Authentication and interaction tracking system and method
First Claim
1. A method for facilitating authentication of an entity engaging in an interaction with a financial institution, the authentication based on a record of interactions initiated by the entity, the method comprising:
- receiving interaction requests over a network at a central authentication and interaction tracking system, the central authentication and interaction tracking system including at least one computer memory and at least one computer processor, the interaction requests originating from multiple entities and including a plurality of authentication factors;
executing instructions stored in the computer memory using the computer processor to perform steps including;
building, from each interaction request, an entity print record for each of the multiple entities, wherein each entity print record includes the authentication factors from each initiated interaction request, the authentication factors including a location of the interaction request, a device identifier, and personal identifiers;
deriving, from the entity print record, an entity print and storing the entity print in at least one computer memory;
building, from each interaction request, an interaction signature for each interaction and classifying each interaction signature as a valid interaction signature or a fraudulent interaction signature;
comparing the received authentication factors for a requested interaction with the entity print and comparing the interaction signature for a received interaction request with the classified interaction signatures, wherein the comparisons yield a level of risk for each transaction; and
making an authentication determination based on a level of risk resulting from the comparisons.
1 Assignment
0 Petitions
Accused Products
Abstract
A central authentication and interaction tracking system authenticates an entity making a request related to a financial account. The system facilitates authentication of an entity engaging in an interaction based on a record of interactions initiated by the entity. The system includes an application interface receiving interaction requests over a network, the requests originating from multiple entities and including authentication factors. The system further includes a computer processor and computer memory capable of building, from each interaction request, an entity print record for each of the multiple entities, wherein each entity print record includes the authentication factors. The system further facilitates deriving, from the entity print record, an entity print, comparing received authentication factors for a requested interaction with the entity print, and making an authentication determination based on the comparison.
78 Citations
15 Claims
-
1. A method for facilitating authentication of an entity engaging in an interaction with a financial institution, the authentication based on a record of interactions initiated by the entity, the method comprising:
-
receiving interaction requests over a network at a central authentication and interaction tracking system, the central authentication and interaction tracking system including at least one computer memory and at least one computer processor, the interaction requests originating from multiple entities and including a plurality of authentication factors; executing instructions stored in the computer memory using the computer processor to perform steps including; building, from each interaction request, an entity print record for each of the multiple entities, wherein each entity print record includes the authentication factors from each initiated interaction request, the authentication factors including a location of the interaction request, a device identifier, and personal identifiers; deriving, from the entity print record, an entity print and storing the entity print in at least one computer memory; building, from each interaction request, an interaction signature for each interaction and classifying each interaction signature as a valid interaction signature or a fraudulent interaction signature; comparing the received authentication factors for a requested interaction with the entity print and comparing the interaction signature for a received interaction request with the classified interaction signatures, wherein the comparisons yield a level of risk for each transaction; and making an authentication determination based on a level of risk resulting from the comparisons. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A central authentication and interaction tracking system for facilitating authentication of an entity engaging in an interaction with a financial institution, the authentication based on a record of interactions initiated by the entity, the system comprising:
-
an application interface receiving interaction requests over a network, the interaction requests originating from multiple entities and including a plurality of authentication factors, the central authentication and interaction tracking system including; at least one computer memory storing information from the interaction requests and instructions for processing the information; and at least one computer processor accessing the computer memory and executing the instructions stored in the computer memory using the computer processor to perform steps including; building, from each interaction request, an entity print record for each of the multiple entities, wherein each entity print record includes the authentication factors from each initiated interaction request, the authentication factors including a location of the interaction request, a device identifier, and personal identifiers; deriving, from the entity print record, an entity print and storing the entity print in at least one computer memory; building, from each interaction request, an interaction signature for each interaction and classifying each interaction signature as a valid interaction signature or a fraudulent interaction signature; comparing the received authentication factors for a requested interaction with the entity print and comparing the interaction signature for a received interaction request with the classified interaction signatures, wherein the comparisons yield a level of risk for each transaction; and making an authentication determination based on a level of risk resulting from the comparisons. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
Specification