Method and system for personalized online security
DCFirst Claim
1. A user-authentication service implemented as routines that execute one or more computer systems interconnected by two or more communications media with both an authentication-service client, and a user, the user-authentication service comprising:
- the one or more computer systems;
stored user-authentication policies specified by the user;
stored user information;
account interface routines that implement an account interface by which the user specifies, modifies, adds, and deletes user-authentication policies; and
authentication-interface routines that implement an authentication interface by which, following initiation of a transaction by the user with the authentication-service client, the authentication-service client submits an authentication request, through the first communications medium or through a second communications medium, to authenticate the user, the authentication-interface routines employing a variable-factor authentication, when specified to do so by stored user-authentication policies, to authenticate the user on behalf of the authentication-service client during which the user communicates with the user-authentication service through a third communications medium different from the first and second communications media and a user device different from that employed by the user to initiate the transaction with the authentication-service client.
2 Assignments
Litigations
1 Petition
Accused Products
Abstract
Various embodiments of the present invention provide strong authentication of users on behalf of commercial entities and other parties to electronic transactions. In these embodiments of the present invention, a user interacts with an authentication service provider to establish policies for subsequent authentication of the user. Thus, in these embodiments of the present invention, a user controls the level and complexity of authentication processes carried out by the authentication service provider on behalf of both the user and commercial entities and other entities seeking to authenticate the user in the course of conducting electronic transactions, electronic dialogues, and other interactions for which user authentication is needed. The policies specified by a user may include specification of variable-factor authentication, in which the user, during the course of an authentication, provides both secret information as well as evidence of control of a tangible object.
-
Citations
17 Claims
-
1. A user-authentication service implemented as routines that execute one or more computer systems interconnected by two or more communications media with both an authentication-service client, and a user, the user-authentication service comprising:
-
the one or more computer systems; stored user-authentication policies specified by the user; stored user information; account interface routines that implement an account interface by which the user specifies, modifies, adds, and deletes user-authentication policies; and authentication-interface routines that implement an authentication interface by which, following initiation of a transaction by the user with the authentication-service client, the authentication-service client submits an authentication request, through the first communications medium or through a second communications medium, to authenticate the user, the authentication-interface routines employing a variable-factor authentication, when specified to do so by stored user-authentication policies, to authenticate the user on behalf of the authentication-service client during which the user communicates with the user-authentication service through a third communications medium different from the first and second communications media and a user device different from that employed by the user to initiate the transaction with the authentication-service client. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for authenticating, by an authentication service, a user of the authentication service to an authentication-service client that communicates with the user of the authentication service through a first communications medium, the method comprising:
-
receiving user-identifying information from the authentication-service client; using the user-identifying information received from the authentication-service client to carry out an authentication procedure to authenticate the user of the authentication service by sending information to the user of the authentication service through a communications medium different from the first communications medium; and returning a authentication result to the authentication-service client. - View Dependent Claims (13, 14, 15, 16, 17)
-
Specification