SYSTEMS AND METHODS FOR AUTHENTICATING USER IDENTITIES IN NETWORKED COMPUTER SYSTEMS
First Claim
1. A point-of-sale terminal, comprising:
- a memory storing software instructions; and
one or more processors coupled to the memory, the one or more processors configured to execute the software instructions to perform one or more operations, the operations comprising;
receiving a first set of authentication data associated with the user, the first set of authentication data comprising an authentication code corresponding to a pending authentication transaction with a first authentication partner system,receiving transaction information specifying whether the first set of authentication data corresponds to an authentication transaction,determining a destination system based on the first set of authentication data and the transaction information, andproviding the first set of authentication data to the destination system.
1 Assignment
0 Petitions
Accused Products
Abstract
The disclosed embodiments include methods and point-of-sale terminals for authenticating a user. The disclosed embodiments include, for example, a method for receiving, by one or more processors, authentication data from an authentication network, the authentication data including an authentication code identifying an authentication transaction associated with an authenticating partner system. The method may also include validating, by the one or more processors, the authentication data, the validating comprising comparing the authentication data with validation data corresponding to a prior authentication event associated with the user. The method may also include generating, by the one or more processors, validation information based on the validating, the validation information comprising a determination whether to validate the user for the authentication transaction. The method may also include providing, by the one or more processors, the validation information to the authentication network.
17 Citations
13 Claims
-
1. A point-of-sale terminal, comprising:
-
a memory storing software instructions; and one or more processors coupled to the memory, the one or more processors configured to execute the software instructions to perform one or more operations, the operations comprising; receiving a first set of authentication data associated with the user, the first set of authentication data comprising an authentication code corresponding to a pending authentication transaction with a first authentication partner system, receiving transaction information specifying whether the first set of authentication data corresponds to an authentication transaction, determining a destination system based on the first set of authentication data and the transaction information, and providing the first set of authentication data to the destination system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-implemented method for authenticating a user, comprising,
receiving, by one or more processors, a first set of authentication data associated with the user, the first set of authentication data comprising an authentication code corresponding to a pending authentication transaction with a first authentication partner system, receiving, by the one or more processors, transaction information specifying whether the first set of authentication data corresponds to an authentication transaction, determining, by the one or more processors, a destination system based on the first set of authentication data and the transaction information, and providing, by the one or more processors, the first set of authentication data to the destination system.
-
11. (canceled)
-
12. A point-of-sale terminal for authenticating a user, comprising:
-
a memory storing software instructions; and one or more processors coupled to the memory, the one or more processors configured to execute the software instructions to perform one or more operations, the operations comprising; receiving a first set of authentication data associated with the user, the first set of authentication data comprising an authentication code corresponding to a pending authentication transaction with a first authentication partner system, receiving transaction information specifying whether the first set of authentication data corresponds to an authentication transaction, and providing the first set of authentication data and the transaction information to a third party system, the third party system configured to; determine a destination system based on the first set of authentication data and the transaction information, and provide the first set of authentication data to the destination system.
-
-
13. (canceled)
Specification