System and method for graduated security in user authentication
First Claim
1. A computer system for requesting personal information from a user for authenticating access to at least one computer application of a plurality of computer applications, said computer system comprising a memory device and a processor, said computer system programmed to:
- identify a security level from a plurality of security levels for each computer application within the plurality of computer applications, wherein the plurality of security levels include at least a first-tier security level and a second-tier security level, wherein the second-tier security level requires the user to enter additional personal information as compared to the first-tier security level, wherein a first computer application within the plurality of computer applications is configured to require the first-tier security level;
create a user account for the user within the memory device, wherein creating the user account includes configuring the user account with the first-tier security level by prompting the user to provide first personal information associated with the user, wherein the first personal information is previously unknown to the computer system;
restrict the first computer application from requiring a password to enable access to the first computer application;
receive a user input from the user to access a second computer application that is configured to require the second-tier security level to enable access thereto;
determine that the user account has not been granted the second-tier security level;
prompt the user to enter the additional personal information associated with the user that is previously unknown to the computer system; and
promote the user account to the second-tier security level, including associating the additional personal information with the user account.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer system for authenticating user access to at least one computer application of a plurality of computer applications is provided. The computer system includes a memory device and a processor. The computer system is programmed to identify a security level from a plurality of security levels for each computer application within the plurality of computer applications. The plurality of security levels include at least a first-tier security level and a second-tier security level. The second-tier security level requires additional authentication information as compared to the first-tier security level. The computer system is also programmed to create a user account for a user within the memory device with the first-tier security level, and to determine that the user account requires the second-tier security level, and prompt the user to enter the additional authentication information. The computer system is also programmed to promote the user account to the second-tier security level.
-
Citations
27 Claims
-
1. A computer system for requesting personal information from a user for authenticating access to at least one computer application of a plurality of computer applications, said computer system comprising a memory device and a processor, said computer system programmed to:
-
identify a security level from a plurality of security levels for each computer application within the plurality of computer applications, wherein the plurality of security levels include at least a first-tier security level and a second-tier security level, wherein the second-tier security level requires the user to enter additional personal information as compared to the first-tier security level, wherein a first computer application within the plurality of computer applications is configured to require the first-tier security level; create a user account for the user within the memory device, wherein creating the user account includes configuring the user account with the first-tier security level by prompting the user to provide first personal information associated with the user, wherein the first personal information is previously unknown to the computer system; restrict the first computer application from requiring a password to enable access to the first computer application; receive a user input from the user to access a second computer application that is configured to require the second-tier security level to enable access thereto; determine that the user account has not been granted the second-tier security level; prompt the user to enter the additional personal information associated with the user that is previously unknown to the computer system; and promote the user account to the second-tier security level, including associating the additional personal information with the user account. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-implemented method for requesting personal information from a user for authenticating access to at least one computer application of a plurality of computer applications using a computer device in communication with the plurality of computer applications, the method comprising:
-
defining a security level from a plurality of security levels for each computer application of the plurality of computer applications, wherein the plurality of security levels include at least a first-tier security level and a second-tier security level, wherein the second-tier security level requires the user to enter additional personal information as compared to the first-tier security level, wherein a first computer application within the plurality of computer applications is configured to require the first-tier security level; creating a user account for the user within the authentication tool, wherein creating the user account includes configuring the user account as the first-tier security level by prompting the user to provide first personal information associated with the user, wherein the first personal information is previously unknown to the computer system; restricting the first computer application from requiring a password to enable access to the first computer application; receiving a user input from the user to access a second computer application that is configured to require the second-tier security level to enable access thereto; determining that the user account has not been granted the second-tier security level; prompting the user to enter the additional personal information associated with the user that is previously unknown to the computer system; and promoting the user account to the second-tier security level, including associating the additional personal information with the user account. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. At least one non-transitory computer-readable storage media having computer-executable instructions embodied thereon, wherein when executed by at least one processor, the computer-executable instructions cause the processor to:
-
identify a security level from a plurality of security levels for each computer application within a plurality of computer applications, wherein the plurality of security levels include at least a first-tier security level and a second-tier security level, wherein second-tier security level requires a user to enter additional personal information as compared to the first-tier security level, wherein a first computer application within the plurality of computer applications is configured to require the first-tier security level; create a user account for the user within a memory device communicatively coupled with the processor, wherein creating the user account includes configuring the user account as the first-tier security level by prompting the user to provide first personal information associated with the user, wherein the first personal information is previously unknown to the computer system; restrict the first computer application from requiring a password to enable access to the first computer application; receive a user input to access a second computer application that is configured to require the second-tier security level; determine that the user account has not been granted the second-tier security level; prompt the user to enter the additional personal information associated with the user that is previously unknown to the computer system; and promote the user account to the second-tier security level, including associating the additional personal information with the user account. - View Dependent Claims (18, 19, 20, 21)
-
-
22. A computer system for requesting personal information from a user for authenticating access to a computer application including a plurality of modules, said computer system comprising a memory device and a processor, said computer system programmed to:
-
identify a security level from a plurality of security levels for one or more modules of the plurality of modules, wherein the plurality of security levels include at least a first-tier security level and a second-tier security level, wherein the second-tier security level requires the user to enter additional personal information as compared to the first-tier security level, wherein a first module within the plurality of modules is configured to require the first-tier security level; create a user account for the user within the memory device, wherein creating the user account includes configuring the user account with the first-tier security level by prompting the user to provide first personal information associated with the user, wherein the first personal information is previously unknown to the computer system; restrict the first module from requiring a password to enable access to the first module; receive a user input from the user to access a second module that is configured to require the second-tier security level to enable access thereto; determine that the user account has not been granted the second-tier security level; prompt the user to enter the additional personal information associated with the user that is previously unknown to the computer system; and promote the user account to the second-tier security level, including associating the additional personal information with the user account. - View Dependent Claims (23, 24, 25, 26, 27)
-
Specification