Methods and systems for increasing the security of network-based transactions
First Claim
1. A method for increasing the security of network-based transactions comprising:
- determining, by a processor, an authentication data requirement based on a transaction requested to be conducted by a user and displaying the authentication data requirement on a mobile communications device, the authentication data requirement being at least a voice phrase that describes details of the requested transaction;
determining whether the displayed authentication data requirement agrees with an authentication data requirement anticipated by the user for the requested transaction; and
capturing authentication data from the user in accordance with the displayed authentication data requirement when the displayed authentication data requirement agrees with the anticipated authentication data requirement.
3 Assignments
0 Petitions
Accused Products
Abstract
A method for enhancing the security of systems and resources involved in conducting network-based transactions on mobile communications devices includes comparing authentication data requested to be captured from a user as part of an authentication transaction against authentication data anticipated by the user to be captured during the authentication transaction. The method also includes authenticating the requested transaction when the user decides that the requested authentication data agrees with the anticipated authentication data, and conducting a network-based transaction from a mobile communications device, if the user is authorized, after successfully authenticating the identity of the user.
17 Citations
19 Claims
-
1. A method for increasing the security of network-based transactions comprising:
-
determining, by a processor, an authentication data requirement based on a transaction requested to be conducted by a user and displaying the authentication data requirement on a mobile communications device, the authentication data requirement being at least a voice phrase that describes details of the requested transaction; determining whether the displayed authentication data requirement agrees with an authentication data requirement anticipated by the user for the requested transaction; and capturing authentication data from the user in accordance with the displayed authentication data requirement when the displayed authentication data requirement agrees with the anticipated authentication data requirement. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for increasing the security of network-based transactions comprising:
-
a mobile communications device configured to capture authentication data during authentication transactions and conduct network-based transactions; a service provider system including a database and being configured to control access to resources relating to users enrolled therein and to conduct network-based transactions; and an authentication system comprising an authentication database, said authentication system, said mobile communications device, and said service provider system being configured to communicate over a network, said authentication system being configured to store at least enrollment authentication data for users and live-ness detection data, determine authentication data requirements and live-ness detection data, include at least a determined authentication data requirement in a capture request message, transmit the capture request message to said mobile communications device which displays an authentication data requirement for the user to see, and authenticate the user when the displayed authentication data requirement agrees with authentication data anticipated for a transaction requested by the user, the displayed authentication data requirement being at least a voice phrase describing the requested transaction details. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A method for enhancing the security of systems and resources used for conducting network-based transactions comprising:
-
comparing authentication data requested to be captured from a user during an authentication transaction against authentication data anticipated by the user to be captured during the authentication transaction; authenticating a transaction requested by the user when the user decides that the requested authentication data agrees with the anticipated authentication data, the requested authentication data being at least a voice phrase describing details of the requested transaction; and after successfully authenticating the user, conducting the requested transaction from a mobile communications device. - View Dependent Claims (15, 16, 17, 18, 19)
-
Specification