Method and system for implementing and managing an enterprise identity management for distributed security
First Claim
Patent Images
1. A method implemented by a computer for facilitating issuance of an identity associated with an account comprising:
- receiving at said computer, a request for said identity, wherein said identity is associated with an account;
determining, at said computer, authentication rules associated with said account, wherein authentication questions to be asked of a user are based upon said authentication rules;
issuing, by said computer, said identity to said user when at least a portion of said authentication questions are correctly answered;
monitoring, by said computer, changes in a relationship between said user and said identity over a period of time to periodically perform an automatic adjustment of said authentication questions upon a deterioration of said relationship, wherein said deterioration of said relationship is based upon user activity;
evaluating a current transaction of said user;
comparing said current transaction to previous transactions performed by said user; and
, assigning a positive weight for a similar transaction by said user.
7 Assignments
0 Petitions
Accused Products
Abstract
An Enterprise Identity Management system includes a registration component, an ownership component, and an audit component. The registration component is configured to associate a user ID with specific accounts that are accessible via a computer system. The ownership component is configured to verify the ownership of the accounts. The audit component is configured to perform periodic checks to ensure the validity of the association between the user ID and the ownership of the accounts.
-
Citations
5 Claims
-
1. A method implemented by a computer for facilitating issuance of an identity associated with an account comprising:
-
receiving at said computer, a request for said identity, wherein said identity is associated with an account; determining, at said computer, authentication rules associated with said account, wherein authentication questions to be asked of a user are based upon said authentication rules; issuing, by said computer, said identity to said user when at least a portion of said authentication questions are correctly answered; monitoring, by said computer, changes in a relationship between said user and said identity over a period of time to periodically perform an automatic adjustment of said authentication questions upon a deterioration of said relationship, wherein said deterioration of said relationship is based upon user activity; evaluating a current transaction of said user; comparing said current transaction to previous transactions performed by said user; and
, assigning a positive weight for a similar transaction by said user. - View Dependent Claims (2)
-
-
3. A method implemented by a computer for facilitating issuance of an identity associated with an account comprising:
-
receiving, at said computer, a request for said identity, wherein said identity is associated with an account; determining at said computer, authentication rules associated with said account, wherein authentication questions to be asked of a user are based upon said authentication rules; issuing, by said computer, said identity to said user when at least a portion of said authentication questions are correctly answered; monitoring, by said computer, changes in a relationship between said user and said identity over a period of time to periodically perform an automatic adjustment of said authentication questions upon a deterioration of said relationship, wherein said deterioration of said relationship is based upon user activity; assigning a positive weight for a successful transaction by said user on said account, wherein said successful transaction is based on security requirements of said account and risk factors relating to various transaction types associated with said account; assigning a negative weight for an unsuccessful transaction by said user on said account; and aggregating said positive and negative weights to determine a usage history of said user. - View Dependent Claims (4, 5)
-
Specification