Generating authentication challenges based on preferences of a user's contacts
First Claim
Patent Images
1. A computer-implemented method comprising:
- receiving, with one or more processors, a user authentication request from a user device of a user, the user authentication request includes primary authentication information associated with the user and secondary authentication information associated with the user device of the user;
detecting, with the one or more processors, a potentially fraudulent authentication attempt based on the primary authentication information and the secondary authentication information associated with the user device of the user;
in response to detecting the potentially fraudulent authentication attempt, identifying, with the one or more processors, a contact of the user based on statistically weighted factors associated with the contact, the statistically weighted factors reflecting recent interaction between the contact and the user;
determining, with the one or more processors, a preference of the contact of the user, the preference includes information associated with the contact and is determined from data associated with the contact and identifiable by the user;
generating, with the one or more processors, an authentication challenge based on the preference of the contact of the user; and
sending, with the one or more processors, the authentication challenge for display to the user on the user device.
2 Assignments
0 Petitions
Accused Products
Abstract
Generating user authentication challenges based in part on preferences of one or more contacts of a user includes receiving an authentication request from a user. One or more contacts of the user associated with the authentication request are determined. One or more preferences of the close contact or contacts are determined. An authentication challenge based on the one or more preferences of one or more of the user'"'"'s contacts is generated. The authentication request is allowed or denied based on the completion on the authentication challenge.
50 Citations
20 Claims
-
1. A computer-implemented method comprising:
-
receiving, with one or more processors, a user authentication request from a user device of a user, the user authentication request includes primary authentication information associated with the user and secondary authentication information associated with the user device of the user; detecting, with the one or more processors, a potentially fraudulent authentication attempt based on the primary authentication information and the secondary authentication information associated with the user device of the user; in response to detecting the potentially fraudulent authentication attempt, identifying, with the one or more processors, a contact of the user based on statistically weighted factors associated with the contact, the statistically weighted factors reflecting recent interaction between the contact and the user; determining, with the one or more processors, a preference of the contact of the user, the preference includes information associated with the contact and is determined from data associated with the contact and identifiable by the user; generating, with the one or more processors, an authentication challenge based on the preference of the contact of the user; and sending, with the one or more processors, the authentication challenge for display to the user on the user device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system for generating user authentication challenges, the system comprising:
-
one or more processors; one or more memories storing instructions that, when executed by the one or more processors, cause the system to; an authentication receiver for receiving a user authentication request from a user device of a user, the user authentication request includes primary authentication information associated with the user and secondary authentication information associated with the user device of the user; a fraudulent authentication detection engine for detecting a potentially fraudulent authentication attempt based on the primary authentication information and the secondary authentication information associated with the user device of the user; a close contact identifier engine for identifying with the one or more processors, a contact of the user based on statistically weighted factors associated with the contact, the statistically weighted factors reflecting recent interaction between the contact and the user; a contact preference engine for determining a preference of the contact of the user, the preference includes information associated with the contact and is determined from data associated with the contact and identifiable by the user; and a challenge generation engine for generating an authentication challenge based on the preference of the contact of the user and for sending the authentication challenge for display to the user on the user device. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A computer program product comprising a non-transitory computer usable storage medium including a computer readable program, the computer readable program when executed by a processor causes the processor to:
-
receive a user authentication request from a user device of a user, the user authentication request includes primary authentication information associated with the user and secondary authentication information associated with the user device of the user; detect a potentially fraudulent authentication attempt based on the primary authentication information and the secondary authentication information associated with the user device of the user; in response to detecting the potentially fraudulent authentication attempt, identify a contact of the user based on statistically weighted factors associated with the contact, the statistically weighted factors reflecting recent interaction between the contact and the user; determine a preference of the contact of the user, the preference includes information associated with the contact and is determined from data associated with the contact and identifiable by the user; generate an authentication challenge based on the preference of the contact of the user; and send the authentication challenge for display to the user on the user device.
-
Specification