Methods and systems for authenticating users
First Claim
1. A method for authenticating users comprising:
- obtaining a unique user identifier from a user;
determining whether the obtained unique user identifier matches a user identifier and, upon determining a match, determining a risk level corresponding to a transaction;
determining a capture level for the determined risk level;
after inputting the capture level into a processor, determining a biometric authentication data requirement corresponding to the capture level with the processor;
validating the user with data corresponding to the biometric authentication data requirement; and
conducting the transaction after successfully validating the user.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of authenticating users to reduce transaction risks includes indicating a desire to conduct a transaction and determining whether the transaction requires access to protected resources. Moreover, the method determines whether inputted information is known, determines a state of a communications device when the inputted information is known, and transmits a biometric authentication request from a server to an authentication system when the state of the communications device is enrolled. Additionally, the method includes validating the communications device, capturing biometric authentication data in accordance with a biometric authentication data capture request with the communications device, biometrically authenticating the user, generating a one-time pass-phrase and storing the one-time pass-phrase on the authentication system when the user is authenticated, comparing the transmitted one-time pass-phrase against the stored one-time pass-phrase, and granting access to the protected resources when the transmitted and stored one-time pass-phrases match.
287 Citations
19 Claims
-
1. A method for authenticating users comprising:
-
obtaining a unique user identifier from a user; determining whether the obtained unique user identifier matches a user identifier and, upon determining a match, determining a risk level corresponding to a transaction; determining a capture level for the determined risk level; after inputting the capture level into a processor, determining a biometric authentication data requirement corresponding to the capture level with the processor; validating the user with data corresponding to the biometric authentication data requirement; and conducting the transaction after successfully validating the user. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for authenticating users comprising:
-
determining a risk level corresponding to a transaction desired to be conducted by a user and including the determined risk level in an authentication request; determining a capture level for the determined risk level; after inputting the capture level into a processor, determining an authentication data requirement corresponding to the capture level with the processor; and validating the user with data corresponding to the authentication data requirement. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method for authenticating users comprising:
-
determining a risk level for a transaction desired to be conducted by a user and including the determined risk level in an authentication request; extracting the risk level from the authentication request with a processor; and determining an authentication data requirement corresponding to the risk level. - View Dependent Claims (17, 18)
-
-
19. A method for authenticating users comprising:
-
conducting, by a processor, a first authentication transaction with face biometric data captured from a user to authenticate the user; conducting a second authentication transaction with authentication data captured from the user to authenticate the user after successfully authenticating the user in the first authentication transaction, the authentication data for the second transaction being different than the authentication data for the first transaction; and validating the user after the user is successfully authenticated in the second authentication transaction.
-
Specification