×

Techniques for user authentication

  • US 9,178,866 B2
  • Filed: 12/01/2014
  • Issued: 11/03/2015
  • Est. Priority Date: 12/30/2011
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method comprising:

  • receiving, by a configured computing system, an authentication request to access a network resource on behalf of an indicated user;

    determining, by the configured computing system, whether an attribute associated with the authentication request matches stored information previously associated with the indicated user;

    generating, by the configured computing system and based at least in part on the determining, an authorization code that is based on a defined security credential for the indicated user, wherein the generating includes determining to use a higher level of strength for the generated authorization code if the attribute does not match the stored information and otherwise to use a lower level of strength for the generated authorization code by selecting a subset of the security credential that is less than all of the security credential to use as the generated authorization code;

    providing, by the configured computing system, instructions to the indicated user regarding supplying the generated authorization code to obtain access to the network resource;

    receiving, by the configured computing system, the generated authorization code from the indicated user in response to the provided instructions; and

    authorizing the access to the network resource based at least in part on the received generated authorization code.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×