×

System and method for risk based authentication

  • US 8,572,391 B2
  • Filed: 09/13/2004
  • Issued: 10/29/2013
  • Est. Priority Date: 09/12/2003
  • Status: Active Grant
First Claim
Patent Images

1. A method performed by a computer processor of a risk based authentication server, the method comprising:

  • receiving, from an online transaction server which has performed a first authentication operation to successfully authenticate a party using a remote user computer, user identification data which identifies the party using the remote user computer, the computer processor of the risk based authentication server being separate from the online transaction server and communicating with the online transaction server through an interface;

    receiving, from the online transaction server, a risk assessment request including transaction information obtained from the party using the user computer in response to a request to perform a transaction;

    assessing, by the computer processor, the risk level of the transaction based on the user identification data and the transaction information of the risk assessment request;

    based on the risk level, setting a level of authentication for the transaction,wherein assessing the risk level of the transaction includes at least evaluating based on at least one circumstance of the requested transaction the probability that the party requesting the transaction is not a person identified by the user identification data,wherein said at least one circumstance of the requested transaction is selected from;

    an identity of the user computer, a time of the transaction request, and a geographical location of the user computer;

    determining based on the level of authentication a set of one or more additional authentication details required of the party requesting the transaction, said one or more additional authentication details being different from the user identification data;

    requesting the determined set of additional authentication details from the party through the online transaction server via a web-based exchange with the party using the user computer;

    receiving from the party responses to the request for the determined set of additional authentication details through the online transaction server via the web-based exchange with the party using the user computer; and

    based on said party'"'"'s responses to the request for the determined set of additional authentication details, performing a second authentication operation by the computer processor of the risk based authentication server which is separate from the online transaction server that has performed the first authentication operation and which communicates with the online transaction server through the interface, the second authentication operation determining whether to output a successful authentication result from the risk based authentication server to the online transaction server to allow the online transaction server to perform the transaction.

View all claims
  • 14 Assignments
Timeline View
Assignment View
    ×
    ×