Abstract: Various embodiments of the present disclosure are directed to providing authentication of access while reducing user input and, specifically to a method, apparatus, and computer program product for receiving device identification information from both a secured system indicating devices with authorization and from a third party telecommunications carrier indicating the mobile device account attempting to access a service provider. Embodiments provided include an apparatus configured to receive, from a mobile device, identification information associated with the mobile device. The apparatus further comprises computing an encrypted hash of the identification information and initiating a search of a registry for a matching entry that matches the encrypted hash of the identification.
Abstract: Embodiments of the present disclosure provide apparatuses, systems, methods, and computer program products, for identification and confirmation of a user entity associated with a near-field item. An apparatus may be provided, the apparatus configured to receive, from a user device, an electronic data transmission associated with the user device and indicative of response to a near-field verification prompt. The electronic data transmission is received over a carrier network including a carrier device configured to inject identity-linked device information using a header enrichment process. The apparatus further determines an identification confirmation indicator based on the identity-linked device information; transmits, to the user device, an identification completed notification for forwarding to a service provider device; receives, from the service provider device, an identification verification query and, in response, provides the identification confirmation indicator.
Type:
Grant
Filed:
May 9, 2019
Date of Patent:
December 7, 2021
Assignee:
Averon US, Inc.
Inventors:
Wendell Brown, Mark Klein, Lea Tarnowski
Abstract: A method, apparatus and computer program products are provided for facilitating performing frictionless two-factor authentication. One example method includes receiving, from a first entity, an indication of a request, received at the first entity, to access an account from a device associated with a user, the indication comprising at least one instance of first device identification information of at least one device having authorization to access the account, receiving, from a second entity, second device identification information, the second device identification information determined upon the device accessing to the network address, performing a real-time comparison between the first device identification information and second device identification information, and prompting the first entity to grant the device access to the account if a match is detected between the first device identification information and second device identification information.
Abstract: Provided herein are embodiments directed to facilitating an authentication process before allowing an action. An example apparatus may be configured to receive a request, via an authentication session established during a log-in process, to cause the action, send alert to a first device associated with an account associated with the requested action, cause the first device to communicate, via the short range wireless communication protocol, with a second device to verify a proximity, receive verification of the proximity, receive a first identifying data originating in a browser having been used to start the authentication session, receive a second identifying data string originating from a trusted agent, configured as software or hardware, residing on the second device, and upon confirmation of a match of the first identifying data string and the second identifying data string, authorize the action.
Abstract: In general, embodiments of the present invention provide systems, methods and computer readable media for providing a user verification service based on analyzing digital fingerprint signals derived from out-of-band data (i.e., data not directly supplied by the user). In some embodiments, a digital fingerprint engine embedded in an app hosted on a client device being accessed by a user reads various device or user data and then creates a set of encoded user verification data representing out-of-band data stored locally on that device. In some embodiments, the user verification data are encoded as hashes generated by a hash function. In some embodiments, the app is configured to contact a business server via the cloud, and the set of digital fingerprints are included in an authorization request transmitted from the client device to the business server.