×

Method and apparatus for enabling a user to select an authentication method

  • US 7,941,669 B2
  • Filed: 12/27/2001
  • Issued: 05/10/2011
  • Est. Priority Date: 01/03/2001
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for configuring a method of authentication for accessing a restricted service, comprising:

  • receiving, by a microprocessor for configuring the method of authentication and from a user via a communication network, a selection of a first method of authentication, from a plurality of methods of authentication presented by a restricted service provider, for access to a first restricted service provided by the restricted service provider, the first restricted service being associated with an account of the user;

    storing, by the microprocessor and in a database, the first method of authentication in association with the first restricted service and the account of the user;

    receiving, by the microprocessor and from the user via the communication network, a selection of a second method of authentication, from the plurality of methods of authentication, for access to a second restricted service provided by the restricted service provider, the second restricted service being associated with the account of the user;

    storing, by the microprocessor and in the database, the second method of authentication in association with the second restricted service and the account of the user;

    allowing, by the microprocessor and from the user via the communication network, a change to at least one of the first authentication method or the second authentication method without accessing the first restricted service or the second restricted service, respectively, to a third authentication method, from the plurality of methods of authentication;

    receiving, by the microprocessor and over the communication network, a request for access to at least one of the first restricted service and the second restricted service;

    causing, by the microprocessor, a user interface to display input fields corresponding to the first method of authentication if the request is associated with the first restricted service;

    causing, by the microprocessor, the user interface to display input fields corresponding to the second method of authentication if the request is associated with the second restricted service;

    granting, by the microprocessor, access to the first restricted service in response to receiving predetermined input associated with the first method of authentication; and

    granting, by the microprocessor, access to the second restricted service in response to receiving predetermined input associated with the second method of authentication.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×