Self-adjusting multifactor network authentication
First Claim
1. A network authentication system, comprising:
- a cloud server implemented in hardware, configured to;
store information linked with one or more accounts for a user;
receive a request for user history for the user from an authentication server; and
send the requested user history information for the user to the authentication server; and
an authentication server implemented in hardware, wherein the authentication server is in signal communication with the cloud server, and configured to;
receive an authentication key request from a user device, wherein the authentication key request identifies an account linked with the user;
obtain an authentication key in response to receiving the authentication key request;
establish a first set of authentication rules for the authentication key, wherein the first set of authentication rules identifies;
a first number of authentication rules selected by the user; and
an authentication type for each authentication rule in the first set of authentication rules selected by the user;
identify one or more triggering events for the account, wherein a triggering event is an event associated with an increased threat to the account;
establish a second set of authentication rules for the authentication key, wherein;
the second set of authentication rules identifies;
a second number of authentication rules; and
an authentication type for each authentication rule in the second set of authentication rules; and
the second set of authentication rules is different from the first set of authentication rules;
configure key validation for the authentication key using the first set of authentication rules;
send the authentication key to the user device;
detect a triggering event from the one or more triggering events has occurred; and
configure the key validation for the authentication key using the second set of authentication rules in response to detecting the triggering event.
1 Assignment
0 Petitions
Accused Products
Abstract
A network authentication device that includes an authentication engine. The authentication engine is configured to receive an authentication key request from a user device that identifies an account. The authentication engine is configured to obtain an authentication key and to establish a first set of authentication rules for the authentication key. The authentication engine is configured to identify one or more triggering events associated with an increased threat to the account and to establish a second set of authentication rules for the authentication key. The authentication engine is configured to perform key validation for the authentication key using the first set of authentication rules and to send the authentication key to the user device. The authentication engine is configured to detect a triggering event from the one or more triggering events has occurred and perform the key validation for the authentication key using the second set of authentication rules.
25 Citations
20 Claims
-
1. A network authentication system, comprising:
-
a cloud server implemented in hardware, configured to; store information linked with one or more accounts for a user; receive a request for user history for the user from an authentication server; and send the requested user history information for the user to the authentication server; and an authentication server implemented in hardware, wherein the authentication server is in signal communication with the cloud server, and configured to; receive an authentication key request from a user device, wherein the authentication key request identifies an account linked with the user; obtain an authentication key in response to receiving the authentication key request; establish a first set of authentication rules for the authentication key, wherein the first set of authentication rules identifies; a first number of authentication rules selected by the user; and an authentication type for each authentication rule in the first set of authentication rules selected by the user; identify one or more triggering events for the account, wherein a triggering event is an event associated with an increased threat to the account; establish a second set of authentication rules for the authentication key, wherein; the second set of authentication rules identifies; a second number of authentication rules; and an authentication type for each authentication rule in the second set of authentication rules; and the second set of authentication rules is different from the first set of authentication rules; configure key validation for the authentication key using the first set of authentication rules; send the authentication key to the user device; detect a triggering event from the one or more triggering events has occurred; and configure the key validation for the authentication key using the second set of authentication rules in response to detecting the triggering event. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A network authentication device comprising:
-
a network interface in signal communication with one or more user devices associated with a user; and an authentication engine implemented in hardware, wherein the authentication server is in signal communication with the network interface, and configured to; receive an authentication key request from the user device, wherein the authentication key request identifies an account linked with the user; obtain an authentication key in response to receiving the authentication key request; establish a first set of authentication rules for the authentication key, wherein the first set of authentication rules identifies; a first number of authentication rules selected by the user; and an authentication type for each authentication rule in the first set of authentication rules selected by the user; identify one or more triggering events for the account, wherein a triggering event is an event associated with an increased threat to the account; establish a second set of authentication rules for the authentication key, wherein; the second set of authentication rules identifies; a second number of authentication rules; and an authentication type for each authentication rule in the second set of authentication rules; and the second set of authentication rules is different from the first set of authentication rules; configure key validation for the authentication key using the first set of authentication rules; send the authentication key to the user device; detect a triggering event from the one or more triggering events has occurred; and configure the key validation for the authentication key using the second set of authentication rules in response to detecting the triggering event. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. An authentication method, comprising:
-
receiving, by an authentication server, an authentication key request from a user device, wherein the authentication key request identifies an account linked with the user; obtaining, by the authentication server, an authentication key in response to receiving the authentication key request; establishing, by the authentication server, a first set of authentication rules for the authentication key, wherein the first set of authentication rules identifies; a first number of authentication rules selected by the user; and an authentication type for each authentication rule in the first set of authentication rules selected by the user; identifying, by the authentication server, one or more triggering events for the account, wherein a triggering event is an event associated with an increased threat to the account; establishing, by the authentication server, a second set of authentication rules for the authentication key, wherein; the second set of authentication rules identifies; a second number of authentication rules; and an authentication type for each authentication rule in the second set of authentication rules; and the second set of authentication rules is different from the first set of authentication rules; configuring, by the authentication server, key validation for the authentication key using the first set of authentication rules; sending, by the authentication server, the authentication key to the user device; detecting, by the authentication server, a triggering event from the one or more triggering events has occurred; and configuring, by the authentication server, the key validation for the authentication key using the second set of authentication rules in response to detecting the triggering event. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification