Bank speech authentication
First Claim
1. A system comprising:
- a processor; and
a non-transitory computer-readable medium storing computer executable instructions thereon executed by the processor to;
determine, by the processor, a number of inputs required for a user to access data, wherein the number of inputs correlates to a multi-level authentication corresponding to a multi-level security level;
receive, by the processor, from an electronic client device associated with the user, a first input, wherein the first input correlates to a first level of security corresponding to a first set of user actions;
receive, by the processor, from the electronic client device, an identifier associated with the electronic client device;
authenticate, by the processor, the user for access to the first level of security using the first input; and
authenticate, by the processor, the user for access to a second level of security corresponding to a second set of user actions using the first input and when the received identifier corresponds with an identifier associated with the user stored in a database, wherein the second set of user actions is more restricted than the first set of user actions.
1 Assignment
0 Petitions
Accused Products
Abstract
Authentication mechanisms are disclosed. For example, an enterprise associated number or a social security number (SSN) can be provided to enter a first level. Then, any one of a ZIP code number, a device identifier, a date of birth, and a portion of the SSN can be provided to access applications in the first level. Lastly, a PIN can be provided to enter a second level of the enterprise. Additionally, these authentication mechanisms can be added and/or changed. In the former case, if a user used a SSN to enter the mentioned first level, then a date of birth can be used to update an authentication mechanism. Alternatively, if a user used an enterprise number to gain such access, then part of the SSN can be used for the update. If the user wants to change the authentication mechanism, the date of birth can be used for the update.
22 Citations
20 Claims
-
1. A system comprising:
-
a processor; and a non-transitory computer-readable medium storing computer executable instructions thereon executed by the processor to; determine, by the processor, a number of inputs required for a user to access data, wherein the number of inputs correlates to a multi-level authentication corresponding to a multi-level security level; receive, by the processor, from an electronic client device associated with the user, a first input, wherein the first input correlates to a first level of security corresponding to a first set of user actions; receive, by the processor, from the electronic client device, an identifier associated with the electronic client device; authenticate, by the processor, the user for access to the first level of security using the first input; and authenticate, by the processor, the user for access to a second level of security corresponding to a second set of user actions using the first input and when the received identifier corresponds with an identifier associated with the user stored in a database, wherein the second set of user actions is more restricted than the first set of user actions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
determining, by a computer, a number of inputs required for a user to access data, wherein the number of inputs correlates to a multi-level authentication corresponding to a multi-level security level; receiving, by the computer, from an electronic client device associated with the user, a first input, wherein the first input correlates to a first level of security corresponding to a first set of user actions; receiving, by the computer, from the electronic client device, an identifier associated with the electronic client device; authenticating, by the computer, the user for access to the first level of security using the first input; and authenticating, by the computer, the user for access to a second level of security corresponding to a second set of user actions using the first input and when the received identifier corresponds with an identifier associated with the user stored in a database, wherein the second set of user actions is more restricted than the first set of user actions. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system authenticating users accessing computing services hosted by an enterprise computing system, the system comprising:
-
a user profile database configured to store a user profile containing one or more inputs associated with a computing service executed by one or more servers of the enterprise; and a computer comprising a processor configured to; determine a number of inputs required for a user to access data, wherein the number of inputs correlates to a multi-level authentication corresponding to a multi-level security level; receive from an electronic client device associated with the user, a first input, wherein the first input correlates to a first level of security corresponding to a first set of user actions; receive from the electronic client device, an identifier associated with the electronic client device; authenticate the user for access to the first level of security using the first input; and authenticate the user for access to a second level of security corresponding to a second set of user actions using the first input and when the received identifier corresponds with an identifier associated with the user stored in a database, wherein the second set of user actions is more restricted than the first set of user actions. - View Dependent Claims (18, 19, 20)
-
Specification