The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.
The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.
Patent No.:
Date of Patent:
Nov. 24, 2015
Filed:
Aug. 19, 2013
Mastercard International Incorporated, Purchase, NY (US);
John D. O'Neill, Darien, CT (US);
Eric Alger, Edwardsville, IL (US);
Scott W. Anderson, Jr., Wentzville, MO (US);
Joshua J. Baron, Wildwood, MO (US);
Matthew R. Cahalin, O'Fallon, MO (US);
Ryan T. Dunn, St. Peters, MO (US);
Richard D. d'Erizans, Pleasantville, NY (US);
Gregg A. Hill, Lake Saint Louis, MO (US);
Matthew E. Hopkins, St. Peters, MO (US);
Justin T. Katen, Foristell, MO (US);
Cynthia E. Pilling, Wildwood, MO (US);
James B. Schelker, Chesterfield, MO (US);
Prashant Sharma, Ballwin, MO (US);
Jenny Q. Zhang, Wildwood, MO (US);
MasterCard International Incorporated, Purchase, NY (US);
Abstract
A computer system for authenticating user access to at least one computer application of a plurality of computer applications is provided. The computer system includes a memory device and a processor. The computer system is programmed to identify a security level from a plurality of security levels for each computer application within the plurality of computer applications. The plurality of security levels include at least a first-tier security level and a second-tier security level. The second-tier security level requires additional authentication information as compared to the first-tier security level. The computer system is also programmed to create a user account for a user within the memory device with the first-tier security level, and to determine that the user account requires the second-tier security level, and prompt the user to enter the additional authentication information. The computer system is also programmed to promote the user account to the second-tier security level.