Pre-authorization access request screening
A technology of authorization request and access request, applied in the direction of instruments, digital data authentication, computing, etc., can solve problems such as obstruction of resource access, delay, coordination and communication difficulties
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0045] Determining whether to grant access to a resource can involve multiple stages. First, a secure authentication process may be performed to authenticate the user (eg, based on confirming that the user is who they claim to be). Subsequently, an authorization process can be performed to authorize access to resources (eg, resource access data based on payment credentials, etc.). Additionally, one or more fraud checks may be performed. These processes may involve similar data sets and analyses. However, the processes may be performed in a disjoint manner, resulting in duplication of effort and unnecessary data storage.
[0046] In step-up authentication, the user may be prompted for additional information such as a password or token. However, resource providers are increasingly moving to risk-based authentication, in part to reduce user headaches. Resource providers can implement a rules-based system to authenticate users based on analyzing the details of access requests....
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


