Method and apparatus for enabling a user to select an authentication method
First Claim
1. A method comprising:
- checking, by a computer-based system for determining a minimum security level for authentication, for a cookie residing on a user computing unit, wherein the host computer reads the preference set in the cookie;
identifying a user, by the computer-based system, in response to the preference set including information regarding the minimum level of security for authentication of the user;
enabling, by the computer-based system, the user to register with the host and select an authentication method in response to the preference set not including information regarding the minimum level of security for authentication of the user;
allowing, by the computer-based system, a change from at least one of a first authentication method or a second authentication method to a third authentication method from a plurality of methods of authentication, without accessing a first restricted service or a second restricted service, respectively, wherein the first method of authentication is associated with the first restricted service, and wherein the second method of authentication is associated with the second restricted service;
receiving, by the computer-based system, a request for access to at least one of the first restricted service or the second restricted service; and
granting, by the computer-based system, access to at least one of the first restricted service in response to receiving predetermined input associated with the first method of authentication or the second restricted service in response to receiving predetermined input associated with the second method of authentication.
5 Assignments
0 Petitions
Accused Products
Abstract
The present invention facilitates access to a restricted service related to secure transactions via a network. The present invention allows a user to select a minimum security level of authentication for its own login to a restricted service. The user'"'"'s selected minimum security level of authentication may be registered in an authentication method system, so that the user must use the selected minimum security level for authentication in order to gain access to the restricted service. Alternatively, the user may specify that the selected minimum security level for authentication may be over-turned by the user, or optionally re-set to a new authentication method depending on the needs of the user. As such, the present invention allows the user the flexibility to select its own authentication method for accessing a restricted service.
-
Citations
19 Claims
-
1. A method comprising:
-
checking, by a computer-based system for determining a minimum security level for authentication, for a cookie residing on a user computing unit, wherein the host computer reads the preference set in the cookie; identifying a user, by the computer-based system, in response to the preference set including information regarding the minimum level of security for authentication of the user; enabling, by the computer-based system, the user to register with the host and select an authentication method in response to the preference set not including information regarding the minimum level of security for authentication of the user; allowing, by the computer-based system, a change from at least one of a first authentication method or a second authentication method to a third authentication method from a plurality of methods of authentication, without accessing a first restricted service or a second restricted service, respectively, wherein the first method of authentication is associated with the first restricted service, and wherein the second method of authentication is associated with the second restricted service; receiving, by the computer-based system, a request for access to at least one of the first restricted service or the second restricted service; and granting, by the computer-based system, access to at least one of the first restricted service in response to receiving predetermined input associated with the first method of authentication or the second restricted service in response to receiving predetermined input associated with the second method of authentication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. An article of manufacture including a non-transitory, tangible computer readable storage medium having instructions stored thereon that, in response to execution by a computer-based system for determining a minimum security level for authentication, cause the computer-based system to perform operations comprising:
-
checking, by the computer-based system, for a cookie residing on a user computing unit, wherein the host computer reads the preference set in the cookie; identifying a user, by the computer-based system, in response to the preference set including information regarding the minimum level of security for authentication of the user; enabling, by the computer-based system, the user to register with the host and select an authentication method in response to the preference set not including information regarding the minimum level of security for authentication of the user; allowing, by the computer-based system, a change from at least one of a first authentication method or a second authentication method to a third authentication method from a plurality of methods of authentication, without accessing a first restricted service or a second restricted service, respectively, wherein the first method of authentication is associated with the first restricted service, and wherein the second method of authentication is associated with the second restricted service; receiving, by the computer-based system, a request for access to at least one of the first restricted service or the second restricted service; and granting, by the computer-based system, access to at least one of the first restricted service in response to receiving predetermined input associated with the first method of authentication or the second restricted service in response to receiving predetermined input associated with the second method of authentication.
-
-
19. A system comprising:
-
a processor for determining a minimum security level for authentication, a tangible, non-transitory memory configured to communicate with the processor, the tangible, non-transitory memory having instructions stored thereon that, in response to execution by the processor, cause the processor to perform operations comprising; checking, by the processor, for a cookie residing on a user computing unit, wherein the host computer reads the preference set in the cookie; identifying a user, by the processor, in response to the preference set including information regarding the minimum level of security for authentication of the user; enabling, by the processor, the user to register with the host and select an authentication method in response to the preference set not including information regarding the minimum level of security for authentication of the user; allowing, by the processor, a change from at least one of a first authentication method or a second authentication method to a third authentication method from a plurality of methods of authentication, without accessing a first restricted service or a second restricted service, respectively, wherein the first method of authentication is associated with the first restricted service, and wherein the second method of authentication is associated with the second restricted service; receiving, by the processor, a request for access to at least one of the first restricted service or the second restricted service; and granting, by the processor, access to at least one of the first restricted service in response to receiving predetermined input associated with the first method of authentication or the second restricted service in response to receiving predetermined input associated with the second method of authentication.
-
Specification