G06F2221/2131

DATA RECOVERY FOR A COMPUTING DEVICE
20230050003 · 2023-02-16 ·

According to an aspect, a method for accessing a computing device includes receiving, by the computing device, an authentication credential for recovery access to the computing device, the authentication credential being different from an authentication credential used to access encrypted data on the computing device, obtaining, in response to receipt of the authentication credential for recovery access, a first key portion stored on the computing device, transmitting, over a network, a request to receive a second key portion, receiving, over the network, a response that includes the second key portion, recovering a decryption key using the first key portion and the second key portion, and decrypting the encrypted data on the computing device using the decryption key.

METHOD FOR FORCIBLE PASSWORD CHANGE
20230008402 · 2023-01-12 ·

The present invention relates to a method for forcible password change, a server register a user data and a first key, the user signs into a mobile application program according to the user data and the first key. When the login key is different from the first key, and the number of sign-ins exceeds a threshold, the server will stop the user data from signing into the mobile application; the server generates a second key and sends a notification message; a confirmation event is executed to the notification message; after execution of the confirmation event the server allows the user data and the second key to be used to open the mobile application. This method enhances the security of the user account. When it is stolen or possibly stolen, the password is quickly changed and reconfirmed to prevent the account from increasing the loss of theft.

SENDING A PASSWORD TO A TERMINAL

A mechanism is provided for sending a password to a terminal. A password send request is received. The status of each of a plurality of terminals coupled to the information processing device via a network is acquired. On the basis of the acquired statuses, at least one item is selected from a group comprising the terminal serving as a destination for the password, the communication method with the terminal, or the method for inputting the password in the terminal. The password is then sent to the selected terminal via a network.

Automated network account transfers based on determined inactivity

Systems, devices, and methods for automating network account transfers based on predicted inactivity are disclosed. In one embodiment, the system comprises a mail server providing access to an email account of a user; a social graph monitor configured to: periodically query, over a network, a social graph associated with the user to retrieve at least one social network feed associated with the user, calculate a sentiment score for the social network feed based on parsing the social network feed using a natural language parser, and determining that a transfer condition has occurred if the sentiment score exceeds a pre-defined sentiment score threshold; and a condition processor configured to: transmit, via the mail server, a password reset request to a network application associated with the transfer condition, intercept an email from the network application, via the mail server, transmitted in response to the password reset request, forward, via the mail server, the email to a recipient associated with the transfer condition, determine that the recipient has reset a password associated with the network application, and forward, to the recipient via the mail server, subsequent emails from the network application.

AUTHENTICATION SYSTEM

In an example there is provided a method for initiating an auxiliary access protocol in an authentication session. The method comprises providing attestation data attesting to a cause of an outcome of an authentication attempt in an authentication session, accessing a policy to initiate an auxiliary access protocol, determining if the attestation data fulfils a criterion according to the policy and initiating the auxiliary access protocol on the basis of said determination.

Key recovery

Generating a private key recovery seed based on random words extracted from an input memory of a user and using the recovery seed to recover the private key. An input that is related to a specific memory of a user is received. The specific memory was previously entered and used to generate random words that are related to each other by being included in the specific memory. The random words are extracted from the received input. The random words are associated with a first private key recovery mechanism for recovering a private key. The random words are input into the first private key recovery mechanism to generate a recovery seed. The recovery seed is input into a second private key recovery mechanism. The second private key recovery mechanism generates a recovered private key upon performing a recovery operation on the private key recovery seed.

Systems and methods for dynamic flexible authentication in a cloud service
11544356 · 2023-01-03 · ·

Systems and methods for authenticating a user requesting access to a resource in a cloud-computing system. The methods comprise, by a resource service: receiving an access request for accessing a resource associated with the resource service from a computing device associated with a user, determining context information corresponding to the access request, and using the determined context information for identifying an authentication protocol for authenticating the user. The authentication protocol includes at least one authentication scheme. The methods further comprise generating an authentication challenge and transmitting the authentication challenge to the computing device. The authentication challenge includes an initial token and authentication parameters corresponding to the identified authentication protocol.

PROTECTED RESETTING OF AN IOT DEVICE
20220417749 · 2022-12-29 ·

A method reconfigures an IoT device which is connectable to a cloud backend. The method includes: storing an access code that is input locally in the cloud backend and storing the access code or check information formed on the basis thereof on the IoT device. The method further includes reconfiguring the IoT device, requesting the access code from the cloud backend, inputting the requested access code on a local configuration interface of the IoT device or on an input device connected to the local configuration interface of the IoT device, and comparing the input access code against the access code stored on the IoT device, or the check information formed on the basis thereof. The IoT device is enabled for reconfiguration upon a positive comparison of the input access code against the access code stored, or the check information formed on the basis thereof.

Transport related n-factor authentication

An example operation includes one or more of determining, via a transport, that a person seeks access to the transport, visually indicating, via the transport, an action for the person to perform, receiving, via the transport, the action and validating, via the transport, that the person is associated with the transport, based on the receiving.

METHODS AND USER INTERFACES FOR ACCOUNT RECOVERY
20220391057 · 2022-12-08 ·

The present disclosure generally relates to account recovery. An example method includes, at a computer system in communication with a display generation component and one or more input devices: performing a recovery contact set up process including providing a notification to a contact; after performing the recovery contact set up process, receiving, via the one or more input devices, a request to initiate an account recovery process; in response to the request to initiate the account recovery process and without providing a request to the contact, displaying, via the display generation component, a recovery code interface for receiving a set of recovery credentials; while displaying of the recovery code interface, receiving the set of recovery credentials; in accordance with a determination that the recovery credentials are valid, performing a recovery function; and in accordance with a determination that the recovery credentials are not valid, forgoing performing the recovery function.