H04W12/065

DEVICE, COMPUTER PROGRAM AND METHOD

A device for authenticating a user is described that comprises a sensor configured to measure the movement of a user in response to the interaction of the user with a displayed image and controller circuitry configured to authenticate the user in response to a positive comparison between the movement of the user and a stored movement associated with the user.

DEVICE, COMPUTER PROGRAM AND METHOD

A device for authenticating a user is described that comprises a sensor configured to measure the movement of a user in response to the interaction of the user with a displayed image and controller circuitry configured to authenticate the user in response to a positive comparison between the movement of the user and a stored movement associated with the user.

SYSTEM AND METHOD FOR BEACON-BASED ACTION VALIDATION
20230073560 · 2023-03-09 ·

An automated method is provided for validating an action based on beacon source proximity to a user device. A user data processing device receives from a remote action validation server an action validation request. The request includes identification of an authentication device comprising a beacon transmitter and identification of a proposed action associated with the authentication device. The user data processing device determines whether the authentication device is within beacon signal reception range of the user data processing device and transmits an action validation response to the remote action validation processing system.

SYSTEM AND METHOD FOR BEACON-BASED ACTION VALIDATION
20230073560 · 2023-03-09 ·

An automated method is provided for validating an action based on beacon source proximity to a user device. A user data processing device receives from a remote action validation server an action validation request. The request includes identification of an authentication device comprising a beacon transmitter and identification of a proposed action associated with the authentication device. The user data processing device determines whether the authentication device is within beacon signal reception range of the user data processing device and transmits an action validation response to the remote action validation processing system.

PROXIMITY-BASED DATA ACCESS AUTHENTICATION AND AUTHORIZATION IN AN ANALYTE MONITORING SYSTEM
20230126810 · 2023-04-27 ·

Methods and apparatus are provided for securely obtaining access to patient data associated with a patient using a sensor system configured for monitoring analyte levels of a patient. In one aspect, a method includes receiving, at a display device, one or more communications from the sensor system, wherein the one or more communications include identifiable information associated with the sensor system and are transmitted by the sensor system via an advertisement channel; inserting, at the display device, the identifiable information in a web request; providing, at the display device, the web request including the identifiable information to a data management system to request access to the patient data; and obtaining access to the patient data through a web browser upon the data management system verifying that the identifiable information matches a second identifiable information stored in the patient data.

PROXIMITY-BASED DATA ACCESS AUTHENTICATION AND AUTHORIZATION IN AN ANALYTE MONITORING SYSTEM
20230126810 · 2023-04-27 ·

Methods and apparatus are provided for securely obtaining access to patient data associated with a patient using a sensor system configured for monitoring analyte levels of a patient. In one aspect, a method includes receiving, at a display device, one or more communications from the sensor system, wherein the one or more communications include identifiable information associated with the sensor system and are transmitted by the sensor system via an advertisement channel; inserting, at the display device, the identifiable information in a web request; providing, at the display device, the web request including the identifiable information to a data management system to request access to the patient data; and obtaining access to the patient data through a web browser upon the data management system verifying that the identifiable information matches a second identifiable information stored in the patient data.

Device, computer program and method

A device for authenticating a user is described. This device comprises transceiver circuitry configured to receive motion information from a plurality of wearable devices located on a user's body indicative of the motion of the user's body at the location of the respective wearable device at a particular time; and 5 controller circuitry configured to: compare the received motion information and the location of the respective wearable device and authenticate the user in the event of a positive comparison between the received motion information and the location of the respective wearable device with stored motion information and the location of the respective wearable device.

Systems and methods for continuous user authentication

Disclosed herein are systems and methods for continuous user authentication during access of a digital service. In an exemplary aspect, a continuous authentication module may receive, at a computing device, initial authentication credentials of the user. The initial authentication credentials enable access to a service via the computing device. While the service is being accessed, the continuous authentication module may continuously monitor whether an unauthorized user has replaced the user in accessing the service by comparing usage attributes of the service with historic usage attributes associated with the user. In response to determining that the unauthorized user has replaced the user, the continuous authentication module may cease the access to the service via the computing device.

System and method for context-sensitive access control
11637835 · 2023-04-25 · ·

Methods and systems for providing secure digital access to services are described. Embodiments include user behavior tracking, learning, and updating one or more contextual access algorithms and thereafter can act as multi-factor authentications. The method may include receiving data for a group of users and initializing a machine learning algorithm with the group data. The method may also collect individual user data and context data periodically, including characteristic behavior data, and update the machine learning algorithm with the individual user data. The method may further calculate a threshold for tolerance based on the updated algorithm, and verify user requests for access to the service. A multi-factor authentication may be presented to the user when the verifications are not acceptable, such as by being below a threshold. A permissions data structure can be generated and used to control access to the service.

Establishing authentication persistence

Various embodiments are generally directed to performing an authentication persistence check and, based on the check, allowing a previously successful authentication to persist on a user apparatus. The check may involve a stability check on the user apparatus. If the user apparatus is stable, device fingerprinting on the apparatus may be performed, the result of which may be compared to a snapshot of apparatus taken at the time of successful authentication. If the comparison reveals changes or drifts that are within a predetermined threshold, then the persistence of the authentication is allowed.