ENHANCED SECURITY AUTHENTICATION SYSTEM
First Claim
1. A method for authenticating a transaction of a user, the method comprising:
- receiving, by an authentication service executing on a computer system, the transaction over a particular channel, wherein the particular channel is one of a plurality of supported channels;
determining, by the authentication service executing on the computer system, a risk score for the transaction based on a number of contextual risk factors;
determining, by the authentication service executing on the computer system, an authentication scheme from a number of authentication schemes for authenticating an identity of the user within an authentication context, wherein the authentication scheme is determined based on the particular channel and the risk score;
using, by the authentication service executing on the computer system, the authentication scheme to authenticate the identity of the user within the authentication context;
in response to successfully authenticating the identity of the user within the authentication context, determining, by the authentication service executing on the computer system, whether the transaction is a permitted transaction based on an assurance level associated with the authentication context; and
in response to determining that the transaction is the permitted transaction, authenticating, by the authentication service executing on the computer system, the transaction.
2 Assignments
0 Petitions
Accused Products
Abstract
A method, a computer system, and a computer program product for authenticating a transaction are provided. An authentication system receives the transaction over a particular channel of a plurality of support channels. A risk score is determined for the transaction based on a number of contextual risk factors. An authentication scheme is determined from a number of authentication schemes for authenticating an identity of the user within an authentication context. The authentication scheme is determined based on the particular channel and the risk score. In response to successfully authenticating the identity of the user within the authentication context, the authentication system determines whether the transaction is a permitted transaction based on an assurance level associated with the authentication context. In response to determining that the transaction is the permitted transaction, the transaction is authenticated.
-
Citations
36 Claims
-
1. A method for authenticating a transaction of a user, the method comprising:
-
receiving, by an authentication service executing on a computer system, the transaction over a particular channel, wherein the particular channel is one of a plurality of supported channels; determining, by the authentication service executing on the computer system, a risk score for the transaction based on a number of contextual risk factors; determining, by the authentication service executing on the computer system, an authentication scheme from a number of authentication schemes for authenticating an identity of the user within an authentication context, wherein the authentication scheme is determined based on the particular channel and the risk score; using, by the authentication service executing on the computer system, the authentication scheme to authenticate the identity of the user within the authentication context; in response to successfully authenticating the identity of the user within the authentication context, determining, by the authentication service executing on the computer system, whether the transaction is a permitted transaction based on an assurance level associated with the authentication context; and in response to determining that the transaction is the permitted transaction, authenticating, by the authentication service executing on the computer system, the transaction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer system comprising:
-
a hardware processor; and an authentication system in communication with the hardware processor and configured; to receive a transaction over a particular channel, wherein the particular channel is one of a plurality of supported channels; to determine a risk score for the transaction based on a number of contextual risk factors; to determine an authentication scheme from a number of authentication schemes for authenticating an identity of a user within an authentication context, wherein the authentication scheme is determined based on the particular channel and the risk score; to use the authentication scheme to authenticate the identity of the user within the authentication context; in response to successfully authenticating the identity of the user within the authentication context, to determine whether the transaction is a permitted transaction based on an assurance level associated with the authentication context; and in response to determining that the transaction is the permitted transaction, to authenticate the transaction. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A computer program product comprising:
-
a computer readable storage media having program code stored thereon for authenticating a transaction of a user; first program code, stored on the computer readable storage media, for receiving the transaction over a particular channel, wherein the particular channel is one of a plurality of supported channels; second program code, stored on the computer readable storage media, for determining a risk score for the transaction based on a number of contextual risk factors; third program code, stored on the computer readable storage media, for determining an authentication scheme from a number of authentication schemes for authenticating an identity of the user within an authentication context, wherein the authentication scheme is determined based on the particular channel and the risk score; fourth program code, stored on the computer readable storage media, for using the authentication scheme to authenticate the identity of the user within the authentication context; fifth program code, stored on the computer readable storage media, for determining, in response to successfully authenticating the identity of the user within the authentication context, whether the transaction is a permitted transaction based on an assurance level associated with the authentication context; and sixth program code, stored on the computer readable storage media, for authenticating the transaction in response to determining that the transaction is the permitted transaction. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
Specification