Abstract:
Embodiments of the invention are directed to making a payment using a portable mobile communication apparatus. An exemplary portable mobile communication apparatus is configured to: initiate presentation of a first option on a user interface to pay via readable indicia (e.g., a QR code), initiate presentation of a second option on the user interface (e.g., the same user interface) to pay via a short-range wireless mechanism (e.g., NFC), and determine a payment option selected by a user.
Abstract:
Systems, methods, apparatuses, and computer-readable media configured to determine a location of a user, identify the user and provide additional services based on the determined location and/or identity are provided. In some examples, associate users may be identified and a location of each associate user may be tracked to identify a location of an associate user, confirm the location of the associate user is an expected location, and/or provide location information to a customer of the associate user.
Abstract:
Embodiments are directed to systems, methods and computer program products for sorting mobile banking functions into authentication buckets. Embodiments determine, for each of a plurality of mobile banking functions, a corresponding authentication buckets, where each authentication bucket corresponds with a level of authentication. Some embodiments receive a request, from a user, to access a function; access the plurality of authentication buckets to determine which of the authentication buckets corresponds with the requested function; determine the level of authentication associated with the determined authentication bucket; determine which authentication types are associated with the level of authentication; request authentication credentials corresponding to the authentication types; receive authentication credentials from the user; validate the authentication credentials, thereby resulting in a successful validation of the authentication credentials; and, in response to the successful validation of the authentication credentials, enable access to the function requested by the user.
Abstract:
Embodiments are directed to systems, methods and computer program products for sorting mobile banking functions into authentication buckets. Embodiments determine, for each of a plurality of mobile banking functions, a corresponding authentication buckets, where each authentication bucket corresponds with a level of authentication. Some embodiments receive a request, from a user, to access a function; access the plurality of authentication buckets to determine which of the authentication buckets corresponds with the requested function; determine the level of authentication associated with the determined authentication bucket; determine which authentication types are associated with the level of authentication; request authentication credentials corresponding to the authentication types; receive authentication credentials from the user; validate the authentication credentials, thereby resulting in a successful validation of the authentication credentials; and, in response to the successful validation of the authentication credentials, enable access to the function requested by the user.
Abstract:
A system and related embodiments are presented that establishes a goal guarantee for a user that provides the user a guarantee of acquiring, at a future date, a life goal based on the user providing a predetermined funding amount over time to a life goal account. The life goal includes goods, real estate and/or services. The predetermined funding amount is determined based at least in part on a predicted future cost for the goal and an uncertainty calculation associated with the user. Once funds are accumulated in the life goal account, the invention provides for automatically reallocating funds in the life goal account from a higher uncertainty investment to a lower uncertainty investment in response to one or more predetermined triggering events, such as dates, amount thresholds, meeting predetermined price thresholds for the goal or components of the goal.
Abstract:
Embodiments of the invention are directed to systems, methods, and computer program products for a system that utilizes health information (e.g., steps taken, miles walked, exercise time, strenuous activity, pulse, heart rate, sweat analysis, breath analysis, blood analysis, caloric intake, skin analysis, temperature analysis, brainwave analysis, other medical diagnostic information, or the like) captured from wearable devices, and financial transactions to adjust estimated or projected life expectancy and health expenses (e.g., medical care expenses, fitness care expenses, health food expenses, or the like) of a user, in order to adjust retirement age, retirement savings, or other financial information, and display this information in a financial, health, and/or retirement monitoring interface.
Abstract:
Embodiments of the invention are directed to systems, methods and computer program products for transaction queuing. In some embodiments, a system is configured to: receive information associated with an intended transaction, wherein a user will execute the intended transaction at a facility at a user-defined time; determine preliminary work associated with the intended transaction that can be performed prior to the user-defined time; and perform the preliminary work associated with the intended transaction. The preliminary work is placed on a transaction queue until the user arrives at the facility.
Abstract:
The present invention is directed to an apparatus, a method, and a computer program product for authenticating a user based on a sequence of rhythmic inputs. The user via a mobile device provides one or more inputs (e.g., pushing a button, tapping a touchscreen, a biometric, or the like) to one or more sensors associated with the mobile device as an attempt of authorization. The one or more inputs may be provided in a rhythmic manner (e.g., provided in time with music). The present invention then compares the provided one or more inputs to one or more predetermined sequences of inputs that are associated with positive authentication of the user (e.g., a known password). The phone determines that the one or more provided inputs match one or more predetermined rhythmic sequences associated with positive authentication of the user and authenticates the user.
Abstract:
Embodiments of the invention are directed to a system, method, and a computer program product self-selected user access based on specific authentication types. The system typically including a memory, a processor, and a module configured to receive from a user, a user-selected preference, wherein the user-selected preference comprises one or more authentication types desired by the user; determine a level of authentication from a plurality of levels of authentication are associated with the one or more authentication types associated with the user-selected preference; initiate the presentation of a user interface that enables the user to select one or more application functions, wherein the one or more application functions are associated with the determined level of authentication; receive from a user, a selection of one or more application functions.
Abstract:
Embodiments of the invention are directed to systems, methods and computer program products for providing authentication using previously-validated authentication credentials. An exemplary apparatus is configured to receive a request to access a framework application, request, from a user, one or more authentication credentials corresponding to a primary level of user authentication, receive and validate the one or more authentication credentials, create, using the framework application, an authentication token based at least partially on the validation of the primary level of user authentication, wherein the authentication token is accessible by a plurality of applications, receive a request, from the user, to access one or more non-framework applications; and authenticate the one or more non-framework applications, where authenticating the non-framework applications requires accessing the authentication token created by the framework application such that the authentication is at least partially based on the primary level of user authentication.