×

User and entity authentication through an information storage and communication system

  • US 10,055,732 B1
  • Filed: 03/03/2014
  • Issued: 08/21/2018
  • Est. Priority Date: 03/29/2013
  • Status: Active Grant
First Claim
Patent Images

1. An authentication system for authenticating parties involved in a transaction, the authentication system comprising:

  • an authentication server having a memory and a processor, wherein the processor is configured to;

    receive an authentication request from a first party device, wherein the first party device is associated with a first party, wherein the authentication request includes a request to authenticate an identity of a second party and a cost value associated with the transaction,determine an amount of information required to authenticate the second party as being involved in the transaction, wherein the authentication server is configured to determine the amount of information required by comparing the cost value associated with the transaction to a cost threshold, and wherein the cost threshold is determined based on a statistical analysis of cost values in a transaction history of the second party,transmit an information request to a second party device, wherein the second party device is associated with the second party,receive a second party information,compare the second party information with a verified second party information, wherein the verified second party information corresponds to the amount of information, andtransmit an authentication result to the first party device for use in determining whether the transaction will proceed;

    wherein the authentication server determines that a lower level of authentication is required in response to determining that the cost value associated with the transaction is lower than the cost threshold, the lower level of authentication requiring that the second party information include at least one user input that is an alphanumeric entry or biometric; and

    wherein the authentication server determines that a higher level of authentication is required in response to determining that the cost value associated with the transaction is at least as great as the cost threshold, the higher level of authentication requiring that the second party information include at least two user inputs selected from a group consisting of a biometric, a password, a secret code, a personal identification number (PIN), and personal information, wherein a greater number of user inputs is required for the higher level of authentication than for the lower level of authentication.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×