×

Risk-based authentication duration

  • US 9,015,485 B1
  • Filed: 02/10/2014
  • Issued: 04/21/2015
  • Est. Priority Date: 12/08/2011
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • obtaining, via at least one of one or more computing devices, a plurality of whitelist operations to be performed on a network site and a plurality of blacklist operations to be performed on a network site from a user;

    determining, via at least one of the one or more computing devices, an authentication duration for the user based at least in part on a risk of performing an operation in response to obtaining a request from the user for the operation, the authentication duration based at least in part on the operation being one of the plurality of blacklist operations or one of the plurality of whitelist operations; and

    initiating, via at least one of the one or more computing devices, an authentication procedure to re-authenticate the user in response to determining that a current session for the operation has expired based at least in part on the authentication duration.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×