×

Generating user authentication challenges based on social network activity information

  • US 8,997,240 B1
  • Filed: 10/31/2011
  • Issued: 03/31/2015
  • Est. Priority Date: 09/21/2011
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for generating user authentication challenges performed on one or more computing devices, the method comprising:

  • receiving, on the one or more computing devices, a login request from a user wherein the login request includes an account owner'"'"'s correct username and password and additional login information from the user;

    in response to receiving the login request, detecting a potential fraudulent login attempt based on the additional login information from the user;

    analyzing social network activity information of the account owner, wherein the analysis includes determining a pattern of social network activity and a deviation from the pattern of social network activity;

    performing security analysis of the social network activity information underlying including the pattern and the deviation from the pattern to determine whether the underlying social network activity information is a secure basis for an authentication challenge;

    in response to determining the social network activity information as the secure basis for the authentication challenge, generating the authentication challenge based at least in part on the social network activity information and the deviation from the pattern of social network activity; and

    sending the authentication challenge for display;

    wherein the underlying social network information is a secure basis for the authentication challenge when the underlying social network activity is not publicly available and not personally identifiable, the authentication challenge generated is based at least in part on personally unidentifiable social network activity information.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×