Abstract:
Systems, computer program products, and methods are described herein for recurring auxiliary resource distribution. The present invention may be configured to detect a trigger event associated with a plurality of sources, where the plurality of sources includes a standard source and an auxiliary source, and where the plurality of sources is associated with a user. The present invention may be configured to transform, using a resource transformation engine and based on the trigger event, a first amount of auxiliary resources in the auxiliary source to a second amount of standard resources, deduct the first amount of auxiliary resources from a first balance of the auxiliary source, and add the second amount of standard resources to a second balance of the standard source. The present invention may be configured to perform a resource distribution using the second amount of standard resources from the standard source.
Abstract:
Real-time interaction processing may allow for the exchange of resources and/or supplemental resources. The flexibility of the real-time resource exchange network allows supplemental resources to be transferred between resources pools of a single entity or between resource pools of different entities, either within a single organization or located at different organizations. The real-time interaction processing further allows for the creation and use of a collective resource pool to which multiple entities are allowed to contribute resources and/or supplemental resources. Each of the entities contributing resources or supplemental resources to the collective resource pool have transparency into the entities contributing to the collective resource pool, the supplemental resources and/or other resources contributed, and confirmation that the actual interaction for which the collective resource pool is being utilized was completed.
Abstract:
Embodiments of the invention relate to an invention for accessing a remotely located mobile device of a user based on certain events is provided. The system, method, and computer program product are configured to: (a) monitor one or more transaction involving a transaction vehicle of a user; (b) determine a physical location of a transaction vehicle based at least partially on the one or more transactions; (c) determine a geographic location of a mobile device of the user, wherein the mobile device is associated with the transaction vehicle; (d) determine whether or not the transaction vehicle of the user and the mobile device of the user are co-located; and (e) reconfigure one or more applications accessible to the mobile device or one or more functional features of the mobile device based at least partially on determining that the mobile device and the transaction vehicle of the user are not co-located.
Abstract:
Disclosed is a system and associated method or restricting access to a user's account via one or more account access channels. The system typically includes a processor, a memory, and an access restriction module stored in the memory. The module is typically configured for: integrating one or more account access channels associated with the user's account with an access restriction procedure; receiving a request from the user to implement the access restriction procedure; based on receiving the request from the user to implement the access restriction procedure, implementing the access restriction procedure, wherein implementing the access restriction procedure comprises restricting access to the user's account via the account access channel(s).
Abstract:
Embodiments of the invention are directed to a system, method, and a computer program product for a user authentication based on self-selected preferences. The system typically including a memory, a processor, and a module configured to receive a request to execute a user action from a user associated with an application, wherein the user action requires one or more authentication credentials; receive one or more authentication credentials from the user based on a user-selected preference; validate the one or more authentication credentials based on the user-selected preference; and execute the user action based on a successful validation of the one or more authentication credentials.
Abstract:
Embodiments of the invention are directed to a system, method, and a computer program product for a user authentication based on self-selected preferences. The system typically including a memory, a processor, and a module configured to receive a request to execute a user action from a user associated with an application, wherein the user action requires one or more authentication credentials; receive one or more authentication credentials from the user based on a user-selected preference; validate the one or more authentication credentials based on the user-selected preference; and execute the user action based on a successful validation of the one or more authentication credentials
Abstract:
Disclosed is a system and associated method or restricting access to a user's account via one or more account access channels. The system typically includes a processor, a memory, and an access restriction module stored in the memory. The module is typically configured for: integrating one or more account access channels associated with the user's account with an access restriction procedure; receiving a request from the user to implement the access restriction procedure; based on receiving the request from the user to implement the access restriction procedure, implementing the access restriction procedure, wherein implementing the access restriction procedure comprises restricting access to the user's account via the account access channel(s).
Abstract:
Systems, apparatus, methods, and computer program products are provided for determining a user's authentication requirements/credentials for a specific network access session based on the current location of the user in comparison to known boundaries of location associated with the user, such as the user's residence, place of business or the like. As such, the present invention serves to expedite the process for authenticating a user who desires to gain access to a network service, such as a banking application or the like.
Abstract:
Embodiments of the invention are directed to a system, method, or computer program product for an auxiliary hub for passive resource conversion and collection. The system generations and provides a centralized hub for passive resource conversion. The passive resources may be linked from a third party to the hub for direct extraction of the passive resource to the hub. Furthermore, the system may translate the passive resource into active resource via a modification ratio based on the type of passive resource and passive resource provider. The user may then be able to utilize this centralized auxiliary hub for completion or partial completion of resource distributions. The invention further provides a graphical user interface that integrates the centralized auxiliary hub with user mobile applications, on-line applications, and the like allowing for partial selection from the hub and other resource sources for distribution.
Abstract:
Embodiments of the invention are directed to a system, method, and a computer program product self-selected user access based on specific authentication types. The system typically including a memory, a processor, and a module configured to receive from a user, a user-selected preference, wherein the user-selected preference comprises one or more authentication types desired by the user; determine a level of authentication from a plurality of levels of authentication are associated with the one or more authentication types associated with the user-selected preference; initiate the presentation of a user interface that enables the user to select one or more application functions, wherein the one or more application functions are associated with the determined level of authentication; receive from a user, a selection of one or more application functions.