Systems and methods for enhanced security based on user vulnerability
First Claim
Patent Images
1. A computing system comprising:
- a network circuit enabling the computing system to exchange information over a network;
a user database storing information pertaining to various user accounts for a plurality of users; and
a risk assessment circuit configured to;
search, by the network circuit over the network, at least one data source to identify a user attribute;
determine the user attribute is related to a first security credential that is either associated with or potentially associated with a user account;
generate a security prompt responsive to the determination, the security prompt either instructing the user to update information associated with the first security credential or instructing the user to input information regarding a second security credential different from the first security credential;
transmit, by the network circuit over the network, the security prompt to a user computing device associated with the user;
receive, by the network circuit, a request to register a user account, wherein the user database includes no information pertaining to an existing user account associated with the user prior to receiving the request;
provide, by the network interface, a registration interface to the user computing device, the registration interface requesting registration information from the user and prompting the user to input a first username;
receive, by the network interface, user registration information comprising a first username, wherein a first security credential includes a username;
search based on the received user registration information including the first username; and
determine that the user used the first username in association with another user account associated with a data source, wherein the security prompt instructs the user to update information associated with the first security credential by requesting the user to input an alternative username.
1 Assignment
0 Petitions
Accused Products
Abstract
A computing system includes a network circuit enabling the computing system to exchange information over a network, a customer database storing information pertaining to various user accounts pertaining to a plurality of users, and a risk assessment circuit. The risk assessment circuit is configured search at least one data source to identify a user attribute, determine that the user attribute bears a relationship to a first security credential that is either associated with or potentially associated with a user account, generate a security prompt responsive to the determination, and transmit the security prompt to a user computing device associated with the user.
-
Citations
15 Claims
-
1. A computing system comprising:
-
a network circuit enabling the computing system to exchange information over a network; a user database storing information pertaining to various user accounts for a plurality of users; and a risk assessment circuit configured to; search, by the network circuit over the network, at least one data source to identify a user attribute; determine the user attribute is related to a first security credential that is either associated with or potentially associated with a user account; generate a security prompt responsive to the determination, the security prompt either instructing the user to update information associated with the first security credential or instructing the user to input information regarding a second security credential different from the first security credential; transmit, by the network circuit over the network, the security prompt to a user computing device associated with the user; receive, by the network circuit, a request to register a user account, wherein the user database includes no information pertaining to an existing user account associated with the user prior to receiving the request; provide, by the network interface, a registration interface to the user computing device, the registration interface requesting registration information from the user and prompting the user to input a first username; receive, by the network interface, user registration information comprising a first username, wherein a first security credential includes a username; search based on the received user registration information including the first username; and determine that the user used the first username in association with another user account associated with a data source, wherein the security prompt instructs the user to update information associated with the first security credential by requesting the user to input an alternative username. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-implemented method, comprising:
-
searching, by a computing system, a data source to identify a user attribute; determining, by the computing system, that the attribute is related to a first security credential that is either associated with or potentially associated with a user account; generating, by the computing system, a security prompt responsive to the determination, the security prompt either instructing the user to update information associated with the first security credential or instructing the user to input information regarding a second security credential that is different from the first security credential; transmitting, by the computing system, the security prompt to a user computing device associated with the user; receiving, by the computing system, a request to register for a new user account; transmitting, by the computing system, a registration interface to the user computing device, the registration interface requesting registration information from the user; receiving, by the network interface, user registration information, wherein searching is performed based on the received user registration information; receiving, by the computing system, user-input information regarding the second security credential; determining, by the computing system, that the user-input information is not stored at a data source; and storing, by the computing system, the user-input information as a security credential associated with a newly-created user account in an account database. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A computer-implemented method, comprising:
-
searching, by a computing system, a data source to identify a user attribute; determining, by the computing system, that the attribute is related to a first security credential that is either associated with or potentially associated with a user account; generating, by the computing system, a security prompt responsive to the determination, the security prompt either instructing the user to update information associated with the first security credential or instructing the user to input information regarding a second security credential that is different from the first security credential; transmitting, by the computing system, the security prompt to a user computing device associated with the user; receiving, by the computing system, a request to register for a new user account; transmitting, by the computing system, a registration interface to the user computing device, the registration interface requesting registration information from the user; and receiving, by the network interface, user registration information, wherein the searching is performed based on the received user registration information, wherein the registration interface prompts the user to input a first username, the received user registration information includes a first username, wherein the identified user attribute includes determining that the user used the first username in association with another user account associated with a data source and the first security credential includes a username, wherein the security prompt instructs the user to update information associated with the first security credential by requesting the user to input an alternative username.
-
-
14. A non-transitory computer readable media having computer-executable instructions embodied therein that, when executed by a risk assessment circuit of a computing system, causes the computing system to perform operations to identify a user security vulnerability, the operations comprising:
-
searching a data source to identify a user attribute; determining that the user attribute is related to a first security credential that is either associated with or potentially associated with a user account; generating a security prompt responsive to the determination, the security prompt either instructing the user to update information associated with the first security credential or instructing the user to input information regarding a second security credential that is different from the first security credential; transmitting the security prompt to a user computing device associated with the user; receiving a request to register for a new user account; transmitting a registration interface to the user computing device, the registration interface requesting registration information from the user; receiving user registration information, wherein searching is performed based on the received user registration information; receiving user-input information regarding the second security credential; determining that the user-input information is not stored at a data source; and storing, by the computing system, the user-input information as a security credential associated with a newly-created user account in an account database. - View Dependent Claims (15)
-
Specification