摘要:
Embodiments of the invention relate to systems, methods, and computer program products for authenticating the identity of an authorized custodian of a dependent individual visiting a facility. In particular, the identity of an authorized custodian of a dependent individual visiting a facility is authenticated by: recording an image of an iris of the authorized custodian in a database; capturing an image of an iris of an individual attempting to accompany the dependent individual when the dependent individual exits the facility; and verifying, prior to allowing the dependent individual to exit the facility, that the captured image of the iris of the individual attempting to accompany the dependent individual matches the recorded image of the iris of the authorized custodian.
摘要:
Embodiments of the present invention relate to systems, methods, and computer program products for assessing student prospects. More specifically, embodiments of the present invention are directed to receiving transaction data from a transaction involving a consumer, comparing the transaction data to an education position rule, and determining an education position based at least partially on a comparison of the transaction data to an education position rule.
摘要:
Systems and methods for integrating facility access with other security systems are described. An individual seeking access authorization to a facility may be identified with a biometric parameter such as an iris scan. If authorized, the system may allow entry by disabling the alarm system, and a time period for access may be determined based on one or more characteristics associated with the individual. These characteristics may include the functional role of the individual at the facility and/or the location of the facility itself. Moreover, this facility access authorization system may be integrated with a network access authorization system associated with the facility so that when an individual gains access to the facility for a specific time period, the system is also able to determine how long the individual may access its network resources.
摘要:
A method for conducting a financial transaction can be used by a person using a mobile device to conduct the transaction. The mobile device receives information related to the person that can be used for authentication purposes, such as a PIN or biometric data. The mobile device then authenticates the person by verifying the information received. If the person is authenticated, the transaction is completed using the mobile device, and if the person is not authenticated, the transaction is prevented.
摘要:
Embodiments of the invention provide methods, apparatuses, and computer program products for providing community rewards. For example, systems and methods are provided for: (1) accessing transaction data associated with a particular financial institution; (2) determining a threshold; (3) identifying from the transaction data a group of transactions associated with a predefined community and time period; (4) aggregating a particular aspect of the group of transactions associated with the predefined community to determine a community total; and (5) determining that a reward should be provided to the community based on a comparison of the community total and the threshold. In some embodiments, the predefined community is defined at least in part by a particular one or more merchants.
摘要:
A transaction data analyzer associated with a financial entity discovers patterns and/or sequences in consumer transaction data. The analyzer may provide businesses with feedback on spatiotemporal patterns in consumer spending habits. In certain embodiments, the transaction analyzer discovers the frequency of a sequence of purchases made at a first merchant immediately followed by purchases made at a second merchant. In another embodiment, the transaction analyzer discovers trends in consumer purchases made during the weekday versus those that are made during the weekend. The results of the analysis may be used in a variety of ways, including, but not limited to, risk mitigation, merchant/consumer prospecting, and targeted promotions.
摘要:
Systems and methods for reducing the exposure of a financial institution to lending risk. The systems and methods may involve determining a basic credit limit for a customer's new credit card account based at least in part on attributes associated with the customer; assigning an adjusted credit limit to the account; and promising to decide whether to replace the adjusted credit limit with a higher credit limit.
摘要:
A method for conducting a financial transaction involves a person using a mobile device. The mobile device accesses information regarding the proposed financial transaction and determines, based on that information, whether the proposed transaction is permissible according to pre-set preferences associated with the person. Some of these preferences may be controllable by the person, and other preferences may be only partially controllable or not controllable by the person. The proposed transaction is denied if it is determined not to be permissible, and the proposed transaction is allowed if it is determined to be permissible. If the transaction is denied, the person may be presented with the option of changing the preferences, and authentication may be necessary to do so.