×

Dynamic generation of risk score thresholds for optimized configuration of policy rules in an adaptive authentication service

  • US 10,147,065 B1
  • Filed: 03/30/2015
  • Issued: 12/04/2018
  • Est. Priority Date: 03/30/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for optimized configuration of an adaptive authentication service, comprising executing, on at least one processor, the steps of:

  • automatically maintaining, in a memory communicably coupled to the at least one processor, a log storing data describing previously processed authentication requests and risk scores associated with those previously processed authentication requests;

    generating, using the log storing data describing the previously processed authentication requests and the risk scores associated with those previously processed authentication requests, a transactions risk distribution for an upcoming time period, wherein the transactions risk distribution for the upcoming time period comprises, for each one of a plurality of risk scores in a range of possible risk scores, a number of previous transactions for which that risk score was generated by the adaptive authentication service during a preceding time period, wherein each risk score indicates a probability that an associated authentication request is fraudulent, and wherein the transactions risk distribution further comprises, for each one of a plurality of probabilities, a predicted number of authentication requests received during the upcoming time period for which that probability will be generated as the probability that the authentication request is fraudulent;

    generating, responsive to the transactions risk distribution for the upcoming time period, at least one risk score threshold for the upcoming time period that minimizes business damages estimated to occur during the upcoming time period, wherein the business damages estimated to occur during the upcoming time period include business damages resulting from false negative authentication determinations, wherein each of the false negative authentication determinations incorrectly indicates that a fraudulent authentication request is legitimate;

    automatically configuring at least one policy rule of the adaptive authentication service with the risk score threshold to provide an optimized configuration of the adaptive authentication service, wherein configuring the at least one policy rule of the adaptive authentication service with the risk score threshold includes storing the risk score threshold in the policy rule;

    in response to the risk score threshold in the policy rule, requiring authentication requests having associated risk scores greater than the risk score threshold to go through at least one additional stage of authentication processing after completing an initial stage of authentication processing;

    wherein the business damages estimated to occur during the upcoming time period further include business damages resulting from false positive authentication determinations, wherein each of the false positive authentication determinations incorrectly indicates that a legitimate authentication request is fraudulent;

    wherein the business damages estimated to occur during the upcoming time period are offset by a beneficial value resulting from true positive authentication determinations, wherein each true positive determination correctly indicates that an authentication request is fraudulent;

    wherein the business damages resulting from false negative authentication determinations comprises a result of multiplying i) a probability of a false negative authentication determination occurring during the upcoming time period using the risk threshold, and ii) a predetermined withdrawal transaction amount that is the same for all authentication requests;

    wherein the business damages resulting from false positive authentication determination comprises a result of multiplying i) a probability of a false positive authentication determination occurring during the upcoming time period using the risk threshold, and ii) a predetermined bothering damage amount that is an estimation of costs resulting from losing a customer who is forced to go through at least one additional stage of authentication processing after completing the initial stage of authentication processing;

    wherein the initial stage of authentication processing comprises requiring a user requesting access to a secure resource to correctly enter their username and password; and

    wherein the at least one additional stage of authentication processing required to be performed after completion of the initial stage of authentication processing for requests having associated risk scores greater than the risk score threshold comprises requiring the user to correctly answer questions presented through text messaging.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×