×

Method for automatic possession-factor authentication

  • US 9,801,066 B1
  • Filed: 05/03/2017
  • Issued: 10/24/2017
  • Est. Priority Date: 06/02/2016
  • Status: Active Grant
First Claim
Patent Images

1. A system for performing authentication using implicit authentication data provided by a possession factor, the system comprising:

  • a possession factor comprising one of a smartphone or a mobile electronic device having a capability to parse implicit authentication data for use in the implicit authentication for a transaction involving a user and a service provider;

    an authentication platform comprising a remote Internet server, wherein at the authentication platform;

    receiving, via a communication network, an implicit authentication request for initiating the authentication for the transaction based on the possession factor that is associated with the user;

    transmitting, via the communication network, to the possession factor a query to the possession factor requesting implicit authentication data, the implicit authentication data comprising data collected or generated by the possession factor without user intervention and that enables authentication for the transaction;

    in response to transmitting the query, receiving, via the communication network, from the possession factor implicit authentication data from the possession factor;

    generating a possession confidence level using the implicit authentication data, the possession confidence level being one of a plurality of possession confidence levels, the possession confidence level indicating a likelihood that the possession factor is possessed by the authorized user;

    generating authentication requirements based on the possession confidence level, wherein the authentication requirements define a process or an action for performing authentication for the transaction, wherein generating the authentication requirements includes;

    (i) selecting a first of a plurality of different, predefined authentication requirements when the possession confidence level satisfies a first confidence threshold, or(ii) selecting a second of the plurality of different, predefined authentication requirements when the possession confidence level satisfies a second confidence threshold; and

    performing authentication for the transaction in accordance with the selected predefined authentication requirements.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×