System and method for authentication of network users
First Claim
1. A method for authenticating a user'"'"'s identity interactively in real time, wherein the method checks a user'"'"'s information against a credit file, the method comprising:
- (a) receiving a first type of information from the user, wherein the first type of information is wallet type information;
(b) formulating and presenting to the user, in real time, a query based on the first type of information received and upon information located in a credit file, the credit file containing credit-related information from a plurality of the user'"'"'s creditors;
(c) receiving a response to the query from the user in real time;
(d) comparing the response to information in the user'"'"'s credit file, in real time, to authenticate the user'"'"'s identity; and
(e) allowing the user to access a predetermined transaction, in real time, only if the user'"'"'s identity is authenticated.
1 Assignment
0 Petitions
Accused Products
Abstract
A network authentication system provides verification of the identity or other attributes of a network user to conduct a transaction, access data or avail themselves of other resources. The user is presented with a hierarchy of queries based on wallet-type (basic identification) and non-wallet type (more private) information designed to ensure the identity of the user and prevent fraud, false negatives and other undesirable results. A preprocessing stage may be employed to ensure correct formatting of the input information and clean up routine mistakes (such as missing digits, typos, etc.) that might otherwise halt the transaction. Queries can be presented in interactive, batch processed or other format. The authenticator can be configured to require differing levels of input or award differing levels of authentication according to security criteria.
376 Citations
31 Claims
-
1. A method for authenticating a user'"'"'s identity interactively in real time, wherein the method checks a user'"'"'s information against a credit file, the method comprising:
-
(a) receiving a first type of information from the user, wherein the first type of information is wallet type information; (b) formulating and presenting to the user, in real time, a query based on the first type of information received and upon information located in a credit file, the credit file containing credit-related information from a plurality of the user'"'"'s creditors; (c) receiving a response to the query from the user in real time; (d) comparing the response to information in the user'"'"'s credit file, in real time, to authenticate the user'"'"'s identity; and (e) allowing the user to access a predetermined transaction, in real time, only if the user'"'"'s identity is authenticated. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A method for interactively authenticating in real time an end user'"'"'s identity after the end user'"'"'s identity has been verified through use of a first type of information, wherein the first type of information is wallet type information and the method uses credit related information, the method comprising:
-
(a) receiving the first type of information; (b) formulating and presenting, in real time, a query based on the first type of information and the end user'"'"'s information retrieved from a credit file, the credit file containing credit-related information originating from a plurality of the end-user'"'"'s creditors; (c) receiving a response in real time; (d) comparing the response, in real time, to information in the credit file; and (e) providing an indication about the end user'"'"'s identity, in real time. - View Dependent Claims (26, 27)
-
-
28. A system for interactively authenticating in real time a user on a network, the system comprising:
-
an input interface for receiving interactive input from the user; a credit database containing at least one credit file about the user, the credit file containing information originating from a plurality of the user'"'"'s creditors; and a processor connected to the input interface and configured to; receive a first type of information from the user, wherein the first type of information is wallet type information; formulate and present to the user, in real time, a query based on the first type of information received; receive a response from the user in real time; compare the response with information in the credit database; and provide an indication about the user'"'"'s identity. - View Dependent Claims (29, 30, 31)
-
Specification