System and method for authentication of network users
DCFirst Claim
1. A method of authenticating a user on a network, said method comprising:
- a) performing a first authentication step based on a first type of information; and
b) performing at least a second authentication step based on a second type of information other than the first type of information, wherein at least one of step (a) and step (b) comprises generating an interactive query, the interactive query comprising at least one question having multiple-choice answers, wherein only one of the answers is the correct answer.
1 Assignment
Litigations
0 Petitions
Accused Products
Abstract
A network authentication system provides verification of the identity or other attributes of a network user to conduct a transaction, access data or avail themselves of other resources. The user is presented with a hierarchy of queries based on wallet-type (basic identification) and non-wallet type (more private) information designed to ensure the identity of the user and prevent fraud, false negatives and other undesirable results. A preprocessing stage may be employed to ensure correct formatting of the input information and clean up routine mistakes (such as missing digits, typos, etc.) that might otherwise halt the transaction. Queries can be presented in interactive, batch processed, or other format. The authenticator can be configured to require differing levels of input or award differing levels of authentication according to security criteria.
689 Citations
50 Claims
-
1. A method of authenticating a user on a network, said method comprising:
-
a) performing a first authentication step based on a first type of information; and
b) performing at least a second authentication step based on a second type of information other than the first type of information, wherein at least one of step (a) and step (b) comprises generating an interactive query, the interactive query comprising at least one question having multiple-choice answers, wherein only one of the answers is the correct answer. - View Dependent Claims (2, 3, 4)
-
-
5. A method of authenticating a user on a network, said method comprising:
-
a) performing a first authentication step based on a first type of information; and
b) performing at least a second authentication step based on a second type of information other than the first type of information, the second type of information comprising information pertaining to credit accounts to which the user is a party, the information pertaining to credit accounts comprising mortgage loan information, wherein the user is requested to identify at least one of;
i) mortgage lender information; and
ii) mortgage loan amount information. - View Dependent Claims (6, 7, 8)
-
-
9. A method of authenticating a user on a network, said method comprising:
-
a) performing a first authentication step based on a first type of information, performing a first authentication step further comprising;
i) obtaining the first type of information from the user;
ii) retrieving user identification information from a data source;
iii) comparing the first type of information supplied by the user with the user identification information retrieved from the data source; and
iv) determining a level of correspondence between the first type of information supplied by the user and the user identification information retrieved from the data source; and
b) performing at least a second authentication step based on a second type of information other than the first type of information, wherein the data source for the first type of information is used to identify the availability of the second type of information for the user. - View Dependent Claims (10, 11, 12)
-
-
13. A method of authenticating a user on a network, said method comprising:
-
a) performing a first authentication step based on a first type of information;
b) performing at least a second authentication step based on a second type of information other than the first type of information; and
c) storing a transaction record of the first authentication step. - View Dependent Claims (14, 15, 16)
-
-
17. A method of authenticating a user on a network, said method comprising;
-
a) performing a first authentication step based on a first type of information;
b) performing at least a second authentication step based on a second type of information other than the first type of information; and
c) executing a pattern recognition process to detect potential irregularities in at least one of the first type of information and the second type of information. - View Dependent Claims (18, 19, 20)
-
-
21. A method of authenticating a user on a network, said method comprising:
-
a) performing a first authentication step based on a first type of information;
b) performing at least a second authentication step based on a second type of information other than the first type of information; and
c) performing a remote authentication step based upon at least one of the first type of information and the second type of information. - View Dependent Claims (22, 23, 24, 25)
-
-
26. A system for authenticating a user on a network, said system comprising:
-
an input interface for receiving input from the user; and
a processor connected to the input interface and configured to;
perform a first authentication based on a first type of information; and
perform at least a second authentication based on a second type of information other than the first type of information, wherein the processor generates an interactive query, the interactive query comprising at least one question having multiple-choice answers wherein only one of the answers is the correct answer. - View Dependent Claims (27, 28, 29)
-
-
30. A system for authenticating a user on a network, said system comprising:
-
an input interface for receiving input from the user; and
a processor connected to the input interface and configured to;
perform a first authentication based on a first type of information, the first type of information comprising wallet-type information; and
performing at least a second authentication based on a second type of information other than the first type of information wherein the second type of information comprises non-wallet type information and pertains to credit accounts to which the user is a party, the second type of information pertaining to credit accounts further comprising mortgage loan information, and performing at least a second authentication further comprises a request for the user to identify at least one of;
mortgage lender information; and
mortgage loan amount information. - View Dependent Claims (31, 32, 33, 39)
-
-
34. A system for authenticating a user on a network, said system comprising:
-
an input interface for receiving input from the user; and
a processor connected to the input interface and configured to;
perform a first authentication step based on a first type of information, the first authentication comprising obtaining the first type of information from the user;
retrieving user identification information from a data source;
comparing the first type of information supplied by the user with the user identification information retrieved from the data source; and
determining a level of correspondence between the first type of information supplied by the user and the user identification information retrieved from the data source; and
perform at least a second authentication step based on a second type of information other than the first type of information, wherein the user identification information retrieved from the data source is used to identify the availability of the second type of information for the user. - View Dependent Claims (35, 36, 37)
-
-
38. A system for authenticating a user on a network, said system comprising:
-
an input interface for receiving input from the user; and
a processor, connected to the input interface and configured to;
perform a first authentication step based on a first type of information; and
perform at least a second authentication step based on a second type of information other than the first type of information, wherein the processor stores a transaction record of the first authentication step. - View Dependent Claims (40, 41)
-
-
42. A system for authenticating a user on a network, said system comprising:
-
an input interface for receiving input from the user; and
a processor, connected to the input interface and configured to;
perform a first authentication step based on a first type of information; and
perform at least a second authentication step based on a second type of information other than the first type of information, wherein the processor executes a pattern recognition process to detect potential irregularities in the input supplied by the user. - View Dependent Claims (43, 44, 45)
-
-
46. A system for authenticating a user on a network, said system comprising:
-
an input interface for receiving input from the user; and
a processor, connected to the input interface and configured to;
perform a first authentication step based on a first type of information; and
perform at least a second authentication step based on a second type of information other than the first type of information, wherein the processor further performs a remote authentication step based upon at least one of the first type of information and the second type of information. - View Dependent Claims (47, 48, 49, 50)
-
Specification