Bank speech authentication
First Claim
1. A non-transitory computer readable medium storing thereon computer executable instructions executed to:
- determine a number of inputs required for a user to access an enterprise, wherein the number of inputs required is defined by the user to set the level of security in the enterprise using a number of flags;
receive a first input from the number of inputs from the user, wherein the first input, if successful, results in the accessing of a profile data on the user;
receive, responsive to the first input, a second input from the number of inputs from the user, wherein the second input is different than the first input and is used for authenticating the user and for providing the user with access to a first level in the enterprise; and
receive, responsive to the second input, a third input from the number of inputs from the user, wherein the third input is different than the first and second inputs and is used for providing the user with access to a second level in the enterprise that is more restricted than the first level.
0 Assignments
0 Petitions
Accused Products
Abstract
Authentication mechanisms are disclosed herein that authenticate user access to enterprises. For example, either an enterprise associated number or a social security number (SSN) can be provided to the enterprise to enter a first level. Then, any one of a ZIP code number, a device calling/contacting number, a date of birth, and a portion of the SSN can be provided to access applications in the first level. Lastly, a PIN can be provided to enter a second level of the enterprise. Additionally, these authentication mechanisms can be added and/or changed. In the former case, if a user used a SSN to enter the mentioned first level of the enterprise, then a date of birth can be used to update an authentication mechanism. Alternatively, if a user used an enterprise number to gain such access, then part of the SSN can be used for the update. If the user wants to change the authentication mechanism, the date of birth can be used for the update.
19 Citations
17 Claims
-
1. A non-transitory computer readable medium storing thereon computer executable instructions executed to:
-
determine a number of inputs required for a user to access an enterprise, wherein the number of inputs required is defined by the user to set the level of security in the enterprise using a number of flags; receive a first input from the number of inputs from the user, wherein the first input, if successful, results in the accessing of a profile data on the user; receive, responsive to the first input, a second input from the number of inputs from the user, wherein the second input is different than the first input and is used for authenticating the user and for providing the user with access to a first level in the enterprise; and receive, responsive to the second input, a third input from the number of inputs from the user, wherein the third input is different than the first and second inputs and is used for providing the user with access to a second level in the enterprise that is more restricted than the first level. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for allowing users to modify their authentication information associated with an authentication mechanism, comprising:
- a number of processing resources; and
memory storing instructions thereon that are executed by the processing resources to; receive input from a user regarding adding the authentication mechanism; determine a number of inputs required for the authentication mechanism, wherein the number of inputs required is defined by the user to set the level of security in an enterprise using a number of flags; receive a first input from the number of inputs when adding the authentication mechanism, triggered by a second input from the number of inputs, if the second input was previously used by the user to access a level within the enterprise; receive at least a part of the second input when adding the authentication mechanism, triggered by a third input from the number of inputs, if the third input was previously used by the user to access a level within the enterprise; and update information related to the authentication mechanism following user input. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
- a number of processing resources; and
Specification