×

User authentication based on other applications

  • US 9,509,685 B2
  • Filed: 02/19/2016
  • Issued: 11/29/2016
  • Est. Priority Date: 02/07/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer program product for authenticating a user, the computer program product comprising a non-transitory computer-readable medium comprising code causing a hardware processor to:

  • receive a first request to execute a first action associated with a first application;

    determine that execution of the first action requires user authentication;

    request one or more authentication credentials from the user;

    receive a first authentication credential associated with the first action, wherein the first authentication credential is associated with a zero authentication, a soft authentication, or a hard authentication, wherein receiving the hard authentication comprises enabling the user to execute all actions associated with the first application, wherein receiving the soft authentication comprises enabling the user to execute to at least one action associated with the first application, wherein receiving zero authentication comprises denying the user access to at least one action associated with the first application;

    validate the first authentication credential, thereby resulting in a successful validation of the received first authentication credential;

    in response to the successful validation, execute the first action;

    receive a second request to execute a second action associated with a second application, wherein the second request is associated with the execution of the first action;

    determine that execution of the second action requires user authentication;

    determine a digital footprint of the user based on at least the first action executed by the user, wherein the digital footprint of the user comprises one or more previous actions executed by the user, wherein the one or more actions executed by the user comprises the execution of the first action, wherein the digital footprint is used as a second authentication credential required to access the second application; and

    validate the digital footprint indicating that the first action executed by the user is successfully authenticated;

    in response to the successful validation of the digital footprint, execute the second action.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×