Methods and systems for authenticating users
First Claim
1. A method of authenticating users comprising:
- extracting, by a processor, a risk level from an authentication request, the risk level being determined for a transaction desired to be conducted by a user;
determining an authentication data requirement corresponding to the risk level;
comparing captured authentication data against corresponding user enrollment biometric data, the captured authentication data being biometric data captured from the user in accordance with the authentication data requirement; and
validating the identity of the user when the captured authentication data and the user enrollment biometric data match, the desired transaction being conducted after the user is successfully validated.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of authenticating users to reduce transaction risks includes indicating a desire to conduct a transaction and determining whether the transaction requires access to protected resources. Moreover, the method determines whether inputted information is known, determines a state of a communications device when the inputted information is known, and transmits a biometric authentication request from a server to an authentication system when the state of the communications device is enrolled. Additionally, the method includes validating the communications device, capturing biometric authentication data in accordance with a biometric authentication data capture request with the communications device, biometrically authenticating the user, generating a one-time pass-phrase and storing the one-time pass-phrase on the authentication system when the user is authenticated, comparing the transmitted one-time pass-phrase against the stored one-time pass-phrase, and granting access to the protected resources when the transmitted and stored one-time pass-phrases match.
-
Citations
18 Claims
-
1. A method of authenticating users comprising:
-
extracting, by a processor, a risk level from an authentication request, the risk level being determined for a transaction desired to be conducted by a user; determining an authentication data requirement corresponding to the risk level; comparing captured authentication data against corresponding user enrollment biometric data, the captured authentication data being biometric data captured from the user in accordance with the authentication data requirement; and validating the identity of the user when the captured authentication data and the user enrollment biometric data match, the desired transaction being conducted after the user is successfully validated. - View Dependent Claims (2)
-
-
3. A computing device for authenticating users comprising:
-
a processor; a memory configured to store at least user enrollment data records, said computing device being associated with a network and said memory being in communication with said processor and having instructions stored thereon which, when executed by said processor, cause said processor to; extract a risk level from an authentication request, the risk level being determined for a transaction desired to be conducted by a user; determine an authentication data requirement corresponding to the risk level; compare captured authentication data against corresponding user enrollment biometric data, the captured authentication data being biometric data captured from the user in accordance with the authentication data requirement; and validate the identity of the user when the captured authentication data and the user enrollment biometric data match, the desired transaction being conducted after the user is successfully validated. - View Dependent Claims (4)
-
-
5. A computer program recorded on a non-transitory computer-readable recording medium included in a computing device for enabling increased accuracy of biometric authentication transaction results, the computer program being comprised of instructions, which when read and executed by the computing device, cause the computing device to:
-
extract a risk level from an authentication request, the risk level being determined for a transaction desired to be conducted by a user; determine an authentication data requirement corresponding to the risk level; compare captured authentication data against corresponding user enrollment biometric data, the captured authentication data being biometric data captured from the user in accordance with the authentication data requirement; and validate the identity of the user when the captured authentication data and the user enrollment biometric data match, the desired transaction being conducted after the user is successfully validated. - View Dependent Claims (6)
-
-
7. A method of authenticating users comprising:
-
conducting, by a processor, a first authentication transaction with authentication data captured from a user to authenticate the user, the authentication data being biometric data; conducting a second authentication transaction with authentication data captured from the user to authenticate the user after successfully authenticating the user in the first authentication transaction, the authentication data for the second transaction being different than the authentication data for the first transaction; and validating the identity of the user after the user is successfully authenticated in the second authentication transaction. - View Dependent Claims (8)
-
-
9. A computing device for authenticating users comprising:
-
a processor; and a memory configured to store data, said computing device being associated with a network and said memory being in communication with said processor and having instructions stored thereon which, when executed by said processor, cause said processor to; conduct a first authentication transaction with authentication data captured from a user to authenticate the user, the authentication data being biometric data; conduct a second authentication transaction with authentication data captured from the user to authenticate the user after successfully authenticating the user in the first authentication transaction, the authentication data for the second transaction being different than the authentication data for the first transaction; and validate the identity of the user after the user is successfully authenticated in the second authentication transaction. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer program recorded on a non-transitory computer-readable recording medium included in a computing device for enabling increased accuracy of biometric authentication transaction results, the computer program being comprised of instructions, which when read and executed by the computing device, cause the computing device to:
-
conduct a first authentication transaction with authentication data captured from a user to authenticate the user, the authentication data being biometric data; conduct a second authentication transaction with authentication data captured from the user to authenticate the user after successfully authenticating the user in the first authentication transaction, the authentication data for the second transaction being different than the authentication data for the first transaction; and validate the identity of the user after the user is successfully authenticated in the second authentication transaction. - View Dependent Claims (18)
-
Specification