Remote revocation of application access based on non-co-location of a transaction vehicle and a mobile device
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06Q-020/40
G06Q-020/32
G06Q-020/34
출원번호
US-0175786
(2014-02-07)
등록번호
US-9213974
(2015-12-15)
발명자
/ 주소
Votaw, Elizabeth S.
Burrell, Charles Jason
Hanson, Carrie Anne
Jones, Alicia C.
Lynch, Michael Patrick
Qaim-Maqami, Hood
출원인 / 주소
BANK OF AMERICA CORPORATION
대리인 / 주소
Springs, Michael A.
인용정보
피인용 횟수 :
7인용 특허 :
47
초록▼
Embodiments of the invention relate to an invention for accessing a remotely located mobile device of a user based on certain events. The system, method, and computer program product are configured to: (a) monitor one or more transaction involving a transaction vehicle of a user; (b) determine a phy
Embodiments of the invention relate to an invention for accessing a remotely located mobile device of a user based on certain events. The system, method, and computer program product are configured to: (a) monitor one or more transaction involving a transaction vehicle of a user; (b) determine a physical location of a transaction vehicle based at least partially on the one or more transactions; (c) determine a geographic location of a mobile device of the user, wherein the mobile device is associated with the transaction vehicle; (d) determine whether or not the transaction vehicle of the user and the mobile device of the user are co-located; and (e) reconfigure one or more applications accessible to the mobile device or one or more functional features of the mobile device based at least partially on determining that the mobile device and the transaction vehicle of the user are not co-located.
대표청구항▼
1. A system for accessing a remotely located mobile device of a user, the system comprising: a computer apparatus including a processor and a memory; anda software module stored in the memory, comprising executable instructions that when executed by the processor cause the processor to: monitor one
1. A system for accessing a remotely located mobile device of a user, the system comprising: a computer apparatus including a processor and a memory; anda software module stored in the memory, comprising executable instructions that when executed by the processor cause the processor to: monitor one or more transactions involving a physical payment transaction vehicle of a user, wherein the payment transaction vehicle includes a positioning device;determine, via the positioning device on the transaction vehicle, a geographic location of the payment transaction vehicle based at least partially on the one or more transactions;determine, via a positioning device in a mobile device of the user, a geographic location of the mobile device, wherein the mobile device is associated with the payment transaction vehicle;determine whether the payment transaction vehicle of the user and the mobile device of the user are co-located, based on a predefined proximity bridge, which is a distance range between the geographic location of the payment transaction vehicle and the geographic location of the mobile device and is predefined by the user or the system, wherein the mobile device and the payment transaction vehicle are not co-located if the geographic location of the mobile device and the geographic location of the payment transaction vehicle are not within the predefined proximity bridge;disable functionality of one or more applications or one or more features on the mobile device, based at least partially on determining that the mobile device and the payment transaction vehicle are not co-located, wherein disabling comprises reconfiguring the one or more applications or the one or more features on the mobile device; andprovide a notification to the user indicating that functionality of the one or more applications or the one or more features accessible to the mobile device are disabled. 2. The system of claim 1, wherein the executable instructions further causes the processor to provide a notification to the user indicating that one or more applications to the mobile device or one or more functional features of the mobile device are reconfigured. 3. The system of claim 1, wherein the transaction vehicle comprises a bank card, a debit card, a credit card, a loyalty card, a resource access card, a virtual transaction card, or a combination any of the fore-mentioned card types. 4. The system of claim 3, wherein the executable instructions further causes the processor to provide a prompt, to the mobile device, requiring full authentication of the user prior to restoring the mobile device to an original state prior to the reconfiguration. 5. The system of claim 3, wherein the mobile device of the user and the payment transaction vehicle of the user are co-located when the mobile device and the payment transaction vehicle are within a predefined distance of each other. 6. The system of claim 3, wherein the mobile device of the user and the payment transaction vehicle of the user are co-located when it is determined that the mobile device and the payment transaction vehicle are within a predefined distance of each other upon a completion of a most recent transaction involving the payment transaction vehicle. 7. The system of claim 3, wherein reconfiguring the one or more applications accessible to the mobile device comprises disabling access to one or more financial applications including a mobile banking application associated with a financial institution of the user. 8. A computer program product for accessing a remotely located mobile device of a user, the computer program product comprising a non-transitory computer-readable medium, wherein the non-transitory computer-readable medium comprises one or more computer-executable program code portions that, when executed by a computer, cause the computer to: monitor one or more transactions involving a physical payment transaction vehicle of a user, wherein the payment transaction vehicle includes a positioning device;determine, via the positioning device on the transaction vehicle, a geographic location of the payment transaction vehicle based at least partially on the one or more transactions;determine, via a positioning device in a mobile device of the user, a geographic location of the mobile device, wherein the mobile device is associated with the payment transaction vehicle;determine whether the payment transaction vehicle of the user and the mobile device of the user are co-located, based on a predefined proximity bridge, which is a distance range between the geographic location of the payment transaction vehicle and the geographic location of the mobile device and is predefined by the user or the system, wherein the mobile device and the payment transaction vehicle are not co-located if the geographic location of the mobile device and the geographic location of the payment transaction vehicle are not within the predefined proximity bridge;disable functionality of one or more applications or one or more features on the mobile device, based at least partially on determining that the mobile device and the payment transaction vehicle are not co-located, wherein disabling comprises reconfiguring the one or more applications or the one or more features on the mobile device; andprovide a notification to the user indicating that functionality of the one or more applications or the one or more features accessible to the mobile device are disabled. 9. The computer program product of claim 8, wherein the computer program code further comprises one or more executable program portions that cause the computer to provide a notification to the user indicating that one or more applications to the mobile device or one or more functional features of the mobile device are reconfigured. 10. The computer program product of claim 8, wherein the transaction vehicle comprises a bank card, a debit card, a credit card, a loyalty card, a resource access card, a virtual transaction card, or a combination any of the fore-mentioned card types. 11. The computer program product of claim 10, wherein the computer program code further comprises one or more executable program portions that cause the computer to provide a prompt, to the mobile device, requiring full authentication of the user prior to restoring the mobile device to an original state prior to the reconfiguration. 12. The computer program product of claim 10, wherein the mobile device of the user and the transaction vehicle of the user are co-located when the mobile device and the payment transaction vehicle are within a predefined distance of each other. 13. The computer program product of claim 10, wherein the mobile device of the user and the payment transaction vehicle of the user are co-located when it is determined that the mobile device and the payment transaction vehicle are within a predefined distance of each other upon a completion of a most recent transaction involving the payment transaction vehicle. 14. The computer program product of claim 10, wherein reconfiguring the one or more applications accessible to the mobile device comprises disabling access to one or more financial applications including a mobile banking application associated with a financial institution of the user. 15. A computer-implemented method for accessing a remotely located mobile device of a user, the method comprising: monitoring one or more transactions involving a physical payment transaction vehicle of a user, wherein the payment transaction vehicle includes a positioning device;determining, via the positioning device on the transaction vehicle, a geographic location of the payment transaction vehicle based at least partially on the one or more transactions;determining, via a positioning device in a mobile device of the user, a geographic location of the mobile device, wherein the mobile device is associated with the payment transaction vehicle;determining whether the payment transaction vehicle of the user and the mobile device of the user are co-located, based on a predefined proximity bridge, which is a distance range between the geographic location of the payment transaction vehicle and the geographic location of the mobile device and is predefined by the user or the system, wherein the mobile device and the payment transaction vehicle are not co-located if the geographic location of the mobile device and the geographic location of the payment transaction vehicle are not within the predefined proximity bridge;disabling functionality of one or more applications or one or more features on the mobile device, based at least partially on determining that the mobile device and the payment transaction vehicle are not co-located, wherein disabling comprises reconfiguring the one or more applications or the one or more features on the mobile device; andproviding a notification to the user indicating that functionality of the one or more applications or the one or more features accessible to the mobile device are disabled. 16. The computer-implemented method of claim 15, wherein the transaction vehicle comprises a bank card, a debit card, a credit card, a loyalty card, a resource access card, a virtual transaction card, or a combination any of the fore-mentioned card types. 17. The computer-implemented method of claim 16, wherein the computer-implemented method further comprises providing a prompt, to the mobile device, requiring full authentication of the user prior to restoring the mobile device to an original state prior to the reconfiguration. 18. The method of claim 16, wherein the mobile device of the user and the payment transaction vehicle of the user are co-located when it is determined that the mobile device and the payment transaction vehicle are within a predefined distance of each other upon a completion of a most recent transaction involving the payment transaction vehicle. 19. The method of claim 16, wherein reconfiguring the one or more applications accessible to the mobile device comprises disabling access to one or more financial applications including a mobile banking application associated with a financial institution of the user.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (47)
Davies Stephen W., Alarm server systems, apparatus, and processes.
Ayanamcottil, Antony Aloysius; Chandrappa, Varun Yarehalli; Revankar, Natesh Shridhar; Verma, Priya; Alam, Mohammad Dilshad; Sharma, Nitin Prakash; Pullaikudi, Praveen Prakash Thazhalhu, Method for destructive readout of data in case of mobile theft.
Natsuno,Takeshi, Method for inhibiting use of mobile communication terminal having memory where card information is stored, mobile communication network, and mobile communication terminal.
Aravamudan, Murali; Rajasekharan, Ajit; Ramakrishnan, Kajamalai G.; Gupta, Mayank, Methods and systems for segmenting relative user preferences into fine-grain and coarse-grain collections.
Grigg, David M.; Thomas, Susan Smith; Harkey, Scott Lee; Bondesen, Laura; Calman, Matthew A., Providing automated initial and final payment for an activity based on determining the location of an activity participant's mobile communication device.
Ellis, Stephen M.; Kennedy, Michael J.; Kurani, Ashish Bhoopen; Lowry, Melissa; Meyyappan, Uma; Sahni, Bipin; Stroke, Nikolai, System and method for a mobile wallet.
Berardi,Michael J.; Bliman,Michal; Bonalle,David S.; Elwood,Jennifer Anne; Hood,Matthew C.; Isenberg,Susan E.; Mayers,Alexandra; Saunders,Peter D.; Scheding,Kathryn D.; Shah,Sejal Ajit; Williamson,Jo, System and method for payment using radio frequency identification in contact and contactless transactions.
Dhesi, Rajkaran Singh; Hunt, Simon; Parke, Paul Martin, System, method, and computer program product for disabling a communication channel during authentication.
Grigg, David M.; Johansen, Joseph Neil; Toth, Michael E.; Carpenter, Daniel Lynn; Qaim-Maqami, Hood; Hanson, Carrie Anne; Votaw, Elizabeth S., Authentication level of function bucket based on circumstances.
Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E., Determining user authentication requirements along a continuum based on a current state of the user and/or the attributes related to the function requiring authentication.
Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E., Determining user authentication requirements based on the current location of the user in comparison to the users's normal boundary of location.
Grigg, David M.; Johansen, Joseph Neil; Hanson, Carrie Anne; Burrell, Charles Jason; Votaw, Elizabeth S., Self-selected user access based on specific authentication types.
Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E.; Votaw, Elizabeth S., User authentication based on other applications.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.