Abstract:
Aspects of the present disclosure are directed to methods and systems for securing mobile computing applications with distributed keys. In one aspect, a computer implemented method or computer readable media include steps electronically receiving, at a computer processor of a computing device, a first security key fragment based on a user input to the computing device; electronically receiving, at the computer processor, a second security key fragment from a network connected storage entity; and electronically concatenating, at the computer processor, the first security key fragment and the second security key fragment to generate a third security key.
Abstract:
Methods and systems for providing navigation functionality in a retail location using local positioning technology are presented. In some embodiments, a customer assistance computing platform may receive one or more attributes associated with a beacon signal received by a customer computing device and an identifier associated with the customer computing device. Subsequently, the computing platform may determine an identity of a customer using the customer computing device. The computing platform then may determine a location of the customer using the customer computing device based on the one or more attributes associated with the beacon signal. Thereafter, the computing platform may generate one or more navigation instructions to guide the customer to another location. Then, the computing platform may send the one or more navigation instructions to the customer computing device.
Abstract:
Aspects of the present disclosure are directed to methods and systems for securing mobile computing applications with distributed keys. In one aspect, a computer implemented method or computer readable media include steps electronically receiving, at a computer processor of a computing device, a first security key fragment based on a user input to the computing device; electronically receiving, at the computer processor, a second security key fragment from a network connected storage entity; and electronically concatenating, at the computer processor, the first security key fragment and the second security key fragment to generate a third security key.
Abstract:
Systems, methods, apparatuses, and computer-readable media configured to determine a location of a user, identify the user and provide additional services based on the determined location and/or identity are provided. In some examples, a signal emitted from a beacon may be detected by a personal computing device of a user within a predefined proximity of the beacon. The location of the beacon, and the device detecting the signal, may be determined and the identity of the user associated with the device may be determined. Authentication information may be requested from the user. The request for authentication information may be transmitted to the personal computing device and the user may provide the authentication information via the device. If the received authentication information matches pre-stored authentication information, the user may be authenticated and/or authorized to conduct one or more transactions or types of transactions based on the determined location, identity, and authentication information.
Abstract:
Systems, methods, apparatuses, and computer-readable media configured to determine a location of a user, identify the user and provide additional services based on the determined location and/or identity are provided. In some examples, the identity of a customer may be determined based on detection of a signal by a personal computing device of the customer. One or more associate users associated with that customer may be identified and a location of the associate user may be transmitted to the customer user. In other examples, a category of an identified customer may be determined and an associate user equipped to work with that determined category of customer may be identified.
Abstract:
Systems, methods, apparatuses, and computer-readable media configured to determine a location of a user, identify the user and provide additional services based on the determined location and/or identity are provided. In some examples, the identity of a customer may be determined based on detection of a signal by a personal computing device of the customer. One or more associate users associated with that customer may be identified and a location of the associate user may be transmitted to the customer user. In other examples, a category of an identified customer may be determined and an associate user equipped to work with that determined category of customer may be identified.
Abstract:
Methods and systems for predicting and responding to customer needs using local positioning technology are presented. In some embodiments, a customer assistance computing platform may receive one or more attributes associated with a beacon signal received by a customer computing device and an identifier associated with the customer computing device. Subsequently, the computing platform may determine an identity of a customer using the customer computing device. The computing platform then may determine a location of the customer using the customer computing device based on the one or more attributes associated with the beacon signal. Thereafter, the computing platform may determine one or more predicted needs of the customer. Then, the computing platform may generate a notification based on the predicted needs of the customer and may send the notification to the customer computing device.
Abstract:
Aspects of the present disclosure pertain to system and method of securing mobile devices using virtual certificates at a computer processor. A method may include receiving a request for access to a computer network associated with a computing device to an application associated with a network connected server processor; electronically receiving, at the server processor, a first security key fragment from the computing device; the first security key fragment being paired with a verifier key fragment unknown to the computing device; generating a conditional seed key fragment at the server processor associated with the verifier key fragment; comparing a first hash parameter to a second hash parameter at the server processor; transmitting, at the server processor, a session security key for enabling network access to the application associated with the server processor.
Abstract:
Methods and systems for providing navigation functionality in a retail location using local positioning technology are presented. In some embodiments, a customer assistance computing platform may receive one or more attributes associated with a beacon signal received by a customer computing device and an identifier associated with the customer computing device. Subsequently, the computing platform may determine an identity of a customer using the customer computing device. The computing platform then may determine a location of the customer using the customer computing device based on the one or more attributes associated with the beacon signal. Thereafter, the computing platform may generate one or more navigation instructions to guide the customer to another location. Then, the computing platform may send the one or more navigation instructions to the customer computing device.
Abstract:
Systems and methods for using proximity positioning systems to determine an identity and location of a user, and process a pre-staged transaction based on the determined information are provided. In some examples, a transaction may be initiated by a user. A financial institution may pre-process the transaction and, upon establishing a physical presence of the user at a banking center, may further process and/or complete the transaction. The physical presence of the user may be established based on a signal from a location beacon at the banking center being detected by a personal computing device of the user. Because the personal computing device is within a predefined proximity of the location beacon in order to detect the signal, the location of the location beacon, and, thus the personal computing device may be determined, and an identity of the user may be determined.