[go: up one dir, main page]

WO2019132642A1 - Method and system for automated selection of login in a multi-modal authentication system - Google Patents

Method and system for automated selection of login in a multi-modal authentication system Download PDF

Info

Publication number
WO2019132642A1
WO2019132642A1 PCT/MY2018/050075 MY2018050075W WO2019132642A1 WO 2019132642 A1 WO2019132642 A1 WO 2019132642A1 MY 2018050075 W MY2018050075 W MY 2018050075W WO 2019132642 A1 WO2019132642 A1 WO 2019132642A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
authentication
authentication method
login
profile
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/MY2018/050075
Other languages
French (fr)
Inventor
Pei Shian CHANG
Hoon Sin Cheong
Chong Seak Sea
Dharmadharshni A/P MANIAM
Hon Loon WONG
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Mimos Bhd
Original Assignee
Mimos Bhd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mimos Bhd filed Critical Mimos Bhd
Publication of WO2019132642A1 publication Critical patent/WO2019132642A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour

Definitions

  • the invention relates to an authentication method. More particularly, the invention relates to a method and system for facilitating frictionless user experience in a multi modal authentication system.
  • US20070236330A1 discloses a system and method for performing user authentication based on behaviours patterns of a mobile terminal user.
  • the system includes a mobile terminal having an input unit configured to receive authentication information from a user, an authentication unit configured to extract behaviour patterns of the user based on the authentication information, and a data communication unit configured to transmit the authentication information and the behaviour patterns to an authentication server.
  • the behaviour patterns extracted based on the authentication information includes the user’s characteristic behaviour patterns such as typing patterns, motion patterns, voice patterns and writing patterns.
  • the disclosed system has a limitation where the system could not predict the preferred authentication method of the user based on user’s preference.
  • US 9185095B1 discloses a method and system for behavioural profiling.
  • the methods includes observing behavioural characteristics of user interactions during a current session with the user through one of a plurality of channels. Variations between the behavioural characteristics of the user interactions observed during the current session and a behavioural profile previously developed based on prior usage pattern of the user through the plurality of channels are identified, in real-time or near real-time.
  • the drawbacks of the system does not allow the user to reject the presented authentication and reduce the list of available authentication methods.
  • the main objective of the invention is to provide a computer-implemented method to automatically select an authentication method for a user based on a plurality of historical profiles corresponding to the user identifier to a multi-modal authentication system.
  • the computer-implemented method for automatic selection of authentication method in a multi-modal authentication system comprising the steps of determining, by a user terminal, a user at a log-in interface and retrieves the user’s behavioural data; wherein the behavioural data includes the user’s login sessions, geolocation, and type of operating systems used; processing, by a profiling module, the behavioural data to generate a user profile; evaluating, by an evaluation module, the user’s profile by factoring in environmental parameters of the user terminal to select an authentication method; notifying, by an authentication server, the user with the selected authentication method for the user to complete the authentication process; and upon successfully logged-in, updating, by profiling module, the user’s profile with data relating to the new successful login session for future evaluation.
  • the method further comprising the steps of providing, by the user terminal, the user with options to reject the selected authentication method; and upon the user rejects the selected authentication method, repeating, by evaluation module, the abovementioned steps with the current selected authentication method being excluded to select a new authentication method.
  • the steps for evaluating the authentication method further comprising the steps of retrieving, by the evaluation module, a list of available authentication methods for the user; and calculating, by a computing means, a historical distribution of individual methods in previous successful login sessions which have the user’s profile identical to those in the current login session.
  • the steps for evaluating the authentication method further comprising the steps of selecting, by the evaluation module, the authentication method with a highest distribution for the user in the current login session.
  • the steps for evaluating the authentication method further comprising the steps of selecting, by the evaluation module, the authentication method with the most recent login timestamp for the user in the current login session, if no single authentication method can be determined by the calculation of historical distribution.
  • the user terminal is a web browser or a native application running on a computing device.
  • Figure 1 is a diagram illustrating a representative environment for implementing an automated method selection in a multi-modal authentication system, in accordance to an embodiment of the present invention.
  • Figure 2 is a flow chart illustrating the process flow of the automated selection of authentication method in accordance to an embodiment of the present invention.
  • Figure 3 is a flow chart illustrating the overall process flow of the automated selection of authentication method in accordance to an embodiment of the present invention.
  • Figure 4 is a flow chart illustrating the detailed process flow of evaluation module in accordance to an embodiment of the present invention.
  • Fig. 1 shows the automated authentication system based on user behaviour profile.
  • the system comprises a user terminal 101 for determining a user at a log-in interface and retrieving the user’s behavioural data, a profiling module 103 for processing the behavioural data to generate a user profile and updating the user profile with data relating to the new successful login session for future evaluation upon successful logged-in, an authentication module 102 for evaluating the user profile by factoring in environmental parameters of the user terminal to select an authentication method and an authentication server 202 for notifying the user with the selected authentication method 105 for the user 100 to complete the authentication process.
  • the behavioural data 104 includes the user’s login sessions, geolocation, and type of operating system used.
  • the computing device may be a personal computer, smartphones, tablets, personal digital assistants (PDA), netbooks, phablets, phoblets, or any suitable means which capable of receiving inputs from the user, processing the data and performing data transmission.
  • PDA personal digital assistants
  • Fig. 2 illustrates the process flow of the current invention in detail description.
  • the user 100 will first trigger a login session by launching a login page 201 via the user terminal 101.
  • the authentication system will prompt the user 100 to enter his/her username on the login page 201 first instead of showing a list of login method for the user 100 to select.
  • the authentication server 202 which includes an evaluation module 102 to select a login method 105 for user 100 to login upon the verification of user's identity.
  • the selected login method 105 is then send to the login page 201 on the user terminal 101 for allowing the user 100 to key in login credentials for the authentication.
  • the login credentials may be a One-Time Password (OTP), pin numbers, biometric information, barcodes or any combination thereof.
  • OTP One-Time Password
  • the login credentials are then sent to the authentication server 202 for second verification of user's identity.
  • the login attempt will be added to the historical profiles for future evaluations.
  • step 300 the authentication system automatically selects a login method 105 for the user 100 based on a plurality of historical profiles related to his/her username inside the database 106.
  • step 301 and 302 the user 100 can skipped to continue to login with the selected method 105. If the user 100 skipped the selected method 105, the authentication system will select another method for the user with exclude the skipped method.
  • step 303 where the user 100 continues and completed login with the selected method 105, the successful login attempt is added to the historical profiles as in step 304.
  • Fig. 4 shows the detailed process flow of evaluation module 102.
  • the process starts with step 400 where after the username is verified, normalized distribution of the methods used is retrieved based on each of the extracted environment parameters.
  • steps 401 if more than one method having highest normalized distribution (HND), the automated authentication system will select the most recent last use login method from the timestamp table in profiling module. Meanwhile, the system will directly show the login method if only one method having the HND 402. However, user 100 is allowed to skip the selected method in step 403.
  • step 404 if the user 100 skips the selected method while the user 100 having one login method inside his/her profile, the system will show related error to the user 407.
  • HND normalized distribution
  • step 406 if the user 100 does not skip the selected method and continue to login, the related behavioural data 104 will be stored by the authentication server 202 to keep as profiling module 103.
  • Table 1 Example of a profile based on Operating System
  • the above table 1 shows an example of a profile based on Operating System.
  • the profiling module 103 extracts the behavioural data 104 that is received, stored and transmitted by the authentication server 202 after the user 100 is verified.
  • Successful login data are profiled based on the user behavioural data 104 such as operating system (OS), browser and geolocation.
  • OS operating system
  • the profile also includes the last successful login timestamp of each method for every successful login attempt as illustrated in the table 2 below.
  • Table 2 Example of profile including last successful login timestamp of each method
  • environmental parameters such as previously used authentication method and login timestamps of the login session are extracted after a username is verified.
  • the normalized distribution of the methods used is retrieved with each of the extracted environment parameters as shown in the example in Table 3 and Table 4.
  • method 3 is selected for user to login as it has the highest normalized distribution (HND).
  • two or more methods may have the same highest normalized distribution for a current login user.
  • the evaluation module 102 will select the method with the most recent last use method based on the timestamp table which stored during every successful login attempt of the user.
  • Table 4 Timestamp table for every successful login attempt of the user
  • method 1 which has the most recent last use record is selected for user to login.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Social Psychology (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present invention discloses a computer-implemented method for automatic selection of authentication method in a multi-modal authentication system characterized by the steps of: determining a user (100) at a log-in interface and retrieves the user's behavioural data (104) by a user terminal (101); wherein the behavioural data (104) includes the user's login sessions, geolocation, and type of operating systems used; processing the behavioural data (104) to generate a user profile by a profiling module (103); evaluating the user's profile by factoring in environmental parameters of the user terminal to select an authentication method by an evaluation module (102); notifying the user (100) with the selected authentication method (105) for the user (100) to complete a authentication process by an authentication server (202); and updating, the user profile with data relating to a new successful login session for future evaluation by profiling module (103) upon successfully logged-in.

Description

METHOD AND SYSTEM FOR AUTOMATED SELECTION OF LOGIN IN A MULTI-MODAL AUTHENTICATION SYSTEM
FIELD OF INVENTION
The invention relates to an authentication method. More particularly, the invention relates to a method and system for facilitating frictionless user experience in a multi modal authentication system.
BACKGROUND OF THE INVENTION
The requirement for reliable techniques for user authentication has enhanced within the wake of heightened considerations regarding security and fast advancements in communication, quality and networking. A large kind of applications need reliable verification schemes to verify the identity of a person requesting their service. While providing flexibility to the users, multi-modal authentication can lead to some adverse effects. For instance, confusion and annoyance may occurred as unregistered authentication methods are shown. Furthermore, multi-modal authentication can also lead to undesirable friction in user experience where the users need to perform an additional step to choose the authentication method.
In one example as shown in US20070236330A1 discloses a system and method for performing user authentication based on behaviours patterns of a mobile terminal user. The system includes a mobile terminal having an input unit configured to receive authentication information from a user, an authentication unit configured to extract behaviour patterns of the user based on the authentication information, and a data communication unit configured to transmit the authentication information and the behaviour patterns to an authentication server. The behaviour patterns extracted based on the authentication information includes the user’s characteristic behaviour patterns such as typing patterns, motion patterns, voice patterns and writing patterns. However, the disclosed system has a limitation where the system could not predict the preferred authentication method of the user based on user’s preference.
In a second example as shown in patent document US 9185095B1 discloses a method and system for behavioural profiling. The methods includes observing behavioural characteristics of user interactions during a current session with the user through one of a plurality of channels. Variations between the behavioural characteristics of the user interactions observed during the current session and a behavioural profile previously developed based on prior usage pattern of the user through the plurality of channels are identified, in real-time or near real-time. However, the drawbacks of the system does not allow the user to reject the presented authentication and reduce the list of available authentication methods.
Accordingly, it would be desirable to provide a system that can automatically select a login method for a user based on the behaviour characteristics of a current session when compared to the user’s historical profile.
SUMMARY OF INVENTION
The main objective of the invention is to provide a computer-implemented method to automatically select an authentication method for a user based on a plurality of historical profiles corresponding to the user identifier to a multi-modal authentication system. The computer-implemented method for automatic selection of authentication method in a multi-modal authentication system comprising the steps of determining, by a user terminal, a user at a log-in interface and retrieves the user’s behavioural data; wherein the behavioural data includes the user’s login sessions, geolocation, and type of operating systems used; processing, by a profiling module, the behavioural data to generate a user profile; evaluating, by an evaluation module, the user’s profile by factoring in environmental parameters of the user terminal to select an authentication method; notifying, by an authentication server, the user with the selected authentication method for the user to complete the authentication process; and upon successfully logged-in, updating, by profiling module, the user’s profile with data relating to the new successful login session for future evaluation.
Preferably, the method further comprising the steps of providing, by the user terminal, the user with options to reject the selected authentication method; and upon the user rejects the selected authentication method, repeating, by evaluation module, the abovementioned steps with the current selected authentication method being excluded to select a new authentication method.
Preferably, the steps for evaluating the authentication method further comprising the steps of retrieving, by the evaluation module, a list of available authentication methods for the user; and calculating, by a computing means, a historical distribution of individual methods in previous successful login sessions which have the user’s profile identical to those in the current login session.
Preferably, the steps for evaluating the authentication method further comprising the steps of selecting, by the evaluation module, the authentication method with a highest distribution for the user in the current login session.
Preferably, the steps for evaluating the authentication method further comprising the steps of selecting, by the evaluation module, the authentication method with the most recent login timestamp for the user in the current login session, if no single authentication method can be determined by the calculation of historical distribution.
Preferably, the user terminal is a web browser or a native application running on a computing device. The second objective of this invention is to provide a computer-implemented system for allowing automated method selection in a multi-modal authentication system comprises a user terminal for determining a user at a log-in interface and retrieving the user’s behavioural data; wherein the behavioural data includes the user’s login sessions, geolocation, and type of operating systems used; a profiling module for processing the behavioural data to generate a user profile and updating the user profile with data relating to the new successful login session for future evaluation upon successfully logged-in; an evaluation module for evaluating the user profile by factoring in environmental parameters of the user terminal to select an authentication method; and an authentication server for notifying the user with the selected authentication method for the user to complete the authentication process.
One skilled in the art will readily appreciate that the invention is well adapted to carry out the objects and obtain the ends and advantages mentioned, as well as those inherent therein. The embodiments described herein are not intended as limitations on the scope of the invention.
BRIEF DESCRIPTION OF THE DRAWINGS
For the purpose of facilitating an understanding of the invention, there is illustrated in the accompanying drawing the preferred embodiments from an inspection of which when considered in connection with the following description, the invention, its construction and operation and many of its advantages would be readily understood and appreciated.
Figure 1 is a diagram illustrating a representative environment for implementing an automated method selection in a multi-modal authentication system, in accordance to an embodiment of the present invention. Figure 2 is a flow chart illustrating the process flow of the automated selection of authentication method in accordance to an embodiment of the present invention.
Figure 3 is a flow chart illustrating the overall process flow of the automated selection of authentication method in accordance to an embodiment of the present invention.
Figure 4 is a flow chart illustrating the detailed process flow of evaluation module in accordance to an embodiment of the present invention.
DETAILED DESCRIPTION OF THE INVENTION
The invention will now be described in greater detail, by way of example, with reference to the drawings.
Fig. 1 shows the automated authentication system based on user behaviour profile. The system comprises a user terminal 101 for determining a user at a log-in interface and retrieving the user’s behavioural data, a profiling module 103 for processing the behavioural data to generate a user profile and updating the user profile with data relating to the new successful login session for future evaluation upon successful logged-in, an authentication module 102 for evaluating the user profile by factoring in environmental parameters of the user terminal to select an authentication method and an authentication server 202 for notifying the user with the selected authentication method 105 for the user 100 to complete the authentication process. Preferably, the behavioural data 104 includes the user’s login sessions, geolocation, and type of operating system used. Preferably, the computing device may be a personal computer, smartphones, tablets, personal digital assistants (PDA), netbooks, phablets, phoblets, or any suitable means which capable of receiving inputs from the user, processing the data and performing data transmission.
Fig. 2 illustrates the process flow of the current invention in detail description. During the authentication, the user 100 will first trigger a login session by launching a login page 201 via the user terminal 101. The authentication system will prompt the user 100 to enter his/her username on the login page 201 first instead of showing a list of login method for the user 100 to select. Preferably, the authentication server 202 which includes an evaluation module 102 to select a login method 105 for user 100 to login upon the verification of user's identity. The selected login method 105 is then send to the login page 201 on the user terminal 101 for allowing the user 100 to key in login credentials for the authentication. Preferably, the login credentials may be a One-Time Password (OTP), pin numbers, biometric information, barcodes or any combination thereof. The login credentials are then sent to the authentication server 202 for second verification of user's identity. Upon the successful of user verification, the login attempt will be added to the historical profiles for future evaluations.
In another embodiment as shown in Fig. 3, where in step 300 the authentication system automatically selects a login method 105 for the user 100 based on a plurality of historical profiles related to his/her username inside the database 106. However, in step 301 and 302, the user 100 can skipped to continue to login with the selected method 105. If the user 100 skipped the selected method 105, the authentication system will select another method for the user with exclude the skipped method. Next in step 303, where the user 100 continues and completed login with the selected method 105, the successful login attempt is added to the historical profiles as in step 304.
Fig. 4 shows the detailed process flow of evaluation module 102. The process starts with step 400 where after the username is verified, normalized distribution of the methods used is retrieved based on each of the extracted environment parameters. In steps 401, if more than one method having highest normalized distribution (HND), the automated authentication system will select the most recent last use login method from the timestamp table in profiling module. Meanwhile, the system will directly show the login method if only one method having the HND 402. However, user 100 is allowed to skip the selected method in step 403. In step 404, if the user 100 skips the selected method while the user 100 having one login method inside his/her profile, the system will show related error to the user 407. On the other hand, if the user 100 has more than one login method inside his/her profile, the system will exclude the skipped method and do evaluation again to select another login method for user 100 as described in steps 405 and 408. Lastly in step 406, if the user 100 does not skip the selected method and continue to login, the related behavioural data 104 will be stored by the authentication server 202 to keep as profiling module 103.
Figure imgf000009_0001
Table 1: Example of a profile based on Operating System The above table 1 shows an example of a profile based on Operating System. During the updating process, the profiling module 103 extracts the behavioural data 104 that is received, stored and transmitted by the authentication server 202 after the user 100 is verified. Successful login data are profiled based on the user behavioural data 104 such as operating system (OS), browser and geolocation. Preferably, the profile also includes the last successful login timestamp of each method for every successful login attempt as illustrated in the table 2 below.
Figure imgf000010_0001
Table 2: Example of profile including last successful login timestamp of each method
For the evaluation module 102, environmental parameters such as previously used authentication method and login timestamps of the login session are extracted after a username is verified. Hence, the normalized distribution of the methods used is retrieved with each of the extracted environment parameters as shown in the example in Table 3 and Table 4.
Overall distribution of each method, is calculated and tabulated in table 3.
Method 1 = 0.2 X 0.5 X 0.3 = 0.03
Figure imgf000010_0002
Table 3: Overall distribution of each method
Based on table 3, method 3 is selected for user to login as it has the highest normalized distribution (HND).
In another example as shown in table 4 below, two or more methods may have the same highest normalized distribution for a current login user. The evaluation module 102 will select the method with the most recent last use method based on the timestamp table which stored during every successful login attempt of the user.
Figure imgf000011_0001
Table 4: Timestamp table for every successful login attempt of the user
Based on table 4, method 1 which has the most recent last use record is selected for user to login.
The present disclosure includes as contained in the appended claims, as well as that of the foregoing description. Although this invention has been described in its preferred form with a degree of particularity, it is understood that the present disclosure of the preferred form has been made only by way of example and that numerous changes in the details of construction and the combination and arrangements of parts may be resorted to without departing from the scope of the invention.

Claims

1. A computer-implemented method for automatic selection of authentication method in a multi-modal authentication system characterized by the steps of:
determining a user (100) at a log-in interface and retrieves the user’s behavioural data (104) by a user terminal (101); wherein the behavioural data
(104) includes the user’s login sessions, geolocation, and type of operating systems used;
processing the behavioural data (104) to generate a user profile by a profiling module (103);
evaluating the user’s profile by factoring in environmental parameters of the user terminal (101) to select an authentication method by an evaluation module (102);
notifying the user (100) with the selected authentication method (105) for the user (100) to complete an authentication process by an authentication server (202); and
updating, the user profile with data relating to a new successful login session for future evaluation by profiling module (103) upon successfully logged-in.
2. The method as claimed in claim 1, further comprising the steps of:
providing the user (100) with options to reject the selected authentication method
(105) by the user terminal (101); and
upon the user (100) rejects the selected authentication method (105),
repeating the steps of claim 1 with current selected authentication method being excluded to select a new authentication method by the evaluation module (102).
3. The method as claimed in claim 1, wherein the steps for evaluating the user’s profile by factoring in environmental parameters of the user terminal (101) to select an authentication method further comprising the steps of: retrieving a list of available authentication methods for the user (100) by the evaluation module (102); and
calculating, by a computing device, a historical distribution of individual methods in previous successful login sessions which have the user’s profile identical to those in the current login session.
4. The method as claimed in claim 3, further comprising the steps of selecting the authentication method (105) with a highest distribution for the user (100) in the current login session by the evaluation module (102).
5. The method as claimed in claim 3, further comprising the steps of selecting, by the evaluation module (102), the authentication method (105) with the most recent login timestamp for the user (100) in the current login session, if no single authentication method can be determined by the calculation of historical distribution.
6. The method as claimed in claim 1, wherein the user terminal (101) is a web browser or a native application running on a computing device.
7. The method as claimed in claim 1, wherein the environmental parameters includes previously used authentication method and login timestamps.
8. A computer- implemented system for automatic selection of authentication method in a multi-modal authentication system comprises:
a user terminal (101) linked to an authentication server (202) via a communication network;
wherein the authentication server (202) comprising a profiling module (103) and evaluation module (102);
characterized in that the user terminal (101) determines a user (100) at a log-in interface and retrieves a user’s behavioural data (104), the profiling module (103) processes the behavioural data (104) to generate a user profile and update the user profile with data relating to a new successful login session for future evaluation upon successfully logged-in, the user profile is further evaluated by the evaluation module (102) by factoring in environmental parameters of the user terminal (101) to select an authentication method and the user is notified by the authentication server (202) to complete the authentication process with the selected authentication method (105).
9. The system as claimed in claim 8, wherein the user terminal (101) is a web browser or a native application running on a computing device.
10. The system as claimed in claim 8, wherein the behavioural data (104) includes the user’s login sessions, geolocation, and type of operating systems used.
PCT/MY2018/050075 2017-12-28 2018-11-09 Method and system for automated selection of login in a multi-modal authentication system Ceased WO2019132642A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
MYPI2017705108 2017-12-28
MYPI2017705108A MY197625A (en) 2017-12-28 2017-12-28 Method and system for automated selection of login in a multi-modal authentication system

Publications (1)

Publication Number Publication Date
WO2019132642A1 true WO2019132642A1 (en) 2019-07-04

Family

ID=65818576

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/MY2018/050075 Ceased WO2019132642A1 (en) 2017-12-28 2018-11-09 Method and system for automated selection of login in a multi-modal authentication system

Country Status (2)

Country Link
MY (1) MY197625A (en)
WO (1) WO2019132642A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070236330A1 (en) 2006-04-06 2007-10-11 Sungzoon Cho System and method for performing user authentication based on user behavior patterns
WO2014011026A1 (en) * 2012-07-13 2014-01-16 Mimos Berhad A system and method for multimodal authentication platform
US9185095B1 (en) 2012-03-20 2015-11-10 United Services Automobile Association (Usaa) Behavioral profiling method and system to authenticate a user
US20170286648A1 (en) * 2014-08-25 2017-10-05 The University Of Tokyo Authentication system and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070236330A1 (en) 2006-04-06 2007-10-11 Sungzoon Cho System and method for performing user authentication based on user behavior patterns
US9185095B1 (en) 2012-03-20 2015-11-10 United Services Automobile Association (Usaa) Behavioral profiling method and system to authenticate a user
US9514293B1 (en) * 2012-03-20 2016-12-06 United Services Automobile Association Behavioral profiling method and system to authenticate a user
WO2014011026A1 (en) * 2012-07-13 2014-01-16 Mimos Berhad A system and method for multimodal authentication platform
US20170286648A1 (en) * 2014-08-25 2017-10-05 The University Of Tokyo Authentication system and method

Also Published As

Publication number Publication date
MY197625A (en) 2023-06-29

Similar Documents

Publication Publication Date Title
US9979713B2 (en) Scored factor-based authentication
US10375119B2 (en) Dynamic multi-factor authentication challenge generation
US9560076B2 (en) Secure trust-scored distributed multimedia collaboration session
US20250086260A1 (en) System and method for authenticating users using weak authentication techniques, with differences for different features
US10728033B2 (en) Identity authentication method, apparatus, and storage medium
US20150271167A1 (en) Method of Altering Authentication Information to Multiple Systems
US10607263B2 (en) Computerized systems and methods for authenticating users on a network device via dynamically allocated authenticating state machines hosted on a computer network
EP3830723B1 (en) Increasing security of a password-protected resource based on publicly available data
TW202032397A (en) Login mode pushing and displaying method, device and equipment
US10284561B2 (en) Method and server for providing image captcha
KR20170118094A (en) SYSTEM AND METHOD FOR USER IDENTIFICATION AND CLIENT AND SERVER BY USING THE SYSTEM AND METHOD
CN104156232B (en) The non-linear method and apparatus redirected of the page is used under linear page structure
US9721087B1 (en) User authentication
CN111651749B (en) Method, device, computer equipment and storage medium for retrieving account based on password
JP2023174900A (en) Management server, telework management support system, telework management support method and program
CN109214543B (en) Data processing method and device
US8413220B1 (en) System and method for user authentication
CN109816543A (en) A kind of image lookup method and device
CN105162931B (en) The sorting technique and device of a kind of communicating number
JP7416860B2 (en) Method and apparatus for communicating credentials
JP6570978B2 (en) Cluster selection device
JP5760037B2 (en) User authentication apparatus, method, and program
US10037417B1 (en) Transformation of network activity data for user identification
CN109684850A (en) Test method, apparatus, computer equipment and the storage medium of password
CN109005143B (en) A method and device for adjusting website load

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18859948

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18859948

Country of ref document: EP

Kind code of ref document: A1