Sensor-based human authorization evaluation

    公开(公告)号:US11451553B2

    公开(公告)日:2022-09-20

    申请号:US17006566

    申请日:2020-08-28

    摘要: A resource-access management system detects whether a user is authorized to access resources. The system may include a user device being configured to include a sensor that detects sensor data associated with the user. Further, the system includes a client qualification engine that determines whether or not a client is authorized to access the resources by comparing the sensor data with a plurality of patterns for evaluating whether or not the user is an authorized user. User scores are generated based on the compared sensor data and the plurality of patterns. Further, a composite score corresponding to the user is generated using the sensor data, plurality of patterns, and one or more additional criteria. Whether the user is granted access to the resources, presented with unauthorized user tests, or blocked from access to the resources depends on the composite score and threshold values.

    SENSOR-BASED HUMAN AUTHORIZATION EVALUATION
    2.
    发明申请

    公开(公告)号:US20190273741A1

    公开(公告)日:2019-09-05

    申请号:US16298453

    申请日:2019-03-11

    摘要: A resource-access management system detects whether a user is authorized to access resources. The system may include a user device being configured to include a sensor that detects sensor data associated with the user. Further, the system includes a client qualification engine that determines whether or not a client is authorized to access the resources by comparing the sensor data with a plurality of patterns for evaluating whether or not the user is an authorized user. User scores are generated based on the compared sensor data and the plurality of patterns. Further, a composite score corresponding to the user is generated using the sensor data, plurality of patterns, and one or more additional criteria. Whether the user is granted access to the resources, presented with unauthorized user tests, or blocked from access to the resources depends on the composite score and threshold values.

    Sensor-based human authorization evaluation

    公开(公告)号:US10230729B2

    公开(公告)日:2019-03-12

    申请号:US15830543

    申请日:2017-12-04

    摘要: A resource-access management system detects whether a user is authorized to access resources. The system may include a user device being configured to include a sensor that detects sensor data associated with the user. Further, the system includes a client qualification engine that determines whether or not a client is authorized to access the resources by comparing the sensor data with a plurality of patterns for evaluating whether or not the user is an authorized user. User scores are generated based on the compared sensor data and the plurality of patterns. Further, a composite score corresponding to the user is generated using the sensor data, plurality of patterns, and one or more additional criteria. Whether the user is granted access to the resources, presented with unauthorized user tests, or blocked from access to the resources depends on the composite score and threshold values.

    Systems and methods for scalable-factor authentication

    公开(公告)号:US11356447B2

    公开(公告)日:2022-06-07

    申请号:US16786318

    申请日:2020-02-10

    摘要: Authentication systems and methods can selectively authenticate a request to access a resource data store storing access rights associated with a user device. The systems and methods can scalably execute challenges workflows as part of the authentication process. For example, a request to access one or more access rights stored in the data store can be received from the user device. The user device can be authenticated using challenge workflows selected based on a device identifier of the user device. The selected challenge workflows can be executed to determine whether or not to grant access to the access rights stored in the resource data store.

    EVENT SATURATION NETWORKING
    8.
    发明申请

    公开(公告)号:US20210352149A1

    公开(公告)日:2021-11-11

    申请号:US17328886

    申请日:2021-05-24

    摘要: Systems and methods for selecting tiering protocols based on data transmissions over mesh networks within defined spatial areas can be provided. A mesh network can be established within a defined spatial area. Each network device within the mesh network can be a user device or a supernode. Further, a wireless communication link can be established between the user devices and supernodes. A plurality of tiered protocols for tiering data transmissions can be accessed. Data to be transmitted over the mesh network can be analyzed to determine which tiered protocol to select. Path data that identifies a routing path from the a user device to a supernode can be generated, and the data can be transmitted according to the path data.

    Systems and methods for scalable-factor authentication

    公开(公告)号:US10560455B2

    公开(公告)日:2020-02-11

    申请号:US16252164

    申请日:2019-01-18

    摘要: Authentication systems and methods can selectively authenticate a request to access a resource data store storing access rights associated with a user device. The systems and methods can scalably execute challenges workflows as part of the authentication process. For example, a request to access one or more access rights stored in the data store can be received from the user device. The user device can be authenticated using challenge workflows selected based on a device identifier of the user device. The selected challenge workflows can be executed to determine whether or not to grant access to the access rights stored in the resource data store.