The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Mar. 06, 2018

Filed:

Dec. 14, 2015
Applicants:

Dipankar Dasgupta, Germantown, TN (US);

Abhijit Kumar Nag, Memphis, TN (US);

Arunava Roy, Memphis, TN (US);

Inventors:

Dipankar Dasgupta, Germantown, TN (US);

Abhijit Kumar Nag, Memphis, TN (US);

Arunava Roy, Memphis, TN (US);

Assignee:

Other;

Attorneys:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); G06F 21/32 (2013.01); G06F 21/31 (2013.01); G06F 21/36 (2013.01); G06F 21/40 (2013.01); G06F 21/45 (2013.01);
U.S. Cl.
CPC ...
H04L 63/083 (2013.01); G06F 21/316 (2013.01); G06F 21/32 (2013.01); G06F 21/36 (2013.01); G06F 21/40 (2013.01); G06F 21/45 (2013.01); H04L 63/08 (2013.01); H04L 63/0861 (2013.01); H04L 2463/082 (2013.01);
Abstract

A system and methodology for adaptive selection of multiple modalities for authentication in different operating environments, thereby making authentication strategy unpredictable so to significantly reduce the risk of exploitation by authentication-guessing attacks. The system calculates trustworthiness values of different authentication factors under various environmental settings, and combines a trust-based adaptive, robust and scalable software-hardware framework for the selection of authentication factors for continuous and triggered authentication with optimal algorithms to determine the security parameters of each of the authentication factors. A subset of authentication factors thus are determined for application at triggering events on-the-fly, thereby leaving no exploitable a priori pattern or clue for hackers to exploit.


Find Patent Forward Citations

Loading…