Passive based security escalation to shut off of application based on rules event triggering
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04L-009/00
H04L-029/06
H04W-012/08
H04W-012/06
출원번호
US-0928154
(2015-10-30)
등록번호
US-9641539
(2017-05-02)
발명자
/ 주소
Votaw, Elizabeth S.
Jones-McFadden, Alicia C.
출원인 / 주소
BANK OF AMERICA CORPORATION
대리인 / 주소
Springs, Michael A.
인용정보
피인용 횟수 :
3인용 특허 :
57
초록▼
Embodiments of the invention are directed to a system, method, or computer program product for a passive based security escalation to shut off of applications on a mobile device based on rules. As such, the system may identify, via extraction of data, time periods correlating to events that the user
Embodiments of the invention are directed to a system, method, or computer program product for a passive based security escalation to shut off of applications on a mobile device based on rules. As such, the system may identify, via extraction of data, time periods correlating to events that the user may be offline or inactive with respect to his/her mobile device. Once the time periods are identified, rules are created for the level of security escalation required based on the event. Subsequently, a trigger is identified at a time leading up to the event, where the system integrates with the mobile device and requires additional authentication to access one or more applications. Once the offline event starts, the system initiates a shutdown of the functions of one or more applications on the user's mobile device. The system then reinstates the application functionality after the offline event has ended.
대표청구항▼
1. A system for passive based security escalation implementation on a mobile device, the system comprising: a memory device with computer-readable program code stored thereon;a communication device;a processing device operatively coupled to the memory device and the communication device, wherein the
1. A system for passive based security escalation implementation on a mobile device, the system comprising: a memory device with computer-readable program code stored thereon;a communication device;a processing device operatively coupled to the memory device and the communication device, wherein the processing device is configured to execute the computer-readable program code to: extract historical user data associated with a user from one or more external sources;identify from the historical user data, one or more indications of offline periods of time for the mobile device associated with the user, wherein the identified indications include one or more events that the user is attending at a future time;generate a security escalation plan for the event;access and integrate into the mobile device an increase to security requirements for authorizing one or more applications on the mobile device based on a triggering of a time period leading up to the event;integrate into the mobile device a shutdown of the one or more applications on the mobile device during the offline period of time for the mobile device during the event;restore functionality of the one or more applications after the offline period of time for the mobile device with an increase to the security requirements for authorizing the one or more applications on the mobile device based on a triggering of a time period after the offline time period associated with the event; andrestore standard security requirements of the one or more applications. 2. The system of claim 1, wherein integrating into the mobile device the shutdown of the one or more applications on the mobile device further comprises shutting down the functionality of the one or more applications such that external devices cannot activate the one or more applications during the offline period of time. 3. The system of claim 1, wherein the increase security requirements for authorizing one or more applications on the mobile device, further comprises increasing the security requirements to one or more applications that contain financial data and personal data of the user, wherein the increased security requirements include requiring additional authentication to allow access to the one or more applications via the mobile device. 4. The system of claim 1, wherein generating a security escalation plan for the event further comprises generating rules for security level requirements for each event and security level requirements for a time period prior to and after a duration of the event. 5. The system of claim 1, wherein indications of offline periods of time for the mobile device associated with the user further comprise an indication of a purchase of a ticket or pass to the event. 6. The system of claim 5, wherein the event comprises an airplane flight. 7. The system of claim 1, further comprising identifying a duration of the offline period based on a request for the duration from a venue of the event. 8. The system of claim 1, wherein historical user data comprises user transaction data extracted from a financial institution, user social network data extracted from a social networking website, and user account data extracted from one or more merchants. 9. A computer program product for passive based security escalation implementation on a mobile device, the computer program product comprising at least one non-transitory computer-readable medium having computer-readable program code portions embodied therein, the computer-readable program code portions comprising: an executable portion configured for extracting historical user data associated with a user from one or more external sources;an executable portion configured for identifying from the historical user data, one or more indications of offline periods of time for the mobile device associated with the user, wherein the identified indications include one or more events that the user is attending at a future time;an executable portion configured for generating a security escalation plan for the event;an executable portion configured for accessing and integrating into the mobile device an increase to security requirements for authorizing one or more applications on the mobile device based on a triggering of a time period leading up to the event;an executable portion configured for integrating into the mobile device a shutdown of the one or more applications on the mobile device during the offline period of time for the mobile device during the event;an executable portion configured for restoring functionality of the one or more applications after the offline period of time for the mobile device with an increase to the security requirements for authorizing the one or more applications on the mobile device based on a triggering of a time period after the offline time period associated with the event;an executable portion configured for restoring standard security requirements of the one or more applications. 10. The computer program product of claim 9, wherein integrating into the mobile device the shutdown of the one or more applications on the mobile device further comprises shutting down the functionality of the one or more applications such that external devices cannot activate the one or more applications during the offline period of time. 11. The computer program product of claim 9, wherein the increase security requirements for authorizing one or more applications on the mobile device, further comprises increasing the security requirements to one or more applications that contain financial data and personal data of the user, wherein the increased security requirements include requiring additional authentication to allow access to the one or more applications via the mobile device. 12. The computer program product of claim 9, wherein generating a security escalation plan for the event further comprises generating rules for security level requirements for each event and security level requirements for a time period prior to and after a duration of the event. 13. The computer program product of claim 9, wherein indications of offline periods of time for the mobile device associated with the user further comprise an indication of a purchase of a ticket or pass to the event. 14. The computer program product of claim 13, wherein the event comprises an airplane flight. 15. The computer program product of claim 9, further comprising an executable portion configured for identifying a duration of the offline period based on a request for the duration from a venue of the event. 16. The computer program product of claim 9, wherein historical user data comprises user transaction data extracted from a financial institution, user social network data extracted from a social networking website, and user account data extracted from one or more merchants. 17. A computer-implemented method for passive based security escalation implementation on a mobile device, the method comprising: providing a computing system comprising a computer processing device and a non-transitory computer readable medium, where the computer readable medium comprises configured computer program instruction code, such that when said instruction code is operated by said computer processing device, said computer processing device performs the following operations: extracting historical user data associated with a user from one or more external sources;identifying from the historical user data, one or more indications of offline periods of time for the mobile device associated with the user, wherein the identified indications include one or more events that the user is attending at a future time;generating a security escalation plan for the event;accessing and integrating into the mobile device an increase to security requirements for authorizing one or more applications on the mobile device based on a triggering of a time period leading up to the event;integrating into the mobile device a shutdown of the one or more applications on the mobile device during the offline period of time for the mobile device during the event;restoring functionality of the one or more applications after the offline period of time for the mobile device with an increase to the security requirements for authorizing the one or more applications on the mobile device based on a triggering of a time period after the offline time period associated with the event; andrestoring standard security requirements of the one or more applications. 18. The computer-implemented method of claim 17, wherein integrating into the mobile device the shutdown of the one or more applications on the mobile device further comprises shutting down the functionality of the one or more applications such that external devices cannot activate the one or more applications during the offline period of time. 19. The computer-implemented method of claim 17, wherein the increase security requirements for authorizing one or more applications on the mobile device, further comprises increasing the security requirements to one or more applications that contain financial data and personal data of the user, wherein the increased security requirements include requiring additional authentication to allow access to the one or more applications via the mobile device. 20. The computer-implemented method of claim 17, wherein generating a security escalation plan for the event further comprises generating rules for security level requirements for each event and security level requirements for a time period prior to and after a duration of the event.
Kao, I-Lung; Milman, Ivan Matthew; Schneider, David J.; Willard, Ronald Gene, Authentication framework for multiple authentication processes and mechanisms.
Vermeulen, Allan H.; Atlas, Alan B.; Barth, David M.; Cormie, John David; Fischman, Ami K.; Sorenson, III, James Christopher; Wagner, Eric M., Distributed storage system with web services client interface.
Ayanamcottil, Antony Aloysius; Chandrappa, Varun Yarehalli; Revankar, Natesh Shridhar; Verma, Priya; Alam, Mohammad Dilshad; Sharma, Nitin Prakash; Pullaikudi, Praveen Prakash Thazhalhu, Method for destructive readout of data in case of mobile theft.
Natsuno,Takeshi, Method for inhibiting use of mobile communication terminal having memory where card information is stored, mobile communication network, and mobile communication terminal.
Aravamudan, Murali; Rajasekharan, Ajit; Ramakrishnan, Kajamalai G.; Gupta, Mayank, Methods and systems for segmenting relative user preferences into fine-grain and coarse-grain collections.
Grigg, David M.; Thomas, Susan Smith; Harkey, Scott Lee; Bondesen, Laura; Calman, Matthew A., Providing automated initial and final payment for an activity based on determining the location of an activity participant's mobile communication device.
Ellis, Stephen M.; Kennedy, Michael J.; Kurani, Ashish Bhoopen; Lowry, Melissa; Meyyappan, Uma; Sahni, Bipin; Stroke, Nikolai, System and method for a mobile wallet.
Berardi,Michael J.; Bliman,Michal; Bonalle,David S.; Elwood,Jennifer Anne; Hood,Matthew C.; Isenberg,Susan E.; Mayers,Alexandra; Saunders,Peter D.; Scheding,Kathryn D.; Shah,Sejal Ajit; Williamson,Jo, System and method for payment using radio frequency identification in contact and contactless transactions.
Dhesi, Rajkaran Singh; Hunt, Simon; Parke, Paul Martin, System, method, and computer program product for disabling a communication channel during authentication.
Blaser, Robert Logan; Wylie, Hunter; Collier, Jacob Michael, Location tracking of products and product display assemblies in a wirelessly connected environment.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.