AUTHENTICATION THROUGH EXCEPTION HANDLING
    2.
    发明申请

    公开(公告)号:US20190327230A1

    公开(公告)日:2019-10-24

    申请号:US15960321

    申请日:2018-04-23

    Abstract: Techniques are disclosed relating to user authentication. In some embodiments, a computing system maintains an exception handler of a software development platform. The exception handler is executable to process a particular type of exception that causes an authentication of users of applications running on the software development platform. The computing system may receive, at the exception handler, an indication of the particular type of exception thrown by a particular application. In response to receiving the indication of the particular type of exception, the exception handler issues to a web browser interacting with the application, a request that the web browser redirect to an authentication server configured to perform an authentication of a user of the particular application. The computing system receives, from the authentication server, a result of the performed authentication and returns the result to the particular application.

    Verification of Automatic Responses to Authentication Requests on Authorized Mobile Devices

    公开(公告)号:US20230244775A1

    公开(公告)日:2023-08-03

    申请号:US17649479

    申请日:2022-01-31

    CPC classification number: G06F21/40 G06N20/00

    Abstract: Techniques are disclosed relating to determining risk associated with automated authentication decisions for a multi-factor authentication scheme. In disclosed embodiments, a server system sends requests corresponding to factors in a current multi-factor authentication procedure to a mobile device. The system receives, from the mobile device, automatically generated responses for the factors, where the responses are automatically generated at the mobile device using a machine learning model based on a current set of parameters for the current procedure and a previous set of parameters for a prior procedure. Based on a current state of the mobile device received with the automatically generated responses and prior states of the mobile device stored at the server computer system, the system determines a risk score for the automatically generated responses. Based on the risk score, the system generates an authorization decision for an authorization request corresponding to the current multi-factor authentication procedure.

    AUTOMATING RESPONSES TO AUTHENTICATION REQUESTS USING UNSUPERVISED COMPUTER LEARNING TECHNIQUES

    公开(公告)号:US20200007532A1

    公开(公告)日:2020-01-02

    申请号:US16025885

    申请日:2018-07-02

    Abstract: Techniques are disclosed relating to automating authentication decisions for a multi-factor authentication scheme based on computer learning. In disclosed embodiments, a mobile device receives a first request corresponding to a factor in a first multi-factor authentication procedure. Based on user input approving or denying the first request, the mobile device sends a response to the first request and stores values of multiple parameters associated with the first request. The mobile device receives a second request corresponding to a factor in a second multi-factor authentication procedure where the second request is for authentication for a different account than the first request. The mobile device automatically generates an approval response to the second request based on performing a computer learning process on inputs that include values of multiple parameters for the second request and the stored values of the multiple parameters associated with the first request. The approval response is automatically generated and sent without receiving user input to automate the second request.

    Automating Responses to Authentication Requests Using Unsupervised Computer Learning Techniques

    公开(公告)号:US20220060465A1

    公开(公告)日:2022-02-24

    申请号:US17461303

    申请日:2021-08-30

    Abstract: Techniques are disclosed relating to automating authentication decisions for a multi-factor authentication scheme based on computer learning. In disclosed embodiments, a mobile device receives a first request corresponding to a factor in a first multi-factor authentication procedure. Based on user input approving or denying the first request, the mobile device sends a response to the first request and stores values of multiple parameters associated with the first request. The mobile device receives a second request corresponding to a factor in a second multi-factor authentication procedure where the second request is for authentication for a different account than the first request. The mobile device automatically generates an approval response to the second request based on performing a computer learning process on inputs that include values of multiple parameters for the second request and the stored values of the multiple parameters associated with the first request. The approval response is automatically generated and sent without receiving user input to automate the second request.

Patent Agency Ranking