×

Event-based security challenges

  • US 9,298,898 B2
  • Filed: 07/18/2013
  • Issued: 03/29/2016
  • Est. Priority Date: 07/18/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving, at a computer executing a security application, a request from a requestor, the request for a challenge question and a response comprising an answer to the challenge question, wherein the challenge question and the response are used by the requestor to authenticate a user device;

    accessing, by the computer, event data corresponding to a user of the user device, wherein the event data relates to a transaction that does not occur at the user device;

    determining, by the computer, a difficulty level for the challenge question, the difficulty level comprising a degree of accuracy associated with an amount of the transaction;

    generating, by the computer, the challenge question based upon the event data and the difficulty level;

    generating, by the computer, the response based upon the event data, the response comprising a valid response to the challenge question; and

    providing, by the computer, the challenge question and the response to the requestor.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×