Abstract:
Embodiments are directed to systems, methods and computer program products for sorting mobile banking functions into authentication buckets. Embodiments determine, for each of a plurality of mobile banking functions, a corresponding authentication buckets, where each authentication bucket corresponds with a level of authentication. Some embodiments receive a request, from a user, to access a function; access the plurality of authentication buckets to determine which of the authentication buckets corresponds with the requested function; determine the level of authentication associated with the determined authentication bucket; determine which authentication types are associated with the level of authentication; request authentication credentials corresponding to the authentication types; receive authentication credentials from the user; validate the authentication credentials, thereby resulting in a successful validation of the authentication credentials; and, in response to the successful validation of the authentication credentials, enable access to the function requested by the user.
Abstract:
Systems, apparatus, methods, and computer program products are provided for determining a user's authentication requirements/credentials for a specific network access session based on the current location of the user in comparison to known boundaries of location associated with the user, such as patterns of movement or the like. As such, the present invention serves to expedite the process for authenticating a user who desires to gain access to a network service, such as a banking application or the like.
Abstract:
The present invention includes a system for authenticating a second action based on a first action, wherein the system is configured to: receive a first request to execute a first action associated with a first application; determine that execution of the first action requires user authentication; request one or more authentication credentials from the user; receive a first authentication credential associated with the first action; validate the first authentication credential, thereby resulting in a successful validation of the received first authentication credential; in response to the successful validation, execute the first action; receive a second request to execute a second action associated with a second application; determine that execution of the second action requires user authentication; use the successful validation of the first authentication credential to validate a second authentication credential so that the second action may be executed.
Abstract:
Embodiments for transferring online account sessions are included in systems that enable a user to transfer control of an account session from a first mobile device to a second mobile device and determine whether or not the second mobile device has control of the account session based on transmission data received from the first mobile device or second mobile device. The systems receive transaction data, user input, or device tracking data from the first device or second device, and use the data to process online activities.
Abstract:
Disclosed is a system and associated method for restricting access to a customer's online banking account based on customer-defined online-banking access restrictions. The system typically includes a processor, a memory, and an online banking module stored in the memory. The module is typically configured for initially associating a mobile device with the customer's online banking account. In addition, the module is typically configured for subsequently receiving a restricted transaction definition from the mobile device, the restricted transaction definition defining a first restricted transaction associated with the customer's online banking account; searching a database of records to determine if the mobile device is associated with the customer's online banking account; and creating a restricted transaction record based on determining that the first mobile device is associated with the customer's online banking account, the restricted transaction record including the first restricted transaction definition.
Abstract:
Disclosed is a system and associated method for restricting access to a customer's online banking account. The system typically includes a processor, a memory, and an online banking module stored in the memory. The module is typically configured for determining that a computing device has initiated a first online banking transaction associated with the customer's online banking account. If the first online banking transaction is within a first restricted transaction definition and if the computing device is not enrolled with the customer's online banking account, geographic location information associated with the computing device and geographic location information associated with a first mobile device enrolled with the customer's account are received. The module determines whether the location of the computing device is proximate to a predefined location and/or whether the location of the computing device is proximate to the location of the first mobile device.
Abstract:
Embodiments of the invention are directed to apparatus, methods, and computer program products for determining and notifying a user, herein a financial institution customer, as to which account aggregators currently have been granted permission to access accounts held by the customer at the financial institution. In addition to notifying the customer of the current status of account aggregator access, the present invention provides the customer, through an online or mobile banking application or the like, a comprehensive tool for managing the access granted to all of the account aggregators that are determined to currently have permission to access the customer's accounts.
Abstract:
Aspects of the disclosure relate to processing authentication requests to secured information systems based on machine-learned user behavior profiles. A computing platform may receive an authentication request corresponding to a request for a user of a client computing device to access one or more secured information resources associated with a user account. The computing platform may capture behavioral parameters associated with the client computing device and may evaluate the behavioral parameters using a behavioral profile associated with the user account to determine a behavioral deviation score. Based on the behavioral deviation score, the computing platform may select an authentication action from a plurality of pre-defined authentication actions. Subsequently, the computing platform may generate commands directing an account portal computing platform to allow access, conditionally allow access, or prevent access based on the selected authentication action. Then, the computing platform may send the commands to the account portal computing platform.
Abstract:
Aspects of the disclosure relate to dynamically generating activity prompts to build and refine machine learning authentication models. A computing platform may process a first set of login events associated with a first user account and may build a first user-specific authentication model for the first user account. Then, the computing platform may process a second set of login events associated with a second user account and may build a second user-specific authentication model for the second user account. The computing platform also may build a population-level authentication model for a plurality of user accounts. Thereafter, the computing platform may identify one or more activity parameters associated with at least one authentication model for refinement. Subsequently, the computing platform may generate and send one or more activity prompts to one or more client computing devices to request at least one user response.
Abstract:
Aspects of the disclosure relate to processing authentication requests to secured information systems using machine-learned user-account behavior profiles. A computing platform may receive an authentication request corresponding to a request for a user of a client computing device to access one or more secured information resources associated with a user account. The computing platform may capture one or more behavioral parameters and may authenticate the user of the client computing device to the user account based on the one or more behavioral parameters and one or more authentication credentials. The computing platform then may generate and send one or more authentication commands directing an account portal computing platform to allow access to the one or more secured information resources. Subsequently, the computing platform may capture activity data associated with one or more interactions in a client portal session and may update a behavioral profile associated with the user account.