CREDIT APPLICANT AND USER AUTHENTICATION SOLUTION
First Claim
1. An authentication architecture to authenticate a user, the authentication architecture comprising one or more computer processors and storage configured as:
- a user access layer enabling one or more user devices to provide and receive data within the authentication architecture, the data including data to establish a user authentication account, and a set of business rules established by the user for managing the user authentication account;
a user interface layer, coupled to the user access layer, to provide interface modules for interacting with the one or more user devices;
a user services layer, coupled to the user interface layer, to provide authentication services and associated services, the user services layer carrying out the business rules; and
a data storage layer, coupled to the user services layer, to store and provide data to the authentication services and associated services.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides a credit applicant and user authentication solution for authenticating the identity of a credit applicant or a credit user. In particular, a user of the authentication system establishes a user account and obtains authentication information. The user then provides the authentication information during a subsequent credit application or credit transaction to authenticate the user'"'"'s identity. Authentication information may be renewed after each application or transaction at specified time intervals, based on monetary thresholds, specific geographic limitations, or any other methodology specified by the user.
21 Citations
23 Claims
-
1. An authentication architecture to authenticate a user, the authentication architecture comprising one or more computer processors and storage configured as:
-
a user access layer enabling one or more user devices to provide and receive data within the authentication architecture, the data including data to establish a user authentication account, and a set of business rules established by the user for managing the user authentication account; a user interface layer, coupled to the user access layer, to provide interface modules for interacting with the one or more user devices; a user services layer, coupled to the user interface layer, to provide authentication services and associated services, the user services layer carrying out the business rules; and a data storage layer, coupled to the user services layer, to store and provide data to the authentication services and associated services. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. An authentication architecture for identifying the authenticity of a user, the architecture comprising one or more computer processors and storage configured as:
-
a user access layer enabling one or more user devices to provide and receive data within the authentication architecture, the data including data to establish a user account, and user authentication account information; a user interface layer coupled to the user access layer to provide interface modules for interacting with the one or more user devices; a user services layer coupled to the user interface layer to provide authentication services and associated services including notifying the user when the user'"'"'s authentication account information is used or modified; and a data storage layer coupled to the user services layer to store and provide data to the authentication services and associated services, the data including user authentication information. - View Dependent Claims (21, 22, 23)
-
Specification