×

Temporal modification of authentication challenges

  • US 9,876,784 B2
  • Filed: 02/06/2017
  • Issued: 01/23/2018
  • Est. Priority Date: 11/25/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method for authenticating a user of a computing device, the method comprising:

  • selecting, by one or more computer processors, a first multi-media file based on a user profile of the user and an object of an authentication process, wherein the first multi-media file is associated with a baseline time sequence of interactions of the user corresponding to an authentication sequence of one or more preselected events of the first multi-media file, and wherein the first multi-media file is supplied by the user;

    creating, by one or more computer processors, a block of temporal manipulation vectors based, at least in part, on the user profile and a security requirement of the object of the authentication process, wherein a temporal manipulation vector, of the block of temporal manipulation vectors modifies a presentation of a multi-media file by displacing one or more preselected events of a sequence of events within the multi-media file with respect to time;

    authenticating, by one or more computer processors, the user based on input of the user interacting with the first multi-media file modified by at least one temporal manipulation vector of the block of temporal manipulation vectors; and

    replacing, by one or more computer processors, the block of temporal manipulation vectors associated with the first multi-media file with an updated block of temporal manipulation vectors based on a percentage of unused temporal manipulation vectors of the block of temporal manipulation vectors and a duration of time elapsed since the creation of the block of temporal manipulation vectors.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×