Authentication using a transaction history
First Claim
Patent Images
1. A computer-implemented method for authenticating a user, the method comprising:
- maintaining, in a storage device, an electronic catalog comprising a plurality of items available for purchase;
maintaining, in a storage device, a transaction history of a user, the transaction history comprising information identifying items, in the electronic catalog, previously purchased by the user;
selecting, using a computer, a plurality of items for presentation to the user, the plurality of items comprising at least one item, in the electronic catalog, previously purchased by the user and a plurality of items, in the electronic catalog, not previously purchased be the user;
detecting, using the computer, a trigger associated with an operation performed be the user, the operation comprising a user selection of at least a portion of a web page;
presenting, using the computer, a plurality of identifiers associated with the plurality of items to the user in response to the detected trigger;
receiving, using the computer, from the user, a selection of one or more of the identifiers;
determining, using the computer, whether the selected one or more identifiers correspond with items previously purchased by the user; and
authenticating, using the computer, the user when the selected one or more identifiers correspond with items previously purchased by the user.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods are provided for authenticating a user. In one implementation, a computer-implemented method is provided. According to the method, transaction history information for each one of a set of users is maintained in a storage device. The method provides identifiers associated with items for display and receives, from one of the users, a selection of one or more of the identifiers. The method further authenticates the user as a function of the selection and a transaction history of the user.
-
Citations
38 Claims
-
1. A computer-implemented method for authenticating a user, the method comprising:
-
maintaining, in a storage device, an electronic catalog comprising a plurality of items available for purchase; maintaining, in a storage device, a transaction history of a user, the transaction history comprising information identifying items, in the electronic catalog, previously purchased by the user; selecting, using a computer, a plurality of items for presentation to the user, the plurality of items comprising at least one item, in the electronic catalog, previously purchased by the user and a plurality of items, in the electronic catalog, not previously purchased be the user; detecting, using the computer, a trigger associated with an operation performed be the user, the operation comprising a user selection of at least a portion of a web page; presenting, using the computer, a plurality of identifiers associated with the plurality of items to the user in response to the detected trigger; receiving, using the computer, from the user, a selection of one or more of the identifiers; determining, using the computer, whether the selected one or more identifiers correspond with items previously purchased by the user; and authenticating, using the computer, the user when the selected one or more identifiers correspond with items previously purchased by the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-implemented method for authenticating a user, the method comprising:
-
maintaining, in a storage device, a transaction history of a user, the transaction history comprising information identifying items, in an electronic catalog, purchased by the user; selecting, using a computer, a plurality of items for presentation to the user, the plurality of items comprising at least one item, in the electronic catalog, purchased by the user and at least one item, in the electronic catalog, not purchased by the user; detecting using the computer, a trigger associated with an operation performed by the user, the operation comprising a user selection of at least a portion of a web page; presenting, using the computer, identifiers associated with the plurality of items to the user in response to the detected trigger; receiving, using the computer, from the user, a selection of one or more of the identifiers; and authenticating, using the computer, the user as a function of the selection and the transaction history of the user. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer-implemented method for authenticating a user, the method comprising:
-
selecting, using a computer, a group of items for presentation to a user, the group comprising a plurality of items, in an electronic catalog, that are not included in a transaction history of the user and one or more items, in the electronic catalog, that are included in the transaction history of the user; detecting, using the computer, a trigger associated with an operation performed by the user, the operation comprising a user selection of at least a portion of a web page; presenting, using the computer, the group of items to the user in response to the detected trigger; receiving, using the computer, from the user, a selection of one or more items in the group;
determining whether the selected one or more items are included in the transaction history; andauthenticating, using the computer, the user when the selected one or more items are included in the transaction history. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A computer-implemented method for authenticating a user, the method comprising:
-
selecting, using a computer, for each of a predefined plurality of categories of products, a product, wherein so that at least one of the selected products was purchased by the user; detecting, using the computer, a trigger associated with an operation performed by the user, the operation comprising a user selection of at least a portion of a web page; presenting, using the computer, identifiers of the selected products to the user in response to the detected trigger; receiving, using the computer, from the user, a selection of one of the identifiers; and authenticating, using the computer, the user based on the selection. - View Dependent Claims (31, 32, 33, 34, 35)
-
-
36. A system for authenticating a user, the system comprising:
-
a catalog server including a data store storing identifiers of items; and a retail server in communication with the catalog server, the retail server operable to; retrieve a plurality of items from the catalog server, the plurality of items including at least one item included in a transaction history of the user; detect a trigger associated with an operation performed by the user, the operation comprising a user selection of at least a portion of a web page; transmit, in response to the detected trigger, a plurality of identifiers of the items retrieved from the catalog server to the user; receive, from the user, a selection of at least one of the identifiers; and authenticate the user based on the received selection. - View Dependent Claims (37, 38)
-
Specification