User authentication
First Claim
Patent Images
1. A method comprising steps of:
- receiving a request to access a first application on a device;
determining a level of sensitivity associated with the first application in response to receiving the request, wherein the level of sensitivity is represented by a first sensitivity value;
determining that access has previously been granted to a second application on the device or on another device, wherein the second application is different to the first application;
determining a differential between the first sensitivity value and a second sensitivity value in connection with the second application, wherein the differential describes a difference in sensitivity between the first and second applications;
determining that the first sensitivity value is within a predetermined sensitivity value range;
selecting an authentication method for use as part of an authentication operation in connection with the request, wherein the selection of the authentication method is based on the determined differential and the said determination that the first sensitivity value is within the predetermined sensitivity value range; and
applying the selected authentication method in connection with the request as part of an authentication operation that determines whether to grant the request to access the first application on the device;
wherein the steps are performed by at least one processing device comprising a processor coupled to a memory.
9 Assignments
0 Petitions
Accused Products
Abstract
There are disclosed herein techniques for use in authentication. In one embodiment, the techniques include a method comprising several steps. The method comprises receiving a request to access an application. The method also comprises determining a level of sensitivity associated with the application. The method further comprises selecting an authentication method based on the level of sensitivity. The method still further comprises utilizing the authentication method during an authentication operation to determine whether to grant access to the application.
10 Citations
11 Claims
-
1. A method comprising steps of:
-
receiving a request to access a first application on a device; determining a level of sensitivity associated with the first application in response to receiving the request, wherein the level of sensitivity is represented by a first sensitivity value; determining that access has previously been granted to a second application on the device or on another device, wherein the second application is different to the first application; determining a differential between the first sensitivity value and a second sensitivity value in connection with the second application, wherein the differential describes a difference in sensitivity between the first and second applications; determining that the first sensitivity value is within a predetermined sensitivity value range; selecting an authentication method for use as part of an authentication operation in connection with the request, wherein the selection of the authentication method is based on the determined differential and the said determination that the first sensitivity value is within the predetermined sensitivity value range; and applying the selected authentication method in connection with the request as part of an authentication operation that determines whether to grant the request to access the first application on the device; wherein the steps are performed by at least one processing device comprising a processor coupled to a memory. - View Dependent Claims (2, 3, 4)
-
-
5. A system, comprising:
-
at least one processing device, said at least one processing device comprising a processor coupled to a memory;
wherein the system is configured to;receive a request to access a first application on a device; determine a level of sensitivity associated with the first application in response to receiving the request, wherein the level of sensitivity is represented by a first sensitivity value; determine that access has previously been granted to a second application on the device or on another device, wherein the second application is different to the first application; determine a differential between the first sensitivity value and a second sensitivity value in connection with the second application, wherein the differential describes a difference in sensitivity between the first and second applications; determine that the first sensitivity value is within a predetermined sensitivity value range; select an authentication method for use as part of an authentication operation in connection with the request, wherein the selection of the authentication method is based on the determined differential and the said determination that the first sensitivity value is within the predetermined sensitivity value range; and apply the selected authentication method in connection with the request as part of an authentication operation that determines whether to grant the request to access the first application on the device. - View Dependent Claims (6, 7, 8)
-
-
9. A non-transitory computer-readable storage medium having stored thereon computer executable instructions that when executed by a processor of a computer perform steps comprising:
-
receiving a request to access a first application on a device; determining a level of sensitivity associated with the first application in response to receiving the request, wherein the level of sensitivity is represented by a first sensitivity value; determining that access has previously been granted to a second application on the device or on another device, wherein the second application is different to the first application; determining a differential between the first sensitivity value and a second sensitivity value in connection with the second application, wherein the differential describes a difference in sensitivity between the first and second applications; determining that the first sensitivity value is within a predetermined sensitivity value range; selecting an authentication method for use as part of an authentication operation in connection with the request, wherein the selection of the authentication method is based on the determined differential and the said determination that the first sensitivity value is within the predetermined sensitivity value range; and applying the selected authentication method in connection with the request as part of an authentication operation that determines whether to grant the request to access the first application on the device. - View Dependent Claims (10, 11)
-
Specification