×

System and method for collecting and utilizing client data for risk assessment during authentication

  • US 10,366,218 B2
  • Filed: 03/18/2014
  • Issued: 07/30/2019
  • Est. Priority Date: 03/22/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method implemented on a client device comprising a memory for storing program code, and a processor for processing the program code to implement the method comprising:

  • collecting client configuration data on a client device using a native code agent running in a client operating system of the client device, the native code agent having secure access to the client configuration data, wherein the client configuration data is collected by the native code agent without disclosing confidential user information to a relying party;

    performing an assessment of the client configuration data on the client to determine a risk level associated with the client device, the client configuration data including;

    data related to client authentication hardware, including an indication of hardware to implement secure elements or trusted execution environments on the client;

    data related to the client operating system, including an indication of a current operating system version installed on the client device and how recently the client operating system has been updated;

    data related to anti-virus software configuration, including an indication of whether an anti-virus software has been installed and how recently the anti-virus software has been updated and/or executed; and

    data related to firewall configuration, including an indication of whether a firewall is installed and how recently the firewall has been updated;

    collecting biometric reference data of the user usable to authenticate the user and storing the biometric reference data in a secure storage of the authentication device used to collect the biometric reference data, the secure storage to cryptographically protect the biometric reference data of the user;

    performing authentication for a particular transaction in accordance with the risk level to determine an assurance level that a current user of the client is legitimate, the assurance level determined, at least in part, based on the risk level, and also determined based on a combination of one or more current or prior explicit user authentications using the authentication hardware and one or more non-intrusive authentication techniques;

    wherein for relatively higher risk levels, relatively more rigorous authentication techniques are selected to reach an assurance level required for the transaction as specified by the relying party, and for relatively lower risk levels, relatively less rigorous authentication techniques are selected to reach the assurance level required for the transaction as specified by the relying party; and

    permitting the transaction when the authentication techniques selected to reach the assurance level required for the transaction as specified by the relying party are successfully completed and denying the transaction when the authentication techniques selected to reach the assurance level required for the transaction as specified by the relying party are not successfully completed.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×