Patent classifications
G06F21/34
SYSTEM AND METHODS FOR USER AUTHENTICATION AFTER FAILED ATTEMPTS
Systems and methods for user authentications. In some embodiments, the systems are configured to perform operations including: receiving and declining one or more attempts for authentication from a user device, transmitting to and causing the user device to display a code, receiving an authentication request associated with the code being scanned, collecting one or more properties associated with one or more user devices, evaluating an audit trail to generate an evaluation result, and transmitting a notification to the user device based at least in part on the evaluation result.
SYSTEM AND METHODS FOR USER AUTHENTICATION AFTER FAILED ATTEMPTS
Systems and methods for user authentications. In some embodiments, the systems are configured to perform operations including: receiving and declining one or more attempts for authentication from a user device, transmitting to and causing the user device to display a code, receiving an authentication request associated with the code being scanned, collecting one or more properties associated with one or more user devices, evaluating an audit trail to generate an evaluation result, and transmitting a notification to the user device based at least in part on the evaluation result.
Biometric authentication during voice data transfers
There are provided systems and methods for biometric authentication during voice data transfers. A user may initiate voice communications with a service provider endpoint that provides automated services to the user through the voice or audio communications, such as an interactive voice response (IVR) system where a user may navigate menus through audio commands. The user may by required to authenticate their identity during the phone call or other voice data transfer, which may be done by entering a biometric, such as a fingerprint. The biometric may be converted to biometric feature data and provided to one or more token service providers. The token service providers may provide one or more tokens for the biometric, which may be used as the authentication token. This token may then be transmitted to the IVR system through the user's endpoint using a dialer feature of the endpoint.
Biometric authentication during voice data transfers
There are provided systems and methods for biometric authentication during voice data transfers. A user may initiate voice communications with a service provider endpoint that provides automated services to the user through the voice or audio communications, such as an interactive voice response (IVR) system where a user may navigate menus through audio commands. The user may by required to authenticate their identity during the phone call or other voice data transfer, which may be done by entering a biometric, such as a fingerprint. The biometric may be converted to biometric feature data and provided to one or more token service providers. The token service providers may provide one or more tokens for the biometric, which may be used as the authentication token. This token may then be transmitted to the IVR system through the user's endpoint using a dialer feature of the endpoint.
SYSTEMS AND METHODS FOR FACILITATING CARD VERIFICATION OVER A NETWORK
A system and method for facilitating electronic commerce over a network, according to one or more embodiments, includes communicating with a user via a user device and an issuer of payment media via an issuer device over the network, the payment media being issued to the user by the issuer, receiving user instruction over the network to link the payment media to a user account related to the user, prompting the user over the network to input a secure password known only by the issuer and the user, receiving the secure password from the user over the network, verifying that the payment media is owned by the user over the network via a secure protocol, returning a response to the user related to verification of the payment media, and storing payment media verification information.
SYSTEMS AND METHODS FOR FACILITATING CARD VERIFICATION OVER A NETWORK
A system and method for facilitating electronic commerce over a network, according to one or more embodiments, includes communicating with a user via a user device and an issuer of payment media via an issuer device over the network, the payment media being issued to the user by the issuer, receiving user instruction over the network to link the payment media to a user account related to the user, prompting the user over the network to input a secure password known only by the issuer and the user, receiving the secure password from the user over the network, verifying that the payment media is owned by the user over the network via a secure protocol, returning a response to the user related to verification of the payment media, and storing payment media verification information.
Wireless Channel Selection for Multipath Authentication of a User
An identity verification system determines a communication channel that transmits signals between the computer system and an authentication device by selecting a data link circuit at the computer system. The identity verification system transmits an authentication request received at the computer system to the authentication device via the communication channel and the authentication device validates the authentication request. In response to the authentication device validating the authentication request, the identity verification system measures a proximity of the authentication device to the computer system based on data transmitted through a proximity channel. If the measured proximity of the authentication device satisfies a threshold proximity, the user verification system grants grant the target user access to the to the computer system.
Wireless Channel Selection for Multipath Authentication of a User
An identity verification system determines a communication channel that transmits signals between the computer system and an authentication device by selecting a data link circuit at the computer system. The identity verification system transmits an authentication request received at the computer system to the authentication device via the communication channel and the authentication device validates the authentication request. In response to the authentication device validating the authentication request, the identity verification system measures a proximity of the authentication device to the computer system based on data transmitted through a proximity channel. If the measured proximity of the authentication device satisfies a threshold proximity, the user verification system grants grant the target user access to the to the computer system.
Method to verify identity using a previously collected biometric image/data
A system for remote identity verification including a computing device configured to capture a first image of the user a first distance and capture a second image at a second distance and then processing the images to create one or more facemaps. The facemaps are processed to verify that the images were captured from a live person. If the facemaps represents a live person, the facemaps and a user identifying code are sent to a trusted image server. The rusted image server configured to, using the user ID code, retrieve a trusted image from a database and generate a trusted image facemaps. Then, compare captured image facemaps to the trusted image facemaps. Responsive to a match between the captured image facemaps and the trusted image facemaps, send a message to the computing device, a third-party server, or both providing notice of the match.
Method to verify identity using a previously collected biometric image/data
A system for remote identity verification including a computing device configured to capture a first image of the user a first distance and capture a second image at a second distance and then processing the images to create one or more facemaps. The facemaps are processed to verify that the images were captured from a live person. If the facemaps represents a live person, the facemaps and a user identifying code are sent to a trusted image server. The rusted image server configured to, using the user ID code, retrieve a trusted image from a database and generate a trusted image facemaps. Then, compare captured image facemaps to the trusted image facemaps. Responsive to a match between the captured image facemaps and the trusted image facemaps, send a message to the computing device, a third-party server, or both providing notice of the match.