System and method for authentication of network users with preprocessing
DCFirst Claim
1. A method for authenticating a user of a network based on input received from the user, said method comprising:
- (a) receiving the input from the user, the input comprising information stored in a plurality of fields relating to identification of the user;
(b) preprocessing at least some of the information for reliability, including performing at least one task selected from the group of tasks consisting of (1) checking format of at least some of the information;
(2) comparing at least some of the information against a record of known data; and
(3) ensuring that at least some of the information is present in the record of known data; and
(c) if the preprocessing is successful, performing authentication based on the input by comparing at least some of the information against a database comprising a record of the user'"'"'s credit history as compiled from a plurality of the user'"'"'s creditors.
1 Assignment
Litigations
0 Petitions
Accused Products
Abstract
A network authentication system provides verification of the identity or other attributes of a network user to conduct a transaction, access data or avail themselves of other resources. The user is presented with a hierarchy of queries based on wallet-type (basic identification) and non-wallet type (more private) information designed to ensure the identity of the user and prevent fraud, false negatives and other undesirable results. A preprocessing stage is employed to ensure correct formatting of the input information and clean up routine mistakes (such as missing digits, typos, etc.) that might otherwise halt the transaction. The authenticator can be configured to require differing levels of input or award differing levels of authentication according to security criteria.
-
Citations
29 Claims
-
1. A method for authenticating a user of a network based on input received from the user, said method comprising:
-
(a) receiving the input from the user, the input comprising information stored in a plurality of fields relating to identification of the user;
(b) preprocessing at least some of the information for reliability, including performing at least one task selected from the group of tasks consisting of (1) checking format of at least some of the information;
(2) comparing at least some of the information against a record of known data; and
(3) ensuring that at least some of the information is present in the record of known data; and
(c) if the preprocessing is successful, performing authentication based on the input by comparing at least some of the information against a database comprising a record of the user'"'"'s credit history as compiled from a plurality of the user'"'"'s creditors. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
(d) searching at least some of the information in a dictionary; and
(e) if at least some of the information is not found in the dictionary, providing a closest substitute.
-
-
7. The method of claim 1, wherein at least some of the information includes a telephonic area code related information.
-
8. The method of claim 1, wherein at least some of the information includes a postal zip code related information.
-
9. The method of claim 8, wherein the record of known data is a list of valid postal zip codes for a geographical location, further comprising ensuring that the user'"'"'s postal zip code is present in the list of valid postal zip codes for a geographical location.
-
10. The method of claim 1, wherein at least some of the information includes a driver license number related information.
-
11. The method of claim 10, wherein the record of known data is a list of valid driver license numbers for a geographical location, further comprising ensuring that the user'"'"'s driver license number is present in the list of valid driver license numbers for a geographical location.
-
12. The method of claim 1, wherein the record of known data is a credit card fraud statistical model.
-
13. A system for authenticating a user on a network, said the system comprising:
-
a server capable of being accessed through the network from at least one user input device, wherein said server includes (a) a computer-readable memory, the computer-readable memory having a plurality of software modules, which enable said server to preprocess an input received from said at least one input device before performing an authentication of the user, (b) at least one input device for receiving the input from said at least one user input device, the input comprising information stored in a plurality of fields relating to identification of the user;
(c) a processor capable of preprocessing at least some of the information for reliability, including performing at least one task selected from the group of tasks consisting of (1) checking format of at least some of the information;
(2) comparing at least some of the information against a record of known data; and
(3) ensuring that at least some of the information is present in the record of known data; and
if the preprocessing is successful, performing authentication based on the input by comparing at least some of the information against a database comprising a record of the user'"'"'s credit history as compiled from a plurality of the user'"'"'s creditors.- View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A method for authenticating a user of a network based on response received from the user, said method comprising:
-
(a) soliciting from the user information related to a credit file;
(b) receiving the response from the user, the response comprising data stored in a plurality of fields;
(c) preprocessing at least some of the data for reliability, including performing at least one task selected from the group of tasks consisting of (1) checking format of at least some of the information;
(2) comparing at least some of the information against a record of known data; and
(3) ensuring that at least some of the information is present in the record of known data;
(d) if the preprocessing is successful, comparing at least some of the data against information in the credit file; and
(e) determining whether the user should be authenticated based on the result from step (d). - View Dependent Claims (27, 28, 29)
(f) prompting a multiple-choice question to the user. -
28. The method of claim 27, wherein there is only one correct answer for the multiple-choice question.
-
29. The method of claim 26 further comprising:
(g) if checking format returns failure, performing at least one task selected from the group of tasks consisting of (1) prompting the user to reenter the information; and
(2) correcting the information to conform to the format.
-
Specification