Authentication Frequency And Challenge Type Based On Environmental And Physiological Properties
First Claim
1. A method comprising:
- presenting a first authentication challenge at time t1; and
presenting a second authentication challenge at time t2;
wherein the magnitude of t2-t1 is based on an environmental property at one or more instants in time interval [t1, t2].
23 Assignments
0 Petitions
Accused Products
Abstract
An apparatus and method are disclosed for determining authentication frequency (i.e., the length of time between authenticating and re-authenticating a user) and challenge type (e.g., username/password, fingerprint recognition, voice recognition, etc.) based on one or more environmental properties (e.g., ambient noise level, ambient luminosity, temperature, etc.), or one or more physiological properties of a user (e.g., heart rate, blood pressure, etc.), or both. Advantageously, the illustrative embodiment enables authentication frequency and challenge type to be adjusted based on the likelihood of malicious activity, as inferred from these properties. In addition, the illustrative embodiment enables the authentication challenge type to be tailored to particular environmental conditions (e.g., noisy environments, dark environments, etc.).
65 Citations
20 Claims
-
1. A method comprising:
-
presenting a first authentication challenge at time t1; and presenting a second authentication challenge at time t2; wherein the magnitude of t2-t1 is based on an environmental property at one or more instants in time interval [t1, t2]. - View Dependent Claims (2, 3, 4, 5)
-
- 6. A method comprising generating an authentication challenge whose type is based on an environmental property.
-
11. A method comprising:
-
presenting a first authentication challenge to a user at time t1; and presenting a second authentication challenge to a user at time t2; wherein the magnitude of t2-t1 is based on a physiological property of said user at one or more instants in time interval [t1, t2]. - View Dependent Claims (12, 13, 14, 15, 18, 19, 20)
-
- 16. A method comprising generating an authentication challenge whose type is based on a physiological property of a user.
Specification