H04W12/68

Systems and methods for continuous authentication and monitoring
11706215 · 2023-07-18 · ·

Systems, apparatuses, methods, and computer program products are disclosed for providing continuous session authentication and monitoring. An example method includes authenticating, at a first time, a session for a user of the client device based on an authentication image data structure and a plurality of first video frames captured before the first time. The example method further includes extracting sample data from a monitor region for each of a plurality of second video frames captured after the first time and generating motion data based on the extracted sample data. The example method further includes detecting, at a second time, a re-authentication trigger event based on the motion data. Subsequently, the example method includes re-authenticating the session based on the authentication image data structure and a plurality of third video frames captured after the second time.

Method and apparatus for erasing security-relevant information in a device
11556660 · 2023-01-17 · ·

Provided is a method for erasing security-relevant information in a device, having the method steps of: ascertaining at least one movement parameter of the device over time, monitoring the ascertained movement parameters over time on the basis of at least one prescribed movement pattern, and triggering an erase process for the security-relevant information if the ascertained movement parameter over time is consistent with the at least one prescribed movement pattern. An apparatus and a computer program product for carrying out the method to ensure that security-relevant data of the device are erased reliably and completely even in the event of an accident or another unforeseen event is also provided.

Method and apparatus for erasing security-relevant information in a device
11556660 · 2023-01-17 · ·

Provided is a method for erasing security-relevant information in a device, having the method steps of: ascertaining at least one movement parameter of the device over time, monitoring the ascertained movement parameters over time on the basis of at least one prescribed movement pattern, and triggering an erase process for the security-relevant information if the ascertained movement parameter over time is consistent with the at least one prescribed movement pattern. An apparatus and a computer program product for carrying out the method to ensure that security-relevant data of the device are erased reliably and completely even in the event of an accident or another unforeseen event is also provided.

ESTABLISHING AUTHENTICATION PERSISTENCE

Various embodiments are generally directed to performing an authentication persistence check and, based on the check, allowing a previously successful authentication to persist on a user apparatus. The check may involve a stability check on the user apparatus. If the user apparatus is stable, device fingerprinting on the apparatus may be performed, the result of which may be compared to a snapshot of apparatus taken at the time of successful authentication. If the comparison reveals changes or drifts that are within a predetermined threshold, then the persistence of the authentication is allowed.

Context-dependent authentication system, method and device
11699155 · 2023-07-11 · ·

A method for authenticating a user using a user device connected to a communications network, the method comprising an implicit phase, wherein said implicit phase comprises performing at least one task within a workflow, said at least one task necessary to move forward within said workflow; storing information associated with said performing of at least one task; comparing said stored information with a stored user profile; and determining whether said authentication of said user is successful or unsuccessful based on said comparing.

Context-dependent authentication system, method and device
11699155 · 2023-07-11 · ·

A method for authenticating a user using a user device connected to a communications network, the method comprising an implicit phase, wherein said implicit phase comprises performing at least one task within a workflow, said at least one task necessary to move forward within said workflow; storing information associated with said performing of at least one task; comparing said stored information with a stored user profile; and determining whether said authentication of said user is successful or unsuccessful based on said comparing.

Computer-Based System for Locking User Account Access

A computing device may determine that a user of an application is asleep based on data of a wearable computing device that is associated with a user. Based on the determination that the user is asleep, the computing device may lock an account that is associated with the user. Locking the account may involve restricting actions that the user is permitted to take with respect to the application. The computing device may receive an indication of a first transaction that is associated with the account of the user. Based on the determination that the account is locked, the computing device may prohibit the transaction. The computing device may receive an indication that the user is awake. Based on the indication that the user is awake, the computing device may unlock the account and permit a second transaction.

Biometric authentication device, method and recording medium
11550890 · 2023-01-10 · ·

The device outputs, to a display device, display information on a symbol which is to be moved and displayed; acquires a face image of a subject which has been captured by an image capturing device at a capturing timing while the display device displays the symbol; detects, from the face image, a line-of-sight position; determines that the subject of the face image is a living body when one or more prescribed conditions including a case in which the line-of-sight position matches a display position of the symbol at the image-capturing timing are all satisfied; and outputs an authentication result indicating success of the authentication when the subject is determined to be a living body and the biometric authentication is successful, and outputs an authentication result indicating failure of the authentication when the subject is determined not to be a living body or when the biometric authentication fails.

Session management function derived core network assisted radio access network parameters

Apparatuses, methods, and systems are disclosed for session management function derived core network assisted radio access network parameters. One method includes receiving session management function derived core network assisted radio access network parameters from a session management function. The method includes storing the session management function derived core network assisted radio access network parameters in a protocol data unit session level context. The method includes using the session management function derived core network assisted radio access network parameters to determine an expected session activity behavior parameter set.

Facial recognition authentication system including path parameters
11693938 · 2023-07-04 · ·

Systems and methods for enrolling and authenticating a user in an authentication system via a user's camera of camera equipped mobile device include capturing and storing enrollment biometric information from at least one first image of the user taken via the camera of the mobile device, capturing authentication biometric information from at least one second image of the user, capturing, during imaging of the at least one second image, path parameters via at least one movement detecting sensor indicating an authentication movement of the mobile device, comparing the authentication biometric information to the stored enrollment biometric information, and comparing the authentication movement of the mobile device to an expected movement of the mobile device to determine whether the authentication movement sufficiently corresponds to the expected movement.