AUTHENTICATION FREQUENCY AND CHALLENGE TYPE BASED ON APPLICATION USAGE
First Claim
1. A method comprising:
- presenting a first authentication challenge at a device at a first time;
determining, via a processor, an authentication type based on one of (i) an identity of an application currently being accessed at the device, (ii) a time duration for which the application is used at the device since the first time, or (iii) input capabilities of the device; and
presenting, at the device at a second time later than the first time, a second authentication challenge of the authentication type.
17 Assignments
0 Petitions
Accused Products
Abstract
An apparatus and method are disclosed for determining authentication frequency (i.e., the length of time between authenticating and re-authenticating a user) and challenge type (e.g., username/password, fingerprint recognition, voice recognition, etc.) based on what software applications a user is running on a data-processing system, and how those applications are being used (e.g., what functions are used, what data is input to or output by the application, how often and for how long applications are used, what input devices and output devices are used, etc.) Advantageously, the illustrative embodiment enables authentication frequency and challenge type to be adjusted based on the likelihood of malicious activity and/or the potential cost of malicious activity, as inferred from current and past application usage. In addition, the illustrative embodiment enables selection of an authentication challenge type that is less intrusive to a user based on current application usage.
-
Citations
20 Claims
-
1. A method comprising:
-
presenting a first authentication challenge at a device at a first time; determining, via a processor, an authentication type based on one of (i) an identity of an application currently being accessed at the device, (ii) a time duration for which the application is used at the device since the first time, or (iii) input capabilities of the device; and presenting, at the device at a second time later than the first time, a second authentication challenge of the authentication type. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 12, 13, 14)
-
-
11. A system comprising:
-
a processor; and a computer-readable storage medium storing instructions which, when executed by the processor, cause the processor to perform operations comprising; presenting a first authentication challenge at a device at a first time; determining an authentication type based on one of (i) an identity of an application currently being accessed at the device, (ii) a time duration for which the application is used at the device since the first time, or (iii) input capabilities of the device; and presenting, at the device at a second time later than the first time, a second authentication challenge of the authentication type.
-
-
15. A computer-readable storage device storing instructions which, when executed by a processor, cause the processor to perform operations comprising:
-
presenting a first authentication challenge at a device at a first time; determining an authentication type based on one of (i) an identity of an application currently being accessed at the device, (ii) a time duration for which the application is used at the device since the first time, or (iii) input capabilities of the device; and presenting, at the device at a second time later than the first time, a second authentication challenge having the authentication type. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification