Method for automatic possession-factor authentication
First Claim
1. A system for performing authentication using implicit authentication data provided by a possession factor, the system comprising:
- a possession factor comprising one of a smartphone or a mobile electronic device having a capability to parse implicit authentication data for use in the implicit authentication for a transaction involving a user and a service provider;
an authentication platform comprising a remote Internet server, wherein at the authentication platform;
receiving, via a communication network, an implicit authentication request for initiating the authentication for the transaction based on the possession factor that is associated with the user;
transmitting, via the communication network, to the possession factor a query to the possession factor requesting implicit authentication data, the implicit authentication data comprising data collected or generated by the possession factor without user intervention and that enables authentication for the transaction;
in response to transmitting the query, receiving, via the communication network, from the possession factor implicit authentication data from the possession factor;
generating a possession confidence level using the implicit authentication data, the possession confidence level being one of a plurality of possession confidence levels, the possession confidence level indicating a likelihood that the possession factor is possessed by the authorized user;
generating authentication requirements based on the possession confidence level, wherein the authentication requirements define a process or an action for performing authentication for the transaction, wherein generating the authentication requirements includes;
(i) selecting a first of a plurality of different, predefined authentication requirements when the possession confidence level satisfies a first confidence threshold, or(ii) selecting a second of the plurality of different, predefined authentication requirements when the possession confidence level satisfies a second confidence threshold; and
performing authentication for the transaction in accordance with the selected predefined authentication requirements.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided that include: accessing implicit authentication data from a possession factor associated with an authorized user; at the possession factor or at an authentication platform: generating a possession confidence level using the implicit authentication data, the possession confidence level being one of a plurality of possession confidence levels, the possession confidence level indicating a likelihood that the possession factor is possessed by the authorized user; identifying, among a plurality of varying authentication requirements, an authentication requirement for the transaction based on the possession confidence level, the authentication requirement defines a process or action to prove authority to perform the transaction or a process or action to prove an identity of a user attempting to perform the transaction; and implementing the authentication requirement for the transaction.
68 Citations
20 Claims
-
1. A system for performing authentication using implicit authentication data provided by a possession factor, the system comprising:
-
a possession factor comprising one of a smartphone or a mobile electronic device having a capability to parse implicit authentication data for use in the implicit authentication for a transaction involving a user and a service provider; an authentication platform comprising a remote Internet server, wherein at the authentication platform; receiving, via a communication network, an implicit authentication request for initiating the authentication for the transaction based on the possession factor that is associated with the user; transmitting, via the communication network, to the possession factor a query to the possession factor requesting implicit authentication data, the implicit authentication data comprising data collected or generated by the possession factor without user intervention and that enables authentication for the transaction; in response to transmitting the query, receiving, via the communication network, from the possession factor implicit authentication data from the possession factor; generating a possession confidence level using the implicit authentication data, the possession confidence level being one of a plurality of possession confidence levels, the possession confidence level indicating a likelihood that the possession factor is possessed by the authorized user; generating authentication requirements based on the possession confidence level, wherein the authentication requirements define a process or an action for performing authentication for the transaction, wherein generating the authentication requirements includes; (i) selecting a first of a plurality of different, predefined authentication requirements when the possession confidence level satisfies a first confidence threshold, or (ii) selecting a second of the plurality of different, predefined authentication requirements when the possession confidence level satisfies a second confidence threshold; and performing authentication for the transaction in accordance with the selected predefined authentication requirements. - View Dependent Claims (2, 3, 4)
-
-
5. A method for performing implicit authentication for a transaction based on a possession factor, the method comprising:
-
receiving, via a remote Internet server, a transaction request; responsive to receiving the transaction request, accessing implicit authentication data from a possession factor associated with an authorized user, the implicit authentication data comprising data that is captured automatically by the possession factor and relating to one or more of an operation of one or more sensors of the possession factor and a usage of the possession factor, at the possession factor or at an authentication platform, wherein the possession factor comprises a mobile computing device, and wherein the authentication platform comprises a remote computing server; generating a possession confidence level using the implicit authentication data, the possession confidence level being one of a plurality of possession confidence levels, the possession confidence level indicating a likelihood that the possession factor is possessed by the authorized user; identifying, among a plurality of varying authentication requirements, an authentication requirement for the transaction based on the possession confidence level, the authentication requirement defines a process or action to prove authority to perform the transaction or a process or action to prove an identity of a user attempting to perform the transaction, wherein identifying the authentication requirement for the transaction includes; (i) selecting a first of a plurality of different, predefined authentication requirements when the possession confidence level satisfies a first confidence threshold, or (ii) selecting a second of the plurality of different, predefined authentication requirements when the possession confidence level satisfies a second confidence threshold; and implementing the selected predefined authentication requirements for the transaction. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method for executing authentication for a transaction between an authorized user and a service provider, the method comprising:
-
in response to receiving, at the service provider, primary authentication data associated with a primary authentication for the transaction, initializing a secondary authentication for the transaction using implicit authentication data from a possession factor associated with the authorized user, wherein initializing the secondary transaction includes transmitting a transaction request associated with the transaction, via a network, to a remote secondary authentication computing server, wherein the implicit authentication data comprises data that enables a determination of whether the possession factor is currently or near currently in possession of the authorized user, wherein the implicit authentication data is collected by the possession factor during a normal course of operation of the possession factor without user assistance in the collection; generating a likelihood of possession based on the implicit authentication data; identifying an authentication action or an authentication process for implementing the secondary authentication using the likelihood of possession to inform a selection of the authentication action or the authentication process from among a plurality of authentication actions or a plurality of authentication processes, wherein identifying the authentication action or the authentication process for implementing the secondary authentication includes; (i) selecting a first of a plurality of different, predefined authentication actions or predefined authentication processes when the likelihood of possession satisfies a first possession threshold, or (ii) selecting a second of the plurality of different, predefined authentication actions or predefined authentication processes when the likelihood of possession satisfies a second possession threshold; and performing the secondary authentication in accordance with the selected predefined authentication action or the selected predefined authentication process. - View Dependent Claims (19, 20)
-
Specification