×

Cryptographic security functions based on anticipated changes in dynamic minutiae

  • US 9,979,707 B2
  • Filed: 06/28/2017
  • Issued: 05/22/2018
  • Est. Priority Date: 02/03/2011
  • Status: Active Grant
First Claim
Patent Images

1. A system comprising:

  • a non-transitory memory storing information associated with one or more identities, wherein the information stored for an identity includes a plurality of identity validation objects comprising an attribute type, an attribute value associated with the attribute type, and information related to anticipated changes that modify the attribute value, wherein the plurality of identity validation objects includes objects representing at least two different non-static characteristics associated with the identity selected from the group of non-static characteristics comprising;

    user added data, calling application data, software component data, network connection data, and geo-location data; and

    one or more hardware processors in communication with the non-transitory memory and configured to execute instructions to cause the system to perform authentication operations comprising;

    receiving, from a first device associated with a first identity over a network, a message based on a first data value and a second data value from the first device corresponding to a first attribute type and a second attribute type, respectively, wherein the first and second data values serves purposes for the first device other than a security purpose;

    retrieving a first identity validation object that corresponds to the first identity and the first attribute type, the first identity validation object comprising a first attribute value and first information related to anticipated changes that modify the first attribute value;

    retrieving a second identity validation object that corresponds to the first identity and the second attribute type, the second identity validation object comprising a second attribute value and second information related to anticipated changes that modify the second attribute value;

    determining whether the first data value and the second data value used to create the message are acceptable for the first identity using the first attribute value and the first information stored in the first validation object, and the second attribute value and the second information stored in the second validation object;

    in response to a determination that the first data value and the second data value are acceptable for the first identity, updating, for the first identity, the first identity validation object and the second identity validation object by incorporating the first data value and the second data value into the first identity validation object and the second identity validation object, respectively; and

    performing a subsequent authentication process for the first identity using at least one of the updated first identity validation object or the updated second identity validation object.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×