×

Event-based security challenges

  • US 10,083,284 B2
  • Filed: 03/28/2016
  • Issued: 09/25/2018
  • Est. Priority Date: 07/18/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving, at a first computing device comprising a processor and from a second computing device that hosts a resource, a request for a challenge question and a response to the challenge question, wherein the challenge question and the response are used by the second computing device to authenticate a user associated with a user device that has requested access to the resource; and

    in response to receiving the request for the challenge question and the response,accessing, by the first computing device, event data that relates to an event associated with the user of the user device,determining, by the first computing device and based on a setting associated with the user and based on a resource type associated with the resource, a difficultly level to be required for the response to the challenge question, wherein the difficulty level comprises a degree of accuracy,generating, by the first computing device, the challenge question based upon the event data and the difficulty level,generating, by the first computing device, the response based upon the event data and the difficulty level, the response comprising a valid response to the challenge question, andproviding, by the first computing device and to the second computing device, the challenge question and the response.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×