H04L2463/082

NETWORK ACCESS ANOMALY DETECTION VIA GRAPH EMBEDDING

Disclosed is a scalable, graph-based approach to detecting anomalous accesses to resources in a computer network. Access events are represented as edges between resource nodes and accessing nodes (e.g., corresponding to users) in a bipartite graph, from which vector representations of the nodes that reflect the connections can be computed by graph embedding. For an access event of interest, an anomaly score may be computed based on dissimilarities, in terms of their embedding distances, between the associated accessing node and other accessing nodes that have accessed the same resource, and/or between the associated resource node and other resource nodes that have been accessed by the same accessing node.

AUTHENTICATION APPARATUS AND METHOD AND NON-TRANSITORY COMPUTER READABLE MEDIUM
20230046035 · 2023-02-16 · ·

An authentication apparatus includes a processor configured to: obtain information on a first authentication technique used by a user when the user requests authentication for a first service; and output information for presenting an additional authentication screen to a device used by the user for authentication if the first authentication technique does not satisfy a predetermined condition set for the first service, the additional authentication screen being used for requesting the user to perform additional authentication by using a second authentication technique different from the first authentication technique.

IMAGE PROCESSING SYSTEM USING AUTHENTICATION INFORMATION ACQUIRED THROUGH TWO-FACTOR AUTHENTICATION, METHOD FOR CONTROLLING IMAGE PROCESSING SYSTEM, AND STORAGE MEDIUM
20230050211 · 2023-02-16 ·

To control an image forming apparatus using a service on a network, an information terminal performs two-factor authentication and acquires authentication information through the two-factor authentication so that the image forming apparatus accesses the service.

System and method for detecting the user using a single one-time password
11582225 · 2023-02-14 · ·

An improved One Time Password (iOTP) is used in a two-factor authentication mechanism to decode a username, and the inherent security of the iOTP eliminates the need for a password. When the user is identified by the iOTP, a second challenge is sent. The second challenge may be confirmed by user biometrics or via a PIN code if the user's device does not support biometrics. Benefits of the subject invention include: (1) no username, which eliminates exposure to multiple domain attacks (i.e., attacks on other sites with the same username) that attempt to extract passwords from less secure sites (e.g., where a user used the same username and password across multiple sites); and (2) password-less access—the iOTP replaces both the username and password function, thereby eliminating the need for the user to manage multiple usernames and passwords.

Learned roving authentication profiles

Disclosed herein are systems and methods for determining learned associations between authentication credentials and network contextual data, such as may be utilized in a network that supports network roving. A mobile device attempts to rove to a visited network using authentication credentials associated with another network, based at least in part on first contextual information associated with the other network and second contextual information associated with the visited network indicating that the visited network is part of a common association of networks that supports roving internetworking between the networks of the common association.

INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD, AUTHENTICATION DEVICE AND AUTHENTICATION METHOD, AUTHENTICATION SYSTEM, AUTHENTICATION METHOD IN AUTHENTICATION SYSTEM, AND COMPUTER PROGRAM
20230043031 · 2023-02-09 ·

An information processing apparatus that performs multifactor and multistage authentication procedures is to be provided. An information processing apparatus includes: an authentication procedure processing unit that performs an authentication procedure on an external device, using a tamper-resistant secure element; and a control unit that controls a process for multistage authentication of the external device, the multistage authentication including the authentication procedure. The control unit controls a process of a second authentication procedure using the identification information about the secure element, the identification information being associated with the user account information. The control unit controls execution of the second authentication procedure during an operation in the login authentication procedure.

EMERGENCY REPORTING SYSTEM FOR VEHICLE, AND VEHICLE
20230041885 · 2023-02-09 ·

An emergency reporting system for a vehicle includes a server memory, an acquisition control processor, and first and second authentication processors. The server memory holds personalized emergency data regarding an occupant to be on board the vehicle or access data to the personalized emergency data. The acquisition control processor makes acquirable the personalized emergency data or the access data held in the server memory regarding the occupant on board the vehicle in which an emergency situation is detected by a detector of the vehicle, in a case where a server apparatus receives an emergency report from the vehicle in which the emergency situation is detected, and at least a combination of the occupant and the vehicle is authenticated by the second authentication processor.

OCCUPANT-DEPENDENT SETTING SYSTEM FOR VEHICLE, AND VEHICLE
20230043013 · 2023-02-09 · ·

An occupant-dependent setting system for a vehicle includes a setting processor, a server apparatus including a server memory, and first and second authentication processors. On the condition that the occupant is authenticated by the first authentication processor, the second authentication processor acquires, from the vehicle, data regarding the occupant and data regarding the vehicle, and authenticates a combination of the occupant and the vehicle. On the condition that the combination of the occupant and the vehicle is unauthenticatable by the data regarding the occupant and the data regarding the vehicle, the second authentication processor authenticates the combination of the occupant and the vehicle, by a combination of account data regarding the occupant and the vehicle. The account data is held by an occupant terminal of the occupant on board the vehicle to make access to the server apparatus.

APPARATUS AND METHODS FOR MULTIFACTOR AUTHENTICATION

Apparatus and methods for multifactor authentication using a smart mobile device are provided. The apparatus and methods may include an authentication engine on a server, a smart mobile device belonging to a user and a smartphone belonging to a user. The authentication engine may determine a location of the user, the user's smartphone, and the user's smart mobile device. When the smart mobile device is within a pre-determined distance to the user or the user's smartphone, the authentication engine may send an authentication request to the smart mobile device, or automatically authenticate the user.

Federated Machine Learning Computer System Architecture

Techniques are disclosed in which a computer system receives a transaction request and uses a federated machine learning model to analyze the transaction request. A server computer system may generate a federated machine learning model and distribute portions of the federated machine learning models to other components of the computer system including a user device and/or edge servers. In various embodiments, various components of the computer system apply transaction request evaluation factors to the portions of the federated machine learning model to generate scores. The server computer system uses the scores to determine a response to the transaction request.