Method and apparatus for enabling a user to select an authentication method
First Claim
1. A method comprising:
- receiving, by a computer-based system for facilitating selection of an authentication method and via a web server, data in connection with a user, wherein the data includes information regarding a first user selected authentication method for accessing a restricted service;
transmitting, by the computer-based system, the data having information regarding the first user selected authentication method from the web server to a security server and an application server;
registering, by the computer-based system, the first user selected authentication method by transmitting the data from the application server to a database server; and
allowing, by the computer-based system, a change from the first user selected authentication method to a second authentication method, without accessing a first restricted service or a second restricted service, respectively, wherein the first user selected authentication method is associated with the first restricted service, and wherein the second authentication method is associated with the second restricted service.
5 Assignments
0 Petitions
Accused Products
Abstract
The present invention facilitates access to a restricted service related to secure transactions via a network. The present invention allows a user to select a minimum security level of authentication for its own login to a restricted service. The user'"'"'s selected minimum security level of authentication may be registered in an authentication method system, so that the user must use the selected minimum security level for authentication in order to gain access to the restricted service. Alternatively, the user may specify that the selected minimum security level for authentication may be over-turned by the user, or optionally re-set to a new authentication method depending on the needs of the user. As such, the present invention allows the user the flexibility to select its own authentication method for accessing a restricted service.
64 Citations
19 Claims
-
1. A method comprising:
-
receiving, by a computer-based system for facilitating selection of an authentication method and via a web server, data in connection with a user, wherein the data includes information regarding a first user selected authentication method for accessing a restricted service; transmitting, by the computer-based system, the data having information regarding the first user selected authentication method from the web server to a security server and an application server; registering, by the computer-based system, the first user selected authentication method by transmitting the data from the application server to a database server; and allowing, by the computer-based system, a change from the first user selected authentication method to a second authentication method, without accessing a first restricted service or a second restricted service, respectively, wherein the first user selected authentication method is associated with the first restricted service, and wherein the second authentication method is associated with the second restricted service. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. An article of manufacture including a non-transitory, tangible computer readable storage medium having instructions stored thereon that, in response to execution by a computer-based system for facilitating selection of an authentication method, cause the computer-based system to perform operations comprising:
-
receiving, by the computer-based system and via a web server, data in connection with a user, wherein the data includes information regarding a first user selected authentication method for accessing a restricted service; transmitting, by the computer-based system, the data having information regarding the first user selected authentication method from the web server to a security server and an application server; registering, by the computer-based system, the first user selected authentication method by transmitting the data from the application server to a database server; and allowing, by the computer-based system, a change from the first user selected authentication method to a second authentication method, without accessing a first restricted service or a second restricted service, respectively, wherein the first user selected authentication method is associated with the first restricted service, and wherein the second authentication method is associated with the second restricted service.
-
-
19. A system comprising:
-
a processor for facilitating selection of an authentication method, a tangible, non-transitory memory configured to communicate with the processor, the tangible, non-transitory memory having instructions stored thereon that, in response to execution by the processor, cause the processor to perform operations comprising; receiving, by the processor and via a web server, data in connection with a user, wherein the data includes information regarding a first user selected authentication method for accessing a restricted service; transmitting, by the processor, the data having information regarding the first user selected authentication method from the web server to a security server and an application server; registering, by the processor, the first user selected authentication method by transmitting the data from the application server to a database server; and allowing, by the processor, a change from the first user selected authentication method to a second authentication method, without accessing a first restricted service or a second restricted service, respectively, wherein the first user selected authentication method is associated with the first restricted service, and wherein the second authentication method is associated with the second restricted service.
-
Specification