Abstract:
A system, apparatus, method, and machine-readable medium are described for personalizing and pre-registering an authenticator. For example, one embodiment of a method comprising: confirming an identity of a user by a first relying party using a first identity verification technique responsive to the user performing a first transaction with the first relying party; generating or collecting initial user verification reference data (IUVRD) upon verifying the identity of the user through the first identity verification technique; requesting personalization of an authenticator; storing the IUVRD into the authenticator; generating, by the authenticator, Fast Identity Online (FIDO) credentials including a private and public key pair; storing the FIDO credentials in a secure storage of the authenticator; providing the public key to the first relying party; securely providing the authenticator to the user; and implementing a second identity verification technique by comparing the stored IUVRD to data collected from the user.
Abstract:
A system, apparatus, method, and machine readable medium are described for performing eye tracking during authentication. For example, one embodiment of a method comprises: receiving a request to authenticate a user; presenting one or more screen layouts to the user; capturing a sequence of images which include the user's eyes as the one or more screen layouts are displayed; and (a) performing eye movement detection across the sequence of images to identify a correlation between motion of the user's eyes as the one or more screen layouts are presented and an expected motion of the user's eyes as the one or more screen layouts are presented and/or (b) measuring the eye's pupil size to identify a correlation between the effective light intensity of the screen and its effect on the user's eye pupil size; capturing audio of the user's voice; and performing voice recognition techniques to determine a correlation between the captured audio of the user's voice and one or more voice prints.
Abstract:
A system, apparatus, method, and machine readable medium are described for binding verifiable claims. For example, one embodiment of a system comprises: a client device; an authenticator of the client device to securely store authentication data including one or more verifiable claims received from one or more claim providers, each verifiable claim having attributes associated therewith; and claim/attribute processing logic to generate a first verifiable claim binding for a first verifiable claim issued by the claim provider; wherein the authenticator is to transmit a first signature assertion to a first relying party to authenticate with the first relying party, the first signature assertion including an attribute extension containing data associated with the first verifiable claim binding.
Abstract:
A system, apparatus, method, and machine readable medium are described for secure authentication. For example, one embodiment of a system comprises: an authenticator on a client device to securely store one or more private keys, at least one of the private keys usable to authenticate a block of a blockchain; and an attestation module of the authenticator or coupled to the authenticator, the attestation module to generate a signature using the block and the private key, the signature usable to attest to the authenticity of the block by a device having a public key corresponding to the private key.
Abstract:
A system, apparatus, method, and machine readable medium are described for sharing authentication data. For example, one embodiment of a method comprises: generating and storing a persistent group identification code (Group-ID) for a group of authenticators sharing a common set of authorization (Uauth) keys, an initial Group-ID to be generated on a first use of a first authenticator and/or following a factory reset of the first authenticator generating and storing an individual asymmetric wrapping key encryption key (WKEK) on a first use of the first authenticator and/or following each factory reset of the first authenticator; generating and storing a symmetric wrapping key (WK), the wrapping key to be generated on a first use of the first authenticator and/or following each factory reset of the first authenticator; generating a join-block using an authenticator identification code for the first authenticator and the WKEK, the join-block usable to join an existing authenticator group, the join block to be sent to a second authenticator; verifying the join-block at the second authenticator and generating a join response block responsive to user approval, the join response block generated by encrypting the WK and Group-ID using the WKEK, the join response block to be transmitted to the first authenticator; and decrypting the join response block and storing the WK and Group-ID.
Abstract:
A system, apparatus, method, and machine readable medium are described for authenticating a client to a device. For example, one embodiment of a method comprises: registering an authenticator of a client with a relying party, the registration allowing a user of the client to remotely authenticate the user to the relying party over a network; generating a first authentication structure using at least a first authentication key associated with the authenticator and a signature generated with a first verification key; caching the first authentication structure on the client; providing a second verification key corresponding to the first verification key to a transaction device; performing an authentication transaction between the client and the transaction device in which the client generates a second authentication structure using a second authentication key associated with the first authentication key, the transaction device uses the second verification key to validate the signature on the first authentication structure and uses the first authentication key to validate the second authentication structure.
Abstract:
A system, apparatus, method, and machine readable medium are described for non-intrusive privacy-preserving authentication. For example, one embodiment of a method comprises: entering into a legitimate user state on a client device for a time period following an explicit authentication by an end user; recording reference data related to user behavior while in the legitimate user state; measuring user behavior when outside of the legitimate user state and arriving at an authentication assurance level based on a distance between the measured user behavior and the recorded reference data; in response to an authentication request within the legitimate user state, providing an authentication assurance level at or above a defined threshold, the authentication assurance level being sufficient to authenticate the user to a relying party; and in response to an authentication request while outside of the legitimate user state, providing the authentication assurance level based on a distance between the measured user behavior and the recorded reference data.
Abstract:
A system, apparatus, method, and machine-readable medium are described for defending against malicious code injection. For example, one embodiment of an apparatus comprises: a processor to execute an application to access a web page on the Internet in response to user input, the web page having one or more resource descriptors and/or code descriptors associated therewith; an authenticator engine to validate the web page based, at least in part, on the resource descriptors and/or code descriptors, by connecting to a trusted entity; and wherein the trusted entity is configured to generate a signature on a cryptographic assertion that includes one or more resource descriptor objects associated with the one or more resource descriptors and/or one or more code descriptor objects associated with the one or more code descriptors.
Abstract:
A system, apparatus, method, and machine-readable medium are described for personalizing and pre-registering an authenticator. For example, one embodiment of a method comprising: confirming an identity of a user by a first relying party using a first identity verification technique responsive to the user performing a first transaction with the first relying party; generating or collecting initial user verification reference data (IUVRD) upon verifying the identity of the user through the first identity verification technique; requesting personalization of an authenticator; storing the IUVRD into the authenticator; generating, by the authenticator, Fast Identity Online (FIDO) credentials including a private and public key pair; storing the FIDO credentials in a secure storage of the authenticator; providing the public key to the first relying party; securely providing the authenticator to the user; and implementing a second identity verification technique by comparing the stored IUVRD to data collected from the user.
Abstract:
A system, apparatus, method, and machine readable medium are described for implementing a composite authenticator. For example, an apparatus in accordance with one embodiment comprises: an authenticator for authenticating a user of the apparatus with a relying party, the authenticator comprising a plurality of authentication components; and component authentication logic to attest to the model and/or integrity of at least one authentication component to one or more of the other authentication components prior to allowing the authentication components to form the authenticator.