Apparatus and method for authentication based on cognitive information
First Claim
1. An authentication apparatus based on cognitive information, comprising:
- a server device comprising one or more units which are executed by a processor, the one or more units comprising;
an authentication request reception unit for receiving a request to perform a primary authentication for an authentication target;
a behavioral and contextual information collection unit for collecting behavioral and contextual information corresponding to the authentication target;
a cognitive information extraction unit for extracting cognitive information corresponding to the request from previously stored big data; and
an authentication processing unit for performing a secondary authentication for the authentication target in consideration of the behavioral and contextual information based on extracted cognitive information, wherein the authentication processing unit blocks the request of performing the primary authentication or cancels an already performed primary authentication when the secondary, authentication fails,wherein the primary authentication is performed using authentication information other than the cognitive information,wherein the authentication information is at least one of an ID/password-based authentication method, an authentication token-based authentication method, and a biometric authentication method, andwherein the authentication processing, unit is configured to execute the following;
predicting possible transactions by the authentication target based on recent location information and the type of transactions that should occur near a location identified by the recent location information, wherein the authentication processing unit, provides the secondary authentication when the transaction that occurs is one of the predicted transactions and not providing the secondary authentication when the transaction that occurs is not one of the predicted transactions.
1 Assignment
0 Petitions
Accused Products
Abstract
An authentication apparatus and method based on cognitive information. The authentication apparatus based on cognitive information includes an authentication request reception unit for receiving a request to authenticate an authentication target, a behavioral and contextual information collection unit for collecting behavioral and contextual information corresponding to the authentication target, a cognitive information extraction unit for extracting cognitive information corresponding to the request from previously stored big data, and an authentication processing unit for authenticating the authentication target in consideration of the behavioral and contextual information based on the extracted cognitive information.
50 Citations
12 Claims
-
1. An authentication apparatus based on cognitive information, comprising:
-
a server device comprising one or more units which are executed by a processor, the one or more units comprising; an authentication request reception unit for receiving a request to perform a primary authentication for an authentication target; a behavioral and contextual information collection unit for collecting behavioral and contextual information corresponding to the authentication target; a cognitive information extraction unit for extracting cognitive information corresponding to the request from previously stored big data; and an authentication processing unit for performing a secondary authentication for the authentication target in consideration of the behavioral and contextual information based on extracted cognitive information, wherein the authentication processing unit blocks the request of performing the primary authentication or cancels an already performed primary authentication when the secondary, authentication fails, wherein the primary authentication is performed using authentication information other than the cognitive information, wherein the authentication information is at least one of an ID/password-based authentication method, an authentication token-based authentication method, and a biometric authentication method, and wherein the authentication processing, unit is configured to execute the following; predicting possible transactions by the authentication target based on recent location information and the type of transactions that should occur near a location identified by the recent location information, wherein the authentication processing unit, provides the secondary authentication when the transaction that occurs is one of the predicted transactions and not providing the secondary authentication when the transaction that occurs is not one of the predicted transactions. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An authentication method based on cognitive information, performed by an authentication apparatus based on cognitive information, the method comprising:
-
receiving a request to perform a primary authentication for an authentication target; collecting behavioral and contextual information corresponding to the authentication target; extracting cognitive information corresponding to the request from previously stored big data; and performing a secondary authentication for the authentication target in consideration of the behavioral and contextual information based on the extracted cognitive information, wherein the authentication apparatus blocks the request of performing the primary authentication or cancels an already performed primary authentication when the secondary authentication fails, wherein the primary authentication is performed using authentication information other than the cognitive information, wherein the authentication information is at least one of an ID/password-based authentication method, an authentication token-based authentication method, and a biometric authentication method, wherein the secondary authentication comprises; predicting possible transactions by the authentication target based on recent location information and the type of transactions that should occur near a location identified by the recent location information, and providing the secondary authentication when the transaction that occurs is one of the predicted transactions and not providing the secondary authentication when the transaction that occurs is not one of the predicted transactions, and wherein the above authentication steps are implemented by at least one device. - View Dependent Claims (8, 9, 10, 11, 12)
-
Specification