发明名称 User authentication
摘要 There is disclosed a technique for use in authentication. The technique comprises selecting an authentication challenge when an authentication request is deemed risky. An attack threat determined to be associated with the authentication request acts as a decision factor in the selection of the authentication challenge such that a biometric challenge is selected in the event that the attack threat describes a stolen device and an out-of-band challenge is selected in the event that the attack threat describes a stolen identification credential.
申请公布号 US9639689(B1) 申请公布日期 2017.05.02
申请号 US201314138451 申请日期 2013.12.23
申请人 EMC IP Holding Company LLC 发明人 Herskovic Maya;Bar-Menachem Ika;Mihalache Theodor
分类号 G06F21/62;G06F21/44 主分类号 G06F21/62
代理机构 代理人 Gupta Krishnendu;Reyes Jason A.
主权项 1. A computer-implemented method, comprising: receiving, by processing circuitry, a request to authenticate an electronic transaction involving a specific user seeking access to a computerized resource; in response to receiving the request, analysing, by processing circuitry, at least one attribute associated with the electronic transaction, wherein the at least one attribute describes the electronic transaction involving the specific user; based on the analysis, determining, by processing circuitry, an attack threat in connection with the electronic transaction, wherein the attack threat describes one of a stolen device and a stolen identification credential obtained by a fraudster; based on the attack threat, selecting, by processing circuitry, an authentication challenge that challenges the specific user, wherein the attack threat acts as a decision factor in the selection of the authentication challenge such that a biometric challenge is selected in the event that the attack threat describes a stolen device and an out-of-band challenge is selected in the event that the attack threat describes a stolen identification credential; providing, by processing circuitry, the authentication challenge in a manner that requires the specific user to respond; receiving, by processing circuitry, a user response to the authentication challenge; generating, by processing circuitry, an authentication result based on the user response, the authentication result indicating whether the electronic transaction is authentic; and utilizing, by processing circuitry, the authentication result to control access by the specific user to the computerized resource.
地址 Hopkinton MA US