发明名称 |
Secondary user authentication bypass based on a whitelisting deviation from a user pattern |
摘要 |
A system and method for bypassing secondary user authentication based at least in part on the detection of a whitelisting deviation from a user pattern are disclosed. In one implementation, the system includes a pattern determination module, a fraudulent login identifier module, a whitelisting deviation detection module and a user authentication generation module. The pattern determination module determines a user pattern. The fraudulent login identifier module identifies a potentially fraudulent login and triggers a secondary authentication challenge. The whitelisting deviation detection module compares user information to the user pattern and determines based on the comparison whether a whitelisting deviation from the user pattern has occurred. The user authentication generation module generates and sends a secondary user authentication challenge responsive to the identification of a potentially fraudulent login by the fraudulent login identification module unless bypassed responsive to the determination that a whitelisting deviation has occurred. |
申请公布号 |
US9396316(B1) |
申请公布日期 |
2016.07.19 |
申请号 |
US201313796368 |
申请日期 |
2013.03.12 |
申请人 |
Google Inc. |
发明人 |
Altman Alon |
分类号 |
G06F21/31 |
主分类号 |
G06F21/31 |
代理机构 |
Patent Law Works LLP |
代理人 |
Patent Law Works LLP |
主权项 |
1. A method comprising:
determining, using one or more computing devices, a user pattern; identifying a potentially fraudulent login attempt; comparing user information to the user pattern; determining, based on comparing the user information to the user pattern, that a deviation from the user pattern has occurred and the deviation has occurred prior to the potentially fraudulent login attempt; determining whether the deviation is a whitelisting deviation by identifying information indicating that the potentially fraudulent login attempt is likely to be legitimate; responsive to the deviation being the whitelisting deviation, bypassing a secondary user authentication challenge process triggered by the potentially fraudulent login attempt. |
地址 |
Mountain View CA US |