최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
SAI
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0958193 (2015-12-03) |
등록번호 | US-9679293 (2017-06-13) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 0 인용 특허 : 509 |
The invention provides a method for performing an authentication (and a system for performing the method), in conjunction with a transaction, utilizing a primary channel and a secondary channel. The method may include an authenticating entity, such as a bank, (1) receiving from a customer primary au
The invention provides a method for performing an authentication (and a system for performing the method), in conjunction with a transaction, utilizing a primary channel and a secondary channel. The method may include an authenticating entity, such as a bank, (1) receiving from a customer primary authentication information via a primary channel; (2) the authenticating entity processing the primary authentication information, and retrieving customer information based on the primary authentication information; (3) the authenticating entity transmitting secondary authentication information to the customer via a secondary channel, the secondary channel being different than the primary channel; (4) the authenticating entity receiving from the customer at least a portion of the secondary authentication information; and (5) the authenticating entity performing authentication processing on the secondary authentication information received from the customer. Based on the successful authentication of the primary authentication information and the secondary authentication information received from the customer, the authenticating entity approves the customer for the transaction.
1. A method for performing a multi-channel authentication between an authenticating entity and a customer remote from the authenticating entity, utilizing a primary communication channel and a secondary communication channel, the method comprising: receiving from a computing device of the customer,
1. A method for performing a multi-channel authentication between an authenticating entity and a customer remote from the authenticating entity, utilizing a primary communication channel and a secondary communication channel, the method comprising: receiving from a computing device of the customer, at a processing machine of the authenticating entity, primary authentication information via the primary communication channel;processing the primary authentication information by the processing machine of the authenticating entity, and retrieving customer information based on the primary authentication information;sending a message to the computing device of the customer, via the primary communication channel, that identifies potential communication channels through which a secondary authentication can be performed, wherein the message does not comprise complete contact information for the potential communication channels to effect communication via the potential channels;receiving from the computing device of the customer a selection of one of the potential communication channels, which comprises the secondary communication channel;transmitting, by the processing machine of the authenticating entity, secondary authentication information to the customer via the secondary communication channel, the secondary communication channel being different than the primary communication channel;receiving from the computing device of the customer, via the primary communication channel, at least a portion of the secondary authentication information; andprocessing the received secondary authentication information to authenticate the customer. 2. The method of claim 1, wherein the primary communication channel is the Internet and the secondary authentication information is transmitted via at least one of a telephone call, text message, or e-mail to the customer. 3. The system of claim 1, wherein the customer uses the computing device to transmit the primary authentication information to the authenticating entity and receives the secondary authentication information at a second computing device, different from the computing device. 4. The method of claim 1, wherein the authenticating entity is a bank. 5. The method of claim 1, wherein the processing performed by the processing machine of the authenticating entity includes referring to secondary authentication rules before invoking utilization of the secondary authentication information. 6. The method of claim 5, wherein at least one rule in the secondary authentication rules is based on a dollar amount of a transaction involving the customer. 7. The method of claim 5, wherein at least one rule in the secondary authentication rules is based on device identification information of the computing device of the customer. 8. The method of claim 5, wherein at least one rule in the secondary authentication rules is based on geographic data with respect to the computing device of the customer. 9. The method of claim 1, wherein the primary authentication information includes a username and password. 10. The method of claim 1, wherein the secondary authentication information comprises a one-time password or a one-time authentication code. 11. The method of claim 1, wherein the multi-channel authentication is performed in conjunction with a transaction. 12. The method of claim 11, wherein the transaction is a purchase of a product or service by the customer. 13. The method of claim 12, wherein the transaction is enrollment of the customer into a service offered by the authenticating entity. 14. The method of claim 11, wherein the transaction requires approval from at least one transaction approver, the method further comprising soliciting approval from the at least one transaction approver before authenticating the customer. 15. The method of claim 14, further comprising determining a geographical location of the at least one transaction approver; and comparing the geographical location of the at least one transaction approver with a location of the transaction, so as to assess legitimacy of the transaction. 16. The method of claim 1, wherein the primary communication channel is a website of the authenticating entity and the secondary communication channel is a telephone call, text message or e-mail to the customer, the method further comprising: a second customer device receiving the telephone call, text message or e-mail from the authenticating entity via the secondary communication channel; andthe customer device transmitting, via the website, the at least a portion of the secondary authentication information back to the authenticating entity. 17. The method of claim 1, wherein the customer information comprises a land-line telephone number, a cell number, an email address, or SMS information of the customer, by which to contact the customer on a channel different than the primary communication channel. 18. The method of claim 1, wherein the authentication times out upon expiration of a time-out period, which time-out period starts upon one of receipt of the primary authentication information via the primary communication channel, sending the message to the computing device of the customer, receiving the selection of one of the potential communication channels, or transmitting the secondary authentication information via the secondary communication channel. 19. A system that performs multi-channel authentication processing, the system comprising: at least one computer processor; andmemory having instructions stored thereon, the instructions, when executed by the at least one processor, cause the at least one processor to perform operations, the operations comprising: receiving primary authentication information from a computing device of a customer via a primary communication channel;authenticating the primary authentication information received from the computing device of the customer, and based on the primary authentication information, retrieving customer information;sending a message to the computing device of the customer, via the primary communication channel, that identifies potential communication channels through which secondary authentication information can be sent, wherein the message does not comprise complete contact information for the potential communication channels;receiving from the computing device of the customer a selection of one of the potential communication channels, which comprises a secondary communication channel;outputting secondary authentication information to the customer via the secondary communication channel that is different than the primary communication channel;receiving from the computing device of the customer, via the primary communication channel, at least a portion of the secondary authentication information; andprocessing the received secondary authentication information to authenticate the customer. 20. The system of claim 19, wherein the primary communication channel is the Internet and the secondary authentication information is transmitted via at least one of a telephone call, text message, or e-mail to the customer. 21. The system of claim 19, wherein the customer information comprises complete contact information for the potential communication channels of at least one of a land-line telephone number, a cell number, an email address, or SMS information of the customer, by which to contact the customer on a channel different than the primary communication channel. 22. The system of claim 19, wherein the instructions further cause the at least one processor to determine whether the system recognizes the computing device that the customer is using to send the primary authentication information via the primary communication channel. 23. The system of claim 19, wherein the message is sent to the computing device of the customer based on a determination of risk with respect to the customer or the computing device of the customer. 24. The system of claim 19, wherein the instructions further cause the at least one processor to monitor an elapsed time during primary and/or secondary authentication.
해당 특허가 속한 카테고리에서 활용도가 높은 상위 5개 콘텐츠를 보여줍니다.
더보기 버튼을 클릭하시면 더 많은 관련자료를 살펴볼 수 있습니다.
IPC | Description |
---|---|
A | 생활필수품 |
A62 | 인명구조; 소방(사다리 E06C) |
A62B | 인명구조용의 기구, 장치 또는 방법(특히 의료용에 사용되는 밸브 A61M 39/00; 특히 물에서 쓰이는 인명구조 장치 또는 방법 B63C 9/00; 잠수장비 B63C 11/00; 특히 항공기에 쓰는 것, 예. 낙하산, 투출좌석 B64D; 특히 광산에서 쓰이는 구조장치 E21F 11/00) |
A62B-1/08 | .. 윈치 또는 풀리에 제동기구가 있는 것 |
내보내기 구분 |
|
---|---|
구성항목 |
관리번호, 국가코드, 자료구분, 상태, 출원번호, 출원일자, 공개번호, 공개일자, 등록번호, 등록일자, 발명명칭(한글), 발명명칭(영문), 출원인(한글), 출원인(영문), 출원인코드, 대표IPC 관리번호, 국가코드, 자료구분, 상태, 출원번호, 출원일자, 공개번호, 공개일자, 공고번호, 공고일자, 등록번호, 등록일자, 발명명칭(한글), 발명명칭(영문), 출원인(한글), 출원인(영문), 출원인코드, 대표출원인, 출원인국적, 출원인주소, 발명자, 발명자E, 발명자코드, 발명자주소, 발명자 우편번호, 발명자국적, 대표IPC, IPC코드, 요약, 미국특허분류, 대리인주소, 대리인코드, 대리인(한글), 대리인(영문), 국제공개일자, 국제공개번호, 국제출원일자, 국제출원번호, 우선권, 우선권주장일, 우선권국가, 우선권출원번호, 원출원일자, 원출원번호, 지정국, Citing Patents, Cited Patents |
저장형식 |
|
메일정보 |
|
안내 |
총 건의 자료가 검색되었습니다. 다운받으실 자료의 인덱스를 입력하세요. (1-10,000) 검색결과의 순서대로 최대 10,000건 까지 다운로드가 가능합니다. 데이타가 많을 경우 속도가 느려질 수 있습니다.(최대 2~3분 소요) 다운로드 파일은 UTF-8 형태로 저장됩니다. ~ |
Copyright KISTI. All Rights Reserved.
AI-Helper는 오픈소스 모델을 사용합니다. 사용하고 있는 오픈소스 모델과 라이센스는 아래에서 확인할 수 있습니다.
AI-Helper uses Open Source Models. You can find the source code of these open source models, along with applicable license information below. (helpdesk@kisti.re.kr)
OpenAI의 API Key를 브라우저에 등록하여야 ChatGPT 모델을 사용할 수 있습니다.
등록키는 삭제 버튼을 누르거나, PDF 창을 닫으면 삭제됩니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.