US 9,813,402 B1
User authentication based on probabilistic inference of threat source
Tao Chen, Northbrook, IL (US); and Manjunath Rao, Wheeling, IL (US)
Assigned to Allstate Insurance Company, Northbrook, IL (US)
Filed by Allstate Insurance Company, Northbrook, IL (US)
Filed on Jan. 8, 2016, as Appl. No. 14/991,042.
Int. Cl. G06F 7/04 (2006.01); H04L 29/06 (2006.01); G06F 21/31 (2013.01)
CPC H04L 63/08 (2013.01) [G06F 21/31 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A method of authenticating a user requesting access to a computing resource comprising:
storing, at a data store of a computing device, activity data describing one or more activities associated with a user;
receiving, at the computing device, a request to authenticate the user;
identifying, by the computing device, a potential threat source;
selecting, by the computing device, a portion of the activity data based on the potential threat source identified, wherein selecting the portion of the activity data comprises one of:
(a) selecting first activity data associated with a first activity categorized as either a personal-related activity or a social-related activity responsive to categorizing the potential threat source as a work-related threat,
(b) selecting second activity data associated with a second activity categorized as either a personal-related activity or a work-related activity responsive to categorizing the potential threat source as a social-related threat,
(c) selecting third activity data associated with a third activity categorized as either a work-related activity or a social-related activity responsive to categorizing the potential threat source as a personal-related threat;
generating, by the computing device, one or more questions using the portion of the activity data selected;
providing, by the computing device, the one or more questions for presentation to the user;
receiving, at the computing device, one or more answers to the one or more questions;
determining whether the user is authenticated based on the one or more answers; and
either granting access to a computing resource responsive to determining the user is authenticated or denying access to the computing resource responsive to determining the user is not authenticated.