Data access control using multi-device multifactor authentication

    公开(公告)号:US10853467B2

    公开(公告)日:2020-12-01

    申请号:US15938516

    申请日:2018-03-28

    Abstract: An authentication device that includes an authentication engine configured to detect devices proximate to a terminal and to identify a user profile based on the detected one or more devices. The user profile identifies at least one of the detected devices in a device registry. The authentication engine is further configured to receive a data access request for a data resource and to identify authentication requirements for a multifactor authentication process for the user based on the detected devices. Identifying the authentication requirements includes setting types of authentication and a number of authentication levels that are used for performing multifactor authentication with the user. The authentication engine is further configured to execute the multifactor authentication process for the user, to determine whether the user has satisfied the authentication requirements, and to provide access to the data resource in response to determining the user has satisfied the authentication requirements.

    Processing Authentication Requests to Secured Information Systems Using Machine-Learned User-Account Behavior Profiles

    公开(公告)号:US20200184050A1

    公开(公告)日:2020-06-11

    申请号:US16210042

    申请日:2018-12-05

    Abstract: Aspects of the disclosure relate to processing authentication requests to secured information systems using machine-learned user-account behavior profiles. A computing platform may receive an authentication request corresponding to a request for a user of a client computing device to access one or more secured information resources associated with a user account. The computing platform may capture one or more behavioral parameters and may authenticate the user of the client computing device to the user account based on the one or more behavioral parameters and one or more authentication credentials. The computing platform then may generate and send one or more authentication commands directing an account portal computing platform to allow access to the one or more secured information resources. Subsequently, the computing platform may capture activity data associated with one or more interactions in a client portal session and may update a behavioral profile associated with the user account.

    Processing Authentication Requests to Secured Information Systems Based on Machine-Learned User Behavior Profiles

    公开(公告)号:US20200184048A1

    公开(公告)日:2020-06-11

    申请号:US16210010

    申请日:2018-12-05

    Abstract: Aspects of the disclosure relate to processing authentication requests to secured information systems based on machine-learned user behavior profiles. A computing platform may receive an authentication request corresponding to a request for a user of a client computing device to access one or more secured information resources associated with a user account. The computing platform may capture behavioral parameters associated with the client computing device and may evaluate the behavioral parameters using a behavioral profile associated with the user account to determine a behavioral deviation score. Based on the behavioral deviation score, the computing platform may select an authentication action from a plurality of pre-defined authentication actions. Subsequently, the computing platform may generate commands directing an account portal computing platform to allow access, conditionally allow access, or prevent access based on the selected authentication action. Then, the computing platform may send the commands to the account portal computing platform.

    User authentication based on historical transaction data
    17.
    发明授权
    User authentication based on historical transaction data 有权
    基于历史交易数据的用户认证

    公开(公告)号:US09483766B2

    公开(公告)日:2016-11-01

    申请号:US15047114

    申请日:2016-02-18

    Abstract: Embodiments are directed to systems, methods and computer program products for providing user authentication based on transaction data. Embodiments receive from a user, a request to execute a user action associated with an application, wherein execution of the user action requires validation of authentication credentials; collect a transaction set of data comprising information related to transactions conducted by the user; collect a location set of data comprising information related to a physical location of the user; determine a transaction proximity score associated with the user and the transactions; determine a level of authentication associated with the determined transaction proximity score; determine which authentication types are associated with the level of authentication; request authentication credentials; receive authentication credentials from the user; validate the authentication credentials, thereby resulting in a successful validation of the authentication credentials; and, in response to the successful validation of the authentication credentials, execute the user action.

    Abstract translation: 实施例涉及用于基于交易数据提供用户认证的系统,方法和计算机程序产品。 实施例从用户接收执行与应用相关联的用户动作的请求,其中用户动作的执行需要认证证书的验证; 收集包含由用户进行的交易相关信息的数据交易集合; 收集包括与用户的物理位置有关的信息的位置数据集; 确定与用户和交易相关联的交易接近评分; 确定与确定的交易接近评分相关联的认证级别; 确定哪些认证类型与认证级别相关联; 请求认证凭证; 从用户接收认证凭证; 验证身份验证凭证,从而导致验证凭证成功验证; 并且响应于认证证书的成功验证,执行用户动作。

    USER AUTHENTICATION BASED ON HISTORICAL TRANSACTION DATA

    公开(公告)号:US20160162896A1

    公开(公告)日:2016-06-09

    申请号:US15047115

    申请日:2016-02-18

    Abstract: Embodiments are directed to systems, methods and computer program products for providing user authentication based on transaction data. Embodiments receive from a user, a request to execute a user action associated with an application, wherein execution of the user action requires validation of authentication credentials; collect a transaction set of data comprising information related to transactions conducted by the user; collect a location set of data comprising information related to a physical location of the user; determine a transaction proximity score associated with the user and the transactions; determine a level of authentication associated with the determined transaction proximity score; determine which authentication types are associated with the level of authentication; request authentication credentials; receive authentication credentials from the user; validate the authentication credentials, thereby resulting in a successful validation of the authentication credentials; and, in response to the successful validation of the authentication credentials, execute the user action.

    USER AUTHENTICATION BASED ON OTHER APPLICATIONS

    公开(公告)号:US20160134614A1

    公开(公告)日:2016-05-12

    申请号:US14980974

    申请日:2015-12-28

    Abstract: The present invention includes a system for authenticating a second action based on a first action, wherein the system is configured to: receive a first request to execute a first action associated with a first application; determine that execution of the first action requires user authentication; request one or more authentication credentials from the user; receive a first authentication credential associated with the first action; validate the first authentication credential, thereby resulting in a successful validation of the received first authentication credential; in response to the successful validation, execute the first action; receive a second request to execute a second action associated with a second application; determine that execution of the second action requires user authentication; use the successful validation of the first authentication credential to validate a second authentication credential so that the second action may be executed.

Patent Agency Ranking