×

Methods and systems for automatically configuring user authentication rules

  • US 10,650,128 B2
  • Filed: 10/18/2017
  • Issued: 05/12/2020
  • Est. Priority Date: 10/18/2017
  • Status: Active Grant
First Claim
Patent Images

1. A method for automatically determining user authentication criteria, comprising:

  • receiving, by a neural network engine from a first party computer, first party preferences data comprising user authentication requirement criteria associated with a plurality of different transaction types, the user authentication criteria comprising a fraudulent transaction tolerance associated with each transaction type of the plurality of different transaction types;

    receiving, by the neural network engine, authenticator data associated with a mobile device of a user, mobile device metadata, and at least one of user behavior data and user historical data;

    generating, by the neural network engine, an output value based on the first party preferences data, the authenticator data associated with the mobile device of the user, the mobile device metadata, and at least one of the user behavior data and the user historical data;

    transmitting, by the neural network engine to a score comparator, the output value for comparison to a required score specified by the first party;

    receiving, by the neural network engine from the score comparator, feedback data when the output value is not within a tolerance of the required score;

    generating, by the neural network engine, an updated output value based on the feedback data;

    transmitting, by the neural network engine to the score comparator, the updated output value for comparison to the required score;

    receiving, by the neural network engine from the score comparator, a match indication;

    generating, by the neural network engine, user authentication rules recommendations associated with the user for each of the plurality of different transaction types; and

    transmitting, by the neural network engine, the user authentication rules recommendations to the first party computer.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×