Systems and methods for multifactor authentication
First Claim
1. A method for performing a multi-channel authentication between an authenticating entity and a customer remote from the authenticating entity, utilizing a primary communication channel and a secondary communication channel, the method comprising:
- receiving from a computing device of the customer, at a processing machine of the authenticating entity, primary authentication information via the primary communication channel;
processing the primary authentication information by the processing machine of the authenticating entity, and retrieving customer information based on the primary authentication information;
sending a message to the computing device of the customer, via the primary communication channel, that identifies potential communication channels through which a secondary authentication can be performed, wherein the message does not comprise complete contact information for the potential communication channels to effect communication via the potential channels;
receiving from the computing device of the customer a selection of one of the potential communication channels, which comprises the secondary communication channel;
transmitting, by the processing machine of the authenticating entity, secondary authentication information to the customer via the secondary communication channel, the secondary communication channel being different than the primary communication channel;
receiving from the computing device of the customer, via the primary communication channel, at least a portion of the secondary authentication information; and
processing the received secondary authentication information to authenticate the customer.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention provides a method for performing an authentication (and a system for performing the method), in conjunction with a transaction, utilizing a primary channel and a secondary channel. The method may include an authenticating entity, such as a bank, (1) receiving from a customer primary authentication information via a primary channel; (2) the authenticating entity processing the primary authentication information, and retrieving customer information based on the primary authentication information; (3) the authenticating entity transmitting secondary authentication information to the customer via a secondary channel, the secondary channel being different than the primary channel; (4) the authenticating entity receiving from the customer at least a portion of the secondary authentication information; and (5) the authenticating entity performing authentication processing on the secondary authentication information received from the customer. Based on the successful authentication of the primary authentication information and the secondary authentication information received from the customer, the authenticating entity approves the customer for the transaction.
601 Citations
24 Claims
-
1. A method for performing a multi-channel authentication between an authenticating entity and a customer remote from the authenticating entity, utilizing a primary communication channel and a secondary communication channel, the method comprising:
-
receiving from a computing device of the customer, at a processing machine of the authenticating entity, primary authentication information via the primary communication channel; processing the primary authentication information by the processing machine of the authenticating entity, and retrieving customer information based on the primary authentication information; sending a message to the computing device of the customer, via the primary communication channel, that identifies potential communication channels through which a secondary authentication can be performed, wherein the message does not comprise complete contact information for the potential communication channels to effect communication via the potential channels; receiving from the computing device of the customer a selection of one of the potential communication channels, which comprises the secondary communication channel; transmitting, by the processing machine of the authenticating entity, secondary authentication information to the customer via the secondary communication channel, the secondary communication channel being different than the primary communication channel; receiving from the computing device of the customer, via the primary communication channel, at least a portion of the secondary authentication information; and processing the received secondary authentication information to authenticate the customer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system that performs multi-channel authentication processing, the system comprising:
-
at least one computer processor; and memory having instructions stored thereon, the instructions, when executed by the at least one processor, cause the at least one processor to perform operations, the operations comprising; receiving primary authentication information from a computing device of a customer via a primary communication channel; authenticating the primary authentication information received from the computing device of the customer, and based on the primary authentication information, retrieving customer information; sending a message to the computing device of the customer, via the primary communication channel, that identifies potential communication channels through which secondary authentication information can be sent, wherein the message does not comprise complete contact information for the potential communication channels; receiving from the computing device of the customer a selection of one of the potential communication channels, which comprises a secondary communication channel; outputting secondary authentication information to the customer via the secondary communication channel that is different than the primary communication channel; receiving from the computing device of the customer, via the primary communication channel, at least a portion of the secondary authentication information; and processing the received secondary authentication information to authenticate the customer. - View Dependent Claims (20, 21, 22, 23, 24)
-
Specification