Abstract:
The disclosed embodiments provide a system that authenticates a user of an unattended device. In response to sensing a presence of the user in proximity to the unattended device, the system makes a call from the unattended device to an authentication service to authenticate the user. In response to the call, the authentication service authenticates the user based on recently collected sensor data, which was obtained from one or more sensors in a portable electronic device belonging to the user. If authentication succeeds, the system allows the user to proceed with an interaction with the unattended device.
Abstract:
A system and method and computer program product for user authentication that uses information about a user's context or context of their personal device(s) to dynamically modify that user's authentication or login requirements to an application in a computer or mobile device. The system is configured to run methods that detect and make use of a user's context that includes: a current environment or personal context, and uses this capability to enable variable strength authentication when attempting to log in or enter another application or resource. In one embodiment, the system implements methods to dynamically adjust the authentication challenge as a differential of all accumulated user contexts (e.g., providing a shorter password or pin-code).
Abstract:
Embodiments of the disclosure provide a method for enhancing standard authentication systems to include risk-based decisions. Risk-based decisions can be selectively implemented within existing authentication systems to strategically modify and supplement security if an unacceptable risk is detected. Embodiments capture information pertaining to a user and user device. Information is stored to create a profile for the user and user device. A comparison between the stored information and live data can be performed within authentication systems to optimize security. If the results of the comparison demonstrate the presence of an acceptable risk, then the need for subsequent authentication can be reduced or eliminated, which improves a user experience.
Abstract:
Systems and methods for token processing are disclosed. An access device can provide access device data to a mobile communication device. The communication device generates a token request including the access device data and communication device data and sends the token request to a server computer. The server computer returns a token and a token cryptogram to the mobile communication device. The token and the cryptogram may be used in a transaction.
Abstract:
A system and method for providing security to a network may include maintaining, by a processor, a model of an expected behavior of data communications over the in-vehicle communication network; receiving, by the processor, a message sent over the network; determining, by the processor, based on the model and based on content in the message, whether or not the message complies with the model; and if the message does not comply with the model then performing, by the processor, at least one action related to the message.
Abstract:
A method of verifying user characteristics based on data relating to the user's mobile device, the method being performed at a mobile or wireless telecommunications network and comprising the steps of receiving at a data analysis system of the mobile or wireless telecommunications network via a computer network a query from a remote computer system; the data analysis system retrieving data relating to the user's mobile device from a data store system of the mobile or wireless telecommunications network, wherein the retrieved data is selected based on the query; the data analysis system processing the retrieved data to obtain an answer to the query; and transmitting the answer to the remote computer system.
Abstract:
A terminal device using a protocol stack including an upper layer and a lower layer includes a first encryption unit configured to perform first encryption and/or first decryption of data in the upper layer, a second encryption unit configured to perform second encryption and/or second decryption of data in the lower layer, a determination unit configured to determine an encryption level of the second encryption and/or second decryption according to a condition of the terminal device, a generation unit configured to generate terminal capability information according to the determined encryption level, a transmission unit configured to transmit the generated terminal capability information to a base station, and a reception unit configured to receive setting information according to the determined encryption level, from the base station, in response to transmission of the terminal capability information.
Abstract:
Methods, computing devices, and systems that dynamically determine whether a request is authorized or fraudulent are described herein. A computing device may receive a request from a communication device, and a geographical location of the communication device may be determined. User information may be requested, and based on the information and the geographical location of the communication device, a risk value can be calculated. A determination of whether to honor the request may be based on the subscriber risk value.
Abstract:
The present disclosure disclosures a protecting system and method for privacy information in a mobile terminal. In the system, a crowdsourcing database stores security strategy information of applications. An interaction management module receives a recommendation request of security strategy sent by the mobile terminal. A recommendation algorithm module calculates according to the recommendation request of security strategy to obtain corresponding recommended security strategy. An interaction management module recommends the recommended security strategy to the privacy protecting module. A privacy protecting module notifies a user and assists the mobile terminal to set privacy protection strategy according to the recommended security strategy recommended by the interaction management module, and protects the privacy information in the mobile terminal according to the privacy protection strategy. The system can set privacy protection dynamically. In this way, user experience is improved.
Abstract:
A wireless end-user device is disclosed. One or more user inputs indicate that a user of the wireless end-user device authorizes the device to send a first file to a server over a network of a first network type, and that the user does not authorize the device to send a second file to the server over the network of the first type. Based on the one or more user inputs and a determination that the device is connected to the network of the first type, the device sends the first file, but not the second file, to the server over the network of the first network type. Upon detecting that the device is connected to a network of the second network type, the device sends the second file to the server over the network of the second network type.