×

Methods and systems for authentication

  • US 7,853,984 B2
  • Filed: 12/10/2003
  • Issued: 12/14/2010
  • Est. Priority Date: 12/11/2002
  • Status: Active Grant
First Claim
Patent Images

1. A method of authenticating a user on a computer network, the method comprising:

  • based on identity information received from the user over the computer network, accessing at least one data source to retrieve data associated with the user,comparing, using the computing device, the retrieved data against a listing of possible questions associated with the retrieved data to determine associations between the retrieved data and the listing of possible questions,based on a ranking of the listing of possible questions, formulating at least one question set using questions within the listing of possible questions for which retrieved data is available, where each of the at least one question set includes at least two different questions,causing at least some of the questions from the at least one question set to be presented to the user, and,based on responses to the questions from the user, determining, using the computing device, whether the user is authenticated, according to a total authentication point value;

    wherein determining includes at least determining, based on a response to one question from the at least one question set, that the response is a partially correct response to that one question;

    wherein a correct response is a value between a first minimum threshold value and a first maximum threshold value, and the partially correct response is a value;

    a) that is not between the first minimum threshold value and the first maximum threshold value, andb) that is between a second minimum threshold value and a second maximum threshold value;

    wherein the second minimum threshold value is less than the first minimum threshold value, and the second maximum threshold value is greater than the first maximum threshold value;

    awarding points to the partially correct response, wherein the points are based on a multiplier that is configured for a partially correct response;

    wherein the multiplier for a partially correct response is different than a multiplier that is configured for a correct response;

    determining that the user is authenticated when the total authentication point value exceeds a predetermined total.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×