Just In Time Polymorphic Authentication

ABSTRACT

Methods, systems, apparatuses, and computer-readable media for utilizing just-in-time polymorphic authentication techniques to secure information are presented. In one or more embodiments, a computing platform may receive, from a computing device, a request to access a user account. In response to receiving the request to access the user account, the computing platform may dynamically select, based on one or more polymorphic authentication factors, an authentication method for authenticating a user of the computing device, and the authentication method may be selected from a plurality of predefined authentication methods. Subsequently, the computing platform may generate one or more authentication prompts based on the selected authentication method. The computing platform then may provide the one or more authentication prompts to the user of the computing device. The authentication prompts that are selected for and presented to a particular user during a given access attempt may vary across different attempts.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of and claims the benefit of priorityto U.S. patent application Ser. No. 14/469,676, filed Aug. 27, 2014, andentitled “Just In Time Polymorphic Authentication,” which isincorporated by reference herein in its entirety.

BACKGROUND

Aspects of the disclosure relate to computer hardware and software. Inparticular, one or more aspects of the disclosure generally relate tocomputer hardware and software for utilizing just-in-time polymorphicauthentication techniques to secure information, such as user accountinformation.

Large organizations, such as financial institutions, may serve manycustomers, and increasingly, customers of such organizations are usingcomputing devices, including mobile computing devices, to interact withthe organizations about the products and/or services offered by theseorganizations. Some large organizations may even provide specializedwebsites and/or customer portals for their customers that allowcustomers to view and/or purchase various products and/or servicesonline, conduct transactions, and view and/or manage one or moreaccounts. While large organizations may take many steps to ensure thesecurity of customer information and/or user accounts, theseorganizations may wish to continue pursuing ever greater levels ofsecurity in protecting customer information and/or user accounts. Insome instances, however, risks to the security of customer informationand/or user accounts may arise simply from providing these specializedwebsites, providing customer portals, and/or providing customers withvarious other ways of accessing information online.

SUMMARY

Aspects of the disclosure relate to various systems and techniques thatprovide effective, efficient, scalable, and convenient ways ofincreasing the security of customer information and customer useraccounts, particularly in ways that make it difficult for a person togain unauthorized access to a user account.

For example, some aspects of the disclosure utilize polymorphicauthentication techniques in which the particular authentication promptsthat are presented to a user when attempting to access a user accountmay be selected on-the-fly and may vary between access attempts. As aresult, scripted attacks and/or replay attacks that rely on apredictable series of authentication prompts and/or other predictableauthentication challenges may be hindered, if not entirely prevented.Similarly, phishing attacks that utilize stolen authenticationcredentials may be likewise hindered, if not entirely prevented, as aperson attempting to gain unauthorized access to a particular useraccount might not have all of the information needed to access that useraccount in the particular instance. In some instances, the polymorphicauthentication techniques discussed below also may be used to detectand/or trap a malicious person attempting to gain unauthorized access toa user account.

In the online banking context, for example, aspects of the disclosuremay enable a financial institution to provide a context-dependentauthentication mechanism for customers attempting to access a customerportal and/or an online banking interface associated with such acustomer portal. In particular, by dynamically selecting anauthentication method to be used in authenticating each different userattempting to access the customer portal in accordance with variousaspects of the disclosure discussed in greater detail below, a computingplatform providing the customer portal may provide enhanced security forcustomer information and/or user accounts associated with the customerportal.

In accordance with one or more embodiments, a customer securitycomputing platform having at least one processor, a memory, and acommunication interface may receive, via the communication interface,and from a first computing device, a request to access a user account.In response to receiving the request to access the user account, thecustomer security computing platform may dynamically select, based onone or more polymorphic authentication factors, an authentication methodfor authenticating a user of the first computing device, and theauthentication method may be selected from a plurality of predefinedauthentication methods. Subsequently, the customer security computingplatform may generate one or more authentication prompts based on theselected authentication method. The customer security computing platformthen may provide the one or more authentication prompts to the user ofthe first computing device.

In some embodiments, the one or more polymorphic authentication factorsmay include one or more time-based factors. Additionally oralternatively, the one or more polymorphic authentication factors mayinclude one or more counter-based factors. Additionally oralternatively, the one or more polymorphic authentication factors mayinclude one or more external risk factors. Additionally oralternatively, the one or more polymorphic authentication factors mayinclude one or more geographic factors. Additionally or alternatively,the one or more polymorphic authentication factors may include one ormore event-based factors. Additionally or alternatively, the one or morepolymorphic authentication factors may include one or more user-specificfactors.

In some embodiments, providing the one or more authentication prompts tothe user of the first computing device may include generating at leastone user interface configured to receive one or more authenticationcredentials, and causing the at least one user interface to be presentedby the first computing device.

In some embodiments, providing the one or more authentication promptsmay include requesting the user of the first computing device to providepassword input. Additionally or alternatively, providing the one or moreauthentication prompts may include requesting the user of the firstcomputing device to provide one-time passcode input. Additionally oralternatively, providing the one or more authentication prompts mayinclude requesting the user of the first computing device to providebiometric input. Additionally or alternatively, providing the one ormore authentication prompts may include causing at least twoauthentication prompts to be presented to the user of the firstcomputing device in a specific order determined based on the one or morepolymorphic authentication factors.

In some embodiments, the customer security computing platform mayreceive, via the communication interface, and from a second computingdevice different from the first computing device, a request to access asecond user account different from the user account to which the firstcomputing device requested access. In response to receiving the requestto access the second user account, the computing platform maydynamically select, based on the one or more polymorphic authenticationfactors, a second authentication method for authenticating a user of thesecond computing device, and the second authentication method may beselected from the plurality of predefined authentication methods.Subsequently, the customer security computing platform may generate oneor more second authentication prompts based on the selected secondauthentication method. The customer security computing platform then mayprovide the one or more second authentication prompts to the user of thesecond computing device.

In some instances, the second authentication method for authenticatingthe user of the second computing device may be different from theauthentication method for authenticating the user of the first computingdevice.

In some embodiments, providing the one or more second authenticationprompts to the user of the second computing device may include providingat least one authentication prompt to the user of the second computingdevice that was not provided to the user of the first computing device.In other embodiments, providing the one or more second authenticationprompts to the user of the second computing device may includeproviding, to the user of the second computing device, the one or moreauthentication prompts that were provided to the user of the firstcomputing device in a different sequence.

In some embodiments, the user account may be associated with a customerportal provided by the computing platform, and the second user accountmay be associated with the customer portal provided by the computingplatform. For example, both user accounts may be used when accessing thesame customer portal and/or may be otherwise associated with the samecustomer portal.

In some embodiments, the customer portal provided by the computingplatform may include at least one online banking user interface. Forexample, one or more aspects of the disclosure may be implemented by afinancial institution in order to ensure and/or enhance the security ofcustomer information, user accounts, and/or other information associatedwith a customer portal and one or more online banking user interfacesassociated with the customer portal.

BRIEF DESCRIPTION OF THE DRAWINGS

The present disclosure is illustrated by way of example and not limitedin the accompanying figures in which like reference numerals indicatesimilar elements and in which:

FIG. 1 depicts an illustrative operating environment in which variousaspects of the disclosure may be implemented in accordance with one ormore example embodiments;

FIG. 2 depicts an illustrative block diagram of workstations and serversthat may be used to implement the processes and functions of certainaspects of the present disclosure in accordance with one or more exampleembodiments;

FIG. 3 depicts an illustrative computing environment for utilizingjust-in-time polymorphic authentication techniques to secure informationin accordance with one or more example embodiments;

FIGS. 4A, 4B, 4C, 4D, 4E, 4F, 4G, and 4H depict an illustrative eventsequence for utilizing just-in-time polymorphic authenticationtechniques to secure information in accordance with one or more exampleembodiments;

FIGS. 5, 6, 7, and 8 depict example graphical user interfaces forutilizing just-in-time polymorphic authentication techniques to secureinformation in accordance with one or more example embodiments; and

FIG. 9 depicts an illustrative method for utilizing just-in-timepolymorphic authentication techniques to secure information inaccordance with one or more example embodiments.

DETAILED DESCRIPTION

In the following description of various illustrative embodiments,reference is made to the accompanying drawings, which form a parthereof, and in which is shown, by way of illustration, variousembodiments in which aspects of the disclosure may be practiced. It isto be understood that other embodiments may be utilized, and structuraland functional modifications may be made, without departing from thescope of the present disclosure.

It is noted that various connections between elements are discussed inthe following description. It is noted that these connections aregeneral and, unless specified otherwise, may be direct or indirect,wired or wireless, and that the specification is not intended to belimiting in this respect.

FIG. 1 depicts an illustrative operating environment in which variousaspects of the present disclosure may be implemented in accordance withone or more example embodiments. Referring to FIG. 1, computing systemenvironment 100 may be used according to one or more illustrativeembodiments. Computing system environment 100 is only one example of asuitable computing environment and is not intended to suggest anylimitation as to the scope of use or functionality contained in thedisclosure. Computing system environment 100 should not be interpretedas having any dependency or requirement relating to any one orcombination of components shown in illustrative computing systemenvironment 100.

Computing system environment 100 may include computing device 101 havingprocessor 103 for controlling overall operation of computing device 101and its associated components, including random-access memory (RAM) 105,read-only memory (ROM) 107, communications module 109, and memory 115.Computing device 101 may include a variety of computer readable media.Computer readable media may be any available media that may be accessedby computing device 101, may be non-transitory, and may include volatileand nonvolatile, removable and non-removable media implemented in anymethod or technology for storage of information such ascomputer-readable instructions, object code, data structures, programmodules, or other data. Examples of computer readable media may includerandom access memory (RAM), read only memory (ROM), electronicallyerasable programmable read only memory (EEPROM), flash memory or othermemory technology, compact disk read-only memory (CD-ROM), digitalversatile disks (DVD) or other optical disk storage, magnetic cassettes,magnetic tape, magnetic disk storage or other magnetic storage devices,or any other medium that can be used to store the desired informationand that can be accessed by computing device 101.

Although not required, various aspects described herein may be embodiedas a method, a data processing system, or as a computer-readable mediumstoring computer-executable instructions. For example, acomputer-readable medium storing instructions to cause a processor toperform steps of a method in accordance with aspects of the disclosedembodiments is contemplated. For example, aspects of the method stepsdisclosed herein may be executed on a processor on computing device 101.Such a processor may execute computer-executable instructions stored ona computer-readable medium.

Software may be stored within memory 115 and/or storage to provideinstructions to processor 103 for enabling computing device 101 toperform various functions. For example, memory 115 may store softwareused by computing device 101, such as operating system 117, applicationprograms 119, and associated database 121. Also, some or all of thecomputer executable instructions for computing device 101 may beembodied in hardware or firmware. Although not shown, RAM 105 mayinclude one or more applications representing the application datastored in RAM 105 while computing device 101 is on and correspondingsoftware applications (e.g., software tasks) are running on computingdevice 101.

Communications module 109 may include a microphone, keypad, touchscreen, and/or stylus through which a user of computing device 101 mayprovide input, and may also include one or more of a speaker forproviding audio output and a video display device for providing textual,audiovisual and/or graphical output. Computing system environment 100may also include optical scanners (not shown). Exemplary usages includescanning and converting paper documents, e.g., correspondence, receipts,and the like, to digital files.

Computing device 101 may operate in a networked environment supportingconnections to one or more remote computing devices, such as computingdevices 141, 151, and 161. Computing devices 141, 151, and 161 may bepersonal computing devices or servers that include any or all of theelements described above relative to computing device 101. Computingdevice 161 may be a mobile device (e.g., smart phone) communicating overwireless carrier channel 171.

The network connections depicted in FIG. 1 may include local areanetwork (LAN) 125 and wide area network (WAN) 129, as well as othernetworks. When used in a LAN networking environment, computing device101 may be connected to LAN 125 through a network interface or adapterin communications module 109. When used in a WAN networking environment,computing device 101 may include a modem in communications module 109 orother means for establishing communications over WAN 129, such asInternet 131 or other type of computer network. The network connectionsshown are illustrative and other means of establishing a communicationslink between the computing devices may be used. Various well-knownprotocols such as transmission control protocol/Internet protocol(TCP/IP), Ethernet, file transfer protocol (FTP), hypertext transferprotocol (HTTP) and the like may be used, and the system can be operatedin a client-server configuration to permit a user to retrieve web pagesfrom a web-based server. Any of various conventional web browsers can beused to display and manipulate data on web pages.

The disclosure is operational with numerous other general purpose orspecial purpose computing system environments or configurations.Examples of well-known computing systems, environments, and/orconfigurations that may be suitable for use with the disclosedembodiments include, but are not limited to, personal computers (PCs),server computers, hand-held or laptop devices, smart phones,multiprocessor systems, microprocessor-based systems, set top boxes,programmable consumer electronics, network PCs, minicomputers, mainframecomputers, distributed computing environments that include any of theabove systems or devices, and the like.

FIG. 2 depicts an illustrative block diagram of workstations and serversthat may be used to implement the processes and functions of certainaspects of the present disclosure in accordance with one or more exampleembodiments. Referring to FIG. 2, illustrative system 200 may be usedfor implementing example embodiments according to the presentdisclosure. As illustrated, system 200 may include one or moreworkstation computers 201. Workstation 201 may be, for example, adesktop computer, a smartphone, a wireless device, a tablet computer, alaptop computer, and the like. Workstations 201 may be local or remote,and may be connected by one of communications links 202 to computernetwork 203 that is linked via communications link 205 to server 204. Insystem 200, server 204 may be any suitable server, processor, computer,or data processing device, or combination of the same. Server 204 may beused to process the instructions received from, and the transactionsentered into by, one or more participants.

Computer network 203 may be any suitable computer network including theInternet, an intranet, a wide-area network (WAN), a local-area network(LAN), a wireless network, a digital subscriber line (DSL) network, aframe relay network, an asynchronous transfer mode (ATM) network, avirtual private network (VPN), or any combination of any of the same.Communications links 202 and 205 may be any communications linkssuitable for communicating between workstations 201 and server 204, suchas network links, dial-up links, wireless links, hard-wired links, aswell as network types developed in the future, and the like.

FIG. 3 depicts an illustrative computing environment for utilizingjust-in-time polymorphic authentication techniques to secure informationin accordance with one or more example embodiments. Referring to FIG. 3,computing environment 300 may include one or more computing devices. Forexample, computing environment 300 may include a first user computingdevice 302 (which may, e.g., be used by a first customer of anorganization, such as a financial institution, as discussed below), asecond user computing device 304 (which may, e.g., be used by a secondcustomer of the organization different from the first customer of theorganization, as discussed below), and an administrative computingdevice 306 (which may, e.g., be used by and/or operated by anadministrative user or other individual who may be associated with theorganization and who may administer and/or otherwise control variouscomputing devices and/or computer systems that are operated by and/orotherwise associated with the organization, as discussed below). Usercomputing device 302, user computing device 304, and administrativecomputing device 306 may be any type of computing device capable ofreceiving a user interface, receiving input via the user interface, andcommunicating the received input to one or more other computing devices.For example, user computing device 302, user computing device 304, andadministrative computing device 306 may be a desktop computer, laptopcomputer, tablet computer, smart phone, or the like. Computingenvironment 300 also may include one or more computing platforms. Forexample, computing environment 300 may include customer securitycomputing platform 310. Customer security computing platform 310 mayinclude one or more computing devices configured to perform one or moreof the functions described herein. For example, customer securitycomputing platform 310 may include one or more computers (e.g., laptopcomputers, desktop computers, servers, server blades, or the like).

Computing environment 300 also may include one or more networks, whichmay interconnect one or more of user computing device 302, usercomputing device 304, administrative computing device 306, and customersecurity computing platform 310. For example, computing environment 300may include organization network 312 and public network 314.Organization network 312 and/or public network 314 may include one ormore sub-networks (e.g., LANs, WANs, or the like). Organization network312 may be associated with a particular organization (e.g., acorporation, financial institution, educational institution,governmental institution, or the like) and may interconnect one or morecomputing devices associated with the organization. For example,administrative computing device 306 and customer security computingplatform 310 may be associated with an organization (e.g., a financialinstitution), and organization network 312 may be associated with and/oroperated by the organization, and may include one or more networks(e.g., LANs, WANs, VPNs, or the like) that interconnect administrativecomputing device 306 and customer security computing platform 310 andone or more other computing devices and/or computer systems that areused by, operated by, and/or otherwise associated with the organization.Public network 314 may connect organization network 312 and/or one ormore computing devices connected thereto (e.g., administrative computingdevice 306 and customer security computing platform 310) with one ormore networks and/or computing devices that are not associated with theorganization. For example, user computing device 302 and user computingdevice 304 might not be associated with an organization that operatesorganization network 312, and public network 314 may include one or morenetworks (e.g., the Internet) that connect user computing device 302 anduser computing device 304 to organization network 312 and/or one or morecomputing devices connected thereto (e.g., administrative computingdevice 306 and customer security computing platform 310).

Customer security computing platform 310 may include one or moreprocessor(s) 316, memory 318, communication interface 320, and data bus322. Data bus 322 may interconnect processor(s) 316, memory 318, and/orcommunication interface 320. Communication interface 320 may be anetwork interface configured to support communication between customersecurity computing platform 310 and organization network 312, or one ormore sub-networks thereof. Memory 318 may include one or more programmodules comprising instructions that when executed by the processor(s)316 cause customer security computing platform 310 to perform one ormore functions described herein. For example, memory 318 may includecustomer security module 324, which may comprise instructions that whenexecuted by processor(s) 316 cause customer security computing platform310 to perform one or more functions described herein.

FIGS. 4A, 4B, 4C, 4D, 4E, 4F, 4G, and 4H depict an illustrative eventsequence for utilizing just-in-time polymorphic authenticationtechniques to secure information in accordance with one or more exampleembodiments. Referring to FIG. 4A, at step 1, administrative computingdevice 306 may receive one or more polymorphic authenticationparameters. Such parameters may, for example, be received from a user ofadministrative computing device 306 and/or may define and/or update oneor more polymorphic authentication factors that may be used indynamically selecting authentication methods, as discussed below. Atstep 2, administrative computing device 306 may send the one or morepolymorphic authentication parameters to customer security computingplatform 310. At step 3, customer security computing platform 310 maystore the one or more polymorphic authentication parameters receivedfrom administrative computing device 306. For example, at step 3,customer security computing platform 310 may store and/or update one ormore library files and/or other information defining one or morepolymorphic authentication factors that may be used (e.g., by customersecurity computing platform 310) in dynamically selecting and/orotherwise determining one or more authentication methods to be used inconnection with different access requests, as discussed below.

At step 4, user computing device 302 may receive a request to access auser portal. Such a request may, for example, be received from a user ofuser computing device 302 and/or may include information identifying auser account to be accessed via the user portal, such as a username,account number, and/or the like. At step 5, user computing device 302may send a request to access a user portal to customer securitycomputing platform 310. The request may, for example, include any and/orall of the information received from the user of user computing device302, such as the information identifying a user account to be accessedvia the user portal.

At step 6, customer security computing platform 310 may receive therequest to access the user portal. For example, at step 6, customersecurity computing platform 310 may receive, via communication interface320, and from user computing device 302, a request to access a useraccount. Such a request may, for example, include information indicatingthat access is being requested by user computing device 302 to a userportal provided, at least in part, by customer security computingplatform 310 and/or information identifying a user account associatedwith the user portal to which user computing device 302 is requestingaccess. In addition, such a user account may, for instance, include acollection of information that is maintained in connection with arelationship between an organization, system, or entity and a customer,person, or entity that has been, is, and/or will be authorized toaccess, view, and/or otherwise use any and/or all of the informationincluded in the collection of information. For example, the user accountto which user computing device 302 is requesting access may include acollection of information that is maintained by a financial institutionoperating customer security computing platform 310 in connection with arelationship between the financial institution and a customer who may beusing user computing device 302 to request access to the user portalprovided by customer security computing platform 310. Additionally oralternatively, the user portal may include an online banking interface.Such an online banking interface may, for example, include a graphicaluser interface and/or a collection of graphical user interfaces viawhich information associated with a financial institution may bepresented, accessed, viewed, interacted with, provided, and/or otherwiseused. In some instances, an online banking interface may, for example,be presented on and/or as a part of a website, webpage, portal, and/orother interface that may be electronically communicated and/or displayedto one or more users. Additionally or alternatively, an online bankinginterface may include information associated with one or more bankaccounts and/or one or more user accounts that are maintained by and/orare otherwise associated with a financial institution. In someinstances, the user portal may include a mobile banking interface. Sucha mobile banking interface may, for example, be an online bankinginterface that is configured to be presented on and/or is presentable ona mobile computing device, such as a laptop computer, tablet computer,smart phone, wearable computing device, and/or other mobile device. Insome instances, a mobile banking interface may include the same featuresof an online banking interface, while in other instances, a mobilebanking interface may include one or more different features than anonline banking interface. For example, a mobile banking interface mayinclude one or more controls and/or other user interface elements thatare designed, selected, and/or configured for optimal presentation,display, and/or use on a mobile computing device and/or on atouch-sensitive display screen of such a mobile computing device.

At step 7, customer security computing platform 310 may select anauthentication method to be used in authenticating user computing device302 and/or a user of user computing device 302 (e.g., so as to enablethe user of user computing device 302 to access the user portal providedby customer security computing platform 310). For example, at step 7, inresponse to receiving the request to access the user account, customersecurity computing platform 310 may dynamically select, based on one ormore polymorphic authentication factors, an authentication method forauthenticating a user of the first computing device (e.g., usercomputing device 302). The authentication method may be selected (e.g.,by customer security computing platform 310) from a plurality ofpredefined authentication methods. In one or more arrangements, the oneor more polymorphic authentication factors may be defined by the one ormore polymorphic authentication parameters (which may, e.g., have beenstored by customer security computing platform 310 at step 3). Inaddition, the one or more polymorphic authentication parameters maydefine the plurality of predefined authentication methods (which may,e.g., enable customer security computing platform 310 to select aparticular authentication method), and in some instances, the one ormore polymorphic authentication parameters may associate particularpolymorphic authentication factors with particular authenticationmethods of the plurality of authentication methods. Such associationmay, for example, cause customer security computing platform 310 toselect a particular authentication method from the plurality ofauthentication methods when certain polymorphic authentication factorsare met.

In some embodiments, the one or more polymorphic authentication factorsmay include one or more time-based factors. For example, the one or moretime-based factors may depend on the current time of day, the currentday of the week, the current day of the year, and/or the like. Suchtime-based factors may, for example, thus cause customer securitycomputing platform 310 to select an authentication method from theplurality of predefined authentication methods based on one or more ofthe current time of day, the current day of the week, the current day ofthe year, and/or the like.

In some embodiments, the one or more polymorphic authentication factorsmay include one or more counter-based factors. For example, the one ormore counter-based factors may depend on how many users have beenauthenticated to the user portal within a predetermined amount of time,which particular authentication methods have been previously selectedfor authenticating users to the user portal within a predeterminedamount of time, and/or the like. Such counter-based factors may, forexample, thus cause customer security computing platform 310 to randomlyselect an authentication method (e.g., based on a randomly generatednumber) to be used in authenticating user computing device 302 and/or auser thereof. As another example, the counter-based factors may, forinstance, cause customer security computing platform 310 to select adifferent and/or relatively more stringent authentication method forevery N-th user (e.g., every sixth user) attempting to access the userportal. As another example, the counter-based factors may, for instance,cause customer security computing platform 310 to select a firstauthentication method for one set of users attempting to access the userportal (e.g., the first 100 customers attempting to access the userportal) and a second authentication method for a different or subsequentset of users attempting to access the user portal (e.g., the next 100customers attempting access the user portal after the first 100customers).

In some embodiments, the one or more polymorphic authentication factorsmay include one or more external risk factors. For example, the one ormore external risk factors may depend on whether one or more computersystems operated by and/or otherwise associated with an organizationoperating customer security computing platform 310 (which may, e.g., bea financial institution providing the user portal to which usercomputing device 302 is requesting access) are currently experiencingand/or otherwise facing one or more attacks, such as denial of serviceattacks, attempted unauthorized access attacks, other types ofelectronic attacks, and/or the like. Such external risk factors may, forexample, thus cause customer security computing platform 310 to selectdifferent and/or relatively more stringent authentication methods whenthe organization's computer systems are under attack from other sourcesand/or via other channels. For instance, the one or more external riskfactors may indicate that a general risk level and/or one or morespecific risk levels are relatively high (e.g., exceeding one or morepredetermined thresholds compared to one or more corresponding baselinevalues for such risk levels) for the organization operating customersecurity computing platform 310, and based on evaluating such externalrisk factors and determining that one or more risk level(s) arerelatively high, customer security computing platform 310 may selectdifferent and/or relatively more stringent authentication methodsaccordingly, such as one or more authentication methods that may beclassified as “strict” authentication methods instead of one or moreauthentication methods that may be classified as “traditional” or“baseline” authentication methods.

In some instances, the external risk factors may be used in additionaland/or alternative ways in determining and/or selecting anauthentication method. For example, if user computing device 302 isattempting to login into and/or otherwise access customer securitycomputing platform 310 and/or the user portal provided by customersecurity computing platform 310 from a net-block (which may, e.g.,correspond to a group of network addresses, such as Internet Protocol(IP) addresses, that are provided by and/or otherwise associated with aparticular internet service provider and/or a particular location) thatis also the source of an attack on the organization's computer systems,then the external risk factors may indicate that the level of riskassociated with the particular login attempt is relatively high andcustomer security computing platform 310 may select different and/orrelatively more stringent authentication methods accordingly. As anotherexample, if the external risk factors indicate that one or more useraccounts associated with the user portal have been accessed withoutauthorization, customer security computing platform 310 may selectdifferent and/or relatively more stringent authentication methods forauthenticating the user of user computing device 302 in connection withthe current login attempt. As another example, if the external riskfactors indicate that an attack has been attempted or carried out on onechannel (e.g., against one or more interactive voice response (IVR)systems, telephony systems, and/or the like), customer securitycomputing platform 310 may select different and/or relatively morestringent authentication methods for authenticating the user of usercomputing device 302 in connection with the attempt to access another,different channel (e.g., a web server system and/or an associated onlinebanking channel, mobile banking channel, and/or the like).

In some embodiments, the one or more polymorphic authentication factorsmay include one or more geographic factors. For example, the one or moregeographic factors may depend on where user computing device 302 islocated when attempting to access the user portal, whether any attacksagainst the organization's computer systems are originating from thesame location as where user computing device 302 is located whenattempting to access the user portal, and/or the like. Such geographicfactors may, for example, be based on IP information obtained from usercomputing device 302, country information obtained from user computingdevice 302, and/or other location information obtained from usercomputing device 302. For instance, if user computing device 302 isattempting to login to the portal provided by customer securitycomputing platform 310 from a particular location that the one or moregeographic factors indicate as being relatively high risk, customersecurity computing platform 310 may select different and/or relativelymore stringent authentication methods accordingly.

In some embodiments, the one or more polymorphic authentication factorsmay include one or more event-based factors. For example, the one ormore event-based factors may depend on particular functions that theuser of user computing device 302 is attempting to access and/or iscapable of accessing via the user portal (e.g., the types oftransactions that the user is able to and/or is requesting to completevia the user portal, such as money transfer transactions; the types ofinformation that the user is able to and/or is attempting to access viathe user portal, such as account statements and/or tax documents; and/orthe like). For instance, if the one or more event-based factors indicatethat the user of user computing device 302 is attempting to accessand/or is capable of accessing a high risk function via the user portal,customer security computing platform 310 may select different and/orrelatively more stringent authentication methods accordingly.

In some embodiments, the one or more polymorphic authentication factorsmay include one or more user-specific factors. For example, the one ormore user-specific factors may depend on categorization informationassociated with the user of user computing device 302 (which may, e.g.,associate the user with one or more categories of customers and/orpotential customers of the organization), historical informationassociated with the user of user computing device 302 (which may, e.g.,include information identifying significant events in the relationshipbetween the user and the organization, such as information indicatingwhether the user's account or login information has been previously usedwithout authorization), and/or other types of user-specific information.

At step 8, customer security computing platform 310 may generate one ormore authentication prompts. For example, at step 8, customer securitycomputing platform 310 may generate one or more authentication promptsbased on the selected authentication method. Each of the one or moreauthentication prompts may, for instance, be configured to receiveand/or prompt the user of user computing device 302 to provide one ormore authentication credentials. At step 9, customer security computingplatform 310 may send the one or more authentication prompts to usercomputing device 302. For example, at step 9, customer securitycomputing platform 310 may provide the one or more authenticationprompts to the user of the first computing device (e.g., by sending theone or more authentication prompts to user computing device 302).

In some embodiments, providing the one or more authentication prompts tothe user of the first computing device may include generating at leastone user interface configured to receive one or more authenticationcredentials and causing the at least one user interface to be presentedby the first computing device. For example, in providing the one or moreauthentication prompts to the user of user computing device 302,customer security computing platform 310 may generate one or more userinterfaces that are configured to receive various authenticationcredentials from the user of user computing device 302 and may send suchuser interfaces to user computing device 302 to be displayed for and/orotherwise presented to the user of user computing device 302.

In some embodiments, providing the one or more authentication promptsmay include requesting the user of the first computing device to providepassword input. For example, one or more of the authentication promptsgenerated by customer security computing platform 310 and provided tothe user of user computing device 302 may prompt the user of usercomputing device to enter one or more account passwords and/or otherwiseprovide password input. In some embodiments, providing the one or moreauthentication prompts may include requesting the user of the firstcomputing device to provide one-time passcode input. For example, one ormore of the authentication prompts generated by customer securitycomputing platform 310 and provided to the user of user computing device302 may prompt the user of user computing device to enter a one-timepasscode (which may, e.g., be sent by customer security computingplatform 310 and/or by another computer system associated with theorganization operating customer security computing platform 310 to amobile device, such as a cellular phone, smart phone, tablet computer,and/or the like, that has been registered with the organization toreceive one-time passcodes in connection with requests to access theparticular user's user account). In some embodiments, providing the oneor more authentication prompts may include requesting the user of thefirst computing device to provide biometric input. For example, one ormore of the authentication prompts generated by customer securitycomputing platform 310 and provided to the user of user computing device302 may prompt the user of user computing device to capture, submit,and/or otherwise provide biometric input, such as one or more picturesand/or images (which may, e.g., be captured by a camera connected to orincluded in user computing device 302) for facial recognition, one ormore fingerprints (which may, e.g., be captured by a fingerprint readerconnected to or included in user computing device 302) for fingerprintrecognition, and/or one or more voice samples and/or other sounds (whichmay, e.g., be captured by a microphone connected to or included in usercomputing device 302) for voice recognition.

In some embodiments, providing the one or more authentication promptsmay include causing at least two authentication prompts to be presentedto the user of the first computing device in a specific order determinedbased on the one or more polymorphic authentication factors. Forexample, in providing the one or more authentication prompts, customersecurity computing platform 310 may cause various authentication promptsto be presented to the user of user computing device 302 in a specificorder, and customer security computing platform 310 may select and/orotherwise determine the order in which such prompts are to be presentedbased on the one or more polymorphic authentication factors. Forinstance, customer security computing platform 310 may cause a firstauthentication prompt to be presented that prompts the user of usercomputing device 302 to enter a username and password and a secondauthentication prompt to be subsequently presented that prompts the userof user computing device 302 to enter a one-time passcode or othertoken. In another example, customer security computing platform 310 maycause a first authentication prompt to be presented that prompts theuser of user computing device 302 to enter a one-time passcode and asecond authentication prompt to be subsequently presented that promptsthe user of user computing device 302 to enter another one-time passcode(which may, e.g., be sent to the user's registered mobile device afterthe initial one-time passcode is validated by customer securitycomputing platform 310). In another example, customer security computingplatform 310 may cause a first authentication prompt to be presentedthat prompts the user of user computing device 302 to provide biometricinput (e.g., biometric input for facial recognition captured via acamera, biometric input for fingerprint recognition captured via afingerprint reader, biometric input for voice recognition captured via amicrophone, and/or the like) and a second authentication prompt to besubsequently presented that prompts the user of user computing device302 to enter a one-time passcode. In another example, customer securitycomputing platform 310 may cause a first authentication prompt to bepresented that prompts the user of user computing device 302 to provideone type of biometric input (e.g., biometric input for facialrecognition captured via a camera) and a second authentication prompt tobe subsequently presented that prompts the user of user computing device302 to provide a different type of biometric input (e.g., biometricinput for voice recognition captured via a microphone). In anotherexample, customer security computing platform 310 may cause a firstauthentication prompt to be presented that prompts the user of usercomputing device 302 to enter a one-time passcode and a secondauthentication prompt to be subsequently presented that prompts the userof user computing device 302 to enter a username and/or password. Inanother example, customer security computing platform 310 may cause afirst authentication prompt to be presented that prompts the user ofuser computing device 302 to enter a one-time passcode and a secondauthentication prompt to be subsequently presented that prompts the userof user computing device 302 to enter responses to one or more securityquestions.

At step 10, user computing device 302 may receive the one or moreauthentication prompts from customer security computing platform 310. Atstep 11, user computing device 302 may present the one or moreauthentication prompts. In presenting the one or more authenticationprompts, user computing device 302 may, for example, display, cause tobe displayed, and/or otherwise present one or more graphical userinterfaces. For example, user computing device 302 may present agraphical user interface similar to graphical user interface 500, whichis illustrated in FIG. 5. As seen in FIG. 5, graphical user interface500 may include one or more fields, controls, and/or other elements thatare configured to receive, and may prompt a user to provide, a usernameand password. As another example, user computing device 302 may presenta graphical user interface similar to graphical user interface 600,which is illustrated in FIG. 6. As seen in FIG. 6, graphical userinterface 600 may include one or more fields, controls, and/or otherelements that are configured to receive, and may prompt a user toprovide, a one-time passcode. As another example, user computing device302 may present a graphical user interface similar to graphical userinterface 700, which is illustrated in FIG. 7. As seen in FIG. 7,graphical user interface 700 may include one or more fields, controls,and/or other elements that are configured to receive, and may prompt auser to provide biometric input for facial recognition captured via acamera that may be connected to and/or included in user computing device302. As another example, user computing device 302 may present agraphical user interface similar to graphical user interface 800, whichis illustrated in FIG. 8. As seen in FIG. 8, graphical user interface800 may include one or more fields, controls, and/or other elements thatare configured to receive, and may prompt a user to provide biometricinput for voice recognition captured via a microphone that may beconnected to and/or included in user computing device 302.

Referring again to FIG. 4C, at step 12, user computing device 302 mayreceive authentication input. Such authentication input may, forexample, be received by user computing device 302 via one or more of thegraphical user interfaces discussed above. At step 13, user computingdevice 302 may send the authentication input to customer securitycomputing platform 310 for validation. At step 14, customer securitycomputing platform 310 may receive the authentication input from usercomputing device 302. At step 15, customer security computing platform310 may validate the authentication input received from user computingdevice 302. For example, at step 15, customer security computingplatform 310 may determine whether the authentication input includes acorrect username and/or password for the user account to which access isrequested, whether a correct one-time passcode was entered, whetherbiometric input matches one or more biometric records associated withthe user account, and/or the like.

If customer security computing platform 310 determines, at step 15, thatthe authentication input is invalid, then at step 16, customer securitycomputing platform 310 may generate an error message, and at step 17,customer security computing platform 310 may send the generated errormessage to user computing device 302. Alternatively, if customersecurity computing platform 310 determines, at step 15, that theauthentication input is valid, then at step 18, customer securitycomputing platform 310 may set one or more authentication flags (whichmay, e.g., indicate the user of user computing device 302 is authorizedto access and/or interact with the user portal and/or a particular useraccount). In addition, at step 19, customer security computing platform310 may provide access to the user account (e.g., by providing usercomputing device 302 and/or the user of user computing device 302 withaccess to the user account).

At step 20, user computing device 304 may receive a request to access auser portal. Such a request may, for example, be received from a user ofuser computing device 304 and/or may include information identifying auser account to be accessed via the user portal, such as a username,account number, and/or the like. The user account to which usercomputing device 304 is requesting access may be different from the useraccount to which user computing device 302 requested access, as usercomputing device 304 and user computing device 302 may be used bydifferent people who may have different user accounts with theorganization operating customer security computing platform 310. At step21, user computing device 304 may send a request to access a user portalto customer security computing platform 310. The request may, forexample, include any and/or all of the information received from theuser of user computing device 304, such as the information identifying auser account to be accessed via the user portal.

At step 22, customer security computing platform 310 may receive therequest to access the user portal. For example, at step 22, customersecurity computing platform 310 may receive, via communication interface320, and from user computing device 304, a request to access a seconduser account different from the user account to which the firstcomputing device (e.g., user computing device 302) requested access.Such a request may, for example, include information indicating thataccess is being requested by user computing device 304 to a user portalprovided, at least in part, by customer security computing platform 310and/or information identifying a user account associated with the userportal to which user computing device 304 is requesting access.

At step 23, customer security computing platform 310 may select anauthentication method to be used in authenticating user computing device304 and/or a user of user computing device 304 (e.g., so as to enablethe user of user computing device 304 to access the user portal providedby customer security computing platform 310). For example, at step 23,in response to receiving the request to access the second user account,customer security computing platform 310 may dynamically select, basedon the one or more polymorphic authentication factors, a secondauthentication method for authenticating a user of the second computingdevice (e.g., user computing device 304). The second authenticationmethod may be selected (e.g., by customer security computing platform310) from the plurality of predefined authentication methods (e.g., thesame plurality of predefined authentication methods discussed above andused in authenticating the user of user computing device 302).Additionally, in some instances, the second authentication method forauthenticating the user of the second computing device may be differentfrom the authentication method for authenticating the user of the firstcomputing device. For example, in selecting an authentication method toauthenticate the user of user computing device 304, customer securitycomputing platform 310 may select a different authentication method thanwas used to authenticate the user of user computing device 302 (e.g.,even though the same authentication factors may be evaluated and/orotherwise used by customer security computing platform 310 in selectingan authentication method).

At step 24, customer security computing platform 310 may generate one ormore authentication prompts. For example, at step 24, customer securitycomputing platform 310 may generate one or more second authenticationprompts based on the selected second authentication method. As above,each of the one or more authentication prompts may, for instance, beconfigured to receive and/or prompt the user of user computing device304 to provide one or more authentication credentials. At step 25,customer security computing platform 310 may send the one or moreauthentication prompts to user computing device 304. For example, atstep 25, customer security computing platform 310 may provide the one ormore second authentication prompts to the user of the second computingdevice (e.g., by sending the one or more authentication prompts to usercomputing device 304).

In some embodiments, providing the one or more second authenticationprompts to the user of the second computing device may include providingat least one authentication prompt to the user of the second computingdevice that was not provided to the user of the first computing device.For example, in providing the one or more second authentication promptsto the user of user computing device 304, customer security computingplatform 310 may provide one or more authentication prompts to the userof user computing device 304 that are different from and/or were notprovided to the user of user computing device 302. For instance, inproviding the one or more second authentication prompts to the user ofuser computing device 304, customer security computing platform 310 mayprovide an authentication prompt that requests the user of usercomputing device 304 to enter and/or otherwise provide biometric input,even though a similar authentication prompt requesting biometric inputmight not have been provided to the user of user computing device 302.

In some embodiments, providing the one or more second authenticationprompts to the user of the second computing device may includeproviding, to the user of the second computing device, the one or moreauthentication prompts that were provided to the user of the firstcomputing device in a different sequence. For example, in providing theone or more second authentication prompts to the user of user computingdevice 304, customer security computing platform 310 may provide thesame authentication prompts to the user of user computing device 304 aswere provided to the user of user computing device 302 but in adifferent order. For instance, in providing the one or more secondauthentication prompts to the user of user computing device 304,customer security computing platform 310 may provide an authenticationprompt that requests the user of user computing device 304 to enterone-time passcode input and a subsequent authentication prompt thatrequests the user of user computing device 304 to enter a username andpassword, even though these same authentication prompts might have beenpresented in reverse order to the user of user computing device 302.

At step 26, user computing device 304 may receive the one or moreauthentication prompts from customer security computing platform 310.For example, at step 26, user computing device 304 may receive the oneor more second authentication prompts discussed above. At step 27, usercomputing device 304 may present the one or more second authenticationprompts. In presenting such authentication prompts, user computingdevice 304 may, for example, display, cause to be displayed, and/orotherwise present one or more graphical user interfaces, such as one ormore of the graphical user interfaces discussed above (e.g., withrespect to FIGS. 5-8). At step 28, user computing device 304 may receiveauthentication input. Such authentication input may, for example, bereceived by user computing device 304 via one or more of the graphicaluser interfaces discussed above. At step 29, user computing device 304may send the authentication input to customer security computingplatform 310 for validation. At step 30, customer security computingplatform 310 may receive the authentication input from user computingdevice 304. At step 31, customer security computing platform 310 mayvalidate the authentication input received from user computing device304. For example, at step 31, customer security computing platform 310may determine whether the authentication input includes a correctusername and/or password for the user account to which access isrequested, whether a correct one-time passcode was entered, whetherbiometric input matches one or more biometric records associated withthe user account, and/or the like.

If customer security computing platform 310 determines, at step 31, thatthe authentication input is invalid, then at step 32, customer securitycomputing platform 310 may generate an error message, and at step 33,customer security computing platform 310 may send the generated errormessage to user computing device 304. Alternatively, if customersecurity computing platform 310 determines, at step 31, that theauthentication input is valid, then at step 34, customer securitycomputing platform 310 may set one or more authentication flags (whichmay, e.g., indicate the user of user computing device 304 is authorizedto access and/or interact with the user portal and/or a particular useraccount). In addition, at step 35, customer security computing platform310 may provide access to the user account (e.g., by providing usercomputing device 304 and/or the user of user computing device 304 withaccess to the user account).

In some embodiments, the user account may be associated with a customerportal provided by the computing platform, and the second user accountmay also be associated with the customer portal provided by thecomputing platform. For example, the user account which user computingdevice 302 accesses and the second user account which user computingdevice 304 accesses may both be associated with the same customer portalthat is provided by customer security computing platform 310. Inaddition, in some embodiments, the customer portal provided by thecomputing platform may include at least one online banking userinterface. For example, the customer portal that is provided by customersecurity computing platform 310 may include one or more online bankinginterfaces, such as the online banking interfaces and/or the mobilebanking interfaces discussed above.

FIG. 9 depicts an illustrative method for utilizing just-in-timepolymorphic authentication techniques to secure information inaccordance with one or more example embodiments. Referring to FIG. 9, atstep 905, a computing platform may receive a request from a computingdevice to access a user account. At step 910, the computing platform maydynamically select an authentication method for authenticating a user ofthe computing device. At step 915, the computing platform may generateone or more authentication prompts based on the selected authenticationmethod. At step 920, the computing platform may provide the one or moreauthentication prompts to the user of the computing device.

One or more aspects of the disclosure may be embodied in computer-usabledata or computer-executable instructions, such as in one or more programmodules, executed by one or more computers or other devices to performthe operations described herein. Generally, program modules includeroutines, programs, objects, components, data structures, and the likethat perform particular tasks or implement particular abstract datatypes when executed by one or more processors in a computer or otherdata processing device. The computer-executable instructions may bestored on a computer-readable medium such as a hard disk, optical disk,removable storage media, solid-state memory, RAM, and the like. Thefunctionality of the program modules may be combined or distributed asdesired in various embodiments. In addition, the functionality may beembodied in whole or in part in firmware or hardware equivalents, suchas integrated circuits, application-specific integrated circuits(ASICs), field programmable gate arrays (FPGA), and the like. Particulardata structures may be used to more effectively implement one or moreaspects of the disclosure, and such data structures are contemplated tobe within the scope of computer executable instructions andcomputer-usable data described herein.

Various aspects described herein may be embodied as a method, anapparatus, or as one or more computer-readable media storingcomputer-executable instructions. Accordingly, those aspects may takethe form of an entirely hardware embodiment, an entirely softwareembodiment, an entirely firmware embodiment, or an embodiment combiningsoftware, hardware, and firmware aspects in any combination. Inaddition, various signals representing data or events as describedherein may be transferred between a source and a destination in the formof light or electromagnetic waves traveling through signal-conductingmedia such as metal wires, optical fibers, or wireless transmissionmedia (e.g., air or space). In general, the one or morecomputer-readable media may comprise one or more non-transitorycomputer-readable media.

As described herein, the various methods and acts may be operativeacross one or more computing servers and one or more networks. Thefunctionality may be distributed in any manner, or may be located in asingle computing device (e.g., a server, a client computer, and thelike). For example, in alternative embodiments, one or more of thecomputing platforms discussed above may be combined into a singlecomputing platform, and the various functions of each computing platformmay be performed by the single computing platform. In such arrangements,any and/or all of the above-discussed communications between computingplatforms may correspond to data being accessed, moved, modified,updated, and/or otherwise used by the single computing platform.Additionally or alternatively, one or more of the computing platformsdiscussed above may be implemented in one or more virtual machines thatare provided by one or more physical computing devices. In sucharrangements, the various functions of each computing platform may beperformed by the one or more virtual machines, and any and/or all of theabove-discussed communications between computing platforms maycorrespond to data being accessed, moved, modified, updated, and/orotherwise used by the one or more virtual machines.

Aspects of the disclosure have been described in terms of illustrativeembodiments thereof. Numerous other embodiments, modifications, andvariations within the scope and spirit of the appended claims will occurto persons of ordinary skill in the art from a review of thisdisclosure. For example, one or more of the steps depicted in theillustrative figures may be performed in other than the recited order,and one or more depicted steps may be optional in accordance withaspects of the disclosure.

What is claimed is:
 1. A method, comprising: at a computing platformcomprising at least one processor, memory, and a communicationinterface: receiving, by the at least one processor, via thecommunication interface, and from a first computing device, a request toaccess a first user account; in response to receiving the request toaccess the first user account, dynamically selecting, by the at leastone processor, based on one or more polymorphic authentication factors,a first authentication method for authenticating a user of the firstcomputing device, the first authentication method being selected from aplurality of predefined authentication methods; generating, by the atleast one processor, one or more authentication prompts based on thefirst authentication method selected for authenticating the user of thefirst computing device; and providing, by the at least one processor,the one or more authentication prompts to the user of the firstcomputing device.
 2. The method of claim 1, wherein the one or morepolymorphic authentication factors comprise one or more time-basedfactors.
 3. The method of claim 1, wherein the one or more polymorphicauthentication factors comprise one or more counter-based factors. 4.The method of claim 1, wherein the one or more polymorphicauthentication factors comprise one or more external risk factors. 5.The method of claim 1, wherein the one or more polymorphicauthentication factors comprise one or more geographic factors.
 6. Themethod of claim 1, wherein the one or more polymorphic authenticationfactors comprise one or more event-based factors.
 7. The method of claim1, wherein the one or more polymorphic authentication factors compriseone or more user-specific factors.
 8. The method of claim 1, whereinproviding the one or more authentication prompts to the user of thefirst computing device comprises: generating at least one user interfaceconfigured to receive one or more authentication credentials; andcausing the at least one user interface to be presented by the firstcomputing device.
 9. The method of claim 1, wherein providing the one ormore authentication prompts to the user of the first computing devicecomprises requesting the user of the first computing device to providepassword input.
 10. The method of claim 1, wherein providing the one ormore authentication prompts to the user of the first computing devicecomprises requesting the user of the first computing device to provideone-time passcode input.
 11. The method of claim 1, wherein providingthe one or more authentication prompts to the user of the firstcomputing device comprises requesting the user of the first computingdevice to provide biometric input.
 12. The method of claim 1, whereinproviding the one or more authentication prompts to the user of thefirst computing device comprises causing at least two authenticationprompts to be presented to the user of the first computing device in aspecific order determined based on the one or more polymorphicauthentication factors.
 13. The method of claim 1, comprising:receiving, by the at least one processor, via the communicationinterface, and from a second computing device different from the firstcomputing device, a request to access a second user account differentfrom the first user account; in response to receiving the request toaccess the second user account, dynamically selecting, by the at leastone processor, based on the one or more polymorphic authenticationfactors, a second authentication method for authenticating a user of thesecond computing device, the second authentication method being selectedfrom the plurality of predefined authentication methods; generating, bythe at least one processor, one or more second authentication promptsbased on the second authentication method selected for authenticatingthe user of the second computing device; and providing, by the at leastone processor, the one or more second authentication prompts to the userof the second computing device.
 14. The method of claim 13, wherein thesecond authentication method for authenticating the user of the secondcomputing device is different from the first authentication method forauthenticating the user of the first computing device.
 15. The method ofclaim 14, wherein providing the one or more second authenticationprompts to the user of the second computing device comprises providingat least one authentication prompt to the user of the second computingdevice that was not provided to the user of the first computing device.16. The method of claim 14, wherein the first user account is associatedwith a customer portal provided by the computing platform, and whereinthe second user account is associated with the customer portal providedby the computing platform.
 17. The method of claim 16, wherein thecustomer portal provided by the computing platform comprises at leastone online banking user interface.
 18. A system, comprising: at leastone processor; a communication interface communicatively coupled to theat least one processor; and memory storing computer-readableinstructions that, when executed by the at least one processor, causethe system to: receive, via the communication interface, and from afirst computing device, a request to access a first user account; inresponse to receiving the request to access the first user account,dynamically select, based on one or more polymorphic authenticationfactors, a first authentication method for authenticating a user of thefirst computing device, the first authentication method being selectedfrom a plurality of predefined authentication methods; generate one ormore authentication prompts based on the first authentication methodselected for authenticating the user of the first computing device; andprovide the one or more authentication prompts to the user of the firstcomputing device.
 19. The system of claim 18, wherein the memory storesadditional computer-readable instructions that, when executed by the atleast one processor, cause the system to: receive, via the communicationinterface, and from a second computing device different from the firstcomputing device, a request to access a second user account differentfrom the first user account; in response to receiving the request toaccess the second user account, dynamically select, based on the one ormore polymorphic authentication factors, a second authentication methodfor authenticating a user of the second computing device, the secondauthentication method being selected from the plurality of predefinedauthentication methods; generate one or more second authenticationprompts based on the second authentication method selected forauthenticating the user of the second computing device; and provide theone or more second authentication prompts to the user of the secondcomputing device.
 20. One or more non-transitory computer-readable mediastoring instructions that, when executed by a computing platformcomprising at least one processor, memory, and a communicationinterface, cause the computing platform to: receive, via thecommunication interface, and from a first computing device, a request toaccess a first user account; in response to receiving the request toaccess the first user account, dynamically select, based on one or morepolymorphic authentication factors, a first authentication method forauthenticating a user of the first computing device, the firstauthentication method being selected from a plurality of predefinedauthentication methods; generate one or more authentication promptsbased on the first authentication method selected for authenticating theuser of the first computing device; and provide the one or moreauthentication prompts to the user of the first computing device.