×

Methods and systems for leveraging transaction data to dynamically authenticate a user

  • US 10,373,164 B2
  • Filed: 08/14/2017
  • Issued: 08/06/2019
  • Est. Priority Date: 12/09/2013
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for authenticating a candidate user for facilitating accessing a host computing device as an authentic user, the host computing device in communication with an authenticating computing device, said method comprising:

  • receiving, by the authenticating computing device, an authentication request for accessing secure data stored on the host computing device, the secure data not including transaction data;

    retrieving, by the authenticating computing device from a database, the transaction data associated with the authentic user based on a user identifier;

    generating, by the authenticating computing device, a challenge question and a correct answer to the challenge question based on the transaction data associated with the authentic user;

    generating, by the authenticating computing device, a plurality of incorrect answers to the challenge question by comparison to the transaction data; and

    transmitting, by the authenticating computing device, the challenge question, the correct answer, and the plurality of incorrect answers to the host computing device without exposing the transaction data to the host computing device.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×