Integrated full and partial shutdown application programming interface
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-009/00
H04W-012/06
H04L-029/06
G06F-008/61
H04W-004/02
출원번호
US-0928498
(2015-10-30)
등록번호
US-10021565
(2018-07-10)
발명자
/ 주소
Jones-McFadden, Alicia C.
Votaw, Elizabeth S.
출원인 / 주소
Bank of America Corporation
대리인 / 주소
Springs, Michael A.
인용정보
피인용 횟수 :
0인용 특허 :
58
초록▼
The present disclosure describes an integrated full and partial shutdown application programming interface. Embodiments herein disclosed include receiving an indication that a mobile device of a user is compromised. Further embodiments identify one or more applications associated with the mobile dev
The present disclosure describes an integrated full and partial shutdown application programming interface. Embodiments herein disclosed include receiving an indication that a mobile device of a user is compromised. Further embodiments identify one or more applications associated with the mobile device and remotely access the mobile device to perform a switch-off of the one or more applications. The switch-off may include logging the user out of the one or more applications before removing the one or more applications from the mobile device.
대표청구항▼
1. A system for integrated full and partial shutdown application programming interface, the system comprising: a computer apparatus comprising at least one processor and a memory; anda software module, stored in the memory, comprising computer readable code, executable by the processor, and configur
1. A system for integrated full and partial shutdown application programming interface, the system comprising: a computer apparatus comprising at least one processor and a memory; anda software module, stored in the memory, comprising computer readable code, executable by the processor, and configured to: monitor a position of a mobile device associated with a user;monitor a position of a wearable device associated with the user;determine that the mobile device is compromised by determining that the mobile device and the wearable device associated with the user are not co-located, based on the position of the mobile device and the position of the wearable device associated with the user;perform a switch-off for the mobile device associated with the user in response to determining that the mobile device and the wearable device associated with the user are not co-located, wherein performing the switch-off for the mobile device comprises: remotely accessing the mobile device;identifying one or more applications associated with the mobile device;identifying unopened applications of the one or more applications associated with the mobile device;causing the mobile device to open or load the unopened applications;logging the user out of the one or more applications, wherein logging the user out of the one or more applications comprises: identifying a first application of the one or more applications with multiple authentication levels;determining that the user is currently logged in to a first authentication level of the multiple authentication levels; andlogging the user out of the first authentication level for the first application, but not logging the user out of a second authentication level of the first application, where the first authentication level requires more complex user authentication credentials than the second authentication level;confirming that the user is logged out of the one or more applications; andin response to confirming that the user is logged out of the one or more applications, uninstalling or reconfiguring the one or more applications from the mobile device, wherein uninstalling comprises removing all or part of the one or more applications from the mobile device, and wherein reconfiguring comprises disabling access to the one or more applications;determine through monitoring of the mobile device and the wearable device of the user that the mobile device and the wearable device associated with the user are co-located, based on the position of the mobile device and the position of the wearable device associated with the user;in response to determining that the mobile device and the wearable device are co-located, receive a request to restore the mobile device to an original state, wherein the original state is a state prior to the switch-off, wherein restoring comprises reinstalling the all or part of the one or more applications that were removed from the mobile device and reconfiguring the one or more applications to their original configurations to allow the user to gain access to the one or more applications;in response to receiving the request to restore the mobile device to the original state, prompt the user to input authentication credentials required for access to each of the one or more applications;receive, from the user, the required authentication credentials;validate the authentication credentials;in response to validating the authentication credentials, install or reconfigure the one or more applications; andin response to validating the authentication credentials, log the user into each of the one or more applications, including logging the user into the first authentication level for the first application. 2. The system of claim 1, wherein the authentication credentials comprise one or more of a username, a password, a passcode, a personal identification number (PIN), security questions, biometric indicia, device info associated with the mobile device, and financial account information of the user. 3. The system of claim 1, wherein the software module is further configured to notify the user of the switch-off by transmitting an electronic notification to a different computing device of the user. 4. The system of claim 1, wherein the second authentication level requires only a password for authentication. 5. The system of claim 1, wherein the first authentication level requires a security question, biometric information of the user, or a two-step verification process. 6. The system of claim 1, wherein the software module is further configured to log a current user of the mobile device out of one or more of the one or more applications. 7. A computer-implemented method for integrated full and partial shutdown application programming interface, the computer-implemented method comprising: monitoring a position of a mobile device associated with a user;monitoring a position of a wearable device associated with the user;determining that the mobile device is compromised by determining that the mobile device and the wearable device associated with the user are not co-located, based on the position of the mobile device and the position of the wearable device associated with the user;performing a switch-off for the mobile device associated with the user in response to determining that the mobile device and the wearable device associated with the user are not co-located, wherein performing the switch-off for the mobile device comprises: remotely accessing the mobile device;identifying one or more applications associated with the mobile device;identifying unopened applications of the one or more applications associated with the mobile device;causing the mobile device to open or load the unopened applications;logging the user out of the one or more applications, wherein logging the user out of the one or more applications comprises: identifying a first application of the one or more applications with multiple authentication levels;determining that the user is currently logged in to a first authentication level of the multiple authentication levels; andlogging the user out of the first authentication level for the first application, but not logging the user out of a second authentication level of the first application, where the first authentication level requires more complex user authentication credentials than the second authentication level;confirming that the user is logged out of the one or more applications; andin response to confirming that the user is logged out of the one or more applications, uninstalling or reconfiguring the one or more applications from the mobile device, wherein uninstalling comprises removing all or part of the one or more applications from the mobile device, and wherein reconfiguring comprises disabling access to the one or more applications;determine through monitoring of the mobile device and the wearable device of the user that the mobile device and the wearable device associated with the user are co-located, based on the position of the mobile device and the position of the wearable device associated with the user;in response to determining that the mobile device and the wearable device are co-located, receiving a request to restore the mobile device to an original state prior to the switch-off, wherein the original state is a state prior to the switch-off, and wherein restoring comprises reinstalling the all or part of the one or more applications that were removed from the mobile device and reconfiguring the one or more applications to their original configurations to allow the user to gain access to the one or more applications;in response to receiving the request to restore the mobile device to the original state, prompting the user to input authentication credentials required for access to each of the one or more applications;receiving, from the user, the required authentication credentials;validating the authentication credentials;in response to validating the authentication credentials, install or reconfigure the one or more applications; andin response to validating the authentication credentials, log the user into each of the one or more applications, including logging the user into the first authentication level for the first application. 8. The computer-implemented method of claim 7, wherein the authentication credentials comprise one or more of a username, a password, a passcode, a personal identification number (PIN), security questions, biometric indicia, device info associated with the mobile device, and financial account information of the user. 9. The computer-implemented method of claim 7, wherein the computer-implemented method further comprises notifying the user of the switch-off by transmitting an electronic notification to a different computing device of the user. 10. The computer-implemented method of claim 7, wherein the second authentication level requires only a password for authentication. 11. The computer-implemented method of claim 7, wherein the first authentication level requires a security question, biometric information of the user, or a two-step verification process. 12. The computer-implemented method of claim 7, wherein the computer-implemented method further comprises logging a current user of the mobile device out of one or more of the one or more applications. 13. A computer program product for integrated full and partial shutdown application programming interface, the computer program product comprising a non-transitory computer readable medium having one or more computer-readable programs stored therein, and the computer readable programs, when executed by a computer apparatus, cause the computer apparatus to perform the following steps: monitor, via a computing device processor, a position of a mobile device associated with a user;monitor, via a computing device processor, a position of a wearable device associated with the user;determine, via a computing device processor, that the mobile device is compromised by determining that the mobile device and the wearable device associated with the user are not co-located, based on the position of the mobile device and the position of the wearable device associated with the user;perform, via a computing device processor, a switch-off for the mobile device associated with the user in response to determining that the mobile device and the wearable device associated with the user are not co-located, wherein performing the switch-off for the mobile device comprises: remotely accessing the mobile device;identifying one or more applications associated with the mobile device;identifying unopened applications of the one or more applications associated with the mobile device;causing the mobile device to open or load the unopened applications associated with the mobile device;logging the user out of the one or more applications, wherein logging the user out of the one or more applications comprises: identifying a first application of the one or more applications with multiple authentication levels;determining that the user is currently logged in to a first authentication level of the multiple authentication levels; andlogging the user out of the first authentication level for the first application, but not logging the user out of a second authentication level of the first application, where the first authentication level requires more complex user authentication credentials than the second authentication level;confirming that the user is logged out of the one or more applications; andin response to confirming that the user is logged out of the one or more applications, uninstalling or reconfiguring the one or more applications from the mobile device, wherein uninstalling comprises removing all or part of the one or more applications from the mobile device, and wherein reconfiguring comprises disabling access to the one or more applications;determine through monitoring of the mobile device and the wearable device of the user that the mobile device and the wearable device associated with the user are co-located, based on the position of the mobile device and the position of the wearable device associated with the user;in response to determining that the mobile device and the wearable device are co-located, receive, via a computing device processor, a request to restore the mobile device to an original state, wherein the original state is a state prior to the switch-off, wherein restoring comprises reinstalling the all or part of the one or more applications that were removed from the mobile device and reconfiguring the one or more applications to their original configurations to allow the user to gain access to the one or more applications;in response to receiving the request to restore the mobile device to the original state, prompt, via a computing device processor, the user to input authentication credentials required for access to each of the one or more applications;receive, via a computing device processor, from the user, the required authentication credentials;validate, via a computing device processor, the authentication credentials;in response to validating the authentication credentials, install or reconfigure, via a computing device processor, the one or more applications; andin response to validating the authentication credentials, log, via a computing device processor, the user into each of the one or more applications, including logging the user into the first authentication level for the first application. 14. The computer program product of claim 13, wherein the authentication credentials comprise one or more of a username, a password, a passcode, a personal identification number (PIN), security questions, biometric indicia, device info associated with the mobile device, and financial account information of the user. 15. The computer program product of claim 13, wherein the computer readable programs cause the computer apparatus to notify, via a computing device processor, the user of the switch-off by transmitting an electronic notification to a different computing device of the user. 16. The computer program product of claim 13, wherein the second authentication level requires only a password for authentication. 17. The computer program product of claim 13, wherein the first authentication level requires a security question, biometric information of the user, or a two-step verification process. 18. The computer program product of claim 13, wherein the computer readable programs cause the computer apparatus to log, via a computing device processor, a current user of the mobile device out of one or more of the one or more applications.
Kao, I-Lung; Milman, Ivan Matthew; Schneider, David J.; Willard, Ronald Gene, Authentication framework for multiple authentication processes and mechanisms.
Vermeulen, Allan H.; Atlas, Alan B.; Barth, David M.; Cormie, John David; Fischman, Ami K.; Sorenson, III, James Christopher; Wagner, Eric M., Distributed storage system with web services client interface.
Ayanamcottil, Antony Aloysius; Chandrappa, Varun Yarehalli; Revankar, Natesh Shridhar; Verma, Priya; Alam, Mohammad Dilshad; Sharma, Nitin Prakash; Pullaikudi, Praveen Prakash Thazhalhu, Method for destructive readout of data in case of mobile theft.
Natsuno,Takeshi, Method for inhibiting use of mobile communication terminal having memory where card information is stored, mobile communication network, and mobile communication terminal.
Aravamudan, Murali; Rajasekharan, Ajit; Ramakrishnan, Kajamalai G.; Gupta, Mayank, Methods and systems for segmenting relative user preferences into fine-grain and coarse-grain collections.
Grigg, David M.; Thomas, Susan Smith; Harkey, Scott Lee; Bondesen, Laura; Calman, Matthew A., Providing automated initial and final payment for an activity based on determining the location of an activity participant's mobile communication device.
Ellis, Stephen M.; Kennedy, Michael J.; Kurani, Ashish Bhoopen; Lowry, Melissa; Meyyappan, Uma; Sahni, Bipin; Stroke, Nikolai, System and method for a mobile wallet.
Berardi,Michael J.; Bliman,Michal; Bonalle,David S.; Elwood,Jennifer Anne; Hood,Matthew C.; Isenberg,Susan E.; Mayers,Alexandra; Saunders,Peter D.; Scheding,Kathryn D.; Shah,Sejal Ajit; Williamson,Jo, System and method for payment using radio frequency identification in contact and contactless transactions.
Dhesi, Rajkaran Singh; Hunt, Simon; Parke, Paul Martin, System, method, and computer program product for disabling a communication channel during authentication.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.