Graduated authentication in an identity management system
DCFirst Claim
Patent Images
1. A computer-implemented method for implementing variable transaction security levels, the method comprising:
- receiving a first request for user authentication as part of a first usage event, wherein the first request for user authentication includes information about a first type of transaction to be performed by a user during the first usage event;
receiving a second request for user authentication as part of a second usage event,wherein the second request for user authentication includes information about a second type of transaction to be performed by the user during the second usage event, and wherein the second type of transaction is different from the first type of transaction;
performing, using one or more hardware processors, at least one transaction associated with the first request at a first transaction security level by selecting a first transaction mechanism having the first transaction security level, wherein the first transaction mechanism is selected based on the first type of transaction to be performed by the user during a first usage event; and
performing, using the one or more hardware processors, at least one transaction associated with the second request at a second transaction security level by selecting a second transaction mechanism having the second transaction security level,wherein the second transaction mechanism is selected based on the second type of transaction to be performed by the user during the second usage event,and wherein the first transaction security level is different from the second transaction security level.
1 Assignment
Litigations
0 Petitions
Accused Products
Abstract
A method and system for graduated security in an identity management system utilize differing levels of time sensitivity, channel security and authentication security to provide a multi-dimensional approach to providing the right fit for differing identity requests. The differing levels of security can be selected by user preference, membersite request or homesite policy.
-
Citations
20 Claims
-
1. A computer-implemented method for implementing variable transaction security levels, the method comprising:
-
receiving a first request for user authentication as part of a first usage event, wherein the first request for user authentication includes information about a first type of transaction to be performed by a user during the first usage event; receiving a second request for user authentication as part of a second usage event, wherein the second request for user authentication includes information about a second type of transaction to be performed by the user during the second usage event, and wherein the second type of transaction is different from the first type of transaction; performing, using one or more hardware processors, at least one transaction associated with the first request at a first transaction security level by selecting a first transaction mechanism having the first transaction security level, wherein the first transaction mechanism is selected based on the first type of transaction to be performed by the user during a first usage event; and performing, using the one or more hardware processors, at least one transaction associated with the second request at a second transaction security level by selecting a second transaction mechanism having the second transaction security level, wherein the second transaction mechanism is selected based on the second type of transaction to be performed by the user during the second usage event, and wherein the first transaction security level is different from the second transaction security level. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-readable storage device storing instructions that, when executed by a computing system, cause the computing system to perform acts for implementing variable transaction security levels, the acts comprising:
-
receiving a first request for user authentication as part of a first usage event, wherein the first request for user authentication includes information about a first type of transaction to be performed by a user during the first usage event; receiving a second request for user authentication as part of a second usage event, wherein the second request for user authentication includes information about a second type of transaction to be performed by the user during the second usage event, and wherein the second type of transaction is different from the first type of transaction; performing, using one or more hardware processors, at least one transaction associated with the first request at a first transaction security level by selecting a first transaction mechanism having the first transaction security level, wherein the first transaction mechanism is selected based on the first type of transaction to be performed by the user during a first usage event; and performing, using the one or more hardware processors, at least one transaction associated with the second request at a second transaction security level by selecting a second transaction mechanism having the second transaction security level, wherein the second transaction mechanism is selected based on the second type of transaction to be performed by the user during the second usage event, and wherein the first transaction security level is different from the second transaction security level. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A system for implementing variable transaction security levels, the system comprising:
-
at least one memory; at least one interface configured to; receive a first request for user authentication as part of a first usage event, wherein the first request for user authentication includes information about a first type of transaction to be performed by a user during the first usage event; receive a second request for user authentication as part of a second usage event, wherein the second request for user authentication includes information about a second type of transaction to be performed by the user during the second usage event, and wherein the second type of transaction is different from the first type of transaction; and one or more processors configured to; perform at least one transaction associated with the first request at a first transaction security level by selecting a first transaction mechanism having the first transaction security level, wherein the first transaction mechanism is selected based on the first type of transaction to be performed by the user during a first usage event; and perform at least one transaction associated with the second request at a second transaction security level by selecting a second transaction mechanism having the second transaction security level, wherein the second transaction mechanism is selected based on the second type of transaction to be performed by the user during the second usage event, and wherein the first transaction security level is different from the second transaction security level. - View Dependent Claims (19, 20)
-
Specification