Methods and systems for using data processing systems in order to authenticate parties
First Claim
1. A method of using a data processing system, the method comprising:
- receiving biometric data from a user during a session;
successfully authenticating the user at a first time during the session; and
sending a request to the user to resubmit biometric data during the session after authenticating the user.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems perform authentication based at least in part of the context of the transaction. In one embodiment, the context can be determined and trigger different rules with regard to access to the information or ability to immediately execute the transaction. In another embodiment, a method can include registering a device as a trusted device. The device can include a biometric input module. Biometric data can be used to authenticate a user, and the user may be requested to resubmit biometric data during the same session. In a further embodiment, a hacker may obtain unauthorized access to a victim'"'"'s account information. The hacker may not be authenticated because he would not have access to a currently valid credential.
140 Citations
30 Claims
-
1. A method of using a data processing system, the method comprising:
-
receiving biometric data from a user during a session;
successfully authenticating the user at a first time during the session; and
sending a request to the user to resubmit biometric data during the session after authenticating the user. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method of using a data processing system, the method comprising:
-
sending account information associated with a first party from a second party to a third party that is not authorized to have access to the account information; and
receiving the account information in order to authenticate the first party, wherein;
the account information is received by the second party from the third party in connection with a transaction request; and
a valid credential associated with the first party is not received by the second party from the third party. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A method of performing a transaction, the method comprising:
-
determining a context of the transaction between a provider of a product and a requestor of the product;
determining a plurality of rules to be used to authenticate the provider and the requester based at least in part on the context of the transaction; and
authenticating the provider, the requester, or any combination thereof based at least in part on the plurality of rules. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A data processing system comprising:
-
a context module to determine a context of a transaction between a provider of a product and a requestor of the product;
a rules module rules to be used to authenticate parties to the transaction based at least in part on the context; and
an authentication process module to performed authentication based at least in part on the rules. - View Dependent Claims (19, 20, 21, 22)
-
-
23. A data processing system readable medium having data to carry out a method of performing a transaction, wherein the data is embodied within the data processing system readable medium, the data comprising:
-
an instruction to determine a context of the transaction between a provider of a product and a requestor of the product;
an instruction to determine a plurality of rules to be used to authenticate the provider and the requestor based at least in part on the context of the transaction;
an instruction to authenticate the provider and the requestor based at least in part on the plurality of rules. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30)
-
Specification