Bank speech authentication
First Claim
1. A multi-level authentication system comprising:
- a processor; and
a non-transitory computer-readable medium storing computer executable instructions thereon executed by the processor to;
determine a number of inputs required for a user to access data, wherein the number of inputs correlates to an authentication requirement by each level of a plurality of security levels;
receive, from an electronic device operated by the user, a first input corresponding to a first security level;
authenticate the user, using the first input, for access to the first security level corresponding to a first set of user actions;
receive, from the electronic device, a second input corresponding to a second security level;
authenticate, using the first input and the second input, the user for access to the second security level corresponding to a second set of user actions; and
upon receiving an instruction from the user, update the number of inputs required for the user to access the second security level, whereby the processor authenticates the user to access the second security level without receiving the first input.
1 Assignment
0 Petitions
Accused Products
Abstract
Authentication mechanisms are disclosed. For example, an enterprise associated number or a social security number (SSN) can be provided to enter a first level. Then, any one of a ZIP code number, a device identifier, a date of birth, and a portion of the SSN can be provided to access applications in the first level. Lastly, a PIN can be provided to enter a second level of the enterprise. Additionally, these authentication mechanisms can be added and/or changed. In the former case, if a user used a SSN to enter the mentioned first level, then a date of birth can be used to update an authentication mechanism. Alternatively, if a user used an enterprise number to gain such access, then part of the SSN can be used for the update. If the user wants to change the authentication mechanism, the date of birth can be used for the update.
21 Citations
20 Claims
-
1. A multi-level authentication system comprising:
-
a processor; and a non-transitory computer-readable medium storing computer executable instructions thereon executed by the processor to; determine a number of inputs required for a user to access data, wherein the number of inputs correlates to an authentication requirement by each level of a plurality of security levels; receive, from an electronic device operated by the user, a first input corresponding to a first security level; authenticate the user, using the first input, for access to the first security level corresponding to a first set of user actions; receive, from the electronic device, a second input corresponding to a second security level; authenticate, using the first input and the second input, the user for access to the second security level corresponding to a second set of user actions; and upon receiving an instruction from the user, update the number of inputs required for the user to access the second security level, whereby the processor authenticates the user to access the second security level without receiving the first input. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 20)
-
-
12. A method comprising:
-
determining, by a server, a number of inputs required for a user to access data, wherein the number of inputs correlates to an authentication requirement by each level of a plurality of security levels; receiving, by the server from an electronic device operated by the user, a first input corresponding to a first security level; authenticating, by the server, the user, using the first input, for access to the first security level corresponding to a first set of user actions; receiving, by the server, from the electronic device, a second input corresponding to a second security level; authenticating, by the server, using the first input and the second input, the user for access to the second security level corresponding to a second set of user actions; and upon receiving an instruction from the user, updating, by the serve, the number of inputs required for the user to access the second security level, whereby the server authenticates the user to access the second security level without receiving the first input. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
Specification