RANDOM CHALLENGE ACTION FOR AUTHENTICATION OF DATA OR DEVICES
First Claim
Patent Images
1. A method, comprising:
- requesting authentication information for an individual;
receiving authentication information for the individual;
presenting the individual with a random challenge action;
receiving a response to the challenge action from the individual; and
authenticating the individual based at least on the authentication information and the challenge action response.
3 Assignments
0 Petitions
Accused Products
Abstract
An authentication system is enhanced by prompting an individual to perform a randomly-selected challenge action. For example, the individual may be requested to move the device in a particular motion, after entering a username/password combination. The randomly-selected challenge action verifies the individual is located at the device, which prevents automated attacks to steal the individual'"'"'s identity. The challenge action improves security by preventing attackers from spoofing an individual'"'"'s authentication information. The enhanced authentication system may be used on mobile devices, such as mobile phones and laptop computers, to provide access to secure data, such as bank account information.
23 Citations
20 Claims
-
1. A method, comprising:
-
requesting authentication information for an individual; receiving authentication information for the individual; presenting the individual with a random challenge action; receiving a response to the challenge action from the individual; and authenticating the individual based at least on the authentication information and the challenge action response. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer program product, comprising:
a non-transitory computer-readable medium comprising; code to request authentication information for an individual; code to receive authentication information for the individual; code to present the individual with a random challenge action; code to receive a response to the challenge action from the individual; and code to authenticate the individual based at least on the authentication information and the challenge action response. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
16. A system, comprising:
-
a memory; a sensor; at least one processor coupled to the memory and coupled to the sensor, in which the at least one processor is configured; to request authentication information for an individual; to receive authentication information for the individual; to present the individual with a random challenge action; to receive a response to the challenge action request from the individual through the sensor; and to authenticate the individual based at least on the authentication information and the challenge action response. - View Dependent Claims (17, 18, 19, 20)
-
Specification