User authentication
First Claim
1. A system for authenticating a user identity asserted from a client device, the system comprising:
- one or more processors; and
one or more memory devices comprising instructions that, when executed by the one or more processors, cause the one or more processors to;
receive information through a website from the client device that asserts a user identity, wherein the information comprises a user identifier;
access, through a network interface, one or more external data stores to receive a plurality of data rows from the one or more external data stores, wherein;
the plurality of data rows are associated with the user identity and the one or more external data stores are accessed using a set of user credentials that are not accessible by the website; and
the one or more external data stores receive the plurality of data rows from one or more aggregator computer systems;
access, through the network interface, one or more monitoring systems to receive a plurality of data vectors from the one or more monitoring systems, wherein;
the one or more monitoring systems are configured to monitor transmissions received periodically over time by one or more receiving systems from the one or more aggregator computer systems;
the plurality of data vectors comprise numerical target values for the one or more receiving systems; and
the plurality of data vectors are accessed using the user identifier;
convert the plurality of data rows into a unified format readable by diverse internal systems;
determine a type for each of the plurality of data vectors, wherein the type determines a matching algorithm used to determine matches between the plurality of data rows and the plurality of data vectors;
determine whether one or more of the plurality of data rows can be matched to one or more of the plurality of data vectors by determining, according to the unified format and the type of the plurality of data vectors, whether a potential match is a one-to-many match, a one-to-one match, or a many-to-one match between the plurality of data vectors and the plurality of data rows;
require at least one additional authentication measure based on the determination that the one or more of the plurality of data rows can be matched to the one or more of the plurality of data vectors; and
authenticate the user identity based on a determination that the one or more of the plurality of data rows can be matched to the one or more of the plurality of data vectors.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for authenticating a user identity asserted from a client device may include receiving information that asserts a user identity including a user identifier, accessing external data stores to receive data rows that are associated with the user identity, and accessing monitoring systems to receive data vectors. The monitoring systems may monitor transmissions to receiving systems, the data vectors may include numerical target values for the receiving systems, and the data vectors may be accessed using the user identifier. The method may also include determining whether the data rows can be matched to the data vectors, and based on that determination, authenticating the user identity.
130 Citations
16 Claims
-
1. A system for authenticating a user identity asserted from a client device, the system comprising:
-
one or more processors; and one or more memory devices comprising instructions that, when executed by the one or more processors, cause the one or more processors to; receive information through a website from the client device that asserts a user identity, wherein the information comprises a user identifier; access, through a network interface, one or more external data stores to receive a plurality of data rows from the one or more external data stores, wherein; the plurality of data rows are associated with the user identity and the one or more external data stores are accessed using a set of user credentials that are not accessible by the website; and the one or more external data stores receive the plurality of data rows from one or more aggregator computer systems; access, through the network interface, one or more monitoring systems to receive a plurality of data vectors from the one or more monitoring systems, wherein; the one or more monitoring systems are configured to monitor transmissions received periodically over time by one or more receiving systems from the one or more aggregator computer systems; the plurality of data vectors comprise numerical target values for the one or more receiving systems; and the plurality of data vectors are accessed using the user identifier; convert the plurality of data rows into a unified format readable by diverse internal systems; determine a type for each of the plurality of data vectors, wherein the type determines a matching algorithm used to determine matches between the plurality of data rows and the plurality of data vectors; determine whether one or more of the plurality of data rows can be matched to one or more of the plurality of data vectors by determining, according to the unified format and the type of the plurality of data vectors, whether a potential match is a one-to-many match, a one-to-one match, or a many-to-one match between the plurality of data vectors and the plurality of data rows; require at least one additional authentication measure based on the determination that the one or more of the plurality of data rows can be matched to the one or more of the plurality of data vectors; and authenticate the user identity based on a determination that the one or more of the plurality of data rows can be matched to the one or more of the plurality of data vectors. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for authenticating a user identity asserted from a client device, the method comprising:
-
receiving information through a website from the client device that asserts a user identity, wherein the information comprises a user identifier; accessing, through a network interface, one or more external data stores to receive a plurality of data rows from the one or more external data stores, wherein; the plurality of data rows are associated with the user identity and the one or more external data stores are accessed using a set of user credentials that are not accessible by the website; and the one or more external data stores receive the plurality of data rows from one or more aggregator computer systems; accessing, through the network interface, one or more monitoring systems to receive a plurality of data vectors from the one or more monitoring systems, wherein; the one or more monitoring systems monitor transmissions received periodically over time by one or more receiving systems from the one or more aggregator computer systems; the plurality of data vectors comprise numerical target values for the one or more receiving systems; and the plurality of data vectors are accessed using the user identifier; converting the plurality of data rows into a unified format readable by diverse internal systems; determining a type for each of the plurality of data vectors, wherein the type determines a matching algorithm used to determine matches between the plurality of data rows and the plurality of data vectors; determining, by one or more processors, whether one or more of the plurality of data rows can be matched to one or more of the plurality of data vectors by determining, according to the unified format and the type of the plurality of data vectors, whether a potential match is a one-to-many match, a one-to-one match, or a many-to-one match between the plurality of data vectors and the plurality of data rows; requiring at least one additional authentication measure based on the determination that the one or more of the plurality of data rows can be matched to the one or more of the plurality of data vectors; and authenticating, by the one or more processors, the user identity based on a determination that the one or more of the plurality of data rows can be matched to the one or more of the plurality of data vectors. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
Specification