SYSTEM FOR ELECTRONIC AUTHENTICATION WITH BOT DETECTION AND DENIAL
First Claim
1. A system for bot detection and denial during electronic authentication, the system comprising:
- one or more memory devices having computer readable code store thereon; and
one or more processing devices operatively coupled to the one or more memory devices, wherein the one or more processing devices are configured to execute the computer readable code to;
receive a request from a user application to provide bot detection for electronic authentications;
access a user device associated with the user application and link, via a communicable linkage into the user device;
identify the user device movements and store the movements as regular movements associated with the user device;
trigger one or more bot detection identifiers upon indication of authorization request processing, wherein the one or more bot detection identifiers includes requiring at least a verified liveness of a user associated with the authorization request processing;
extract and retrieve the verified liveness from the user application via the communicable linkage;
determine liveness of generation of the authorization request processing based on a non-irregularity determination of the one or more bot detection identifiers; and
authorize authentication request as human and not bot generated.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, computer products, and methods are described herein for electronic authentication with bot detection and denial. In this way, the system utilizes user device information to discern an authorization or authentication is being requested by a human as part of either an authentication process or authorization process. As such, the system identifies that the user is a human and not a bot or other device attempting to gain authorization. In some embodiments, the system links to a user device and in one or more embodiments reviews live video in the form of a real-time video stream, requires human movement of a user device, identifies device irregularities, and/or device networking interactions to prove the request for authorization is a human request.
-
Citations
20 Claims
-
1. A system for bot detection and denial during electronic authentication, the system comprising:
-
one or more memory devices having computer readable code store thereon; and one or more processing devices operatively coupled to the one or more memory devices, wherein the one or more processing devices are configured to execute the computer readable code to; receive a request from a user application to provide bot detection for electronic authentications; access a user device associated with the user application and link, via a communicable linkage into the user device; identify the user device movements and store the movements as regular movements associated with the user device; trigger one or more bot detection identifiers upon indication of authorization request processing, wherein the one or more bot detection identifiers includes requiring at least a verified liveness of a user associated with the authorization request processing; extract and retrieve the verified liveness from the user application via the communicable linkage; determine liveness of generation of the authorization request processing based on a non-irregularity determination of the one or more bot detection identifiers; and authorize authentication request as human and not bot generated. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product for bot detection and denial during electronic authentication, comprising at least one non-transitory computer-readable medium having computer-readable program code portions embodied therein, the computer-readable program code portions comprising:
-
an executable portion configured for receiving a request from a user application to provide bot detection for electronic authentications; an executable portion configured for accessing a user device associated with the user application and link, via a communicable linkage into the user device; an executable portion configured for identifying the user device movements and store the movements as regular movements associated with the user device; an executable portion configured for triggering one or more bot detection identifiers upon indication of authorization request processing, wherein the one or more bot detection identifiers includes requiring at least a verified liveness of a user associated with the authorization request processing; an executable portion configured for extracting and retrieving the verified liveness from the user application via the communicable linkage; an executable portion configured for determining liveness of generation of the authorization request processing based on a non irregularity determination of the one or more bot detection identifiers; and an executable portion configured for authorizing authentication request as human and not bot generated. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-implemented method for bot detection and denial during electronic authentication, the method comprising:
providing a computing system comprising a computer processing device and a non-transitory computer readable medium, where the computer readable medium comprises configured computer program instruction code, such that when said instruction code is operated by said computer processing device, said computer processing device performs the following operations; receiving a request from a user application to provide bot detection for electronic authentications; accessing a user device associated with the user application and link, via a communicable linkage into the user device; identifying the user device movements and store the movements as regular movements associated with the user device; triggering one or more bot detection identifiers upon indication of authorization request processing, wherein the one or more bot detection identifiers includes requiring at least a verified liveness of a user associated with the authorization request processing; extracting and retrieving the verified liveness from the user application via the communicable linkage; determining liveness of generation of the authorization request processing based on a non-irregularity determination of the one or more bot detection identifiers; and authorizing authentication request as human and not bot generated. - View Dependent Claims (16, 17, 18, 19, 20)
Specification