Pluggable authentication for transaction tool management services
First Claim
Patent Images
1. A system for managing a transaction tool for an individual, comprising:
- a receiver that receives a request from the individual to initiate a process for managing the transaction tool; and
a processor that analyzes the request from the individual and dynamically selects, based upon the requested process, at least one authentication method to be used for authenticating the identity of the individual before the request can be honored, the selected at least one authentication method being used to verify the identity of the individual.
2 Assignments
0 Petitions
Accused Products
Abstract
A system is provided for managing a transaction tool for an individual. The system includes a receiver that receives a request from the individual to initiate a process for managing the transaction tool. A processor analyzes the request from the individual and dynamically selects, based upon the requested process, at least one authentication method to be used for authenticating the identity of the individual before the request can be honored. The selected authentication method(s) are used to verify the identity of the individual.
123 Citations
21 Claims
-
1. A system for managing a transaction tool for an individual, comprising:
-
a receiver that receives a request from the individual to initiate a process for managing the transaction tool; and
a processor that analyzes the request from the individual and dynamically selects, based upon the requested process, at least one authentication method to be used for authenticating the identity of the individual before the request can be honored, the selected at least one authentication method being used to verify the identity of the individual. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for managing a transaction tool for an individual, comprising:
-
receiving a request from the individual to initiate a process for managing the transaction tool;
analyzing the request from the individual and dynamically selecting, based upon the requested process, at least one authentication method to be used for authenticating the identity of the individual before the request can be honored; and
verifying the identity of the individual using the selected at least one authentication method. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer readable medium storing a program that manages a transaction tool for an individual, the computer readable medium comprising:
-
a request receiving code segment that receives a request from the individual to initiate a process for managing the transaction tool;
an analyzing code segment that analyzes the request from the individual and dynamically selects, based upon the requested process, at least one authentication method to be used for authenticating the identity of the individual before the request can be honored; and
a verifying source code segment that verifies the identity of the individual using the selected at least one authentication method. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification