최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0216315 (2014-03-17) |
등록번호 | US-9419957 (2016-08-16) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 1 인용 특허 : 543 |
A programmed computer assigns an authentication requirement rating to an activity and an authentication capability rating to each of one or more authentication methods. The programmed computer receives a request from a user to perform the activity and a first authentication sample result based on a
A programmed computer assigns an authentication requirement rating to an activity and an authentication capability rating to each of one or more authentication methods. The programmed computer receives a request from a user to perform the activity and a first authentication sample result based on a first authentication attempt performed by the user using a first authentication method. The programmed computer determines a current authentication rating for the user based on the authentication capability rating of the first authentication method and the first authentication sample result. The programmed computer then determines whether to allow the user to perform the requested activity based on a comparison of the authentication requirement rating associated with the activity requested by the user and the current authentication rating determined for the user. The programmed computer provides a final authentication result.
1. A computer-implemented method, comprising: assigning, by a programmed computer, an authentication requirement rating to an activity;assigning, by the programmed computer, an authentication capability rating to each of one or more authentication methods, wherein the authentication capability ratin
1. A computer-implemented method, comprising: assigning, by a programmed computer, an authentication requirement rating to an activity;assigning, by the programmed computer, an authentication capability rating to each of one or more authentication methods, wherein the authentication capability rating indicates an ability of the one or more authentication methods to authenticate a user;receiving, at the programmed computer, over a network from a remote user access device, a request from a user to perform the activity;receiving, at the programmed computer over the network from the remote user access device, a first authentication sample result based on a first authentication attempt performed by the user using a first authentication method;determining, by the programmed computer, a current authentication rating for the user based on the authentication capability rating of the first authentication method and the first authentication sample result; adjusting, by the programmed computer, the current authentication rating determined for the user based on a second authentication method, wherein the second authentication method is a silent authentication method utilizing one or more factors determined about the user without presenting an explicit authentication challenge to the user; determining, by the programmed computer, whether to allow the user to perform the requested activity based on a comparison of the authentication requirement rating associated with the activity requested by the user and the adjusted current authentication rating determined for the user; andproviding, by the programmed computer over the network to the remote user access device, a final authentication result. 2. The computer-implemented method of claim 1, further comprising: receiving, at the programmed computer, a second authentication sample result based on a second authentication attempt performed by the user using the second authentication method; andupdating, by the programmed computer, the current authentication rating determined for the user based on the authentication capability rating of the second authentication method and the second authentication sample result. 3. A computer system, comprising: a memory; anda processing device communicatively coupled to the memory, the processing device configured to:assign an authentication requirement rating to an activity;assign an authentication capability rating to each of one or more authentication methods, wherein the authentication capability rating indicates an ability of the one or more authentication methods to authenticate a user; receive, over a network from a remote user access device, a request from a user to perform the activity; receive, over the network from the remote user access device, a first authentication sample result based on a first authentication attempt performed by the user using a first authentication method; determine a current authentication rating for the user based on the authentication capability rating of the first authentication method and the first authentication sample result; adjust the current authentication rating determined for the user based on a second authentication method, wherein the second authentication method is a silent authentication method utilizing one or more factors determined about the user without presenting an explicit authentication challenge to the user; determine whether to allow the user to perform the requested activity based on a comparison of the authentication requirement rating associated with the activity requested by the user and the adjusted current authentication rating determined for the user; andprovide, over the network to the remote user access device, a final authentication result. 4. The system of claim 3, wherein the processing device is further configured to: receive a second authentication sample result based on a second authentication attempt performed by the user using the second authentication method; andupdate the current authentication rating determined for the user based on the authentication capability rating of the second authentication method and the second authentication sample result. 5. A non-transitory computer-readable storage medium programmed to include instructions that, when executed by a processing device, cause the processing device to perform a method, said method comprising: assigning an authentication requirement rating to an activity;assigning an authentication capability rating to each of one or more authentication methods, wherein the authentication capability rating indicates an ability of the one or more authentication methods to authenticate a user;receiving, over a network from a remote user access device, a request from a user to perform the activity;receiving, over the network from the remote user access device, a first authentication sample result based on a first authentication attempt performed by the user using a first authentication method;determining a current authentication rating for the user based on the authentication capability rating of the first authentication method and the first authentication sample result; adjusting the current authentication rating determined for the user based on a second authentication method, wherein the second authentication method is a silent authentication method utilizing one or more factors determined about the user without presenting an explicit authentication challenge to the user; determining whether to allow the user to perform the requested activity based on a comparison of the authentication requirement rating associated with the activity requested by the user and the adjusted current authentication rating determined for the user; andproviding, over the network to the remote user access device, a final authentication result. 6. The non-transitory computer readable storage medium of claim 5, further comprising instructions that when executed by the processing device perform steps including; receiving a second authentication sample result based on a second authentication attempt performed by the user using the second authentication method; andupdating the current authentication rating determined for the user based on the authentication capability rating of the second authentication method and the second authentication sample result.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.