Methods and Systems for Authentication
0 Assignments
0 Petitions
Accused Products
Abstract
Disclosed are systems and methods of authenticating a user on a network, including, based on identity information received from the user, accessing at least one data source to retrieve data associated with the user, comparing the retrieved data against a listing of possible questions associated with the retrieved data to determine associations between the retrieved data and the listing of possible questions, based on a ranking of the listing of possible questions, formulating at least one question set using questions within the listing of possible questions for which retrieved data is available, where each of the at least one question set includes at least two different questions, causing at least some of the questions from the at least one question set to be presented to the user, and, based on responses to the questions from the user, determining whether the user is authenticated.
33 Citations
22 Claims
-
1-11. -11. (canceled)
-
12. A method of authenticating a user on a network, the method comprising:
-
based on identity information received from the user, accessing at least one data source to retrieve data associated with the user, comparing the retrieved data against a listing of possible questions associated with the retrieved data to determine associations between the retrieved data and the listing of possible questions, based on a ranking of the listing of possible questions, formulating at least one question set using questions within the listing of possible questions for which retrieved data is available, where each of the at least one question set includes at least two different questions, causing at least some of the questions from the at least one question set to be presented to the user, and, based on responses to the questions from the user, determining whether the user is authenticated; wherein a response to a question is a selection of one of a plurality of possible answers to the question presented to the user; wherein the determining includes determining, based on a response to one question from the at least one question set, that the response is a partially correct response to that one question; wherein the partially correct response to the one question is not a correct answer; awarding points to the partially correct response, wherein the points are based on at least one of a multiplier and a threshold that are configured for a partially correct response.
-
-
13. A method of authenticating a user on a network, the method comprising:
-
based on identity information received from the user, accessing at least one data source to retrieve data associated with the user, comparing the retrieved data against a listing of possible questions associated with the retrieved data to determine associations between the retrieved data and the listing of possible questions, based on a ranking of the listing of possible questions, formulating at least one question set using questions within the listing of possible questions for which retrieved data is available, where each of the at least one question set includes at least two different questions, causing at least some of the questions from the at least one question set to be presented to the user, and, based on responses to the questions from the user, determining whether authentication criteria is met; wherein a response to a question is a selection of one of a plurality of possible answers to the question presented to the user; wherein the determining includes determining, based on a response to one question from the at least one question set, that the response is a partially correct response to that one question; wherein the partially correct response to the one question is not a correct answer; awarding points to the partially correct response, wherein the points are based on at least one of a multiplier and a threshold that are configured for a partially correct response; in response to determining that authentication criteria is not met, causing a subsequent set of questions to be presented to the user. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A method of authenticating a user on a network, the method comprising:
-
based on identity information received from the user, accessing at least one data source to retrieve data associated with the user, comparing the retrieved data against a listing of possible questions associated with the retrieved data to determine associations between the retrieved data and the listing of possible questions, based on a ranking of the listing of possible questions, formulating at least one question set using questions within the listing of possible questions for which retrieved data is available, where each of the at least one question set includes at least two different questions, causing at least some of the questions from the at least one question set to be presented to the user, and, based on responses to the questions from the user, determining whether the user is authenticated; wherein a response to a question is a selection of one of a plurality of possible answers to the question presented to the user; wherein the determining includes determining, based on a response to one question from the at least one question set, that the response is a partially correct response to that one question; wherein the partially correct response to the one question is not a correct answer; awarding points to the partially correct response, wherein the points are based on at least one of a multiplier and a threshold that are configured for a partially correct response; in response to determining that authentication criteria is not met, providing instructions to the user to proceed to a mail method of authentication that includes obtaining from the user physical specimens of user identification; and in response to receiving the physical specimens determining whether the physical specimens meet the authentication criteria. - View Dependent Claims (19)
-
-
20. A method of authenticating a user on a network, the method comprising:
-
based on identity information received from the user, accessing at least one data source to retrieve data associated with the user, comparing the retrieved data against a listing of possible questions associated with the retrieved data to determine associations between the retrieved data and the listing of possible questions, based on a ranking of the listing of possible questions, formulating at least one question set using questions within the listing of possible questions for which retrieved data is available, where each of the at least one question set includes at least two different questions, causing at least some of the questions from the at least one question set to be presented to the user, and, based on responses to the questions from the user, determining whether the user is authenticated; wherein a response to a question is a selection of one of a plurality of possible answers to the question presented to the user; wherein the determining includes determining, based on a response to one question from the at least one question set, that the response is a partially correct response to that one question; wherein the partially correct response to the one question is not a correct answer; awarding points to the partially correct response, wherein the points are based on at least one of a multiplier and a threshold that are configured for a partially correct response; in response to determining that authentication criteria is not met, providing instructions to the user to proceed to a phone method of authentication that includes an operator orally presenting questions to the user; and in response to receiving oral responses to the questions, determining whether the oral responses meet the authentication criteria. - View Dependent Claims (21, 22)
-
Specification