Performing authentication
First Claim
Patent Images
1. A system, comprising:
- a processor configured to;
receive;
authentication input of a first type provided by a user, a cookie associated with the user, and physical location information associated with the user;
perform a security determination based at least in part on;
the authentication input provided by the user, the cookie associated with the user, and the physical location information associated with the user, wherein performing the security determination comprises determining, based at least in part on;
the authentication input of the first type provided by the user, the cookie associated with the user, and the physical location information associated with the user, that a threshold has been exceeded; and
based at least in part on the determination that the threshold has been exceeded, initiate an action comprising requesting additional authentication input usable to authenticate the user, wherein the requested additional authentication input is of a second type different from the first type, and wherein requesting the additional authentication input usable to authenticate the user comprises at least one of requesting the user to make or receive a phone call, requesting the user to respond to an electronic message, requesting the user to provide user credentials, and requesting the user to indicate preferences for one or more items; and
a memory coupled to the processor and configured to provide the processor with instructions.
1 Assignment
0 Petitions
Accused Products
Abstract
Preference data is received. The received preference data is compared to stored preference data associated with a user with which the received preference data is associated. A determination is made whether to authorize an action based at least on the comparison. The preference data is received as a selection.
76 Citations
23 Claims
-
1. A system, comprising:
-
a processor configured to; receive;
authentication input of a first type provided by a user, a cookie associated with the user, and physical location information associated with the user;perform a security determination based at least in part on;
the authentication input provided by the user, the cookie associated with the user, and the physical location information associated with the user, wherein performing the security determination comprises determining, based at least in part on;
the authentication input of the first type provided by the user, the cookie associated with the user, and the physical location information associated with the user, that a threshold has been exceeded; andbased at least in part on the determination that the threshold has been exceeded, initiate an action comprising requesting additional authentication input usable to authenticate the user, wherein the requested additional authentication input is of a second type different from the first type, and wherein requesting the additional authentication input usable to authenticate the user comprises at least one of requesting the user to make or receive a phone call, requesting the user to respond to an electronic message, requesting the user to provide user credentials, and requesting the user to indicate preferences for one or more items; and a memory coupled to the processor and configured to provide the processor with instructions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method, comprising:
-
receiving;
authentication input of a first type provided by a user, a cookie associated with the user, and physical location information associated with the user;performing a security determination based at least in part on;
the authentication input provided by the user, the cookie associated with the user, and the physical location information associated with the user, wherein performing the security determination comprises determining, based at least in part on;
the authentication input of the first type provided by the user, the cookie associated with the user, and the physical location information associated with the user, that a threshold has been exceeded; andbased at least in part on the determination that the threshold has been exceeded, initiating an action comprising requesting additional authentication input usable to authenticate the user, wherein the requested additional authentication input is of a second type different from the first type, and wherein requesting the additional authentication input usable to authenticate the user comprises at least one of requesting the user to make or receive a phone call, requesting the user to respond to an electronic message, requesting the user to provide user credentials, and requesting the user to indicate preferences for one or more items. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A computer program product embodied in a non-transitory computer readable storage medium and comprising computer instructions for:
-
receiving;
authentication input of a first type provided by a user, a cookie associated with the user, and physical location information associated with the user;performing a security determination based at least in part on;
the authentication input provided by the user, the cookie associated with the user, and the physical location information associated with the user, wherein performing the security determination comprises determining, based at least in part on;
the authentication input of the first type provided by the user, the cookie associated with the user, and the physical location information associated with the user, that a threshold has been exceeded; andbased at least in part on the determination that the threshold has been exceeded, initiating an action comprising requesting additional authentication input usable to authenticate the user, wherein the requested additional authentication input is of a second type different from the first type, and wherein requesting the additional authentication input usable to authenticate the user comprises at least one of requesting the user to make or receive a phone call, requesting the user to respond to an electronic message, requesting the user to provide user credentials, and requesting the user to indicate preferences for one or more items.
-
Specification