Abstract:
Embodiments are directed to systems, methods and computer program products for sorting mobile banking functions into authentication buckets. Embodiments determine, for each of a plurality of mobile banking functions, a corresponding authentication buckets, where each authentication bucket corresponds with a level of authentication. Some embodiments receive a request, from a user, to access a function; access the plurality of authentication buckets to determine which of the authentication buckets corresponds with the requested function; determine the level of authentication associated with the determined authentication bucket; determine which authentication types are associated with the level of authentication; request authentication credentials corresponding to the authentication types; receive authentication credentials from the user; validate the authentication credentials, thereby resulting in a successful validation of the authentication credentials; and, in response to the successful validation of the authentication credentials, enable access to the function requested by the user.
Abstract:
Embodiments of the invention are directed to systems, methods and computer program products for transaction queuing. In some embodiments, a system is configured to: receive information associated with an intended transaction, wherein a user will execute the intended transaction at a facility at a user-defined time; determine preliminary work associated with the intended transaction that can be performed prior to the user-defined time; and perform the preliminary work associated with the intended transaction. The preliminary work is placed on a transaction queue until the user arrives at the facility.
Abstract:
The present invention is directed to an apparatus, a method, and a computer program product for authenticating a user based on a sequence of rhythmic inputs. The user via a mobile device provides one or more inputs (e.g., pushing a button, tapping a touchscreen, a biometric, or the like) to one or more sensors associated with the mobile device as an attempt of authorization. The one or more inputs may be provided in a rhythmic manner (e.g., provided in time with music). The present invention then compares the provided one or more inputs to one or more predetermined sequences of inputs that are associated with positive authentication of the user (e.g., a known password). The phone determines that the one or more provided inputs match one or more predetermined rhythmic sequences associated with positive authentication of the user and authenticates the user.
Abstract:
Embodiments of the invention include systems, methods, and computer-program products for a clearing house for creating and directing readable indicia to/from merchants, users, and/or vendors. As such, merchants, users, and vendors may all be able to recognize, read, and complete transactions using a created universal readable indicia, irrespective of the entities associated with the transaction. The invention may create and provide a universal readable indicia that may be read and/or scanned by any of a user, merchant, or vendor. Subsequently, upon scanning, the system may recognize the appropriate vendor associated with the scan, based on information about the user or merchant derived from the scan. As such, the invention may be able to convert the universal readable indicia to one or more indicia accepted by a vendor that may complete the transaction with the user and/or merchant.
Abstract:
Embodiments are directed to systems, methods and computer program products for providing user authentication based on historical user patterns. Embodiments of the present invention may be configured to communicate code executable by a computing device that causes the computing device to monitor user patterns of a user based on the user interacting with the computing device; receive baseline user patterns to identify the user; identify, from the baseline user patterns, one or more routine actions performed by the user operating the computing device; receive a request to perform a transaction, wherein the transaction is associated with a level of security that must be authenticated; receive identification user patterns of the user based on the user interacting with the computing device; determine a threshold score based on comparing the identification user patterns with the baseline user patterns; and alter the level of security.
Abstract:
Methods and systems for predicting and responding to customer needs using local positioning technology are presented. In some embodiments, a customer assistance computing platform may receive one or more attributes associated with a beacon signal received by a customer computing device and an identifier associated with the customer computing device. Subsequently, the computing platform may determine an identity of a customer using the customer computing device. The computing platform then may determine a location of the customer using the customer computing device based on the one or more attributes associated with the beacon signal. Thereafter, the computing platform may determine one or more predicted needs of the customer. Then, the computing platform may generate a notification based on the predicted needs of the customer and may send the notification to the customer computing device.
Abstract:
Methods and systems for configuring a computing platform using local positioning technology are presented. In some embodiments, a customer assistance computing platform may receive one or more attributes associated with a beacon signal received at the customer computing device and an identifier associated with the customer computing device. Subsequently, the computing platform may determine an identity of a customer using the customer computing device. The computing platform then may determine a location of the customer using the customer computing device based on the one or more attributes associated with the beacon signal. Thereafter, the computing platform may receive one or more configuration instructions based on the identity of the customer. Then, the computing platform may be configured based on the one or more configuration instructions.
Abstract:
Embodiments are directed to systems, methods and computer program products for providing user authentication based on historical user patterns. Embodiments receive from a user, a request to execute a user action associated with an application, wherein execution of the user action requires validation of authentication credentials; collect a set of data comprising information related to usage patterns associated with the apparatus of the user; determine a user pattern score associated with the user; determine a level of authentication; determine which authentication types are associated with the level of authentication; request authentication credentials corresponding to the authentication types; receive authentication credentials from the user; validate the authentication credentials, thereby resulting in a successful validation of the authentication credentials; and, in response to the successful validation, execute the user action.
Abstract:
Systems, methods, and computer program products for use by a financial institution employee in a financial institution environment to determine a preferred level of service based on gesture recognition. Embodiments of the invention involve a memory device; and a processing device operatively coupled to a memory; a computing processor; and a module configured to cause the one or more computing processors to: receive from a first device, an input associated with one or more gestures from an employee in a business environment; compare the received input to one or more predetermined gestures stored in a database, wherein the one or more predetermined gestures stored in the database are associated with one or more actions; based on the comparison, determine a match, and execute the one or more actions associated the received input.
Abstract:
Systems, apparatus, and computer program products are provided for security-monitoring at a place of business by automatically determining which individuals within a business location, such as a retail store, banking center or the like, are established customers of the business. Such a determination of established customer status is conducted without requiring any action on behalf of the individuals/customers and may be accomplished proximate in time to the individuals arriving at the business location. Once the established customers have been determined, the present invention provides for attaching customer identifiers to the established customers appearing within a live video stream displayed by the security-monitoring system to thereby create an augmented reality environment within the display.