USING SOCIAL INFORMATION FOR AUTHENTICATING A USER SESSION
First Claim
1. A computer implemented method for authenticating a request for access to a computing resource, the method comprising:
- receiving a request from a requester for access to a computing resource, wherein the request identifies a member;
obtaining information related to the member'"'"'s connections on a social network and forming a challenge question, wherein an answer to the challenge question is based at least in part on the obtained information related to the member'"'"'s connections on the social network;
sending the challenge question to the requester; and
responsive to receiving a correct answer to the challenge question, allowing the requested access.
2 Assignments
0 Petitions
Accused Products
Abstract
A social CAPTCHA is presented to authenticate a member of the social network. The social CAPTCHA includes one or more challenge questions based on information available in the social network, such as the user'"'"'s activities and/or connections in the social network. The social information selected for the social CAPTCHA may be determined based on affinity scores associated with the member'"'"'s connections, so that the challenge question relates to information that the user is more likely to be familiar with. A degree of difficulty of challenge questions may be determined and used for selecting the CAPTCHA based on a degree of suspicion.
287 Citations
39 Claims
-
1. A computer implemented method for authenticating a request for access to a computing resource, the method comprising:
-
receiving a request from a requester for access to a computing resource, wherein the request identifies a member; obtaining information related to the member'"'"'s connections on a social network and forming a challenge question, wherein an answer to the challenge question is based at least in part on the obtained information related to the member'"'"'s connections on the social network; sending the challenge question to the requester; and responsive to receiving a correct answer to the challenge question, allowing the requested access. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer implemented method for generating a challenge question based on information related to a member, the method comprising:
-
receiving a request from a requester for generating a challenge question based on information related to a member; obtaining information related to the member'"'"'s connections on a social network and forming a challenge question, wherein an answer to the challenge question is based at least in part on the obtained information related to the member'"'"'s connections on the social network; and sending the challenge question to the requester. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A computer implemented method for authenticating a request for access to a computing resource, the method comprising:
-
receiving a request from a requester for access to a computing resource, wherein the request identifies a member; sending a request for a challenge question, wherein an answer to the challenge question is based at least in part on the obtained information related to the member'"'"'s connections on the social network receiving the challenge question and sending the challenge question to the requestor; and responsive to receiving a correct answer to the challenge question, allowing the requested access. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
-
39. A computer program product having a computer-readable storage medium storing computer-executable code for authenticating a request for access to a computing resource, the code comprising:
-
a web server module configured to; receive a request from a requester for access to a computing resource, wherein the request identifies a member; a CAPTCHA manager module configured to; obtain information related to the member'"'"'s connections on a social network and forming a challenge question, wherein an answer to the challenge question is based at least in part on the obtained information related to the member'"'"'s connections on the social network; and the web server module further configured to; send the challenge question to the requester; and responsive to receiving a correct answer to the challenge question, allow the requested access.
-
Specification