Event-based security challenges
First Claim
Patent Images
1. A method comprising:
- receiving, at a computer executing a security application, a request from a requestor, the request for a challenge question and a response comprising an answer to the challenge question, wherein the challenge question and the response are used by the requestor to authenticate a user device;
accessing, by the computer, event data corresponding to a user of the user device, wherein the event data relates to a transaction that does not occur at the user device;
determining, by the computer, a difficulty level for the challenge question, the difficulty level comprising a degree of accuracy associated with an amount of the transaction;
generating, by the computer, the challenge question based upon the event data and the difficulty level;
generating, by the computer, the response based upon the event data, the response comprising a valid response to the challenge question; and
providing, by the computer, the challenge question and the response to the requestor.
1 Assignment
0 Petitions
Accused Products
Abstract
Concepts and technologies are disclosed herein for event-based security challenges. A computer can execute a security application. The computer can receive a request for authentication information associated with a user device. The computer can access event data corresponding to the user device. The computer can generate, based upon the event data, a challenge question and a response to the challenge question. The computer can provide data indicating the challenge question and the response to a requestor associated with the request.
-
Citations
17 Claims
-
1. A method comprising:
-
receiving, at a computer executing a security application, a request from a requestor, the request for a challenge question and a response comprising an answer to the challenge question, wherein the challenge question and the response are used by the requestor to authenticate a user device; accessing, by the computer, event data corresponding to a user of the user device, wherein the event data relates to a transaction that does not occur at the user device; determining, by the computer, a difficulty level for the challenge question, the difficulty level comprising a degree of accuracy associated with an amount of the transaction; generating, by the computer, the challenge question based upon the event data and the difficulty level; generating, by the computer, the response based upon the event data, the response comprising a valid response to the challenge question; and providing, by the computer, the challenge question and the response to the requestor. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
a processor; and a memory storing computer-executable instructions that, when executed by the processor, cause the processor to perform operations comprising receiving a request from a requestor, the request for a challenge question and a response comprising an answer to the challenge question; accessing event data corresponding to a user of a user device, wherein the event data relates to a transaction that does not occur at the user device; determining a difficulty level for the challenge question, the difficulty level comprising a degree of accuracy associated with an amount of the transaction; generating the challenge question based upon the event data and the difficulty level; generating the response based upon the event data, the response comprising a valid response to the challenge question; and providing the challenge question and the response to the requestor. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer storage medium having computer-executable instructions stored thereon that, when executed by a processor, cause the processor to perform operations comprising:
-
receiving a request from a requestor, the request for a challenge question and a response comprising an answer to the challenge question, wherein the challenge question and the response are used by the requestor to authenticate a user device; accessing event data corresponding to a user of the user device, wherein the event data relates to a transaction that does not occur at the user device; determining a difficulty level for the challenge question, the difficulty level comprising a degree of accuracy associated with an amount of the transaction; generating the challenge question based upon the event data and the difficulty level; generating the response based upon the event data, the response comprising a valid response to the challenge question; and providing the challenge question and the response to the requestor. - View Dependent Claims (16, 17)
-
Specification