Patent classifications
H04W12/68
Cloud-based threat detection
In certain embodiments, a security system is provided to receive activity data associated with a first source. The security system may scan the activity data to determine if there are one or more actions of interest associated with a first user account in the activity data. The security system may retrieve, from memory, security rules associated with the first cloud-based service and/or an organization associated the first user account. The security system may compare the actions of interest associated with the first user account to the security rules to determine if there are one or more security violations. In certain embodiments, the security system may retrieve additional activity data from a second source. The security system may scan the additional activity data to determine if there are one or more actions of interest associated with the second user account in the additional activity data.
Cloud-based threat detection
In certain embodiments, a security system is provided to receive activity data associated with a first source. The security system may scan the activity data to determine if there are one or more actions of interest associated with a first user account in the activity data. The security system may retrieve, from memory, security rules associated with the first cloud-based service and/or an organization associated the first user account. The security system may compare the actions of interest associated with the first user account to the security rules to determine if there are one or more security violations. In certain embodiments, the security system may retrieve additional activity data from a second source. The security system may scan the additional activity data to determine if there are one or more actions of interest associated with the second user account in the additional activity data.
Eye and head tracking authentication
A system includes at least one data processor and memory storing instructions which, when executed by the at least one data processor, configures the at least one data processor to: provide, via a display, a visual stimulus including an animation containing at least a first object and a second object, the visual stimulus prompting for user input for authentication to a virtual domain; monitor movement of a user while providing the visual stimulus; identify, based on the monitoring, a sequence of dwell times of a characteristic of the user's movement with respect to the first object and the second object; compare the identified sequence of dwell times to a stored sequence of dwell times; and provide the comparison to enable authentication of the user in the virtual domain. Related apparatus, systems, techniques and articles are also described.
Communication node, multi-hop network, equipment validity check method, and program
A communication node relays data between equipment communicating with each other via a multi-hop network based on a multi-hop manner, records a predetermined kind(s) of data among the relayed data, checks validity of the equipment by matching the predetermined kind(s) of data against past data recorded by the recording part, and outputs a check result of the validity of the equipment to a predetermined output destination(s).
Direct access authentication using gestures
A mobile computing device can include a processing unit, wireless communication interfaces, and a computer-readable memory including instructions executable by the processing unit to cause the device to perform various operations. The device may receive a request to access an application includes application pages that may be configured to provide functional features of the application, and in response to receiving the request, may present an authentication user interface (UI) and may detect a gesture from a user by the UI. The device may transmit the gesture to an authentication server and may receive a confirmation from the server that the user has been successfully authenticated. The device may determine a specific application page to present to the user based on the gesture by accessing mappings between the application pages and corresponding gestures. The specific application page, providing functional features, can be presented to the user by the device.
Establishing authentication persistence
Various embodiments are generally directed to performing an authentication persistence check and, based on the check, allowing a previously successful authentication to persist on a user apparatus. The check may involve a stability check on the user apparatus. If the user apparatus is stable, device fingerprinting on the apparatus may be performed, the result of which may be compared to a snapshot of apparatus taken at the time of successful authentication. If the comparison reveals changes or drifts that are within a predetermined threshold, then the persistence of the authentication is allowed.
System for impetus resource distribution process confirmation with wearable device integration
Embodiments of the invention are directed to a system, method, or computer program product for integration with a wearable device for impetus resource distribution process confirmation and authentication. In this way, the invention coordinates with a wearable device and resource distribution vehicles of a user. Upon activation of a resource distribution vehicle, the system reviews metrics from the wearable device to identify discrepancies between the real-time metrics and a baseline for the user. The invention triggers tiered confirmation requests for authentication prior to allowing processing of the resource distribution for impetus distribution prevention.
BIOMETRIC AUTHENTICATION DEVICE, METHOD AND RECORDING MEDIUM
The device outputs, to a display device, display information on a symbol which is to be moved and displayed; acquires a face image of a subject which has been captured by an image capturing device at a capturing timing while the display device displays the symbol; detects, from the face image, a line-of-sight position; determines that the subject of the face image is a living body when one or more prescribed conditions including a case in which the line-of-sight position matches a display position of the symbol at the image-capturing timing are all satisfied; and outputs an authentication result indicating success of the authentication when the subject is determined to be a living body and the biometric authentication is successful, and outputs an authentication result indicating failure of the authentication when the subject is determined not to be a living body or when the biometric authentication fails.
ELECTRONIC SYSTEM FOR CONSTRUCTION AND DETECTION OF SPATIAL MOVEMENTS IN A VR SPACE FOR PERFORMANCE OF ELECTRONIC ACTIVITIES
In general, apparatuses, methods and computer program products for construction and detection of spatial movements in a virtual reality (VR) space for performance of electronic activities are disclosed. A VR composite credential authentication device is provided that is configured is structured for capturing, customizing and transforming one or more VR composite credentials of a user and authenticating electronic activities based on at least the VR composite credentials. The VR composite credentials of the user are captured using one or more VR spatial sensor devices which are configured for capture and imaging of VR spatial movement and position credentials. The captured credentials are analyzed to determine an associated electronic activity. The electronic activity is initiated, automatically, in response to the successful validation of the captured credentials. Moreover, the invention allows for setting-up an infinitely customizable library of registered VR composite credentials.
ELECTRONIC SYSTEM FOR CONSTRUCTION AND DETECTION OF SPATIAL MOVEMENTS IN A VR SPACE FOR PERFORMANCE OF ELECTRONIC ACTIVITIES
In general, apparatuses, methods and computer program products for construction and detection of spatial movements in a virtual reality (VR) space for performance of electronic activities are disclosed. A VR composite credential authentication device is provided that is configured is structured for capturing, customizing and transforming one or more VR composite credentials of a user and authenticating electronic activities based on at least the VR composite credentials. The VR composite credentials of the user are captured using one or more VR spatial sensor devices which are configured for capture and imaging of VR spatial movement and position credentials. The captured credentials are analyzed to determine an associated electronic activity. The electronic activity is initiated, automatically, in response to the successful validation of the captured credentials. Moreover, the invention allows for setting-up an infinitely customizable library of registered VR composite credentials.