Abstract:
Systems, apparatus, methods, and computer program products are provided for determining a user's authentication requirements/credentials for function requiring authentication based on determining a location along an authentication continuum. The location along the authentication continuum defines the degree of authentication/credentials required to access the function and is determined based on a current state of the user and/or function attributes. The more or less that is known about the current state of the user the more or less likely the user is the user that is attempting to access the function and, thus, the authentication requirements required to access the function can be adjusted according (increased or decreased).
Abstract:
The present invention includes a system for authenticating a second action based on a first action, wherein the system is configured to: receive a first request to execute a first action associated with a first application; determine that execution of the first action requires user authentication; request one or more authentication credentials from the user; receive a first authentication credential associated with the first action; validate the first authentication credential, thereby resulting in a successful validation of the received first authentication credential; in response to the successful validation, execute the first action; receive a second request to execute a second action associated with a second application; determine that execution of the second action requires user authentication; use the successful validation of the first authentication credential to validate a second authentication credential so that the second action may be executed.
Abstract:
Embodiments of the invention are directed to a system, method, and a computer program product self-selected user access based on specific authentication types. The system typically including a memory, a processor, and a module configured to receive from a user, a user-selected preference, wherein the user-selected preference comprises one or more authentication types desired by the user; determine a level of authentication from a plurality of levels of authentication are associated with the one or more authentication types associated with the user-selected preference; initiate the presentation of a user interface that enables the user to select one or more application functions, wherein the one or more application functions are associated with the determined level of authentication; receive from a user, a selection of one or more application functions.
Abstract:
Disclosed is a system and associated method or restricting access to a user's account via one or more account access channels. The system typically includes a processor, a memory, and an access restriction module stored in the memory. The module is typically configured for: integrating one or more account access channels associated with the user's account with an access restriction procedure; receiving a request from the user to implement the access restriction procedure; based on receiving the request from the user to implement the access restriction procedure, implementing the access restriction procedure, wherein implementing the access restriction procedure comprises restricting access to the user's account via the account access channel(s).
Abstract:
Systems, apparatus, methods, and computer program products are provided for determining a user's authentication requirements/credentials for a specific network access session based on the current location of the user in comparison to predetermined boundaries of location that have altered authentication requirements, in the form of, increased or decreased authentication requirements/credentials that differ from the standard authentication requirements.
Abstract:
Embodiments of the invention are directed to systems, methods and computer program products for receiving a request from a user for access to at least one function associated with a first application; determining that access to at least one function requires user authentication; initiating sensing of an authentication validating carrier comprising a first credential; determining the first credential based at least in part on the sensed authentication validating carrier; validating the first credential, thereby resulting in a first successful user authentication; and granting access to at least one function associated with the first application based on the validation of the first successful user authentication.
Abstract:
In general, embodiments of the invention are directed to a system, method, or computer program product for providing a user with a predictive geo-location based receipt retrieval for post transaction action. Consumers receive e-receipts after handling a transaction with a merchant in many ways. These receipts can be stored and managed with considerably ease over physical receipts. Consumers may use these receipts after making a purchase for post transaction actions such as product return, product refund, warranty services, and/or the like. The present invention may be used to retrieve the receipts based on the consumer's geographic location, predicting a post transaction action scenario.
Abstract:
Embodiments of the invention relate to systems, methods, and computer program products for accessing a remotely located mobile device of a user based on certain events is provided. The system, method, and computer program product are configured to: (a) receive an indication that a transaction vehicle of the user is compromised; (b) identify a mobile device of the user that is associated with the transaction vehicle of the user that is compromised; (c) upon identifying the mobile device of the user, remotely access the mobile device of the user; and (d) reconfigure one or more applications accessible to the mobile device or one or more functional features of the mobile device based at least partially on receiving the indication.
Abstract:
Real-time interaction processing may allow for the exchange of resources and/or supplemental resources. The flexibility of the real-time resource exchange network allows supplemental resources to be transferred between resources pools of a single entity or between resource pools of different entities, either within a single organization or located at different organizations. The type of supplemental resources and number of supplemental resources may be converted based on the types of resource pools from which and to which the supplemental resources are being transferred.
Abstract:
The present disclosure embraces a system, methods and computer program products for the intelligent onboarding, support, education of supervised resource account users. The system, methods, and computer program products provide innovative tools for the development and management of supervised user resource accounts by a supervising user, and various embodiments providing unique pathways for resource management and education via the use of the disclosed resource management system.