Authentication and interaction tracking system and method
First Claim
1. A method for facilitating authentication of entities engaging in transactions, the authentication based on a record of interactions initiated by the entities, the method comprising:
- receiving interaction requests from a requesting entity over a network at a central authentication and interaction tracking system including at least one computer memory and at least one computer processor, the interaction requests originating from the entities using multiple diverse applications and including a plurality of authentication factors;
executing instructions stored in the computer memory using the computer processor to perform steps including;
deriving, from each interaction request, an entity print for each requesting entity;
building, from each interaction request, an interaction signature;
classifying each interaction signature as at least one of a valid interaction signature or a fraudulent interaction signature;
processing the interaction signature with previously classified interaction signatures;
comparing the derived entity print with a pre-existing historical entity;
generating, based at least on said steps of processing and comparing, a confidence level that a requesting entity is authentic and a risk level associated with authenticity of the interaction request;
determining the risk level and confidence level meet requirements for authentication according to at least one policy;
providing positive feedback to an authentication engine when the risk level and confidence level meet requirements for authentication and opening an authentication dialog with the authentication engine when the risk level and confidence level do not meet the requirements;
executing policy rule sets at the authentication engine during the authentication dialogue to reach an authentication conclusion, the conclusion including one of a requirement for more information, a positive authentication decision, and a negative authentication decision.
1 Assignment
0 Petitions
Accused Products
Abstract
Aspects of the invention relate to a central authentication and interaction tracking system for authenticating an entity making a request related to a financial account. The system facilitates authentication of an entity engaging in an interaction with a financial institution, the authentication based on a record of interactions initiated by the entity. The system includes an application interface receiving interaction requests over a network, the interaction requests originating from multiple entities and including a plurality of authentication factors. The system further includes a computer processor and computer memory capable of building, from each interaction request, an entity print record for each of the multiple entities, wherein each entity print record includes indicators of the authentication factors from each initiated transaction request. The system further facilitates deriving, from the entity print record, an entity print and storing the entity print in at least one computer memory, comparing received authentication factors for a requested interaction with the entity print, and making an authentication determination based on the comparison.
-
Citations
21 Claims
-
1. A method for facilitating authentication of entities engaging in transactions, the authentication based on a record of interactions initiated by the entities, the method comprising:
-
receiving interaction requests from a requesting entity over a network at a central authentication and interaction tracking system including at least one computer memory and at least one computer processor, the interaction requests originating from the entities using multiple diverse applications and including a plurality of authentication factors; executing instructions stored in the computer memory using the computer processor to perform steps including; deriving, from each interaction request, an entity print for each requesting entity; building, from each interaction request, an interaction signature; classifying each interaction signature as at least one of a valid interaction signature or a fraudulent interaction signature; processing the interaction signature with previously classified interaction signatures; comparing the derived entity print with a pre-existing historical entity; generating, based at least on said steps of processing and comparing, a confidence level that a requesting entity is authentic and a risk level associated with authenticity of the interaction request; determining the risk level and confidence level meet requirements for authentication according to at least one policy; providing positive feedback to an authentication engine when the risk level and confidence level meet requirements for authentication and opening an authentication dialog with the authentication engine when the risk level and confidence level do not meet the requirements; executing policy rule sets at the authentication engine during the authentication dialogue to reach an authentication conclusion, the conclusion including one of a requirement for more information, a positive authentication decision, and a negative authentication decision. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for facilitating authentication of entities engaging in transactions, the authentication based on a record of interactions initiated by the entities, the method comprising:
-
receiving interaction requests from a requesting entity over a network at a central authentication and interaction tracking system including at least one computer memory and at least one computer processor, the interaction requests originating from the entities using multiple diverse applications and including a plurality of authentication factors; executing instructions stored in the computer memory using the computer processor to perform steps including; deriving, from each interaction request, an entity print for each requesting entity, wherein each entity print incorporates the authentication factors from each initiated interaction request, the authentication factors including multiple factors selected from the group including temporal transaction features, geographical transactions features, parties to transaction, identity of accounts, access method, device identifiers, personal identifiers, and authentication method utilized; comparing the derived entity print with a pre-existing historical entity print to produce an identity confidence level for the requesting entity and a risk level for the requesting entity; building from each interaction request, an interaction signature for each interaction and classifying each interaction signature as a valid interaction signature or a fraudulent interaction signature; comparing the received authentication factors for a requested interaction with the entity print and comparing the interaction signature for a received interaction request with the classified interaction signatures, wherein the comparisons yield a level of risk for each transaction; determining the risk level and confidence level meet requirements for authentication according to at least one policy; providing positive feedback to an authentication engine when the risk level and confidence level meet requirements for authentication and opening an authentication dialog with the authentication engine when the risk level and confidence level do not meet the requirements; executing policy rule sets at the authentication engine during the authentication dialogue to reach an authentication conclusion, the conclusion including one of a requirement for more information, a positive authentication decision, and a negative authentication decision; passing the conclusion from the authentication engine to an application utilized to initiate the interaction request, the application selected from the multiple diverse applications.
-
-
11. A central authentication and interaction tracking system for facilitating authentication of entities engaging in transactions, the authentication based on a record of interactions initiated by the entities, the method comprising:
-
an application interface receiving interaction requests from a requesting entity over a network, the interaction requests originating from the entities using multiple diverse applications and including a plurality of authentication factors; at least one computer memory storing information from the interaction requests and instructions for processing the information; and at least one computer processor accessing the computer memory and executing the stored instructions in the computer memory to perform steps including; deriving, from each interaction request, an entity print for each requesting entity; building, from each interaction request, an interaction signature; classifying each interaction signature as at least one of a valid interaction signature or a fraudulent interaction signature; processing the interaction signature with previously classified interaction signatures; comparing the derived entity print with a pre-existing historical entity print; generating, based at least on said steps of processing and comparing, a confidence level that a requesting entity is authentic and a risk level associated with authenticity of the interaction request; determining the risk level and confidence level meet requirements for authentication according to at least one policy; providing positive feedback to an authentication engine when the risk level and confidence level meet requirements for authentication and opening an authentication dialog with the authentication engine when the risk level and confidence level do not meet the requirements; executing policy rule sets at the authentication engine during the authentication dialogue to reach an authentication conclusion, the conclusion including one of a requirement for more information, a positive authentication decision, and a negative authentication decision. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A central authentication and interaction tracking system for facilitating authentication of entities engaging in transactions, the authentication based on a record of interactions initiated by the entities, the method comprising:
-
an application interface receiving interaction requests from a requesting entity over a network, the interaction requests originating from the entities using multiple diverse applications and including a plurality of authentication factors; at least one computer memory storing information from the interaction requests and instructions for processing the information; and at least one computer processor accessing the computer memory and executing the stored instructions in the computer memory to perform steps including; receiving interaction requests from a requesting entity over a network at a central authentication and interaction tracking system including at least one computer memory and at least one computer processor, the interaction requests originating from the entities using multiple diverse applications and including a plurality of authentication factors; executing instructions stored in the computer memory using the computer processor to perform steps including; deriving, from each interaction request, an entity print for each requesting entity, wherein each entity print incorporates the authentication factors from each initiated interaction request, the authentication factors including multiple factors selected from the group including temporal transaction features, geographical transactions features, parties to transaction, identity of accounts, access method, device identifiers, personal identifiers, and authentication method utilized; comparing the derived entity print with a pre-existing historical entity print to produce an identity confidence level for the requesting entity and a risk level for the requesting entity; building from each interaction request, an interaction signature for each interaction and classifying each interaction signature as a valid interaction signature or a fraudulent interaction signature; comparing the received authentication factors for a requested interaction with the entity print and comparing the interaction signature for a received interaction request with the classified interaction signatures, wherein the comparisons yield a level of risk for each transaction; determining the risk level and confidence level meet requirements for authentication according to at least one policy; providing positive feedback to an authentication engine when the risk level and confidence level meet requirements for authentication and opening an authentication dialog with the authentication engine when the risk level and confidence level do not meet the requirements; executing policy rule sets at the authentication engine during the authentication dialogue to reach an authentication conclusion, the conclusion including one of a requirement for more information, a positive authentication decision, and a negative authentication decision; and passing the conclusion from the authentication engine to an application utilized to initiate the interaction request, the application selected from the multiple diverse applications.
-
-
21. A non-transitory computer readable storing instructions for facilitating authentication of entities engaging in transactions, the authentication based on a record of interactions initiated by the entities, the instructions executed by a computer processor to perform steps including:
-
receiving interaction requests from a requesting entity over a network at a central authentication and interaction tracking system including at least one computer memory and at least one computer processor, the interaction requests originating from the entities using multiple diverse applications and including a plurality of authentication factors; deriving, from each interaction request, an entity print for each requesting entity; building, from each interaction request, an interaction signature; classifying each interaction signature as at least one of a valid interaction signature or a fraudulent interaction signature; processing the interaction signature with previously classified interaction signatures; comparing the derived entity print with a pre-existing historical entity print; generating, based at least on said steps of processing and comparing, a confidence level that a requesting entity is authentic and a risk level associated with authenticity of the interaction request; determining the risk level and confidence level meet requirements for authentication according to at least one policy; providing positive feedback to an authentication engine when the risk level and confidence level meet requirements for authentication and opening an authentication dialog with the authentication engine when the risk level and confidence level do not meet the requirements; executing policy rule sets at the authentication engine during the authentication dialogue to reach an authentication conclusion, the conclusion including one of a requirement for more information, a positive authentication decision, and a negative authentication decision; and passing the conclusion from the authentication engine to an application utilized to initiate the interaction request, the application selected from the multiple diverse applications.
-
Specification