CPC H04L 63/0876 (2013.01) [G06N 3/044 (2023.01); G06N 3/045 (2023.01); G06N 3/08 (2013.01); H04L 63/20 (2013.01)] | 20 Claims |
1. A computer-implemented method comprising:
receiving, by an electronic device, a request from a user to access the electronic device or to process a transaction;
selecting, by the electronic device or a server computer in communication with the electronic device, an authentication type based on user attributes specifying authentication preferences or activities of the user, device attributes specifying hardware and software implemented by or within the electronic device, and operating environment attributes associated with an environment in which the electronic device is operated, using a set of heuristically determined authentication rules;
prompting, by the electronic device, the user for authentication data corresponding to the selected authentication type;
receiving, by the electronic device, the authentication data corresponding to the selected authentication type; and
granting or declining, by the electronic device, permission for the user to access the electronic device or to process the transaction based on analysis of the received authentication data.
|