Un-password: risk aware end-to-end multi-factor authentication via dynamic pairing
First Claim
1. A method for determining a dynamic pairing code for use in exchanging information between a first and a second communications device, the method comprising:
- at the first communications device;
determining a first authentication score associated with a first information exchange session between the first and second communications devices;
determining a second authentication score associated with a second information exchange session between the first and second communications devices, the second information exchange spaced apart in time from the first information exchange;
combining the first and second authentication scores to create a cumulative risk analysis score;
responsive to the cumulative risk analysis score, generating a dynamic pairing code for use in governing exchange of information during subsequent communications between the first and second communications device; and
encrypting the dynamic pairing code and transmitting the dynamic pairing code to the second communications device.
8 Assignments
0 Petitions
Accused Products
Abstract
A method for determining a dynamic pairing code for use in exchanging information between a first and a second communications entity. At the at the first communications entity, determining a first authentication score associated with a first information exchange session between the first and second communications entities, determining a second authentication score associated with a second information exchange session between the first and second communications entities, (the second information exchange spaced apart in time from the first information exchange), combining the first and second authentication scores to create a cumulative risk analysis score, and responsive to the cumulative risk analysis score, generating a dynamic pairing code for use in governing exchange of information during subsequent communications between the first and second communications entities.
6 Citations
19 Claims
-
1. A method for determining a dynamic pairing code for use in exchanging information between a first and a second communications device, the method comprising:
-
at the first communications device; determining a first authentication score associated with a first information exchange session between the first and second communications devices; determining a second authentication score associated with a second information exchange session between the first and second communications devices, the second information exchange spaced apart in time from the first information exchange; combining the first and second authentication scores to create a cumulative risk analysis score; responsive to the cumulative risk analysis score, generating a dynamic pairing code for use in governing exchange of information during subsequent communications between the first and second communications device; and encrypting the dynamic pairing code and transmitting the dynamic pairing code to the second communications device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method for use in exchanging information between a first and a second communications devices, the method comprising:
-
at the first communications device; determining a first authentication score associated with a first information exchange session between the first and second devices determining a second authentication score associated with a second information exchange session between the first and second devices, the second information exchange after the first information exchange; combining the first and second authentication scores to create a combined authentication score; generating a dynamic pairing code responsive to the combined authentication score; sending the dynamic pairing code to the second communications device; and the dynamic pairing code for use by the first and second communications devices in association with one or more of the following, for carrying out subsequent authentication actions, for determining risk associated with exchanging information between the first and second communications devices, for encrypting information, and for assigning access levels to communications devices. - View Dependent Claims (15, 16, 17, 18, 19)
-
Specification