Scalable context-based authentication
First Claim
1. A method for authenticating a user, the method comprising:
- determining, based on an authentication policy and a context, whether a predetermined combination of a number of keys and types of keys from at least one group of keys are present at a time when the user wishes to access a resource; and
successfully authenticating the user when the predetermined combination of the number of keys and types of keys from the at least one group of keys are present at the time when the user wishes to access the resource.
2 Assignments
0 Petitions
Accused Products
Abstract
A portable processing device or system may permit a user to access a resource when a certain number of keys are present, according to an authentication policy and a context in which the certain number of keys are provided. In some contexts fewer or no keys may be required, while in other contexts more keys may be required. The authentication policy may be adaptable, such that a precautionary action may be taken when a previously unused combination of keys and a context are used. Further, the authentication policy may require a fewer number of keys close to a time of a last successful authentication and may require a larger number of keys as time passes since the last successful authentication. In some embodiments, a type of visual feedback of entered password text may change based on a security level.
-
Citations
20 Claims
-
1. A method for authenticating a user, the method comprising:
-
determining, based on an authentication policy and a context, whether a predetermined combination of a number of keys and types of keys from at least one group of keys are present at a time when the user wishes to access a resource; and successfully authenticating the user when the predetermined combination of the number of keys and types of keys from the at least one group of keys are present at the time when the user wishes to access the resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A tangible machine-readable medium having recorded thereon instructions for at least one processor, the machine-readable medium comprising:
-
instructions for receiving a password as text input; instructions for providing one of a plurality of types of visual feedback as the password is received, at least some of the plurality of types of visual feedback are associated with a security level; and instructions for providing a different one of the plurality of types of visual feedback as the password is received based on a selected security level, a selected type of visual feedback, or an authentication policy. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A processing device comprising:
-
at least one processor; a bus; and a memory including instructions for the at least one processor, the bus connecting the at least one processor and the memory, the instructions further comprising; instructions for adapting an authentication policy for accessing a resource based on a pattern with respect to keys provided when attempting to access the resource and a context when attempting to access the resource, the instructions for adapting an authentication policy for accessing a resource further includes instructions for adjusting a security level of the authentication policy, and instructions for providing feedback when one of the keys is provided as textual input, a type of feedback being provided being based on the security level of the authentication policy. - View Dependent Claims (17, 18, 19, 20)
-
Specification