Authentication level of function bucket based on circumstances
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-021/30
H04L-029/06
G06Q-040/02
출원번호
US-0175962
(2014-02-07)
등록번호
US-9647999
(2017-05-09)
발명자
/ 주소
Grigg, David M.
Johansen, Joseph Neil
Toth, Michael E.
Carpenter, Daniel Lynn
Qaim-Maqami, Hood
Hanson, Carrie Anne
Votaw, Elizabeth S.
출원인 / 주소
Bank of America Corporation
대리인 / 주소
Springs, Michael A.
인용정보
피인용 횟수 :
1인용 특허 :
137
초록▼
Embodiments are directed to systems, methods and computer program products for assigning a level of authentication to an authentication bucket. Embodiments determine a current level of authentication corresponding to a first authentication bucket comprising a plurality of mobile banking functions; c
Embodiments are directed to systems, methods and computer program products for assigning a level of authentication to an authentication bucket. Embodiments determine a current level of authentication corresponding to a first authentication bucket comprising a plurality of mobile banking functions; collect a set of circumstantial data corresponding with the apparatus; determine a circumstances score based at least in part on the set of circumstantial data; and determine whether the current level of authentication corresponding to the first authentication bucket is appropriate based at least in part on the circumstances score.
대표청구항▼
1. An apparatus for assigning a level of authentication to an authentication bucket, the apparatus comprising: a memory;a processor; anda module stored in the memory, executable by the processor, and configured to:determine a current level of authentication corresponding to a first authentication bu
1. An apparatus for assigning a level of authentication to an authentication bucket, the apparatus comprising: a memory;a processor; anda module stored in the memory, executable by the processor, and configured to:determine a current level of authentication corresponding to a first authentication bucket of a plurality of authentication buckets, the first authentication bucket comprising a plurality of mobile banking functions and the plurality of authentication buckets comprising a plurality of virtual buckets each configured to be associated with one or more mobile banking functions, wherein the one or more mobile banking functions are each associated with only one virtual bucket, wherein each virtual bucket is configured to be associated with the level of authentication such that the associated level of authentication may be changed based on a set of circumstantial data corresponding with the apparatus;collect the set of circumstantial data corresponding with the apparatus;determine a circumstances score based at least in part on the set of circumstantial data;determine whether the current level of authentication corresponding to the first;authentication bucket is appropriate based at least in part on the circumstances score;receive a request, from a user, to access one of the plurality of mobile banking functions;access the plurality of authentication buckets to determine that the first authentication bucket corresponds with the requested mobile banking function;determine the level of authentication associated with the first authentication bucket;determine which one or more authentication types from a plurality of authentication types are associated with the level of authentication associated with the first authentication bucket;request one or more authentication credentials corresponding to the determined one or more authentication types;receive one or more authentication credentials from the user;validate the one or more authentication credentials, thereby resulting in a successful validation of the one or more authentication credentials; andin response to the successful validation of the one or more authentication credentials, enable access to the mobile banking function requested by the user;wherein determining the circumstances score comprises:determining a first partial score comprising a potential exposure score associated with one or more negative events indicated by the set of circumstantial data;determining a second partial score comprising a mitigating score associated with one or more positive events indicated by the set of circumstantial data; andcombining the first partial score and the second partial score to determine the circumstances score. 2. The apparatus of claim 1, wherein the module is further configured to: apply a first weighting factor to the first partial score and a second weighting factor to the second partial score. 3. The apparatus of claim 1, wherein the module is further configured to: determine that the current level of authentication corresponding to the first authentication bucket is inappropriate; anddetermine an appropriate level of authentication for the first authentication bucket based on applying the set of circumstantial data to a set of sorting rules. 4. The apparatus of claim 1, wherein the set of sorting rules are predetermined by a financial institution administering the mobile banking functions. 5. The apparatus of claim 4, wherein the module is further configured to: receive user input selecting one of the plurality of authentication buckets for re-sorting one of the plurality of functions. 6. A method for assigning a level of authentication to an authentication bucket, the method comprising: determine, by a processor, a current level of authentication corresponding to a first authentication bucket of a plurality of authentication buckets, the first authentication bucket comprising a plurality of mobile banking functions and the plurality of authentication buckets comprising a plurality of virtual buckets each configured to be associated with one or more mobile banking functions, wherein the one or more mobile banking functions are each associated with only one virtual bucket, wherein each virtual bucket is configured to be associated with the level of authentication such that the associated level of authentication may be changed based on a set of circumstantial data corresponding with the processor;collecting the set of circumstantial data corresponding with the processor;determining a circumstances score based at least in part on the set of circumstantial data;determining whether the current level of authentication corresponding to the first authentication bucket is appropriate based at least in part on the circumstances score;receiving a request, from a user, to access one of the plurality of mobile banking functions;accessing the plurality of authentication buckets to determine that the first authentication bucket corresponds with the requested mobile banking function;determining the level of authentication associated with the first authentication bucket;determining which one or more authentication types from a plurality of authentication types are associated with the level of authentication associated with the first authentication bucket;requesting one or more authentication credentials corresponding to the determined one or more authentication types;receiving one or more authentication credentials from the user;validating the one or more authentication credentials, thereby resulting in a successful validation of the one or more authentication credentials; andin response to the successful validation of the one or more authentication credentials, enabling access to the mobile banking function requested by the user;wherein determining the circumstances score comprises:determining a first partial score comprising a potential exposure score associated with one or more negative events indicated by the set of circumstantial data;determining a second partial score comprising a mitigating score associated with one or more positive events indicated by the set of circumstantial data; andcombining the first partial score and the second partial score to determine the circumstances score. 7. The method of claim 6, further comprising: applying a first weighting factor to the first partial score and a second weighting factor to the second partial score. 8. The method of claim 6, further comprising: determining that the current level of authentication corresponding to the first authentication bucket is inappropriate; anddetermining an appropriate level of authentication for the first authentication bucket based on applying the set of circumstantial data to a set of sorting rules. 9. The method of claim 6, wherein the set of sorting rules are predetermined by a financial institution administering the mobile banking functions. 10. The method of claim 9, further comprising: receiving user input selecting one of the plurality of authentication buckets for re-sorting one of the plurality of functions. 11. A computer program product for assigning a level of authentication to an authentication bucket, the computer program product comprising a non-transitory computer-readable medium comprising code causing a first apparatus to: determine a current level of authentication corresponding to a first authentication bucket of a plurality of authentication buckets, the first authentication bucket comprising a plurality of mobile banking functions and the plurality of authentication buckets comprising a plurality of virtual buckets each configured to be associated with one or more mobile banking functions, wherein the one or more mobile banking functions are each associated with only one virtual bucket, wherein each virtual bucket is configured to be associated with the level of authentication such that the associated level of authentication may be changed based on a set of circumstantial data corresponding with the first apparatus;collect the set of circumstantial data corresponding with the apparatus;determine a circumstances score based at least in part on the set of circumstantial data;determine whether the current level of authentication corresponding to the first authentication bucket is appropriate based at least in part on the circumstances score;receive a request, from a user, to access one of the plurality of mobile banking functions;access the plurality of authentication buckets to determine that the first authentication bucket corresponds with the requested mobile banking function;determine the level of authentication associated with the first authentication bucket;determine which one or more authentication types from a plurality of authentication types are associated with the level of authentication associated with the first authentication bucket;request one or more authentication credentials corresponding to the determined one or more authentication types;receive one or more authentication credentials from the user;validate the one or more authentication credentials, thereby resulting in a successful validation of the one or more authentication credentials; andin response to the successful validation of the one or more authentication credentials, enable access to the mobile banking function requested by the user;wherein determining the circumstances score comprises:determining a first partial score comprising a potential exposure score associated with one or more negative events indicated by the set of circumstantial data;determining a second partial score comprising a mitigating score associated with one or more positive events indicated by the set of circumstantial data; andcombining the first partial score and the second partial score to determine the circumstances score. 12. The computer program product of claim 11, wherein the code further causes the first apparatus to: apply a first weighting factor to the first partial score and a second weighting factor to the second partial score. 13. The computer program product of claim 11, wherein the code further causes the first apparatus to: determine that the current level of authentication corresponding to the first authentication bucket is inappropriate; anddetermine an appropriate level of authentication for the first authentication bucket based on applying the set of circumstantial data to a set of sorting rules. 14. The computer program product of claim 11, wherein the set of sorting rules are predetermined by a financial institution administering the mobile banking functions. 15. The computer program product of claim 14, wherein the code further causes the first apparatus to: receive user input selecting one of the plurality of authentication buckets for re-sorting one of the plurality of functions.
Kao, I-Lung; Milman, Ivan Matthew; Schneider, David J.; Willard, Ronald Gene, Authentication framework for multiple authentication processes and mechanisms.
de Silva, Andrew; Zhuang, Jianning; Mazas, Jose; Panganiban, Alex, Automatic updating of favorite places for navigation system upon change of home address.
Zhu, Lizhong; Mankaruse, George Soliman; Corrigan, Michael Stephen; Jarmuszewski, Perry; Kravets, Oleksiy; Nickerson, Kent Arnold; Sangary, Nagula Tharma, Communications device with separate I and Q phase power amplification having selective phase and magnitude adjustment and related methods.
Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E., Determining user authentication requirements based on the current location of the user being within a predetermined area requiring altered authentication requirements.
Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E., Determining user authentication requirements based on the current location of the user in comparison to the users's normal boundary of location.
Vermeulen, Allan H.; Atlas, Alan B.; Barth, David M.; Cormie, John David; Fischman, Ami K.; Sorenson, III, James Christopher; Wagner, Eric M., Distributed storage system with web services client interface.
Ayanamcottil, Antony Aloysius; Chandrappa, Varun Yarehalli; Revankar, Natesh Shridhar; Verma, Priya; Alam, Mohammad Dilshad; Sharma, Nitin Prakash; Pullaikudi, Praveen Prakash Thazhalhu, Method for destructive readout of data in case of mobile theft.
Natsuno,Takeshi, Method for inhibiting use of mobile communication terminal having memory where card information is stored, mobile communication network, and mobile communication terminal.
Cave, Douglas G., Method, system, and computer program product for physician efficiency measurement and patient health risk stratification utilizing variable windows for episode creation.
Aravamudan, Murali; Rajasekharan, Ajit; Ramakrishnan, Kajamalai G.; Gupta, Mayank, Methods and systems for segmenting relative user preferences into fine-grain and coarse-grain collections.
Nair Parameswaran B. (Acworth GA) Evans John C. (Atlanta GA) Price James F. (Alpharetta GA) Choudhuri Kumar S. (Kennesaw GA) Stills James T. (Atlanta GA) Goulding Victor V. (Lawrenceville GA), Multi-reader transaction terminal.
Zhou, Tiger T G; Zhou, Dylan T X; Zhou, Andrew H B, One-touch payment using haptic control via a messaging and calling multimedia system on mobile device and wearable device, currency token interface, point of sale device, and electronic payment card.
Grigg, David M.; Thomas, Susan Smith; Harkey, Scott Lee; Bondesen, Laura; Calman, Matthew A., Providing automated initial and final payment for an activity based on determining the location of an activity participant's mobile communication device.
Votaw, Elizabeth S.; Burrell, Charles Jason; Hanson, Carrie Anne; Jones, Alicia C.; Lynch, Michael Patrick; Qaim-Maqami, Hood, Remote revocation of application access based on non-co-location of a transaction vehicle and a mobile device.
Gopinathan Krishna M. ; Jost Allen ; Biafore Louis S. ; Ferguson William M. ; Lazarus Michael A. ; Pathria Anu K., Risk determination and management using predictive modeling and transaction profiles for individual transacting entities.
Grigg, David M.; Johansen, Joseph Neil; Hanson, Carrie Anne; Burrell, Charles Jason; Votaw, Elizabeth S., Self-selected user access based on specific authentication types.
Grigg, David M.; Qaim-Maqami, Hood; Jones, Alicia C.; Votaw, Elizabeth S.; Johansen, Joseph Neil; Burrell, Charles Jason; Hanson, Carrie Anne; Lynch, Michael Patrick, Shutting down access to all user accounts.
Grigg, David M.; Johansen, Joseph Neil; Toth, Michael E.; Carpenter, Daniel Lynn; Qaim-Maqami, Hood; Hanson, Carrie Anne; Votaw, Elizabeth S., Sorting mobile banking functions into authentication buckets.
Ellis, Stephen M.; Kennedy, Michael J.; Kurani, Ashish Bhoopen; Lowry, Melissa; Meyyappan, Uma; Sahni, Bipin; Stroke, Nikolai, System and method for a mobile wallet.
Berardi,Michael J.; Bliman,Michal; Bonalle,David S.; Elwood,Jennifer Anne; Hood,Matthew C.; Isenberg,Susan E.; Mayers,Alexandra; Saunders,Peter D.; Scheding,Kathryn D.; Shah,Sejal Ajit; Williamson,Jo, System and method for payment using radio frequency identification in contact and contactless transactions.
Dhesi, Rajkaran Singh; Hunt, Simon; Parke, Paul Martin, System, method, and computer program product for disabling a communication channel during authentication.
Grigg, David M.; Bertanzetti, Peter John; Toth, Michael E.; Hanson, Carrie Anne; Votaw, Elizabeth S., User authentication based on historical transaction data.
Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E.; Votaw, Elizabeth S., User authentication based on other applications.
Grigg, David M.; Johansen, Joseph Neil; Hanson, Carrie Anne; Burrell, Charles Jason; Votaw, Elizabeth S., User authentication based on self-selected preferences.
Grigg, David M.; Bertanzetti, Peter John; Toth, Michael E.; Hanson, Carrie Anne, User authentication by geo-location and proximity to user's close network.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.