Patent classifications
H04L63/0861
ENHANCED AUTHENTICATION FRAMEWORK USING MULTI-DIMENSIONAL HASHING
Systems, computer program products, and methods are described herein for enhanced authentication framework using multi-dimensional hashing. The present invention is configured to electronically receive, from a computing device of a user, a resource transfer request; retrieve, from an authentication database, a multi-dimensional hash for a first set of data files for the user and a user identification artifact; retrieve, from the computing device of the user, a second set of data files matching the user identification artifact; initiate an asynchronous hash processing engine on the second set of data files; generate, using the asynchronous hash processing engine, a multi-dimensional hash for the second set of data files; compare the multi-dimensional hash for the first set of data files with the multi-dimensional hash for the second set of data files to determine a match; and authorize the resource transfer request based on at least determining the match.
COMPUTER-IMPLEMENTED DETECTION OF ANOMALOUS TELEPHONE CALLS
Computer-implemented detection of anomalous telephone calls, for example detection of interconnect bypass fraud, is disclosed. A telephone call associated with user devices is analyzed remote from the user devices. A first set of multiple features, for example Mel Frequency Cepstral Coefficients, is derived from a call audio stream. The first set is converted to an embedding vector, for example via a model based on a Universal Background Model comprising a Gaussian Mixture Model, which model is preferably configured based on a training plurality of first sets of multiple features derived form a corresponding training plurality of audio streams. Occurrence, or probability of occurrence, of an anomalous telephone call is determined based on the embedding vector, for example via a back-end classifier, such as a Gaussian Backend Model, which classifier is preferably configured based on labels associated with the training plurality of audio streams.
COMPUTER-IMPLEMENTED USER IDENTITY VERIFICATION METHOD
A computer-implemented method of verifying a user's identity comprising the steps of receiving biometric user data, personalized user data, and unique phone data of a verifying user from the verifying user's electronic computing device 102, compiling the biometric user data, personalized user data, and unique phone data of a verifying user into a single user identity data file, encrypting the single user identity data file and generating a data decryption key, and segregating the single user identity data file into a plurality of encrypted segregated user identity data files each independently stored on a first administrator server and a second administrator server, wherein the plurality of encrypted segregated user identity data files may only be aggregated and decrypted upon providing secondary biometric user data, personalized user data, and unique phone data which matches the original biometric user data, personalized user data, and unique phone data of the verifying user.
INFORMATION PROCESSING METHOD AND APPARATUS BASED ON FACE RECOGNITION, STORAGE MEDIUM, AND TERMINAL
A method includes: in response to detecting a communication connection between the electronic device and the user equipment, obtaining a user instruction transmitted to the user equipment, the user instruction including at least one preset parameter for setting an interface feature of a target logical interface on the electronic device. The target logical interface is used for verifying an identity of a user. The method includes generating the target logical interface, by setting the interface feature based on the user instruction on the electronic device; obtaining verification information of a user; collecting a face image of the current user through the target logical interface; and verifying an identity of the current user based on the face image and the verification information.
SECURE REMOTE DATA SUBMISSION FOR IVR SYSTEMS
Apparatus and methods for enhancing security of an authentication process of a caller that initiated a call in an Interactive Voice Response (“IVR”) system are provided. The methods may include routing the call through the IVR system to a headset. After the routing, the methods may include retrieving data associated with the caller. In response to the retrieved data meeting one or more predetermined conditions, a graphical user interface of an agent computer paired to the headset may display a plurality of validation information for validating the caller. Selection by the agent of validation information may trigger methods for transmitting a request to the caller, via a caller mobile phone, to input the validation information selected by the agent. The methods may additionally include authenticating the caller based at least in part on the information input into the mobile phone.
Mobile Legal Counsel System and Method
An on-demand mobile lawyer method includes receiving a live consultation request from a user, automatically receiving a live-stream of video images of the user and surroundings and storing the video images, automatically searching a plurality of records associated with a plurality of lawyers stored in a remote database, automatically identifying at least one lawyer licensed in a jurisdiction that corresponds to a current location of the user, automatically transmitting at least one notification to the identified at least one lawyer, live-streaming captured video images of the user for viewing by the identified at least one lawyer, automatically receiving and storing live-streaming video images of the identified at least one lawyer in the remote database, and automatically transmitting the live-streaming video images of the identified at least one lawyer to be displayed on a display screen viewable by the user.
Distributed identity system with local identification
A distributed identity system with local identification includes an identity system device and at least one local electronic device. The local electronic device locally stores at least a portion of identity information and the biometric identification information stored by the identity system device. The local electronic device determines identities by comparing received digital representations of biometrics with locally stored biometric identification information, performs actions using locally stored identity information included in the local copy, and uploads data related to the actions to the identity system device upon occurrence of an upload condition.
Systems and methods of application single sign on
A method and apparatus of a device that authorizes a device for a service is described. In an exemplary embodiment, the device intercepts a request for a web page from a web browser executing on the device, wherein the request includes an indication associated with an authorization request for the service and the web page provides the service. In addition, the device presents an authorization user interface on the device. The device further performs a local authorization using a set of user credentials entered via the authorization user interface. The device additionally performs a server authorization with a server. Furthermore, the device redirects the web browser to the requested web page, wherein the web browser is authorized for the service provided by the web page.
Method and apparatus for accessing authentication credentials within a credential vault
A method at a computing device, the method including detecting, at the computing device, a trigger that authentication is pending for an application or service; indicating a state of a credential vault via a user interface of the computing device; and when the credential vault is in a locked state, activating an authentication mechanism for the credential vault without changing focus on the user interface for the application or service.
Vehicle and control method thereof
A personal mobility sharing system includes: a personal mobility, a server, an owner terminal and a member terminal connected through a network, and the server is configured to register a device information of the personal mobility, receive a sharing setting information from the owner terminal, set a sharing mode of the personal mobility based on the sharing setting information, receive an authentication request from the member terminal and transmit an unlock signal to the personal mobility when the authentication request includes pre-registered authentication information.