×

Security using velocity metrics identifying authentication performance for a set of devices

  • US 10,015,153 B1
  • Filed: 12/23/2013
  • Issued: 07/03/2018
  • Est. Priority Date: 12/23/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method of performing authentication, the method comprising:

  • performing, by processing circuitry, a set of authentication operations in response to a set of authentication requests, and updating a set of velocity metrics which identifies authentication performance for a set of authentication request source devices that originated the set of authentication requests, the set of velocity metrics including a particular failed authentication velocity identifying a rate at which a particular authentication request source device provided authentication requests resulting in failed authentication;

    after updating the set of velocity metrics, receiving, by the processing circuitry, an authentication request from the particular authentication request source device; and

    providing, by the processing circuitry, an authentication result in response to the authentication request from the particular authentication request source device, the authentication result (i) being based on the rate identified by the particular failed authentication velocity of the set of velocity metrics and (ii) indicating whether the authentication request is considered to be legitimate;

    wherein performing the set of authentication operations and updating the set of velocity metrics includes;

    generating a first failed authentication result in response to a first authentication attempt by the particular authentication request source device, the first authentication attempt using a first user identifier that identifies a first user,generating a second failed authentication result in response to a second authentication attempt by the particular authentication request source device, the second authentication attempt using a second user identifier that is different from the first user identifier and that identifies a second user that is different from the first user, andmodifying the particular failed authentication velocity in response to the first and second failed authentication results to accurately identify occurrence of a particular number of failed authentication attempts by the particular authentication request source device during a particular amount of time; and

    wherein the method further comprises;

    locking out the particular authentication request source device from successfully authenticating in response to the particular failed authentication velocity identifying a current failed authentication rate that exceeds a predefined threshold;

    wherein the set of velocity metrics includes a set of failed authentication velocities, the set of failed authentication velocities including the particular failed authentication velocity;

    wherein updating the set of velocity metrics which identifies authentication performance for the set of authentication request source devices that originated the set of authentication requests includes;

    updating the set of failed authentication velocities based on failed authentication operations of the set of authentication operations;

    wherein the method further comprises;

    performing an authentication-related action based on the set of failed authentication velocities;

    wherein the set of failed authentication velocities indicates an abnormally high failed authentication velocity for the particular authentication request source device; and

    wherein performing the authentication-related action based on the set of failed authentication velocities includes;

    in response to detection of the abnormally high failed authentication velocity for the particular authentication request source device, (i) distributing a list of suspicious authentication request source devices to a set of server devices of a fraud mitigation network, the list of suspicious authentication request source devices identifying the particular authentication request source device, and (ii) transitioning the processing circuitry from operating in a “

    not locked out”

    state in which further authentication requests are processed to a “

    locked out”

    state in which further authentication requests are denied.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×