Systems and methods for assessing security risk
First Claim
1. A system for managing an electronic transaction, the system comprising at least one processor programmed to:
- receive, during the electronic transaction, a request from a user system to access at least one resource;
cause an identification test to be administered to the user system;
analyze information relating to the identification test to determine whether the electronic transaction is associated with an elevated level of risk, wherein the information relating to the identification test indicates a manner in which a response is submitted by the user system; and
in response to determining that the electronic transaction is not associated with an elevated level of risk, grant access to the at least one resource even if the response is incorrect,wherein the at least one processor is programmed to determine the electronic transaction is associated with the elevated level of risk based at least in part on how rapidly the user system submits the response and when an amount of time taken by the user system to submit the response indicates the response is from a software robot.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for providing identification tests. In some embodiments, a system and a method are provided for generating and serving to a user an animated challenge graphic comprising a challenge character set whose appearance may change over time. In some embodiments, marketing content may be incorporated into a challenge message for use in an identification test. The marketing content may be accompanied by randomly selected content to increase a level of security of the identification test, in some embodiments, a challenge message for use in an identification test may be provided based on information regarding a transaction for which the identification test is administered. For example, the transaction information may include a user identifier such as an IP address. In some embodiments, identification test results may be tracked and analyzed to identify a pattern of behavior associated with a user identifier. A score indicative of a level of trustworthiness may be computed for the user identifier.
174 Citations
18 Claims
-
1. A system for managing an electronic transaction, the system comprising at least one processor programmed to:
-
receive, during the electronic transaction, a request from a user system to access at least one resource; cause an identification test to be administered to the user system; analyze information relating to the identification test to determine whether the electronic transaction is associated with an elevated level of risk, wherein the information relating to the identification test indicates a manner in which a response is submitted by the user system; and in response to determining that the electronic transaction is not associated with an elevated level of risk, grant access to the at least one resource even if the response is incorrect, wherein the at least one processor is programmed to determine the electronic transaction is associated with the elevated level of risk based at least in part on how rapidly the user system submits the response and when an amount of time taken by the user system to submit the response indicates the response is from a software robot. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for managing an electronic transaction, the method comprising acts of:
-
receiving, during the electronic transaction, a request from a user system to access at least one resource; causing an identification test to be administered to the user system; analyzing information relating to the identification test to determine whether the electronic transaction is associated with an elevated level of risk, wherein the information relating to the identification test indicates a manner in which a response is submitted by the user system; and in response to determining that the electronic transaction is not associated with an elevated level of risk, granting access to the at least one resource even if the response is incorrect, wherein determining the electronic transaction is associated with the elevated level of risk is based at least in part on how rapidly the user system submits the response and when an amount of time taken by the user system to submit the response indicates the response is from a software robot. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. At least one non-transitory computer-readable storage medium having encoded thereon instructions which, when executed by at least one processor, cause the at least one processor to perform a method for managing an electronic transaction, the method comprising acts of:
-
receiving, during the electronic transaction, a request from a user system to access at least one resource; causing an identification test to be administered to the user system; analyzing information relating to the identification test to determine whether the electronic transaction is associated with an elevated level of risk, wherein the information relating to the identification test indicates a manner in which a response is submitted by the user system; and in response to determining that the electronic transaction is not associated with an elevated level of risk, granting access to the at least one resource even if the response is incorrect, wherein determining the electronic transaction is associated with the elevated level of risk is based at least in part on how rapidly the user system submits the response and when an amount of time taken by the user system to submit the response indicates the response is from a software robot. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification