H04W12/30

Systems and methods of push-based verification of a transaction

A system and method of implementing an API of an authentication service includes implementing a confirmation API, wherein the implementing includes: initiating a confirmation API request based on receiving an access request, wherein the confirmation API request operates to perform an authentication of a requestor making the access request; identifying the requestor based on a search of the requestor via the confirmation API; identifying, by one or more API endpoints of the remote authentication service: (i) a subscriber account of the subscriber maintained by the remote authentication service and (ii) identifying a user device of the requestor that is enrolled with the subscriber account based on the confirmation API request; transmitting a confirmation request to the user device; obtaining from the user device a response to the confirmation request and presenting the response to the confirmation request to the subscriber; and granting or denying the access request.

Method and system for providing communication services using a plurality of remote subscriber identity modules

A method and a wireless communication device for providing communication service to devices connected to the wireless communication device. By establishing a starter wireless carrier connection using a starter SIM from a plurality of local SIMs, the wireless communication device establishes one or more logical data connections with one or more SIM banks. Remote-SIMs are selected from the one or more SIM banks and used to establish further wireless carrier connections to allow communication service to be provided to the devices over wireless carrier connections.

Systems and methods for context-aware mobile application session protection
11647392 · 2023-05-09 · ·

A method for securing a mobile device includes determining whether the mobile device is unlocked whether a user is logged into a mobile application running on the mobile device. The method further includes determining, when the mobile device is unlocked while the user is logged into the mobile application, whether the mobile device is currently in a threat scenario by analyzing data from one or more sensors. The threat scenario indicates that the mobile device is exposed to unintended and malicious interactions. The method further includes displaying, when it is determined that the mobile device is currently in the threat scenario, a step-up authentication screen that replaces or at least partially covers an application screen of the mobile application. The method further includes restoring the application screen of the mobile application in response to receiving a valid authentication input from the user on the step-up authentication screen.

Systems and methods for context-aware mobile application session protection
11647392 · 2023-05-09 · ·

A method for securing a mobile device includes determining whether the mobile device is unlocked whether a user is logged into a mobile application running on the mobile device. The method further includes determining, when the mobile device is unlocked while the user is logged into the mobile application, whether the mobile device is currently in a threat scenario by analyzing data from one or more sensors. The threat scenario indicates that the mobile device is exposed to unintended and malicious interactions. The method further includes displaying, when it is determined that the mobile device is currently in the threat scenario, a step-up authentication screen that replaces or at least partially covers an application screen of the mobile application. The method further includes restoring the application screen of the mobile application in response to receiving a valid authentication input from the user on the step-up authentication screen.

SYSTEM AND METHOD FOR REMOTELY INITIATING LOST MODE ON A COMPUTING DEVICE

Disclosed herein are systems, methods, and non-transitory computer-readable storage media for remotely initiating lost mode on a computing device. A request that lost mode be initiated can include a message and contact information provided by the requesting user. Once authenticated, a command to initiate lost mode is sent to the lost device. Initiating lost mode includes locking the lost device and suppressing select functionality. The message and contact information are displayed and the lost device is enabled to contact the requesting user using the contact information. The lost device can also collect and transmit location data to the requesting user. The location data can be presented on a map indicating the lost devices location and the time the lost device was at the location. The location data can be scheduled to be resent to the user based on numerous factors such as a set schedule, rules or heuristic.

SYSTEM AND METHOD FOR REMOTELY INITIATING LOST MODE ON A COMPUTING DEVICE

Disclosed herein are systems, methods, and non-transitory computer-readable storage media for remotely initiating lost mode on a computing device. A request that lost mode be initiated can include a message and contact information provided by the requesting user. Once authenticated, a command to initiate lost mode is sent to the lost device. Initiating lost mode includes locking the lost device and suppressing select functionality. The message and contact information are displayed and the lost device is enabled to contact the requesting user using the contact information. The lost device can also collect and transmit location data to the requesting user. The location data can be presented on a map indicating the lost devices location and the time the lost device was at the location. The location data can be scheduled to be resent to the user based on numerous factors such as a set schedule, rules or heuristic.

ACCESS CONTROLLER FOR SECURE TRANSACTIONS

A method for performing secure transactions is disclosed. The method includes: providing an access controller between a core application and a third-party application, where the access controller prevents the third-party application from unauthorized access to the core application; receiving, by the access controller, a command from the third-party application to access the core application; transmitting, by the access controller, an authorization request to a secure application storing credentials of a user; providing, by the access controller, the third-party application with access to the core application in response to the access controller receiving notification from the secure application that the command is authorized; and preventing, by the access controller, the third-party application from accessing the core application in response to the access controller receiving notification from the secure application that the command is unauthorized.

BIOMETRIC METHODS FOR ONLINE USER AUTHENTICATION
20230208835 · 2023-06-29 · ·

Methods for authenticating a genuine presence of a human involve directing one or more modulated probes towards a body part of the human, receiving a response to the probes from the body part, and analyzing the response to determine whether it contains spectral characteristics that match a class of responses to such probes for the human body part in a human population. Replay attacks are countered by varying the modulation of the probe temporally, spatially, and spectrally each time authentication is performed. The probes may include electromagnetic radiation, acoustic beams, or particle beams that generate a detected reflection, absorption pattern, scintillation, or fluorescence response of the body part. The analysis of the response may be directed to one or more of temporal, spatial, and spectral variations in accordance with the nature of the probes and the modulation.

BIOMETRIC METHODS FOR ONLINE USER AUTHENTICATION
20230208835 · 2023-06-29 · ·

Methods for authenticating a genuine presence of a human involve directing one or more modulated probes towards a body part of the human, receiving a response to the probes from the body part, and analyzing the response to determine whether it contains spectral characteristics that match a class of responses to such probes for the human body part in a human population. Replay attacks are countered by varying the modulation of the probe temporally, spatially, and spectrally each time authentication is performed. The probes may include electromagnetic radiation, acoustic beams, or particle beams that generate a detected reflection, absorption pattern, scintillation, or fluorescence response of the body part. The analysis of the response may be directed to one or more of temporal, spatial, and spectral variations in accordance with the nature of the probes and the modulation.

SYSTEMS AND METHODS FOR VEHICLE CONFIGURATION VERIFICATION WITH FAILSAFE CODE

A computer system for verifying vehicle software configuration may be provided. The computer system may include a processor and a non-transitory, tangible, computer-readable storage medium having instructions stored thereon that, in response to execution by the processor, cause the processor to: (1) transmit, to a vehicle computing system, an authentication request including a hash algorithm specification; (2) receive, from the vehicle computing system, a current configuration hash value and a vehicle identifier; (3) retrieve a trusted data block from a memory based upon the vehicle identifier, the trusted data block including a stored configuration hash value and a smart contract code segment; (4) execute the smart contract code segment, the smart contract code segment including a failsafe code segment; and/or (5) transmit the authentication response to the vehicle computing system, and cause the vehicle computing system to execute the failsafe code segment.