Patent classifications
H04W12/126
Computer-based systems configured for one-time passcode (OTP) protection and methods of use thereof
Systems and methods of anti-vishing OTP protection via machine learning techniques are disclosed. In one embodiment, an exemplary computer-implemented method may comprise: receiving a permission indicator identifying a permission by the user to detect OTPs and calls being received by a computing device; receiving an indication of an OTP data item being received; processing the OTP data item to determine a time duration during which a particular OTP included therein is valid; utilizing a trained OTP protection machine learning model to determine phone number(s) as presenting a security risk with respect to the OTP data item; and instructing the computing device to commence at least one security measure based at least in part on a contact list updated with an indication that the phone number(s) present a security risk with regard to the particular OTP during the time duration of the particular OTP.
Electronic device and method for supporting automatic Wi-Fi connection with enhanced security method when making electronic wallet payment
An electronic device is provided, which includes a wireless communication module; at least one processor; and a memory configured to store instructions that, when executed by the at least one processor, cause the electronic device to perform a transaction with an external device using the wireless communication module, receive, from a payment server, payment approval information indicating that the transaction is approved, the payment approval information including device information of an access point (AP) located in an offline merchant and period information, establish, in response to receiving the payment approval information, a connection with the AP using the wireless communication module based on the device information of the AP, after the connection with the AP is established, operate a timer corresponding to the period information, and terminate the connection to the AP when the timer expires.
Password protection with independent virtual keyboard
A virtual keyboard rendered on a separate computing device is independent of the user's computer. A virtual keyboard displayed on the user's computer screen is blank without any alphanumeric characters. Another virtual keyboard displayed on the user's independent computing device has a randomly generated layout of alphanumeric characters on a keypad. The user enters a password by pressing the blank keys of the blank keyboard on his computer screen with reference to the other virtual keyboard. The position sequence of these entered keys is sent to an application on a remote server computer. The remote server computer shares a virtual keyboard having the randomly generated layout of characters with the independent computing device via an online or off-line technique. When online, an encoded image of the encrypted layout is sent to the client computer and displayed for scanning by the device. When off-line, both the application and the device generate the same random key sequence by using the same pseudo random number generator and the same seed value.
Context-dependent authentication system, method and device
A method for authenticating a user using a user device connected to a communications network, the method comprising an implicit phase, wherein said implicit phase comprises performing at least one task within a workflow, said at least one task necessary to move forward within said workflow; storing information associated with said performing of at least one task; comparing said stored information with a stored user profile; and determining whether said authentication of said user is successful or unsuccessful based on said comparing.
Context-dependent authentication system, method and device
A method for authenticating a user using a user device connected to a communications network, the method comprising an implicit phase, wherein said implicit phase comprises performing at least one task within a workflow, said at least one task necessary to move forward within said workflow; storing information associated with said performing of at least one task; comparing said stored information with a stored user profile; and determining whether said authentication of said user is successful or unsuccessful based on said comparing.
SHIFT IDENTIFICATION
Provided are systems and methods for verifying an identity of a user based on a data mesh created from various sources of truth. In one example, a method may include establishing, via a host platform, a first and a authenticated communication channel between a host server of a user account and a host server of a second user account, retrieving, via the first and second authenticated communication channels, PII of the user from the first and second user accounts and combining the PII into a meshed data set, determining a difference between the PII within the meshed data set, and verify an identity of the user based on the determined difference between the PII within the meshed data set and transmitting the verification to a computer system.
Locating wireless devices
Techniques for locating a misplaced primary wireless device (within a spatial region. In particular, the techniques presented herein use a secondary wireless device to collect a plurality of multivariate wireless data points within the spatial region. An artificially intelligent search algorithm analyzes the plurality of multivariate wireless data points to estimate the location of the wireless device. Directional instructions that guide the user to the estimated location of the primary wireless device are generated and then provided to the user.
Activation of cryptographically paired device
An event is detected at a first device. Responsive to the detection, at least some functionality of the first device is deactivated. The presence of a second device, cryptographically paired with the first device, is detected by the first device. Responsive to the detection, at least some functionality of the first device is activated or reactivated.
Activation of cryptographically paired device
An event is detected at a first device. Responsive to the detection, at least some functionality of the first device is deactivated. The presence of a second device, cryptographically paired with the first device, is detected by the first device. Responsive to the detection, at least some functionality of the first device is activated or reactivated.
SIM SWAP FRAUD DETECTION
There is provided mechanisms for detecting SIM swap fraud. A method is performed by a classifier entity. The method comprises monitoring subscriber update data request messages sent as part of an update data procedure between a first network entity and a second network entity in a mobile network. The method comprises determining that one or more of the subscriber update data request messages is associated with SIM swap fraud by verifying that the subscriber update data request messages fulfil a set of conditions. The set of conditions pertain at least to: an MSISDN of a first subscriber entity in the mobile network within a first predefined timeframe is associated with more than one IMSI, and/or an IMSI of a second subscriber entity in the mobile network within a second predefined timeframe is associated with more than one MSISDN. The method comprises performing, upon the set of conditions is fulfilled for the one or more of the subscriber update data request messages, an action according to which the IMSI of the second subscriber entity is associated with SIM swap fraud.