Security for emoji based commands
First Claim
Patent Images
1. A system for providing emoji based security, comprising:
- a non-transitory memory storing instructions; and
one or more hardware processors coupled to the non-transitory memory and configured to read the instructions from the non-transitory memory to cause the system to perform operations comprising;
obtaining a message comprising message data and payload data;
identifying a sender of the message based on the payload data;
analyzing the message data to extract an emoji image and text data;
determining that a security measure is required to authenticate the sender based on the extracted emoji image; and
in response to determining that a security measure is required to authenticate the sender, implementing an authentication procedure for authenticating the sender based at least in part on the extracted emoji image, the extracted text data, and a plurality of historic messages associated with the sender, wherein the authentication procedure comprises;
sending an authentication request to a user account associated with the sender,receiving an indication that the authentication request has been viewed, andsetting a response time window based at least in part on the indication.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method of security for emoji based actions. The system and method may include processes such as obtaining a first text associated with an emoji image and a second text, determining to implement a security measure based at least in part on the first text associated with the emoji image, and determining a security level based at least in part on the second text.
-
Citations
20 Claims
-
1. A system for providing emoji based security, comprising:
-
a non-transitory memory storing instructions; and one or more hardware processors coupled to the non-transitory memory and configured to read the instructions from the non-transitory memory to cause the system to perform operations comprising; obtaining a message comprising message data and payload data; identifying a sender of the message based on the payload data; analyzing the message data to extract an emoji image and text data; determining that a security measure is required to authenticate the sender based on the extracted emoji image; and in response to determining that a security measure is required to authenticate the sender, implementing an authentication procedure for authenticating the sender based at least in part on the extracted emoji image, the extracted text data, and a plurality of historic messages associated with the sender, wherein the authentication procedure comprises; sending an authentication request to a user account associated with the sender, receiving an indication that the authentication request has been viewed, and setting a response time window based at least in part on the indication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory machine readable medium having stored thereon machine readable instructions executable to cause a machine to perform operations comprising:
-
obtaining a message comprising message data and payload data; identifying a sender of the message based on the payload data; analyzing the message data to extract an emoji image and text data; determining that a security measure is required to authenticate the sender based on the extracted emoji image; and in response to determining that a security measure is required to authenticate the sender, implementing an authentication procedure for authenticating the sender based at least in part on the extracted emoji image, the extracted text data, and a plurality of historic messages associated with the sender, wherein the authentication procedure comprises; sending an authentication request to a user account associated with the sender, receiving an indication that the authentication request has been viewed, and setting a response time window based at least in part on the indication. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A computer implemented method of providing emoji based security, the method comprising:
-
obtaining, by one or more hardware processors, a message comprising message data and payload data; identifying, by the one or more hardware processors, a sender of the message based on the payload data; analyzing, by the one or more hardware processors, the message data to extract an emoji image and text data; determining, by the one or more hardware processors, that a security measure is required to authenticate the sender based on the extracted emoji image; and in response to determining that a security measure is required to authenticate the sender, implementing, by the one or more hardware processors, an authentication procedure for authenticating the sender based at least in part on the extracted emoji image, the extracted text data, and a plurality of historic messages associated with the sender, wherein the authentication procedure comprises; sending an authentication request to a user account associated with the sender, receiving an indication that the authentication request has been viewed, and setting a response time window based at least in part on the indication. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification