Systems and methods for upgrading authentication systems
First Claim
Patent Images
1. A method comprising:
- receiving, at an authentication engine, biometric information in connection with an authentication request from a user;
authenticating, by a first authentication system, the user by comparing characteristics generated from the biometric information received in connection with the authentication request with characteristics generated from previously collected biometric information, the characteristics generated from the previously collected biometric information collected during a first enrollment process generated using the first authentication system;
automatically enrolling the user into a second authentication system using the biometric information received in connection with the authentication request by deriving characteristics of the biometric information using the second authentication system,wherein the user is enrolled without requesting additional enrollment information from the user;
deleting the biometric information received in connection with the authentication request after the characteristics of the biometric information are derived using the second authentication system; and
running the first authentication system in parallel with the second authentication system until a criteria is met, wherein the second authentication system is a replacement authentication system.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems for authenticating a user are described. In some embodiments, an authentication request including biometric information collected from a user is received. The user may be authenticated using a first authentication system by comparing characteristics generated from the biometric information with characteristics of previously collected biometric information. The biometric information collected from the user during the authentication request may be used to automatically enroll the user into a second authentication system.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving, at an authentication engine, biometric information in connection with an authentication request from a user; authenticating, by a first authentication system, the user by comparing characteristics generated from the biometric information received in connection with the authentication request with characteristics generated from previously collected biometric information, the characteristics generated from the previously collected biometric information collected during a first enrollment process generated using the first authentication system; automatically enrolling the user into a second authentication system using the biometric information received in connection with the authentication request by deriving characteristics of the biometric information using the second authentication system, wherein the user is enrolled without requesting additional enrollment information from the user; deleting the biometric information received in connection with the authentication request after the characteristics of the biometric information are derived using the second authentication system; and running the first authentication system in parallel with the second authentication system until a criteria is met, wherein the second authentication system is a replacement authentication system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory computer-readable storage medium containing a set of instructions that, when executed by one or more processors, cause a machine to:
-
receive, at an authentication engine, biometric information in connection with an authentication request from a user; authenticate, by a first authentication system, the user by comparing characteristics generated from the biometric information received in connection with the authentication request with characteristics generated from previously collected biometric information, the characteristics generated from the previously collected biometric information collected during a first enrollment process generated using the first authentication system; automatically enroll the user into a second authentication system using the biometric information received in connection with the authentication request by deriving characteristics of the biometric information using the second authentication system, wherein the user is enrolled without requesting additional enrollment information from the user; delete the biometric information received in connection with the authentication request after the characteristics of the biometric information are derived using the second authentication system; and run the first authentication system in parallel with the second authentication system until a criteria is met, wherein the second authentication system is a replacement authentication system. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system, comprising:
-
one or more processors; and a non-transitory computer readable storage medium having instructions stored thereon, which when executed by the one or more processors cause the system to; receive, at an authentication engine, biometric information in connection with an authentication request from a user; authenticate, by a first authentication system, the user by comparing characteristics generated from the biometric information received in connection with the authentication request with characteristics generated from previously collected biometric information, the characteristics generated from the previously collected biometric information collected during a first enrollment process generated using the first authentication system; automatically enroll the user into a second authentication system using the biometric information received in connection with the authentication request by deriving characteristics of the biometric information using the second authentication system, wherein the user is enrolled without requesting additional enrollment information from the user; delete the biometric information received in connection with the authentication request after the characteristics of the biometric information are derived using the second authentication system; and run the first authentication system in parallel with the second authentication system until a criteria is met, wherein the second authentication system is a replacement authentication system. - View Dependent Claims (18, 19, 20)
-
Specification