System and method for utilizing behavioral characteristics in authentication and fraud prevention
First Claim
1. A method of verifying that a user is authorized to access a computer-accessible resource, the method comprising:
- maintaining, for a plurality of authenticated users, data reflecting historical voice call characteristics indicative of each of the authenticated users;
maintaining a communication number of a verification device associated with a user;
receiving a request by the user to access a computer-accessible resource;
utilizing the communication number to establish a voice call session with the user'"'"'s verification device in order to send a request that the user perform a verification action;
monitoring one or more voice call characteristics during the voice call session, the monitored one or more voice call characteristics including timing data related to the voice call session;
determining whether the user successfully performed the requested verification action;
determining whether an authentication rule has been satisfied by;
identifying the authenticated user that the user purports to be,comparing the monitored one or more voice call characteristics of the user to the maintained voice call characteristics of the authenticated user, andevaluating whether the monitored one or more voice call characteristics fall within ranges of the authenticated user'"'"'s voice call characteristics; and
if the verification action has been successfully completed by the user and if the authentication rule has been satisfied by the monitored voice call characteristics, generating an authentication response that indicates that the user has been authenticated for access to the computer-accessible resource.
0 Assignments
0 Petitions
Accused Products
Abstract
A behavioral characteristics authentication system and method (“BCA system”) that facilitates authentication of the identity of a user, registrant, or applicant of a website, application, or other accessible computer resource using a verification process that incorporates behavioral characteristics. In operation, the BCA system compares a single user'"'"'s behavior with their previous behavior, a user'"'"'s behavior with behavior generally attributed to non-fraudulent behavior, or a user'"'"'s behavior with behavior generally attributed to fraudulent behavior. The population of other users that a user'"'"'s behavior is compared with may be selected to have similar demographic or other characteristics as the user. By analyzing various behavioral characteristics associated with legitimate or fraudulent multi-factor authentication attempts, the BCA system adds another layer of security to online transactions.
-
Citations
20 Claims
-
1. A method of verifying that a user is authorized to access a computer-accessible resource, the method comprising:
-
maintaining, for a plurality of authenticated users, data reflecting historical voice call characteristics indicative of each of the authenticated users; maintaining a communication number of a verification device associated with a user; receiving a request by the user to access a computer-accessible resource; utilizing the communication number to establish a voice call session with the user'"'"'s verification device in order to send a request that the user perform a verification action; monitoring one or more voice call characteristics during the voice call session, the monitored one or more voice call characteristics including timing data related to the voice call session; determining whether the user successfully performed the requested verification action; determining whether an authentication rule has been satisfied by; identifying the authenticated user that the user purports to be, comparing the monitored one or more voice call characteristics of the user to the maintained voice call characteristics of the authenticated user, and evaluating whether the monitored one or more voice call characteristics fall within ranges of the authenticated user'"'"'s voice call characteristics; and if the verification action has been successfully completed by the user and if the authentication rule has been satisfied by the monitored voice call characteristics, generating an authentication response that indicates that the user has been authenticated for access to the computer-accessible resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A non-transitory computer-readable medium encoded with instructions that, when executed by a processor, perform a method of verifying that a user is authorized to access a computer-accessible resource, the method comprising:
-
maintaining, for a plurality of authenticated users, data reflecting historical voice call characteristics indicative of each of the authenticated users; maintaining a communication number of a verification device associated with a user; receiving a request by the user to access a computer-accessible resource; utilizing the communication number to establish a voice call session with the user'"'"'s verification device in order to send a request that the user perform a verification action; monitoring one or more voice call characteristics during the voice call session, the monitored one or more voice call characteristics including timing data related to the voice call session; determining whether the user successfully performed the requested verification action; determining whether an authentication rule has been satisfied by; identifying the authenticated user that the user purports to be, comparing the monitored one or more voice call characteristics of the user to the maintained voice call characteristics of the authenticated user, and evaluating whether the monitored one or more voice call characteristics fall within ranges of the authenticated user'"'"'s voice call characteristics; and if the verification action has been successfully completed by the user and if the authentication rule has been satisfied by the monitored voice call characteristics, generating an authentication response that indicates that the user has been authenticated for access to the computer-accessible resource. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A system for verifying that a user is authorized to access a computer-accessible resource, the system comprising:
-
a user history database configured to maintain, for a plurality of authenticated users, data reflecting historical voice call characteristics indicative of each of the authenticated users; a user accounts database configured to maintain a communication number of a verification device associated with a user; a behavioral monitoring module configured to monitor one or more voice call characteristics during a voice call session, the monitored one or more voice call characteristics including timing data related to the voice call session; and a user authentication module configured to; receive a request by the user to access a computer-accessible resource; utilize the communication number to establish the voice call session with the user'"'"'s verification device in order to send a request that the user perform a verification action; determine whether the user successfully performed the requested verification action; determine whether an authentication rule has been satisfied by; identifying the authenticated user that the user purports to be, comparing the monitored one or more voice call characteristics of the user to the maintained voice call characteristics of the authenticated user, and evaluating whether the monitored one or more voice call characteristics fall within ranges of the authenticated user'"'"'s voice call characteristics; and if the verification action has been successfully completed by the user and if the authentication rule has been satisfied by the monitored voice call characteristics, generate an authentication response that indicates that the user has been authenticated for access to the computer-accessible resource. - View Dependent Claims (18, 19, 20)
-
Specification