Patent classifications
G06F21/45
Network based password policy detection and enforcement
A processor may receive a packet configured to travel in a network. The packet may be configured to travel from a first device to a second device. The processor may analyze the packet. The processor may detect a password with the packet. The processor may determine whether the detected password complies with at least one password policy. The processor may provide a password policy compliance output to a user. The password policy compliance output may indicate to the user whether the detected password complies with the at least one password policy.
Triage engine for document authentication
Computer systems and methods are provided for receiving a first authentication request that includes an image of an identification document. A risk value is determined using one or more information factors that correspond to the authentication request. A validation user interface that includes the image of the identification document is displayed. A risk category that corresponds to the risk value is determined using at least a first risk threshold. In accordance with a determination that the risk value corresponds to a first risk category, a visual indication that corresponds to the first risk category is displayed. In accordance with a determination that the risk value corresponds to a second risk category, a visual indication that corresponds to the second risk category is displayed.
Triage engine for document authentication
Computer systems and methods are provided for receiving a first authentication request that includes an image of an identification document. A risk value is determined using one or more information factors that correspond to the authentication request. A validation user interface that includes the image of the identification document is displayed. A risk category that corresponds to the risk value is determined using at least a first risk threshold. In accordance with a determination that the risk value corresponds to a first risk category, a visual indication that corresponds to the first risk category is displayed. In accordance with a determination that the risk value corresponds to a second risk category, a visual indication that corresponds to the second risk category is displayed.
METHOD FOR FORCIBLE PASSWORD CHANGE
The present invention relates to a method for forcible password change, a server register a user data and a first key, the user signs into a mobile application program according to the user data and the first key. When the login key is different from the first key, and the number of sign-ins exceeds a threshold, the server will stop the user data from signing into the mobile application; the server generates a second key and sends a notification message; a confirmation event is executed to the notification message; after execution of the confirmation event the server allows the user data and the second key to be used to open the mobile application. This method enhances the security of the user account. When it is stolen or possibly stolen, the password is quickly changed and reconfirmed to prevent the account from increasing the loss of theft.
METHOD FOR FORCIBLE PASSWORD CHANGE
The present invention relates to a method for forcible password change, a server register a user data and a first key, the user signs into a mobile application program according to the user data and the first key. When the login key is different from the first key, and the number of sign-ins exceeds a threshold, the server will stop the user data from signing into the mobile application; the server generates a second key and sends a notification message; a confirmation event is executed to the notification message; after execution of the confirmation event the server allows the user data and the second key to be used to open the mobile application. This method enhances the security of the user account. When it is stolen or possibly stolen, the password is quickly changed and reconfirmed to prevent the account from increasing the loss of theft.
NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR SERVER, SERVER, AND METHOD EXECUTED BY SERVER
A server may receive, from a terminal device, a change instruction for changing a password of a communication device different from the server and the terminal device. The server may, in a case where the change instruction is received from the terminal device, send first authentication information to the terminal device. The first authentication information may be inputted to the communication device by a user of the terminal device after the first authentication information has been sent to the terminal device. The server may, in a case where the first authentication information is inputted to the communication device, receive the first authentication information from the communication device. The server may, in a case where the first authentication information is received from the communication device, send a change permission notification to the communication device. The change permission notification may be a notification to permit the communication device to change the password.
NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR SERVER, SERVER, AND METHOD EXECUTED BY SERVER
A server may receive, from a terminal device, a change instruction for changing a password of a communication device different from the server and the terminal device. The server may, in a case where the change instruction is received from the terminal device, send first authentication information to the terminal device. The first authentication information may be inputted to the communication device by a user of the terminal device after the first authentication information has been sent to the terminal device. The server may, in a case where the first authentication information is inputted to the communication device, receive the first authentication information from the communication device. The server may, in a case where the first authentication information is received from the communication device, send a change permission notification to the communication device. The change permission notification may be a notification to permit the communication device to change the password.
Allocating requests
This disclosure describes, in part, techniques and systems for enabling new devices introduced into respective environments (“provisionee devices”) to be provisioned by existing devices in the respective environments (“provisioner devices”) in a manner in which the provisioning requests sent by the provisioner devices are allocated over time and, thus, do not overwhelm the provisioning system(s) at any given time.
Allocating requests
This disclosure describes, in part, techniques and systems for enabling new devices introduced into respective environments (“provisionee devices”) to be provisioned by existing devices in the respective environments (“provisioner devices”) in a manner in which the provisioning requests sent by the provisioner devices are allocated over time and, thus, do not overwhelm the provisioning system(s) at any given time.
Method and apparatus for third-party managed data transference and corroboration via tokenization
A protocol that is managed by a coordinating network element or third-party intermediary or peer network elements and utilizes tokens prohibits any subset of a union of the coordinating network element or third-party intermediary, if any, and a proper subset of the processors involved in token generation from substantively accessing underlying data. By one approach, processors utilize uniquely-held secrets. By one approach, an audit capability involves a plurality of processors. By one approach, the protocol enables data transference and/or corroboration. By one approach, transferred data is hosted independently of the coordinating network element. By one approach, the coordinating network element or third-party intermediary or a second requesting network element is at least partially blinded from access to tokens submitted by a first requesting network element. By one approach, a third-party intermediary uses a single- or consortium-sourced database. By one approach, network elements provisioned with tokens jointly manage the protocol.