Sorting mobile banking functions into authentication buckets
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-012/14
G06Q-020/10
G06F-021/30
G06F-021/31
H04L-029/06
G06Q-040/02
G06F-017/00
출원번호
US-0016138
(2016-02-04)
등록번호
US-9595025
(2017-03-14)
발명자
/ 주소
Grigg, David M.
Johansen, Joseph Neil
Toth, Michael E.
Carpenter, Daniel Lynn
Qaim-Maqami, Hood
Hanson, Carrie Anne
Votaw, Elizabeth S.
출원인 / 주소
Bank of America Corporation
대리인 / 주소
Springs, Michael A.
인용정보
피인용 횟수 :
2인용 특허 :
60
초록▼
Embodiments are directed to systems, methods and computer program products for sorting mobile banking functions into authentication buckets. Embodiments determine, for each of a plurality of mobile banking functions, a corresponding authentication buckets, where each authentication bucket correspond
Embodiments are directed to systems, methods and computer program products for sorting mobile banking functions into authentication buckets. Embodiments determine, for each of a plurality of mobile banking functions, a corresponding authentication buckets, where each authentication bucket corresponds with a level of authentication. Some embodiments receive a request, from a user, to access a function; access the plurality of authentication buckets to determine which of the authentication buckets corresponds with the requested function; determine the level of authentication associated with the determined authentication bucket; determine which authentication types are associated with the level of authentication; request authentication credentials corresponding to the authentication types; receive authentication credentials from the user; validate the authentication credentials, thereby resulting in a successful validation of the authentication credentials; and, in response to the successful validation of the authentication credentials, enable access to the function requested by the user.
대표청구항▼
1. A computer program product for sorting mobile banking application functions into different authentication buckets where each authentication bucket has an associated different level of authentication requirements which together comprise a continuum of authentication, the computer program product c
1. A computer program product for sorting mobile banking application functions into different authentication buckets where each authentication bucket has an associated different level of authentication requirements which together comprise a continuum of authentication, the computer program product comprising a non-transitory computer-readable medium comprising code causing a mobile device of a user to: receive a request, from a user, to access one of the plurality of mobile banking application functions of a mobile banking application running on the mobile device;access the plurality of authentication buckets to determine which of the authentication buckets corresponds with the requested function;determine the level of authentication associated with the determined authentication bucket;determine which one or more authentication types from a plurality of authentication types are associated with the level of authentication associated with the determined authentication bucket;determine that the mobile device has recently performed an authenticated transaction;determine that a location of the mobile device is within a certain geography;based on the recently performed authenticated transaction and the location of the mobile device, change the level of authentication required to access the mobile banking application function from the determined authentication bucket to a second authentication bucket having a lower level of authentication;determine which second one or more authentication types from the plurality of authentication types are associated with the lower level of authentication of the second authentication bucket;request one or more authentication credentials corresponding to the determined second one or more authentication types;receive one or more authentication credentials from the user;successfully validate the one or more authentication credentials; andin response to the successful validation of the one or more authentication credentials, enable access to the mobile banking application function requested by the user. 2. The computer program product of claim 1, wherein the code further causes the first apparatus to: initiate presentation of a user interface illustrating at least one of the plurality of authentication buckets and at least one of the functions corresponding to the at least one authentication bucket. 3. The computer program product of claim 1, wherein the code further causes the first apparatus to: receive user input selecting one of the plurality of authentication buckets for one of the plurality of functions. 4. The computer program product of claim 1, wherein the code further causes the first apparatus to: initiate presentation of a user interface illustrating a set of available buckets for one of the plurality of functions based at least in part on predetermined thresholds of authentication corresponding to the function. 5. The computer program product of claim 2, wherein the code further causes the first apparatus to: initiate presentation of a predetermined recommended authentication bucket for the at least one of the functions, the predetermined recommended authentication bucket being different from the at least one authentication bucket corresponding to the at least one of the functions. 6. A method for sorting mobile banking application functions into different authentication buckets, the method comprising: receiving a request, by the mobile device and from the user, to access one of the plurality of mobile banking application functions of a mobile banking application running on the mobile device;accessing, by the mobile device of the user, a storage device comprising, for each of a plurality of mobile banking application functions, a corresponding one of a plurality of authentication buckets, where each of the plurality of authentication buckets corresponds with one of a plurality of levels of authentication, which together comprise a continuum of authentication;determining, by the mobile device of the user, from the plurality of authentication buckets which of the authentication buckets corresponds with the requested function;determining, by the mobile device of the user, the level of authentication associated with the determined authentication bucket;determining, by the mobile device of the user, which one or more authentication types from a plurality of authentication types are associated with the level of authentication associated with the determined authentication bucket;determining that the mobile device has recently performed an authenticated transaction;determining that a location of the mobile device is within a certain geography;based on the recently performed authenticated transaction and the location of the mobile device, changing the level of authentication required to access the mobile banking application function from the determined authentication bucket to a second authentication bucket having a lower level of authentication;determining which second one or more authentication types from the plurality of authentication types are associated with the lower level of authentication of the second authentication bucket;requesting, by the mobile device of the user, one or more authentication credentials corresponding to the determined second one or more authentication types;receiving, by the mobile device of the user, one or more authentication credentials from the user;successfully validating, by the mobile device of the user, the one or more authentication credentials; andin response to the successful validation of the one or more authentication credentials, enabling access to the mobile banking application function requested by the user. 7. The method of claim 6, further comprising: initiating presentation of a user interface illustrating at least one of the plurality of authentication buckets and at least one of the functions corresponding to the at least one authentication bucket. 8. The method of claim 6, further comprising: receiving user input selecting one of the plurality of authentication buckets for one of the plurality of functions. 9. The method of claim 6, further comprising: initiating presentation of a user interface illustrating a set of available buckets for one of the plurality of functions based at least in part on predetermined thresholds of authentication corresponding to the function. 10. The method of claim 7, further comprising: initiating presentation of a predetermined recommended authentication bucket for the at least one of the functions, the predetermined recommended authentication bucket being different from the at least one authentication bucket corresponding to the at least one of the functions. 11. The method of claim 7, further comprising: initiating presentation of a representation of a percentage of a plurality of customers of a financial institution administering the mobile banking functions that have selected each of a plurality of available authentication buckets for one of the plurality of functions.
Kao, I-Lung; Milman, Ivan Matthew; Schneider, David J.; Willard, Ronald Gene, Authentication framework for multiple authentication processes and mechanisms.
Vermeulen, Allan H.; Atlas, Alan B.; Barth, David M.; Cormie, John David; Fischman, Ami K.; Sorenson, III, James Christopher; Wagner, Eric M., Distributed storage system with web services client interface.
Ayanamcottil, Antony Aloysius; Chandrappa, Varun Yarehalli; Revankar, Natesh Shridhar; Verma, Priya; Alam, Mohammad Dilshad; Sharma, Nitin Prakash; Pullaikudi, Praveen Prakash Thazhalhu, Method for destructive readout of data in case of mobile theft.
Natsuno,Takeshi, Method for inhibiting use of mobile communication terminal having memory where card information is stored, mobile communication network, and mobile communication terminal.
Aravamudan, Murali; Rajasekharan, Ajit; Ramakrishnan, Kajamalai G.; Gupta, Mayank, Methods and systems for segmenting relative user preferences into fine-grain and coarse-grain collections.
Grigg, David M.; Thomas, Susan Smith; Harkey, Scott Lee; Bondesen, Laura; Calman, Matthew A., Providing automated initial and final payment for an activity based on determining the location of an activity participant's mobile communication device.
Ellis, Stephen M.; Kennedy, Michael J.; Kurani, Ashish Bhoopen; Lowry, Melissa; Meyyappan, Uma; Sahni, Bipin; Stroke, Nikolai, System and method for a mobile wallet.
Berardi,Michael J.; Bliman,Michal; Bonalle,David S.; Elwood,Jennifer Anne; Hood,Matthew C.; Isenberg,Susan E.; Mayers,Alexandra; Saunders,Peter D.; Scheding,Kathryn D.; Shah,Sejal Ajit; Williamson,Jo, System and method for payment using radio frequency identification in contact and contactless transactions.
Dhesi, Rajkaran Singh; Hunt, Simon; Parke, Paul Martin, System, method, and computer program product for disabling a communication channel during authentication.
Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E., Determining user authentication requirements based on the current location of the user being within a predetermined area requiring altered authentication requirements.
Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E., Determining user authentication requirements based on the current location of the user being within a predetermined area requiring altered authentication requirements.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.