Method and system for managing authentication attempts
First Claim
1. ) A computer-based system for managing illegitimate authentication attempts comprising:
- a first application for receiving an authentication attempt from a device connected to said system;
said attempt having been entered into said device by a user;
said user being one of a legitimate user and an illegitimate user;
a second application for capturing and recording said authentication attempt;
a third application for performing an analysis of said authentication attempt and for performing a determination of whether said authentication attempt is potentially from said illegitimate user;
a fourth application for modifying an authentication system database based on results from said third application; and
a communication channel to another device associated with said legitimate user and operable to send messages based on results from said third application to said another device for presentation to said legitimate user.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention provides, in certain embodiments, identification and management of authentication attempts using having a real time communication channel with the end user that is separate from the channel being used for authentication. An example is where Internet users are a) identified by their cell phone numbers and may b) access the internet from many different physical locations. Aspects of the invention allow for authentication issue detection to be extended, utilizing the separate communication channel to communicate directly with the user. This can allow the authenticating authority to take proactive action on a more automatic basis with the ability to distinguish fraud or abuse attempts from user problems aided by the separate communication channel.
44 Citations
25 Claims
-
1. ) A computer-based system for managing illegitimate authentication attempts comprising:
-
a first application for receiving an authentication attempt from a device connected to said system;
said attempt having been entered into said device by a user;
said user being one of a legitimate user and an illegitimate user;
a second application for capturing and recording said authentication attempt;
a third application for performing an analysis of said authentication attempt and for performing a determination of whether said authentication attempt is potentially from said illegitimate user;
a fourth application for modifying an authentication system database based on results from said third application; and
a communication channel to another device associated with said legitimate user and operable to send messages based on results from said third application to said another device for presentation to said legitimate user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
Specification