×

Adjusting multi-factor authentication using context and pre-registration of objects

  • US 10,057,289 B2
  • Filed: 08/12/2013
  • Issued: 08/21/2018
  • Est. Priority Date: 08/12/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method for authenticating a user device requesting access to a system or network resource of an entity, said method comprising:

  • determining, via said user device, that a first context of a user of said user device has been met, the first context having a first pre-defined authentication value;

    determining, via said user device, that at least a second context of the user of said user device has been met, the second context having a second pre-defined authentication value;

    computing an aggregated authentication value from at least the first and second pre-defined authentication values;

    determining a required authentication value, the required authentication value comprising a minimum value that is required to authenticate the user of said user device;

    comparing the required authentication value to the aggregated authentication value;

    determining based on the comparison that the aggregated authentication value does not meet the required authentication value;

    in response to determining based on the comparison that the aggregated authentication value does not meet the required authentication value, determining a difference between the required authentication value and the aggregated authentication value;

    identifying, based on the difference, a first authentication challenge to be used for authentication of the user from a plurality of authentication challenges, each of the plurality of authentication challenges having a pre-defined authentication value, the first authentication challenge having a third pre-defined authentication value that, when aggregated with the aggregated authentication value, is sufficient to meet the required authentication value, the first authentication challenge having a reduced complexity as compared to a second authentication challenge of the plurality of authentication challenges, the second authentication challenged having a fourth pre-defined authentication value that is, on its own, sufficient to meet the required authentication value without the determination that the first and second contexts have been met; and

    presenting the first authentication challenge to the user of said user device as an authentication challenge that the user is required to meet for authentication.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×