analyzing data relevant to a plurality of factors for evaluating whether an authentication attempt by a user is subject to the presentation attack and determining that the authentication attempt is subject to the presentation attack based on analysis of the data from the plurality of factors. The methods, systems, and non-transitory computer-readable media can detect a presentation attack even when the authentication attempt is successful.