Patent classifications
H04L9/3271
Pre-registration of authentication devices
A system is disclosed for pre-registering authentication devices. A security key provider system may receive a request to pre-register a security key with identified applications from an enterprise. Responsive to receiving the request, the security key provider system instructs the security key to generate a unique authentication code for each of the applications. The security key provider system may generate pre-registration information based on the authentication codes and pre-register the authentication codes of the security key to the applications by providing the pre-registration information to the applications on behalf of the enterprise. The security key provider system may instead provide the pre-registration information to the enterprise to allow the enterprise to pre-register the authentication codes.
DYNAMIC MULTI-FACTOR AUTHENTICATION
An authentication model dynamically adjusts authentication factors required for access to a remote resource based on changes to a risk score for a user, a device, or some combination of these. For example, the authentication model may conditionally specify the number and type of authentication factors required by a user/device pair, and may dynamically alter authentication requirements based on changes to a current risk assessment for the user/device while the remote resource is in use.
AUTHENTICATION WITH OFFLINE DEVICE
A first user device can transmit an interaction request to a remote computer via a long range communication channel. The first user device can receive an authentication request message from the remote computer and can then transmit the authentication request message to a second user device via a short range communication channel. The first user device can then receive an authentication response message comprising a response value from the second user device via the short range communication channel. The first user device can then transmit the authentication response message to the remote computer causing the remote computer to verify the response value and perform further processing if the response value is verified.
CONTROL METHOD, INFORMATION PROCESSING DEVICE, AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING CONTROL PROGRAM
A control method executed by a computer, the method including: detecting a risk to a first public key managed by a public key repository; performing update restriction of the first public key in response to the detection of the risk; authenticating an authenticator associated with the first public key; and releasing, in a case where the authentication of the authenticator succeeds, the update restriction.
Access technology agnostic service network authentication
Serving network authentication and validation by a UE includes encrypting an identifier associated with the UE using a first instance of a public key associated with a serving network to which the UE is attempting to gain access; transmitting the identifier to the serving network; receiving from the serving network an authentication vector containing a second instance of the public key, the second instance of the public key having been encrypted using a key shared by the UE and a home network associated with the UE; decrypting the second instance of the public key using the key shared by the UE and the home network; comparing the first instance of the public key to the second instance of the public key; and when the first instance and the second instance are the same, determining that the home network has authenticated the serving network.
Using security event correlation to describe an authentication process
Techniques are described herein that are capable of using security event correlation to describe an authentication process. Multiple events may describe a common (i.e., same) attempt to authenticate the user. For instance, a first event may include a first description of the attempt, a second event may include a second description of the attempt, and a third event may include a third description of the attempt. The first, second, and third events may be correlated based at least in part on the first, second, and third descriptions. The first, second, and third events may be aggregated to provide an aggregated event that includes an aggregation of the first, second, and third descriptions. An authentication report may be generated to include the aggregation of the first, second, and third descriptions to describe the authentication process.
Supply authentication via timing challenge response
In an example implementation, a print supply cartridge comprises a microcontroller to receive a timing challenge and enable authentication of the cartridge by providing a challenge response. The challenge response is provided in a challenge response time that falls within an expected time window.
Transaction verification through enhanced authentication
Systems and methods for authenticating requests to use an Application Programming Interface (“API”) are described. In some embodiments, a request to use an API is received. Based on a comparison of the request to use the API with a pattern of activity associated with the client, a determination is made whether the client deviates from an expected behavior. Once a determination that the client deviates from the expected behavior is made, an authentication challenge is generated and issued. In some embodiments, the comparison of the request to use the API with a pattern of activity involves comparing transactional attributes of the request to use the API with past client behavior.
Computing device and method for performing a secure neighbor discovery
Computing devices and method for performing a secure neighbor discovery. A local computing device transmits an encrypted local node identifier and an encrypted local challenge to a remote computing device. The remote computing device generates a local challenge response based on the local challenge; and transmits an encrypted remote node identifier and an encrypted local challenge response to the local computing device. The local computing device determines that the received local challenge response corresponds to an expected local challenge response generated based on the local challenge. The remote computing device further transmits an encrypted remote challenge. The local computing device generates a remote challenge response based on the remote challenge; and transmits an encrypted remote challenge response to the remote computing device. The remote computing device determines that the received remote challenge response corresponds to an expected remote challenge response generated based on the remote challenge.
Multi-factor authentication for access control using a wearable device
A system and method for providing multi-factor authentication for access through a door, but without the user having to repeat a physical act of providing authentication every time that the door is opened, wherein the first time through the door, multi-factor authentication is provided to the access control system, and wherein each subsequent access through the door, multi-factor authentication is performed automatically and without intervention of the user as long as the user has a wearable device providing at least one factor of the multi-factor authentication, and the user has not removed the wearable device since the multi-factor authentication was last provided to the access control system.