G06F2221/2139

SYSTEMS AND METHODS FOR CONTINUOUS USER AUTHENTICATION
20230052407 · 2023-02-16 ·

A computer device configured to passively authenticate a user includes a memory device including a user profile, and at least one processor coupled to the memory device. The at least one processor is programmed to execute a passive authentication system programmed to receive an indication that the user successfully performed an active authentication by interacting with the computing device, and set an authentication state of the user as authenticated in response to the successful active authentication. The passive authentication system is further programmed to receive a first plurality of interaction data indicative of one or more interactions between the user and the computer device, the one or more interactions performed after the indication of the successful active authentication; compare the one or more interactions to the user profile; and update the authentication state of the user based on the comparison.

Wearable device having high security and stable blood pressure detection
11580205 · 2023-02-14 · ·

A wearable device including a skin sensor and a processor is provided. The processor is configured to receive an authentication data for authenticating a user when a wearing state of the wearable device is adjacent to a skin surface of the user, execute a predetermined function in response to a request when the authentication data matches a pre-stored data and the skin sensor determines that the wearable device does not leave the skin surface after the authentication data is received, and reject or ignore the request when the skin sensor determines that the wearable device leaves the skin surface before the predetermined function is executed. The processor further calculates blood pressures according to PPG signals detected by a PPG sensor of the skin sensor.

Protection of and access to data on computing devices

Techniques for changing the presentation of information on a user interface based on presence are described. In an example, a computer system determines, based on an image sensor associated with the system, a first presence of a first user relative to a computing device. The computer system also determines an identifier of the first user. The identifier is associated with operating the computing device. The operating comprises a presentation of the user interface by the computing device. The computer system also determines, based on the image sensor, a second presence of a second person relative to the computing device. The computer system causes an update to the user interface based on the second presence.

METHOD AND SYSTEM FOR PROVIDING A BRAIN COMPUTER INTERFACE
20180012009 · 2018-01-11 ·

A method for providing a brain computer interface that includes detecting a neural signal of a user in response to a calibration session having a time-locked component and a spontaneous component; generating a user-specific calibration model based on the neural signal; prompting the user to undergo a verification session, the verification session having a time-locked component and a spontaneous component; detecting a neural signal contemporaneously with delivery of the verification session; generating an output of the user-specific calibration model from the neural signal; based upon a comparison operation between processed outputs, determining an authentication status of the user; and performing an authenticated action.

SYSTEM AND METHOD FOR DYNAMIC MULTI-FACTOR AUTHENTICATION
20230023944 · 2023-01-26 ·

Systems and methods for authenticating users are described herein. One or more inputs including of biometric data, physical trait data, and other data sources may be collected passively when an individual is present in a space. A confidence ratio associated with one or more of the collected inputs may be determined. One or more of the determined confidence ratios may be evaluated together to determine a final confidence ratio for a user, on which an authentication decision is based. An access level may be selected from a plurality of access levels with different access privileges based on the determined confidence ratio. Authentication may be continuous or ongoing.

SYSTEM AND METHODS FOR CLAIMING PROMOTIONAL REWARDS USING A REWARD WHEEL
20230021327 · 2023-01-26 ·

A system and method for delivering promotional rewards to a customer mobile device comprising a promotional reward wheel, a media server, and messaging application operating on the customer's mobile device. A customer interacts with the promotional reward wheel and the system captures that interaction and responsive to the promotional reward that was won by the interaction, generates a message on the customer's mobile device with a means to claim the reward by sending the generated message to the appropriate message endpoint.

PERFORMANCE OF DIFFERENT ACTIONS AT DEVICE BASED ON SUCCESS OR FAILURE OF SUBSEQUENT AUTHENTICATION WITHIN THRESHOLD TIME AFTER REPEATED AUTHENTICATION FAILS

In one aspect, a device may include at least one processor and storage accessible to the processor. The storage may include instructions executable by the processor to identify a threshold amount of time related to authentication failure based on an activity for which the device is currently being used and at least one method of authentication to be used for authenticating a user while the user performs the activity. The instructions may also be executable to take at least a first action based on an interruption that prevents repeated authentication not exceeding the threshold amount of time, and to take at least a second action based on successful authentication resuming subsequent to the interruption but within the threshold amount of time. The instructions may also be executable to take at least a third action based on the interruption exceeding the threshold amount of time.

Automatic device zeroization

Systems, apparatuses, and methods are described for zeroization of a computing device based on biometric information and vitality information. A computing device may store information associated with a user. The computing device may request biometric information and vitality information from one or more sensing devices. The computing device may determine, based on the requested biometric information and the requested vitality information, whether to zeroize the computing device.

Evaluating effectiveness of security controls in enterprise networks using graph values

Implementations are directed to an agile security platform for enterprise-wide cyber-security and performing actions of receiving, from an agile security platform, analytical attack graph (AAG) data representative of one or more AAGs, each AAG representing one or more lateral paths within an enterprise network for reaching a target asset from one or more assets within the enterprise network, determining, for each instance of a plurality of instances of the AAG, a graph value representing a measure of hackability of the enterprise network at respective times, providing a profile of the enterprise network based on a set of graph values determined for instances of the AAG, the profile representing changes in graph values over time, determining an effectiveness of one or more security controls based on the profile, and selectively executing one or more remedial actions in response to the effectiveness.

Multi-factor authentication for access control using a wearable device
11693941 · 2023-07-04 ·

A system and method for providing multi-factor authentication for access through a door, but without the user having to repeat a physical act of providing authentication every time that the door is opened, wherein the first time through the door, multi-factor authentication is provided to the access control system, and wherein each subsequent access through the door, multi-factor authentication is performed automatically and without intervention of the user as long as the user has a wearable device providing at least one factor of the multi-factor authentication, and the user has not removed the wearable device since the multi-factor authentication was last provided to the access control system.