Self-selected user access based on specific authentication types
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-007/04
G06F-015/16
G06F-017/30
H04L-029/06
G06Q-040/02
출원번호
US-0046362
(2016-02-17)
등록번호
US-9509702
(2016-11-29)
발명자
/ 주소
Grigg, David M.
Johansen, Joseph Neil
Hanson, Carrie Anne
Burrell, Charles Jason
Votaw, Elizabeth S.
출원인 / 주소
BANK OF AMERICA CORPORATION
대리인 / 주소
Springs, Michael A.
인용정보
피인용 횟수 :
2인용 특허 :
56
초록▼
Embodiments of the invention are directed to a system, method, and a computer program product self-selected user access based on specific authentication types. The system typically including a memory, a processor, and a module configured to receive from a user, a user-selected preference, wherein th
Embodiments of the invention are directed to a system, method, and a computer program product self-selected user access based on specific authentication types. The system typically including a memory, a processor, and a module configured to receive from a user, a user-selected preference, wherein the user-selected preference comprises one or more authentication types desired by the user; determine a level of authentication from a plurality of levels of authentication are associated with the one or more authentication types associated with the user-selected preference; initiate the presentation of a user interface that enables the user to select one or more application functions, wherein the one or more application functions are associated with the determined level of authentication; receive from a user, a selection of one or more application functions.
대표청구항▼
1. A method for self-selected user access based on specific authentication types, the method comprising: receiving, using a computing device processor, from a user, a user-selected preference that is predefined, wherein the user-selected preference comprises: 1) one or more authentication types desi
1. A method for self-selected user access based on specific authentication types, the method comprising: receiving, using a computing device processor, from a user, a user-selected preference that is predefined, wherein the user-selected preference comprises: 1) one or more authentication types desired by the user, and 2) parameters that must be satisfied prior to access to use of one or more application functions associated with the user-selected preference, said parameters comprising: a time duration defined by a selection of a first time stamp and a second time stamp, a geographic location, and one or more features associated with the application, wherein the time duration is scheduled dynamically;determining, using a computing device processor, a level of authentication from a plurality of levels of authentication are associated with the one or more authentication types associated with the user-selected preference, wherein the one or more authentication levels comprises at least one of a hard authentication, a soft authentication, and a zero authentication, wherein the hard authentication is a multi-step verification requiring a user presentation of at least two authentication credentials, wherein the soft authentication is a secondary verification requiring a user presentation of at least one authentication credential associated with the authentication types, wherein zero authentication requires no authentication credentials;initiating, using a computing device processor, the presentation of a user interface that enables the user to select one or more application functions, wherein the one or more application functions are associated with the determined level of authentication;receiving, using a computing device processor, from a user, a selection of one or more application functions, wherein receiving the selection further comprises receiving a request to execute the selected one or more application functions, wherein execution of the user action requires validation of one or more authentication credentials;determining, using a computing device processor, that the parameters associated with the user-selected preferences are satisfied;requesting, using a computing device processor, one or more authentication credentials corresponding to the desired one or more authentication types based on at least determining that at least one of the user-selected preferences are satisfied;receiving, using a computing device processor, one or more authentication credentials from the user;validating, using a computing device processor, the one or more authentication credentials, thereby resulting in a successful validation of the one or more authentication credentials; andin response to the successful validation of the one or more authentication credentials, executing, using a computing device processor, the selected one or more application functions, wherein executing the selected one or more authentication credentials further comprises enabling the user to access at least a portion of the application, wherein the portion of the application is based on at least the one or more features associated with the application, wherein the one or more features are pre-selected by the user based on the user selected preferences. 2. The method of claim 1, wherein the one or more authentication credentials received from the user and one or more functions associated with the application permitted for user access are positively correlated. 3. The method of claim 1, wherein the user-selected preference comprises a geographic location, wherein the geographic location is a point within a geographic radius, wherein the geographic radius defines the boundary of application of the level of authentication. 4. The method of claim 1, wherein validating further comprises determining a successful match between the one or more authentication credentials received from the user and the one or more authentication credentials stored in a database, wherein the one or more authentication credentials correspond to the one or more authentication types associated with the level of authentication. 5. The method of claim 1, wherein hard authentication comprises enabling a user to access all functions associated with the application based on at least a successful validation of the one or more authentication credentials associated with the user. 6. The method of claim 1, wherein the hard authentication comprises a multi-step verification of at least two authentication types, wherein verification further comprises receiving a user input of at least two authentication credentials. 7. The method of claim 1, wherein the authentication type associated with the multi-step verification is at least one of a username, a password, a personal identification number, or a biometric indicia. 8. The method of claim 1, wherein soft authentication comprises enabling a user to access one or more functions associated with the application based on at least a successful validation of the one or more authentication credentials associated with the user. 9. The method of claim 1, wherein the soft authentication comprises a secondary verification of at least one authentication type, wherein verification further comprises receiving a user input of at least one authentication credential. 10. The method of claim 9, wherein the at least one authentication type associated with the secondary verification comprises at least one of a social media authentication, an internet protocol (IP) based authentication, a fob, or a signed digital certificate. 11. The method of claim 1, wherein the zero authentication comprises restricting the user from access to the application after a predetermined number of authentication attempts to access the application. 12. The method of claim 1 further comprising enabling the user to select one or more application functions associated with the determined level of authentication corresponding to the authentication type desired. 13. The method of claim 12 further comprising enabling the user to reset the selected one or more application functions thereby removing restrictions on access to the one or more application functions. 14. A computer program product for self-selected user access based on specific authentication types, the computer program product comprising a non-transitory computer-readable medium comprising code causing a first apparatus to: receive from a user, a user-selected preference that is predefined, wherein the user-selected preference comprises: 1) one or more authentication types desired by the user, and 2) parameters that must be satisfied prior to access to use of one or more application functions associated with the user-selected preference, said parameters comprising: a time duration defined by a selection of a first time stamp and a second time stamp, a geographic location, and one or more features associated with the application, wherein the time duration is scheduled dynamically;determine a level of authentication from a plurality of levels of authentication are associated with the one or more authentication types associated with the user-selected preference, wherein the one or more authentication levels comprises at least one of a hard authentication, a soft authentication, and a zero authentication, wherein the hard authentication is a multi-step verification requiring a user presentation of at least two authentication credentials, wherein the soft authentication is a secondary verification requiring a user presentation of at least one authentication credential associated with the authentication types, wherein zero authentication requires no authentication credentials;initiate the presentation of a user interface that enables the user to select one or more application functions, wherein the one or more application functions are associated with the determined level of authentication;receive from a user, a selection of one or more application functions, wherein receiving the selection further comprises receiving a request to execute the selected one or more application functions, wherein execution of the user action requires validation of one or more authentication credentials;determine that the parameters associated with the user-selected preferences are satisfied;request one or more authentication credentials corresponding to the desired one or more authentication types based on at least determining that at least one of the user-selected preferences are satisfied;receive one or more authentication credentials from the user;validate the one or more authentication credentials, thereby resulting in a successful validation of the one or more authentication credentials; andin response to the successful validation of the one or more authentication credentials, execute the selected one or more application functions, wherein executing the selected one or more authentication credentials further comprises enabling the user to access at least a portion of the application, wherein the portion of the application is based on at least the one or more features associated with the application, wherein the one or more features are pre-selected by the user based on the user selected preferences. 15. The computer program product of claim 14, wherein the one or more authentication credentials received from the user and one or more functions associated with the application permitted for user access are positively correlated. 16. The computer program product of claim 14, wherein the user-selected preference comprises a geographic location, wherein the geographic location is a point within a geographic radius, wherein the geographic radius defines the boundary of application of the level of authentication. 17. The computer program product of claim 14, wherein validating further comprises determining a successful match between the one or more authentication credentials received from the user and the one or more authentication credentials stored in a database, wherein the one or more authentication credentials correspond to the one or more authentication types associated with the level of authentication. 18. The computer program product of claim 14, wherein hard authentication comprises enabling a user to access all functions associated with the application based on at least a successful validation of the one or more authentication credentials associated with the user. 19. The computer program product of claim 14, wherein the hard authentication comprises a multi-step verification of at least two authentication types, wherein verification further comprises receiving a user input of at least two authentication credentials. 20. The computer program product of claim 14, wherein the authentication type associated with the multi-step verification is at least one of a username, a password, a personal identification number, or a biometric indicia. 21. The computer program product of claim 14, wherein soft authentication comprises enabling a user to access one or more functions associated with the application based on at least a successful validation of the one or more authentication credentials associated with the user. 22. The computer program product of claim 14, wherein the soft authentication comprises a secondary verification of at least one authentication type, wherein verification further comprises receiving a user input of at least one authentication credential. 23. The computer program product of claim 22, wherein the at least one authentication type associated with the secondary verification comprises at least one of a social media authentication, an internet protocol (IP) based authentication, a fob, or a signed digital certificate. 24. The computer program product of claim 14, wherein the zero authentication comprises restricting the user from access to the application after a predetermined number of authentication attempts to access the application. 25. The computer program product of claim 14 further comprising enabling the user to select one or more application functions associated with the determined level of authentication corresponding to the authentication type desired. 26. The computer program product of claim 25 further comprising enabling the user to reset the selected one or more application functions thereby removing restrictions on access to the one or more application functions.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (56)
Davies Stephen W., Alarm server systems, apparatus, and processes.
Kao, I-Lung; Milman, Ivan Matthew; Schneider, David J.; Willard, Ronald Gene, Authentication framework for multiple authentication processes and mechanisms.
Ayanamcottil, Antony Aloysius; Chandrappa, Varun Yarehalli; Revankar, Natesh Shridhar; Verma, Priya; Alam, Mohammad Dilshad; Sharma, Nitin Prakash; Pullaikudi, Praveen Prakash Thazhalhu, Method for destructive readout of data in case of mobile theft.
Natsuno,Takeshi, Method for inhibiting use of mobile communication terminal having memory where card information is stored, mobile communication network, and mobile communication terminal.
Aravamudan, Murali; Rajasekharan, Ajit; Ramakrishnan, Kajamalai G.; Gupta, Mayank, Methods and systems for segmenting relative user preferences into fine-grain and coarse-grain collections.
Grigg, David M.; Thomas, Susan Smith; Harkey, Scott Lee; Bondesen, Laura; Calman, Matthew A., Providing automated initial and final payment for an activity based on determining the location of an activity participant's mobile communication device.
Ellis, Stephen M.; Kennedy, Michael J.; Kurani, Ashish Bhoopen; Lowry, Melissa; Meyyappan, Uma; Sahni, Bipin; Stroke, Nikolai, System and method for a mobile wallet.
Berardi,Michael J.; Bliman,Michal; Bonalle,David S.; Elwood,Jennifer Anne; Hood,Matthew C.; Isenberg,Susan E.; Mayers,Alexandra; Saunders,Peter D.; Scheding,Kathryn D.; Shah,Sejal Ajit; Williamson,Jo, System and method for payment using radio frequency identification in contact and contactless transactions.
Dhesi, Rajkaran Singh; Hunt, Simon; Parke, Paul Martin, System, method, and computer program product for disabling a communication channel during authentication.
Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E., Determining user authentication requirements based on the current location of the user being within a predetermined area requiring altered authentication requirements.
Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E., Determining user authentication requirements based on the current location of the user being within a predetermined area requiring altered authentication requirements.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.