Temporal modification of authentication challenges
First Claim
1. A method for authenticating a user of a computing device, the method comprising:
- receiving, by one or more computer processors, an indication that a user of a computing device is accessing an object that utilizes an authentication process;
selecting, by one or more computer processors, a first multi-media file based on a user profile of the user and the object of the authentication process, wherein the first multi-media file is associated with a baseline time sequence of interactions of the user corresponding to an authentication sequence of one or more preselected events of the first multi-media file, and wherein the first multi-media file is supplied by the user;
creating, by one or more computer processors, a block of temporal manipulation vectors based, at least in part, on the user profile and a security requirement of the object of the authentication process, wherein a temporal manipulation vector, of the block of temporal manipulation vectors, modifies a presentation of a multi-media file by displacing one or more preselected events of a sequence of events within the multi-media file with respect to time;
transmitting, by one or more computer processors, the block of temporal manipulation vectors associated with the first multi-media file and the first multi-media file to the computing device;
authenticating, by one or more processors, the user based on input of the user interacting with the first multi-media file modified by at least one temporal manipulation vector selected from the block of temporal manipulation vectors; and
replacing, by one or more computer processors, the block of temporal manipulation vectors associated with the first multi-media file with an updated block of temporal manipulation vectors based on a percentage of unused temporal manipulation vectors of the block of temporal manipulation vectors and a duration of time elapsed since the creation of the block of temporal manipulation vectors.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for authenticating a user of a computing device. The method includes a computer processor receiving an indication that a user of a computing device is accessing an object that utilizes an authentication process. The method further includes a computer processor selecting a first multi-media file that is associated with a user profile of the user and the object of the authentication process, wherein the first multi-media file is associated with a baseline user input authentication sequence. The method further includes creating a first temporal manipulation vector based on the user profile and a security requirement of the object of the authentication process, wherein the temporal manipulation vector modifies a presentation of a multi-media file and a corresponding time sequence of a user input authentication sequence in the multi-media file. The method further includes transmitting the first temporal manipulation vector and the first multi-media file to the computing device.
14 Citations
8 Claims
-
1. A method for authenticating a user of a computing device, the method comprising:
-
receiving, by one or more computer processors, an indication that a user of a computing device is accessing an object that utilizes an authentication process; selecting, by one or more computer processors, a first multi-media file based on a user profile of the user and the object of the authentication process, wherein the first multi-media file is associated with a baseline time sequence of interactions of the user corresponding to an authentication sequence of one or more preselected events of the first multi-media file, and wherein the first multi-media file is supplied by the user; creating, by one or more computer processors, a block of temporal manipulation vectors based, at least in part, on the user profile and a security requirement of the object of the authentication process, wherein a temporal manipulation vector, of the block of temporal manipulation vectors, modifies a presentation of a multi-media file by displacing one or more preselected events of a sequence of events within the multi-media file with respect to time; transmitting, by one or more computer processors, the block of temporal manipulation vectors associated with the first multi-media file and the first multi-media file to the computing device; authenticating, by one or more processors, the user based on input of the user interacting with the first multi-media file modified by at least one temporal manipulation vector selected from the block of temporal manipulation vectors; and replacing, by one or more computer processors, the block of temporal manipulation vectors associated with the first multi-media file with an updated block of temporal manipulation vectors based on a percentage of unused temporal manipulation vectors of the block of temporal manipulation vectors and a duration of time elapsed since the creation of the block of temporal manipulation vectors. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
Specification