Systems and methods for protecting passwords

    公开(公告)号:US11095636B1

    公开(公告)日:2021-08-17

    申请号:US16139490

    申请日:2018-09-24

    IPC分类号: H04L29/06 H04L9/32 H04L29/08

    摘要: The disclosed computer-implemented method for protecting passwords may include (i) intercepting network traffic indicating an attempted login procedure at a workload device to login to a protected resource, (ii) prompting a user, in response to intercepting the network traffic, and at an authentication device that has been registered to the user, to indicate whether to approve the attempted login procedure, (iii) collecting, at the authentication device, a credential for the attempted login procedure that was stored in a protected vault of the authentication device, (iv) providing, by the authentication device to the workload device, an authentication decision based on the collected credential, and (v) injecting, at the workload device, the authentication decision into a browser session to enable the user to complete the attempted login procedure to login to the protected resource. Various other methods, systems, and computer-readable media are also disclosed.

    Systems and methods for classifying electronic files

    公开(公告)号:US11030150B1

    公开(公告)日:2021-06-08

    申请号:US15583410

    申请日:2017-05-01

    摘要: The disclosed computer-implemented method for classifying electronic files may include (i) identifying an electronic file that is being evaluated for importance by a file-categorization system, (ii) collecting, via at least one user-state monitoring device, information about a physical state of at least one user while the user is interacting with the electronic file, (iii) determining, based on the information about the physical state of the user while the user was interacting with the electronic file, whether the user considers the electronic file to be important, and (iv) classifying, by the file-categorization system and based at least in part on determining whether the user considers the electronic file to be important, the electronic file as an important file. Various other methods, systems, and computer-readable media are also disclosed.

    Detecting and preventing phishing phone calls through verified attribute analysis

    公开(公告)号:US10778839B1

    公开(公告)日:2020-09-15

    申请号:US15942206

    申请日:2018-03-30

    摘要: A method for detecting and preventing phishing phone calls through verified attribute analysis is described. The method may comprise receiving, by a receiving device, a phone call from a sending device and receiving identification data in parallel with the phone call, the identification data describing context of the phone call. The method may then identify an attribute assertion from the identification data. The attribute assertion may comprise a signed attribute of the phone call and may be signed by a trusted authority. The method may comprise determining content of the phone call, analyzing the content of the phone call against the signed attribute, and performing a defined operation based on a result of the analysis of the content against the signed attribute.

    Systems and methods for preventing addictive application usage

    公开(公告)号:US10409979B1

    公开(公告)日:2019-09-10

    申请号:US15237170

    申请日:2016-08-15

    发明人: Lei Gu Keith Newstadt

    IPC分类号: G06F21/50 H04L29/06

    摘要: A computer-implemented method for preventing addictive application usage may include (i) identifying a user of a software application, (ii) monitoring the user's habits in relation to accessing the software application, (iii) determining that the user's habits indicate potentially addictive behavior relative to a baseline behavior in relation to accessing the software application, and (iv) automatically executing an application control action in response to determining that the user's habits indicate potentially addictive behavior. Various other methods, systems, and computer-readable media are also disclosed.

    Systems and methods for creating validated identities for dependent users

    公开(公告)号:US10402549B1

    公开(公告)日:2019-09-03

    申请号:US14972876

    申请日:2015-12-17

    IPC分类号: G06F21/62 G06F21/45 G06F21/31

    摘要: The disclosed computer-implemented method for creating validated identities for dependent users may include (1) identifying both a validated user of an identity validation service who has a previously validated identity and a dependent user who cannot create a new validated identity via the identity validation service, (2) enabling, via a graphical user interface displayed on the computing device, the validated user to create the new validated identity for the dependent user in response to determining that the validated user has the previously validated identity, (3) linking the new validated identity for the dependent user to the previously validated identity of the validated user, and (4) generating a token that represents the new validated identity for the dependent user and that comprises a link to the previously validated identity of the validated user. Various other methods, systems, and computer-readable media are also disclosed.

    Method of social-fencing based on physical proximity

    公开(公告)号:US09883339B1

    公开(公告)日:2018-01-30

    申请号:US15279876

    申请日:2016-09-29

    IPC分类号: H04W24/00 H04W4/02 H04L29/08

    摘要: A system and method for establishing patterns of social behavior for users of mobile devices. An administrator registers a person of interest with a service by identifying a mobile device used by the person of interest and generates one or more rules. The registered mobile device monitors network traffic of other surrounding mobile devices and sends their unique identifiers to the service. The service accesses one or more registries to identify users associated with the other surrounding mobile devices. The service determines whether any rule infractions occur based on one or more of the identified users, distances between the registered mobile device and other surrounding devices, frequencies of occurrences of mobile devices being relatively near and detected time periods. If any rule infractions occur, then the service generates an alert and sends it to the administrator.

    SYSTEMS AND METHODS FOR UPDATING POSSESSION FACTOR CREDENTIALS
    8.
    发明申请
    SYSTEMS AND METHODS FOR UPDATING POSSESSION FACTOR CREDENTIALS 有权
    用于更新POSSESSION因子证书的系统和方法

    公开(公告)号:US20160085962A1

    公开(公告)日:2016-03-24

    申请号:US14492777

    申请日:2014-09-22

    IPC分类号: G06F21/45 G06F21/31

    摘要: The disclosed computer-implemented method for updating possession factor credentials may include (1) detecting a request from a user of a service to designate a new object to be used by the service as a possession factor credential in place of a previously designated object, (2) prior to allowing the user to designate the new object, authenticating the user by proofing the identity of the user to verify that an alleged identity of the user is the actual identity of the user and verifying that the proofed identity of the user had possession of the previously designated object, and (3) in response to verifying that the proofed identity of the user had possession of the previously designated object, designating the new object as the possession factor credential. Various other methods, systems, and computer-readable media are also disclosed.

    摘要翻译: 所公开的用于更新所有权凭据的计算机实现的方法可以包括(1)检测来自服务的用户的请求,以将代表由服务使用的新对象指定为占有因素凭证代替先前指定的对象( 2)在允许用户指定新对象之前,通过证明用户的身份来验证用户以验证所述用户的所述身份是用户的实际身份并且验​​证用户的被证明的身份是否拥有 以及(3)响应于验证用户的证明身份是否拥有先前指定的对象,指定新对象作为所有权凭据。 还公开了各种其它方法,系统和计算机可读介质。

    Out-of-app based partner aware user authentication
    9.
    发明授权
    Out-of-app based partner aware user authentication 有权
    基于应用外的合作伙伴感知用户身份验证

    公开(公告)号:US08959609B1

    公开(公告)日:2015-02-17

    申请号:US13931067

    申请日:2013-06-28

    IPC分类号: G06F17/30 H04L29/06

    摘要: An app runs on a user operated computing device, e.g., a mobile device running a sandboxed operating system. The app requests a session ID from a publisher Idp. The app registers for notifications on the session ID with a notification service. The app directs a browser to navigate to the publisher IdP, and to pass it the secure session ID and an ID of a specific partner. The publisher IdP returns a redirect to a third party IdP used by the specific partner to authenticate users. The browser navigates to the third party IdP, which prompts the user for authentication credentials. The third party Idp uses the credentials to authenticate the user, and redirects the authentication result to the publisher IdP. The publisher IdP sends the app a notification, via the notification service. In response, the app calls the publisher IdP, and receives a secure authentication token.

    摘要翻译: 应用程序在用户操作的计算设备(例如,运行沙箱操作系统的移动设备)上运行。 应用程序从发布商Idp请求会话ID。 该应用程序通过通知服务注册会话ID的通知。 该应用程序会引导浏览器导航到发布商IdP,并传递安全会话ID和特定合作伙伴的ID。 发布商IdP将重定向返回给特定合作伙伴使用的第三方IdP以对用户进行身份验证。 浏览器导航到第三方IdP,它提示用户进行身份验证凭据。 第三方Idp使用凭据来验证用户,并将验证结果重定向到发布者IdP。 发布商IdP通过通知服务向应用发送通知。 作为响应,应用程序调用发布者IdP,并接收安全身份验证令牌。

    Systems and methods for facilitating negotiation and exchange of information between parties

    公开(公告)号:US10581781B1

    公开(公告)日:2020-03-03

    申请号:US15277658

    申请日:2016-09-27

    IPC分类号: H04L12/58 H04L29/08

    摘要: The disclosed computer-implemented method for facilitating negotiation and exchange of information between parties may include (i) receiving, at a backend computing system from an initiating computing device, an attribute of an initiating user of the initiating computing device and a designation of a specified attribute condition, (ii) receiving, at the backend computing system from a responding computing device, an attribute of a responding user of the responding computing device, (iii) determining, at the backend computing system, whether the attribute of the responding user satisfies the specified attribute condition, and (iv) based on the attribute of the responding user satisfying the specified attribute condition, sending, from the backend computing system, the attribute of the responding user to the initiating computing device and the attribute of the responding user to the initiating computing device. Various other methods, systems, and computer-readable media are also disclosed.