Dynamic secure login authentication
First Claim
1. A system for performing transactions using a network, the system comprising:
- a server in communication with the network, the server comprising a processor circuit and a memory circuit;
wherein;
the memory circuit stores private account information from registered users; and
the memory circuit stores commands that when executed by the processor circuit cause the server to perform a method comprising;
requesting login information for a private account from a user using a login identifier for the private account;
when the login information is not received from the user;
determining whether a transaction is below a risk threshold determined by a risk assessment algorithm, the risk assessment algorithm using a purchase history associated with the private account;
terminating the transaction when the transaction is not determined to be below the risk threshold;
completing the transaction with the private account using a guest login when the transaction is determined to be below the risk threshold upon later confirming the login information, later confirming the login information by confirming, after completing the transaction with the guest login, the login information using a login configuration;
wherein;
the login configuration comprises a matrix of dynamic symbols; and
confirming the login information comprises;
determining an expected password for the user based on a stored trace pattern provided by the user and the symbols in the matrix;
receiving a password from the user; and
determining whether the password matches the expected password.
2 Assignments
0 Petitions
Accused Products
Abstract
A system for performing a secured transaction using a network including a server in communication with the network is provided. The server has a processor and a memory to store private account information from registered users and store commands that when executed by the processor cause the server to perform a method including: providing a login configuration to a user, including a matrix of dynamic symbols; determining an expected password for the user based on a trace pattern from the user and the symbols in the matrix; receiving a password from the user; and determining whether the password matches the expected password. A non-transitory machine-readable medium including a plurality of machine-readable instructions which when executed by one or more processors of a server controlled by a service provider are adapted to cause the server to perform a method as above is also provided.
42 Citations
18 Claims
-
1. A system for performing transactions using a network, the system comprising:
-
a server in communication with the network, the server comprising a processor circuit and a memory circuit;
wherein;the memory circuit stores private account information from registered users; and the memory circuit stores commands that when executed by the processor circuit cause the server to perform a method comprising; requesting login information for a private account from a user using a login identifier for the private account; when the login information is not received from the user; determining whether a transaction is below a risk threshold determined by a risk assessment algorithm, the risk assessment algorithm using a purchase history associated with the private account; terminating the transaction when the transaction is not determined to be below the risk threshold; completing the transaction with the private account using a guest login when the transaction is determined to be below the risk threshold upon later confirming the login information, later confirming the login information by confirming, after completing the transaction with the guest login, the login information using a login configuration; wherein; the login configuration comprises a matrix of dynamic symbols; and confirming the login information comprises; determining an expected password for the user based on a stored trace pattern provided by the user and the symbols in the matrix; receiving a password from the user; and determining whether the password matches the expected password. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory machine-readable medium comprising a plurality of machine-readable instructions which when executed by one or more processors of a server controlled by a service provider cause the server to perform a method comprising:
-
requesting, electronically by a first processor in the server, login information from a user for a private account, the login information comprising an account password and a login identifier; when the account password is not received from the user, determining whether a transaction is below a risk threshold determined by a risk assessment algorithm, the risk assessment algorithm using a purchase history associated with the private account; terminating the transaction when the transaction is not determined to be below the risk threshold; completing the transaction with the private account using a guest login when the transaction is determined to be below the risk threshold and later confirmation of the login information, the later confirmation of the login information comprising; providing, electronically by the first processor in the server, a matrix pattern option; generating a matrix of dynamic symbols; generating an alternate password based on a stored trace pattern for the user and the dynamic symbols in the matrix; and completing the transaction when a password received from the user matches the alternate password. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A method to login into a user account of a service provider linked to a network to complete a transaction through the network, the method comprising:
-
requesting, electronically by a processor in a server, login information from a user for a private account, the login information comprising an account password and a login identifier; when the account password is not received from the user, determining, electronically by the processor in the server, whether a transaction is below a risk threshold determined by a risk assessment algorithm, the risk assessment algorithm using a purchase history associated with the private account; terminating the transaction when the transaction is not determined to be below the risk threshold; completing the transaction with the private account using a guest login when the transaction is determined to be below the risk threshold and later confirmation of the login information, the later confirmation of the login information comprising; providing, electronically by the processor in the server, a matrix pattern option; generating a matrix of dynamic symbols, wherein the matrix of dynamic symbols includes a background fill that visually blurs the dynamic symbols; generating an alternate password based on a stored trace pattern for the user and the dynamic symbols in the matrix; and completing the transaction when a password received from the user matches the alternate password. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification