Authentication frequency and challenge type based on application usage
First Claim
1. A method comprising:
- presenting, via a processor, a first authentication challenge at a device at a first time;
determining, via the processor, a time interval for presenting a second authentication challenge based on (i) an application currently being accessed at the device, (ii) a time duration for which the application is used at the device since the first time, and (iii) input capabilities of the device; and
presenting, via the processor, the second authentication challenge at the device at a second time, wherein the second time is determined based on the time interval, and wherein a challenge type associated with the second authentication challenge is determined based on a function performed by the application.
23 Assignments
0 Petitions
Accused Products
Abstract
An apparatus and method are disclosed for determining authentication frequency (i.e., the length of time between authenticating and re-authenticating a user) and challenge type (e.g., username/password, fingerprint recognition, voice recognition, etc.) based on what software applications a user is running on a data-processing system, and how those applications are being used (e.g., what functions are used, what data is input to or output by the application, how often and for how long applications are used, what input devices and output devices are used, etc.) Advantageously, the illustrative embodiment enables authentication frequency and challenge type to be adjusted based on the likelihood of malicious activity and/or the potential cost of malicious activity, as inferred from current and past application usage. In addition, the illustrative embodiment enables selection of an authentication challenge type that is less intrusive to a user based on current application usage.
-
Citations
20 Claims
-
1. A method comprising:
-
presenting, via a processor, a first authentication challenge at a device at a first time; determining, via the processor, a time interval for presenting a second authentication challenge based on (i) an application currently being accessed at the device, (ii) a time duration for which the application is used at the device since the first time, and (iii) input capabilities of the device; and presenting, via the processor, the second authentication challenge at the device at a second time, wherein the second time is determined based on the time interval, and wherein a challenge type associated with the second authentication challenge is determined based on a function performed by the application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-readable storage device storing instructions which, when executed by a processor, cause the processor to perform operations comprising:
-
presenting a first authentication challenge at a device at a first time; determining a time frame for presenting a second authentication challenge at the device based on (i) an application currently being accessed at the device, (ii) a time duration for which the application is used at the device since the first time, and (iii) input capabilities of the device; and presenting the second authentication challenge at the device at a second time, wherein the second time is determined based on the time frame, and wherein a challenge type associated with the second authentication challenge is determined based on a function performed by the application.
-
-
12. A system comprising:
-
a processor; and a non-transitory computer-readable storage medium storing instructions which, when executed by the processor, cause the processor to perform operations comprising; presenting a first authentication challenge at a device at a first time; determining a magnitude of a time frame for presenting a second authentication challenge based on (i) an application currently being accessed at the device, (ii) a time duration for which the application is used at the device since the first time, and (iii) input capabilities of the device; and presenting the second authentication challenge at the device at a second time, wherein the second time is determined based on the magnitude, and wherein a challenge type associated with the second authentication challenge is determined based on a function performed by the application. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification