主权项 |
1. A method for use in processing an authentication request, the authentication request including a user identifier and current user data, the method comprising:
receiving the authentication request at an adaptive authentication system which includes a processor and a database, the database having a set of entries, wherein each entry of the set of entries includes an identifier and previous user data in connection with previous authentication requests, the adaptive authentication system being constructed and arranged to perform an adaptive authentication operation on the authentication request, the adaptive authentication system being further constructed and arranged to perform an unsupervised machine learning operation on the authentication request; performing the adaptive authentication operation on the authentication request, including:
matching the user identifier of the authentication request with an identifier of a particular entry of the database;performing an analysis between the current user data associated with the authentication request and previous user data of the particular entry; andgenerating an authentication result based on the analysis, the authentication result indicating a likelihood of the authentication request being associated with fraudulent activity; and performing the unsupervised machine learning operation on the authentication request, including:
evaluating the current user data and previous user data of the particular entry;identifying a feature of user authentication behavior in response to the evaluation of the current user data and previous user data of the particular entry; andbased on the identified feature, adjusting the adaptive authentication system to form an adjusted adaptive authentication system such that an adaptive authentication operation performed by the adjusted adaptive authentication system on an authentication request similar to the received authentication request will generate a different authentication result. |