×

Generating authentication challenges based on preferences of a user's contacts

  • US 9,276,923 B1
  • Filed: 07/14/2014
  • Issued: 03/01/2016
  • Est. Priority Date: 08/08/2011
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method comprising:

  • receiving, with one or more processors, a user authentication request from a user device of a user, the user authentication request includes primary authentication information associated with the user and secondary authentication information associated with the user device of the user;

    detecting, with the one or more processors, a potentially fraudulent authentication attempt based on the primary authentication information and the secondary authentication information associated with the user device of the user;

    in response to detecting the potentially fraudulent authentication attempt, identifying, with the one or more processors, a contact of the user based on statistically weighted factors associated with the contact, the statistically weighted factors reflecting recent interaction between the contact and the user;

    determining, with the one or more processors, a preference of the contact of the user, the preference includes information associated with the contact and is determined from data associated with the contact and identifiable by the user;

    generating, with the one or more processors, an authentication challenge based on the preference of the contact of the user; and

    sending, with the one or more processors, the authentication challenge for display to the user on the user device.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×