System and method for fraud monitoring, detection, and tiered user authentication
First Claim
1. A method for authenticating a current request to access a server, the current access request originating from a network-connected device, the method comprising:
- gathering identifying information concerning the device originating the current access request;
determining authentication interface selection criteria in dependence on the gathered identifying information;
presenting at the originating device an authentication interface selected from a plurality of authentication interfaces in dependence on the determined selection criteria; and
authenticating or not authenticating the current access request in dependence on information entered at the originating device in response to the presented authentication interface.
3 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides systems and methods for authenticating access requests from user devices by presenting one of a plurality of graphical user interfaces selected depending on a perceived risk of fraud associated with the devices. User devices are identified with fingerprinting information, and their associated risks of fraud are determined from past experience with the device or with similar devices and from third party information. In preferred embodiments, different graphical user interfaces are presented based on both fraud risk and, in the case of a known user, usability. In preferred embodiments, this invention is implemented as a number of communicating modules that identify user devices, assess their risk of fraud, present selected user interfaces, and maintain databases of fraud experiences. This invention also includes systems providing these authentication services.
948 Citations
40 Claims
-
1. A method for authenticating a current request to access a server, the current access request originating from a network-connected device, the method comprising:
-
gathering identifying information concerning the device originating the current access request;
determining authentication interface selection criteria in dependence on the gathered identifying information;
presenting at the originating device an authentication interface selected from a plurality of authentication interfaces in dependence on the determined selection criteria; and
authenticating or not authenticating the current access request in dependence on information entered at the originating device in response to the presented authentication interface. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A computer system for authenticating a current request to access a service provider server application, the current access request originating from a network-connected device, the system comprising:
-
a device central repository (DCR) database that stores historical information concerning risks of fraudulent requests in association with information identifying the devices originating the requests; and
one or more network-connected authentication processors operatively coupled to the DCR and that perform;
accepting a current access request from a server application;
gathering identifying information concerning the device originating the current access request;
retrieving risk information concerning the current request from a device central repository (DCR), wherein the DCR stores historical information concerning risks of fraudulent requests in association with information identifying their originating devices;
determining authentication interface selection criteria by applying rules to information including the gathered device identifying information and the retrieved risk information;
selecting an authentication interface in dependence on the determined interface selection criteria from a plurality of authentication interfaces having various levels of security and/or usability, wherein the security and/or usability of the selected authentication interface corresponds to the risks of fraudulent requests;
presenting the selected authentication interface at the originating device;
authenticating or not authenticating the current access request in dependence on information entered at the originating device in response to the presented authentication interface;
updating the historical risk information stored in the DCR with current risk information determined by applying rules to information including the authentication results for the current access request, wherein the historical risk information updated is that corresponding to the current gathered identifying information; and
providing the authentication information to the server application. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A method for authenticating a current request to access an on-line application of a service provider, the current access request originating from a user at a network-connected device, the method comprising:
-
gathering information describing one or more of the location of the user device, the user device, the user, and the transaction;
determining in dependence on the gathered information one or more risks associated with the access request according to an access policy, wherein the access policy comprises risks related to the current location of the user device, risks related to the current user device, risks related to the current user, and risk related to the current transaction;
providing for the service provider scores, alerts, and actions selected in dependence on the determined risks. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39, 40)
-
Specification