Efficient prevention of fraud
First Claim
1. A method of managing difficulty-of-use and security for a transaction with a user, the method comprising:
- determining, by a transaction manager operating on a computing device in use for the transaction with the user and in communication with one or more devices providing different security measures available for securing the transaction, a range of possible steps for the transaction corresponding to the security measures available for the transaction, wherein at least one of the one or more devices is enabled to acquire a biometric of the user as a security measure;
identifying a threshold for a security metric to be exceeded for authorizing the transaction, wherein the security metric is to be determined based on successful performance of a combination of steps selected for the transaction;
identifying, by the transaction manager, a plurality of combinations of steps from the range of possible steps for the transaction, that would each yield a corresponding security metric that exceeds the identified threshold if the performance of the corresponding combination of steps is successfully completed;
calculating a corresponding difficult-of-use for completing each of the identified combinations of steps that would yield the corresponding security metric that exceeds the identified threshold if the performance of the corresponding combination of steps is successfully completed;
selecting, for completion by the user in the transaction by using the one or more devices, a first combination of steps from the identified combinations of steps, that has a least calculated difficulty-of-use among those calculated for the identified combinations of steps, the selecting including a preference for inclusion of a step for liveness detection or biometric deterrence if available; and
allowing the transaction to complete if the user successfully completes the first combination of steps.
2 Assignments
0 Petitions
Accused Products
Abstract
This disclosure is directed to methods and systems for managing difficulty of use and security for a transaction. A transaction manager operating on a computing device may determining a range of possible steps for a transaction comprising security measures available for the transaction. The transaction manager may identify a threshold for a security metric to be exceeded for authorizing the transaction, the security metric to be determined based on performance of steps selected for the transaction. The transaction manager may select for the transaction at least one step from the range of possible steps, based on optimizing between (i) a difficulty of use quotient of the transaction from subjecting a user to the at least one step, and (ii) the security metric relative to the determined threshold.
-
Citations
20 Claims
-
1. A method of managing difficulty-of-use and security for a transaction with a user, the method comprising:
-
determining, by a transaction manager operating on a computing device in use for the transaction with the user and in communication with one or more devices providing different security measures available for securing the transaction, a range of possible steps for the transaction corresponding to the security measures available for the transaction, wherein at least one of the one or more devices is enabled to acquire a biometric of the user as a security measure; identifying a threshold for a security metric to be exceeded for authorizing the transaction, wherein the security metric is to be determined based on successful performance of a combination of steps selected for the transaction; identifying, by the transaction manager, a plurality of combinations of steps from the range of possible steps for the transaction, that would each yield a corresponding security metric that exceeds the identified threshold if the performance of the corresponding combination of steps is successfully completed; calculating a corresponding difficult-of-use for completing each of the identified combinations of steps that would yield the corresponding security metric that exceeds the identified threshold if the performance of the corresponding combination of steps is successfully completed; selecting, for completion by the user in the transaction by using the one or more devices, a first combination of steps from the identified combinations of steps, that has a least calculated difficulty-of-use among those calculated for the identified combinations of steps, the selecting including a preference for inclusion of a step for liveness detection or biometric deterrence if available; and allowing the transaction to complete if the user successfully completes the first combination of steps. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system for managing difficulty-of-use and security for a transaction with a user, the system comprising:
circuitry configured to implement a transaction manager operating on a computing device in use for the transaction with the user, the circuitry in communication with one or more devices providing different security measures available for securing the transaction, the circuitry further configured for; determining, by the transaction manager, a range of possible steps for the transaction corresponding to the security measures available for the transaction, wherein at least one of the one or more devices is enabled to acquire a biometric of the user as a security measure; identifying a threshold for a security metric to be exceeded for authorizing the transaction, wherein the security metric is to be determined based on successful performance of a combination of steps selected for the transaction; identifying, by the transaction manager, a plurality of combinations of steps from the range of possible of steps for the transaction, that would each yield a corresponding security metric that exceeds the identified threshold if the performance of the corresponding combination of steps is successfully completed; calculating a corresponding difficulty-of-use for completing each of the identified combinations of steps that would yield the corresponding security metric that exceeds the identified threshold if the performance of the corresponding combination of steps is successfully completed; selecting, for completion by the user in the transaction by using the one or more devices, a first combination of steps from the identified combinations of steps, that has a least calculated difficulty-of-use among those calculated for the identified combinations of steps, the selecting including a preference for inclusion of a step for liveness detection or biometric deterrence if available; and allowing the transaction to complete if the user successfully completes the first combination of steps. - View Dependent Claims (20)
Specification