Electronic system for generation of authentication tokens using biometric data

    公开(公告)号:US11792009B2

    公开(公告)日:2023-10-17

    申请号:US17347159

    申请日:2021-06-14

    CPC classification number: H04L9/3213 H04L9/14 H04L9/3231

    Abstract: Embodiments of the invention are directed to systems, methods, and computer program products for generation of dynamic authentication tokens for use in system-to-system transaction authorization and user identity verification. The system utilizes user biometric data to generate unique authentication tokens which are customized to a particular user. Furthermore, the system rotates not only the encryption algorithms used, but also the datasets being encrypted in order to provide a high level of security such that even if a user's biometric data was compromised, it would be highly unlikely that an attacker would be able to recreate the authentication token stemming from said biometric data at any given point in time. The system eliminates the need for user-provided authentication credentials and provides a more secure and more efficient method of authenticating data exchange between multiple systems or applications.

    SYSTEM AND METHOD PROVIDING AN ELECTRONIC CENTRALIZED GATEWAY SWITCH TO A PLURALITY OF NETWORK DEVICES

    公开(公告)号:US20230196361A1

    公开(公告)日:2023-06-22

    申请号:US17553130

    申请日:2021-12-16

    CPC classification number: G06Q20/4014 G06Q20/403 G06Q20/405 G06Q20/4015

    Abstract: Systems, methods, and computer program products are provided for providing an electronic centralized gateway switch to a plurality of network devices. The method includes assigning a resource value to a resource received from a sending user. The resource value corresponds to a value of the resource received. The method also includes receiving a resource transfer information. The resource transfer information includes intended transfer target information corresponding to an intended transfer target account associated with an intended transfer target. The intended transfer target account is associated with one of a plurality of resource entities. The method further includes connecting to the resource entity associated with the intended transfer target account based on the resource entity associated with the intended transfer target account. The method still further includes causing a transmission of the resource value to the intended transfer target account at the resource entity associated with the intended transfer target account.

    SCHEME EVALUATION AUTHENTICATION SYSTEM

    公开(公告)号:US20230045301A1

    公开(公告)日:2023-02-09

    申请号:US17397484

    申请日:2021-08-09

    Abstract: Embodiments of the invention are directed to systems, methods, and computer program products for a scheme evaluation authentication system to evaluate user action and machine learned pattern recognition for misappropriation activity prevention. In this way, bot and token deployment is utilized for identification of user actions to generate a user idiosyncrasy database. Using the database, the system creates a real-time scheme evaluation authentication for user authentication upon user attempted authentications. As such, a user may by authenticate irrespective of user inputs, but instead based on a match of user actions at the authentication location in real-time compared to the idiosyncrasy database.

    BIOMETRIC AUTHENTICATION BASED ON BEHAVIORAL ANALYSIS

    公开(公告)号:US20230033954A1

    公开(公告)日:2023-02-02

    申请号:US17388592

    申请日:2021-07-29

    Abstract: A heightened level of security is provided in a computing platform by monitoring usage of applications and/or services residing on or accessible to a computing platform to determine abnormal usage patterns. In response to determining an abnormal pattern of usage, the user is required to provide biometric data, such as voice data, facial feature data, fingerprint data or the like, as a means of authenticating the user. The abnormal pattern of usage may be determined dynamically by comparing current usage patterns to known user baseline usage patterns. Alternatively, the abnormal pattern of usage is predefined, such as the resetting of passwords in a predefined number of applications and/or services over a predefined period of time.

Patent Agency Ranking