Modifiable authentication levels in authentication systems for transactions
DCFirst Claim
Patent Images
1. A method comprising:
- receiving, at a processing device, a first request for a transaction from a communications device, the first request comprising information of a customer to be authenticated and a price of a product or service to be purchased by the customer;
setting, using the processing device, an authentication level based on the price;
transmitting, from the processing device, a second request for identification information of the customer to a mobile communications device of the customer;
receiving, at the processing device, the identification information from the mobile communications device in response to the second request;
generating authentication information at the processing device; and
transmitting, from the processing device, the authentication information to the communications device in response to the first request.
6 Assignments
Litigations
0 Petitions
Accused Products
Abstract
A system and method are provided for authentication. A first request for a transaction is received from a communications device, the first request comprising collation information of a customer to be authenticated and a price of a product or service to be purchased by the customer. An authentication level is set based on the price. A second request is transmitted to a mobile communications device of the customer. Authentication information is received from the mobile communications device, the authentication information comprising identification information of the customer. The authentication information is transmitted to the communications device.
61 Citations
20 Claims
-
1. A method comprising:
-
receiving, at a processing device, a first request for a transaction from a communications device, the first request comprising information of a customer to be authenticated and a price of a product or service to be purchased by the customer; setting, using the processing device, an authentication level based on the price; transmitting, from the processing device, a second request for identification information of the customer to a mobile communications device of the customer; receiving, at the processing device, the identification information from the mobile communications device in response to the second request; generating authentication information at the processing device; and transmitting, from the processing device, the authentication information to the communications device in response to the first request. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method comprising:
-
receiving, at a host computer, a first request for a transaction from a communications terminal, the first request comprising information of a customer to be authenticated and information identifying a parameter of the transaction; setting an authentication level based on the parameter of the transaction; transmitting, from the host computer, a second request for identification information of the customer to a mobile communications device of the customer; receiving, at the host computer, the identification information from the mobile communications device in response to the second request; generating authentication information at the host computer; and transmitting, from the host computer, the authentication information to the communications terminal in response to the first request. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage device having instructions stored thereon that, upon execution by a host device, cause the host device to perform operations comprising:
-
receiving a first request for a transaction from a communications device, the first request comprising information of a customer to be authenticated and information identifying a price of a product or service to be purchased in the transaction; setting an authentication level based on the price of the transaction; transmitting a second request for identification information of the customer to a mobile communications device of the customer; receiving the identification information from the mobile communications device in response to the second request; generating authentication information at the processing device; and transmitting the authentication information to the communications device in response to the first request. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification