TEMPORAL MODIFICATION OF AUTHENTICATION CHALLENGES
First Claim
1. A method for authenticating a user of a computing device, the method comprising:
- selecting, by one or more computer processors, a first multi-media file based on a user profile of the user and an object of the authentication process, wherein the first multi-media file is associated with a baseline time sequence of interactions of the user corresponding to an authentication sequence of one or more preselected events of the first multi-media file, and wherein the first multi-media file is supplied by the user;
creating, by one or more computer processors, a block of temporal manipulation vectors based, at least in part, on the user profile and a security requirement of the object of the authentication process;
authenticating, by one or more computer processors, the user based on input of the user interacting with the first multi-media file modified by at least one temporal manipulation vector of the block of temporal manipulation vectors; and
replacing, by one or more computer processors, the block of temporal manipulation vectors associated with the first multi-media file with an updated block of temporal manipulation vectors based on a percentage of unused temporal manipulation vectors of the block of temporal manipulation vectors and a duration of time elapsed since the creation of the block of temporal manipulation vectors.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for authenticating a user of a computing device. The method includes a computer processor receiving an indication that a user of a computing device is accessing an object that utilizes an authentication process. The method further includes a computer processor selecting a first multi-media file that is associated with a user profile of the user and the object of the authentication process, wherein the first multi-media file is associated with a baseline user input authentication sequence. The method further includes creating a first temporal manipulation vector based on the user profile and a security requirement of the object of the authentication process, wherein the temporal manipulation vector modifies a presentation of a multi-media file and a corresponding time sequence of a user input authentication sequence in the multi-media file. The method further includes transmitting the first temporal manipulation vector and the first multi-media file to the computing device.
-
Citations
20 Claims
-
1. A method for authenticating a user of a computing device, the method comprising:
-
selecting, by one or more computer processors, a first multi-media file based on a user profile of the user and an object of the authentication process, wherein the first multi-media file is associated with a baseline time sequence of interactions of the user corresponding to an authentication sequence of one or more preselected events of the first multi-media file, and wherein the first multi-media file is supplied by the user; creating, by one or more computer processors, a block of temporal manipulation vectors based, at least in part, on the user profile and a security requirement of the object of the authentication process; authenticating, by one or more computer processors, the user based on input of the user interacting with the first multi-media file modified by at least one temporal manipulation vector of the block of temporal manipulation vectors; and replacing, by one or more computer processors, the block of temporal manipulation vectors associated with the first multi-media file with an updated block of temporal manipulation vectors based on a percentage of unused temporal manipulation vectors of the block of temporal manipulation vectors and a duration of time elapsed since the creation of the block of temporal manipulation vectors. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product for authenticating a user of a computing device, the computer program product comprising:
one or more computer readable storage media and program instructions stored on the one or more computer readable storage media, the program instructions readable/executable by one or more computer processors; program instructions to select a first multi-media file based on a user profile of the user and an object of the authentication process, wherein the first multi-media file is associated with a baseline time sequence of interactions of the user corresponding to an authentication sequence of one or more preselected events of the first multi-media file, and wherein the first multi-media file is supplied by the user; program instructions to create a block of temporal manipulation vectors based, at least in part, on the user profile and a security requirement of the object of the authentication process; program instructions to authenticate the user based on input of the user interacting with the first multi-media file modified by at least one temporal manipulation vector of the block of temporal manipulation vectors; and program instructions to replace the block of temporal manipulation vectors associated with the first multi-media file with an updated block of temporal manipulation vectors based on a percentage of unused temporal manipulation vectors of the block of temporal manipulation vectors and a duration of time elapsed since the creation of the block of temporal manipulation vectors. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
15. A computer system for authenticating a user of a computing device, the computer system comprising:
-
one or more computer processors; one or more computer readable storage media; program instructions stored on the computer readable storage media for execution by at least one of the one or more computer processors, the program instructions comprising; program instructions to select a first multi-media file based on a user profile of the user and an object of the authentication process, wherein the first multi-media file is associated with a baseline time sequence of interactions of the user corresponding to an authentication sequence of one or more preselected events of the first multi-media file, and wherein the first multi-media file is supplied by the user; program instructions to create a block of temporal manipulation vectors based, at least in part, on the user profile and a security requirement of the object of the authentication process; program instructions to authenticate the user based on input of the user interacting with the first multi-media file modified by at least one temporal manipulation vector of the block of temporal manipulation vectors; and program instructions to replace the block of temporal manipulation vectors associated with the first multi-media file with an updated block of temporal manipulation vectors based on a percentage of unused temporal manipulation vectors of the block of temporal manipulation vectors and a duration of time elapsed since the creation of the block of temporal manipulation vectors. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification