CPC H04L 63/0861 (2013.01) [G06F 18/22 (2023.01); G06F 21/32 (2013.01); G06F 21/45 (2013.01); G06V 40/50 (2022.01)] | 20 Claims |
1. A method for authenticating a user for access to an application, comprising:
receiving a selection of an operation associated with the application;
receiving a security threshold associated with the operation from a third party, wherein the security threshold comprises a minimum authentication score;
assessing environmental conditions associated with a device on which a user interface is displayed to determine a suitable subset of a plurality of biometric authentication modalities for authenticating the user and an unsuitable subset of the plurality of biometric authentication modalities not available for authenticating the user;
displaying, via the user interface, the plurality of biometric authentication modalities, wherein the suitable subset of the plurality of biometric authentication modalities is selectable by the user but the unsuitable subset of the plurality of biometric authentication modalities are not selectable by the user;
receiving, via the user interface, a selection of a first biometric authentication modality from the suitable subset of the plurality of biometric authentication modalities;
receiving first user authentication data for the first biometric authentication modality from the suitable subset of the plurality of biometric authentication modalities;
comparing the first user authentication data for the first biometric authentication modality with previously-determined biometric data;
determining a first authentication score based on the comparison of the first user authentication data with the previously-determined biometric data;
comparing the first authentication score to the security threshold;
receiving, based on a determination that the first authentication score is less than the security threshold, second user authentication data for a second biometric authentication modality from the suitable subset of the plurality of biometric authentication modalities;
determining a second authentication score based on a comparison of the second user authentication data with the previously-determined biometric data; and
authenticating the user in response to determining that the second authentication score satisfies the security threshold.
|