-
公开(公告)号:US10430569B2
公开(公告)日:2019-10-01
申请号:US16184198
申请日:2018-11-08
摘要: Aspects of the disclosure relate to multicomputer processing and authentication of user data associated with telephone calls. A call security assessment computing platform may receive data associated with a telephone call made from a user computing device. Subsequently, the call security assessment computing platform may parse the received data to identify header information in a Session Initial Protocol (SIP) header. The platform then may analyze the header information to generate a call fingerprint for the telephone call. This call fingerprint may then be transmitted to one or more call authentication computing platforms, which return one or more call security responses that may further characterize security features of the telephone call. The call fingerprint and the call security responses may then be used to determine a call security score, which may be transmitted in a notification to a call handling system in order to adjust how the call is handled.
-
2.
公开(公告)号:US20190236265A1
公开(公告)日:2019-08-01
申请号:US15881033
申请日:2018-01-26
发明人: Rakesh Juyal , Michael Toth , Muniraju Jayaramaiah , Ashish Arora
摘要: Systems for dynamically authenticating users are provided. A system may receive a request to access functionality. In response to the received request, an authentication grid may be dynamically generated. The authentication grid may include a plurality of fields, each identifiable by a field identifier, and including one or more characters that may be used to authenticate a user. The authentication grid may be transmitted to a computing device of a user. A character for authentication may be identified by the system. In some arrangements, the system may generate a request for user input including a character appearing in the authentication grid. The user may identify the field and input the character appearing in the field. The system may receive the requested character and may compare it to the identified character for authentication. If the received character and the identified character match, functionality may be enabled. If a match does not exist, functionality may be disabled.
-
公开(公告)号:US10831878B2
公开(公告)日:2020-11-10
申请号:US15881033
申请日:2018-01-26
发明人: Rakesh Juyal , Michael Toth , Muniraju Jayaramaiah , Ashish Arora
摘要: Systems for dynamically authenticating users are provided. A system may receive a request to access functionality. In response to the received request, an authentication grid may be dynamically generated. The authentication grid may include a plurality of fields, each identifiable by a field identifier, and including one or more characters that may be used to authenticate a user. The authentication grid may be transmitted to a computing device of a user. A character for authentication may be identified by the system. In some arrangements, the system may generate a request for user input including a character appearing in the authentication grid. The user may identify the field and input the character appearing in the field. The system may receive the requested character and may compare it to the identified character for authentication. If the received character and the identified character match, functionality may be enabled. If a match does not exist, functionality may be disabled.
-
4.
公开(公告)号:US20200279033A1
公开(公告)日:2020-09-03
申请号:US16875321
申请日:2020-05-15
发明人: Hitesh Shah , Michael Toth
摘要: Aspects of the disclosure relate to preventing unauthorized access to secured information systems using advanced biometric authentication techniques. A computing device may receive input requesting to login to a user account associated with a mobile banking application installed on the computing device. The computing device may send, to a client authentication computing platform, a first authentication request and receive, from the client authentication computing platform, one or more authentication prompt commands. The computing device then may present one or more authentication prompts and collect, from one or more linked wearable devices, one or more advanced biometrics. After validating the one or more advanced biometrics, the computing device may send, to the client authentication computing platform, authentication response data. Thereafter, the computing device may receive mobile banking user interface information and present one or more mobile banking user interfaces.
-
公开(公告)号:US20200005262A1
公开(公告)日:2020-01-02
申请号:US16019864
申请日:2018-06-27
发明人: Ashish Arora , Nathan Dent , Michael Toth , Harold Joseph Kennedy , Elizabeth Anne Price , Pavan Singaraju , Magdy Ismail , Varsha Devadas
摘要: A frictionless automated teller machine (ATM) computing system may include an ATM, an authentication server, and a mobile device running a mobile application. The devices of the frictionless ATM computing system facilitates simplified user interaction with the ATM. As a user approaches the ATM, the user may log into the mobile device, which triggers the mobile device to send a geographic location to the authentication server. The authentication server then notifies the mobile device of a close ATM. In response, the mobile device may display a user interface screen to initiate a transaction. The ATM may be woken by the authorization server or a user input to complete the transaction causing the ATM to dispense the requested amount of currency.
-
公开(公告)号:US20200005261A1
公开(公告)日:2020-01-02
申请号:US16019771
申请日:2018-06-27
发明人: Ashish Arora , Nathan Dent , Michael Toth , Harold Joseph Kennedy , Elizabeth Anne Price , Pavan Singaraju , Magdy Ismail , Varsha Devadas
摘要: A transaction access point computing system may include an automated teller machine (ATM) or other transaction access point and an authentication server, a beacon device and, in some cases, a mobile device running a mobile application. The devices of the frictionless ATM computing system facilitates simplified user interaction with the ATM. As a user approaches the ATM, the mobile device may receive the beacon signal including a command to awaken the mobile application. After receipt, the mobile application may communicate an identifier to the authentication server, and the ATM may capture an image of the user. At the application server, the user image may be authenticated and confirmation returned to the ATM along with a unified user identifier. After confirmation of the additional identifier, the ATM may dispense a specified amount of currency.
-
公开(公告)号:US20190236248A1
公开(公告)日:2019-08-01
申请号:US16184198
申请日:2018-11-08
CPC分类号: G06F21/313 , G06F21/316 , G06N20/00 , H04L63/0876 , H04L65/1006 , H04L65/1069 , H04M15/06 , H04M15/48 , H04M15/63 , H04M15/8351 , H04M2203/6081
摘要: Aspects of the disclosure relate to multicomputer processing and authentication of user data associated with telephone calls. A call security assessment computing platform may receive data associated with a telephone call made from a user computing device. Subsequently, the call security assessment computing platform may parse the received data to identify header information in a Session Initial Protocol (SIP) header. The platform then may analyze the header information to generate a call fingerprint for the telephone call. This call fingerprint may then be transmitted to one or more call authentication computing platforms, which return one or more call security responses that may further characterize security features of the telephone call. The call fingerprint and the call security responses may then be used to determine a call security score, which may be transmitted in a notification to a call handling system in order to adjust how the call is handled.
-
公开(公告)号:US20210176238A1
公开(公告)日:2021-06-10
申请号:US16706333
申请日:2019-12-06
发明人: Preston Wesley Ports, III , Sangeeta Varma Martinez , Dipika Jain , Michael Toth , Melissa K. Van Leuven , Holly Martinez , Dawn M. Friscia , Erin Marie McCullen , Deborah D. Jackson
IPC分类号: H04L29/06 , G06F16/535
摘要: A system provides for automated image authentication and external database verification. In particular, the system may perform automatic authentication of an image by extracting data and/or metadata from the image for subsequent analysis. For instance, the extracted data and/or metadata may be compared with historical data to drive authorization processes (e.g., past instances of unauthorized activity). In some embodiments, the system may further use external databases which may be hosted by a trusted third party to perform additional authentication steps and/or verification. In this way, the system may provide a reliable and efficient way to perform authentications.
-
公开(公告)号:US10958639B2
公开(公告)日:2021-03-23
申请号:US15906510
申请日:2018-02-27
发明人: Michael Toth , Hitesh Shah
摘要: Systems for providing secure access to systems are provided. A computing device may receive a request to access functionality which may include login credentials of a user. Upon receiving the request to access functionality, the computing device may execute a scan of an area surrounding the computing device to detect any wearable devices within proximity of the computing device that are linked to the computing device. The authenticating information and, in some examples, detected, linked wearable device, may be validated. Based on the validation, authentication response data may be generated and transmitted to an authentication computing platform which may cause the authentication computing platform to validate the authentication response data and cause the computing device to connect to a client interface computing platform. After a connection between the computing device and client interface computing platform is established, interface data may be transmitted from the client interface computing platform to the computing device and one or more interfaces may be displayed on the computing device.
-
10.
公开(公告)号:US20190258786A1
公开(公告)日:2019-08-22
申请号:US15898827
申请日:2018-02-19
发明人: Hitesh Shah , Michael Toth
摘要: Aspects of the disclosure relate to preventing unauthorized access to secured information systems using advanced biometric authentication techniques. A computing device may receive input requesting to login to a user account associated with a mobile banking application installed on the computing device. The computing device may send, to a client authentication computing platform, a first authentication request and receive, from the client authentication computing platform, one or more authentication prompt commands. The computing device then may present one or more authentication prompts and collect, from one or more linked wearable devices, one or more advanced biometrics. After validating the one or more advanced biometrics, the computing device may send, to the client authentication computing platform, authentication response data. Thereafter, the computing device may receive mobile banking user interface information and present one or more mobile banking user interfaces.
-
-
-
-
-
-
-
-
-