Event-based security challenges
First Claim
Patent Images
1. A method comprising:
- receiving, at a first computing device comprising a processor and from a second computing device that hosts a resource, a request for a challenge question and a response to the challenge question, wherein the challenge question and the response are used by the second computing device to authenticate a user associated with a user device that has requested access to the resource; and
in response to receiving the request for the challenge question and the response,accessing, by the first computing device, event data that relates to an event associated with the user of the user device,determining, by the first computing device and based on a setting associated with the user and based on a resource type associated with the resource, a difficultly level to be required for the response to the challenge question, wherein the difficulty level comprises a degree of accuracy,generating, by the first computing device, the challenge question based upon the event data and the difficulty level,generating, by the first computing device, the response based upon the event data and the difficulty level, the response comprising a valid response to the challenge question, andproviding, by the first computing device and to the second computing device, the challenge question and the response.
1 Assignment
0 Petitions
Accused Products
Abstract
Concepts and technologies are disclosed herein for event-based security challenges. A computer can execute a security application. The computer can receive a request for authentication information associated with a user device. The computer can access event data corresponding to the user device. The computer can generate, based upon the event data, a challenge question and a response to the challenge question. The computer can provide data indicating the challenge question and the response to a requestor associated with the request.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving, at a first computing device comprising a processor and from a second computing device that hosts a resource, a request for a challenge question and a response to the challenge question, wherein the challenge question and the response are used by the second computing device to authenticate a user associated with a user device that has requested access to the resource; and in response to receiving the request for the challenge question and the response, accessing, by the first computing device, event data that relates to an event associated with the user of the user device, determining, by the first computing device and based on a setting associated with the user and based on a resource type associated with the resource, a difficultly level to be required for the response to the challenge question, wherein the difficulty level comprises a degree of accuracy, generating, by the first computing device, the challenge question based upon the event data and the difficulty level, generating, by the first computing device, the response based upon the event data and the difficulty level, the response comprising a valid response to the challenge question, and providing, by the first computing device and to the second computing device, the challenge question and the response. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
a first computing device comprising a processor; and a memory that stores computer-executable instructions that, when executed by the processor, cause the processor to perform operations comprising receiving, at the first computing device and from a second computing device that hosts a resource, a request for a challenge question and a response to the challenge question, wherein the challenge question and the response are used by the second computing device to authenticate a user associated with a user device that has requested access to the resource, and in response to receiving the request for the challenge question and the response, accessing event data that relates to an event associated with the user of the user device, determining, based on a setting associated with the user and based on a resource type associated with the resource, a difficultly level to be required for the response to the challenge question, wherein the difficulty level comprises a degree of accuracy, generating the challenge question based upon the event data and the difficulty level, generating the response based upon the event data and the difficulty level, the response comprising a valid response to the challenge question, and providing, to the second computing device, the challenge question and the response. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A computer storage medium having computer-executable instructions stored thereon that, when executed by a processor, cause the processor to perform operations comprising:
-
receiving, at a first computing device and from a second computing device that hosts a resource, a request for a challenge question and a response to the challenge question, wherein the challenge question and the response are used by the second computing device to authenticate a user associated with a user device that has requested access to the resource; and in response to receiving the request for the challenge question and the response, accessing event data that relates to an event associated with the user of the user device, determining, based on a setting associated with the user and based on a resource type associated with the resource, a difficultly level to be required for the response to the challenge question, wherein the difficulty level comprises a degree of accuracy, generating the challenge question based upon the event data and the difficulty level, generating the response based upon the event data and the difficulty level, the response comprising a valid response to the challenge question, and providing, to the second computing device, the challenge question and the response. - View Dependent Claims (17, 18, 19, 20)
-
Specification