×

Self-adjusting multifactor network authentication

  • US 10,462,126 B2
  • Filed: 08/17/2017
  • Issued: 10/29/2019
  • Est. Priority Date: 08/17/2017
  • Status: Active Grant
First Claim
Patent Images

1. A network authentication system, comprising:

  • a cloud server implemented in hardware, configured to;

    store information linked with one or more accounts for a user;

    receive a request for user history for the user from an authentication server; and

    send the requested user history information for the user to the authentication server; and

    an authentication server implemented in hardware, wherein the authentication server is in signal communication with the cloud server, and configured to;

    receive an authentication key request from a user device, wherein the authentication key request identifies an account linked with the user;

    obtain an authentication key in response to receiving the authentication key request;

    establish a first set of authentication rules for the authentication key, wherein the first set of authentication rules identifies;

    a first number of authentication rules selected by the user; and

    an authentication type for each authentication rule in the first set of authentication rules selected by the user;

    identify one or more triggering events for the account, wherein a triggering event is an event associated with an increased threat to the account;

    establish a second set of authentication rules for the authentication key, wherein;

    the second set of authentication rules identifies;

    a second number of authentication rules; and

    an authentication type for each authentication rule in the second set of authentication rules; and

    the second set of authentication rules is different from the first set of authentication rules;

    configure key validation for the authentication key using the first set of authentication rules;

    send the authentication key to the user device;

    detect a triggering event from the one or more triggering events has occurred; and

    configure the key validation for the authentication key using the second set of authentication rules in response to detecting the triggering event.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×