System, method, and device of authenticating a user based on selfie image or selfie video

    公开(公告)号:US11330012B2

    公开(公告)日:2022-05-10

    申请号:US17089846

    申请日:2020-11-05

    申请人: BioCatch Ltd.

    发明人: Avi Turgeman

    摘要: System, method, and device of detecting identity of a user and authenticating a user; as well as detecting a possible attacker or impostor, and differentiating among users of an electronic device or of a computerized service. A mobile or portable electronic device is utilized to capture a self-taken image or video of a user, which is utilized as a user-authentication factor. The accelerometer and gyroscope or device-orientation sensor of the mobile device, sense and measure spatial and physical device properties during, before or after the submission of the self-taken image or video. Based on such spatial and physical device properties, in combination with computer-vision analysis of the content shown in the self-taken image or video, the system determines liveness of the user and freshness of the submitted self-taken image or video, and differentiates between a legitimate user and an attacker.

    Device, system, and method of user authentication based on user-specific characteristics of task performance

    公开(公告)号:US11223619B2

    公开(公告)日:2022-01-11

    申请号:US16597860

    申请日:2019-10-10

    申请人: BioCatch Ltd.

    发明人: Avi Turgeman

    摘要: Devices, systems, and methods of detecting user identity, authenticating a user to a computerized service or to an electronic device, differentiating between users of a computerized service, and detecting possible attackers or possible fraudulent transactions. A method includes: generating a user authentication session that requires a user to enter a secret by performing a task; monitoring the user interactions during task performance; extracting a user-specific behavioral characteristic, and utilizing it as a factor in user authentication. The task requires the user to perform on-screen operations via a touch-screen or touchpad or mouse or other input unit of the electronic device, or to move in space or tilt in space the entirety of the electronic device in a way that causes inputting of the secret data-item.

    Method, device, and system of detecting mule accounts and accounts used for money laundering

    公开(公告)号:US11210674B2

    公开(公告)日:2021-12-28

    申请号:US16872381

    申请日:2020-05-12

    申请人: BIOCATCH LTD.

    摘要: Method, device, and system of detecting a mule bank account, or a bank account used for terror funding or money laundering. A method includes: monitoring interactions of a user with a computing device during online access with a banking account; and based on the monitoring, determining that the online banking account is utilized as a mule bank account to illegally receive and transfer money. The method takes into account one or more indicators, such as, utilization of a remote access channel, utilization of a virtual machine or a proxy server, unique behavior across multiple different account, temporal correlation among operations, detection of a set of operations that follow a pre-defined mule account playbook, detection of multiple incoming fund transfers from multiple countries that are followed by a single outgoing fund transfer to a different country, and other suitable indicators.

    System, device, and method of reinforcement for raised-floors and for equipment thereon

    公开(公告)号:US10883278B2

    公开(公告)日:2021-01-05

    申请号:US16466033

    申请日:2017-06-12

    IPC分类号: E04F15/024 E04B1/98

    摘要: System, device, and method of reinforcement for raised-floors and for equipment thereon. A system includes a vertical support member to fixedly connect to a top-tier of a raised-floor and to a bottom-tier of the raised floor. The vertical support member includes an internal rod surrounded by an external pipe. The internal rod and the external pipe are connected via a top-side cap and a bottom-side cap. A modular-length slanted support member is further connected to the vertical support member. The slanted support member is fixedly connected to the bottom-tier of the raised floor, or to another, neighboring, vertical support member.

    System, device, and method of adaptive network protection for managed internet-of-things services

    公开(公告)号:US10862911B2

    公开(公告)日:2020-12-08

    申请号:US16018076

    申请日:2018-06-26

    摘要: System, device, and method of adaptive network protection for managed Internet-of-Things (IoT) services. A network traffic monitoring unit monitors data traffic, operations-and-management traffic, and control messages, that relate to cellular communication between an IoT device and a core cellular network. An IoT grouping unit groups multiple IoT devices into a particular IoT group. A baseline behavior determination unit determines a Regular Baseline Cellular Communication Behavior (RBCCB) profile that characterizes the cellular communications that are outgoing from and incoming to each member of the particular IoT group. An outlier detector subsequently detects that a particular IoT device of that particular IoT group, exhibits cellular traffic characteristics that are abnormal relative to the RBCCB profile that was characterized for that particular IoT group. An enforcement actions generator is triggered to selectively perform one or more enforcement operations, notification operations, and quarantine operations.

    System, device, and method of deploying layer-3 transparent cloud-based proxy network element

    公开(公告)号:US10749798B2

    公开(公告)日:2020-08-18

    申请号:US16242020

    申请日:2019-01-08

    摘要: System, device, and method of deploying layer-3 transparent cloud-based proxy network element. A virtual network function is defined between a west-side router and an east-side router. A west-side interface receives east-bound traffic from a west-side Virtual LAN. East-bound queries from the west-bound router, are intercepted and responded to by the west-side interface, the response indicating the MAC address of the west-side router instead of the east-side router. The system enables the virtual network function to transparently intercept network traffic, and to selectively apply to such traffic one or more network functions or operations, prior to forwarding the traffic or a modified version thereof to the east-side router, in a Layer-3 transparent manner.