[미국특허]
User authentication based on other applications
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-007/04
G06F-015/16
G06F-017/30
H04L-029/06
G06F-021/31
G06F-021/41
출원번호
US-0980974
(2015-12-28)
등록번호
US-9525685
(2016-12-20)
발명자
/ 주소
Grigg, David M.
Bertanzetti, Peter John
Burrell, Charles Jason
Hanson, Carrie Anne
Johansen, Joseph Neil
Toth, Michael E.
Votaw, Elizabeth S.
출원인 / 주소
BANK OF AMERICA CORPORATION
대리인 / 주소
Springs, Michael A.
인용정보
피인용 횟수 :
2인용 특허 :
138
초록▼
The present invention includes a system for authenticating a second action based on a first action, wherein the system is configured to: receive a first request to execute a first action associated with a first application; determine that execution of the first action requires user authentication; r
The present invention includes a system for authenticating a second action based on a first action, wherein the system is configured to: receive a first request to execute a first action associated with a first application; determine that execution of the first action requires user authentication; request one or more authentication credentials from the user; receive a first authentication credential associated with the first action; validate the first authentication credential, thereby resulting in a successful validation of the received first authentication credential; in response to the successful validation, execute the first action; receive a second request to execute a second action associated with a second application; determine that execution of the second action requires user authentication; use the successful validation of the first authentication credential to validate a second authentication credential so that the second action may be executed.
대표청구항▼
1. A system for authenticating a user, the system comprising: a memory;at least one hardware processor; anda module stored in memory comprising computer instruction code executable by the at least one hardware processor, and structured to cause the at least one hardware processor to: receive a first
1. A system for authenticating a user, the system comprising: a memory;at least one hardware processor; anda module stored in memory comprising computer instruction code executable by the at least one hardware processor, and structured to cause the at least one hardware processor to: receive a first request to execute a first action associated with a first application;determine that execution of the first action requires user authentication;request one or more authentication credentials from the user;receive a first authentication credential associated with the first action, wherein the first authentication credential is associated with a zero authentication, a soft authentication, or a hard authentication, wherein receiving the hard authentication comprises enabling the user to execute all actions associated with the first application, wherein receiving the soft authentication comprises enabling the user to execute to at least one action associated with the first application, wherein receiving zero authentication comprises denying the user access to at least one action associated with the first application;validate the first authentication credential, thereby resulting in a successful validation of the received first authentication credential;in response to the successful validation, execute the first action;receive a second request to execute a second action associated with a second application, wherein the second request is associated with the execution of the first action;determine that execution of the second action requires user authentication;determine a digital footprint of the user based on at least the first action executed by the user, wherein the digital footprint of the user comprises one or more previous actions executed by the user, wherein the one or more actions executed by the user comprises the execution of the first action, wherein the digital footprint is used as a second authentication credential required to access the second application; andvalidate the digital footprint indicating that the first action executed by the user is successfully authenticated;in response to the successful validation of the digital footprint, execute the second action. 2. The system of claim 1, wherein the first application is associated with at least one of a third party, a social media network, a website, and an overarching operating system. 3. The system of claim 1, wherein at least one of the one or more authentication credentials, the first authentication credential, and the second authentication credential comprises at least one of a user authentication, a username, a password, a passcode, a personal identification number (PIN), a secret question, a received input, and a biometric indicia. 4. The system of claim 1, wherein receiving the first authentication credential comprises receiving input from a user. 5. The system of claim 1, wherein the second application is associated with a financial institution. 6. The system of claim 1, wherein validating at least one of the first authentication credential and the second authentication credential comprises: comparing at least one of the first authentication credential and the second authentication credential to a plurality of authentication credentials in a database, wherein the plurality of authentication credentials are associated with positive validation; and determining a match between at least one of the first authentication credential and the second authentication credential and at least one authentication credential in the plurality of authentication credentials in the database. 7. The system of claim 1, wherein validating at least one of the first authentication credential and the second authentication credential comprises: comparing at least one of the first authentication credential and the second authentication credential to a plurality of authentication credentials in a database, wherein the plurality of authentication credentials are associated with positive validation; and determining there is no match between at least one of the first authentication credential and the second authentication credential and at least one authentication credential in the plurality of authentication credentials in the database. 8. The system of claim 7, wherein determining there is no match between at least one of the first authentication credential and the second authentication credential and at least one authentication credential in the plurality of authentication credentials in the database comprises restricting execution of the second action. 9. The system of claim 7, wherein determining there is no match between at least one of the first authentication credential and the second authentication credential and at least one authentication credential in the plurality of authentication credentials in the database comprises prompting a user for input of at least one additional authentication credential. 10. The system of claim 1, wherein the second action comprises at least one of a funds transfer, viewing an account summary, a deposit, a withdrawal, and viewing a receipt. 11. The system of claim 10, wherein executing the second action requires validation of the second authentication credential. 12. The system of claim 1, wherein the second application is associated with the first application whereby the second application is accessible using the first application. 13. The system of claim 1, wherein receiving zero authentication associated with at least one of the first authentication credential and the second authentication credential comprises: counting a number of failed validation attempts associated with at least one of the first authentication credential and the second authentication credential; comparing the number of failed validation attempts to a predetermined threshold value associated with positive validation; determining that the number of failed validation attempts is greater than the predetermined threshold value associated with positive validation; and initiating the presentation of an interface that prompts the user to input at least one additional authentication credential. 14. A method for authenticating a user, the method comprising: receiving a first request to execute a first action associated with a first application;determining that execution of the first action requires user authentication;requesting one or more authentication credentials from the user;receiving a first authentication credential associated with the first action, wherein the first authentication credential is associated with a zero authentication, a soft authentication, or a hard authentication, wherein receiving the hard authentication comprises enabling the user to execute all actions associated with the first application, wherein receiving the soft authentication comprises enabling the user to execute to at least one action associated with the first application, wherein receiving zero authentication comprises denying the user access to at least one action associated with the first application;validating the first authentication credential, thereby resulting in a successful validation of the received first authentication credential;in response to the successful validation, executing the first action;receiving a second request to execute a second action associated with a second application, wherein the second request is associated with the execution of the first action;determining that execution of the second action requires user authentication;determining a digital footprint of the user based on at least the first action executed by the user, wherein the digital footprint of the user comprises one or more previous actions executed by the user, wherein the one or more actions executed by the user comprises the execution of the first action, wherein the digital footprint is used as a second authentication credential required to access the second application; andvalidating the digital footprint indicating that the first action executed by the user is successfully authenticated using the first authentication credential;in response to the successful validation of the digital footprint, executing the second action. 15. A computer program product for authenticating a user, the computer program product comprising a non-transitory computer-readable medium comprising code causing a computer to: receive a first request to execute a first action associated with a first application;determine that execution of the first action requires user authentication;request one or more authentication credentials from the user;receive a first authentication credential associated with the first action, wherein the first authentication credential is associated with a zero authentication, a soft authentication, or a hard authentication, wherein receiving the hard authentication comprises enabling the user to execute all actions associated with the first application, wherein receiving the soft authentication comprises enabling the user to execute to at least one action associated with the first application, wherein receiving zero authentication comprises denying the user access to at least one action associated with the first application;validate the first authentication credential, thereby resulting in a successful validation of the received first authentication credential;in response to the successful validation, execute the first action;receive a second request to execute a second action associated with a second application, wherein the second request is associated with the execution of the first action;determine that execution of the second action requires user authentication;determine a digital footprint of the user based on at least the first action executed by the user, wherein the digital footprint of the user comprises one or more previous actions executed by the user, wherein the one or more actions executed by the user comprises the execution of the first action, wherein the digital footprint is used as a second authentication credential required to access the second application; andvalidate the digital footprint indicating that the first action executed by the user is successfully authenticated;in response to the successful validation of the digital footprint, execute the second action.
Kao, I-Lung; Milman, Ivan Matthew; Schneider, David J.; Willard, Ronald Gene, Authentication framework for multiple authentication processes and mechanisms.
de Silva, Andrew; Zhuang, Jianning; Mazas, Jose; Panganiban, Alex, Automatic updating of favorite places for navigation system upon change of home address.
Zhu, Lizhong; Mankaruse, George Soliman; Corrigan, Michael Stephen; Jarmuszewski, Perry; Kravets, Oleksiy; Nickerson, Kent Arnold; Sangary, Nagula Tharma, Communications device with separate I and Q phase power amplification having selective phase and magnitude adjustment and related methods.
Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E., Determining user authentication requirements based on the current location of the user being within a predetermined area requiring altered authentication requirements.
Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E., Determining user authentication requirements based on the current location of the user in comparison to the users's normal boundary of location.
Vermeulen, Allan H.; Atlas, Alan B.; Barth, David M.; Cormie, John David; Fischman, Ami K.; Sorenson, III, James Christopher; Wagner, Eric M., Distributed storage system with web services client interface.
Ayanamcottil, Antony Aloysius; Chandrappa, Varun Yarehalli; Revankar, Natesh Shridhar; Verma, Priya; Alam, Mohammad Dilshad; Sharma, Nitin Prakash; Pullaikudi, Praveen Prakash Thazhalhu, Method for destructive readout of data in case of mobile theft.
Natsuno,Takeshi, Method for inhibiting use of mobile communication terminal having memory where card information is stored, mobile communication network, and mobile communication terminal.
Cave, Douglas G., Method, system, and computer program product for physician efficiency measurement and patient health risk stratification utilizing variable windows for episode creation.
Aravamudan, Murali; Rajasekharan, Ajit; Ramakrishnan, Kajamalai G.; Gupta, Mayank, Methods and systems for segmenting relative user preferences into fine-grain and coarse-grain collections.
Nair Parameswaran B. (Acworth GA) Evans John C. (Atlanta GA) Price James F. (Alpharetta GA) Choudhuri Kumar S. (Kennesaw GA) Stills James T. (Atlanta GA) Goulding Victor V. (Lawrenceville GA), Multi-reader transaction terminal.
Zhou, Tiger T G; Zhou, Dylan T X; Zhou, Andrew H B, One-touch payment using haptic control via a messaging and calling multimedia system on mobile device and wearable device, currency token interface, point of sale device, and electronic payment card.
Grigg, David M.; Thomas, Susan Smith; Harkey, Scott Lee; Bondesen, Laura; Calman, Matthew A., Providing automated initial and final payment for an activity based on determining the location of an activity participant's mobile communication device.
Votaw, Elizabeth S.; Burrell, Charles Jason; Hanson, Carrie Anne; Jones, Alicia C.; Lynch, Michael Patrick; Qaim-Maqami, Hood, Remote revocation of application access based on non-co-location of a transaction vehicle and a mobile device.
Gopinathan Krishna M. ; Jost Allen ; Biafore Louis S. ; Ferguson William M. ; Lazarus Michael A. ; Pathria Anu K., Risk determination and management using predictive modeling and transaction profiles for individual transacting entities.
Grigg, David M.; Johansen, Joseph Neil; Hanson, Carrie Anne; Burrell, Charles Jason; Votaw, Elizabeth S., Self-selected user access based on specific authentication types.
Grigg, David M.; Qaim-Maqami, Hood; Jones, Alicia C.; Votaw, Elizabeth S.; Johansen, Joseph Neil; Burrell, Charles Jason; Hanson, Carrie Anne; Lynch, Michael Patrick, Shutting down access to all user accounts.
Grigg, David M.; Johansen, Joseph Neil; Toth, Michael E.; Carpenter, Daniel Lynn; Qaim-Maqami, Hood; Hanson, Carrie Anne; Votaw, Elizabeth S., Sorting mobile banking functions into authentication buckets.
Ellis, Stephen M.; Kennedy, Michael J.; Kurani, Ashish Bhoopen; Lowry, Melissa; Meyyappan, Uma; Sahni, Bipin; Stroke, Nikolai, System and method for a mobile wallet.
Berardi,Michael J.; Bliman,Michal; Bonalle,David S.; Elwood,Jennifer Anne; Hood,Matthew C.; Isenberg,Susan E.; Mayers,Alexandra; Saunders,Peter D.; Scheding,Kathryn D.; Shah,Sejal Ajit; Williamson,Jo, System and method for payment using radio frequency identification in contact and contactless transactions.
Dhesi, Rajkaran Singh; Hunt, Simon; Parke, Paul Martin, System, method, and computer program product for disabling a communication channel during authentication.
Grigg, David M.; Bertanzetti, Peter John; Toth, Michael E.; Hanson, Carrie Anne; Votaw, Elizabeth S., User authentication based on historical transaction data.
Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E.; Votaw, Elizabeth S., User authentication based on other applications.
Grigg, David M.; Johansen, Joseph Neil; Hanson, Carrie Anne; Burrell, Charles Jason; Votaw, Elizabeth S., User authentication based on self-selected preferences.
Grigg, David M.; Bertanzetti, Peter John; Toth, Michael E.; Hanson, Carrie Anne, User authentication by geo-location and proximity to user's close network.
Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E., Determining user authentication requirements based on the current location of the user being within a predetermined area requiring altered authentication requirements.
Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E., Determining user authentication requirements based on the current location of the user being within a predetermined area requiring altered authentication requirements.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.