Authentication Using Transient Event Data
First Claim
1. A computer readable medium storing a computer program for execution by a processing unit, the computer program for authenticating a user, the computer program comprising sets of instructions for:
- receiving a notification that a remote user is unable to provide correct authentication information for accessing a set of application servers;
generating authentication questions for the remote user using transient event data regarding previous interactions of the remote user with the application servers, the authentication questions for presentation to the remote user; and
validating the remote user based on answers to the authentication questions.
1 Assignment
0 Petitions
Accused Products
Abstract
Some embodiments provide a method for authenticating a user to access computing resources that uses transient event data regarding previous interactions of the user with the computing resources. The method receives a notification that a user is unable to provide a correct user identifier and password. The method generates authentication questions for the remote user using the transient event data. The authentication questions are presented to the user. The method authenticates the user based on answers to the password recovery questions. The user may be a remote user and the computing resources are a set of application servers to which the user has forgotten a password. The computing resources may be a portable device that the user wishes to access remotely in order to delete data from the portable device.
-
Citations
27 Claims
-
1. A computer readable medium storing a computer program for execution by a processing unit, the computer program for authenticating a user, the computer program comprising sets of instructions for:
-
receiving a notification that a remote user is unable to provide correct authentication information for accessing a set of application servers; generating authentication questions for the remote user using transient event data regarding previous interactions of the remote user with the application servers, the authentication questions for presentation to the remote user; and validating the remote user based on answers to the authentication questions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computer readable medium storing a computer program which when executed by a processing unit contacts a portable device, the computer program comprising sets of instructions for:
-
receiving a notification that a user of the portable device wants to remove personal data from the portable device; connecting remotely to the portable device; retrieving transient event data regarding previous interactions of the user with the portable device; generating authentication questions for the user based on the retrieved transient event data, the authentication questions for presentation to the user; and when the user answers enough of the authentication questions correctly, initiating a procedure on the portable device to remove personal data from the device. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23)
-
-
24. A method comprising:
-
defining a first module for (i) locating and connecting to a portable device through a network, (ii) retrieving transient event data from the portable device that relates to a user'"'"'s interactions with the portable device, and (iii) upon authentication of the user, initiating a process on the portable device to remove user data from the portable device; and defining a second module for (i) generating authentication questions using the transient event data and (ii) authenticating the user based on responses to the generated authentication questions. - View Dependent Claims (25, 26, 27)
-
Specification