Patent application number | Description | Published |
20130247173 | SYSTEM AND METHODS FOR SECURE ENTRY OF A PERSONAL IDENTIFICATION NUMBER (PIN) - Systems and methods for credential character selection are provided. The system includes one or more sensors configured to detect a character selection and generate a character selection signal, and detect a character selection completion and generate a character selection completion signal. The system also includes one or more processors coupled to the one or more sensors, the one or more processors configured to receive the character selection signal and the character selection completion signal, and generate an output signal based on the received character selection signal that includes components of a credential. The system also includes a network interface component configured to transmit the output signal. The credential characters may be components of a PIN or password. Moreover, the credential character selections may be made on one device, but displayed on a separate coupled device. The character selections may be a selection of a character or a modification of character. | 09-19-2013 |
20140047544 | Server-Side Malware Detection and Classification - A server-side system that detects and classifies malware and other types of undesirable processes and events operating on network connected devices through the analysis of information collected from said network connected devices. The system receives information over a network connection and collects information that is identified as being anomalous. The collected information is analyzed by system process that can group data based on optimally suited cluster analysis methods. Upon clustering the information, the system can correlate an anomalous event to device status, interaction, and various elements that constitute environmental data in order to identify a pattern of behavior associated with a known or unknown strain of malware. The system further interprets the clustered information to extrapolate propagation characteristics of the strain of malware and determine a potential response action. | 02-13-2014 |
20140101765 | AUDITING A DEVICE - The auditing of a device that includes a physical memory is disclosed. One or more hardware parameters that correspond to a hardware configuration is received. Initialization information is also received. The physical memory is selectively read and at least one result is determined. The result is provided to a verifier. | 04-10-2014 |
20140129396 | SYSTEMS AND METHODS FOR REDUCING FRAUDULENT ACTIVITY IN TRANSACTION DISPUTE RESOLUTION - A method and device for resolving a transaction dispute are provided. The method and device provide information related to a disputed transaction to a user and then provide the user with the opportunity to cancel the transaction dispute. The provided information may be information that is relevant to the user and the transaction and associates the user to the transaction. As a result of being presented with information that associates the user with the transaction, the user may be less likely to fraudulently dispute the transaction. | 05-08-2014 |
20140130126 | SYSTEMS AND METHODS FOR AUTOMATICALLY IDENTIFYING AND REMOVING WEAK STIMULI USED IN STIMULUS-BASED AUTHENTICATION - Systems and methods for identifying a weak stimulus in a stimulus-based authentication system is provided. Counters are associated with each stimulus used in the authentication and a first counter is incremented when the stimulus is used in an authentication session and a second counter is incremented when a successful event occurs with respect to the stimulus during the authentication session, but the authentication session ultimately fails. A ratio of the second counter and the first counter is compared to a threshold and the stimulus is identified as weak when the ratio exceeds the threshold. The stimulus may then be removed and no longer be used in the stimulus-based authentication system. | 05-08-2014 |
20140250515 | SYSTEMS AND METHODS FOR AUTHENTICATING A USER BASED ON A BIOMETRIC MODEL ASSOCIATED WITH THE USER - Systems and methods as provided herein may create a biometric model associated with a user. The created biometric model may be used to generate challenges that are presented to the user for authentication purposes. A user response to the challenge may be compared to an expected response, and if the user response matches within a predetermined error of the expected response, the user may be authenticated. The systems and methods may further generate challenges that are adaptively designed to address weaknesses or errors in the created model such that the model is more closely associated with a user and the user is more likely to be the only person capable of successfully responding to the generated challenges. | 09-04-2014 |
20140282866 | SYSTEMS AND METHODS FOR DETERMINING AN AUTHENTICATION ATTEMPT THRESHOLD - Systems and methods are provided for determining an authentication attempt threshold. Authentication systems often have predetermined authentication attempt thresholds that may not be sufficient for some users and do not necessarily provide any increased security. Systems and methods provided for determining an authentication thresholds described herein may determine the authentication threshold based on certain factors in a user's authentication attempt history that may provide information about a user's probability of a successful authentication to provide additional security for users more likely to successfully authenticate while providing additional assistance to users who may be less likely to successfully authenticate. | 09-18-2014 |
20140325617 | DETECTING HORIZONTAL ATTACKS - Horizontal attacks may be detected in an authentication system by comparing entered credentials to a list of common credentials, increasing a score if the entered credential matches a credential on the list of common credentials, and then making a security determination based on the score. The score increase may be weighted based on factors including a recentness of a previous authentication, a similarity of the credential to a correct or common credential, a commonality of the entered credential, and whether or not additional security precautions are being taken. The score may be associated with a credential, an authentication attempt, or may be a system-wide score that, when it reaches a threshold may be indicative of a system-wide attack. | 10-30-2014 |