METHODS AND SYSTEMS FOR AUTHENTICATING USERS
First Claim
1. A method for authenticating users comprising:
- obtaining at least one unique user identifier from a user;
determining whether the obtained at least one unique user identifier matches a user identifier and, upon determining a match, determining a risk level corresponding to a transaction;
determining a biometric authentication data requirement corresponding to the determined risk level with a processor;
validating the user with data corresponding to the biometric authentication data requirement; and
conducting the transaction after successfully validating the user.
0 Assignments
0 Petitions
Accused Products
Abstract
A method of authenticating users to reduce transaction risks includes indicating a desire to conduct a transaction, inputting information in a workstation, and determining whether the inputted information is known. Moreover, the method includes determining a state of a communications device when the inputted information is known, and transmitting a biometric authentication request from a server to a workstation when the state of the communications device is enrolled. Additionally, the method includes obtaining biometric authentication data in accordance with a biometric authentication data capture request with the communications device, biometrically authenticating the user, generating a one-time pass-phrase and storing the one-time pass-phrase on the authentication system when the user is authenticated, comparing the transmitted one-time pass-phrase against the stored one-time pass-phrase, and conducting the transaction when the transmitted and stored one-time pass-phrases match.
26 Citations
16 Claims
-
1. A method for authenticating users comprising:
-
obtaining at least one unique user identifier from a user; determining whether the obtained at least one unique user identifier matches a user identifier and, upon determining a match, determining a risk level corresponding to a transaction; determining a biometric authentication data requirement corresponding to the determined risk level with a processor; validating the user with data corresponding to the biometric authentication data requirement; and conducting the transaction after successfully validating the user. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for authenticating users comprising:
-
determining a risk level corresponding to a transaction desired to be conducted by a user and including the determined risk level in an authentication request; extracting the determined risk level from the authentication request and determining an authentication data requirement corresponding to the determined risk level with a processor; and validating the user with data corresponding to the authentication data requirement. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A hand-held authentication system comprising:
-
a processor; and a memory configured to store at least user authentication data, said system being configured to; extract a risk level corresponding to a transaction desired to be conducted by a user from an authentication request; determine a biometric authentication data requirement corresponding to the risk level; and validate the user with data corresponding to the biometric authentication data requirement. - View Dependent Claims (16)
-
Specification