Advanced authentication techniques
First Claim
1. A method comprising:
- receiving at least one request to access at least one resource;
receiving at least one composite authentication credential, the at least one composite authentication credential comprising a first credential component and a second credential component, the first credential component comprising a sequential component indicating an order of input for a plurality of biometric signature elements and the second credential component comprising the plurality of biometric signature elements;
determining whether the first credential component is valid;
determining whether the second credential component is valid;
permitting, when the first credential component and the second credential component are valid, access to the at least one resource;
performing, when the first credential component is not valid, a first remedial action; and
performing, when the second credential component is not valid, a second remedial action, the second remedial action preventing further authentication attempts until at least one alternative authentication credential is validated, wherein the first remedial action is different from the second remedial action.
4 Assignments
0 Petitions
Accused Products
Abstract
A method, system, apparatus, and computer program product are provided for facilitating advanced authentication techniques. For example, a method is provided that includes receiving at least one request to access at least one resource and receiving at least one composite authentication credential, the composite authentication credential comprising a first credential component and a second credential component. The method further includes determining whether the first credential component is valid, determining whether the second credential component is valid and, in an instance in which it is determined that the first and second credential components are valid, causing access to the at least one resource to be permitted.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving at least one request to access at least one resource; receiving at least one composite authentication credential, the at least one composite authentication credential comprising a first credential component and a second credential component, the first credential component comprising a sequential component indicating an order of input for a plurality of biometric signature elements and the second credential component comprising the plurality of biometric signature elements; determining whether the first credential component is valid; determining whether the second credential component is valid; permitting, when the first credential component and the second credential component are valid, access to the at least one resource; performing, when the first credential component is not valid, a first remedial action; and performing, when the second credential component is not valid, a second remedial action, the second remedial action preventing further authentication attempts until at least one alternative authentication credential is validated, wherein the first remedial action is different from the second remedial action. - View Dependent Claims (2, 3, 4, 5, 6, 7, 10, 11, 12, 13)
-
-
8. The method of claim the second remedial action further comprises an access restricting action.
-
9. The method of claim the second remedial action further comprises contacting one or more persons.
-
14. An apparatus comprising at least one processor and at least one memory storing program code instructions, the at least one memory and program code instructions being configured to, with the at least one processor, direct the apparatus to at least:
-
receive at least one request to access at least one resource; receive at least one composite authentication credential, the at least one composite authentication credential comprising a first credential component and a second credential component, the first credential component comprising a sequential component indicating an order of input a plurality of biometric signature elements and the second credential component comprising the plurality of biometric signature elements; determine whether the first credential component is valid; determine whether the second credential component is valid; permitting, when the first credential component and the second credential component are valid, access to the at least one resource to be permitted; performing, when the first credential component is not valid, a first remedial action to be performed; and performing, when the second credential component is not valid, a second remedial action to be performed, the second remedial action locking a user device associated with the at least one request to access the at least one resource, wherein the first remedial action is different from the second remedial action. - View Dependent Claims (15, 16)
-
-
17. A computer program product comprising a non-transitory computer-readable storage medium having program code portions embodied therein, the program code portions being configured to, upon execution, direct an apparatus to at least:
-
receive at least one request to access at least one resource; receive at least one composite authentication credential, the at least one composite authentication credential comprising a first credential component and a second credential component, the first credential component comprising a sequential component indicating an order of input for respective ones of the plurality of biometric signature elements and the second credential component comprising a plurality of biometric signature elements; determine whether the first credential component is valid; determine whether the second credential component is valid; permitting, when the first and second credential components are valid, access to the at least one resource; performing, when the first credential component is not valid, a first remedial action; and performing, when the second credential component is not valid, a second remedial action, the second remedial action comprising monitoring a location of a user device associated with the request, wherein the first remedial action is different from the second remedial action. - View Dependent Claims (18, 19, 20)
-
Specification