Abstract:
Embodiments are directed to systems, methods and computer program products for providing user authentication based on transaction data. Embodiments receive from a user, a request to execute a user action associated with an application, wherein execution of the user action requires validation of authentication credentials; collect a transaction set of data comprising information related to transactions conducted by the user; collect a location set of data comprising information related to a physical location of the user; determine a transaction proximity score associated with the user and the transactions; determine a level of authentication associated with the determined transaction proximity score; determine which authentication types are associated with the level of authentication; request authentication credentials; receive authentication credentials from the user; validate the authentication credentials, thereby resulting in a successful validation of the authentication credentials; and, in response to the successful validation of the authentication credentials, execute the user action.
Abstract:
Embodiments of the invention include systems, methods, and computer-program products for a clearing house for creating and directing readable indicia to/from merchants, users, and/or vendors. As such, merchants, users, and vendors may all be able to recognize, read, and complete transactions using a created universal readable indicia, irrespective of the entities associated with the transaction. The invention may create and provide a universal readable indicia that may be read and/or scanned by any of a user, merchant, or vendor. Subsequently, upon scanning, the system may recognize the appropriate vendor associated with the scan, based on information about the user or merchant derived from the scan. As such, the invention may be able to convert the universal readable indicia to one or more indicia accepted by a vendor that may complete the transaction with the user and/or merchant.
Abstract:
The present invention is directed to apparatuses, methods, and computer-program products for a multipurpose wearable device that is associated with one or more financial accounts wherein, in use, the wearable device is configured to facilitate a financial transaction using at least one of the one or more financial accounts. The wearable device comprises: a wearable article, wherein the wearable article comprises one or more features securing the wearable article to a person or an item associated with the person; and a portion comprising a machine-readable indicia, wherein the machine-readable indicia, when successfully read, provides payment information for conducting a financial transaction.
Abstract:
The present invention includes a system for authenticating a second action based on a first action, wherein the system is configured to: receive a first request to execute a first action associated with a first application; determine that execution of the first action requires user authentication; request one or more authentication credentials from the user; receive a first authentication credential associated with the first action; validate the first authentication credential, thereby resulting in a successful validation of the received first authentication credential; in response to the successful validation, execute the first action; receive a second request to execute a second action associated with a second application; determine that execution of the second action requires user authentication; use the successful validation of the first authentication credential to validate a second authentication credential so that the second action may be executed.
Abstract:
Disclosed is a system and associated method or restricting access to a user's account via one or more account access channels. The system typically includes a processor, a memory, and an access restriction module stored in the memory. The module is typically configured for: integrating one or more account access channels associated with the user's account with an access restriction procedure; receiving a request from the user to implement the access restriction procedure; based on receiving the request from the user to implement the access restriction procedure, implementing the access restriction procedure, wherein implementing the access restriction procedure comprises restricting access to the user's account via the account access channel(s).
Abstract:
Embodiments are directed to systems, methods and computer program products for sorting mobile banking functions into authentication buckets. Embodiments determine, for each of a plurality of mobile banking functions, a corresponding authentication buckets, where each authentication bucket corresponds with a level of authentication. Some embodiments receive a request, from a user, to access a function; access the plurality of authentication buckets to determine which of the authentication buckets corresponds with the requested function; determine the level of authentication associated with the determined authentication bucket; determine which authentication types are associated with the level of authentication; request authentication credentials corresponding to the authentication types; receive authentication credentials from the user; validate the authentication credentials, thereby resulting in a successful validation of the authentication credentials; and, in response to the successful validation of the authentication credentials, enable access to the function requested by the user.
Abstract:
Systems, apparatus, methods, and computer program products are provided for determining a user's authentication requirements/credentials for a specific network access session based on the current location of the user in comparison to known boundaries of location associated with the user, such as patterns of movement or the like. As such, the present invention serves to expedite the process for authenticating a user who desires to gain access to a network service, such as a banking application or the like.
Abstract:
Systems and methods for using proximity positioning systems to determine a location of a user, identify the user and provide additional services and/or functionality to the user based on the determined location and/or identity are presented. In some examples, a low-power radio signal emitted from a location beacon may be received or detected by a personal computing device. The location of the beacon, and the device detecting the signal, may be determined. The location information, as well as a unique identifier associated with the personal computing device, may be used to identify a user associated with the personal computing device and the location of the user. This information may be used to provide additional services and/or functionality to the user. For instance, the location and identity information may be used to provide the user with access to secure areas within a location.
Abstract:
A computing platform may receive a plurality of messages comprising data indicating physical presence of customers at a physical location from an indoor positioning system located at the physical location. The computing platform may determine that one or more customers of the customers at the physical location have left the physical location based on at least a portion of the data indicating the physical presence of the customers at the physical location. Responsive to determining that the one or more customers of the customers at the physical location have left the physical location, the computing platform may generate one or more messages soliciting feedback from the one or more customers regarding their experience at the physical location.
Abstract:
Methods and systems for providing targeted advertising using local positioning technology are presented. In some embodiments, a customer assistance computing platform may receive one or more attributes associated with a beacon signal received by a customer computing device and an identifier associated with the customer computing device. Subsequently, the computing platform may determine an identity of a customer using the customer computing device. The computing platform then may determine a location of the customer using the customer computing device based on the one or more attributes associated with the beacon signal. Thereafter, the computing platform may select, based on the identity of the customer and the location of the customer, advertising content to be presented to the customer using the customer computing device. Then, the computing platform may send the selected advertising content to one or more recipient computing devices.