User authentication system and methods thereof
First Claim
1. A system authenticating users, comprising:
- a programmed processor providing authentication rules, authenticating users according to the authentication rules responsive to user authentication requests and configuring the authentication rules in real-time, thereby allowing real-time customization of the system.
3 Assignments
0 Petitions
Accused Products
Abstract
A computer system to authenticate users of vendors supplying services and/or products to the users, the system having programmed processors providing authentication rules, authenticating users according to the authentication rules responsive to user authentication requests, configuring the authentication rules in real-time, thereby allowing real-time customization of the system, providing multi-factor user authentication processes, using any data sources providing information about and/or known to the users to authenticate the users, thereby providing a data agnostic system, and authentication strategies correspond to the authentication rules, thereby allowing the system to support authentication strategy experimentation.
-
Citations
109 Claims
-
1. A system authenticating users, comprising:
a programmed processor providing authentication rules, authenticating users according to the authentication rules responsive to user authentication requests and configuring the authentication rules in real-time, thereby allowing real-time customization of the system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 74)
- 68. A system authenticating users, comprising a programmed processor providing user authentication processes using any data sources providing information about and/or known to users, thereby providing a data agnostic system.
- 71. A system authenticating users, comprising a programmed processor generating multi-factor authentication examinations to authenticate users.
-
73. A system authenticating users, comprising a programmed processor providing authentication rules corresponding to authentication strategies, aggregating performance data of the authentication rules, and modifying the strategies responsive to the performance data, thereby optimizing the system responsive to the performance data.
-
75. A system authenticating users, comprising:
-
an authentication engine having authentication rules and authenticating users according to the authentication rules responsive to user authentication requests; and
an authentication rule designer allowing real-time configuration of the authentication rules, thereby customizing the system in real-time.
-
-
76. A system authenticating users, comprising:
-
an authentication rule designer defining authentication rules; and
an authentication engine applying authentication strategies defined by using the authentication rule designer to define and maintain the authentication rules, thereby allowing the system to support authentication strategy experimentation.
-
-
77. A computer-readable storage controlling a computer by storing user authentication information used to authenticate users of vendors providing services and/or products to the users, comprising:
-
a data structure identifying vendor information comprising vendor identification information, organization information, including personnel information, of the vendor; and
a data structure associating the vendor information with user authentication process identification information and access privilege information of the user authentication process based upon the vendor information. - View Dependent Claims (78)
-
-
79. A system authenticating users of vendors providing services and/or products to the users, comprising:
a display screen configured to provide a graphical user interface comprising a side navigation area containing at least a first selection location allowing selection of user authentication processes and tabbed folders providing customization information corresponding to selected user authentication processes, thereby allowing customization of the system. - View Dependent Claims (80, 81)
-
82. A method, comprising:
online defining customizations of an online user authentication service to authenticate users, associating the online user authentication service with a vendor that provides online transactions requiring authentication of the users, selecting/reviewing system development and implementation requirements to interface the online transactions with the customized online user authentication service, interfacing the vendor'"'"'s online transactions with the customized online user authentication service, generating online customized user authentication examinations, authenticating the users based upon the examinations, evaluating performance data of the examinations, and modifying the customizations in real-time, thereby customizing the online user authentication service depending on the performance data in real-time. - View Dependent Claims (83)
-
84. A method to authenticate a user, comprising:
-
receiving a user authentication request;
determining a source of the authentication request, retrieving parameters associated with the source;
retrieving data about the user according to the parameters; and
authenticating the user according to the parameters and based upon the data about the user. - View Dependent Claims (85, 86, 87, 88, 89, 90, 91, 92, 93)
-
-
94. A user authentication customizing system customizing user authentication processes of a vendor, comprising:
a customizing processor allowing a vendor to define parameters of interactive user authentication questions, during an in progress user authentication process, thereby automatically generating real-time customized versions of the interactive user authentication questions. - View Dependent Claims (95)
-
96. A system, comprising:
-
at least two or more data sources providing information about and/or known to users; and
a user authentication processor authenticating the users based upon a single set of interactive user authentication questions generated from the data sources. - View Dependent Claims (97, 98, 99, 100, 101, 102)
-
-
103. A computer data signal providing a user authentication service and embodied in a carrier wave, comprising:
a code segment controlling a computer to accept parameters of user authentication processes in real-time and to provide authentication examinations to users according to the parameters responsive to requests to authenticate users. - View Dependent Claims (104)
-
105. A method, comprising:
-
receiving a user authentication request;
determining a source of the authentication request, retrieving parameters associated with the source, the parameters comprise specifying generating interactive user authentication questions from one or more of questions having multiple choice answers with only one answer correct, true/false answers, multi-select answers and/or fill in the blank answers, query order and priority for the interactive user authentication questions, answer options, point assignments, grouping and group priority for the interactive user authentication questions, time to answer, retry criteria and/or language;
retrieving data about the user according to the parameters from one or more of credit history, user profile, fraud, geographic, demographic, government-supplied, political, biometric and/or digital certificate data sources;
automatically generating interactive user authentication questions according to the parameters and based upon the data about the user, thereby producing a source-customized user authentication examination;
querying the user with the generated interactive user authentication questions;
comparing information input about the user in response to the generated user authentication questions with the data about the user to determine correctly answered questions;
determining an authentication result by calculating a confidence score according to the parameters;
aggregating performance data of the authentication results; and
optimizing the parameters responsive to the performance data in real-time.
-
-
106. A system authenticating users, comprising:
customizing means for customizing authentication processes to authenticate users in real-time.
-
107. A system authenticating users, comprising:
data agnostic authentication means for allowing authentication of users based upon any data sources providing information about and/or known to the users.
-
108. A system authenticating users, comprising:
-
experimentation means for allowing aggregation of user authentication performance data for a business transaction based upon authentication strategy experimentation for the business transaction; and
optimization means for optimizing the system in real-time responsive to the performance data.
-
-
109. A system authentication user, comprising:
multi-factor authentication means for authenticating user based upon two or more authentication factors.
Specification