User authentication system and methods thereof
First Claim
1. A system authenticating users, comprising:
- a programmed processorgenerating authentication rules for defining configuration parameters for a user authentication process, based upon specifying a configuration parameter for one or more authentication sub-processes of information validation, fraud detection or identity verification, for one or more data sources, or for one or more authentication factors, or any combinations thereof, according to input user authentication process creation information,authenticating users according to the authentication rules responsive to user authentication requests, andconfiguring the authentication rules in real-time, thereby allowing real-time authentication process customization in the system.
3 Assignments
0 Petitions
Accused Products
Abstract
A computer system to authenticate users of vendors supplying services and/or products to the users, the system having programmed processors providing authentication rules, authenticating users according to the authentication rules responsive to user authentication requests, configuring the authentication rules in real-time, thereby allowing real-time customization of the system, providing multi-factor user authentication processes, using any data sources providing information about and/or known to the users to authenticate the users, thereby providing a data agnostic system, and authentication strategies correspond to the authentication rules, thereby allowing the system to support authentication strategy experimentation.
-
Citations
83 Claims
-
1. A system authenticating users, comprising:
a programmed processor generating authentication rules for defining configuration parameters for a user authentication process, based upon specifying a configuration parameter for one or more authentication sub-processes of information validation, fraud detection or identity verification, for one or more data sources, or for one or more authentication factors, or any combinations thereof, according to input user authentication process creation information, authenticating users according to the authentication rules responsive to user authentication requests, and configuring the authentication rules in real-time, thereby allowing real-time authentication process customization in the system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 23, 24, 25, 26, 27, 28, 29, 30, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 71, 73, 74, 75, 76, 77, 78, 79, 80, 81)
-
22. The system of 21, wherein the user real-time information is based upon user facial patterns, mannerisms, body movements, perspiration levels, anxiety levels, emotions, mental data, voice distress data, or polygraph data, or any combinations thereof.
-
31. The system of 29, wherein the user authentication questions are grouped according to a common association of the questions in each group.
-
65. A system authenticating users, comprising a programmed processor
generating authentication rules for defining configuration parameters for a user authentication process, based upon specifying a configuration parameter for one or more authentication sub-processes of information validation, fraud detection or identity verification, for one or more data sources, or for one or more authentication factors, or any combinations thereof, according to input user authentication process creation information; - and
generating user authentication examinations using any data sources, which provide information about, information known, or both to a user, according to the authentication rules, thereby providing a data agnostic system. - View Dependent Claims (66, 67)
- and
-
68. An apparatus, comprising:
a programmed processor generating authentication rules for defining configuration parameters for a user authentication process, based upon specifying a configuration parameter for one or more authentication sub-processes of information validation, fraud detection or identity verification, for one or more data sources, or for one or more authentication factors, or any combinations thereof, according to input user authentication process creation information; and generating multi-factor authentication examinations to authenticate users, based upon the generated authentication rules. - View Dependent Claims (69)
-
70. A system authenticating users, comprising:
a programmed processor generating authentication rules that correspond to authentication strategies for defining configuration parameters for a user authentication process, based upon specifying a configuration parameter for one or more authentication sub-processes of information validation, fraud detection or identity verification, for one or more data sources, or for one or more authentication factors, or any combinations thereof, according to input user authentication process creation information; aggregating performance data of the authentication rules; and modifying the strategies responsive to the performance data, thereby optimizing the system responsive to the performance data.
-
72. A system authenticating users, comprising:
-
an authentication rule designer generating authentication rules for defining configuration parameters for a user authentication process, based upon specifying a configuration parameter for one or more authentication sub-processes of information validation, fraud detection or identity verification, for one or more data sources, or for one or more authentication factors, or any combinations thereof, according to real-time input authentication process configuration parameter information, thereby customizing the system in real-time; and an authentication engine generating an authentication examination according to the authentication rules for authenticating the user.
-
-
82. A system authenticating users, comprising:
-
authentication rules means for generating configurable authentication rules defining configuration parameters for a user authentication process, based upon specifying a configuration parameter for one or more authentication sub-processes of information validation, fraud detection or identity verification, for one or more data sources, or for one or more authentication factors, or any combinations thereof, according to input user authentication process creation information; and data agnostic authentication means for generating authentication examinations for authentication of users based upon the configuration parameter for the data sources.
-
-
83. A system authenticating a user, comprising:
-
authentication rules means for generating configurable authentication rules defining configuration parameters for a user authentication process, based upon specifying a configuration parameter for one or more authentication sub-processes of information validation, fraud detection or identity verification, for one or more data sources, or for one or more authentication factors, or any combinations thereof, according to input user authentication process creation information; and multi-factor authentication means for generating multi-factor authentication examinations authenticating the user based upon two or more authentication factors, according to the authentication rules.
-
Specification