Unlock instant, AI-driven research and patent intelligence for your innovation.

Pre-authorization access request screening

A technology of authorization request and access request, applied in the direction of instruments, digital data authentication, computing, etc., can solve problems such as obstruction of resource access, delay, coordination and communication difficulties

Pending Publication Date: 2021-03-16
VISA INT SERVICE ASSOC
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Coordination and communication difficulties between these various computers may delay and frustrate such a process of providing access to resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Pre-authorization access request screening
  • Pre-authorization access request screening
  • Pre-authorization access request screening

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Determining whether to grant access to a resource can involve multiple stages. First, a secure authentication process may be performed to authenticate the user (eg, based on confirming that the user is who they claim to be). Subsequently, an authorization process can be performed to authorize access to resources (eg, resource access data based on payment credentials, etc.). Additionally, one or more fraud checks may be performed. These processes may involve similar data sets and analyses. However, the processes may be performed in a disjoint manner, resulting in duplication of effort and unnecessary data storage.

[0046] In step-up authentication, the user may be prompted for additional information such as a password or token. However, resource providers are increasingly moving to risk-based authentication, in part to reduce user headaches. Resource providers can implement a rules-based system to authenticate users based on analyzing the details of access requests....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Systems and methods are described for pre-authentication access request screening. A server computer may receive a request for access to a resource comprising access data. The server computer may transmit, to an authentication computer, an authentication request message comprising at least a subset of the access data and receive an authentication response message comprising authentication data. The server computer may determine an access score based on the authentication data. Alternatively, the server computer may determine the access score based on the access data without using / receiving authorization data. The server computer may generate an access indicator based on the access score. The server computer may prepare and transmit an authorization request message comprising the access indicator to an authorization computer. The authorization computer may approve or decline the access to the resource based on the access indicator.

Description

[0001] Related Application Cross Reference [0002] This application claims priority to U.S. Provisional Application No. 62 / 712,909, filed July 31, 2018, the contents of which are hereby incorporated by reference in their entirety. Background technique [0003] An unauthorized user may fraudulently request access to a resource using the authorized user's authorization information. To prevent unauthorized access, the system can use access rules to implement fraud checks to deny access requests with certain parameters that indicate fraudulent. [0004] Multiple computers may participate in routing and processing electronic communications as part of providing access to resources. For example, authentication checks may be performed to authenticate a user, fraud checks may be performed, and / or authorization checks (eg, based on data such as payment credentials) may be performed. One or more of these checks may be performed by one or more different entities. Coordination and comm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/45
CPCG06F21/604H04L63/10H04W12/08G06F21/10H04L63/102
Inventor A·J·B·瑙曼祖柯尼希斯布鲁克A·尚塞丁C·H·西登斯B·S·博丁
Owner VISA INT SERVICE ASSOC