Systems and methods for authenticating user identities in networked computer systems
First Claim
1. A terminal device, comprising:
- a communications interface;
a memory storing software instructions; and
one or more processors coupled to the memory and to the communications unit, the one or more processors being configured to execute the software instructions to perform one or more operations, the operations comprising;
receiving authentication data from a client device via the communications interface, the authentication data comprising an authentication code corresponding to an exchange of data initiated between the client device and a first computing system and a first portion of authentication information associated with the initiated data exchange, and the first portion of the authentication information comprising packetized data that includes a header or a footer portion;
based on the authentication code, determining a transaction type that characterizes the initiated data exchange, and obtaining a second portion of the authentication information associated with the determined transaction type;
detecting an incompatibility between the first portion of the authentication information and the transaction type;
in response to the detected incompatibility, modifying a format of the header or footer portion of the first portion of the authentication information in accordance with the transaction type;
generating modified authentication data that includes the first and second portions of the authentication information; and
transmitting, via the communications interface, the modified authentication data to a second computing system,wherein the second computing system is configured to validate the initiated data exchange based on a comparison between the modified authentication data and validation data characterizing a prior authentication transaction validated by the second computing system, and to generate and transmit, to the first computing system, validation information characterizing the validated data exchange, andwherein the first computing system is configured to execute the initiated data exchange based on the validation information.
1 Assignment
0 Petitions
Accused Products
Abstract
The disclosed embodiments include methods and point-of-sale terminals for authenticating a user. The disclosed embodiments include, for example, a method for receiving, by one or more processors, authentication data from an authentication network, the authentication data including an authentication code identifying an authentication transaction associated with an authenticating partner system. The method may also include validating, by the one or more processors, the authentication data, the validating comprising comparing the authentication data with validation data corresponding to a prior authentication event associated with the user. The method may also include generating, by the one or more processors, validation information based on the validating, the validation information comprising a determination whether to validate the user for the authentication transaction. The method may also include providing, by the one or more processors, the validation information to the authentication network.
51 Citations
18 Claims
-
1. A terminal device, comprising:
-
a communications interface; a memory storing software instructions; and one or more processors coupled to the memory and to the communications unit, the one or more processors being configured to execute the software instructions to perform one or more operations, the operations comprising; receiving authentication data from a client device via the communications interface, the authentication data comprising an authentication code corresponding to an exchange of data initiated between the client device and a first computing system and a first portion of authentication information associated with the initiated data exchange, and the first portion of the authentication information comprising packetized data that includes a header or a footer portion; based on the authentication code, determining a transaction type that characterizes the initiated data exchange, and obtaining a second portion of the authentication information associated with the determined transaction type; detecting an incompatibility between the first portion of the authentication information and the transaction type; in response to the detected incompatibility, modifying a format of the header or footer portion of the first portion of the authentication information in accordance with the transaction type; generating modified authentication data that includes the first and second portions of the authentication information; and transmitting, via the communications interface, the modified authentication data to a second computing system, wherein the second computing system is configured to validate the initiated data exchange based on a comparison between the modified authentication data and validation data characterizing a prior authentication transaction validated by the second computing system, and to generate and transmit, to the first computing system, validation information characterizing the validated data exchange, and wherein the first computing system is configured to execute the initiated data exchange based on the validation information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 13, 14, 15, 16, 17)
-
-
12. A computer-implemented method for authenticating a user, comprising,
receiving, by one or more processors, authentication data from a client device, the authentication data comprising an authentication code corresponding to an exchange of data initiated between a client device and a first computing system and a first portion of authentication information associated with the initiated data exchange, and the first portion of the authentication information comprising packetized data that includes a header or a footer portion; -
based on the authentication code, and by the one or more processors, determining a transaction type that characterizes the initiated data exchange, and obtaining a second portion of the authentication information associated with the determined transaction type; detecting, by the one or more processors, an incompatibility between the first portion of the authentication information and the transaction type; in response to the detected incompatibility, and by the one or more processors, modifying a format of the header or footer portion of the first portion of the authentication information in accordance with the transaction type; generating, by the one or more processors, modified authentication data that includes the first and second portions of the authentication information; and transmitting, by the one or more processors, the modified authentication data to a second computing system, wherein the second computing system is configured to validate the initiated data exchange based on a comparison between the modified authentication data and validation data characterizing a prior authentication transaction validated by the second computing system, and to generate and transmit, to the first computing system, validation information characterizing the validated data exchange, and wherein the first computing system is configured to execute the initiated data exchange in accordance with the validation information.
-
-
18. A tangible, non-transitory computer-readable medium storing instructions that, when executed by at least one processor, cause the at least one processor to perform a method, comprising:
-
receiving, from a client device, authentication data that includes an authentication code corresponding to an exchange of data initiated between the client device and a first computing system and a first portion of authentication information associated with the initiated data exchange, the first portion of the authentication information comprising packetized data that includes a header or a footer portion; based on the authentication code, determining a transaction type that characterizes the initiated data exchange, and obtaining a second portion of the authentication information associated with the determined transaction type; detecting an incompatibility between the first portion of the authentication information and the transaction type; in response to the detected incompatibility, modifying a format of the header or footer portion of the first portion of the authentication information in accordance with the transaction type; generating modified authentication data that includes the first and second portions of the authentication information; and transmitting the modified authentication data to a second computing system, wherein the second computing system is configured to validate the initiated data exchange based on a comparison between the modified authentication data and on validation data characterizing a prior authentication transaction validated by the second computing system, and to generate and transmit, to the first computing system, validation information characterizing the validated data exchange, and wherein the first computing system is configured to execute the initiated data exchange in accordance with the first authentication data and the validation information.
-
Specification