Authenticating an entity
    11.
    发明授权

    公开(公告)号:US09781129B1

    公开(公告)日:2017-10-03

    申请号:US13536978

    申请日:2012-06-28

    IPC分类号: H04L29/06

    摘要: There is disclosed a method and system for use in authenticating an entity. An authentication request is received from the entity. An input signal is received from a communications device associated with the entity. The input signal comprises the current location of the communications device. The current location of the communications device is derived from the input signal. Based on the current location of the communications device, an event is detected at substantially the same location as the current location of the communications device. An analysis is performed between the current location of the communications device and the event. An authentication result is generated based on the analysis between the current location of the communications device and the event. The authentication result can be used for authenticating the entity.

    Using mock tokens to protect against malicious activity
    12.
    发明授权
    Using mock tokens to protect against malicious activity 有权
    使用模拟令牌来防范恶意活动

    公开(公告)号:US09516059B1

    公开(公告)日:2016-12-06

    申请号:US13170732

    申请日:2011-06-28

    IPC分类号: G06F21/55 H04L29/06 H04L9/32

    摘要: A technique provides protection against malicious activity. The technique involves providing a mock token to fraudster equipment. The mock token appears to be a legitimate user token that identifies a legitimate user (e.g., an actual user token, a token seed, etc.). The technique further involves receiving, from the fraudster equipment, an authentication request which uses the mock token and, in response to receiving the authentication request which uses the mock token from the fraudster equipment, performing a set of authentication server operations to protect against future activity by the fraudster equipment (e.g., deny access to the fraudster equipment, acquire specific information about the fraudster equipment, output a message to subscribers of an eFraud network, and so on).

    摘要翻译: 一种技术提供了防止恶意活动的保护。 该技术涉及向欺诈设备提供模拟令牌。 模拟令牌似乎是标识合法用户(例如,实际用户令牌,令牌种子等)的合法用户令牌。 该技术还涉及从欺诈设备接收使用模拟令牌的认证请求,并且响应于从欺诈设备接收使用模拟令牌的认证请求,执行一组认证服务器操作以防止将来的活动 通过欺诈设备(例如,拒绝访问欺诈设备,获取关于欺诈设备的具体信息,向eFraud网络的用户输出消息等)。

    Assessing risk for third-party data collectors
    13.
    发明授权
    Assessing risk for third-party data collectors 有权
    评估第三方数据收集者的风险

    公开(公告)号:US09230066B1

    公开(公告)日:2016-01-05

    申请号:US13534873

    申请日:2012-06-27

    IPC分类号: H04L29/00 G06F21/00

    摘要: An improved technique authenticates a user based on an ability to corroborate previous transaction data sent by a user device. Along these lines, the improved technique makes use of an independent information source for verifying the accuracy of previous transaction data obtained by a given collector. For example, when a collector of location data is a GPS unit of a cell phone, an independent information source may be a cell tower closest to the cell phone at the time of the transaction. While location data provided by the cell tower may not be as precise as that provided by the GPS unit, such data is useful for corroborating the location data from the GPS unit. In this scenario, if the data provided by the cell tower fails to corroborate that provided by the GPS unit, then the GPS unit adds significant risk to authenticating the user.

    摘要翻译: 改进的技术基于确定用户设备发送的先前交易数据的能力来认证用户。 沿着这些方式,改进的技术使用独立的信息源来验证给定收集器获得的先前交易数据的准确性。 例如,当位置数据的收集器是手机的GPS单元时,独立的信息源可以是在交易时最靠近手机的信元塔。 虽然由单元塔提供的位置数据可能不如GPS单元提供的位置数据那样精确,但是这样的数据对于确认来自GPS单元的位置数据是有用的。 在这种情况下,如果单元塔提供的数据未能证实由GPS单元提供的数据,则GPS单元增加了验证用户的重大风险。

    Techniques for authenticating a user with heightened security
    14.
    发明授权
    Techniques for authenticating a user with heightened security 有权
    用于认证具有较高安全性的用户的技术

    公开(公告)号:US09032490B1

    公开(公告)日:2015-05-12

    申请号:US13611941

    申请日:2012-09-12

    摘要: A method performed by a computing device is described. The method includes (a) receiving an authentication request from an application server seeking to authenticate a user for access to a service provided by the application server, (b) communicating with a first authentication server to obtain a first authentication of the user, (c) communicating with a second authentication server to obtain a second authentication of the user, the second authentication server being distinct from the first authentication server and the second authentication being of a type distinct from the first authentication, (d) rejecting the authentication request if and only if one or both of the first authentication and the second authentication is negative, and (e) upon rejecting the authentication request, sending a rejection message to the application server without informing the application server whether the first authentication or the second authentication was negative.

    摘要翻译: 描述由计算设备执行的方法。 该方法包括:(a)从应用服务器接收认证请求,寻求认证用户访问由应用服务器提供的服务,(b)与第一认证服务器通信以获得用户的第一认证,(c )与第二认证服务器通信以获得用户的第二认证,所述第二认证服务器与所述第一认证服务器不同,并且所述第二认证是与所述第一认证不同的类型,(d)拒绝所述认证请求, 仅当第一认证和第二认证中的一个或两个为否定时,以及(e)拒绝认证请求后,向应用服务器发送拒绝消息,而不通知应用服务器第一认证或第二认证是否为负。

    Brokering multiple authentications through a single proxy
    15.
    发明授权
    Brokering multiple authentications through a single proxy 有权
    通过单个代理来代理多个身份验证

    公开(公告)号:US08949953B1

    公开(公告)日:2015-02-03

    申请号:US13611919

    申请日:2012-09-12

    IPC分类号: H04L29/06

    CPC分类号: H04L63/08

    摘要: A method includes (a) receiving, from an application server, a login message for a user, the login message including a user credential for a credential-based authentication (CBA), (b) forwarding the user credential to a CBA server for the CBA, (c) in response, receiving, an authentication decision message from the CBA server, (d) sending decision information from the authentication decision message received from the CBA server to a risk-based authentication (RBA) server, the RBA server being distinct from the CBA server, the decision information to be used by the RBA server in performing RBA authentication decisions, (e) if the authentication decision message is positive, then sending a challenge message to the application server to initiate RBA to be performed by the RBA server supplementary to the CBA, and (f) if the authentication decision message is negative, then sending a rejection message to the application server.

    摘要翻译: 一种方法包括:(a)从应用服务器接收用户的登录消息,所述登录消息包括用于基于凭证的认证(CBA)的用户凭证,(b)将所述用户证书转发到CBA服务器以用于 CBA,(c)作为响应,从CBA服务器接收认证决定消息,(d)从CBA服务器接收到的认证决定消息发送决策信息给基于风险的认证(RBA)服务器,RBA服务器为 与CBA服务器不同的是,RBA服务器在执行RBA认证决策时要使用的决策信息,(e)如果认证决定消息为肯定的,则向应用服务器发送质询消息以启动要由 补充CBA的RBA服务器,以及(f)如果认证决定消息为否定,则向应用服务器发送拒绝消息。

    Authentication based on a current location of a communications device associated with an entity
    16.
    发明授权
    Authentication based on a current location of a communications device associated with an entity 有权
    基于与实体相关联的通信设备的当前位置的认证

    公开(公告)号:US08904496B1

    公开(公告)日:2014-12-02

    申请号:US13435951

    申请日:2012-03-30

    IPC分类号: G06F21/00 G06F21/44

    摘要: There is disclosed a method and system for use in authenticating an entity in connection with a computerized resource. An authentication request is received from entity for access to computerized resource. An input signal is received from a communications device associated with entity. The input signal comprises current location of communications device. The current location of communications device is derived from input signal. A location history in connection with communications device is captured. The location history comprises a record of discrete locations visited by communications device over a period of time. An analysis is performed between current location of the communications device and location history in connection with communications device. An authentication result is generated based on analysis between current location of communications device and location history in connection with communications device. The authentication result can be used for authenticating entity.

    摘要翻译: 公开了一种用于认证与计算机资源有关的实体的方法和系统。 从实体接收到对计算机资源的访问的认证请求。 从与实体相关联的通信设备接收输入信号。 输入信号包括通信设备的当前位置。 通信设备的当前位置来源于输入信号。 捕获与通信设备相关的位置历史记录。 位置历史包括通信设备在一段时间内访问的离散位置的记录。 在通信设备的当前位置和与通信设备相关的位置历史之间进行分析。 基于通信设备的当前位置和与通信设备相关的位置历史之间的分析生成认证结果。 验证结果可用于认证实体。

    Controlling access to a computerized resource based on authentication using pulse data
    17.
    发明授权
    Controlling access to a computerized resource based on authentication using pulse data 有权
    基于使用脉冲数据的认证来控制对计算机资源的访问

    公开(公告)号:US08902045B1

    公开(公告)日:2014-12-02

    申请号:US13336573

    申请日:2011-12-23

    IPC分类号: G08B21/00

    摘要: A technique performs an authentication operation using pulse and facial data from a user. The technique involves obtaining current pulse data from a user, and performing a comparison between the current pulse data from the user and expected pulse data for the user. The technique further involves generating an authentication result based on the comparison between the current pulse data and the expected pulse data. The authentication result may control user access to a computerized resource. Since such a technique uses pulse data, a perpetrator cannot simply submit a static image of a subject's face to circumvent the authentication process. In some arrangements, the technique involves obtaining videos of human faces and deriving cardiac pulse rates from the videos. For such arrangements, a standard webcam can be used to capture the videos. Moreover, such techniques are capable of factoring in circadian rhythms and/or aging adjustments to detect and thwart video replay attacks.

    摘要翻译: 一种技术使用来自用户的脉冲和面部数据进行认证操作。 该技术涉及从用户获取当前脉冲数据,并且执行来自用户的当前脉冲数据与用户的预期脉冲数据之间的比较。 该技术还涉及基于当前脉冲数据与预期脉冲数据之间的比较产生认证结果。 认证结果可以控制用户对计算机资源的访问。 由于这种技术使用脉冲数据,所以犯罪者不能简单地提交被摄体脸部的静态图像以绕过认证过程。 在某些安排中,该技术涉及从视频获得人脸视频和导出心脏脉搏率。 对于这样的安排,可以使用标准网络摄像头来捕获视频。 此外,这些技术能够考虑昼夜节奏和/或老化调整以检测和阻止视频重播攻击。

    Authenticating using organization based information
    18.
    发明授权
    Authenticating using organization based information 有权
    验证使用基于组织的信息

    公开(公告)号:US08856954B1

    公开(公告)日:2014-10-07

    申请号:US12980567

    申请日:2010-12-29

    IPC分类号: G06F21/00

    CPC分类号: G06F21/31

    摘要: A method is used in authenticating using organization based information. Organization based information is analyzed for information that is suitable for use in authenticating a user. The organization based information includes employee-used information. A question is derived from the organization based information. Based on the question, a process used to authenticate a user is executed.

    摘要翻译: 使用基于组织的信息进行身份验证的方法。 分析适合用于认证用户的信息的基于组织的信息。 基于组织的信息包括员工使用的信息。 一个问题来源于基于组织的信息。 基于该问题,执行用于认证用户的过程。

    Ordering of event records in an electronic system for forensic analysis
    19.
    发明授权
    Ordering of event records in an electronic system for forensic analysis 有权
    在电子系统中订购事件记录进行法医分析

    公开(公告)号:US08825848B1

    公开(公告)日:2014-09-02

    申请号:US13424955

    申请日:2012-03-20

    IPC分类号: G06F15/173

    摘要: An improved technique for logging events in an electronic system for forensic analysis includes receiving event records by a recording unit from different forensic agents of the electronic system and applying timing information included within the event records to resequence the event records in the recording unit in a more accurate order. In some examples, the timing information includes a vector clock established among the agents of the electronic system for storing sequences of events. The vector clock provides sequence information about particular events occurring among the forensic agents, which is applied to correct the order of reported event records. In other examples, the timing information includes timestamps published to the agents from a common timestamp server. In yet other examples, the timing information includes timestamps of the devices on which the agents are running, or any combination of the foregoing examples of timing information.

    摘要翻译: 用于在电子系统中记录事件的用于取证分析的改进技术包括:通过记录单元从电子系统的不同取证代理接收事件记录,并应用事件记录中包含的定时信息,以使记录单元中的事件记录更新 准确的订单。 在一些示例中,定时信息包括在用于存储事件序列的电子系统的代理之间建立的向量时钟。 向量时钟提供关于在法庭代理之间发生的特定事件的序列信息,其被应用于校正报告的事件记录的顺序。 在其他示例中,定时信息包括从公共时间戳服务器向代理发布的时间戳。 在其他示例中,定时信息包括代理正在其上运行的设备的时间戳,或上述定时信息示例的任何组合。

    Biometric authentication with smart mobile device
    20.
    发明授权
    Biometric authentication with smart mobile device 有权
    智能移动设备的生物识别认证

    公开(公告)号:US08752145B1

    公开(公告)日:2014-06-10

    申请号:US13341160

    申请日:2011-12-30

    IPC分类号: G06F21/00 G06F7/04

    摘要: An improved authentication technique employs a user's mobile device to obtain a picture of the user from which facial geometry is extracted and applied as part of an authentication operation of the user to the remote network. In some examples, a server stores facial geometry for different users along with associated PINs. By matching facial geometry of the user with facial geometry on the server, the user's PIN can be obtained, without the user ever having to register or remember the PIN.

    摘要翻译: 改进的认证技术采用用户的移动设备来获取用户的图片,从该用户的图片提取和应用面部几何被作为远程网络的用户的认证操作的一部分。 在一些示例中,服务器存储不同用户的面部几何以及关联的PIN。 通过将用户的面部几何与服务器上的面部几何相匹配,可以获得用户的PIN,而无需用户注册或记住PIN。