The present invention includes a system for authenticating a second action based on a first action, wherein the system is configured to: receive a first request to execute a first action associated with a first application; determine that execution of the first action requires user authentication; r
The present invention includes a system for authenticating a second action based on a first action, wherein the system is configured to: receive a first request to execute a first action associated with a first application; determine that execution of the first action requires user authentication; request one or more authentication credentials from the user; receive a first authentication credential associated with the first action; validate the first authentication credential, thereby resulting in a successful validation of the received first authentication credential; in response to the successful validation, execute the first action; receive a second request to execute a second action associated with a second application; determine that execution of the second action requires user authentication; use the successful validation of the first authentication credential to validate a second authentication credential so that the second action may be executed.
대표청구항▼
1. A system for authenticating a user, the system comprising: a memory;at least one hardware processor; anda module stored in memory comprising computer instruction code executable by the at least one hardware processor, and structured to cause the at least one hardware processor to: receive a first
1. A system for authenticating a user, the system comprising: a memory;at least one hardware processor; anda module stored in memory comprising computer instruction code executable by the at least one hardware processor, and structured to cause the at least one hardware processor to: receive a first request to execute a first action associated with a first application;determine that execution of the first action requires user authentication;request one or more authentication credentials from the user;receive a first authentication credential associated with the first action, wherein the first authentication credential is associated with a zero authentication, a soft authentication, or a hard authentication, wherein receiving the hard authentication comprises enabling the user to execute all actions associated with the first application, wherein receiving the soft authentication comprises enabling the user to execute to at least one action associated with the first application, wherein receiving zero authentication comprises denying the user access to at least one action associated with the first application;validate the first authentication credential, thereby resulting in a successful validation of the received first authentication credential;in response to the successful validation, execute the first action;receive a second request to execute a second action associated with a second application, wherein the second application is associated with the first application whereby the second application is accessible using the first application, wherein the second request is associated with the execution of the first action;determine that execution of the second action requires user authentication;determine a digital footprint of the user based on at least the first action executed by the user, wherein the digital footprint of the user comprises one or more previous actions executed by the user, wherein the one or more actions executed by the user comprises the execution of first action, wherein the digital footprint is used as a second authentication credential required to access the second application; andvalidate the digital footprint indicating that the first action executed by the user is successfully authenticated;in response to the successful validation of the digital footprint, execute the second action. 2. The system of claim 1, wherein the first application is associated with at least one of a third party, a social media network, a website, and an overarching operating system. 3. The system of claim 1, wherein at least one of the one or more authentication credentials, the first authentication credential, and the second authentication credential comprises at least one of a user authentication, a username, a password, a passcode, a personal identification number (PIN), a secret question, a received input, and a biometric indicia. 4. The system of claim 1, wherein receiving the first authentication credential comprises receiving input from a user. 5. The system of claim 1, wherein the second application is associated with a financial institution. 6. The system of claim 1, wherein validating at least one of the first authentication credential and the second authentication credential comprises: comparing at least one of the first authentication credential and the second authentication credential to a plurality of authentication credentials in a database, wherein the plurality of authentication credentials are associated with positive validation; and determining a match between at least one of the first authentication credential and the second authentication credential and at least one authentication credential in the plurality of authentication credentials in the database. 7. The system of claim 1, wherein validating at least one of the first authentication credential and the second authentication credential comprises: comparing at least one of the first authentication credential and the second authentication credential to a plurality of authentication credentials in a database, wherein the plurality of authentication credentials are associated with positive validation; and determining there is no match between at least one of the first authentication credential and the second authentication credential and at least one authentication credential in the plurality of authentication credentials in the database. 8. The system of claim 7, wherein determining there is no match between at least one of the first authentication credential and the second authentication credential and at least one authentication credential in the plurality of authentication credentials in the database comprises restricting execution of the second action. 9. The system of claim 7, wherein determining there is no match between at least one of the first authentication credential and the second authentication credential and at least one authentication credential in the plurality of authentication credentials in the database comprises prompting a user for input of at least one additional authentication credential. 10. The system of claim 1, wherein the second action comprises at least one of a funds transfer, viewing an account summary, a deposit, a withdrawal, and viewing a receipt. 11. The system of claim 10, wherein executing the second action requires validation of the second authentication credential. 12. The system of claim 1, wherein receiving zero authentication associated with at least one of the first authentication credential and the second authentication credential comprises: counting a number of failed validation attempts associated with at least one of the first authentication credential and the second authentication credential; comparing the number of failed validation attempts to a predetermined threshold value associated with positive validation; determining that the number of failed validation attempts is greater than the predetermined threshold value associated with positive validation; and initiating the presentation of an interface that prompts the user to input at least one additional authentication credential. 13. A method for authenticating a user, the method comprising: receiving a first request to execute a first action associated with a first application;determining that execution of the first action requires user authentication;requesting one or more authentication credentials from the user;receiving a first authentication credential associated with the first action, wherein the first authentication credential is associated with a zero authentication, a soft authentication, or a hard authentication, wherein receiving the hard authentication comprises enabling the user to execute all actions associated with the first application, wherein receiving the soft authentication comprises enabling the user to execute to at least one action associated with the first application, wherein receiving zero authentication comprises denying the user access to at least one action associated with the first application;validating the first authentication credential, thereby resulting in a successful validation of the received first authentication credential;in response to the successful validation, executing the first action;receiving a second request to execute a second action associated with a second application, wherein the second application is associated with the first application whereby the second application is accessible using the first application, wherein the second request is associated with the execution of the first action;determining that execution of the second action requires user authentication;determining a digital footprint of the user based on at least the first action executed by the user, wherein the digital footprint of the user comprises one or more previous actions executed by the user, wherein the one or more actions executed by the user comprises the execution of the first action, wherein the digital footprint is used as a second authentication credential required to access the second application; andvalidating the digital footprint indicating that the first action executed by the user is successfully authenticated using the first authentication credential;in response to the successful validation of the digital footprint, executing the second action. 14. A computer program product for authenticating a user, the computer program product comprising a non-transitory computer-readable medium comprising code causing a computer to: receive a first request to execute a first action associated with a first application;determine that execution of the first action requires user authentication;request one or more authentication credentials from the user;receive a first authentication credential associated with the first action, wherein the first authentication credential is associated with a zero authentication, a soft authentication, or a hard authentication, wherein receiving the hard authentication comprises enabling the user to execute all actions associated with the first application, wherein receiving the soft authentication comprises enabling the user to execute to at least one action associated with the first application, wherein receiving zero authentication comprises denying the user access to at least one action associated with the first application;validate the first authentication credential, thereby resulting in a successful validation of the received first authentication credential;in response to the successful validation, execute the first action;receive a second request to execute a second action associated with a second application, wherein the second application is associated with the first application whereby the second application is accessible using the first application, wherein the second request is associated with the execution of the first action;determine that execution of the second action requires user authentication;determine a digital footprint of the user based on at least the first action executed by the user, wherein the digital footprint of the user comprises one or more previous actions executed by the user, wherein the one or more actions executed by the user comprises the execution of the first action, wherein the digital footprint is used as a second authentication credential required to access the second application; andvalidate the digital footprint indicating that the first action executed by the user is successfully authenticated;in response to the successful validation of the digital footprint, execute the second action.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (47)
Davies Stephen W., Alarm server systems, apparatus, and processes.
Ayanamcottil, Antony Aloysius; Chandrappa, Varun Yarehalli; Revankar, Natesh Shridhar; Verma, Priya; Alam, Mohammad Dilshad; Sharma, Nitin Prakash; Pullaikudi, Praveen Prakash Thazhalhu, Method for destructive readout of data in case of mobile theft.
Natsuno,Takeshi, Method for inhibiting use of mobile communication terminal having memory where card information is stored, mobile communication network, and mobile communication terminal.
Aravamudan, Murali; Rajasekharan, Ajit; Ramakrishnan, Kajamalai G.; Gupta, Mayank, Methods and systems for segmenting relative user preferences into fine-grain and coarse-grain collections.
Grigg, David M.; Thomas, Susan Smith; Harkey, Scott Lee; Bondesen, Laura; Calman, Matthew A., Providing automated initial and final payment for an activity based on determining the location of an activity participant's mobile communication device.
Ellis, Stephen M.; Kennedy, Michael J.; Kurani, Ashish Bhoopen; Lowry, Melissa; Meyyappan, Uma; Sahni, Bipin; Stroke, Nikolai, System and method for a mobile wallet.
Berardi,Michael J.; Bliman,Michal; Bonalle,David S.; Elwood,Jennifer Anne; Hood,Matthew C.; Isenberg,Susan E.; Mayers,Alexandra; Saunders,Peter D.; Scheding,Kathryn D.; Shah,Sejal Ajit; Williamson,Jo, System and method for payment using radio frequency identification in contact and contactless transactions.
Dhesi, Rajkaran Singh; Hunt, Simon; Parke, Paul Martin, System, method, and computer program product for disabling a communication channel during authentication.
Grigg, David M.; Johansen, Joseph Neil; Toth, Michael E.; Carpenter, Daniel Lynn; Qaim-Maqami, Hood; Hanson, Carrie Anne; Votaw, Elizabeth S., Authentication level of function bucket based on circumstances.
Votaw, Elizabeth S.; Jones-McFadden, Alicia C.; Grigg, David M.; Bertanzetti, Peter John; Toth, Michael E.; Hanson, Carrie Anne, Determining user authentication based on user/device interaction.
Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E., Determining user authentication requirements along a continuum based on a current state of the user and/or the attributes related to the function requiring authentication.
Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E., Determining user authentication requirements based on the current location of the user being within a predetermined area requiring altered authentication requirements.
Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E., Determining user authentication requirements based on the current location of the user being within a predetermined area requiring altered authentication requirements.
Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E., Determining user authentication requirements based on the current location of the user in comparison to the users's normal boundary of location.
Grigg, David M.; Johansen, Joseph Neil; Hanson, Carrie Anne; Burrell, Charles Jason; Votaw, Elizabeth S., Self-selected user access based on specific authentication types.
Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E.; Votaw, Elizabeth S., User authentication based on other applications.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.