Dynamic pairing system for securing a trusted communication channel
First Claim
1. A method for securing a trusted communications channel for a mobile financial transaction, the method comprising:
- receiving, from a user via an external terminal, an access control entitlement request, wherein the request corresponds to a financial transaction;
computing, by a processor included in a machine, a total risk level associated with the financial transaction;
storing, in a database, a table that matches a plurality of total risk levels to a plurality of required trust scores, correspondingly, wherein, for a transaction having one of the plurality of total risk levels, the corresponding required trust score is required in order to be granted the access control entitlement;
determining which of the plurality of required trust scores is required in order to be granted the access control entitlement by;
matching, by the processor, the computed total risk level associated with the financial transaction to a corresponding one of the plurality of total risk levels stored in the database, andidentifying, in the table, one required trust score of the plurality of required trust scores that corresponds to the corresponding one of the plurality of total risk levels obtained by the matching;
receiving user identification data associated with the user from one or more data sources;
validating, by the processor, the user identification data;
computing, by the processor, a user trust score associated with the user based on the validated identification data;
comparing, by the processor, the user trust score to the one required trust score obtained by the identifying; and
transmitting the access control entitlement, to the user via the external terminal, if the user trust score is greater than or equal to the one required trust score obtained by the identifying.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for securing a trusted communications channel for a mobile financial transaction is provided by receiving, from a user via an external terminal, a request for an access control entitlement to complete a financial transaction. A total risk level associated with the financial transaction is computed. A required trust score is determined based on the total risk level. User identification data associated with the user is received from one or more data sources. The user identification data is validated. A user trust score associated with the user is computed based on the validated identification data. The user trust score is compared to the required trust score. The access control entitlement is transmitted to the user via the external terminal if the user trust score is greater than or equal to the required trust score.
-
Citations
15 Claims
-
1. A method for securing a trusted communications channel for a mobile financial transaction, the method comprising:
-
receiving, from a user via an external terminal, an access control entitlement request, wherein the request corresponds to a financial transaction; computing, by a processor included in a machine, a total risk level associated with the financial transaction; storing, in a database, a table that matches a plurality of total risk levels to a plurality of required trust scores, correspondingly, wherein, for a transaction having one of the plurality of total risk levels, the corresponding required trust score is required in order to be granted the access control entitlement; determining which of the plurality of required trust scores is required in order to be granted the access control entitlement by; matching, by the processor, the computed total risk level associated with the financial transaction to a corresponding one of the plurality of total risk levels stored in the database, and identifying, in the table, one required trust score of the plurality of required trust scores that corresponds to the corresponding one of the plurality of total risk levels obtained by the matching; receiving user identification data associated with the user from one or more data sources; validating, by the processor, the user identification data; computing, by the processor, a user trust score associated with the user based on the validated identification data; comparing, by the processor, the user trust score to the one required trust score obtained by the identifying; and transmitting the access control entitlement, to the user via the external terminal, if the user trust score is greater than or equal to the one required trust score obtained by the identifying. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system for securing a trusted communications channel for a mobile financial transaction, the system comprising:
a machine including a processor coupled to a memory, the processor being operable to; receive, from a user via an external terminal, an access control entitlement request, wherein the request corresponds to a financial transaction; compute a total risk level associated with the financial transaction; store, in a database, a table that matches and a plurality of total risk levels to a plurality of required trust scores, correspondingly, wherein, for a transaction having one of the plurality of total risk levels, the corresponding required trust score is required in order to be granted the access control entitlement; determine which of the plurality of required trust scores is required in order to be granted the access control entitlement by; matching the computed total risk level associated with the financial transaction to a corresponding one of the plurality of total risk levels stored in the database, and identifying, in the table, one required trust score of the plurality of required trust scores that corresponds to the corresponding one of the plurality of total risk levels obtained by the matching; receive user identification data associated with the user from one or more data sources; validate the user identification data; compute a user trust score associated with the user based on the validated identification data; compare the user trust score to the one required trust score obtained by the identifying; and transmit the access control entitlement, to the user via the external terminal, if the user trust score is greater than or equal to the one required trust score obtained by the identifying. - View Dependent Claims (7, 8, 9, 10)
-
11. A non-transitory computer-readable medium having stored thereon sequences of instructions, the sequences of instructions including instructions, which, when executed by a computer system, cause the computer system to perform:
-
receiving, from a user via an external terminal, an access control entitlement request, wherein the request corresponds to a financial transaction; computing a total risk level associated with the financial transaction; storing, in a database, a table that matches a plurality of total risk levels to a plurality of required trust scores, correspondingly, wherein, for a transaction having one of the plurality of total risk levels, the corresponding required trust score is required in order to be granted the access control entitlement; determining which of the plurality of required trust scores is required in order to be granted the access control entitlement by; matching the computed total risk level associated with the financial transaction to a corresponding one of the plurality of total risk levels stored in the database, and identifying, in the table, one required trust score of the plurality of required trust scores that corresponds to the corresponding one of the plurality of total risk levels obtained by the matching; receiving user identification data associated with the user from one or more data sources; validating the user identification data; computing a user trust score associated with the user based on the validated identification data; comparing the user trust score to the one required trust score obtained by the identifying; and transmitting the access control entitlement, to the user via the external terminal, if the user trust score is greater than or equal to the one required trust score obtained by the identifying. - View Dependent Claims (12, 13, 14, 15)
-
Specification