×

Multi-factor authentication using a user behavior profile as a factor

  • US 10,326,775 B2
  • Filed: 05/08/2018
  • Issued: 06/18/2019
  • Est. Priority Date: 05/15/2017
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implementable method for performing a multi-factor authentication operation, comprising:

  • monitoring electronically-observable user behavior of a user, the electronically-observable user behavior comprising a behavior exhibited by a user that is observed through the use of at least one of an electronic device, a computer system and a software application executing on the computing system;

    converting the electronically-observable user behavior into electronic information representing the electronically-observable user behavior;

    generating a user behavior factor based upon the electronic information representing the electronically-observable user behavior;

    identifying a first user behavior factor as a known good user behavior factor when the user behavior corresponds to a known good user behavior;

    identifying a second user behavior factor as an anomalous user behavior factor when the user behavior corresponds to an anomalous behavior;

    using one of the first and second user behavior factors as a factor of a multi-factor authentication when authenticating the user, the multi-factor authentication being strengthened when the user behavior factor comprises the known good user behavior factor; and

    ,modifying an outcome of the multi-factor authentication when authenticating the user when the user behavior factor comprises the anomalous user behavior factor; and

    whereinthe multi-factor authentication uses three authentication factors in addition to using the user behavior factor when performing the multi-factor authentication;

    the user behavior factor provides a fourth authentication factor, the fourth authentication factor being uniquely associated with the user, the fourth authentication factor representing at least one of what the user has done, what the user is currently doing and what the user is expected to do, use of the user behavior factor when performing the multi-factor authentication following the use of the three authentication factors when performing the multifactor authentication; and

    ,the multi-factor authentication is strengthened when performing the multi-factor authentication by an addition of the fourth authentication factor, the fourth authentication factor being uniquely associated with the user.

View all claims
  • 7 Assignments
Timeline View
Assignment View
    ×
    ×