×

REAL-TIME SELECTION OF AUTHENTICATION PROCEDURES BASED ON RISK ASSESSMENT

  • US 20190347666A1
  • Filed: 05/09/2018
  • Published: 11/14/2019
  • Est. Priority Date: 05/09/2018
  • Status: Active Grant
First Claim
Patent Images

1. A non-transitory computer-readable medium storing instructions, the instructions comprising:

  • one or more instructions that, when executed by one or more processors, cause the one or more processors to;

    receive, from a server device, a real-time notification indicating that one or more fields of a user account are being modified,wherein the one or more fields that are being modified include;

    data describing personal information of a user associated with the user account, ordata identifying one or more authorized users of the user account;

    receive, from a user device, a request associated with a high-risk transaction involving the user account;

    request, from a data source, additional information associated with the user;

    determine a risk score indicating a likelihood of the high-risk transaction being performed by an unauthorized user,wherein the risk score is determined using a data model that has been trained on historical account data associated with a group of user accounts, andwherein the one or more instructions, that cause the one or more processors to determine the risk score, cause the one or more processors to;

    provide, as input to the data model, information associated with the real-time notification and information associated with the request associated with the high-risk transaction to cause the data model to output the risk score, 

    wherein the information associated with the real-time notification has a first time stamp, 

    wherein the information associated with the request associated with the high-risk transaction has a second time stamp, and 

    wherein a time period between the first time stamp and the second time stamp is a factor that the data model considers in determining the risk score;

    increase or decrease the risk score based on the additional information associated with the user;

    selectively identify an authentication procedure, of a group of authentication procedures, after increasing or decreasing the risk score,wherein the group of authentication procedures are associated with ranges of risk scores, andwherein the authentication procedure is identified based on the risk score falling within a particular range of risk scores of the ranges of risk scores; and

    provide authentication instructions for the authentication procedure to the user device to allow the user device to perform the authentication procedure.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×