Authentication system and method
First Claim
1. A customer authentication computing system for authenticating a customer making a request related to a customer account of a financial institution, the customer authentication computing system comprising:
- at least one computer processor executing multiple applications for receiving customer requests and collecting customer data for customers of a financial institution each having at least one customer account, and the customer requests being input to the financial institution through multiple channels coupled to the at least one computer processor executing multiple applications for processing customer requests;
a central authentication computing system comprising at least one processor programmed to at least perform the following operations;
receiving the customer requests and customer data from the at least one computer processor executing the multiple applications;
determining, based on authentication policy, whether the collected customer data is sufficient to authenticate each customer in order to fulfill the customer request, the collected customer data including at least customer data processed at the multiple applications;
extracting, using a risk assessment engine, information from at least one information source to determine a customer risk level, the extracted information includes customer account activity located in a customer profile; and
returning conclusions to the at least one computer processor executing the multiple applications; and
a fraud policy computing system, the fraud policy computing system using at least one processor to centrally manage at least one authentication policy implemented by the central authentication computing system.
1 Assignment
0 Petitions
Accused Products
Abstract
Aspects of the invention relate to a customer authentication system for authenticating a customer making a request related to a customer account. The customer authentication system may include multiple application level data receiving and processing mechanisms for receiving customer requests and collecting customer data. The customer authentication system may additionally include a central authentication system for receiving the customer requests and customer data from the multiple application level data receiving and processing mechanisms, the central authentication system determining, based on authentication policy, whether the collected customer data is sufficient to authenticate each customer in order to fulfill the customer request. The central authentication system may return its conclusions and instructions to the multiple application level data receiving and processing mechanisms. The customer authentication system may additionally include a fraud policy system for centrally managing authentication policy implemented by the central authentication system.
-
Citations
16 Claims
-
1. A customer authentication computing system for authenticating a customer making a request related to a customer account of a financial institution, the customer authentication computing system comprising:
-
at least one computer processor executing multiple applications for receiving customer requests and collecting customer data for customers of a financial institution each having at least one customer account, and the customer requests being input to the financial institution through multiple channels coupled to the at least one computer processor executing multiple applications for processing customer requests; a central authentication computing system comprising at least one processor programmed to at least perform the following operations; receiving the customer requests and customer data from the at least one computer processor executing the multiple applications; determining, based on authentication policy, whether the collected customer data is sufficient to authenticate each customer in order to fulfill the customer request, the collected customer data including at least customer data processed at the multiple applications; extracting, using a risk assessment engine, information from at least one information source to determine a customer risk level, the extracted information includes customer account activity located in a customer profile; and returning conclusions to the at least one computer processor executing the multiple applications; and a fraud policy computing system, the fraud policy computing system using at least one processor to centrally manage at least one authentication policy implemented by the central authentication computing system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-implemented method for authenticating customers of a financial institution making requests related to customer accounts with the financial institution, each customer making a request through any one of multiple channels providing multiple inputs for requests to the financial institution, each request received by one of multiple processing applications for processing customer requests, the multiple processing applications collecting and processing customer data, the method comprising:
-
transmitting, using computer processing components, the customer request and processed customer data from each processing application to a central authentication computing system; assessing, at a risk assessment engine a level of risk associated with each customer by extracting information from at least one information source, said extracting includes; accessing a customer profile for each customer, the customer profile including customer activity processed at the multiple processing applications conducted through the multiple channels; determining, based on the level of risk, whether additional customer data is required in order to authenticate each customer; and passing each determination back to each transmitting application. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
Specification