TEMPORAL MODIFICATION OF AUTHENTICATION CHALLENGES
First Claim
1. A method for authenticating a user of a computing device, the method comprising:
- receiving, by one or more computer processors, an indication that a user of a computing device is accessing an object that utilizes an authentication process;
selecting, by one or more computer processors, a first multi-media file that is associated with a user profile of the user and the object of the authentication process, wherein the first multi-media file is associated with a baseline user input authentication sequence;
creating, by one or more computer processors, a first temporal manipulation vector based, at least in part, on the user profile and a security requirement of the object of the authentication process, wherein the temporal manipulation vector modifies a presentation of a multi-media file and a corresponding time sequence of a user input authentication sequence in the multi-media file; and
transmitting, by one or more computer processors, the first temporal manipulation vector and the first multi-media file to the computing device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for authenticating a user of a computing device. The method includes a computer processor receiving an indication that a user of a computing device is accessing an object that utilizes an authentication process. The method further includes a computer processor selecting a first multi-media file that is associated with a user profile of the user and the object of the authentication process, wherein the first multi-media file is associated with a baseline user input authentication sequence. The method further includes creating a first temporal manipulation vector based on the user profile and a security requirement of the object of the authentication process, wherein the temporal manipulation vector modifies a presentation of a multi-media file and a corresponding time sequence of a user input authentication sequence in the multi-media file. The method further includes transmitting the first temporal manipulation vector and the first multi-media file to the computing device.
-
Citations
7 Claims
-
1. A method for authenticating a user of a computing device, the method comprising:
-
receiving, by one or more computer processors, an indication that a user of a computing device is accessing an object that utilizes an authentication process; selecting, by one or more computer processors, a first multi-media file that is associated with a user profile of the user and the object of the authentication process, wherein the first multi-media file is associated with a baseline user input authentication sequence; creating, by one or more computer processors, a first temporal manipulation vector based, at least in part, on the user profile and a security requirement of the object of the authentication process, wherein the temporal manipulation vector modifies a presentation of a multi-media file and a corresponding time sequence of a user input authentication sequence in the multi-media file; and transmitting, by one or more computer processors, the first temporal manipulation vector and the first multi-media file to the computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
Specification