Multi-Channel Multi-Factor Authentication
First Claim
Patent Images
1. A method for authenticating a user comprising:
- receiving a claimant target over a first channel;
retrieving a device address associated with a user ID;
sending a prompt over a second channel to a device associated with the device address, the prompt being one of a plurality of prompts, each of the plurality of prompts having a biometric template of the user associated therewith;
receiving video in response to the prompt;
extracting a biometric response from the video; and
determining a match between the biometric response and a biometric template associated with the prompt that was sent over the second channel.
6 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for authenticating electronic transactions are provided. The authentication methods employ a combination of security features and communication channels. These security features can be based, for example, on unique knowledge of the person being authenticated, a unique thing that the person has, unique personal features and attributes of the person, the ability of the person to respond, and to do so in a fashion that a machine cannot, and so forth. Methods for enrolling the person prior to authentication are also provided, as well as systems for enrollment and authentication.
18 Citations
26 Claims
-
1. A method for authenticating a user comprising:
-
receiving a claimant target over a first channel; retrieving a device address associated with a user ID; sending a prompt over a second channel to a device associated with the device address, the prompt being one of a plurality of prompts, each of the plurality of prompts having a biometric template of the user associated therewith; receiving video in response to the prompt; extracting a biometric response from the video; and determining a match between the biometric response and a biometric template associated with the prompt that was sent over the second channel. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for authenticating a user comprising:
-
receiving a claimant target over a first channel; retrieving a device address associated with a user ID; establishing a second channel to a device associated with the device address; sending a prompt to the user, the prompt being one of a plurality of prompts, each of the plurality of prompts having a biometric template of the user associated therewith; receiving video in response to the prompt; extracting a biometric response from the video; and determining a match between the biometric response and a biometric template associated with the prompt sent over the second channel. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A method for authentication consisting of:
-
a claimant submitting a unique identifier over a first channel; the claimant receiving a prompt on a device; and the claimant submitting a biometric response to the prompt by speaking within the field of view of a camera, where one of the two steps of receiving the prompt and submitting the biometric response is performed over a second channel. - View Dependent Claims (16, 17)
-
-
18. An authentication system comprising authentication logic configured to authenticate a claimant by
receiving a claimant target over a first channel; -
retrieving a device address associated with a user ID; sending a prompt from a plurality of prompts to a device associated with the device address over a second channel; receiving video in response to the prompt; extracting a biometric response from the video; and determining a match between the biometric response and a biometric template associated with the prompt. - View Dependent Claims (19, 20, 21, 22)
-
-
23. A computing system comprising:
-
a screen; a video camera having a field of view, disposed proximate to the screen, and configured such that a person viewing the screen will be within the field of view; and logic configured to communicate over a secure channel with an authentication system, receive a video signal from the video camera and generate therefrom a first video stream that is encrypted and a second video stream that is not encrypted, render the second video stream to the screen, and transmit the first video stream over the channel to the authentication system. - View Dependent Claims (24, 25, 26)
-
Specification