Authentication frequency and challenge type based on application usage
First Claim
1. A method comprising:
- presenting a first authentication challenge at a device at a first time;
determining, via a processor, a time duration for which the application is used at the device since the first time and input capabilities of the device;
based on the determination, selecting, via the processor, an authentication type;
based on the determination, adjusting, via the processor, a time delay amount; and
presenting, at the device after the time delay amount following the first time, a second authentication challenge of the authentication type.
17 Assignments
0 Petitions
Accused Products
Abstract
An apparatus and method are disclosed for determining authentication frequency (i.e., the length of time between authenticating and re-authenticating a user) and challenge type (e.g., username/password, fingerprint recognition, voice recognition, etc.) based on what software applications a user is running on a data-processing system, and how those applications are being used (e.g., what functions are used, what data is input to or output by the application, how often and for how long applications are used, what input devices and output devices are used, etc.) Advantageously, the illustrative embodiment enables authentication frequency and challenge type to be adjusted based on the likelihood of malicious activity and/or the potential cost of malicious activity, as inferred from current and past application usage. In addition, the illustrative embodiment enables selection of an authentication challenge type that is less intrusive to a user based on current application usage.
-
Citations
20 Claims
-
1. A method comprising:
-
presenting a first authentication challenge at a device at a first time; determining, via a processor, a time duration for which the application is used at the device since the first time and input capabilities of the device; based on the determination, selecting, via the processor, an authentication type; based on the determination, adjusting, via the processor, a time delay amount; and presenting, at the device after the time delay amount following the first time, a second authentication challenge of the authentication type. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system comprising:
-
a hardware processor; and a non-transitory computer-readable storage medium having computer readable program code embodied therewith, the computer readable program code comprising computer readable program code configured, when executed by the processor, to cause the processor to perform operations comprising; presenting a first authentication challenge at a device at a first time; determining (i) one or more functions which have been performed by an application currently being accessed at the device since the first time, (ii) a time duration for which the application is used at the device since the first time and (iii) input capabilities of the device; selecting, based on the determination, an authentication type and a time delay; and presenting, at the device after the time delay following the first time, a second authentication challenge of the authentication type. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A computer-readable storage device storing instructions which, when executed by a processor, cause the processor to perform operations comprising:
-
determining (i) one or more functions which have been performed by an application currently being accessed at the device since the first time, (ii) a time duration for which the application is used at the device since the first time and (iii) input capabilities of the device; selecting, based on the determination, an authentication type and a time delay; and presenting, at the device after the time delay following the first time, a second authentication challenge having the authentication type. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification