×

Generating authentication challenges based on preferences of a user's contacts

  • US 8,782,761 B1
  • Filed: 08/08/2011
  • Issued: 07/15/2014
  • Est. Priority Date: 08/08/2011
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for generating user authentication challenges, the method comprising:

  • receiving an authentication request from a user, wherein the authentication request includes primary authentication information and secondary authentication information from the user;

    in response to receiving the authentication request, detecting a potentially fraudulent authentication attempt based on the secondary authentication information from the user;

    identifying one or more contacts of an account owner based at least in part on a frequency of interaction between the account owner and the one or more contacts;

    determining one or more preferences of the one or more contacts based on an analysis of information about the one or more contacts;

    generating one or more authentication challenges based at least in part on the determined one or more preferences of the one or more contacts, the one or more authentication challenges including one or more questions about the determined one or more preferences of the one or more contacts based on the analysis;

    assessing a response to the one or more authentication challenges; and

    determining access based on the assessment.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×