EFFICIENT PREVENTION FRAUD
First Claim
1. A method of managing difficulty of use and security for a transaction, the method comprising:
- (a) determining, by a transaction manager operating on a computing device, a range of possible steps for a transaction comprising security measures available for the transaction;
(b) identifying a threshold for a security metric to be exceeded for authorizing the transaction, the security metric to be determined based on performance of steps selected for the transaction; and
(c) selecting, for the transaction, at least one step from the range of possible steps, based on optimizing between (i) a difficulty of use quotient of the transaction from subjecting a user to the at least one step, and (ii) the security metric relative to the determined threshold, the optimization including a preference for inclusion of a step for liveness detection or biometric deterrence if available.
3 Assignments
0 Petitions
Accused Products
Abstract
This disclosure is directed to methods and systems for managing difficulty of use and security for a transaction. A transaction manager operating on a computing device may determining a range of possible steps for a transaction comprising security measures available for the transaction. The transaction manager may identify a threshold for a security metric to be exceeded for authorizing the transaction, the security metric to be determined based on performance of steps selected for the transaction. The transaction manager may select for the transaction at least one step from the range of possible steps, based on optimizing between (i) a difficulty of use quotient of the transaction from subjecting a user to the at least one step, and (ii) the security metric relative to the determined threshold, the optimization including a preference for inclusion of a step for liveness detection or biometric deterrence if available.
-
Citations
20 Claims
-
1. A method of managing difficulty of use and security for a transaction, the method comprising:
-
(a) determining, by a transaction manager operating on a computing device, a range of possible steps for a transaction comprising security measures available for the transaction; (b) identifying a threshold for a security metric to be exceeded for authorizing the transaction, the security metric to be determined based on performance of steps selected for the transaction; and (c) selecting, for the transaction, at least one step from the range of possible steps, based on optimizing between (i) a difficulty of use quotient of the transaction from subjecting a user to the at least one step, and (ii) the security metric relative to the determined threshold, the optimization including a preference for inclusion of a step for liveness detection or biometric deterrence if available. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A system for managing difficulty of use and security for a transaction, the system comprising:
- a transaction manager operating on a computing device, determining a range of possible steps for a transaction comprising security measures available for the transaction;
identifying a threshold for a security metric to be exceeded for authorizing the transaction, the security metric to be determined based on performance of steps selected for the transaction; and
selecting, for the transaction, at least one step from the range of possible steps, based on optimizing between (i) a difficulty of use quotient of the transaction from subjecting a user to the at least one step, and (ii) the security metric relative to the determined threshold, the optimization including a preference for inclusion of a step for liveness detection or biometric deterrence if available.
- a transaction manager operating on a computing device, determining a range of possible steps for a transaction comprising security measures available for the transaction;
Specification