METHODS AND SYSTEMS FOR AUTHENTICATING USERS
First Claim
1. A method of authenticating users comprising:
- conducting, by a computer hardware processor, a first authentication transaction with authentication data captured from a user to authenticate the user, the authentication data being biometric data;
conducting a second authentication transaction with authentication data captured from the user to authenticate the user after successfully authenticating the user in the first authentication transaction, the authentication data for the second transaction being different than the authentication data for the first transaction; and
transmitting a message to an electronic lock system after the user is successfully authenticated in the second authentication transaction, the electronic lock system being configured to unlock a door after receiving the message.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of authenticating users to reduce transaction risks includes indicating a desire to conduct a transaction and determining whether the transaction requires access to protected resources. Moreover, the method determines whether inputted information is known, determines a state of a communications device when the inputted information is known, and transmits a biometric authentication request from a server to an authentication system when the state of the communications device is enrolled. Additionally, the method includes validating the communications device, capturing biometric authentication data in accordance with a biometric authentication data capture request with the communications device, biometrically authenticating the user, generating a one-time pass-phrase and storing the one-time pass-phrase on the authentication system when the user is authenticated, comparing the transmitted one-time pass-phrase against the stored one-time pass-phrase, and granting access to the protected resources when the transmitted and stored one-time pass-phrases match.
-
Citations
15 Claims
-
1. A method of authenticating users comprising:
-
conducting, by a computer hardware processor, a first authentication transaction with authentication data captured from a user to authenticate the user, the authentication data being biometric data; conducting a second authentication transaction with authentication data captured from the user to authenticate the user after successfully authenticating the user in the first authentication transaction, the authentication data for the second transaction being different than the authentication data for the first transaction; and transmitting a message to an electronic lock system after the user is successfully authenticated in the second authentication transaction, the electronic lock system being configured to unlock a door after receiving the message. - View Dependent Claims (2)
-
-
3. A computing device for authenticating users comprising:
-
a processor; and a memory configured to store data, said computing device being associated with a network and said memory being in communication with said processor and having instructions stored thereon which, when executed by said processor, cause said processor to; conduct a first authentication transaction with authentication data captured from a user to authenticate the user, the authentication data being biometric data; conduct a second authentication transaction with authentication data captured from the user to authenticate the user after successfully authenticating the user in the first authentication transaction, the authentication data for the second transaction being different than the authentication data for the first transaction; and transmit a message to an electronic lock system after the user is successfully authenticated in the second authentication transaction, the electronic lock system being configured to unlock a door after receiving the message. - View Dependent Claims (4, 5, 6, 7, 8, 9, 10)
-
-
11. An apparatus for authenticating users comprising:
-
a processor; and a memory configured to store data, said apparatus being associated with a network and said memory being in communication with said processor and having instructions stored thereon which, when executed by said processor, cause said processor to; conduct a first authentication transaction with authentication data captured from a user to authenticate the user, the authentication data being biometric data; conduct a second authentication transaction with authentication data captured from the user to authenticate the user after successfully authenticating the user in the first authentication transaction, the authentication data for the second transaction being different than the authentication data for the first transaction; and unlock a door after the user is successfully authenticated in the second authentication transaction. - View Dependent Claims (12, 13)
-
-
14. A method of authenticating users comprising:
-
conducting, by a computer hardware processor, a first authentication transaction with authentication data captured from a user to authenticate the user, the authentication data being biometric data; conducting a second authentication transaction with authentication data captured from the user to authenticate the user after successfully authenticating the user in the first authentication transaction, the authentication data for the second transaction being different than the authentication data for the first transaction; and unlocking a door after the user is successfully authenticated in the second authentication transaction. - View Dependent Claims (15)
-
Specification