摘要 |
Methods, systems, apparatuses, and computer-readable media for utilizing just-in-time polymorphic authentication techniques to secure information are presented. In one or more embodiments, a computing platform may receive, from a computing device, a request to access a user account. In response to receiving the request to access the user account, the computing platform may dynamically select, based on one or more polymorphic authentication factors, an authentication method for authenticating a user of the computing device, and the authentication method may be selected from a plurality of predefined authentication methods. Subsequently, the computing platform may generate one or more authentication prompts based on the selected authentication method. The computing platform then may provide the one or more authentication prompts to the user of the computing device. The authentication prompts that are selected for and presented to a particular user during a given access attempt may vary across different attempts. |
主权项 |
1. A method, comprising:
at a computing platform comprising at least one processor, memory, and a communication interface:
receiving, by the at least one processor, via the communication interface, and from a first computing device, a request to access a first user account;in response to receiving the request to access the first user account, dynamically selecting, by the at least one processor, based on one or more polymorphic authentication factors, a first authentication method for authenticating a user of the first computing device, the first authentication method being selected from a plurality of predefined authentication methods;generating, by the at least one processor, one or more authentication prompts based on the selected first authentication method;providing, by the at least one processor, the one or more authentication prompts to the user of the first computing device;receiving, by the at least one processor, via the communication interface, and from a second computing device different from the first computing device, a request to access a second user account different from the first user account;in response to receiving the request to access the second user account, dynamically selecting, by the at least one processor, based on the one or more polymorphic authentication factors, a second authentication method for authenticating a user of the second computing device, the second authentication method being selected from the plurality of predefined authentication methods;generating, by the at least one processor, one or more second authentication prompts based on the selected second authentication method; andproviding, by the at least one processor, the one or more second authentication prompts to the user of the second computing device, wherein the second authentication method for authenticating the user of the second computing device is different from the first authentication method for authenticating the user of the first computing device, and wherein providing the one or more second authentication prompts to the user of the second computing device includes providing, to the user of the second computing device, the one or more authentication prompts that were provided to the user of the first computing device in a different sequence. |