×

Consolidated multi-factor risk analysis

  • US 10,609,037 B2
  • Filed: 03/28/2017
  • Issued: 03/31/2020
  • Est. Priority Date: 03/28/2017
  • Status: Active Grant
First Claim
Patent Images

1. A tangible, non-transitory, machine-readable medium storing instructions that, when executed by one or more processors, effectuate operations comprising:

  • receiving, with one or more processors, via a network, an authentication request sent by a first computing device associated with and in possession of a user to be authenticated;

    determining, with one or more processors, a second computing device, different from the first computing device, associated with and in possession of the user based on a record created before receiving the authentication request;

    sending, with one or more processors, via a network, instructions to the second computing device that cause the second computing device to effectuate operations comprising;

    forming with the second computing device, or accessing in storage of the second computing device, an observed profile of the second computing device, wherein the observed profile is based on attributes of the second computing device, the attributes including;

    attributes of physical hardware of the second computing device,attributes of software installed on the second computing device,attributes of firmware installed on the second computing device, orusage attributes of the second computing device, andsending, via a network, the observed profile in response to receiving the instructions;

    receiving, with one or more processors, via a network, the observed profile;

    accessing, with one or more processors, a known profile of the second computing device formed, at least in part, before receiving the authentication request, wherein the known profile is based on the attributes of the second computing device;

    determining, with one or more processors, that the known profile corresponds to the observed profile based on correspondence between known and observed attributes of the second computing device;

    sending, with one or more processors, an authentication credential to either the second computing device or the first computing device;

    after sending the authentication credential, receiving, with one or more processors, the authentication credential from either the first computing device or the second computing device, wherein the authentication credential is received from a different computing device from the computing device to which the authentication credential was sent;

    in response to receiving the authentication credential and the determination that the known profile corresponds to the observed profile, determining, with one or more processors, that the user is authenticated; and

    sending, with one or more processors, via a network, a message indicating that the user is authenticated or granting access to resources in response to determining that the user is authenticated.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×