TEMPORAL MODIFICATION OF AUTHENTICATION CHALLENGES
1 Assignment
0 Petitions
Accused Products
Abstract
A method for authenticating a user of a computing device. The method includes a computer processor receiving an indication that a user of a computing device is accessing an object that utilizes an authentication process. The method further includes a computer processor selecting a first multi-media file that is associated with a user profile of the user and the object of the authentication process, wherein the first multi-media file is associated with a baseline user input authentication sequence. The method further includes creating a first temporal manipulation vector based on the user profile and a security requirement of the object of the authentication process, wherein the temporal manipulation vector modifies a presentation of a multi-media file and a corresponding time sequence of a user input authentication sequence in the multi-media file. The method further includes transmitting the first temporal manipulation vector and the first multi-media file to the computing device.
4 Citations
20 Claims
-
1-7. -7. (canceled)
-
8. A computer program product for authenticating a user of a computing device, the computer program product comprising:
one or more computer readable storage media and program instructions stored on the one or more computer readable storage media, the program instructions comprising; program instructions to receive an indication that a user of a computing device is accessing an object that utilizes an authentication process; program instructions to select a first multi-media file that is associated with a user profile of the user and the object of the authentication process, wherein the first multi-media file is associated with a baseline user input authentication sequence; program instructions to create a first temporal manipulation vector based, at least in part, on the user profile and a security requirement of the object of the authentication process, wherein the temporal manipulation vector modifies a presentation of a multi-media file and a corresponding time sequence of a user input authentication sequence in the multi-media file; and program instructions to transmit the first temporal manipulation vector and the first multi-media file to the computing device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
15. A computer system for authenticating a user of a computing device, the computer system comprising:
-
one or more computer processors; one or more computer readable storage media; program instructions stored on the computer readable storage media for execution by at least one of the one or more computer processors, the program instructions comprising; program instructions to receive an indication that a user of a computing device is accessing an object that utilizes an authentication process; program instructions to select a first multi-media file that is associated with a user profile of the user and the object of the authentication process, wherein the first multi-media file is associated with a baseline user input authentication sequence; program instructions to create a first temporal manipulation vector based, at least in part, on the user profile and a security requirement of the object of the authentication process, wherein the temporal manipulation vector modifies a presentation of a multi-media file and a corresponding time sequence of a user input authentication sequence in the multi-media file; and program instructions to transmit the first temporal manipulation vector and the first multi-media file to the computing device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification