User authentication
First Claim
Patent Images
1. A computer-implemented method, comprising:
- receiving, by processing circuitry, a request to authenticate an electronic transaction involving a specific user seeking access to a computerized resource;
in response to receiving the request, analysing, by processing circuitry, at least one attribute associated with the electronic transaction, wherein the at least one attribute describes the electronic transaction involving the specific user;
based on the analysis, determining, by processing circuitry, an attack threat in connection with the electronic transaction, wherein the attack threat describes one of a stolen device and a stolen identification credential obtained by a fraudster;
based on the attack threat, selecting, by processing circuitry, an authentication challenge that challenges the specific user, wherein the attack threat acts as a decision factor in the selection of the authentication challenge such that a biometric challenge is selected in the event that the attack threat describes a stolen device and an out-of-band challenge is selected in the event that the attack threat describes a stolen identification credential;
providing, by processing circuitry, the authentication challenge in a manner that requires the specific user to respond;
receiving, by processing circuitry, a user response to the authentication challenge;
generating, by processing circuitry, an authentication result based on the user response, the authentication result indicating whether the electronic transaction is authentic; and
utilizing, by processing circuitry, the authentication result to control access by the specific user to the computerized resource.
9 Assignments
0 Petitions
Accused Products
Abstract
There is disclosed a technique for use in authentication. The technique comprises selecting an authentication challenge when an authentication request is deemed risky. An attack threat determined to be associated with the authentication request acts as a decision factor in the selection of the authentication challenge such that a biometric challenge is selected in the event that the attack threat describes a stolen device and an out-of-band challenge is selected in the event that the attack threat describes a stolen identification credential.
19 Citations
12 Claims
-
1. A computer-implemented method, comprising:
-
receiving, by processing circuitry, a request to authenticate an electronic transaction involving a specific user seeking access to a computerized resource; in response to receiving the request, analysing, by processing circuitry, at least one attribute associated with the electronic transaction, wherein the at least one attribute describes the electronic transaction involving the specific user; based on the analysis, determining, by processing circuitry, an attack threat in connection with the electronic transaction, wherein the attack threat describes one of a stolen device and a stolen identification credential obtained by a fraudster; based on the attack threat, selecting, by processing circuitry, an authentication challenge that challenges the specific user, wherein the attack threat acts as a decision factor in the selection of the authentication challenge such that a biometric challenge is selected in the event that the attack threat describes a stolen device and an out-of-band challenge is selected in the event that the attack threat describes a stolen identification credential; providing, by processing circuitry, the authentication challenge in a manner that requires the specific user to respond; receiving, by processing circuitry, a user response to the authentication challenge; generating, by processing circuitry, an authentication result based on the user response, the authentication result indicating whether the electronic transaction is authentic; and utilizing, by processing circuitry, the authentication result to control access by the specific user to the computerized resource. - View Dependent Claims (2, 3, 4)
-
-
5. An apparatus, comprising:
-
processing circuitry; and memory storing instructions for execution by the processing circuitry, the instructions comprising instructions to; receive a request to authenticate an electronic transaction involving a specific user seeking access to a computerized resource; in response to receiving the request, analyse at least one attribute associated with the electronic transaction, wherein the at least one attribute describes the electronic transaction involving the specific user; based on the analysis, determine an attack threat in connection with the electronic transaction, wherein the attack threat describes one of a stolen device and a stolen identification credential obtained by a fraudster; based on the attack threat, select an authentication challenge that challenges the specific user, wherein the attack threat acts as a decision factor in the selection of the authentication challenge such that a biometric challenge is selected in the event that the attack threat describes a stolen device and an out-of-band challenge is selected in the event that the attack threat describes a stolen identification credential; provide the authentication challenge in a manner that requires the specific user to respond; receive a user response to the authentication challenge; generate an authentication result based on the user response, the authentication result indicating whether the electronic transaction is authentic; and utilize the authentication result to control access by the specific user to the computerized resource. - View Dependent Claims (6, 7, 8)
-
-
9. A computer program product having a non-transitory computer readable medium storing instructions, the instructions, when carried out by one or more processors, causing the one or more processors to perform a method of:
-
receiving a request to authenticate an electronic transaction involving a specific user seeking access to a computerized resource; in response to receiving the request, analysing at least one attribute associated with the electronic transaction, wherein the at least one attribute describes the electronic transaction involving the specific user; based on the analysis, determining an attack threat in connection with the electronic transaction, wherein the attack threat describes one of a stolen device and a stolen identification credential obtained by a fraudster; based on the attack threat, selecting an authentication challenge that challenges the specific user, wherein the attack threat acts as a decision factor in the selection of the authentication challenge such that a biometric challenge is selected in the event that the attack threat describes a stolen device and an out-of-band challenge is selected in the event that the attack threat describes a stolen identification credential; providing the authentication challenge in a manner that requires the specific user to respond; receiving a user response to the authentication challenge; generating an authentication result based on the user response, the authentication result indicating whether the electronic transaction is authentic; and utilizing the authentication result to control access by the specific user to the computerized resource. - View Dependent Claims (10, 11, 12)
-
Specification