A method, system, apparatus, and computer program product are provided for facilitating advanced authentication techniques. For example, a method is provided that includes receiving at least one request to access at least one resource and receiving at least one composite authentication credential, t
A method, system, apparatus, and computer program product are provided for facilitating advanced authentication techniques. For example, a method is provided that includes receiving at least one request to access at least one resource and receiving at least one composite authentication credential, the composite authentication credential comprising a first credential component and a second credential component. The method further includes determining whether the first credential component is valid, determining whether the second credential component is valid and, in an instance in which it is determined that the first and second credential components are valid, causing access to the at least one resource to be permitted.
대표청구항▼
1. A method comprising: receiving at least one request to access at least one resource;receiving at least one composite authentication credential, the at least one composite authentication credential comprising a first credential component and a second credential component, the first credential comp
1. A method comprising: receiving at least one request to access at least one resource;receiving at least one composite authentication credential, the at least one composite authentication credential comprising a first credential component and a second credential component, the first credential component comprising a sequential component indicating an order of input for a plurality of biometric signature elements and the second credential component comprising the plurality of biometric signature elements;determining whether the first credential component is valid;determining whether the second credential component is valid;permitting, when the first credential component and the second credential component are valid, access to the at least one resource;performing, when the first credential component is not valid, a first remedial action; andperforming, when the second credential component is not valid, a second remedial action, the second remedial action preventing further authentication attempts until at least one alternative authentication credential is validated, wherein the first remedial action is different from the second remedial action. 2. The method of claim 1, wherein receiving the at least one composite authentication credential comprises receiving the plurality of biometric signature elements in an order specified by the sequential component. 3. The method of claim 1, wherein the sequential component further comprises a plurality of sequential elements, at least one of the sequential elements indicating a pause for a specified duration between two of the plurality of biometric signature elements. 4. The method of claim 1, wherein the at least one of the plurality of biometric signature elements comprises at least one fingerprint. 5. The method of claim 1, wherein at least one of the plurality of biometric signature elements comprises at least one iris image. 6. The method of claim 1, wherein the first credential component is user-definable. 7. The method of claim 1, wherein the first remedial action comprises an authentication assistance action. 8. The method of claim the second remedial action further comprises an access restricting action. 9. The method of claim the second remedial action further comprises contacting one or more persons. 10. The method of claim 1, wherein the first and second credential components are received concurrently. 11. The method of claim 1, wherein the second remedial action further comprises transmitting instructions to a user device to invoke an access restriction procedure on the user device. 12. The method of claim 11, wherein the instructions transmitted to the user device include at least one of locking the user device, encrypting at least a portion of memory on the user device, or wiping at least a portion of memory on the user device. 13. The method of claim 11, wherein the instructions transmitted to the user device include directing the user device to determine a location of the user device, and the second remedial action further comprises receiving the location of the user device. 14. An apparatus comprising at least one processor and at least one memory storing program code instructions, the at least one memory and program code instructions being configured to, with the at least one processor, direct the apparatus to at least: receive at least one request to access at least one resource;receive at least one composite authentication credential, the at least one composite authentication credential comprising a first credential component and a second credential component, the first credential component comprising a sequential component indicating an order of input a plurality of biometric signature elements and the second credential component comprising the plurality of biometric signature elements;determine whether the first credential component is valid;determine whether the second credential component is valid;permitting, when the first credential component and the second credential component are valid, access to the at least one resource to be permitted;performing, when the first credential component is not valid, a first remedial action to be performed; andperforming, when the second credential component is not valid, a second remedial action to be performed, the second remedial action locking a user device associated with the at least one request to access the at least one resource, wherein the first remedial action is different from the second remedial action. 15. The apparatus of claim 14, wherein at least one of the plurality of biometric signature elements comprises at least one fingerprint. 16. The apparatus of claim 14, wherein the first remedial action comprises an authentication assistance action. 17. A computer program product comprising a non-transitory computer-readable storage medium having program code portions embodied therein, the program code portions being configured to, upon execution, direct an apparatus to at least: receive at least one request to access at least one resource;receive at least one composite authentication credential, the at least one composite authentication credential comprising a first credential component and a second credential component, the first credential component comprising a sequential component indicating an order of input for respective ones of the plurality of biometric signature elements and the second credential component comprising a plurality of biometric signature elements;determine whether the first credential component is valid;determine whether the second credential component is valid;permitting, when the first and second credential components are valid, access to the at least one resource;performing, when the first credential component is not valid, a first remedial action; andperforming, when the second credential component is not valid, a second remedial action, the second remedial action comprising monitoring a location of a user device associated with the request, wherein the first remedial action is different from the second remedial action. 18. The computer program product of claim 17, wherein the sequential component further comprises a plurality of sequential elements, and at least one of the sequential elements indicates a pause for a specified duration between two of the plurality of biometric signature elements. 19. The computer program product of claim 17, wherein at least one of the plurality of biometric signature elements comprises at least one iris image. 20. The computer program product of claim 17, wherein the first remedial action comprises an authentication assistance action.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (114)
Wright,Michael; Boucher,Peter; Nault,Gabe; Smith,Merrill; Jacobson,Sterling K; Wood,Jonathan; Mims,Robert, Administration of protection of data accessible by a mobile device.
Bhaskaran,Harikrishnan, Communication system and method for compressing information sent by a communication device to a target portable communication device.
Johnson, David Nephi; Nielson, Dustin Lance; Griffis, Jr., Jerry E.; Beus, David Kent; Jensen, Nathan Blaine; Street, William; Sherman, Paul Erik; Cook, Michael William; Carter, Stephen R, Credential mapping.
Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, Global server for authenticating access to remote services.
Shai Mohaban ; Itzhak Parnafes ; Yoram Ramberg IL; Yoram Snir IL; John Strassner, Method and apparatus of storing policies for policy-based management of quality of service treatments of network data traffic flows.
Craft, David John; Dubey, Pradeep K.; Hofstee, Harm Peter; Kahle, James Allan, Method and system for controlled distribution of application code and content data within a computer network.
Craft, David John; Dubey, Pradeep K.; Hofstee, Harm Peter; Kahle, James Allan, Method and system for controlled distribution of application code and content data within a computer network.
Maurya, Sanjiv; Tse, Benson Wei-Ming; VanZile, Frank; Bonham, Larry Dean; Peterson, Phil; Friend, John, Method and system for distributing and updating software in wireless devices.
Bruton, III, David Aro; Overby, Jr., Linwood H.; Rodriguez, Adolfo Francisco, Methods, systems and computer program products for selectively allowing users of a multi-user system access to network resources.
Farris Robert D. ; Flaherty Stephen J. ; Goodman William D., Mobile data/message/electronic mail download system utilizing network-centric protocol such as Java.
Marolia,Sunil; Chia,Teck; Dinh,John D. V.; Soberano,Vincent P.; Hamasaki, Jr.,Glenn; Gustafson,James P.; Pakarinen,Toni; Jacobi,Sidney A., Mobile services network for update of firmware/software in mobile handsets.
Wittstein Alan D. (Westport CT) Ciocca Giacomo A. (Thomaston CT), Mobile telephone device for storing a plurality of changable charge rates and time limit data.
Laird,David; Jones,Martin Kelly, Notification systems and methods enabling user entry of notification trigger information based upon monitored mobile vehicle location.
Wright,Michael; Boucher,Peter; Nault,Gabe; Smith,Merrill; Jacobson,Sterling K; Wood,Jonathan; Mims,Robert, Protection of data accessible by a mobile device.
Phillips John C. ; Hayes ; Jr. John J., Recyclable cellular telephone and method and apparatus for supporting the use of a recyclable cellular telephone within.
Mann, Dwayne R.; Heard, Robert W.; Burchett, Christopher D.; Gordon, Ian R., Server, computer memory, and method to support security policy maintenance and distribution.
Wolovitz, Lionel; Collins, Tim, Service management system and associated methodology of providing service related message prioritization in a mobile client.
Ng, Mason; Mendez, Daniel J.; Quinlan, Sean Michael, System and method for automatically forwarding email and email events via a computer network to a server computer.
Heard, Robert W.; Mann, Dwayne R.; Burchett, Christopher D.; Gordon, Ian R., System and method for distribution of security policies for mobile devices.
Riggins Mark D. ; Bailes R. Stanley ; Bui Hong O. ; Cowan David I. ; Mendez Daniel I. ; Ng Mason ; Quinlan Sean Michael ; Wagle Prasad ; Ying Christine C. ; Zuleeg Christopher R. ; Aptekar-Strober Jo, System and method for globally accessing computer services.
Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R., System and method for globally and securely accessing unified information in a computer network.
Mendez,Daniel J.; Riggins,Mark D.; Wagle,Prasad; Bui,Hong Q.; Ng,Mason; Quinlan,Sean Michael; Ying,Christine C.; Zuleeg,Christopher R.; Cowan,David J.; Aptekar Strober,Joanna A.; Bailes,R. Stanley, System and method for globally and securely accessing unified information in a computer network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for securely synchronizing multiple copies of a workspace element in a network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for synchronizing electronic mail between a client site and a central site.
Ng Mason ; Quinlan Sean Michael ; Ruan Tom ; Mendez Daniel J. ; Zhu Jing ; Cheng ; Jr. Martin ; Williams Matt ; Riggins Mark D., System and method for updating a remote database in a network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for using a global translator to synchronize workspace elements across a network.
Piccionelli, Greg A.; Rittmaster, Ted R., System and process for limiting distribution of information on a communication network based on geographic location.
Clark Ted H. ; Malisewski Steven C. ; Cooper Patrick R. ; Crosswy William Caldwell ; Crochet Larry J., System for automatic synchronization of common file between portable computer and host computer via communication channe.
Nagamatsu Jun (Kawasaki JPX) Terashima Masaki (Yokohama JPX) Yamada Jun (Yokohama JPX), System for preventing unauthorized use of a micro cellular system operating in coexistence with a cellular system.
Boebert William E. ; Rogers Clyde O. ; Andreas Glenn ; Hammond Scott W. ; Gooderum Mark P., System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting.
Kim, Jin Pil; Thomas, C. Gomer, Virtual channel table for a broadcast protocol and method of broadcasting and receiving broadcast signals using the same.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.