METHOD AND APPARATUS FOR ENABLING A USER TO SELECT AN AUTHENTICATION METHOD
First Claim
1. A method comprising:
- transmitting, by a computer-based system for facilitating selection of an authentication method, data having information regarding a first user selected authentication method from a web server to a security server and an application server, wherein the data includes information regarding a first user selected authentication method for accessing a restricted service; and
registering, by the computer-based system, the first user selected authentication method, wherein the data is transmitted from the application server to a database server; and
allowing, by the computer-based system, a change from the first user selected authentication method to a second authentication method.
5 Assignments
0 Petitions
Accused Products
Abstract
The present invention facilitates access to a restricted service related to secure transactions via a network. The present invention allows a user to select a minimum security level of authentication for its own login to a restricted service. The user'"'"'s selected minimum security level of authentication may be registered in an authentication method system, so that the user must use the selected minimum security level for authentication in order to gain access to the restricted service. Alternatively, the user may specify that the selected minimum security level for authentication may be over-turned by the user, or optionally re-set to a new authentication method depending on the needs of the user. As such, the present invention allows the user the flexibility to select its own authentication method for accessing a restricted service.
18 Citations
20 Claims
-
1. A method comprising:
-
transmitting, by a computer-based system for facilitating selection of an authentication method, data having information regarding a first user selected authentication method from a web server to a security server and an application server, wherein the data includes information regarding a first user selected authentication method for accessing a restricted service; and registering, by the computer-based system, the first user selected authentication method, wherein the data is transmitted from the application server to a database server; and allowing, by the computer-based system, a change from the first user selected authentication method to a second authentication method. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. An article of manufacture including a non-transitory, tangible computer readable storage medium having instructions stored thereon that, in response to execution by a computer-based system for facilitating selection of an authentication method, cause the computer-based system to perform operations comprising:
-
transmitting, by the computer-based system, data having information regarding a first user selected authentication method from a web server to a security server and an application server, wherein the data includes information regarding a first user selected authentication method for accessing a restricted service; and registering, by the computer-based system, the first user selected authentication method, wherein the data is transmitted from the application server to a database server; and allowing, by the computer-based system, a change from the first user selected authentication method to a second authentication method.
-
-
20. A system comprising:
-
a processor for facilitating selection of an authentication method, a tangible, non-transitory memory configured to communicate with the processor, the tangible, non-transitory memory having instructions stored thereon that, in response to execution by the processor, cause the processor to perform operations comprising; transmitting, by the processor, data having information regarding a first user selected authentication method from a web server to a security server and an application server, wherein the data includes information regarding a first user selected authentication method for accessing a restricted service; and registering, by the processor, the first user selected authentication method, wherein the data is transmitted from the application server to a database server; and allowing, by the processor, a change from the first user selected authentication method to a second authentication method.
-
Specification