Bank speech authentication
First Claim
1. A system comprising:
- a processor; and
a non-transitory computer-readable medium storing computer executable instructions thereon executed by the processor to;
determine, by the processor, a number of inputs required for a user to access an enterprise, wherein the number of inputs correlates to a plurality of flags stored in a user profile database, and wherein each input is defined by the user to access a level of security in the enterprise;
receive, by the processor, from an electronic client device associated with the user, a first input, wherein the first input is associated with the user profile, wherein the first input, if successful, results in the processor authenticating the user and providing the user with access to a first level of security in the enterprise;
receive, by the processor, from the electronic client device, at least one of an IP address and a globally unique identifier associated with the electronic client device; and
authenticate, by the processor, the user in association with the user profile database to provide access to a second level in the enterprise, wherein the second level of security is more restricted than the first level of security, wherein the processor authenticates the user based on the first input and at least one of an IP address and a globally unique identifier associated with the electronic client device matching a pre-determined IP address and globally unique identifier within a database associated with the processor.
2 Assignments
0 Petitions
Accused Products
Abstract
Authentication mechanisms are disclosed herein that authenticate user access to enterprises. For example, either an enterprise associated number or a social security number (SSN) can be provided to the enterprise to enter a first level. Then, any one of a ZIP code number, a device calling/contacting number, a date of birth, and a portion of the SSN can be provided to access applications in the first level. Lastly, a PIN can be provided to enter a second level of the enterprise. Additionally, these authentication mechanisms can be added and/or changed. In the former case, if a user used a SSN to enter the mentioned first level of the enterprise, then a date of birth can be used to update an authentication mechanism. Alternatively, if a user used an enterprise number to gain such access, then part of the SSN can be used for the update. If the user wants to change the authentication mechanism, the date of birth can be used for the update.
21 Citations
20 Claims
-
1. A system comprising:
-
a processor; and a non-transitory computer-readable medium storing computer executable instructions thereon executed by the processor to; determine, by the processor, a number of inputs required for a user to access an enterprise, wherein the number of inputs correlates to a plurality of flags stored in a user profile database, and wherein each input is defined by the user to access a level of security in the enterprise; receive, by the processor, from an electronic client device associated with the user, a first input, wherein the first input is associated with the user profile, wherein the first input, if successful, results in the processor authenticating the user and providing the user with access to a first level of security in the enterprise; receive, by the processor, from the electronic client device, at least one of an IP address and a globally unique identifier associated with the electronic client device; and authenticate, by the processor, the user in association with the user profile database to provide access to a second level in the enterprise, wherein the second level of security is more restricted than the first level of security, wherein the processor authenticates the user based on the first input and at least one of an IP address and a globally unique identifier associated with the electronic client device matching a pre-determined IP address and globally unique identifier within a database associated with the processor. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-implemented method for authenticating a user to access a computing service, the method comprising:
-
determining, by a computer, a number of inputs required for a user to access an enterprise, wherein the number of inputs correlates to a plurality of flags stored in a user profile database, and wherein each input is defined by the user to access a level of security in the enterprise; receiving, by the computer, from an electronic client device associated with the user, a first input, wherein the first input is associated with the user profile, wherein the first input, if successful, results in the computer authenticating the user and providing the user with access to a first level of security in the enterprise; receive, by the computer, from the electronic client device, at least one of an IP address and a globally unique identifier associated with the electronic client device; and authenticating, by the computer, the user in association with the user profile database to provide access to a second level in the enterprise, wherein the second level of security is more restricted than the first level of security, wherein the processor authenticates the user based on the first input and at least one of an IP address and a globally unique identifier associated with the electronic client device matching a pre-determined IP address and globally unique identifier within a database associated with the computer. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system authenticating users accessing computing services hosted by an enterprise computing system, the system comprising:
-
a user profile database configured to store a user profile containing one or more inputs associated with a computing service executed by one or more servers of the enterprise; and a computer comprising a processor configured to; determine a number of inputs required for a user to access an enterprise, wherein the number of inputs correlates to a plurality of flags stored in a user profile database, and wherein each input is defined by the user to access a level of security in the enterprise; receive, from an electronic client device associated with the user, a first input, wherein the first input is associated with authenticating the user and for providing the user with access to a first level of security in the enterprise; receive from the electronic client device, one or more attributes corresponding to at least one of an IP address and a globally unique identifier associated with the electronic client device; and authenticate the user in association with the user profile database to provide access to a second level in the enterprise, wherein the second level of security is more restricted than the first level of security, wherein the processor authenticates the user based on the first input and at least one of an IP address and a globally unique identifier associated with the electronic client device matching a pre-determined IP address and globally unique identifier within a database associated with the computer. - View Dependent Claims (18, 19, 20)
-
Specification