Methods and systems for authenticating users
First Claim
1. A method of authenticating users comprising:
- conducting, by a computing device, a first authentication transaction with data from a memory included in the computing device, the data being a template generated from biometric data captured from the user, the computing device capable of being carried by a user;
conducting a second authentication transaction with a template generated from biometric data captured from the user to authenticate the user when the first authentication transaction is successful, the biometric data for the second transaction being different than the biometric data for the first transaction; and
transmitting a message to an electronic lock system after the user is successfully authenticated in the second authentication transaction, the electronic lock system causes a door lock to unlock after receiving the message, the electronic lock system being in communication with the computing device over a network.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of authenticating users to reduce transaction risks includes indicating a desire to conduct a transaction and determining whether the transaction requires access to protected resources. Moreover, the method determines whether inputted information is known, determines a state of a communications device when the inputted information is known, and transmits a biometric authentication request from a server to an authentication system when the state of the communications device is enrolled. Additionally, the method includes validating the communications device, capturing biometric authentication data in accordance with a biometric authentication data capture request with the communications device, biometrically authenticating the user, generating a one-time pass-phrase and storing the one-time pass-phrase on the authentication system when the user is authenticated, comparing the transmitted one-time pass-phrase against the stored one-time pass-phrase, and granting access to the protected resources when the transmitted and stored one-time pass-phrases match.
353 Citations
18 Claims
-
1. A method of authenticating users comprising:
-
conducting, by a computing device, a first authentication transaction with data from a memory included in the computing device, the data being a template generated from biometric data captured from the user, the computing device capable of being carried by a user; conducting a second authentication transaction with a template generated from biometric data captured from the user to authenticate the user when the first authentication transaction is successful, the biometric data for the second transaction being different than the biometric data for the first transaction; and transmitting a message to an electronic lock system after the user is successfully authenticated in the second authentication transaction, the electronic lock system causes a door lock to unlock after receiving the message, the electronic lock system being in communication with the computing device over a network. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computing device for authenticating users, said computing device capable of being carried by a user and comprising:
-
a processor; and a memory configured to store data, said computing device being associated with a network and said memory being in communication with said processor and having instructions stored thereon which, when executed by said processor, cause said computing device to; conduct a first authentication transaction with data from said memory to authenticate the user, the data being a template generated from biometric data captured from the user; conduct a second authentication transaction with a template generated from biometric data captured from the user to authenticate the user when the first authentication transaction is successful, the biometric data for the second transaction being different than the biometric data for the first transaction; and transmit a message to an electronic lock system after the user is successfully authenticated in the second authentication transaction, the electronic lock system causes a door lock to unlock after receiving the message, the electronic lock system being in communication with said computing device over the network. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method of authenticating users comprising:
-
conducting, by a computing device, a first authentication transaction with data from a memory included in the computing device, the data being a template generated from biometric data captured from the user, the computing device capable of being carried by a user; conducting a second authentication transaction with a template generated from biometric data captured from the user to authenticate the user when the first authentication transaction is successful, the biometric data for the second transaction being different than the biometric data for the first transaction; and unlocking a door after the user is successfully authenticated in the second authentication transaction. - View Dependent Claims (16, 17, 18)
-
Specification