G06F21/40

Storage system communication
11582046 · 2023-02-14 · ·

A method for authorizing I/O (input/output) commands in a storage cluster is provided. The method includes generating a token responsive to an authority initiating an I/O command, wherein the token is specific to assignment of the authority and a storage node of the storage cluster. The method includes verifying the I/O command using the token, wherein the token includes a signature confirming validity of the token and wherein the token is revocable.

Storage system communication
11582046 · 2023-02-14 · ·

A method for authorizing I/O (input/output) commands in a storage cluster is provided. The method includes generating a token responsive to an authority initiating an I/O command, wherein the token is specific to assignment of the authority and a storage node of the storage cluster. The method includes verifying the I/O command using the token, wherein the token includes a signature confirming validity of the token and wherein the token is revocable.

Active locking mechanism using machine learning

Methods and systems disclosed herein describe using machine learning to lock and unlock a device. Machine learning may be trained to recognize one or more features. Once the device has been trained to recognize one or more features, a user may define an unlock condition for the device using the one or more trained features. After defining the unlock condition, the device may be locked by verifying the one or more features that the user defined as the unlock condition using machine learning. When verification is successful, the device may be unlocked and the user allowed to access the device.

Active locking mechanism using machine learning

Methods and systems disclosed herein describe using machine learning to lock and unlock a device. Machine learning may be trained to recognize one or more features. Once the device has been trained to recognize one or more features, a user may define an unlock condition for the device using the one or more trained features. After defining the unlock condition, the device may be locked by verifying the one or more features that the user defined as the unlock condition using machine learning. When verification is successful, the device may be unlocked and the user allowed to access the device.

Indication for multi-factor authentication
11580211 · 2023-02-14 · ·

An input device configured for multi-factor authentication. The input device includes a plurality of sensor electrodes, one or more light sources, and an authentication component. The plurality of sensor electrodes is configured for capacitive sensing in a sensing region of the input device. The one or more light sources are configured to illuminate at least a portion of the sensing region of the input device. The authentication component is configured to receive a first authentication input via a first authentication device, determine whether the first authentication input matches a first credential of an authorized user, and selectively activate the one or more light sources based at least in part on whether the first authentication input matches the first credential of an authorized user.

Indication for multi-factor authentication
11580211 · 2023-02-14 · ·

An input device configured for multi-factor authentication. The input device includes a plurality of sensor electrodes, one or more light sources, and an authentication component. The plurality of sensor electrodes is configured for capacitive sensing in a sensing region of the input device. The one or more light sources are configured to illuminate at least a portion of the sensing region of the input device. The authentication component is configured to receive a first authentication input via a first authentication device, determine whether the first authentication input matches a first credential of an authorized user, and selectively activate the one or more light sources based at least in part on whether the first authentication input matches the first credential of an authorized user.

Onboarding platform for performing dynamic mitigation analysis

Aspects of the disclosure relate to computing platforms that utilize improved mitigation analysis and policy management techniques to improve onboarding security. A computing platform may determine that a predetermined period of time has elapsed since finalizing an onboarding process. The computing platform may receive spot check verification inputs indicative of a user identity and may direct a mitigation analysis and output generation platform to analyze the spot check verification inputs. The computing platform may receive an indication of a correlation between the spot check verification inputs and expected spot check verification inputs. In response to determining that the correlation exceeds a predetermined threshold, the computing platform may determine that an additional verification test should be conducted, and may direct the mobile device to display an interface that prompts for additional onboarding verification inputs.

Onboarding platform for performing dynamic mitigation analysis

Aspects of the disclosure relate to computing platforms that utilize improved mitigation analysis and policy management techniques to improve onboarding security. A computing platform may determine that a predetermined period of time has elapsed since finalizing an onboarding process. The computing platform may receive spot check verification inputs indicative of a user identity and may direct a mitigation analysis and output generation platform to analyze the spot check verification inputs. The computing platform may receive an indication of a correlation between the spot check verification inputs and expected spot check verification inputs. In response to determining that the correlation exceeds a predetermined threshold, the computing platform may determine that an additional verification test should be conducted, and may direct the mobile device to display an interface that prompts for additional onboarding verification inputs.

AUTHENTICATION METHOD, DEVICE, SERVER, AND SYSTEM, AND STORAGE MEDIUM
20180006818 · 2018-01-04 ·

The present disclosure discloses an authentication method performed at a server, including: generating, based on a first account that is possessed by a user of a first device and that corresponds to a first application, corresponding token information; sending the token information to the first device to be shared by the first device with devices in a device group in a replication restriction manner; performing, based on the token information, authentication on a second device that is in the device group; granting permission of accessing the first account to the second device when the authentication succeeds; and triggering the first device to switch from a state of first account-based login to the first application to a state of suspending the login to the first application when it is determined that the second device logs in to the first application based on the permission of accessing the first account.

ENHANCED SECURITY AUTHENTICATION METHODS, SYSTEMS AND MEDIA

A transaction authorization apparatus includes a processor in communication with a communications interface. The processor is configured to receive a request for a transaction requested by a user with whom a plurality of user devices are associated, to obtain respective transaction measurements from at least some available devices from among the plurality of user devices, and to confirm approval of the request for the transaction in response to confirmation that the transaction measurements satisfy a multi-device authorization policy associated with the transaction.