Abstract:
Systems and methods for authenticating a user through behavioral analysis. The methods comprise: collecting observation data specifying an observed behavior of the user while interacting with a computing device; obtaining a confidence value reflecting a degree of confidence that the user is an authorized or unauthorized user of the computing device (where the confidence value is determined based on the observation data and a machine learning model trained with a known behavior pattern of the authorized user); using at least the confidence value and the observed behavior's amount of deviation from a normal behavior pattern to derive a risk level score value for a user account to which the computing device is associated; comparing the risk level score value to a threshold value; and performing at least one action to protect user account security when the threshold value is equal to or greater than the threshold value.
Abstract:
Methods and systems for authenticating a user requesting to access one or more resources via a device are described herein. Authentication may be based on or otherwise rely on a plurality of devices. For example, aspects described herein are directed towards a system and method for receiving a request from a user to access one or more resources via a first device. In response to receiving the request to access the one or more resources, the first device may send, e.g., to a second device, a request for user input of a credential at the second device. The first device may receive a credential from the second device, and the first device may authenticate the user based on the received credential. Additionally or alternatively, the second device may authenticate the user based on an input of a user credential, and the second device may send an indication of a successful authentication to the first device.