Abstract:
Systems, apparatus, methods, and computer program products are provided for determining a user's authentication requirements/credentials for a specific network access session based on the current location of the user in comparison to predetermined boundaries of location that have altered authentication requirements, in the form of, increased or decreased authentication requirements/credentials that differ from the standard authentication requirements.
Abstract:
Disclosed is a system and associated method or restricting access to a user's account via one or more account access channels. The system typically includes a processor, a memory, and an access restriction module stored in the memory. The module is typically configured for: integrating one or more account access channels associated with the user's account with an access restriction procedure; receiving a request from the user to implement the access restriction procedure; based on receiving the request from the user to implement the access restriction procedure, implementing the access restriction procedure, wherein implementing the access restriction procedure comprises restricting access to the user's account via the account access channel(s).
Abstract:
Systems, apparatus, methods, and computer program products are provided for determining a user's authentication requirements/credentials for function requiring authentication based on determining a location along an authentication continuum. The location along the authentication continuum defines the degree of authentication/credentials required to access the function and is determined based on a current state of the user and/or function attributes. The more or less that is known about the current state of the user the more or less likely the user is the user that is attempting to access the function and, thus, the authentication requirements required to access the function can be adjusted according (increased or decreased).
Abstract:
The present invention includes a system for authenticating a second action based on a first action, wherein the system is configured to: receive a first request to execute a first action associated with a first application; determine that execution of the first action requires user authentication; request one or more authentication credentials from the user; receive a first authentication credential associated with the first action; validate the first authentication credential, thereby resulting in a successful validation of the received first authentication credential; in response to the successful validation, execute the first action; receive a second request to execute a second action associated with a second application; determine that execution of the second action requires user authentication; use the successful validation of the first authentication credential to validate a second authentication credential so that the second action may be executed.
Abstract:
Embodiments of the invention are directed to a system, method, and a computer program product for a user authentication based on self-selected preferences. The system typically including a memory, a processor, and a module configured to receive a request to execute a user action from a user associated with an application, wherein the user action requires validation of one or more authentication credentials; access a user-selected preference indicating a level of authentication associated with a user-selected preference as desired by the user; determine authentication types from a plurality of authentication types associated with the level of authentication and the user-selected preference; request one or more authentication credentials corresponding to the determined one or more authentication types; receive one or more authentication credentials from the user; validate the one or more authentication credentials and in response to the successful validation of the one or more authentication credentials, execute the user action.
Abstract:
Systems, apparatus, methods, and computer program products are provided for determining a user's authentication requirements/credentials for a specific network access session based on the current location of the user in comparison to known boundaries of location associated with the user, such as the user's residence, place of business or the like. As such, the present invention serves to expedite the process for authenticating a user who desires to gain access to a network service, such as a banking application or the like.
Abstract:
Systems, apparatus, methods, and computer program products are provided for determining a user's authentication requirements/credentials for a specific mobile network access session based on the current location of the user in comparison to a known typical travel route of the user. In this regard, if the user is located within the boundaries of the travel route during the time period when the user is typically travelling on the route, less, or in some instances no, authentication requirements are needed. Moreover, as the user deviates from the travel route in terms of distance and/or time the greater the authentication requirements/credentials may be required. Once the deviation is considered to significant in terms of distance and/or time full authentication requirements may be required.
Abstract:
Systems, apparatus, methods, and computer program products are provided for determining a user's authentication requirements/credentials for a specific network access session based on the current location of the user in comparison to predetermined boundaries of location that have altered authentication requirements, in the form of, increased or decreased authentication requirements/credentials that differ from the standard authentication requirements.
Abstract:
The FIGURE is a front view of a display screen with graphical user interface showing our new design. The broken line showing of a display screen with graphical user interface is included for the purpose of showing portions of the article which form no part of the claim.
Abstract:
Systems, computer program products, and methods are described herein for predictive resource access within a technical environment. The present invention is configured to initiate a resource monitoring engine on a resource procurement profile associated with a user; receive information associated with one or more resources accessed by the user over a predetermined past period of time; receive information associated with one or more user characteristics associated with the user; initiate one or more machine learning algorithms on the one or more resources and the information associated with one or more user characteristics; generate, using the one or more machine learning algorithms, a forecasting model configured to predict one or more future resources accessible to the user at a predetermined future time; and initiate a resource transformation engine on the one or more future resources predicted to be accessible to the user at the predetermined future time.