JA McClintock, DE Canavor… - US Patent …, 2016 - Google Patents
BACKGROUND Verifying the identity of a person or group of people, referred to as authentication, has many uses in the context of computing. People often have multiple user …
P Jonghan - US Patent 11,134,105, 2021 - Google Patents
A method for downloading a profile by a terminal and the terminal for performing the same are provided. The method includes acquiring information including an access token for …
AP Mikulski, NA Allen, GB Roth - US Patent 9,692,757, 2017 - Google Patents
(57) ABSTRACT A server obtains a challenge from another computer system during a negotiation with a client according to a protocol. The server injects the challenge into a …
K Chadha, Z Dannawi, BM Prakash, H Nagda… - US Patent …, 2019 - Google Patents
A customer's resources are protected from malicious or accidental deletion or termination. In some embodiments anomaly detection is used for identifying suspicious activities, which is …
AHN Taehoon - US Patent 11,741,461, 2023 - Google Patents
A method for implementing non-repudiation of payment in a payment managing server includes receiving, from a user terminal, a terminal public key of a pair of asymmetric keys …
FAT Abad, J Goodsitt, V Pham, A Truong… - US Patent …, 2020 - Google Patents
Aspects of this disclosure relate to authenticating a communication session. In some variations, a secured hardware storage area may be utilized to store at least one key …
X Fan - US Patent 11,606,193, 2023 - Google Patents
Techniques for re-establishing secure application sessions using an abbreviated authentication process are disclosed. A plurality of servers each use a deterministic process …
N Armstrong, B Buckingham, D Friedman… - US Patent App. 17 …, 2021 - Google Patents
A computer implemented method for processing a financial transaction includes the steps of transmitting one or more documents pertaining to the financial transaction, from an …
JA McClintock, DE Canavor… - US Patent …, 2018 - Google Patents
The present disclosure relates to multifactor-based authentication systems. Multifactor authentication occurs during a communication session in response to detecting a trigger …