Method and apparatus for enabling a user to select an authentication method
First Claim
1. A method comprising:
- registering, by a computer-based system, a first authentication method for accessing a first restricted service associated with a user and a site, wherein the first authentication method is selectable by the user, the first restricted service being a service provided at the site; and
allowing, by the computer-based system, the user to change the first authentication method to a second authentication method associated with a second restricted service for the site without accessing the first restricted service or the second restricted service, wherein the first authentication method is different from the second authentication method and the second restricted service is another service provided by the site, and wherein the change of the first authentication method to the second authentication method requires a third authentication method.
5 Assignments
0 Petitions
Accused Products
Abstract
The present invention facilitates access to a restricted service related to secure transactions via a network. The present invention allows a user to select a minimum security level of authentication for its own login to a restricted service. The user'"'"'s selected minimum security level of authentication may be registered in an authentication method system, so that the user must use the selected minimum security level for authentication in order to gain access to the restricted service. Alternatively, the user may specify that the selected minimum security level for authentication may be over-turned by the user, or optionally re-set to a new authentication method depending on the needs of the user. As such, the present invention allows the user the flexibility to select its own authentication method for accessing a restricted service.
72 Citations
19 Claims
-
1. A method comprising:
-
registering, by a computer-based system, a first authentication method for accessing a first restricted service associated with a user and a site, wherein the first authentication method is selectable by the user, the first restricted service being a service provided at the site; and allowing, by the computer-based system, the user to change the first authentication method to a second authentication method associated with a second restricted service for the site without accessing the first restricted service or the second restricted service, wherein the first authentication method is different from the second authentication method and the second restricted service is another service provided by the site, and wherein the change of the first authentication method to the second authentication method requires a third authentication method. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. An article of manufacture including a non-transitory, computer-readable medium having stored thereon computer-executable instructions comprising:
-
instructions for registering a first user-selected authentication method for accessing a first restricted service of a site; and instructions for allowing a change from the first user-selected authentication method to a second user-selected authentication method associated with a second restricted service without accessing the first restricted service or the second restricted service, wherein the first user-selected authentication method is different from the second user-selected authentication method and the second restricted service is associated with the site, and wherein the change of the first user-selected authentication method to the second user-selected authentication method requires a third authentication method.
-
-
19. A system comprising:
-
a processor, a memory communicatively coupled to the processor, the memory having instructions stored thereon that, in response to execution by the processor, cause at least; receiving data having information indicative of a first user-selected authentication method for accessing a restricted service; registering the first user-selected authentication method; and allowing a change from the first user-selected authentication method to a second user-selected authentication method for accessing the restricted service without accessing the restricted service, wherein the first user-selected authentication method is different from the second user-selected authentication method, and wherein the change of the first user-selected authentication method to the second user-selected authentication method requires an additional authentication method.
-
Specification