Movatterモバイル変換


[0]ホーム

URL:


US20160277392A1 - Systems and methods for combined otp and kba identity authentication - Google Patents

Systems and methods for combined otp and kba identity authentication
Download PDF

Info

Publication number
US20160277392A1
US20160277392A1US15/166,300US201615166300AUS2016277392A1US 20160277392 A1US20160277392 A1US 20160277392A1US 201615166300 AUS201615166300 AUS 201615166300AUS 2016277392 A1US2016277392 A1US 2016277392A1
Authority
US
United States
Prior art keywords
subject
computing device
identity
code
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/166,300
Inventor
Bryan Knauss
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LexisNexis Risk Solutions Inc
Original Assignee
LexisNexis Risk Solutions Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LexisNexis Risk Solutions IncfiledCriticalLexisNexis Risk Solutions Inc
Priority to US15/166,300priorityCriticalpatent/US20160277392A1/en
Assigned to LEXISNEXIS RISK SOLUTIONS INC.reassignmentLEXISNEXIS RISK SOLUTIONS INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: KNAUSS, BRYAN
Publication of US20160277392A1publicationCriticalpatent/US20160277392A1/en
Priority to US15/454,355prioritypatent/US10375063B2/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Certain implementations include systems and methods for combined one-time- passcode (OTP) and knowledge-based-authentication (KBA) identity authentication. A method is provided that includes receiving a set of identity information associated with a subject; querying one or more databases; receiving personally identifiable information; producing at least one knowledge based authentication (KBA) identity proofing question having a personally identifiable correct answer; generating a unique correct one-time pass (OTP) code for the personally identifiable correct answer; generating one or more incorrect answers with corresponding incorrect codes; outputting, the at least one KBA identity proofing question; outputting the personally identifiable correct answer with the unique correct OTP code, and the one or more incorrect answers with corresponding incorrect codes; receiving a response code; comparing the response code and the unique correct OTP code; and responsive to a match between the response code and the unique correct OTP code, outputting a first indication of authentication.

Description

Claims (20)

We claim:
1. A computer-implemented method comprising:
receiving a set of identity information associated with a subject;
querying one or more databases with at least a portion of the set of identity information;
receiving, in response to the querying, personally identifiable information;
producing, with one or more computer processors, and based at least in part on the personally identifiable information, at least one knowledge based authentication (KBA) identity proofing question having a personally identifiable correct answer;
generating a unique correct one-time pass (OTP) code for the personally identifiable correct answer;
sending, for display on a first computing device associated with the subject, the at least one KBA identity proofing question;
sending, for display on a second computing device associated with the subject, the personally identifiable correct answer with the unique correct OTP code, and one or more incorrect answers with corresponding incorrect codes;
receiving, responsive to the sending, a response code and at least one identifier related to the first computing device;
comparing the response code and the unique correct OTP code;
comparing the at least one identifier and the set of identity information associated with the subject;
responsive to a match between the response code and the unique correct OTP code, and responsive to a match between the at least one identifier and at least a portion of the set of identity information associated with the subject, sending, for display on the first computing device associated with the subject, a first indication of authentication.
2. The method ofclaim 1, wherein the at least one identifier related to the first computing device comprises one or more of: a phone number, an IP address, a MAC address, a location, an indication of signal-to-noise, browser configuration information, operating system information, a listing of installed fonts, and a listing of installed plug-ins.
3. The method ofclaim 1, further comprising sending, for display on the first computing device associated with the subject, an indication of authentication failure responsive to a determined mismatch between the at least one identifier and at least a portion of the set of identity information associated with the subject.
4. The method ofclaim 3, wherein the mismatch is determined based on a location of one or more of the first and second computing devices being associated with a geographical region having a high crime rate.
5. The method ofclaim 1, wherein the at least one KBA identity proofing question is sent via a first communication channel, and wherein the personally identifiable correct answer with the unique correct OTP code is sent via a second communication channel.
6. The method ofclaim 5, wherein the second communication channel differs from the first communication channel.
7. The method ofclaim 1, wherein the first computing device differs from the second computing device
8. The method ofclaim 1, further comprising:
receiving new biometric information associated with the subject;
querying one or more databases for previously stored biometric information associated with the subject;
comparing the new biometric information with the previously store biometric information; and
responsive to a match between the new and previously stored biometric information, sending, for display on one or more of the first computing device and the second computing device, a second indication of authentication.
9. The method ofclaim 8, wherein the biometric information comprises one or more of:
fingerprint image, voiceprint, facial feature image, and iris image.
10. The method ofclaim 1, wherein receiving the set of identity information comprises receiving, as applicable, one or more of: a name, an address, a birth date, a phone number, at least portion of a social security number, an IP address, a location, and a communication device electronic fingerprint.
11. A system comprising:
at least one memory for storing data and computer-executable instructions; and at least one processor configured to access the at least one memory and further configured to execute the computer-executable instructions to:
receive a set of identity information associated with a subject;
query one or more databases with at least a portion of the set of identity information;
receive, in response to the querying, personally identifiable information;
produce, with one or more computer processors, and based at least in part on the personally identifiable information, at least one knowledge based authentication (KBA) identity proofing question having a personally identifiable correct answer;
generate a unique correct one-time pass (OTP) code for the personally identifiable correct answer;
send, for display on a first computing device associated with the subject, the at least one KBA identity proofing question;
send, for display on a second computing device associated with the subject, the personally identifiable correct answer with the unique correct OTP code, and one or more incorrect answers with corresponding incorrect codes;
receive, responsive to the sending, a response code and at least one identifier related to the first computing device;
compare the response code and the unique correct OTP code;
compare the at least one identifier and the set of identity information associated with the subject;
responsive to a match between the response code and the unique correct OTP code, and responsive to a match between the at least one identifier and at least a portion of the set of identity information associated with the subject, send, for display on the first computing device associated with the subject, a first indication of authentication.
12. The system ofclaim 11, wherein the at least one identifier related to the first computing device comprises one or more of: a phone number, an IP address, a MAC address, a location, an indication of signal-to-noise, browser configuration information, operating system information, a listing of installed fonts, and a listing of installed plug-ins.
13. The system ofclaim 11, wherein the at least one processor is further configured to execute the computer-executable instructions to send, for display on the first computing device associated with the subject, an indication of authentication failure responsive to a determined mismatch between the at least one identifier and at least a portion of the set of identity information associated with the subject.
14. The system ofclaim 13, wherein the mismatch is determined based on a location of one or more of the first and second computing devices being associated with a geographical region having a high crime rate.
15. The system ofclaim 11, wherein the at least one KBA identity proofing question is sent via a first communication channel, and wherein the personally identifiable correct answer with the unique correct OTP code is sent via a second communication channel.
16. The system ofclaim 15, wherein the second communication channel differs from the first communication channel.
17. The system ofclaim 11, wherein the first computing device differs from the second computing device
18. The system ofclaim 11, wherein the at least one processor is further configured to execute the computer-executable instructions to:
receive new biometric information associated with the subject;
query one or more databases for previously stored biometric information associated with the subject;
compare the new biometric information with the previously store biometric information;
responsive to a match between the new and previously stored biometric information, send, for display on one or more of the first computing device and the second computing device, a second indication of authentication; and
responsive to a mismatch between the new and previously stored biometric information, send, for display on one or more of the first computing device and the second computing device, an indication of a mismatch.
19. The system ofclaim 11, wherein the set of identity information comprises one or more of: a name, an address, a birth date, a phone number, at least portion of a social security number, an IP address, a location, and a communication device electronic fingerprint.
20. The system ofclaim 11, wherein a first communication channel is configured for communication with the first computing device, and wherein a second communication channel is configured for communication with the second computing device.
US15/166,3002014-07-292016-05-27Systems and methods for combined otp and kba identity authenticationAbandonedUS20160277392A1 (en)

Priority Applications (2)

Application NumberPriority DateFiling DateTitle
US15/166,300US20160277392A1 (en)2014-07-292016-05-27Systems and methods for combined otp and kba identity authentication
US15/454,355US10375063B2 (en)2014-07-292017-03-09Systems and methods for combined OTP and KBA identity authentication utilizing academic publication data

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US14/446,007US9380057B2 (en)2014-07-292014-07-29Systems and methods for combined OTP and KBA identity authentication
US15/166,300US20160277392A1 (en)2014-07-292016-05-27Systems and methods for combined otp and kba identity authentication

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US14/446,007ContinuationUS9380057B2 (en)2014-07-292014-07-29Systems and methods for combined OTP and KBA identity authentication

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US15/454,355Continuation-In-PartUS10375063B2 (en)2014-07-292017-03-09Systems and methods for combined OTP and KBA identity authentication utilizing academic publication data

Publications (1)

Publication NumberPublication Date
US20160277392A1true US20160277392A1 (en)2016-09-22

Family

ID=55181257

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US14/446,007ActiveUS9380057B2 (en)2014-07-292014-07-29Systems and methods for combined OTP and KBA identity authentication
US15/166,300AbandonedUS20160277392A1 (en)2014-07-292016-05-27Systems and methods for combined otp and kba identity authentication

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US14/446,007ActiveUS9380057B2 (en)2014-07-292014-07-29Systems and methods for combined OTP and KBA identity authentication

Country Status (2)

CountryLink
US (2)US9380057B2 (en)
WO (1)WO2016018621A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10375063B2 (en)*2014-07-292019-08-06Lexisnexis Risk Solutions Inc.Systems and methods for combined OTP and KBA identity authentication utilizing academic publication data
WO2022051853A1 (en)2020-09-092022-03-171125855 Alberta LimitedSystems and methods for providing remote call center services
US20240086501A1 (en)*2022-09-122024-03-14Capital One Services, LlcComputer-based systems applying textual embedding space software engines to authentication question and answers for identifying a user and methods of use thereof

Families Citing this family (29)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8312033B1 (en)2008-06-262012-11-13Experian Marketing Solutions, Inc.Systems and methods for providing an integrated identifier
US9147042B1 (en)2010-11-222015-09-29Experian Information Solutions, Inc.Systems and methods for data verification
US9070131B2 (en)*2011-06-142015-06-30Ark Ideaz, Inc.Authentication systems and methods
US9607336B1 (en)2011-06-162017-03-28Consumerinfo.Com, Inc.Providing credit inquiry alerts
US10664936B2 (en)2013-03-152020-05-26Csidentity CorporationAuthentication systems and methods for on-demand products
US9633322B1 (en)2013-03-152017-04-25Consumerinfo.Com, Inc.Adjustment of knowledge-based authentication
US9721147B1 (en)2013-05-232017-08-01Consumerinfo.Com, Inc.Digital identity
US9565562B1 (en)*2013-12-052017-02-07EMC IP Holding Company LLCKnowledge based authentication using mobile devices
US10373240B1 (en)2014-04-252019-08-06Csidentity CorporationSystems, methods and computer-program products for eligibility verification
US9380057B2 (en)*2014-07-292016-06-28Lexisnexis Risk Solutions Inc.Systems and methods for combined OTP and KBA identity authentication
US10467468B2 (en)*2015-03-092019-11-05Michigan Health Information Network Shared ServicesSystem and method for identity proofing and knowledge based authentication
KR101715504B1 (en)*2015-09-162017-03-14성균관대학교산학협력단Authentication method for otp using color code and authentication server for otp using color code
US10616235B2 (en)*2015-11-252020-04-07Check Point Public Cloud Security Ltd.On-demand authorization of access to protected resources
US10009340B2 (en)*2016-03-252018-06-26Fortinet, Inc.Secure, automatic second factor user authentication using push services
US10521572B2 (en)2016-08-162019-12-31Lexisnexis Risk Solutions Inc.Systems and methods for improving KBA identity authentication questions
US10891626B2 (en)*2016-12-092021-01-12Lexisnexis Risk Solutions Inc.Systems and methods for identity verification
US10594685B2 (en)*2017-10-192020-03-17Salesforce.Com, Inc.User selected key authentication
US11163869B2 (en)*2017-10-272021-11-02International Business Machines CorporationIdentity authentication without entry of password
CN107919961A (en)*2017-12-072018-04-17广州势必可赢网络科技有限公司Identity authentication protocol and server based on dynamic code and dynamic voiceprint update
US11855971B2 (en)*2018-01-112023-12-26Visa International Service AssociationOffline authorization of interactions and controlled tasks
US10764068B2 (en)2018-01-302020-09-01EMC IP Holding Company LLCComputer system employing challenge/response protocol with detection of non-unique incorrect responses
EP3797498A1 (en)*2018-05-232021-03-31BAE SYSTEMS plcAuthenticating an entity
US11303632B1 (en)*2018-06-082022-04-12Wells Fargo Bank, N.A.Two-way authentication system and method
US10911234B2 (en)2018-06-222021-02-02Experian Information Solutions, Inc.System and method for a token gateway environment
US10819706B2 (en)*2018-07-092020-10-27IgtSystem, apparatus and method for facilitating remote gaming communications in a venue
US11941065B1 (en)2019-09-132024-03-26Experian Information Solutions, Inc.Single identifier platform for storing entity data
US10967278B1 (en)*2019-10-022021-04-06Kieran GoodwinSystem and method of leveraging anonymity of computing devices to facilitate truthfulness
US11741201B2 (en)2020-09-092023-08-29The Toronto-Dominion BankSystems and methods for initiating an authenticated session
IT202200016353A1 (en)*2022-08-022024-02-02Cyber Grant Inc HUMAN-LIKE USER AUTHENTICATION METHOD.

Citations (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20040258281A1 (en)*2003-05-012004-12-23David DelgrossoSystem and method for preventing identity fraud
US20080021761A1 (en)*2006-07-202008-01-24Factortrust, Inc.Transaction processing systems and methods
US20110191200A1 (en)*2010-02-042011-08-04Lex BayerMethod and system for authenticating online transactions
US20110238573A1 (en)*2010-03-252011-09-29Computer Associates Think, Inc.Cardless atm transaction method and system
US20120191621A1 (en)*2009-07-312012-07-26Anakam, Inc.System and Method for Strong Remote Identity Proofing
US20130174240A1 (en)*2011-12-282013-07-04Prasanna BidareComputer Implemented System and Method for Providing Challenge-Response Solutions to Authenticate a User
US20130347129A1 (en)*2004-07-152013-12-26Anakam, Inc.System and Method for Second Factor Authentication Services
US20140041000A1 (en)*2012-06-072014-02-06Authentify, Inc.Enhanced 2chk authentication security with information conversion based on user-selected persona
US20150087265A1 (en)*2013-09-242015-03-26Telesign CorporationCall center sms verification system and method
US9092599B1 (en)*2012-09-272015-07-28Emc CorporationManaging knowledge-based authentication systems
US9210156B1 (en)*2014-06-162015-12-08Lexisnexis Risk Solutions Inc.Systems and methods for multi-stage identity authentication
US9380057B2 (en)*2014-07-292016-06-28Lexisnexis Risk Solutions Inc.Systems and methods for combined OTP and KBA identity authentication

Family Cites Families (28)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
FR2741465B1 (en)*1995-11-201997-12-19Bull Sa METHOD FOR AUTHENTICATION OF A USER WORKING IN A DISTRIBUTED ENVIRONMENT IN CLIENT/SERVER MODE
US6862610B2 (en)2000-05-082005-03-01Ideaflood, Inc.Method and apparatus for verifying the identity of individuals
WO2002041114A2 (en)2000-10-302002-05-23Raf Technology, Inc.Verification engine for user authentication
US20050039057A1 (en)*2003-07-242005-02-17Amit BaggaMethod and apparatus for authenticating a user using query directed passwords
KR20050078462A (en)*2004-01-312005-08-05삼성전자주식회사Security printing system and method
US20060287766A1 (en)2005-06-202006-12-21Kraft Harold HPrivacy Information Reporting Systems with Enhanced Utility
US20070172063A1 (en)*2006-01-202007-07-26Microsoft CorporationOut-Of-Band Authentication for Automated Applications ("BOTS")
US20080216172A1 (en)*2006-07-132008-09-04Victor FormanSystems, methods, and apparatus for secure transactions in trusted systems
US7966649B1 (en)*2007-02-192011-06-21Timothy William CooperSystem and method for login resistant to compromise
US20080249947A1 (en)2007-04-092008-10-09Potter Eric RMulti-factor authentication using a one time password
US20090276839A1 (en)*2008-05-022009-11-05Fortknock Protection LlcIdentity collection, verification and security access control system
US20090305670A1 (en)*2008-06-102009-12-10Prairie Interactive MessagingSystem and method for automated knowledge based authentication
JP4547447B2 (en)*2008-07-172010-09-22学校法人 芝浦工業大学 Password authentication apparatus and password authentication method
US20100250955A1 (en)2008-10-222010-09-30Paul TrevithickBrokered information sharing system
US8527773B1 (en)*2009-03-092013-09-03Transunion Interactive, Inc.Identity verification systems and methods
US8973154B2 (en)*2010-02-022015-03-03Kazu YanagiharaAuthentication using transient event data
US8856954B1 (en)*2010-12-292014-10-07Emc CorporationAuthenticating using organization based information
EP2515497B1 (en)2011-04-182018-07-04Werner BlessingMethod for performing authentication in a distributed authentication system and authentication system
US20130191898A1 (en)2012-01-042013-07-25Harold H. KRAFTIdentity verification credential with continuous verification and intention-based authentication systems and methods
US9131374B1 (en)*2012-02-242015-09-08Emc CorporationKnowledge-based authentication for restricting access to mobile devices
US9419966B2 (en)*2012-08-232016-08-16Alejandro V. NatividadMethod for producing dynamic data structures for authentication and/or password identification
US9177127B1 (en)*2012-12-312015-11-03Emc CorporationConfounder generation in knowledge-based authentication for an enterprise
US9223950B2 (en)*2013-03-052015-12-29Intel CorporationSecurity challenge assisted password proxy
US9230077B2 (en)*2013-03-152016-01-05International Business Machines CorporationAlias-based social media identity verification
US8990909B2 (en)*2013-06-252015-03-24Bank Of America CorporationOut-of-band challenge question authentication
CN104348822B (en)*2013-08-092019-01-29深圳市腾讯计算机系统有限公司A kind of method, apparatus and server of internet account number authentication
US9928358B2 (en)*2013-12-092018-03-27Mastercard International IncorporatedMethods and systems for using transaction data to authenticate a user of a computing device
US9032498B1 (en)*2014-05-252015-05-12Mourad Ben AyedMethod for changing authentication for a legacy access interface

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20040258281A1 (en)*2003-05-012004-12-23David DelgrossoSystem and method for preventing identity fraud
US20130347129A1 (en)*2004-07-152013-12-26Anakam, Inc.System and Method for Second Factor Authentication Services
US20080021761A1 (en)*2006-07-202008-01-24Factortrust, Inc.Transaction processing systems and methods
US20120191621A1 (en)*2009-07-312012-07-26Anakam, Inc.System and Method for Strong Remote Identity Proofing
US20110191200A1 (en)*2010-02-042011-08-04Lex BayerMethod and system for authenticating online transactions
US20110238573A1 (en)*2010-03-252011-09-29Computer Associates Think, Inc.Cardless atm transaction method and system
US20130174240A1 (en)*2011-12-282013-07-04Prasanna BidareComputer Implemented System and Method for Providing Challenge-Response Solutions to Authenticate a User
US20140041000A1 (en)*2012-06-072014-02-06Authentify, Inc.Enhanced 2chk authentication security with information conversion based on user-selected persona
US9092599B1 (en)*2012-09-272015-07-28Emc CorporationManaging knowledge-based authentication systems
US20150087265A1 (en)*2013-09-242015-03-26Telesign CorporationCall center sms verification system and method
US9210156B1 (en)*2014-06-162015-12-08Lexisnexis Risk Solutions Inc.Systems and methods for multi-stage identity authentication
US9380057B2 (en)*2014-07-292016-06-28Lexisnexis Risk Solutions Inc.Systems and methods for combined OTP and KBA identity authentication

Cited By (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10375063B2 (en)*2014-07-292019-08-06Lexisnexis Risk Solutions Inc.Systems and methods for combined OTP and KBA identity authentication utilizing academic publication data
WO2022051853A1 (en)2020-09-092022-03-171125855 Alberta LimitedSystems and methods for providing remote call center services
EP4211890A4 (en)*2020-09-092024-10-161125855 Alberta LimitedSystems and methods for providing remote call center services
US12368803B2 (en)2020-09-092025-07-221125855 Alberta LimitedSystems and methods for providing remote call center services
US20240086501A1 (en)*2022-09-122024-03-14Capital One Services, LlcComputer-based systems applying textual embedding space software engines to authentication question and answers for identifying a user and methods of use thereof
US12287856B2 (en)*2022-09-122025-04-29Capital One Services, LlcComputer-based systems applying textual embedding space software engines to authentication question and answers for identifying a user and methods of use thereof

Also Published As

Publication numberPublication date
US9380057B2 (en)2016-06-28
US20160036807A1 (en)2016-02-04
WO2016018621A1 (en)2016-02-04

Similar Documents

PublicationPublication DateTitle
US9380057B2 (en)Systems and methods for combined OTP and KBA identity authentication
US10375063B2 (en)Systems and methods for combined OTP and KBA identity authentication utilizing academic publication data
US11423131B2 (en)Systems and methods for improving KBA identity authentication questions
US10454924B1 (en)Systems and methods for providing credentialless login using a random one-time passcode
US9210156B1 (en)Systems and methods for multi-stage identity authentication
US10476888B2 (en)Systems and methods for using video for user and message authentication
US9143506B2 (en)Systems and methods for identifying biometric information as trusted and authenticating persons using trusted biometric information
US8914645B2 (en)Systems and methods for identifying biometric information as trusted and authenticating persons using trusted biometric information
US10735198B1 (en)Systems and methods for tokenized data delegation and protection
US20210357930A1 (en)Risk mitigation for a cryptoasset custodial system using a hardware security key
US20170093851A1 (en)Biometric authentication system
US11663306B2 (en)System and method for confirming a person's identity
US8572398B1 (en)Systems and methods for identifying biometric information as trusted and authenticating persons using trusted biometric information
US10939291B1 (en)Systems and methods for photo recognition-based identity authentication
US20240333534A1 (en)Systems and methods for identity authentication using multiple-choice shared secret questions
US20250148063A1 (en)Systems and methods for chatbot authentication

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:LEXISNEXIS RISK SOLUTIONS INC., GEORGIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:KNAUSS, BRYAN;REEL/FRAME:038733/0505

Effective date:20140729

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp