SYSTEM AND METHODS FOR WEAK AUTHENTICATION DATA REINFORCEMENT
First Claim
Patent Images
1. A method comprising:
- receiving a request to authenticate a device, the request including authentication data and an identifier of the device, the request being received over a network;
determining that the authentication data is weak authentication data;
determining that the identifier of the device was not previously associated with a human user; and
responsive to determining that the authentication data is weak authentication data and that the identifier of the device was not previously associated with a human user, determining, using one or more processors, that the identifier of the device is associated with a human user by initiating a verification process.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for weak authentication data reinforcement are described. In some embodiments, authentication data is received in a request to authenticate a user. In response to detecting weak authentication data, the systems and methods determine whether the identifier of the device was previously associated with a human user and whether the authentication data is weak. An example embodiment may include initiating a verification process in response to determining that the authentication data is weak and that the identifier of the device was not previously associated with a human user.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving a request to authenticate a device, the request including authentication data and an identifier of the device, the request being received over a network; determining that the authentication data is weak authentication data; determining that the identifier of the device was not previously associated with a human user; and responsive to determining that the authentication data is weak authentication data and that the identifier of the device was not previously associated with a human user, determining, using one or more processors, that the identifier of the device is associated with a human user by initiating a verification process. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
one or more processors; and a memory storing executable instructions that, when executed by the one or more processors, cause the one or more processors to perform operations comprising; receiving a request to authenticate a device, the request including authentication data and an identifier of the device, the request being received over a network; determining that the authentication data is weak authentication data; determining that the identifier of the device was not previously associated with a human user; and responsive to determining that the authentication data is weak authentication data and that the identifier of the device was not previously associated with a human user, determining that the identifier of the device is associated with a human user by initiating a verification process. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A non-transitory machine-readable medium storing instructions that, when executed by one or more processors of a machine, cause the machine to perform operations comprising:
-
receiving a request to authenticate a device, the request including authentication data and an identifier of the device, the request being received over a network; determining that the authentication data is weak authentication data; determining that the identifier of the device was not previously associated with a human user; and responsive to determining that the authentication data is weak authentication data and that the identifier of the device was not previously associated with a human user, determining that the identifier of the device is associated with a human user by initiating a verification process.
-
Specification