$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Determining user authentication requirements based on the current location of the user in comparison to the users's normal boundary of location 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-029/06
  • G06F-021/31
출원번호 US-0876651 (2015-10-06)
등록번호 US-9819680 (2017-11-14)
발명자 / 주소
  • Grigg, David M.
  • Bertanzetti, Peter John
  • Burrell, Charles Jason
  • Hanson, Carrie Anne
  • Johansen, Joseph Neil
  • Toth, Michael E.
출원인 / 주소
  • BANK OF AMERICA CORPORATION
대리인 / 주소
    Springs, Michael A.
인용정보 피인용 횟수 : 0  인용 특허 : 142

초록

Systems, apparatus, methods, and computer program products are provided for determining a user's authentication requirements/credentials for a specific network access session based on the current location of the user in comparison to known boundaries of location associated with the user, such as pat

대표청구항

1. An apparatus for determining user authentication requirements, the apparatus comprising: a computing platform including a memory and a processor in communication with the memory; andan authentication requirements module stored in the memory, executable by the processor and configured to, store a

이 특허에 인용된 특허 (142)

  1. Wu, Peter; Reddy, Sreekanth; Zeng, Jianlin; Liu, Changming, Airtime-based scheduling.
  2. Davies Stephen W., Alarm server systems, apparatus, and processes.
  3. Radhakrishnan, Rakesh, Apparatus and method for making access decision using exceptions.
  4. Morris E. Cohen, Apparatus and methods for improved credit cards and credit card transactions.
  5. Feldman, Alexandr; Tran, Kelson Khai Dinh; Ayalur, Venkateswaran, Architecture system for in-store reading.
  6. Bailey, David W.; Ayres, Lynn C.; Huang, Lin; Rouskov, Yordan I; Guo, Weiqiang Michael, Authenticating linked accounts.
  7. Johnson, Bruce E.; Webster-Lam, Chung, Authentication for a commercial transaction using a mobile module.
  8. Kao, I-Lung; Milman, Ivan Matthew; Schneider, David J.; Willard, Ronald Gene, Authentication framework for multiple authentication processes and mechanisms.
  9. Labrou, Yannis; Agre, Jonathan Russell, Authentication services using mobile device.
  10. Guriappa Srinivas, Badrinath; Bhanwar, Shashi; Singhal, Shefali; Dogra, Debi Prosad; Tyagi, Saurabh, Authentication using multi-tier multi-class objects.
  11. Zhang, Xinwen; Seifert, Jean-Pierre; Aciicmez, Onur, Authentication, identity, and service management for computing and communication systems.
  12. Van Horn, Richard, Authentification broker for the securities industry.
  13. de Silva, Andrew; Zhuang, Jianning; Mazas, Jose; Panganiban, Alex, Automatic updating of favorite places for navigation system upon change of home address.
  14. Rahman, Khwaja M.; Jurkovic, Sinisa; Savagian, Peter J., Bar wound stator winding layout with long-pitched and short-pitched coils.
  15. Giobbi, John J., Biometric personal data key (PDK) authentication.
  16. Randle, William M.; Orkis, Randall E., Common authentication service for network connected applications, devices, users, and web services.
  17. Zhu, Lizhong; Mankaruse, George Soliman; Corrigan, Michael Stephen; Jarmuszewski, Perry; Kravets, Oleksiy; Nickerson, Kent Arnold; Sangary, Nagula Tharma, Communications device with separate I and Q phase power amplification having selective phase and magnitude adjustment and related methods.
  18. Manroa, Arun; Choksi, Ojas T., Composite application for group-based activity reservations.
  19. Fisher, Michelle, Conducting an online payment transaction using an NFC enabled mobile communication device.
  20. Dickinson, Alexander G.; Berger, Brian; Dobson, Jr., Robert T., Context sensitive dynamic authentication in a cryptographic system.
  21. Flitcroft,Daniel I.; O'Donnell,Graham, Credit card system and method.
  22. Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E., Determining user authentication requirements based on the current location of the user being within a predetermined area requiring altered authentication requirements.
  23. Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E., Determining user authentication requirements based on the current location of the user in comparison to the users's normal boundary of location.
  24. Vermeulen, Allan H.; Atlas, Alan B.; Barth, David M.; Cormie, John David; Fischman, Ami K.; Sorenson, III, James Christopher; Wagner, Eric M., Distributed storage system with web services client interface.
  25. Zheng, Lantian, Enhanced multi-factor authentication.
  26. Zheng, Lantian, Enhanced multi-factor authentication.
  27. Basch Catherine A. ; Bruesewitz Belva J. ; Siegel Kevin ; Faith Patrick, Financial risk prediction systems and methods therefor.
  28. Basch, Catherine A.; Bruesewitz, Belva J.; Siegel, Kevin; Faith, Patrick, Financial risk prediction systems and methods therefor.
  29. Hoffman, Ned, Financial transactions using a rule-module nexus and a user account registry.
  30. Justice, Scott C.; Hopper, Eric L.; Obrist, Ken C., Fraud prevention system and method.
  31. Magi Shaashua, Triinu; Efraim, Harel; Kaufman, Alon, Geolocation error tracking in transaction processing.
  32. Le Faucheur, Francois; Charny, Anna; Bajaj, Sandeep, Hierarchical multi-rate multi-precedence policer.
  33. Dong, Liang; Saitoh, Kunimasa, High power optical fibers.
  34. Lin, Paul, IP address secure multi-channel authentication for online transactions.
  35. Kimura, Takushi, Image display apparatus and control method therefor.
  36. Yoshida, Asami; Iwamoto, Takuya, Information processing apparatus and information processing method.
  37. Anaokar, Smita; Blalock, Robert Allan; Drake, George Michael; Foy, Adam Moore, LED downlight with improved light output.
  38. Mizutani, Tomoya; Unno, Tsunehiro, Light emitting diode with supporting substrate side electrodes and wiring structures.
  39. Ashfield, James; Shroyer, David; Brown, Douglas, Location based authentication of mobile device transactions.
  40. Zellner, Samuel, Location-based security rules.
  41. Griggs, Christopher R., Managing a universal payment account.
  42. Gupta Abhay ; Ferris Chris ; Abdelnur Alejandro, Method and apparatus for authenticating users.
  43. Ling,Marvin T, Method and apparatus for conducting electronic commerce transactions using electronic tokens.
  44. Ling,Marvin T, Method and apparatus for conducting electronic commerce transactions using electronic tokens.
  45. Hyndman, Arn; Sauriol, Nicholas, Method and apparatus for establishing a federated identity using a personal wireless device.
  46. Zimmerman, Jeffrey; Spies, JWM; La Salle, Craig, Method and apparatus for identifying recurring payments.
  47. Radhakrishnan, Rakesh, Method and apparatus for making token-based access decisions.
  48. Smeets,Bernhard Jan Marie; Poon,Kar Fat; Bodensjo,Marcus, Method and apparatus for secure leveled access control.
  49. Radhakrishnan, Rakesh; Frick, Cynthia Ann; Marian, Radu; Barbir, Abdulkader Omar; Badhwar, Rajat P., Method and apparatus for token-based combining of risk ratings.
  50. Radhakrishnan, Rakesh; Frick, Cynthia Ann; Marian, Radu; Barbir, Abdulkader Omar; Badhwar, Rajat P., Method and apparatus for token-based packet prioritization.
  51. Radhakrishnan, Rakesh; Frick, Cynthia Ann; Marian, Radu; Barbir, Abdulkader Omar; Badhwar, Rajat P., Method and apparatus for token-based tamper detection.
  52. Bhatia,Gaurav; Biswas,Kamalendu; Swaminathan,Arun, Method and apparatus to facilitate a global timeout in a distributed computing environment.
  53. Cantini, Renato; Busch Lauper, Karin, Method and system for detecting possible frauds in payment transactions.
  54. Lee, Joonho John, Method and system for effecting financial transactions over a public network without submission of sensitive information.
  55. Blinn, Arnold Neil; Coco, Joseph N., Method and system for restricting the usage of payment accounts.
  56. Blinn,Arnold N.; Coco,Joseph N., Method and system for restricting the usage of payment accounts.
  57. Blinn,Arnold Neil; Coco,Joseph N., Method and system for restricting the usage of payment accounts.
  58. Cook, Fred S.; Satapathy, Durga, Method and system for securing a mobile device.
  59. Bacastow, Steven V., Method and system for securing payment transactions.
  60. Ayanamcottil, Antony Aloysius; Chandrappa, Varun Yarehalli; Revankar, Natesh Shridhar; Verma, Priya; Alam, Mohammad Dilshad; Sharma, Nitin Prakash; Pullaikudi, Praveen Prakash Thazhalhu, Method for destructive readout of data in case of mobile theft.
  61. Natsuno,Takeshi, Method for inhibiting use of mobile communication terminal having memory where card information is stored, mobile communication network, and mobile communication terminal.
  62. Glasberg, Marcelo, Method for internet payments for content.
  63. Cason,Stanley Philip, Method for shopping using wireless communication.
  64. Phillips, Simon; Wankmueller, John Robert, Method for use in association with identification token and apparatus including identification token.
  65. Alba, Jose A.; Grossman, David, Method, apparatus, and computer program product for facilitating promotions with an E-wallet.
  66. Cave, Douglas G., Method, system, and computer program product for physician efficiency measurement and patient health risk stratification utilizing variable windows for episode creation.
  67. Aravamudan, Murali; Rajasekharan, Ajit; Ramakrishnan, Kajamalai G.; Gupta, Mayank, Methods and systems for segmenting relative user preferences into fine-grain and coarse-grain collections.
  68. Rode, John E., Methods for preloading a bearing and aligning a lock nut.
  69. Dollard, Morgan Francois Stephan, Mobile computing device authentication using scannable images.
  70. Carlson, Mark, Mobile payment system and method using alias.
  71. Kannanari, Ahamed, Mobile payments using payment tokens.
  72. Laracey, Kevin, Mobile phone payment processing methods and systems.
  73. Takatori, Sunao; Kiyomatsu, Hisanori, Modifiable authentication levels in authentication systems for transactions.
  74. Owen,William N.; Shoemaker,Eric, Multi-factor authentication system.
  75. Geppert, Mike, Multi-module authentication platform.
  76. Yaffe, Dror; Gilfix, Michael, Multi-protocol authentication and authorization in computer network environments.
  77. Nair Parameswaran B. (Acworth GA) Evans John C. (Atlanta GA) Price James F. (Alpharetta GA) Choudhuri Kumar S. (Kennesaw GA) Stills James T. (Atlanta GA) Goulding Victor V. (Lawrenceville GA), Multi-reader transaction terminal.
  78. Davis, Marc E.; Dyor, Matthew G.; Gerrity, Daniel A.; Huang, Xuedong; Hyde, Roderick A.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A.; Myhrvold, Nathan P.; Tegreene, Clarence T., Network acquired behavioral fingerprint for authentication.
  79. Zhou, Tiger T G; Zhou, Dylan T X; Zhou, Andrew H B, One-touch payment using haptic control via a messaging and calling multimedia system on mobile device and wearable device, currency token interface, point of sale device, and electronic payment card.
  80. Smadja, Philippe; Aussel, Jean-Daniel, Personal token and a method for controlled authentication.
  81. Vagliardo, Courtney J., Placemat having an integrated napkin ring and method of making and using the same.
  82. Manoj, Mulakkapurath Narayanan; Vasamsetty, Venkata Ramachandra Rao; Baliga, Madhuri; Kumar, Kirubakaran Naveen; Nair, Chandrasekhar Bhaskaran; Subbarao, Pillarisetti Venkata, Polynucleotide and polypeptide sequence and methods thereof.
  83. Teramoto, Kenzo; Hiroi, Junko; Nakamura, Masaaki, Porous resin particles, method of manufacturing the same, and use of the same.
  84. Connell, II, Jonathan H.; Flickner, Myron D.; Haas, Norman; Hampapur, Arun; Pankanti, Sharathchandra U., Portable device-based shopping checkout.
  85. Boston Vincent (San Mateo CA), Portable financial transaction card capable of authorizing a transaction in foreign currencies.
  86. Takaki, Tetsuya, Portable terminal and communication control method.
  87. Grigg, David M.; Bertanzetti, Peter John; Qaim-Maqami, Hood, Providing authentication using previously-validated authentication credentials.
  88. Grigg, David M.; Thomas, Susan Smith; Harkey, Scott Lee; Bondesen, Laura; Calman, Matthew A., Providing automated initial and final payment for an activity based on determining the location of an activity participant's mobile communication device.
  89. Bergboer, Niek; Jones, Jonah; Schaffalitzky, Frederik, Rank-based image piling.
  90. Jones, Bryce A., Reducing mobile-phone fraud.
  91. Jones, Bryce A., Reducing mobile-phone fraud.
  92. Votaw, Elizabeth S.; Burrell, Charles Jason; Hanson, Carrie Anne; Jones, Alicia C.; Lynch, Michael Patrick; Qaim-Maqami, Hood, Remote revocation of application access based on non-co-location of a transaction vehicle and a mobile device.
  93. Hammad, Ayman, Restricting access to compromised account information.
  94. Gopinathan Krishna M. ; Jost Allen ; Biafore Louis S. ; Ferguson William M. ; Lazarus Michael A. ; Pathria Anu K., Risk determination and management using predictive modeling and transaction profiles for individual transacting entities.
  95. Keresman, III, Michael A.; Bhagavatula, Ravishankar; Balasubramanian, Chandra; Sherwin, Francis M., Secure and efficient payment processing system.
  96. Lanc, David, Secure authentication and payment system.
  97. Tieken, Craig A., Secure transaction management.
  98. Osborn, Douglas; Phua, Cheng Siong; Blaess, Donald K.; Wang, Arnold; Dayton, Lionel, Self-clinching fastener.
  99. Grigg, David M.; Johansen, Joseph Neil; Hanson, Carrie Anne; Burrell, Charles Jason; Votaw, Elizabeth S., Self-selected user access based on specific authentication types.
  100. Oliver, Steve; Farnworth, Warren, Semiconductor device having backside redistribution layers.
  101. Grigg, David M.; Qaim-Maqami, Hood; Jones, Alicia C.; Votaw, Elizabeth S.; Johansen, Joseph Neil; Burrell, Charles Jason; Hanson, Carrie Anne; Lynch, Michael Patrick, Shutting down access to all user accounts.
  102. Fisher, Michelle, Single tap transactions using an NFC enabled mobile device.
  103. Grigg, David M.; Johansen, Joseph Neil; Toth, Michael E.; Carpenter, Daniel Lynn; Qaim-Maqami, Hood; Hanson, Carrie Anne; Votaw, Elizabeth S., Sorting mobile banking functions into authentication buckets.
  104. Dumont Charles (Old Parham Road - P.O. Box 1409 St. Johns ; Antigua FRX), Station for price scanning verifying and selectively bagging purchase items.
  105. Ellis, Stephen M.; Kennedy, Michael J.; Kurani, Ashish Bhoopen; Lowry, Melissa; Meyyappan, Uma; Sahni, Bipin; Stroke, Nikolai, System and method for a mobile wallet.
  106. Zapata, Onesimo; Zielinski, Susan E.; Flannery, Deana M., System and method for authentication of users in a secure computer system.
  107. Fried, Lance; Katz, Joseph; Korfin, Rick, System and method for biometrics-based fraud prevention.
  108. Berardi,Michael J.; Bliman,Michal; Bonalle,David S.; Elwood,Jennifer Anne; Hood,Matthew C.; Isenberg,Susan E.; Mayers,Alexandra; Saunders,Peter D.; Scheding,Kathryn D.; Shah,Sejal Ajit; Williamson,Jo, System and method for payment using radio frequency identification in contact and contactless transactions.
  109. Mendez, Daniel J.; Ng, Mason, System and method for preventing access to data on a compromised remote device.
  110. Degen Robert George ; Mellinger Philip Thomas, System and method for providing a card transaction authorization fraud warning.
  111. McClain, Fred, System and method for providing authentication and authorization utilizing a personal wireless communication device.
  112. Norris, Charles Leslie, System and method for providing controlled and secured access to network resources.
  113. Ellmore, Kimberly, System and method for single sign on process for websites with multiple applications and services.
  114. Evans, Alexander William, System and method for verification, authentication, and notification of transactions.
  115. Breck, Lydia; Zoob, Jessica; Salow, Glen; Bishop, Fred; Schwarz, William; Glazer, Elliot; Johnstone, David; Cunningham, Katie; Nambiar, Anant; Belt, Jan Nunney; Wittwer, Martin; Armes, David; Chow, Christina, System for facilitating a transaction.
  116. Dhesi, Rajkaran Singh; Hunt, Simon; Parke, Paul Martin, System, method, and computer program product for disabling a communication channel during authentication.
  117. Stambaugh, Rod, Systems and method for secure wireless payment transactions.
  118. Jakobsson, Bjorn Markus, Systems and methods for authenticating a user and device.
  119. Priebatsch, Seth, Systems and methods for dynamic transaction-payment routing.
  120. Liu, Qiong; Wilcox, Lynn Donelle, Systems and methods for implementing and using off-center embedded media markers.
  121. Huang, Ge Hua, Systems and methods for implementing password-protection policies based on physical locations of mobile devices.
  122. McClain, Fred, Systems and methods for providing authentication and authorization utilizing a personal wireless communication device.
  123. Speyer, Jerry; Nair, Sandeep; Lou, Ricky, Systems and methods for providing security token authentication.
  124. Speyer, Jerry; Nair, Sandeep; Luo, Ricky, Systems and methods for providing security token authentication.
  125. Orsini, Rick L.; O'Hare, Mark S.; Landau, Gabriel D.; Staker, Matthew; Yakamovich, William, Systems and methods for secure data sharing.
  126. Hirson, Ron; Niejadlik, Martine, Systems and methods to secure transactions via mobile devices.
  127. Lindelsee, Mike; Brand, Olivier; Dimmick, James; Dominguez, Benedicto, Token based transaction authentication.
  128. McGuire, Kevin M.; Taggart, Rush, Token-based payment processing system.
  129. Bomar, Kevin B.; Harper, Glenn E., Tokenized data security.
  130. Bailey, Bryan T.; Romer, John; Doyle, Chris; Gifford, Jeremy; Zibart, Kevin, Tokenizing sensitive data.
  131. Testa, James Fraser; Oren, Eyal; Cohen, Earl T., Tokens in token buckets maintained among primary and secondary storages.
  132. Collins, Jim; Kalgi, Avinash; Medlong, John; Lisagor, Paul, Transaction velocity counting for fraud detection.
  133. Pelegero, Rene M.; Balasubramanian, Girish; Mahadevan, Rohan, Unified identity verification.
  134. Buer, Mark, Universal authentication token.
  135. Grigg, David M.; Burrell, Charles Jason; Bertanzetti, Peter John, User authentication based on fob/indicia scan.
  136. Grigg, David M.; Bertanzetti, Peter John; Toth, Michael E.; Hanson, Carrie Anne; Votaw, Elizabeth S., User authentication based on historical transaction data.
  137. Grigg, David M.; Bertanzetti, Peter John; Toth, Michael E.; Hanson, Carrie Anne, User authentication based on historical user behavior.
  138. Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E.; Votaw, Elizabeth S., User authentication based on other applications.
  139. Grigg, David M.; Johansen, Joseph Neil; Hanson, Carrie Anne; Burrell, Charles Jason; Votaw, Elizabeth S., User authentication based on self-selected preferences.
  140. Grigg, David M.; Bertanzetti, Peter John; Toth, Michael E.; Hanson, Carrie Anne, User authentication by geo-location and proximity to user's close network.
  141. Ozzie, Raymond E.; Ozzie, Jack E.; Galvin, Thomas A.; Patey, Eric M., User authentication management.
  142. Labrou, Yannis; Agre, Jonathan Russell, Wireless computer wallet for physical point of sale (POS) transactions.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로