User authentication based on self-selected preferences
First Claim
1. A computer program product for user authentication based on self-selected preferences, the computer program product comprising a non-transitory computer-readable medium comprising code causing a first apparatus to:
- receive a request to execute a user action from a user associated with an application, wherein the user action requires validation of one or more authentication credentials;
access a user-selected preference indicating a level of authentication associated with a user-selected preference predefined by the user, wherein the user-selected preference comprises a time duration, a geographic location, and one or more features associated with the application, wherein the time duration is scheduled dynamically;
determine one or more authentication types from a plurality of authentication types associated with the level of authentication and the user-selected preference, wherein the one or more authentication types comprises at least one of a hard authentication, a soft authentication, and a zero authentication, wherein the hard authentication is a multi-step verification requiring a user presentation of at least two authentication credentials, wherein the soft authentication is a secondary verification requiring a user presentation of at least one authentication credential associated with the authentication types, wherein zero authentication requires no authentication credentials;
determine that at least one of the user-selected preferences are satisfied by the user;
request one or more authentication credentials corresponding to the determined one or more authentication types based on at least determining that at least one of the user-selected preferences are satisfied;
receive one or more authentication credentials from the user;
validate the one or more authentication credentials, thereby resulting in a successful validation of the one or more authentication credentials; and
in response to the successful validation of the one or more authentication credentials, execute the user action, wherein executing the user action further comprises enabling the user to access one or more features associated with the application, wherein the one or more features are pre-selected by the user based on the user-selected preferences.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the invention are directed to a system, method, and a computer program product for a user authentication based on self-selected preferences. The system typically including a memory, a processor, and a module configured to receive a request to execute a user action from a user associated with an application, wherein the user action requires one or more authentication credentials; receive one or more authentication credentials from the user based on a user-selected preference; validate the one or more authentication credentials based on the user-selected preference; and execute the user action based on a successful validation of the one or more authentication credentials.
44 Citations
22 Claims
-
1. A computer program product for user authentication based on self-selected preferences, the computer program product comprising a non-transitory computer-readable medium comprising code causing a first apparatus to:
-
receive a request to execute a user action from a user associated with an application, wherein the user action requires validation of one or more authentication credentials; access a user-selected preference indicating a level of authentication associated with a user-selected preference predefined by the user, wherein the user-selected preference comprises a time duration, a geographic location, and one or more features associated with the application, wherein the time duration is scheduled dynamically; determine one or more authentication types from a plurality of authentication types associated with the level of authentication and the user-selected preference, wherein the one or more authentication types comprises at least one of a hard authentication, a soft authentication, and a zero authentication, wherein the hard authentication is a multi-step verification requiring a user presentation of at least two authentication credentials, wherein the soft authentication is a secondary verification requiring a user presentation of at least one authentication credential associated with the authentication types, wherein zero authentication requires no authentication credentials; determine that at least one of the user-selected preferences are satisfied by the user; request one or more authentication credentials corresponding to the determined one or more authentication types based on at least determining that at least one of the user-selected preferences are satisfied; receive one or more authentication credentials from the user; validate the one or more authentication credentials, thereby resulting in a successful validation of the one or more authentication credentials; and in response to the successful validation of the one or more authentication credentials, execute the user action, wherein executing the user action further comprises enabling the user to access one or more features associated with the application, wherein the one or more features are pre-selected by the user based on the user-selected preferences. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for user authentication based on self-selected preferences, the method comprising:
-
receiving, using a computing device processor, a request to execute a user action from a user associated with an application, wherein the user action requires validation of one or more authentication credentials; accessing, using a computing device processor, a user-selected preference indicating a level of authentication associated with a user-selected preference predefined by the user, wherein the user-selected preference comprises a time duration, a geographic location, and one or more features associated with the application, wherein the time duration is scheduled dynamically; determining, using a computing device processor, one or more authentication types from a plurality of authentication types associated with the level of authentication and the user-selected preference, wherein the one or more authentication types comprises at least one of a hard authentication, a soft authentication, and a zero authentication, wherein the hard authentication is a multi-step verification requiring a user presentation of at least two authentication credentials, wherein the soft authentication is a secondary verification requiring a user presentation of at least one authentication credential associated with the authentication types, wherein zero authentication requires no authentication credentials; determining, using a computing device processor, that at least one of the user-selected preferences are satisfied by the user; requesting, using a computing device processor, one or more authentication credentials corresponding to the determined one or more authentication types based on at least determining that at least one of the user-selected preferences are satisfied; receiving, using a computing device processor, one or more authentication credentials from the user; validating, using a computing device processor, the one or more authentication credentials, thereby resulting in a successful validation of the one or more authentication credentials; and in response to the successful validation of the one or more authentication credentials, executing, using a computing device processor, the user action, wherein executing the user action further comprises enabling the user to access the one or more features associated with the application, wherein the one or more features are pre-selected by the user based on the user-selected preferences. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
Specification