Bank speech authentication
First Claim
1. A non-transitory computer readable medium storing thereon computer executable instructions for providing users access to an enterprise, comprising:
- at least one instruction that determines a number of inputs required for a user to access the enterprise, wherein the number of inputs required is;
defined by the user to set the level of security in said enterprise using a number of flags; and
based on a line of business that said user accesses;
at least one instruction that receives a first input from the number of inputs from said a user, wherein said first input, if successful, results in the accessing of a profile data on said user;
at least one instruction, triggered by the first input, that receives a second input from the number of inputs, different than the first input, from said user, wherein said second input is used for authenticating said user and providing said user with access to a first level in said enterprise, and the said authenticating second input is dependent upon a device through which said user is providing said second input; and
at least one instruction, triggered by the second input, that receives a third input from the number of inputs, different than the first and second inputs, for said user, wherein said third input is used for providing said user with access to a second level in said enterprise that is more restricted than said first level, and the said third input is dependent upon the device through which said user is providing said third input.
1 Assignment
0 Petitions
Accused Products
Abstract
Authentication mechanisms are disclosed herein that authenticate user access to enterprises. For example, either an enterprise associated number or a social security number (SSN) can be provided to the enterprise to enter a first level. Then, any one of a ZIP code number, a device calling/contacting number, a date of birth, and a portion of the SSN can be provided to access applications in the first level. Lastly, a PIN can be provided to enter a second level of the enterprise. Additionally, these authentication mechanisms can be added and/or changed. In the former case, if a user used a SSN to enter the mentioned first level of the enterprise, then a date of birth can be used to update an authentication mechanism. Alternatively, if a user used an enterprise number to gain such access, then part of the SSN can be used for the update. If the user wants to change the authentication mechanism, the date of birth can be used for the update.
-
Citations
13 Claims
-
1. A non-transitory computer readable medium storing thereon computer executable instructions for providing users access to an enterprise, comprising:
-
at least one instruction that determines a number of inputs required for a user to access the enterprise, wherein the number of inputs required is; defined by the user to set the level of security in said enterprise using a number of flags; and based on a line of business that said user accesses; at least one instruction that receives a first input from the number of inputs from said a user, wherein said first input, if successful, results in the accessing of a profile data on said user; at least one instruction, triggered by the first input, that receives a second input from the number of inputs, different than the first input, from said user, wherein said second input is used for authenticating said user and providing said user with access to a first level in said enterprise, and the said authenticating second input is dependent upon a device through which said user is providing said second input; and at least one instruction, triggered by the second input, that receives a third input from the number of inputs, different than the first and second inputs, for said user, wherein said third input is used for providing said user with access to a second level in said enterprise that is more restricted than said first level, and the said third input is dependent upon the device through which said user is providing said third input. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory computer readable medium storing thereon computer readable instructions for allowing users to modify their authentication information associated with an authentication mechanism, said instructions, comprising:
-
receiving input from a user regarding adding said authentication mechanism; determining a number of inputs required for said authentication mechanism, wherein the number of inputs required is; defined by the user to set the level of security in an enterprise using a number of flags; and based on a line of business that said user accesses; at least one subsystem that receives a first input from the number of inputs when adding said authentication mechanism, triggered by a second input from the number of inputs, if the second input was previously used by said user to access a level within said enterprise, wherein the said authenticating second input is dependent upon a device through which said user is providing said second input; receiving at least a part of said second input when adding said authentication mechanism, triggered by a third input from the number of inputs, if the third input was previously used by said user to access a level within said enterprise, wherein the said third input is dependent upon the device through which said user is providing said third input; and updating information related to said authentication mechanism following user input. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
Specification