CyberArk Software Ltd.
Secure authentication through visual codes containing unique metadata
Last updated:
Abstract:
Disclosed embodiments relate to systems and methods for authentication through generating and communicating encoded representations containing unique application fingerprints, e.g., metadata. Techniques include receiving an access request, receiving application metadata, identifying a unique verification token, generating an encoded visual representation including the metadata and verification token, making available to the encoded visual representation for scanning by a user for verification of the metadata. Further techniques include requesting access to a secure resource, transmitting metadata, scanning an encoded visual representation including the metadata and a verification token, and sending the verification token to a security server to complete an authentication process.
Utility
11 Nov 2019
6 Apr 2021