Patent classifications
H04W12/065
Continuous multifactor device authentication
A device is authenticated for communication over a network based on a sensor data signature and a traffic pattern signature. The sensor data signature and the traffic pattern signature identify the device. A determination is made whether the sensor data signature corresponds to one of a plurality of recognized sensor data signatures. A determination is also made whether the traffic pattern signature of the device corresponds to one of a plurality of recognized traffic pattern signatures. The device is authenticated for communication over the network responsive to determining that the sensor data signature corresponds to one of the plurality of recognized sensor data signatures and the traffic pattern signature corresponds to one of the plurality of recognized traffic pattern signatures.
Method for improving user authentication performed by a communication device
Method for improving user authentication efficiency performed by a communication device belonging to an authentication system. The communication device includes a local machine learning engine having a set of N artificial neural network ANN1,i adapted to process N different types of input signals. The method includes the steps: receiving a first set of N input signals S_1(i) for authentication purpose; determining respectively for each of the N input signals S_1(i) by the N artificial neural networks ANN1,i, N estimations LH(i) of the likelihood that a given input signal is provided by a legitimate user; determining based on a risk scoring established using the N estimations LH(i) if the requesting user is authenticated as the legitimate user; if the requested user is authenticated, determining if at least one likelihood estimation determined for a given input signal S_1(j) is below a predetermined threshold T.sub.C,i, and if it is the case: transmitting the input signal S_1 (j) to a remote server implementing a server machine learning engine adapted to process said N different types of input signals and trained to identify a user U_C; receiving an input signal S_2(j) associated to the closest candidate U_C and executing by the local machine learning engine an additional learning phase using the input signal S_2(j) as an input signal that is not associated to the requesting user.
Authentication techniques in response to attempts to access sensitive information
The present disclosure describes techniques for changing a required authentication type based on a request for a particular type of information. For example, consider a situation where a user has asked a virtual assistant “who owns this device?” By default, the device may allow biometric authentication to unlock. In response to identification of the owner by the virtual assistant, however, the device may require one or more other types of authentication (e.g., manual entry of a passcode) to unlock the device. In various embodiments, the disclosed techniques may increase the security of the device by making it more difficult for malicious entities to obtain the sensitive information or to access device functionality once the sensitive information has been disclosed. In various embodiments, this may prevent or reduce unauthorized access to the device.
Systems and methods to check-in shoppers in a cashier-less store
Systems and techniques are provided for linking subjects in an area of real space with user accounts. The user accounts are linked with client applications executable on mobile computing devices. A plurality of cameras are disposed above the area. The cameras in the plurality of cameras produce respective sequences of images in corresponding fields of view in the real space. A processing system is coupled to the plurality of cameras. The processing system includes logic to determine locations of subjects represented in the images. The processing system further includes logic to match the identified subjects with user accounts by identifying locations of the mobile computing devices executing client applications in the area of real space and matching locations of the mobile computing devices with locations of the subjects.
Systems and methods to check-in shoppers in a cashier-less store
Systems and techniques are provided for linking subjects in an area of real space with user accounts. The user accounts are linked with client applications executable on mobile computing devices. A plurality of cameras are disposed above the area. The cameras in the plurality of cameras produce respective sequences of images in corresponding fields of view in the real space. A processing system is coupled to the plurality of cameras. The processing system includes logic to determine locations of subjects represented in the images. The processing system further includes logic to match the identified subjects with user accounts by identifying locations of the mobile computing devices executing client applications in the area of real space and matching locations of the mobile computing devices with locations of the subjects.
Systems and methods of multi-factor authentication utilizing a vehicle
Embodiments disclosed herein describe vehicle-based authentication protocols. An illustrative authentication server may receive a request to authenticate a user connected from a mobile device. The authentication server may transmit a request to the mobile device to transmit geolocation data of the mobile device. In response, the mobile device may transmit a stream of its geolocation data. Based upon the received geolocation data stream, the authentication server may determine that the mobile device in a motion and select a vehicle-based authentication protocol to request geolocation data of a trusted vehicle. The authentication server may compare the mobile device geolocation data stream and the vehicle geolocation data stream to determine a similarity score. If the similarity score is above a threshold, the authentications server may authenticate the user. In some cases, the authentication server may authenticate the user if the mobile device is connected to the trusted vehicle.
Continuous authentication for digital services based on contactless card positioning
Various embodiments are generally directed to continuous authentication of a user to a digital service based on activity of a contactless card positioned proximate to a computing device on which the digital service operates. For example, a series of periodic status messages may be provided between a client device and the contactless card to verify whether the contactless card remains active, wherein authorization to access the digital service continues while the contactless card is active, and terminates when the contactless card is inactive.
Continuous authentication for digital services based on contactless card positioning
Various embodiments are generally directed to continuous authentication of a user to a digital service based on activity of a contactless card positioned proximate to a computing device on which the digital service operates. For example, a series of periodic status messages may be provided between a client device and the contactless card to verify whether the contactless card remains active, wherein authorization to access the digital service continues while the contactless card is active, and terminates when the contactless card is inactive.
PERSONAL AUTHENTICATION DEVICE, PERSONAL AUTHENTICATION METHOD, AND RECORDING MEDIUM
Provided is a personal authentication device capable of simply securing security with little psychological and physical burden of a user to be authenticated. Personal authentication device includes: transmission unit that transmits a first acoustic signal to a user's head; observation unit that observes a second acoustic signal after the first acoustic signal propagation; calculation unit that calculates acoustic characteristics from the first and the second acoustic signal; extraction unit that extracts a feature amount related to a user from the acoustic characteristics; storage control unit that registers the feature amount in the storage unit; identification unit that identifies the user by collating the first feature amount with a second feature amount; and storage unit stores the first feature amount, wherein while identification unit identifies the user as being identical, transmission unit transmits the first acoustic signal every predetermined interval.
SYSTEM AND METHOD FOR USING PORTAL SYSTEMS IN AUGMENTED REALITY VIRTUAL ENVIRONMENTS
An orthogonal or multi-dimensional fabric user interface is described herein. A remote server executes an operating system that provides a multi-dimensional fabric user interface for storing content for a particular user. The user can access select content by manipulating the multi-dimensional fabric user interface through a graphical user interface displayed on a personal mobile computing device. In this way, the user experiences and manipulates various data dimensions around the specific content they are accessing, rather than selecting a particular file structure location. The remote server also enables the user to enter a first location side of a portal and travel to a virtual representation a second actual physical location in the multi-dimensional fabric user interface from a virtual representation of a first actual physical location in the multi-dimensional fabric user interface.