one
SYSTEMS AND METHODS FOR PREVENTING UNAUTHORIZED NETWORK ACCESS
Last updated:
Abstract:
A system configured to execute instructions to perform steps of a method for preventing unauthorized network access is disclosed. The system may receive an authorization request from a first user device and determine a device fingerprint. The system may store the device fingerprint as an authorization fingerprint. The system may receive a login request from a second user device. When the authorization fingerprint matches the device fingerprint, the system may authorize the login request from the second user device. In some embodiments, the system may determine a device state and temporal identifier and create a first device hash to be stored as an authorization hash. The system may receive a login request and cause the first user device to create one or more second device hashes. If at least one second device hash is a match, the system may authorize the login request from the second user device.
Utility
8 Feb 2021
11 Aug 2022