Method and apparatus for enabling a user to select an authentication method
First Claim
1. A method for configuring a method of authentication for accessing a restricted service, comprising:
- receiving, by a microprocessor for configuring the method of authentication and from a user via a communication network, a selection of a first method of authentication, from a plurality of methods of authentication presented by a restricted service provider, for access to a first restricted service provided by the restricted service provider, the first restricted service being associated with an account of the user;
storing, by the microprocessor and in a database, the first method of authentication in association with the first restricted service and the account of the user;
receiving, by the microprocessor and from the user via the communication network, a selection of a second method of authentication, from the plurality of methods of authentication, for access to a second restricted service provided by the restricted service provider, the second restricted service being associated with the account of the user;
storing, by the microprocessor and in the database, the second method of authentication in association with the second restricted service and the account of the user;
allowing, by the microprocessor and from the user via the communication network, a change to at least one of the first authentication method or the second authentication method without accessing the first restricted service or the second restricted service, respectively, to a third authentication method, from the plurality of methods of authentication;
receiving, by the microprocessor and over the communication network, a request for access to at least one of the first restricted service and the second restricted service;
causing, by the microprocessor, a user interface to display input fields corresponding to the first method of authentication if the request is associated with the first restricted service;
causing, by the microprocessor, the user interface to display input fields corresponding to the second method of authentication if the request is associated with the second restricted service;
granting, by the microprocessor, access to the first restricted service in response to receiving predetermined input associated with the first method of authentication; and
granting, by the microprocessor, access to the second restricted service in response to receiving predetermined input associated with the second method of authentication.
5 Assignments
0 Petitions
Accused Products
Abstract
The present invention facilitates access to a restricted service related to secure transactions via a network. The present invention allows a user to select a minimum security level of authentication for its own login to a restricted service. The user'"'"'s selected minimum security level of authentication may be registered in an authentication method system, so that the user must use the selected minimum security level for authentication in order to gain access to the restricted service. Alternatively, the user may specify that the selected minimum security level for authentication may be over-turned by the user, or optionally re-set to a new authentication method depending on the needs of the user. As such, the present invention allows the user the flexibility to select its own authentication method for accessing a restricted service.
118 Citations
18 Claims
-
1. A method for configuring a method of authentication for accessing a restricted service, comprising:
-
receiving, by a microprocessor for configuring the method of authentication and from a user via a communication network, a selection of a first method of authentication, from a plurality of methods of authentication presented by a restricted service provider, for access to a first restricted service provided by the restricted service provider, the first restricted service being associated with an account of the user; storing, by the microprocessor and in a database, the first method of authentication in association with the first restricted service and the account of the user; receiving, by the microprocessor and from the user via the communication network, a selection of a second method of authentication, from the plurality of methods of authentication, for access to a second restricted service provided by the restricted service provider, the second restricted service being associated with the account of the user; storing, by the microprocessor and in the database, the second method of authentication in association with the second restricted service and the account of the user; allowing, by the microprocessor and from the user via the communication network, a change to at least one of the first authentication method or the second authentication method without accessing the first restricted service or the second restricted service, respectively, to a third authentication method, from the plurality of methods of authentication; receiving, by the microprocessor and over the communication network, a request for access to at least one of the first restricted service and the second restricted service; causing, by the microprocessor, a user interface to display input fields corresponding to the first method of authentication if the request is associated with the first restricted service; causing, by the microprocessor, the user interface to display input fields corresponding to the second method of authentication if the request is associated with the second restricted service; granting, by the microprocessor, access to the first restricted service in response to receiving predetermined input associated with the first method of authentication; and granting, by the microprocessor, access to the second restricted service in response to receiving predetermined input associated with the second method of authentication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for configuring a minimum level of security for accessing a restricted service, comprising:
-
presenting, by a microprocessor for configuring a minimum level of security, a query dialog box to a user to query the user to select at least one level of security, from a plurality of levels of security presented by a restricted service provider, for access a first restricted service provided by the restricted service provider, the first restricted service being associated with an account of the user; receiving, by the microprocessor and from the user via the query dialog box over a communication network, a selection of a first level of security, from the plurality of levels of security, for access to the first restricted service; storing, by the microprocessor and in a database, the first level of security in association with the first restricted service and the account of the user; receiving, by the microprocessor and from the user via the communication network, a selection of a second level of security, from the plurality of levels of security, for access to a second restricted service provided by the restricted service provider, the second restricted service being associated with the account of the user; storing, by the microprocessor and in the database, the second level of security in association with the second restricted service and the account of the user; allowing, by the microprocessor and from the user via the communication network, a change to at least one of the first authentication method or the second authentication method without accessing the first restricted service or the second restricted service, respectively, to a third authentication method, from the plurality of methods of authentication; receiving, by the microprocessor and over the communication network, a request for access to at least one of the first restricted service and the second restricted service; causing, by the microprocessor, a user interface to display input fields corresponding to the first level of security if the request is associated with the first restricted service; causing, by the microprocessor, the user interface to display input fields corresponding to the second level of security if the request is associated with the second restricted service; granting, by the microprocessor, access to the first restricted service in response to receiving predetermined input associated with the first level of security; and granting, by the microprocessor, access to the second restricted service in response to receiving predetermined input associated with the second level of security. - View Dependent Claims (11, 12)
-
-
13. A non-transitory tangible computer-readable storage medium having stored thereon sequences of instructions, the sequences of instructions including instructions which, when executed by a computer system for configuring a method of authentication, cause the computer system to perform:
-
receiving, by the computer system and from a user via a communication network, a selection of a first method of authentication, from a plurality of methods of authentication presented by a restricted service provider, for access to a first restricted service provided by the restricted service provider, the first restricted service being associated with an account of the user; storing, by the computer system and in a database, the first method of authentication in association with the first restricted service and the account of the user; receiving, by the computer system and from the user via the communication network, a selection of a second method of authentication, from the plurality of methods of authentication, for access to a second restricted service provided by the restricted service provider, the second restricted service being associated with the account of the user; storing, by the computer system and in the database, the second method of authentication in association with the second restricted service and the account of the user; allowing, by the computer system and from the user via the communication network, a change to at least one of the first authentication method or the second authentication method without accessing the first restricted service or the second restricted service, respectively, to a third authentication method, from the plurality of methods of authentication; receiving, by the computer system and over the communication network, a request for access to at least one of the first restricted service and the second restricted service; causing, by the computer system, a user interface to display input fields corresponding to the first method of authentication if the request is associated with the first restricted service; causing, by the computer system, the user interface to display input fields corresponding to the second method of authentication if the request is associated with the second restricted service; granting, by the computer system, access to the first restricted service upon receiving predetermined input associated with the first method of authentication; and granting, by the computer system, access to the second restricted service upon receiving predetermined input associated with the second method of authentication.
-
-
14. A non-transitory tangible computer-readable storage medium having stored thereon sequences of instructions, the sequences of instructions including instructions which, when executed by a computer system for configuring a method of authentication, cause the computer system to perform:
-
presenting, by the computer system, a query dialog box to a user to query the user to select at least one level of security, from a plurality of levels of security presented by a restricted service provider, for access to a first restricted service provided by the restricted service provider, the first restricted service being associated with an account of the user; receiving, by the computer system and from the user via the query dialog box over a communication network, a selection of a first level of security, from a plurality of levels of security, for access to the first restricted service; storing, by the computer system and in a database, the first level of security in association with the first restricted service and the account of the user; receiving, by the computer system and from the user via the communication network, a selection of a second level of security, from the plurality of levels of security, for access to a second restricted service provided by the restricted service provider, the second restricted service being associated with the account of the user; storing, by the computer system and in the database, the second level of security in association with the second restricted service and the account of the user; allowing, by the computer system and from the user via the communication network, a change to at least one of the first authentication method or the second authentication method without accessing the first restricted service or the second restricted service, respectively, to a third authentication method, from the plurality of methods of authentication; receiving, by the computer system and over the communication network, a request for access to at least one of the first restricted service and the second restricted service; causing, by the computer system, a user interface to display input fields corresponding to the first level of security if the request is associated with the first restricted service; causing, by the computer system, the user interface to display input fields corresponding to the second level of security if the request is associated with the second restricted service; granting, by the computer system, access to the first restricted service upon receiving predetermined input associated with the first level of security; and granting, by the computer system, access to the second restricted service upon receiving predetermined input associated with the second level of security.
-
-
15. An authentication system comprising a microprocessor for configuring at least one method of authentication for accessing a restricted service and a memory storing a program executable by the microprocessor, wherein the program includes computer code for implementing a method, wherein the method includes:
-
receiving, by the microprocessor and from a user via a communication network, a selection of a first method of authentication, from a plurality of methods of authentication presented by a restricted services provider, for access to a first restricted service provided by the restricted service provider, the first restricted service being associated with an account of the user; storing, by the microprocessor and in a database, the first method of authentication in association with the first restricted service and the account of the user; receiving, by the microprocessor and from the user via the communication network, a selection of a second method of authentication, from the plurality of methods of authentication, for access to a second restricted service provided by the restricted service provider, the second restricted service being associated with the account of the user; storing, by the microprocessor and in the database, the second method of authentication in association with the second restricted service and the account of the user; allowing, by the microprocessor and from the user via the communication network, a change to at least one of the first authentication method or the second authentication method without accessing the first restricted service or the second restricted service, respectively, to a third authentication method, from the plurality of methods of authentication; receiving, by the microprocessor and over the communication network, a request for access to at least one of the first restricted service and the second restricted service; causing, by the microprocessor, a user interface to display input fields corresponding to the first method of authentication if the request is associated with the first restricted service; causing, by the microprocessor, the user interface to display input fields corresponding to the second method of authentication if the request is associated with the second restricted service; granting, by the microprocessor, access to the first restricted service upon receiving predetermined input associated with the first method of authentication; and granting, by the microprocessor, access to the second restricted service upon receiving predetermined input associated with the second method of authentication. - View Dependent Claims (16)
-
-
17. An authentication system comprising a microprocessor for implementing a method for configuring a minimum level of security for accessing a restricted service and a memory storing a program executable by the processor, wherein the program includes computer code, wherein the method includes:
-
presenting, by the microprocessor, a query dialog box to a user to query the user to select at least one level of security, from a plurality of levels of security presented by a restricted services provider, for access to system a first restricted service provided by the restricted service provider, the first restricted service being associated with an account of the user; receiving, by the microprocessor and from the user via the query dialog box over a communication network, a selection of a first level of security, from the plurality of levels of security, for access to the first restricted service; storing, by the microprocessor and in a database, the first level of security in association with the first restricted service and the account of the user; receiving, by the microprocessor and from the user via the communication network, a selection of a second level of security, from the plurality of levels of security, for access to a second restricted service provided by the restricted service provider, the second restricted service being associated with the account of the user; storing, by the microprocessor and in the database, the second level of security in association with the second restricted service and the account of the user; allowing, by the microprocessor and from the user via the communication network, a change to at least one of the first authentication method or the second authentication method without accessing the first restricted service or the second restricted service, respectively, to a third authentication method, from the plurality of methods of authentication; receiving, by the microprocessor and over the communication network, a request for access to at least one of the first restricted service and the second restricted service; causing, by the microprocessor, a user interface to display input fields corresponding to the first level of security if the request is associated with the first restricted service; causing, by the microprocessor, the user interface to display input fields corresponding to the second level of security if the request is associated with the second restricted service; granting, by the microprocessor, access to the first restricted service upon receiving predetermined input associated with the first level of security; and granting, by the microprocessor, access to the second restricted service upon receiving predetermined input associated with the second level of security. - View Dependent Claims (18)
-
Specification