-
公开(公告)号:US20170214679A1
公开(公告)日:2017-07-27
申请号:US15004939
申请日:2016-01-23
Applicant: Verizon Patent and Licensing Inc.
Inventor: Zhijian Lin , Kumar Sanjeev , Brandon James Martella , Ashwin R. Kamath , Dongliang Hu
Abstract: A user may have real-time control over whether accessing a network service account implements two-factor authentication. When a username and password is provided to log into the network service account, a determination may be made about whether the login attempt is a potential security threat. When the login attempt does not appear to be a threat, the login attempt may be processed based on the username and password. When the login attempt is a potential security threat, the actual user corresponding to the network service account may be notified and asked to confirm whether the login attempt is a security threat. When the user confirms that the login attempt is not a security threat, the user may be logged in based on the username and password. When the user confirms that the login attempt is a security threat, two-factor authentication may be implemented for accessing the network service account.
-
公开(公告)号:US10785210B2
公开(公告)日:2020-09-22
申请号:US15004939
申请日:2016-01-23
Applicant: Verizon Patent and Licensing Inc.
Inventor: Zhijian Lin , Kumar Sanjeev , Brandon James Martella , Ashwin R. Kamath , Dongliang Hu
Abstract: A user may have real-time control over whether accessing a network service account implements two-factor authentication. When a username and password is provided to log into the network service account, a determination may be made about whether the login attempt is a potential security threat. When the login attempt does not appear to be a threat, the login attempt may be processed based on the username and password. When the login attempt is a potential security threat, the actual user corresponding to the network service account may be notified and asked to confirm whether the login attempt is a security threat. When the user confirms that the login attempt is not a security threat, the user may be logged in based on the username and password. When the user confirms that the login attempt is a security threat, two-factor authentication may be implemented for accessing the network service account.
-