Verification and authentication systems and methods
First Claim
Patent Images
1. A method of controlling access by an entity to vendor information technology systems, the method comprising:
- receiving, by a verification/authentication engine executed on a server device, an inquiry from a vendor system to verify the entity for a transaction;
determining, by the verification/authentication engine, that the entity is a small business rather than an individual;
based on an identification of a channel through which the entity selects to access the vendor system, querying, by the verification/authentication engine, the entity using questions generated based on data from at least two data sources of a plurality of data sources containing information about the entity;
determining, by the verification/authentication engine, at least one of a confidence level or a score based on the extent to which the entity correctly answers the questions; and
sending, by the verification/authentication engine, the at least one of the confidence level or the score to the vendor system configured to determine whether to grant or deny access by the entity to the vendor system based on the at least one of the confidence level or the score.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the present invention provide verification and/or authentication service engines that provide a customizable solution that can be “dialed” based on the risk level assigned to individual or grouped applications. The systems can also incorporate internal and external sources of data used to verify information provided by the user. It is dynamic and can pull information from a myriad of sources during the verification process, enabling credit reporting agencies (e.g., Equifax and others), FSPs, and other service providers to facilitate real-time approval and access to products and services.
-
Citations
20 Claims
-
1. A method of controlling access by an entity to vendor information technology systems, the method comprising:
-
receiving, by a verification/authentication engine executed on a server device, an inquiry from a vendor system to verify the entity for a transaction; determining, by the verification/authentication engine, that the entity is a small business rather than an individual; based on an identification of a channel through which the entity selects to access the vendor system, querying, by the verification/authentication engine, the entity using questions generated based on data from at least two data sources of a plurality of data sources containing information about the entity; determining, by the verification/authentication engine, at least one of a confidence level or a score based on the extent to which the entity correctly answers the questions; and sending, by the verification/authentication engine, the at least one of the confidence level or the score to the vendor system configured to determine whether to grant or deny access by the entity to the vendor system based on the at least one of the confidence level or the score. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of controlling access by an entity to vendor information technology systems, the method comprising:
-
receiving, by a verification/authentication engine executed on a server device, an inquiry from a vendor system to verify the entity for a transaction; determining, by the verification/authentication engine, that the entity is a small business rather than an individual; selecting, by the verification/authentication engine, an assigned level of risk for the transaction and a verification level to meet the assigned level of risk, and a plurality of data sources containing information about the entity, wherein the assigned level of risk, the verification level, and the plurality of data sources are selected based on input received from the vendor system; querying, by the verification/authentication engine, the entity using questions generated based on data from at least two data sources of the plurality of data sources, wherein the data describes owners or principals of the small business; determining, by the verification/authentication engine, at least one of a confidence level or a score based on the extent to which the entity correctly answers the questions; and sending, by the verification/authentication engine, the at least one of the confidence level or the score to the vendor system configured to determine whether to grant or deny access by the entity to the vendor system based on the at least one of the confidence level or the score. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A system comprising:
an authentication server capable of communicating with a vendor system, the authentication server comprising a verification/authentication engine configured for; receiving an inquiry from the vendor system to verify an entity for a transaction; determining that the entity is a small business rather than an individual; based on an identification of a channel through which the entity selects to access the vendor system, querying the entity using questions generated based on data from at least two data sources of a plurality of data sources containing information about the entity; determining at least one of a confidence level or a score based on the extent to which the entity correctly answers the questions; and sending the at least one of the confidence level or the score to the vendor system configured to determine whether to grant or deny access by the entity to the vendor system based on the at least one of the confidence level or the score. - View Dependent Claims (17, 18, 19, 20)
Specification