Patent classifications
H04L63/08
ENHANCED AUTHENTICATION FRAMEWORK USING MULTI-DIMENSIONAL HASHING
Systems, computer program products, and methods are described herein for enhanced authentication framework using multi-dimensional hashing. The present invention is configured to electronically receive, from a computing device of a user, a resource transfer request; retrieve, from an authentication database, a multi-dimensional hash for a first set of data files for the user and a user identification artifact; retrieve, from the computing device of the user, a second set of data files matching the user identification artifact; initiate an asynchronous hash processing engine on the second set of data files; generate, using the asynchronous hash processing engine, a multi-dimensional hash for the second set of data files; compare the multi-dimensional hash for the first set of data files with the multi-dimensional hash for the second set of data files to determine a match; and authorize the resource transfer request based on at least determining the match.
AUTHENTICATION APPARATUS AND METHOD AND NON-TRANSITORY COMPUTER READABLE MEDIUM
An authentication apparatus includes a processor configured to: obtain information on a first authentication technique used by a user when the user requests authentication for a first service; and output information for presenting an additional authentication screen to a device used by the user for authentication if the first authentication technique does not satisfy a predetermined condition set for the first service, the additional authentication screen being used for requesting the user to perform additional authentication by using a second authentication technique different from the first authentication technique.
SYSTEMS AND METHODS FOR IDENTIFYING ACCESS ANOMALIES USING NETWORK GRAPHS
In some instances, the disclosure provides a method for identifying access anomalies using network graphs. The method comprises obtaining access data for an entity, generating a network graph baseline profile based on the plurality of data elements, generating a network graph current profile based on the plurality of data elements, generating comparison data based on comparing the plurality of baseline network graphs with the one or more current network graphs and comparing the plurality of baseline nodes and the plurality of baseline edges with the plurality of current nodes and the plurality of current edges, determining, based on the comparison data, anomaly data comprising one or more flagged network accesses to the enterprise system, and providing the anomaly data indicating the flagged network accesses to an authentication system.
PRIVILEGED ELECTRONIC COMMUNICATIONS WITH INMATES
Systems and methods for providing secure communication between an inmate and an outside user are disclosed. In various aspects, account information of both the user and the inmate is stored. A message transmission is received from a first device that includes a header portion and an encrypted payload portion. The system verifies that confidential communication between the inmate and the outside user is permitted based on the header portion and the stored account information. Once verified, the message is transmitted to a second device without decrypting the payload portion of the message.
TECHNIQUES TO PROVIDE SENSITIVE INFORMATION OVER A VOICE CONNECTION
Embodiments may generally be directed components and techniques to detect a request to provide banking account information over a one or more voice connections, identify the requested banking account information, and generate speech data representing the banking account information requested. In embodiments further include communicating the speech data to another device.
SYSTEMS AND METHODS FOR INTELLIGENT STEP-UP FOR ACCESS CONTROL SYSTEMS
Some embodiments may provide systems, methods and computer program code to method to facilitate an interaction involving a user which include determining that a user authentication is required to complete the interaction, identifying at least a first verified device associated with the user, and transmitting an authentication message to the at least first verified device.
DISPLAY SYSTEM, DISPLAY METHOD, AND RECORDING MEDIUM
In a display system according to the present disclosure, a server device includes an authentication processor that authenticates a user for use of a file, based on authentication information of the user input at a user terminal and an access information generator that generates first access information for accessing the file if the user is authenticated by the authentication processor for use of the file, and a display device includes a file acquirer that acquires the file from the server device, based on the first access information generated by the access information generator, and a display processor that displays the file acquired by the file acquirer, on the display.
EQUIPMENT SERVER, DEVICE SERVER, AND COMMUNICATION SYSTEM
There are provided a communication system in which a piece of equipment in a facility and a device working in the facility cooperate easily with each other, an equipment server and a device server in the communication system, and a data structure which is to be communicated in the communication system. In a communication system (1), a message is used for control of a control target by being communicated in a common format between each of equipment servers (7) and each of object servers (9). The control target is a piece (3) of building equipment as a piece of equipment or an object (4) working in a building (2) as a facility.
Audio Output Method and Terminal Device
This application provides an audio output method and a terminal device. The method helps to reduce the operation complexity of a user, improve a degree of intelligence of the terminal device, and finally improve the user experience. The method includes that: a second terminal device may send an audio output request to a first terminal device, and a user may operate the first terminal device or an audio output device connected to the first terminal device, to trigger the second terminal device to obtain audio data corresponding to the audio output request. When the audio output device is a wireless audio output device, the second terminal device may establish a communication link with the wireless audio output device, to control the wireless audio output device to output a first audio signal corresponding to the audio data; and when the audio output device is a wired audio output device, the first terminal device may obtain audio data from the second terminal device, to control the audio output device connected to the first terminal device to output a first audio signal corresponding to the audio data.
VXLAN ACCESS AUTHENTICATION METHOD AND VTEP DEVICE
A VXLAN access authentication method includes: An authentication point device receives a VXLAN authentication packet, where the VXLAN authentication packet is a VXLAN packet. The VXLAN authentication packet includes a VXLAN header and an authentication request sent by a terminal, the VXLAN header includes a first VNI, and the authentication request includes an authentication credential. The authentication point device obtains permission of the terminal or a second VNI based on the authentication credential. The permission of the terminal corresponds to the second VNI. The authentication point device sends the permission of the terminal or the second VNI to a control point device, where the control point device is a device that encapsulates the authentication request into the VXLAN authentication packet. In this application, VXLAN access authentication is performed on an overlay network, so that configuration complexity can be reduced when a VXLAN access authentication mode is modified or created.