Authentication and interaction tracking system and method
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04L-029/06
G06F-021/62
출원번호
US-0224400
(2014-03-25)
등록번호
US-9246899
(2016-01-26)
발명자
/ 주소
Durney, Stephen
Pletz, Tracy M.
Webb, Timothy A.
출원인 / 주소
JPMorgan Chase Bank, N.A.
대리인 / 주소
Goodwin Procter LLP
인용정보
피인용 횟수 :
0인용 특허 :
47
초록▼
A central authentication and interaction tracking system authenticates an entity making a request related to a financial account. The system facilitates authentication of an entity engaging in an interaction based on a record of interactions initiated by the entity. The system includes an applicatio
A central authentication and interaction tracking system authenticates an entity making a request related to a financial account. The system facilitates authentication of an entity engaging in an interaction based on a record of interactions initiated by the entity. The system includes an application interface receiving interaction requests over a network, the requests originating from multiple entities and including authentication factors. The system further includes a computer processor and computer memory capable of building, from each interaction request, an entity print record for each of the multiple entities, wherein each entity print record includes the authentication factors. The system further facilitates deriving, from the entity print record, an entity print, comparing received authentication factors for a requested interaction with the entity print, and making an authentication determination based on the comparison.
대표청구항▼
1. A method for facilitating authentication of an entity engaging in an interaction with a financial institution, the authentication based on a record of interactions initiated by the entity, the method comprising: receiving interaction requests over a network at a central authentication and interac
1. A method for facilitating authentication of an entity engaging in an interaction with a financial institution, the authentication based on a record of interactions initiated by the entity, the method comprising: receiving interaction requests over a network at a central authentication and interaction tracking system, the central authentication and interaction tracking system including at least one computer memory and at least one computer processor, the interaction requests originating from multiple entities and including a plurality of authentication factors;executing instructions stored in the computer memory using the computer processor to perform steps including: building, from each interaction request, an entity print record for each of the multiple entities, wherein each entity print record includes the authentication factors from each initiated interaction request, the authentication factors including a location of the interaction request, a device identifier, and personal identifiers;deriving, from the entity print record, an entity print and storing the entity print in at least one computer memory;building, from each interaction request, an interaction signature for each interaction and classifying each interaction signature as a valid interaction signature or a fraudulent interaction signature;comparing the received authentication factors for a requested interaction with the entity print and comparing the interaction signature for a received interaction request with the classified interaction signatures, wherein the comparisons yield a level of risk for each transaction; andmaking an authentication determination based on a level of risk resulting from the comparisons. 2. The method of claim 1, wherein deriving an entity print comprises deriving a level of confidence that the entity is authentic and a determining an entity risk level for the entity. 3. The method of claim 1, wherein the entity print for each entity is stored as a measure of proximity to multiple existing entity prints. 4. The method of claim 1, wherein the device identifier includes an IP address. 5. The method of claim 1, wherein the personal identifier includes at least one of an RSID and a biometric indicator. 6. The method of claim of claim 1, further comprising comparing each interaction request to existing fraudulent interaction signatures to determine if the transaction request represents a fraudulent interaction. 7. The method of claim 1, further comprising building the entity print record and modifying the entity print upon receiving each transaction request from the entity. 8. A central authentication and interaction tracking system for facilitating authentication of an entity engaging in an interaction with a financial institution, the authentication based on a record of interactions initiated by the entity, the system comprising: an application interface receiving interaction requests over a network, the interaction requests originating from multiple entities and including a plurality of authentication factors, the central authentication and interaction tracking system including;at least one computer memory storing information from the interaction requests and instructions for processing the information; andat least one computer processor accessing the computer memory and executing the instructions stored in the computer memory using the computer processor to perform steps including: building, from each interaction request, an entity print record for each of the multiple entities, wherein each entity print record includes the authentication factors from each initiated interaction request, the authentication factors including a location of the interaction request, a device identifier, and personal identifiers;deriving, from the entity print record, an entity print and storing the entity print in at least one computer memory;building, from each interaction request, an interaction signature for each interaction and classifying each interaction signature as a valid interaction signature or a fraudulent interaction signature;comparing the received authentication factors for a requested interaction with the entity print and comparing the interaction signature for a received interaction request with the classified interaction signatures, wherein the comparisons yield a level of risk for each transaction; andmaking an authentication determination based on a level of risk resulting from the comparisons. 9. The system of claim 8, wherein deriving an entity print comprises deriving a level of confidence that the entity is authentic and determining an entity risk level for the entity. 10. The system of claim 8, wherein the entity print for each entity is stored as a measure of proximity to multiple existing entity prints. 11. The system of claim 8, wherein the device identifier includes an IP address. 12. The system of claim 8, wherein the personal identifier includes at least one of an RSID and a biometric indicator. 13. The system of claim 8, further comprising comparing each interaction request to existing fraudulent interaction signatures to determine if the transaction request represents a fraudulent interaction. 14. The system of claim 8, further comprising building the entity print record and modifying the entity print upon receiving each transaction request from the entity. 15. The system of claim 8, further comprising comparing, using triangulation, the received authentication factors with both the entity print and a unique standardized reference entity print.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (47)
McAuliffe Jon D. ; Marsh Brian D. ; Moraes Mark A., Advertisement authentication system in which advertisements are downloaded for off-line display.
Barzilai Nizan ; Davidson Ron, Computer-based electronic bid, auction and sale system, and a system to teach new/non-registered customers how bidding, auction purchasing works.
Wadlow Thomas A. ; Kevin Joseph P., Dynamic policy-based apparatus for wide-range configurable network service authentication and access control using a fixed-path hardware configuration.
Matthews Gordon H. (Plano TX) Tansil Thomas B. (Dallas TX) Fannin Michael L. (Dallas TX), Electronic audio communications system with voice authentication features.
Gould, Christopher Britton; Locker, Howard Jeffery; Trotter, Andy Lloyd; Vanover, Michael T.; Ward, James Peter, Method and system for enabling free seating using biometrics through a centralized authentication.
Guo, Junyu; Kholmovski, Eugene G.; Zhang, Ling; Parker, Dennis L., Method and system for parallel reconstruction in the K-space domain for application in imaging systems.
Deininger, Andreas; Haas, Egon; Mueller, Klaus-Dieter, Method for verifying the authentication of a manager application in a telecommunications management network operating system by means of a network element and network element suitable therefor.
Schneier,Bruce; Walker,Jay S.; Jorasch,James A., Methods and apparatus for awarding prizes based on authentication of computer generated outcomes using coupons.
Bottner, Keith C.; Halpin, David D., Secure, anonymous authentication for electronic purchasing with dynamic determination of payment pricing and terms and cross vendor transaction resolution.
Hibino Toshiro (Kyoto-fu JPX) Yamato Satoshi (Kyoto-fu JPX), Security systems and methods for a videographics and authentication game/program fabricating device.
Guo, Wei-Quiang Michael; Dharmarajan, Baskaran; Battle, Ryan W., Service routing and web integration in a distributed multi-site user authentication system.
Akins ; III Glendon L. ; Banker Robert O. ; Palgon Michael S. ; Pinder Howard G. ; Wasilewski Anthony J., Source authentication of download information in a conditional access system.
Akins, III, Glendon L.; Banker, Robert O.; Palgon, Michael S.; Pinder, Howard G.; Wasilewski, Anthony J., Source authentication of download information in a conditional access system.
Nation, Ron L.; Meli, Rodney P.; Garner, William T., System and method for data source authentication and protection system using biometrics for openly exchanged computer files.
Bianco Peter Garrett ; Boon William Taylor ; Sterling Robert Brewster ; Ware Karl Roger, System, method and computer program product for allowing access to enterprise resources using biometric devices.
Wesley Joseph S. ; Chiu Dah Ming ; Kadansky Miriam C. ; Hurst Stephen A. ; Perlman Radia J. ; Provino Joseph E. ; Rosenzweig Philip M., Tree-based reliable multicast system where sessions are established by repair nodes that authenticate receiver nodes presenting participation certificates granted by a central authority.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.