SYSTEM AND METHOD FOR LOCATION-AWARE SOCIAL NETWORKING AUTHENTICATION
First Claim
1. A method comprising:
- receiving a request for a security token from a requestor;
identifying, for the request, an executor and a trustee from social network contacts of the requestor;
generating, via a processing device, a challenge question based on location history information common to the requestor, the executor, and the trustee;
presenting the challenge question to the executor and to the trustee;
receiving an executor response from the executor and a trustee response from the trustee; and
when the executor response and the trustee response match, transmitting the security token to the requestor.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for performing authentication via social networking data. A system configured to perform the example method first receives a request for a security token from a requestor. The system identifies, for the request, an executor and a trustee from social network contacts of the requestor. The system generates a challenge question based on location history information common to the requestor, the executor, and the trustee. The system presents the challenge question to the executor and to the trustee. The system receives an executor response from the executor and a trustee response from the trustee, and when the executor response and the trustee response match, transmits the security token to the requestor.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving a request for a security token from a requestor; identifying, for the request, an executor and a trustee from social network contacts of the requestor; generating, via a processing device, a challenge question based on location history information common to the requestor, the executor, and the trustee; presenting the challenge question to the executor and to the trustee; receiving an executor response from the executor and a trustee response from the trustee; and when the executor response and the trustee response match, transmitting the security token to the requestor. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system comprising:
-
a processor; a memory having stored therein instructions which, when executed by the processor, cause the processor to perform a method comprising; receiving a request for a security token from a requestor; identifying, for the request, an executor and a plurality of trustees from social network contacts of the requestor; generating respective challenge questions based on location history information common to the requestor, the executor, and each respective trustee of the plurality of trustees; presenting each respective challenge question to the executor and to each respective trustee of the plurality of trustees; receiving an executor response from the executor and respective trustee responses from at least some of the plurality of trustees; and when the executor response and at least a threshold quantity of respective trustee responses match, transmitting the security token to the requestor. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A non-transitory computer-readable storage medium having stored therein instructions which, when executed by a processing device, cause the processing device to perform steps comprising:
-
receiving a request for a security token from a requestor; identifying, for the request, an executor and a trustee from social network contacts of the requestor; generating a challenge question based on location history information common to the requestor, the executor, and the trustee; presenting the challenge question to the executor and to the trustee; receiving an executor response from the executor and a trustee response from the trustee; and when the executor response and the trustee response match, transmitting the security token to the requestor. - View Dependent Claims (17, 18, 19, 20)
-
Specification