Transaction Verification Through Enhanced Authentication
First Claim
Patent Images
1. A computer system, comprising:
- a non-transitory memory storing instructions; and
one or more hardware processors coupled to the non-transitory memory and configured to read the instructions from the non-transitory memory to cause the system to perform operations comprising;
receiving an application programming interface (API) request from a client;
detecting a change associated with the API request as compared to a prior use of the API by the client;
generating an encrypted challenge to authenticate the API request based on detecting the change; and
issuing the encrypted challenge to the client to authenticate the API request.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, systems, and computer program products for providing transaction verification through enhanced authentication are provided. A method performed by a computer system may include receiving an application programming interface (API) request from a client, detecting a change associated with the API request as compared to a prior use of the API by the client, generating an encrypted challenge to authenticate the API request based on detecting the change, and issuing the encrypted challenge to the client to authenticate the API request.
-
Citations
20 Claims
-
1. A computer system, comprising:
-
a non-transitory memory storing instructions; and one or more hardware processors coupled to the non-transitory memory and configured to read the instructions from the non-transitory memory to cause the system to perform operations comprising; receiving an application programming interface (API) request from a client; detecting a change associated with the API request as compared to a prior use of the API by the client; generating an encrypted challenge to authenticate the API request based on detecting the change; and issuing the encrypted challenge to the client to authenticate the API request. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-implemented method, comprising:
-
receiving, by one or more processing devices, an application programming interface (API) request from a client; detecting, by one or more of the processing devices, a change associated with the API request as compared to a prior use of the API by the client; generating, by one or more of the processing devices, an encrypted challenge to authenticate the API request based on detecting the change; and issuing, by one or more of the processing devices, the encrypted challenge to the client to authenticate the API request. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory machine-readable medium having stored thereon machine-readable instructions executable to cause a machine to perform operations comprising:
-
receiving an application programming interface (API) request from a client; detecting a change associated with the API request as compared to a prior use of the API by the client; generating an encrypted challenge to authenticate the API request based on detecting the change; and issuing the encrypted challenge to the client to authenticate the API request. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification