Performing an authentication operation during user access to a computerized resource
First Claim
1. A method for use in authentication, comprising:
- performing a first authentication operation in connection with a user;
based on the first authentication operation, generating an authentication result, the authentication result being constructed and arranged to control user access to a computerized resource;
after the user has accessed the computerized resource in response to the authentication result indicating successful user authentication, performing a second authentication operation based on a first biometric;
based on the second authentication operation, generating a new authentication result;
wherein generating the new authentication result includes;
in response to the new authentication result indicating successful user authentication, providing the user with continued access to the computerized resource, andin response to the new authentication result indicating unsuccessful user authentication, requesting input of a second biometric different to the first biometric in order to facilitate continued user access to the computerized resource.
9 Assignments
0 Petitions
Accused Products
Abstract
A method, electronic apparatus and computer program product for performing authentication operation is disclosed. An authentication request is received from user of computerized resource. The request comprises user identifier identifying user. The authenticity of user is verified based on user identifier. An access session is established in which user can access resource in response to successfully verifying user. An electronic input signal is received from electronic input device during session. The device is configured to take a biometric measurement from the user. Biometric data is derived from signal. A comparison is performed between biometric data and expected biometric data. An authentication result is generated based on comparison between biometric data and expected biometric data, wherein result can be used for further authentication of user during session.
-
Citations
17 Claims
-
1. A method for use in authentication, comprising:
-
performing a first authentication operation in connection with a user; based on the first authentication operation, generating an authentication result, the authentication result being constructed and arranged to control user access to a computerized resource; after the user has accessed the computerized resource in response to the authentication result indicating successful user authentication, performing a second authentication operation based on a first biometric; based on the second authentication operation, generating a new authentication result; wherein generating the new authentication result includes; in response to the new authentication result indicating successful user authentication, providing the user with continued access to the computerized resource, and in response to the new authentication result indicating unsuccessful user authentication, requesting input of a second biometric different to the first biometric in order to facilitate continued user access to the computerized resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An electronic apparatus for use in authentication, comprising:
-
an interface; a memory; and a controller coupled to the interface and the memory, the controller being constructed and arranged to; perform a first authentication operation in connection with a user; based on the first authentication operation, generate an authentication result, the authentication result being constructed and arranged to control user access to a computerized resource; after the user has accessed the computerized resource in response to the authentication result indicating successful user authentication, perform a second authentication operation based on a first biometric; based on the second authentication operation, generate a new authentication result; wherein the controller, when generating the new authentication result, is constructed and arranged to; in response to the new authentication result indicating successful user authentication, provide the user with continued access to the computerized resource, and in response to the new authentication result indicating unsuccessful user authentication, request input of a second biometric different to the first biometric in order to facilitate continued user access to the computerized resource. - View Dependent Claims (11, 12, 13)
-
-
14. A computer program product having a non-transitory computer readable medium which stores a set of instructions for use in authentication, the set of instructions causing a computer to perform a method of:
-
performing a first authentication operation in connection with a user; based on the first authentication operation, generating an authentication result, the authentication result being constructed and arranged to control user access to a computerized resource; after the user has accessed the computerized resource in response to the authentication result indicating successful user authentication, performing a second authentication operation based on a first biometric; based on the second authentication operation, generating a new authentication result; wherein generating the new authentication result includes; in response to the new authentication result indicating successful user authentication, providing the user with continued access to the computerized resource, and in response to the new authentication result indicating unsuccessful user authentication, requesting input of a second biometric different to the first biometric in order to facilitate continued user access to the computerized resource. - View Dependent Claims (15, 16, 17)
-
Specification