BANK OF AMERICA CORPORATION Patent applications |
Patent application number | Title | Published |
20160071210 | DYNAMIC RISK-RESPONSIVE BOND LADDER - Embodiments of the invention relate to systems, methods, and computer program products for monitoring financial risk indicators to provide a composite financial risk indicator and, based on the composite financial risk indicator, determining the number of years for which financial investors in distribution mode should have self-liquidating assets available (i.e., the number of rungs on a bond ladder) to insure that cash flow needs are met in future years regardless of the risk present in the financial markets. In response to determining the number of years for which the investors should have self-liquidating assets, the financial portfolios of the investors are automatically adjusted to provide for self-liquidating assets for each of the determined number of years (i.e., self-liquidating assets are bought or sold). | 03-10-2016 |
20160070919 | ACCESS REVOCATION - Systems, methods and apparatuses for revoking access to one or more applications for one or more individuals or users are provided. In some examples, revocation settings may be received from different business divisions or enterprises or business groups within an entity and may be compiled to form a standardized set of revocation settings that may be applied across the entity. Accordingly, upon receiving an item that may be associated with access and may include one or more applications to which access may be revoked and/or one or more users from which access may be revoked, the system may apply the standardized revocation settings to determine whether access should be revoked. If it is determined that access should be revoked, the system may revoke access to the one or more applications for the one or more users. | 03-10-2016 |
20160048782 | Controlling and Managing Identity Access Risk - Methods and systems for controlling and managing identity and access management risks are presented. A computing device may generate a maturity model that maps a plurality of access management controls to a plurality of information technology (IT) resources associated with an IT environment. Subsequently, the computing device may determine, for each IT resource of the plurality of IT resources, a plurality of access management maturity scores. Each access management maturity score of the plurality of access management scores may correspond to an access management control of the plurality of access management controls that are associated with the corresponding IT resource. The computing device then may determine an aggregate maturity score for the IT environment based on the plurality of access management maturity scores for the plurality of IT resources. Thereafter, the computing device may provide the maturity model and the aggregate maturity score to at least one governance system. | 02-18-2016 |
20160027016 | Deposit for Non-Account Holders/US - Systems and methods for depositing monetary funds into an account are described. A first request from a first individual to deposit monetary funds into an account associated with an entity may be received. The first individual is not an account owner of the account. Monetary funds from the first individual may be received for deposit in the account. The monetary funds may include cash, checks, credit card transfers, and/or debit card transfers. The receipt of the first request may be receipt of a paper ticket with an access code authorizing deposit of monetary funds into the account. One or more restrictions may be reviewed to authorize the deposit of monetary funds in the account. | 01-28-2016 |
20150358282 | Firewall Policy Browser - Methods, computer-readable media, systems and apparatuses for firewall policy system are described. A computing system in a network comprising firewalls using a plurality of different formats may obtain configuration data of at least one firewall. The configuration data may comprise firewall policy information of the at least one firewall in a first format. A data type of each configuration item in the obtained configuration data may be determined, and a corresponding data in a second format for each configuration item based on the data type of the respective configuration item may be determined. The second format may be different from the plurality of different formats used by the firewalls. The properties of each configuration item in the second item may be stored, and the obtained configuration data of the at least one firewall may be presented in the second format. | 12-10-2015 |
20150348182 | PREPROVISION ONBOARDING PROCESS - Disclosed is a system for onboarding a new customer. The system for onboarding a new customer typically includes a processor, a memory, and a customer onboarding module stored in the memory. The system for onboarding a new customer is typically configured for: creating a first pre-provisioned account, the first pre-provisioned account including generic customer information and account access credentials; storing the first pre-provisioned account in an account database; initiating an onboarding session with a customer; selecting the first pre-provisioned account from the account database; receiving customer-specific information from the customer and replacing generic customer information in the first pre-provisioned account with the customer-specific information; providing the first pre-provisioned account's access credentials to the customer; testing the customer's access to the first pre-provisioned account; determining that the customer successfully accessed the first pre-provisioned account; and based on determining that the customer successfully accessed the first pre-provisioned account, terminating the onboarding session. | 12-03-2015 |
20150348048 | CUSTOMER COMMUNICATION ANALYSIS TOOL - Embodiments of the present invention help users (e.g., associates, customers, or the like) utilize communications to take actions with respect to systems or applications that do not directly allow for users to take actions using the communications. In some embodiments the communications are voice communications (e.g., phone calls, voice activation, voice services through the Internet, or the like) or written communications (e.g., e-mail communications, text communications, or the like) or other like voice communications or written communications. The present invention identifies keywords in the communications to determine the application for which the user wants to take an action, and the action that the user wants to take. The present invention takes the action within the application based on the keywords, or requests additional information from the user through the communication channel (or another communication channel). | 12-03-2015 |
20150347518 | ASSOCIATE COMMUNICATION ANALYSIS TOOL - Embodiments of the present invention help users (e.g., associates, customers, or the like) utilize communications to take actions with respect to systems or applications that do not directly allow for users to take actions using the communications. In some embodiments the communications are voice communications (e.g., phone calls, voice activation, voice services through the Internet, or the like) or written communications (e.g., e-mail communications, text communications, or the like) or other like voice communications or written communications. The present invention identifies keywords in the communications to determine the application for which the user wants to take an action, and the action that the user wants to take. The present invention takes the action within the application based on the keywords, or requests additional information from the user through the communication channel (or another communication channel). | 12-03-2015 |
20150339497 | SECURE MEDIA CONTAINER - Embodiments of a secure media container and a method of using same are provided. In some embodiments, the secure media container includes a portable power supply; an antenna; a receptacle for receiving removable data storage; and a computer apparatus including a processor and a memory, comprising executable instructions that cause the processor to: determine that a removable data storage device has been input into the receptacle; track a location of the secure media container using the antenna; determine an action associated with the location of the secure media container by: accessing a database comprising a plurality of locations and associated actions; and comparing the location of the secure media container to the plurality of locations and associated actions in the database; and apply the action to the removable storage device based on the location of the secure media container. | 11-26-2015 |
20150339408 | UNIVERSAL TRANSACTION REPOSITORY - Embodiments disclosed herein relate to systems, methods, and computer program products for providing an extensible input database and associated reference database. In some embodiments, the system and method provide an extensible input database and a graphical user interface for inputting data into the extensible input database; receive data from a user via the graphical user interface, the data comprising content for the extensible input database; generate a key for a reference database based on the content received from the user; populate the extensible input database with the content; and associate the content in the extensible input database with the key in the reference database. The extensible input database is flexible in receiving different types of data and reduces the number of databases needed in order to store different types of data. | 11-26-2015 |
20150334099 | Service Channel Authentication Token - A computer system receives an authentication request from a user device and determines a determined device identification from a set of received device attributes. When the device is properly authenticated, the computer system generates an authentication token that is signed by the determined device identification and returns the authentication token to the user device. When the computer system subsequently receives a service request with an authentication token and a plurality of device attributes for a protected resource from a user device, the computer system determines a derived device identification from some or all of the received device attributes. When a signed device identification of the authentication token and the derived device identification are equal, the apparatus continues processing the service request. Otherwise, the service request is rejected. | 11-19-2015 |
20150334098 | Service Channel Authentication Processing Hub - A computer system receives a service request over a service channel from a user device, initiates a challenge to the user device to provide authentication information based on a set of authenticators, and determines an initial level of authentication. When the initial level of authentication is not sufficient for the service channel or protected resource, the apparatus generates a challenge to the user device with at least one additional authenticator and determines an achieved level of authentication based on the further authentication information. When the achieved level of authentication reaches a target authentication level for the service channel, the apparatus continues processing the service request by the service channel. The computer may transfer the service request to another service channel with the authentication token obtained on the original service channel and further challenges the user device with additional authenticators when a higher level of authentication is necessary. | 11-19-2015 |
20150332415 | PROVIDING E-RECEIPTS TO CUSTOMERS - Embodiments of the invention relate to systems, methods, and computer program products for providing e-receipts to customers. Embodiments receive authorization from a customer for the customer to be enrolled in a point of transaction e-receipt communication program; receive transaction data corresponding to at least one transaction performed by the customer at a point of transaction of a merchant; and initiate communication, to the customer, of an e-receipt based at least in part on the received transaction data. Some embodiments receive authorization from a plurality of enrolling merchants for enrollment in the point of transaction e-receipt communication program; and build a cooperating merchant list comprising information corresponding to a plurality of cooperating merchants cooperating with a financial institution implementing the point of transaction e-receipt communication program. | 11-19-2015 |
20150332308 | Predicting Swing Buyers in Marketing Campaigns - In a marketing campaign, an individual whom we market to may be a swing buyer, a self buyer, or a non-persuadable non-buyer. A cost effective marketing strategy may focus on the swing buyers, who make a purchase when treated by the marketing campaign and do not purchase the product otherwise. Utilizing a randomized test and control data set including individuals randomly divided between a treatment group and a control group, three methods for predicting swing customers in a marketing campaign are proposed. One such method includes developing a first model corresponding to a likelihood that a member of control group is a buyer of the product, developing a second model corresponding to the likelihood that a non-buyer of the product is a member of control group, and determining a score corresponding to the likelihood that an individual is a swing buyer, using the first model and the second model. | 11-19-2015 |
20150332277 | COMPLIANCE ADHERENCE ASSESSMENT TOOL FOR REGULATORY REPORTING - Embodiments of the invention are directed to a system, method, or computer program product for a compliance adherence assessment tool for regulatory reporting. The tool provides a self-explaining check for and evaluation of completeness of a compliance regulatory report. In this way, irrespective of the location or group within an entity, the report is generated from, the processing and compliance adherence will be uniform across the entity. Furthermore, the tool aids in creating a uniform reporting process that weighs potential exposures and mitigates those exposures for regulatory reporting across an entity. | 11-19-2015 |
20150332264 | TOKENIZATION OF USER ACCOUNTS FOR DIRECT PAYMENT AUTHORIZATION CHANNEL - Embodiments of the present invention disclose a financial institution system maintained by a financial institution and for tokenization of user accounts for using a direct payment authorization channel, whereby a third party payment authorization network is avoided. Embodiments establish a direct channel of communication between the system and a merchant or a merchant network in communication with the merchant; wherein the direct channel of communication comprises a network communication channel without a third party payment authorization system; receive a token issued by the financial institution and associated with a user account associated with a customer of the financial institution; receive transaction data comprising an amount associated with a transaction between the customer of the financial institution and the merchant; and determine whether to authorize the transaction based on the received token and the received transaction data. | 11-19-2015 |
20150332199 | SYSTEM AND METHOD FOR COMMUNICATING REPORTS WITHIN AN ENTERPRISE TO EXTERNAL MODULES - An interface receives data from a plurality of data sources. A processor applies quality control rules to the data and compares the data to historical data. The processor determines whether the data is inconsistent the with historical data based on the comparison. When the data does not comply with the quality control rules or the data is inconsistent with the historical data, the processor generates a common exceptions report comprising an exception, wherein the exception comprises at least one of a fatal exception and a warning exception. If an exception is generated, the process determines whether the exception is fatal. When an exception is not generated, the interface communicates the data to a plurality of external modules. When a warning exception is generated, the interface communicates the data to at least one of the external modules and communicates the exception to at least one of the data sources. When a fatal exception is generated, the interface prevents communication of the data to the external modules and communicates the exception to at least one of the data sources. | 11-19-2015 |
20150326574 | DEVICE VALIDATION USING DEVICE FINGERPRINT - Embodiments of the invention are directed to apparatuses, methods and computer program products for validating a device. An exemplary apparatus is configured to: determine a device accesses an application; determine whether the device is a trusted device based on a device fingerprint associated with the device; in response to determining the device is a trusted device, create an authenticated session; and enable performance of a transaction using the device during the authenticated session. | 11-12-2015 |
20150324908 | DYNAMICALLY MODIFYING AN APPLICATION QUESTIONNAIRE - In some embodiments, a system calculates a user risk score, and determines a first subset of questions using the user risk score and type of user device. The system communicates and receives answers to the first subset of questions. The system determines a second subset of questions based on the answers to the first subset of questions. The system communicates and receives answers to the second subset of questions. The system determines whether the answers to the first subset of questions are accurate. If the verification indicates that the answer to one or more of the first subset of questions is not accurate, the system determines a third subset of questions. The system communicates and receives answers to the third subset of questions. The system determines a plurality of repayment plans based on the user risk score and the answers to the first, second, and third subset of questions. | 11-12-2015 |
20150324907 | INTEGRATING INFORMATION FROM VARIOUS LINES OF BUSINESS - In some embodiments, a system receives information about a first loan and information about a second loan. The system calculates a user risk score based on a user payment history, a first loan priority score, and a second loan priority score. The system generates a single loan payment plan for the first loan and the second loan using the first loan priority score, the second loan priority score, and the user risk score. The system receives a payment associated with the single loan payment plan. The processor subdivides the payment into a first loan payment and a second loan payment using the first loan priority score and the second loan priority score. The system transfers the first loan payment to the first line of business and the second loan payment to the second line of business. | 11-12-2015 |
20150324906 | DEVELOPING A HIERARCHY OF REPAYMENT PLANS - In some embodiments, a system receives a notice indicating a loan past due associated with a user. The system calculates a user risk score associated with the user with the user risk score based on a user payment history. The system determines a plurality of repayment plans for the user using the calculated user risk score, and calculates a repayment plan value score for each repayment plan. The system orders each repayment plan according to the repayment plan value score, and generates a repayment plan queue of the plurality of the ordered repayment plans. The system communicates a first repayment plan in the repayment plan queue to the user. | 11-12-2015 |
20150324904 | Customizing Content Presentation Format In Accordance With The Category Of Device Used To Access The Content - In some embodiments, a system identifies content for display on a user device. The system determines a device category associated with the user device. The system determines that the content for display on the user device comprises at least one of a group comprising a plurality of bank product options, a user assistance option associated with one or more of the plurality of bank product options, a plurality of questions associated with one or more of the plurality of bank product options, and a disclosure associated with acceptance of a selected bank product option of the plurality of bank product options. The system determines a presentation format for the content according to presentation rules that determine presentation format for the content on the user device according to the content and the determined device category. | 11-12-2015 |
20150324903 | Adapting A User's Communication Channel In Accordance With Communication Channel Triggers - In some embodiments, a system identifies a bank product flow associated with a user interacting with a website. The system accesses proactive chat session triggering rules associated with the identified bank product flow. The system monitors activity of the user interacting with the website. The system determines whether the activity of the user satisfies a trigger specified in the proactive chat session triggering rules associated with the identified bank product flow. The system determines availability of a customer service agent to engage in a chat session with the user. In accordance with the availability of the customer service agent, the system initiates the chat session between the user and the customer service agent associated with the bank product flow without waiting for the user to initiate the chat session. | 11-12-2015 |
20150324902 | Adapting an Alert Notification According to User Data - A system includes a memory operable to store user data and a processor communicatively coupled to the memory. The processor is operable to identify a first user, access user data associated with the first user, and determine whether to provide a first alert to the first user. The processor selects a first alert format and a first alert type according to the user data associated with the first user. The processor communicates the first alert to the first user in accordance with the selected first alert format and first alert type. The processor identifies a second user, accesses user data associated with the second user, and determines whether to provide a second alert to the second user. The processor selects a second alert format and a second alert type and communicates the second alert to the second user in accordance with the selected second alert format and second alert type. | 11-12-2015 |
20150324901 | PREPARING A BANK APPLICATION USING A USER DEVICE - In some embodiments, a system receives an image file from a user device. The image file depicts a financial document that a customer selects to submit to a bank for inclusion in an application for a bank product. The system associates the image file with the application and determines whether receipt of the image file completes the application. If yes, the system sends the application to a review process configured to determine whether to approve the application. If no, the system determines a time period for the customer to complete the application and, after the time period has elapsed, initiates communication with instructions for completing the application. | 11-12-2015 |
20150324900 | Providing Transaction History To A User During A Communication Session - In some embodiments, a system provides an interactive communication session between the user and a service agent associated with an enterprise. During the interactive communication session between the user and the service agent, the system provides the user with access to an online environment associated with the enterprise via a graphical user interface displayed on a user device. The system accesses the user's transaction history associated with the enterprise. The system accesses the rules for displaying the user's transaction history. The system identifies at least a portion of the user's transaction history associated with the enterprise according to the rules for displaying the user's transaction history. During the interactive communication session, the system provides the at least the portion of the user's transaction history associated with the enterprise to the user via the graphical user interface of the user device. | 11-12-2015 |
20150324899 | Developing an Automated Alert Notification Plan for a User - A system includes a memory operable to store user data associated with a user and a processor communicatively coupled to the memory. The processor receives a promise to perform from a user and determines whether the user has scheduled a payment associated with the promise to perform. The processor accesses, in response to determining that the user has not scheduled a payment, the user data associated with the user. The processor determines whether to communicate an alert reminding the user of the promise to perform and selects, in response to a determination to communicate the alert, one or more alert types according to the user data associated with the user. The processor determines, according to the user data associated with the user, an alert frequency, and communicates the alert to the user in accordance with the selected one or more alert types and the determined alert frequency. | 11-12-2015 |
20150324872 | Matching Data From Various Channels - Systems, methods and apparatuses for receiving payment information via a first channel and receiving additional information via a second channel are provided. In some examples, a determination may be made as to whether the received payment information matches the received additional information. If so, the payment and additional information may be associated and used to identify an associated outstanding invoice. If not, a determination may be made as to whether a potential match exists. If so, additional processing may occur to determine whether the potential match is an actual match. | 11-12-2015 |
20150324830 | REWARDS CARD RECOMMENDATION TOOL - Embodiments of the present invention provide apparatuses and methods that present reward accounts to users in order to help the users determine which reward accounts meet the spending habits of the users. In some embodiments the reward accounts may be credit cards, debits cards, other types of account cards, offer cards that can be used along with various payments methods, savings accounts, checking accounts, lines of credit, or any other like account that may be used for user expenses. Embodiments of the invention provide a reward account recommendation tool that may be utilized in a number of different ways to help users of reward accounts determine which reward accounts the users should utilize based on the user's expenses for various categories. | 11-12-2015 |
20150324804 | Automated Follow-Up Communications To Unsuccessful Communication Attempts - In some embodiments, a system facilitates receipt of a request from a user via a graphical user interface on a user device for a service agent to initiate a communication to the user using a first communication type. In response to receiving the request from the user, the system initiates a first communication attempt to the user using the first communication type. The system determines that the first communication attempt using the first communication type is not successful. The system accesses the rules for communicating with the user. In response to determining that the first communication attempt using the first communication type did not reach the first user, the system initiates a second communication attempt using a second communication type according to the rules for communicating with the user. | 11-12-2015 |
20150324770 | SCHEDULING FUTURE PAYMENTS TO AN EXTERNAL PAYMENT SERVICE - In some embodiments, a system receives promise-to-pay information associated with a loan past due from a user. The promise-to-pay information comprises a promised amount, a promised date, and a payment form. The system determines a minimum promise-to-pay amount for the user. If the promised amount is greater than the minimum promise-to-pay amount, the system determines an external payment service based on the payment form. The external payment service is a payment service that processes a payment for the promised amount. The system communicates to the determined external payment service portions of the promise-to-pay information used to process the payment for the promised amount within a predetermined time period before the promised date, and communicates an alert to the user. | 11-12-2015 |
20150324455 | METHOD AND APPARATUS FOR NATURAL LANGUAGE SEARCH FOR VARIABLES - A method for natural language search for variables is provided. The method may include searching an index using key words from a user's natural language question and the context of the user's question. The index may reference variables and/or web service calls in a domain model. The method may also include saving documents obtained in response to the search. The method may also include mapping each of the documents as a node into an object graph. Each node may be associated with a parent node, except when the node is a root node. The method may also include identifying the root node of each document. The method may also include identifying the path of each node from the node to the node's root node. The method may also include identifying matching paths. Each matching path may provide an answer to the user's question. | 11-12-2015 |
20150312321 | SYSTEM FOR GENERATING A RESPONSE TO A CLIENT REQUEST - Embodiments of the invention are directed to a system, method, and computer program product for generating a response to a client request. The system typically including a memory, a processor and a module configured to receive a request associated with a service from a client; initiate the presentation of a first user interface, wherein the first user interface enables a user selection of one or more template types; initiate the presentation of a second user interface based on at least a user selection of one or more template types, wherein the second user interface enables a user selection of one or more templates associated with the selected template type; receive a client progress from the user based on at least the selection of the one or more templates to generate a response, wherein the response reflects the status of the request; and transmit the response to the client. | 10-29-2015 |
20150312248 | IDENTITY AUTHENTICATION - A system for authenticating a mobile user's identity is disclosed. The user may be required to log in upon first launching a mobile application. Subsequent launches of the mobile application may not require the user to log in. Upon subsequently launching the mobile application, the mobile device may transmit a token validation request that includes a soft token stored at the mobile application. An authentication server may receive the request and transmit a one-time password to a device that has the phone number associated with the soft token. The authentication server may also transmit a session ID number. When the authentication server receives an identity validation response from the mobile device that includes the session ID number and the one-time password, the authentication server may output requested customer account information. | 10-29-2015 |
20150310422 | METHOD AND APPARATUS FOR PROVIDING REAL TIME MUTABLE CREDIT CARD INFORMATION - A method for using a smartcard is provided. The smartcard may include a microprocessor chip, a button, a dynamic transaction authorization number, a Bluetooth low energy (“BLE”) device. The smartcard may also include a battery. The battery may be configured to power the BLE and the microprocessor chip. The smartcard may also include memory. The memory may be configured to store the dynamic transaction authorization number. The smartcard may also include a dynamic magnetic strip. The dynamic magnetic strip may include a digital representation of the dynamic transaction authorization number. The method for using a smartcard may include pressing the button. The method may also include transmitting an instruction to a smartphone for a request for a dynamic transaction authorization number. The transmission of an instruction may be in response the pressing of the button. The method may also include receiving a dynamic transaction authorization number from a smartphone. | 10-29-2015 |
20150310390 | AGGREGATION AND WORKFLOW ENGINES FOR MANAGING PROJECT INFORMATION - A system includes an aggregation engine that receives a build sheet entry from a user that includes a configuration item, a category, and a value. The system also includes a workflow engine that determines a first approver associated with the configuration item and a second approver associated with the category. The workflow engine transmits a first approval request to the first approver and a second approval request to the second approver. The workflow engine receives a first response that indicates that the first approver approved the build sheet entry and a second response that indicates that the second approver denied the build sheet entry. The workflow engine receives an updated build sheet entry from the user that includes the configuration item, the category, and an updated value. The workflow engine transmits an updated second approval request to the second approver and receives an updated second response that indicates that the second approver approved the updated build sheet entry. The system also includes an export engine that exports the build sheet entry to an external group. | 10-29-2015 |
20150310361 | AGGREGATION AND WORKFLOW ENGINES FOR MANAGING PROJECT INFORMATION - A system includes an aggregation engine that initiates a first interface module in response to a first request from a first user that indicates a first type of project information. The aggregation engine also receives, via the first interface module, the first type of project information and stores the first type of project information in a memory. The system additionally includes a workflow engine that initiates one or more workflows that indicate certain project information requested by an external group. The workflow engine retrieves, from the memory and based upon the initiated one or more workflows, a first subset of the first type of project information and formats the first subset of project information according to the workflow. The system also includes an export engine that transmits the formatted first subset of project information to the external group according to the initiated one or more workflows. | 10-29-2015 |
20150310345 | MODELING INCREMENTALTREATMENT EFFECT AT INDIVIDUAL LEVELS USING A SHADOW DEPENDENT VARIABLE - Embodiments of the invention are directed to systems, methods and computer program products for utilizing a shadow ridge rescaling technique to model incremental treatment effect at the individual level, based on a randomized test and control data. A shadow dependent variable is introduced with its mathematical expectation being exactly the incremental effect. Ridge regression is utilized to regress the shadow dependent variable on a set of variables generated from the test model score and the control model score. A tuning parameter in the ridge regression is selected so that the score can best rank order the incremental effect of the treatment. The final score is a nonlinear function of the test model score plus a nonlinear function of a control model score, and outperforms the traditional differencing score method. | 10-29-2015 |
20150310205 | Evaluating Customer Security Preferences - Methods and systems for evaluating customer security preferences are presented. In some embodiments, a computer system may receive, from a customer portal computing platform, a request for a security dashboard user interface for a customer. In response to receiving the request for the security dashboard user interface, the computer system may request, from a security score computing platform, a security score for the customer. Subsequently, the computer system may receive, from the security score computing platform, the security score for the customer. The computer system then may generate, based on the security score for the customer, the security dashboard user interface for the customer. Thereafter, the computer system may provide, to the customer portal computing platform, the generated security dashboard user interface for the customer. | 10-29-2015 |
20150310204 | Evaluating Customer Security Preferences - Methods and systems for evaluating customer security preferences are presented. In some embodiments, a computer system may receive, from a security dashboard computing platform, a request for a security score associated with a customer. In response to receiving the request for the security score associated with the customer, the computer system may request, from a customer portal computing platform, one or more security preferences associated with the customer. Subsequently, the computer system may receive, from the customer portal computing platform, the one or more security preferences associated with the customer. The computer system then may determine, based on at least one security score definition file and based on the one or more security preferences associated with the customer, a security score for the customer. Thereafter, the computer system may provide, to the security dashboard computing platform, the determined security score for the customer. | 10-29-2015 |
20150310194 | Authentication Using Device ID - A system for authenticating a customer is disclosed. The customer may attempt to access protected resources located at an authentication server. The customer may log in to the authentication server's website, thereby submitting an authentication request. The authentication request may comprise attributes of the device the customer uses to log in. The authentication server may generate a device ID using the received device attributes and generate an authentication token that is signed with the device ID. The authentication server may transmit the authentication token to the client device. Subsequent requests to access protected resources from the client device may include the authentication token that is signed with the device ID. | 10-29-2015 |
20150310076 | DATA LOAD PROCESS - A source data file can be loaded into a database by extracting data from the source data file at a computing device, validating the data from the source data file at the computing device, transforming the data from the source data file at the computing device, requesting the data to be transferred to a first database at a first message processor module, delivering the data to the first database, and responding that the data has been transferred to the first database at the first message processor module to acknowledge receipt of the data in the database at the computing device. | 10-29-2015 |
20150310032 | INFORMATION MANAGEMENT COMMAND PROCESS DEVICE - An illustrative method for providing a job to an information management system may include monitoring, by a command processing device such as a command processing tool operating on one or more computing devices, operation of a series of commands communicated to at least one information management system via a communication link. The command processing device may determine a status associated with one or more commands of the series of commands based on the operation of the command in the information management system. The command processing device may be configured for controlling a rate at which the series of commands is communicated to the information management system based, at least in part, on the status of one or more of the commands. | 10-29-2015 |
20150302411 | PROXIMITY TO A LOCATION AS A FORM OF AUTHENTICATION - Disclosed is a system and associated method of authenticating a transaction based at least partially on the location of a mobile device. The system typically includes a processor, a memory, and a transaction authentication module stored in the memory. The module is typically configured for: receiving a request from a user to complete a transaction; receiving geographic location information for a point-of-transaction associated with the transaction; receiving geographic location information for the mobile device associated with the user; determining whether the geographic location of the point-of-transaction is geographically proximate to the geographic location of the mobile device; and based at least partially on the geographic location of the point-of-transaction being geographically proximate to the geographic location of the mobile device, enabling the user to complete the transaction. | 10-22-2015 |
20150302341 | SYSTEM FOR IMPLEMENTING CHANGE CONDITION LEVELS - Disclosed is a system for implementing change condition levels. The system for implementing change condition levels typically includes a processor, a memory, and a change event management module stored in the memory. The system for implementing change condition levels is typically configured for: receiving an indication of a change event to be implemented; determining that a change condition level is applicable to the change event; based on determining that the change condition level is applicable to the change event, initiating a change event approval process for a change event, the change event approval process being defined by the change condition level; and, once the approval process has been successfully completed, permitting implementation of the change event, implementation of the change event being prohibited until receiving the indication of the successful completion of the change event approval process for the change event. | 10-22-2015 |
20150302336 | STRATEGIC PARTNER GOVERNANCE FRAMEWORK AND PERFORMANCE TRACKING - Systems, apparatus, methods, and computer program products are provided for managing the productivity and performance of a business' offsite service providers. Productivity is measured multi-dimensionally taking into account the unique business metrics that result in increased productivity. In addition, the framework herein provided can dynamically be adjusted over time at allow for different business metrics to be considered and/or assign a pre-determined level of importance to a business metric (i.e., proper weighting), resulting in a final productivity score that allows for comparison amongst service providers. | 10-22-2015 |
20150302221 | SECURE ACCESS TO PROGRAMMING DATA - Embodiments for preventing data loss and allowing selective data access are provided. In some embodiments, the system and method are configured to receive task protocols and registration requests; determine an allowed list based on the protocols or requests, the list comprising registered data and codes needed to execute a task; allow a user to establish a connection to a device to execute the task on the device; identify data being transferred to and from the device; compare the data being transferred and the allowable list; and determine that at least some of the data being transferred is allowable. | 10-22-2015 |
20150302220 | SECURE DATA CONTAINERS - Embodiments for providing secure data containers and allowing selective access to files stored in the containers include systems and methods that receive a request to create a container, wherein the container is a file system comprising access parameters that define one or more permitted actions and one or more permitted users for the container; determine duration parameters for the container, wherein the duration parameter comprise a time duration during which the container may be accessed; determine a fingerprint of the container, the fingerprint being a record of the container for comparison to the container at a later time; generate the container with the access parameters, duration parameters, and fingerprint; monitor the container for compliance with the access parameters, duration parameters, and fingerprint; and apply a consequence when the container is not in compliance with the access parameters, duration parameters, or fingerprint. | 10-22-2015 |
20150302210 | SECURE DATA ACCESS - Embodiments for preventing data loss and allowing selective access data include systems and methods that determine that a file has been created or received; determine a fingerprint of the file, wherein the fingerprint is a record of the file for comparison to the file at a later time; determine at least one permitted use related to the file, wherein the permitted uses comprises a permitted user and a permitted action; determine that the file is being accessed by a user; determine whether the user is a permitted user of the file based on an identity of the user; compare the file to the associated fingerprint of the file when the user is a permitted user; determine the action being taken by the user when the file matches the associated fingerprint; and permit the action to occur when the action is a permitted action of the file. | 10-22-2015 |
20150294432 | GESTURE-BASED NOTIFICATION - Systems, methods, and computer program products for use by a financial institution employee in a financial institution environment to determine a preferred level of service based on gesture recognition. Embodiments of the invention involve a memory device; and a processing device operatively coupled to a memory; a computing processor; and a module configured to cause the one or more computing processors to: receive from a first device, an input associated with one or more gestures from an employee in a business environment; compare the received input to one or more predetermined gestures stored in a database, wherein the one or more predetermined gestures stored in the database are associated with one or more actions; based on the comparison, determine a match, and execute the one or more actions associated the received input. | 10-15-2015 |
20150294412 | MATCHING ENGINE FOR POLYMORPHIC RIGHTS TO BORROW TRANSACTIONS - According to yet another embodiment, a system includes an order engine that receives, from a first party, a polymorphic right to borrow sell order. The polymorphic right to borrow sell order includes a first quantity of an asset that is offered for lending, a start date associated with a time when the asset is first offered for lending, an end date associated with a time when the asset is no longer offered for lending, one or more first terms, and one or more second terms different from the one or more first terms. The order engine also receives, from a different party, a right to borrow buy order that indicates a quantity of the asset that is desired for borrowing. The system also includes a matching engine that matches, based upon the one or more first terms and the one or more second terms, the one or more first terms of the polymorphic right to borrow sell order with the right to borrow buy order. The system also includes a transaction engine that determines a transaction associated with the one or more first terms of the polymorphic right to borrow sell order and the right to borrow buy order and initiates the transaction. | 10-15-2015 |
20150294411 | MATCHING ENGINE FOR RIGHTS TO BORROW TRANSACTIONS - A system includes a memory that stores a plurality of right to borrow sell orders. The system also includes an order engine that receive a right to borrow buy order. The system also includes a matching engine that determines that the right to borrow buy order matches with one of the plurality of right to borrow sell orders. Determining a match includes determining that an asset desired for borrowing by the right to borrow buy order matches an asset offered for lending by the determined right to borrow sell order. Determining a match also includes determining that a rental rate offered by the right to borrow buy order is greater than or equal to a rental rate requested by the determined right to borrow sell order. Determining a match also includes determining that a start date associated with a time when the asset is first desired to be borrowed by the right to borrow buy order is between a start date associated with a time when the asset is first offered for lending and an end date associated with a time when the asset is no longer desired to be borrowed by the determined right to borrow sell order. | 10-15-2015 |
20150294410 | SYSTEM FOR COORDINATING RIGHTS TO BORROW TRANSACTIONS - A system includes an order engine that receives a plurality of right to borrow orders. Each of the right to borrow orders includes an asset, an indication of whether a right is sought to either borrow or lend the asset, a quantity of the asset to be borrowed or lended, a rental rate, a start date, and an end date. The system also includes a matching engine that determines that a first of the plurality of right to borrow orders matches with a second of the plurality of right to borrow orders. The system also includes a transaction engine that initiates a transaction associated with the determined first and second right to borrow orders. | 10-15-2015 |
20150294405 | VIRTUAL BANKING CENTER - Systems, apparatus, methods, and computer program products are provided for a virtual banking experience using a wearable computing device. Embodiments of the invention involve a memory device; and a processing device operatively coupled to a memory; a computing processor; and a module configured to cause the one or more computing processors to receive an indication that the customer desires to initiate a virtual banking session using the OHMD; receive from the customer a selection of a real agent or a virtual agent for conducting the virtual banking session; configure a virtual banking environment comprising one or more virtual objects for facilitating the virtual banking session, wherein the virtual banking environment comprises one or more virtual objects associated with one or more financial institution products and/or services; and implement, via the OHMD, the virtual banking session involving the customer and the customer-selected real agent or the customer-selected virtual agent. | 10-15-2015 |
20150294389 | PROVIDING COMPARISON SHOPPING EXPERIENCES THROUGH AN OPTICAL HEAD-MOUNTED DISPLAYS IN A WEARABLE COMPUTER - Embodiments of the invention are directed to systems, methods and computer program products for aiding with purchase inquiries through an optical head-mounted display in a wearable computer. An exemplary apparatus is configured to receive information captured by the wearable computer; transmit, to at least one database, the received information including a primary identifier and at least one secondary identifier; retrieve, from at least one database, detailed information related to the first item of interest and the at least one additional item of interest, where the detailed information is associated with the primary identifier and the at least one secondary identifier; and present, on the optical head-mounted display in the wearable computer, the detailed information related to the first item of interest and the at least one additional item of interest, in a comparison format. | 10-15-2015 |
20150294385 | DISPLAY OF THE BUDGET IMPACT OF ITEMS VIEWABLE WITHIN AN AUGMENTED REALITY DISPLAY - Systems, apparatus, and computer program items are provided for presenting budget information in connection with items within a live video stream of an augmented reality display on a mobile communication device. The invention allows the user who customarily comes in to contact with items throughout the day to able to gauge the budget impact of the purchase of such items and/or immediately ascertain whether certain items being considered for purchase are within the limits of a user's budget or a budget category. By automatically providing such information to the user in a highly efficient manner, the user can make informed decisions on whether a purchase is advisable and/or which purchase options are most suitable to the user's budget. | 10-15-2015 |
20150294339 | System for Secure Transactions - In some embodiments, a system comprises an interface and one or more processors. The interface receives account information associated with a financial account, wherein the financial account corresponds to a consumer. The processors are communicatively coupled to the interface. The processors determine, based on the account information, that the consumer invoked one or more security features for the financial account. The processors determine a reward based on the security features that the consumer invoked for the financial account and apply the reward to the financial account. | 10-15-2015 |
20150294328 | Customer Relationship Prediction and Valuation - According to one embodiment of the present invention, a system stores a plurality of matrices. The system determines each relationship between a customer and an enterprise, wherein the enterprise comprises a plurality of customers having at least one relationship with the enterprise. The system generates a relationship flow matrix that includes customer relationship transitions with the enterprise during a first time period. The system calculates a probability of a change in the customer relationship with the enterprise according to a plurality of snapshots of the relationship flow matrices. The system generates a transition probability matrix based on the probability of the change in the customer relationship occurring. The system determines a current number of customers in each relationship with the enterprise. The system generates a current distribution matrix based on the current number of customers in each relationship with the enterprise. The system applies the transition probability matrix to the current distribution matrix. The system generates a future relationship matrix based on the application of the transition probability matrix to the current distribution matrix. The system applies the future relationship matrix to determine customer relationship value associated with the enterprise. | 10-15-2015 |
20150294322 | SECURITY-MONITORING IMPLEMENTING CUSTOMER RECOGNITION VIA AN AUGMENTED REALITY DISPLAY - Systems, apparatus, and computer program products are provided for security-monitoring at a place of business by automatically determining which individuals within a business location, such as a retail store, banking center or the like, are established customers of the business. Such a determination of established customer status is conducted without requiring any action on behalf of the individuals/customers and may be accomplished proximate in time to the individuals arriving at the business location. Once the established customers have been determined, the present invention provides for attaching customer identifiers to the established customers appearing within a live video stream displayed by the security-monitoring system to thereby create an augmented reality environment within the display. | 10-15-2015 |
20150294307 | USER AUTHENTICATION BY OPERATING SYSTEM-LEVEL TOKEN - Embodiments are directed to communicating an operating system-level token for user identification and/or authentication. Embodiments store a token at an operating system-level, wherein the token is accessible by an operating system running on the apparatus, and wherein the token comprises user identification information and/or user authentication information; and in response to an initiating event, initiate communication of the token to a second apparatus external to the apparatus. Some embodiments include initiation of an operation system-level instruction set for periodically, continuously, or in response to detecting a request, initiating communication of the token. | 10-15-2015 |
20150294306 | USER AUTHENTICATION BY TOKEN AND COMPARISON TO VISITATION PATTERN - Embodiments are directed to receiving a token from a wearable device carried by a customer, the token for user authentication based on a visitation pattern of the customer. Embodiments include receive, from the wearable device carried by the customer, the token comprising user authentication information associated with the customer, wherein receiving the token indicates a current visit of the customer to the financial institution location; access, based at least in part on the user authentication information, a visitation history from a customer profile associated with the customer; determine, based at least in part on the visitation history, whether the current visit falls within a recognized visitation pattern; and authenticate, based at least in part on the determination, the customer for performing a transaction at the financial institution location. | 10-15-2015 |
20150294303 | WEARABLE DEVICE AS A PAYMENT VEHICLE - The present invention is directed to apparatuses, methods, and computer-program products for a multipurpose wearable device that is associated with one or more financial accounts wherein, in use, the wearable device is configured to facilitate a financial transaction using at least one of the one or more financial accounts. The wearable device comprises: a wearable article, wherein the wearable article comprises one or more features securing the wearable article to a person or an item associated with the person; and a portion comprising a machine-readable indicia, wherein the machine-readable indicia, when successfully read, provides payment information for conducting a financial transaction. | 10-15-2015 |
20150294270 | SYSTEM FOR MONITORING AND REVIEWING APPLICATION ACCESS - The present invention is directed to an apparatus, a method, and a computer program product for reviewing employee access within an application. A software-based tool enables a user to determine if an employee's current level of access to application functions matches an expected level of access to application functions. Modifications to the employee's level of access are recommended if it is determined that the current and expected levels of access do not match. | 10-15-2015 |
20150294096 | RHYTHM-BASED USER AUTHENTICATION - The present invention is directed to an apparatus, a method, and a computer program product for authenticating a user based on a sequence of rhythmic inputs. The user via a mobile device provides one or more inputs (e.g., pushing a button, tapping a touchscreen, a biometric, or the like) to one or more sensors associated with the mobile device as an attempt of authorization. The one or more inputs may be provided in a rhythmic manner (e.g., provided in time with music). The present invention then compares the provided one or more inputs to one or more predetermined sequences of inputs that are associated with positive authentication of the user (e.g., a known password). The phone determines that the one or more provided inputs match one or more predetermined rhythmic sequences associated with positive authentication of the user and authenticates the user. | 10-15-2015 |
20150294087 | ENGAGEMENT REPORTING TOOL FOR TRIAGE SUPPORT - Embodiments of the invention are directed to a system, method, or computer program product for a high priority incident engagement reporting tool for triage support. The tool reviews triage engagements, generates a report, and directs the report to the appropriate audience for triage. Furthermore, the invention may take incidents from across the entity and weigh the incidents for priority and impact. In this way, the invention receives, weighs, and triages any high priority incident that the entity may encounter. Thus the engagement reporting tool may allow for daily triage reporting in an efficient manner, thus streamlining formatting and sending of high priority incidents to the appropriate audiences. | 10-15-2015 |
20150293973 | MANAGING ELECTRONIC RECORDS - A system for managing electronic records comprises one or more memories comprising one or more databases, the databases configured to store a plurality of electronic records; one or more user interfaces configured to receive electronic records and criteria to associate the electronic records to one or more enterprise functions, technology platforms, and enterprise rules, and receive a query for one or more of the one or more electronic records, enterprise functions, technology platforms, and enterprise rules; and one or more processors configured to associate, according to the received criteria, the one or more electronic records with the one or more enterprise functions, technology platforms, and enterprise rules, and determine one or more electronic records, enterprise functions, technology platforms, and enterprise rules responsive to the received query. | 10-15-2015 |
20150293356 | CUSTOMER RECOGNITION THROUGH USE OF AN OPTICAL HEAD-MOUNTED DISPLAY IN A WEARABLE COMPUTING DEVICE - Systems, apparatus, and computer program products are provided for implementing a wearable computing device having an Optical Head-Mounted Display (OHMD) to automatically determine which individuals within a business environment, such as a retail store, banking center or the like, are established customers. Such a determination of established customer status is conducted without requiring any action on behalf of the individuals/customers currently located within the business environment and can be accomplished when the established customer enters the business location or shortly thereafter. Once established customers are identified, customer indicators are provided within the view of the OHMD, so that a business associate/employee can readily identity which individual within their field of view are established customers. | 10-15-2015 |
20150287336 | AUTOMATED PHISHING-EMAIL TRAINING - A computing platform may generate a message comprising instructions for handling phishing emails. The computing platform may communicate the message comprising instructions for handling phishing emails to a user device. The computing platform may generate a training email comprising phishing content. The computing platform may communicate the training email comprising phishing content to the user device. The computing platform may determine whether the training email comprising phishing content has been handled in accordance with the instructions for handling phishing emails. The computing platform may generate, based on whether the training email comprising phishing content has been handled in accordance with the instructions for handling phishing emails, a new training email comprising different phishing content. | 10-08-2015 |
20150287137 | SYSTEMS AND METHODS FOR DETERMINING A FINANCIAL HEALTH INDICATOR - Systems, methods, and computer program products are provided for providing a financial health indicator based on the user's credit report score and the user's budget indicator. Implemented in conjunction with a budget tracking system, the invention may provide financial health indicators indicating both short-term budget impact and long-term budget impact. In addition, certain embodiments provide for recognizing recurring expenditures and automatically providing the user with the budget impact of such recurring expenditures as a financial health indicator. | 10-08-2015 |
20150287124 | UNIFIED PRODUCT CATALOG ORDERS - Embodiments for creating a unified catalog include systems and method that import catalog data from one or more underlying catalog systems. The systems configure required fields for order fulfillment and receive a request for at least one selected item from the user. The systems further present at least one required field to the user in response to the request and send an order for the at least one selected item to the one or more catalog systems, the order comprising data from the at least one required field. | 10-08-2015 |
20150287111 | UNIFIED PRODUCT CATALOG - Embodiments for creating a unified catalog include systems and methods that import catalog data from one or more underlying catalog systems. The systems provide a user interface to a user for browsing items from the catalog data and receive a request for at least one selected item from the user. The systems also determine an item identifier for the at least one selected item and match the at least one selected item to at least one source catalog selected from the one or more underlying catalog systems based on the identifier. | 10-08-2015 |
20150286988 | UNIFIED PRODUCT CATALOG DATA RETRIEVAL AND MODIFICATION - Embodiments for providing a unified catalog include systems and methods that import catalog data from one or more underlying catalog systems. The systems identify items from the catalog data and modify at least one of item descriptions, item names, product categories, and item identifiers associated with the identified items. The systems further provide a unified user interface to a user for browsing the items, receive a request for at least one product selected by the user from the items, and send an order for the at least one selected product to the one or more catalog systems. | 10-08-2015 |
20150281223 | PASSWORD GENERATOR - Methods and apparatus are disclosed for generating a short term password that may be used to access a data warehouse. According to aspects of the disclosure, a user may request a password after inputting a data warehouse environment, an ID name, and a reason for the password reset. A server may receive the request and determine whether the difference in time of the present request and a previous request for the same ID name and data warehouse environment is greater than a time limit. Additionally, the server may determine whether a previous user has logged in using a password for the same ID name and data warehouse environment. Thereafter, the server may generate and output a short term password that expires after the time limit. | 10-01-2015 |
20150281210 | PASSWORD-PROTECTED APPLICATION DATA FILE WITH DECOY CONTENT - A computing platform may attempt to open a password-protected application data file. The computing platform may generate a prompt for a user to enter a password for the password-protected application data file. The computing platform may receive a user-inputted response to the prompt. The computing platform may determine whether the user-inputted response corresponds to a predetermined password for the password-protected application data file. Responsive to determining that the user-inputted response does not correspond to the predetermined password, the computing platform may display application-data-file content different from the application-data-file content generated by an author of the password-protected application data file to deter attempts at accessing protected data. | 10-01-2015 |
20150278954 | DETERMINING AN INVESTMENT OBJECTIVE OF ASSETS - Systems, methods and apparatuses for determining and aligning a calculated investment objective with a client-designated investment objective using a beta-yield method are described. A growth factor and a yield of a portfolio of securities assets may be calculated and compared to growth factor ranges and yield ranges associated with different investment objective strategies. The different growth factor ranges may be defined based on at least two thresholds, and the yield ranges may be defined based on a bond index yield and a stock index yield. By determining which growth ranges and yield ranges cover the calculated growth factor and yield, a calculated investment objective of the portfolio of assets can be determined. The calculated investment objective can be compared to the client-designated investment objective for the portfolio to determine whether the portfolio holdings are in alignment with the client-designated investment objective. | 10-01-2015 |
20150278953 | IDENTIFYING ELIGIBILITY BASED INVESTMENT OPTIONS - Methods, systems, computer-readable media, and apparatuses for presenting eligibility based investment options to a financial advisor are presented. In some embodiments, a computing device may authenticate a financial advisor. Subsequently, the computing device may determine an eligibility level of the financial advisor based on the authentication of the financial advisor. The computing device may then provide a client list and receive a selection of one or more clients from the client list. Subsequently, the computing device may present one or more options to the financial advisor based on the determined eligibility level. | 10-01-2015 |
20150278940 | Obtaining Missing Documents From User - A customer may desire to enroll in a transaction, such as a product or a service, offered, managed, and/or owned by an institution, such as a financial institution. The customer may attempt to directly enroll in the product or service or may enroll in the product or service through an agent of the institution. The customer and/or agent may select the product or service (e.g., via a workstation or other device), and a computing device may determine which documents the product or service uses, which documents the customer has on file already, and/or which documents the customer is missing. The computing device may cause the customer and/or agent to be notified of the missing documents. When the customer and/or agent provides all of the documents for the product or service (or an exception applies to one or more missing documents), the computing system may enroll the customer in the selected product or service. | 10-01-2015 |
20150278939 | Document Calculator - A customer may desire to enroll in a transaction, such as a product or a service, offered, managed, and/or owned by an institution, such as a financial institution. The customer may attempt to directly enroll in the product or service or may enroll in the product or service through an agent of the institution. The customer and/or agent may select the product or service (e.g., via a workstation or other device), and a computing device may determine which documents the product or service uses, which documents the customer has on file already, and/or which documents the customer is missing. The computing device may cause the customer and/or agent to be notified of the missing documents. When the customer and/or agent provides all of the documents for the product or service (or an exception applies to one or more missing documents), the computing system may enroll the customer in the selected product or service. | 10-01-2015 |
20150278936 | Consolidated Goal Planning - Methods, computer-readable media, systems, and apparatuses for receiving information associated with at least one account of a first user and at least one account of a second user are provided. In some examples, a determination may be made as to whether the first user and the second user have consented to group the at least one account associated with each user. Upon determining that the users have consented, the accounts may be grouped and a common financial goal for the grouped accounts may be determined. The grouped accounts may then be managed toward the common financial goal. | 10-01-2015 |
20150278797 | Location and Proximity Based Authentication - According to certain embodiments, a system receives a request from a user to perform a banking function. The system stores rules for determining an authentication procedure. The system then determines a location of the user and determines an authentication procedure according to the requested banking function and the location of the user. The system applies the authentication procedure to the location of the user. The system determines whether the user is authenticated to perform the banking function according to the application of the authentication procedure. | 10-01-2015 |
20150278774 | TECHNIQUES FOR HASH INDEXING - Apparatus for hash indexing is provided. The apparatus may be used to process a database operation request. The request may relate to a database element. The requested database element may correspond to an alphanumeric ABA routing identifier and a bank account identifier. The method may include receiving the operation request, performing a hashing operation on each of the alphanumeric ABA routing identifier and the bank account identifier to form a key for use with the operation request and performing the operation request using the key to obtain an output string. While rendering a result of the operation request for display, the method may further include comparing or filtering the output string to determine whether the output string correctly corresponds to the ABA routing identifier and a bank account identifier. The method may also include, following the comparing or filtering, displaying the output string. | 10-01-2015 |
20150278336 | Software Application Complexity Analysis - An apparatus of one embodiment analyzes application complexity based on complexity factors. The apparatus includes a memory and a processor. The memory stores raw values associated with a software application, each raw value associated with a respective complexity factor, which is associated with a respective scoring metric. The memory also stores scoring metrics, which indicate how preliminary scores are calculated. The memory also stores preliminary scores associated with the software application. The processor determines the raw values by determining a respective raw complexity value for each of the complexity factors. The processor also calculates the preliminary scores by calculating a respective preliminary score for each of the complexity factors. The respective preliminary score for each complexity factor is calculated by applying the respective scoring metric to the respective raw value. The processor also calculates a total score based at least on the plurality of preliminary scores. | 10-01-2015 |
20150269545 | AUTOMATED BUDGETED TRANSFER PROCESS FOR LINKED ACCOUNTS - Embodiments for linking accounts and transferring funds between linked accounts include system for receiving financial account data and identifying at least one funding account and one or more receiving accounts from the account data. The systems determine a mapping strategy for linking the at least one funding account and one or more receiving accounts and link the at least one funding account and the one or more receiving accounts according to the mapping strategy. The systems further set parameters and execute a transfer of funds between the linked accounts in accordance with the parameters. | 09-24-2015 |
20150269132 | SELF-SERVICE PORTAL FOR TRACKING APPLICATION DATA FILE DISSEMINATION - A graphical user interface for uploading an application data file may be generated by a computing platform and communicated to a computing device. The computing platform may receive the application data file from the computing device. A graphical user interface comprising a link configured to provide the computing device with access to a modified version of the application data file that comprises an element for tracking dissemination of the application data file may be generated by the computing platform and communicated to the computing device. | 09-24-2015 |
20150263908 | Scheduled Workload Assessor - Systems, methods and apparatuses for receiving data associated with various service level agreements configured to run on a system are provided. Data associated with various functions, tools, applications, and the like, configured to run on a system may be received and a portion of the data may be extracted. The extracted data may include an identifier of service level agreement, a running time of the service level agreement, and the like. The system may receive user input requesting identification of all service level agreements running in a particular time period. One or more service level agreement may then be identified meeting the parameters. In other examples, a determination may be made that a system outage has occurred. One or more service level agreements running when the outage occurred may be identified. A progress of the service level agreements may be determined to aid in recovery of the system. | 09-17-2015 |
20150262290 | MULTI-DIMENSIONAL FILTER FOR THRESHOLD DETERMINATION OF CLAIMS FILTERING - Apparatus for executing a method to determine whether or not a service request is eligible for straight through processing is provided. The apparatus may receive a service request from an online banking portal. The service request may include an adjustment value. The adjustment value may be a numerical difference between a first value of a check deposited in a customer account and a second value of a check entered into the online banking portal. The service request may also include a time of day during which the service request was requested and/or completed. The apparatus may determine if the adjustment value is less than a threshold value. If the adjustment value is less than the threshold value, the apparatus may transmit the service request to a straight through processing platform and to electronically display on the online banking portal a soft post notifying a user of a credit. | 09-17-2015 |
20150262173 | System and Method for Wire Transfers Using Cryptocurrency - A system includes a memory and a processor. The processor is coupled to the memory and causes the system to receive an electronic request for a fund transfer and initiate a debit of a first amount of a first currency from a customer account. In response to determining using cryptocurrency is optimal, the processor can transfer the first amount of the first currency into an account associated with a first cryptocurrency exchange and initiate the purchase of a first quantity of a cryptocurrency from the first cryptocurrency exchange. The processor can transfer the first quantity of the cryptocurrency to a second cryptocurrency exchange and initiate the sale of the first quantity of the cryptocurrency at the second cryptocurrency exchange. The processor is further able to initiate the transfer of at least a portion of the resulting currency to a recipient. | 09-17-2015 |
20150262149 | TIME DEPENDENT DETERMINATION OF CLAIMS PROCESSING - Apparatus for executing a method to determine whether or not a service request is eligible for straight through processing is provided. The apparatus may receive a service request from an online banking portal. The service request may include an adjustment value. The adjustment value may be a numerical difference between a first value of a check deposited in a customer account and a second value of a check entered into the online banking portal. The service request may also include a time of day during which the service request was requested and/or completed. The apparatus may determine if the adjustment value is less than a threshold value. If the adjustment value is less than the threshold value, the apparatus may transmit the service request to a straight through processing platform and to electronically display on the online banking portal a soft post notifying a user of a credit. | 09-17-2015 |
20150262148 | SYSTEMS AND METHODS FOR SERVICE REQUEST PROCESSING - Apparatus for executing a method to determine whether or not a service request is eligible for straight through processing is provided. The apparatus may receive a service request from an online banking portal. The service request may include an adjustment value. The adjustment value may be a numerical difference between a first value of a check deposited in a customer account and a second value of a check entered into the online banking portal. The service request may also include a time of day during which the service request was requested and/or completed. The apparatus may determine if the adjustment value is less than a threshold value. If the adjustment value is less than the threshold value, the apparatus may transmit the service request to a straight through processing platform and to electronically display on the online banking portal a soft post notifying a user of a credit. | 09-17-2015 |
20150262136 | CROSS BORDER IMAGE EXCHANGE - In some embodiments, one or more processors receive a financial instrument via an interface. The financial instrument indicates attributes of a financial transaction. The processors determine, based on one or more of the attributes, whether the financial transaction involves a cross border exchange. If the financial transaction involves a cross border exchange, the processors flag the financial instrument accordingly, perform a currency conversion, and communicate an electronic image associated with the financial instrument to computing resources configured to complete the financial transaction electronically without having to transport a paper copy of the financial instrument between financial institutions. | 09-17-2015 |
20150262113 | WORK STATUS MONITORING AND REPORTING - Systems, methods, and computer program products for work status monitoring and reporting are provided. Embodiments of the invention involve a memory device; and a processing device operatively coupled to the memory device, wherein the processing device is configured to connect to a work status tracking application, at a predetermined time interval to obtain a current work status for a plurality of financial institution associates, retrieve a last-in-time work status log entry for each of the one or more financial institution associates, determine that one or more financial institution associates has a change in work status, create a current work status log entry for the one or more financial institution associates determined to have the change in work status, and generate a report that indicates work status of at least one of the financial institution associates over a predetermined time period. | 09-17-2015 |
20150256678 | STANDARDIZATION OF PROCESS FOR RESOLVING INSTITUTION CALLS BASED ONTHE CUSTOMER REQUEST - Systems, apparatus, methods, and computer program products are provided for standardizing call resolution of financial institution calls. A call advisor tool is described that insures that a consistent and efficient call resolution is provided each time a customer calls occurs. The call advisor tool provides for a simplistic approach to determining call resolution, such that the financial institution representatives can easily navigate and provide inputs to the tool to render a call resolution. The straightforward approach of the call advisor tool minimizes the inputs required of the financial institution representative to complete the call resolution process, resulting in decreases in call time. | 09-10-2015 |
20150256422 | OUTAGE REPORTING - A user interface can include an outage reporting section which has the option of adding of an outage by requesting outage information from the user and receiving the outage information from the user. An existing outage can also be viewed by providing the user with a search field for selecting an existing outage. The user interface can be configured to display information regarding the selected existing outage. The outage information from the user can be stored in a centralized database for viewing at a later time. A series of questions regarding the outage can presented to the user at a user interface, and the series of questions may include at least one drop-down menu with predetermined answers. | 09-10-2015 |
20150254771 | AUTOMATED MODEL RESTRICTION VERFICATION - Apparatus and methods for automated model restriction verification are provided. Apparatus and methods may include introducing a dictionary of terms with respect to which a restriction imposed on a trade may be formulated. Illustrative restrictions may include a payoff currency of the trade must be in a G7 currency or a time to maturity of a trade must be at most 7 years. Apparatus and methods may utilize lexical items to formulate a formula expressing the restriction. Apparatus and methods may automatically parse the formula in response to receiving a trade. Apparatus and methods may include defining lexical items using technical function calls. Apparatus and methods may include formulating a restriction using a lexical item, and verifying syntactical correctness using sample values. Apparatus and methods may include automated verification of the restriction to assert adherence to restriction. | 09-10-2015 |
20150254770 | FOREIGN CROSS-ISSUED TOKEN - Embodiments disclosed herein relate to systems, methods, and computer program products for a system for providing a multi-currency token. The system, method, and computer program product are configured to receive a request for a multi-currency token, wherein the multi-currency token is associated with at least two financial institution partners; determine a value of the multi-currency token; establish currency conversion parameters for the multi-currency token based on at least one of the value of the multi-currency token and a conversion rate between currencies associated with the at least two financial institution partners; determine that a transaction is being performed with the multi-currency token, the transaction associated with a local currency; and complete the transaction with the multi-currency token in the local currency when the local currency is a currency associated with at least one of the financial institution partners. | 09-10-2015 |
20150254767 | LOAN SERVICE REQUEST DOCUMENTATION SYSTEM - The present invention includes an apparatus for documenting a loan service request. The apparatus comprises: a memory; a processor; and a module stored in memory, executable by a processor, and configured to: prompt a user for information associated with the loan service request via a first interface; receive information associated with the loan service request; process the information associated with the loan service request, wherein processing the information associated with the loan service request includes generating text that corresponds to the information associated with the loan service request; and display the text that corresponds to the information associated with the loan service request to the user via a second interface. | 09-10-2015 |
20150254764 | AUTOMATED AND STANDARDIZED DOCUMENTATION OF DETAILS ASSOCIATED WITH A FRAUD-RELATED FINANCIAL INSTITUTION CALL - Systems, apparatus, and computer program products are provided for automating and standardizing documentation of details associated with fraud-related financial institution customer calls. Automating the documentation of call details results in a highly efficient process that eliminates the need for the financial institution representatives to manually input notes during or after a call. Standardization of the documentation of details/notes, assures that the notes are accurate and are in a format that can be readily interpreted and used by subsequent financial institution representatives engaged in future calls from the customer or other activities requiring call history information. | 09-10-2015 |
20150254699 | PROVIDING OFFERS ASSOCIATED WITH PAYMENT CREDENTIALS IN DIGITAL WALLETS - Embodiments of the invention are directed to systems, methods and computer program products for providing supplemental account information in digital wallets. An exemplary apparatus is configured to: receive a request to provide a digital wallet maintained by a digital wallet provider; authenticate at least one payment credential for use within the digital wallet; receive access to an application programming interface configured to push offers to digital wallets, wherein the application programming interface is associated with at least one database maintained by the digital wallet provider; receive, via the application programming interface one or more offers from the at least one database, wherein the offers include incentives for processing payments using the at least one payment credential associated with the digital wallet; and present, to the user on a display of the mobile device, the one or more offers. | 09-10-2015 |
20150254698 | PROVIDING OFFERS ASSOCIATED WITH PAYMENT CREDENTIALS AUTHENTICATED IN A SPECIFIC DIGITAL WALLET - Embodiments of the invention are directed to systems, methods and computer program products for providing supplemental account information in digital wallets. An exemplary apparatus is configured to: receive a request to provide a digital wallet on a user's mobile device, authenticate at least one payment credential for use within the digital wallet; receive access to an application programming interface configured to push offers to digital wallets, wherein the application programming interface is associated with at least one database maintained by the digital wallet provider; receive, via the application programming interface one or more offers from the at least one database, wherein the offers include at least one incentive for processing payments using the at least one payment credential associated with the digital wallet; and present, to the user on a display of the mobile device, the one or more offers. | 09-10-2015 |
20150254665 | AUTHORIZING A TEMPORARY TOKEN FOR A USER - Systems, methods, and computer program products for authorizing a temporary token for a user are provided. Embodiments of the invention involve a memory device; and a processing device operatively coupled to the memory device, wherein the processing device is configured to execute computer-readable program code to: associate a token with a financial institution account that is associated with a user; receive one or more limits from an administrator associated with the financial institution account, wherein the one or more limits comprise at least a time period limit; apply the one or more limits to the token to limit the use of the financial institution account associated with the token to within the confines of the one or more limits; and transmit the token or token information associated with the token to the user for use in one or more transactions. | 09-10-2015 |
20150254664 | TOKEN COLLABORATION NETWORK - Embodiments of the present invention disclose utilizing a token associated with a payment device. Particularly, embodiments of the present invention may create a single token for use by a plurality of users on one or more of the payment devices of each user. The token may be made available for use by various users that can be added and removed as the group of users associated with the token changes. The token may be associated with various types of accounts, such as but not limited to a business account from a business client, a retail account from a retail client, or other like clients. In some embodiments the token may be associated with a specific account that already has funds in the account, or the token may be associated with a specific account that is unfunded or a new account that the users associated with the token may fund. | 09-10-2015 |
20150254663 | TOKEN USAGE SCALING BASED ON DETERMINED LEVEL OF EXPOSURE - The present invention includes an apparatus and method configured to: receive a request to complete a financial transaction, wherein the request includes a token that is associated with a financial account from which funds are provided to pay for the financial transaction. The system and method determines transaction information associated with the financial transaction and then determines both: a limit associated with the token and/or the financial account associated with the token; and one or more exceptions to the limit. In some embodiments, the system and method determine that the financial transaction triggers the limit and then determines whether the financial transaction qualifies for an exception to the limit based on a comparison of the transaction information to the one or more exceptions. In an embodiment, the financial transaction is authorized when the financial transaction triggers the limit but qualifies for the exception to the limit. | 09-10-2015 |
20150254658 | LIMITING TOKEN COLLABORATION NETWORK USAGE BY TOKEN - The present invention includes an apparatus, method, and computer program product for use in a token based financial transaction system, whereby the apparatus applies transaction sensitive limits to a proposed financial transaction for purposes of approving, denying, or partially funding a token based financial transaction. The present invention is configured to: determine one or more limits associated with the token, wherein the one or more limits define which financial transactions will be authorized; process a request to execute a transaction, wherein processing the request includes determining if the one or more limits associated with the user are met based on transaction information; allow the transaction in response to determining when the one or more limits are met; and deny the transaction in response to determining when the one or more limits fail to be met. | 09-10-2015 |
20150254657 | LIMITING TOKEN COLLABORATION NETWORK USAGE BY USER - The present invention includes an apparatus, method, and computer program product for use in a token based financial transaction system, whereby the apparatus applies transaction sensitive limits to a proposed financial transaction for purposes of approving, denying, or partially funding a token based financial transaction. The present invention is configured to: determine one or more limits associated with the token, wherein the one or more limits define which financial transactions will be authorized; process a request to execute a transaction, wherein processing the request includes determining if the one or more limits associated with the user are met based on transaction information; allow the transaction in response to determining when the one or more limits are met; and deny the transaction in response to determining when the one or more limits fail to be met. | 09-10-2015 |
20150254656 | ACCOUNT TOKEN ASSOCIATIONS BASED ON SPENDING THRESHOLDS - Embodiments for providing token-account associations based on spending thresholds include systems and methods for generating tokens and associating the tokens with an account. The systems set parameters for the token, where the token parameters include at least a transaction amount maximum. The systems further receive transaction data associated with the transaction and compare the transaction data with the token parameters. | 09-10-2015 |
20150254655 | ATM TOKEN CASH WITHDRAWAL - Embodiments of the invention are directed to systems, methods and computer program products for managing financial tokens associated with a financial account, whereby the systems, methods, and computer program products are directed towards generating and authenticating tokens associated with the financial account in order to grant access to a user to conduct financial transactions on the financial account using an Automated Teller Machine (ATM). The system, methods, and computer program products are configured to generate a server token, wherein the server token is associated with at least one financial account; communicate, to a first mobile device, a server packet, wherein the server packet comprises at least the server token; receive, from an ATM, a security packet communicated from a second mobile device to the ATM, wherein the security packet comprises at least a device token; authenticate the device token, the authentication comprising comparing the device token with the server token, thereby resulting in a successful authentication of the device token; and communicate the successful authentication to the ATM. | 09-10-2015 |
20150254653 | FORMATION AND FUNDING OF A SHARED TOKEN - Embodiments of the present invention disclose utilizing a token associated with a payment device. Particularly, embodiments of the present invention may create a single token for use by a plurality of users on one or more of the payment devices of each user. The token may be made available for use by various users that can be added and removed as the group of users associated with the token changes. The token may be associated with various types of accounts, such as but not limited to a business account from a business client, a retail account from a retail client, or other like clients. In some embodiments the token may be associated with a specific account that already has funds in the account, or the token may be associated with a specific account that is unfunded or a new account that the users associated with the token may fund. | 09-10-2015 |
20150254652 | FOREIGN EXCHANGE TOKEN - Embodiments disclosed herein relate to systems, methods, and computer program products for a system for providing a virtual value token. The system, method, and computer program product are configured to receive a request for a token associated with a virtual value; generate the token associated with the virtual value, wherein the virtual value is funded via a known currency; determine that a user is initiating a transaction using the token; determine a local currency for the transaction; convert, using a computing device processor, at least a portion of the virtual value into a converted amount in the local currency; and complete the transaction using the converted amount of the token. The virtual value may be based on a defined value, such as a known amount on a specific day, or a relative value, such as the current value of an underlying asset. | 09-10-2015 |
20150254650 | CONTROLLING TOKEN ISSUANCE BASED ON EXPOSURE - Embodiments described herein relate to an invention for providing a new token to a consumer for use in a pending transaction based on a determined level of exposure is provided. The systems, methods, and computer program products are configured to: (a) receive information associated with a purchase transaction involving a payment vehicle; (b) determine a potential exposure to loss based at least partially on the information associated with the purchase transaction; (c) in response to determining the potential exposure to loss, generate a token mitigating the potential exposure to loss prior to completing the purchase transaction; and (d) complete the purchase transaction based on the generated token. | 09-10-2015 |
20150254648 | MANAGED DIGITAL WALLETS - Embodiments of the present invention disclose utilizing a token associated with a payment device to enter into transactions. In some embodiments the token is associated directly with a payment device, while in other embodiments the token may be associated with a digital wallet that is associated with the payment device. Particularly, embodiments of the present invention may create a managed digital wallet for a client. A client may then designate individuals to participate in the wallet as an administrator and/or as a user. The present invention may allow a client to control the purchases of a user of the account using the token through the use of limits. Each of the users associated with the account may be assigned one or more individual tokens to use with the digital wallet to enter into transactions instead of using the actual account information of accounts associated with the digital wallet. | 09-10-2015 |
20150254647 | FLEXIBLE FUNDING ACCOUNT TOKEN ASSOCIATIONS - Embodiments for flexible funding of tokens include systems and methods for generating tokens and associating the tokens with an account. The systems allow the user to select the token for a transaction. The systems further receive transaction data associated with the transaction and compare the transaction data with token parameters. | 09-10-2015 |
20150254646 | RESTORING OR REISSUING OF A TOKEN BASED ON USER AUTHENTICATION - Embodiments described herein relate to an invention for restoring a modified token or reissuing an unfettered token for use in a financial transaction. The systems, methods, and computer program products are configured to: (a) provide to a user a notification indicating a fettered token was generated for a payment vehicle or a token associated with the payment vehicle was modified based at least partially on identifying a potential exposure to loss associated with a financial transaction involving the payment vehicle; (b) receive, from the user, authentication information, wherein the authentication information is useable to authenticate the financial transaction and/or to authenticate the user; and (c) determine whether or not to restore the token associated with the payment vehicle that was modified or to generate an unfettered token and associate the unfettered token with the payment vehicle based at least partially on the authentication information. | 09-10-2015 |
20150254645 | PROVIDING SUPPLEMENTAL ACCOUNT INFORMATION IN DIGITAL WALLETS - Embodiments of the invention are directed to systems, methods and computer program products for providing supplemental account information in digital wallets. An exemplary apparatus is configured to: receive a request to receive supplemental account information related to an account payment credential associated with a digital wallet; authenticate the user's identity based at least partially on one or more authentication credentials by verifying the user is an account holder associated with the account; in response to authenticating the user's identity, receive access to an application programming interface configured to push supplemental account information to digital wallets associated with the payment credential; receive, via the application programming interface from the at least one database, supplemental information related to the payment credential; and present, on a display of the mobile device, the supplemental information related to the payment credential. | 09-10-2015 |
20150254644 | CREDENTIAL PAYMENT OBLIGATION VISIBILITY - Embodiments are directed to payment credential management. Embodiments determine one or more payment obligations associated with a payment credential; initiate presentation of a payment credential management interface, including initiating presentation of a representation of the payment credential; and initiating presentation of the one or more payment obligations associated with the payment credential. | 09-10-2015 |
20150254643 | CUSTOMER TOKEN PREFERENCES INTERFACE - Embodiments are directed to token management. Embodiments initiate presentation of a digital wallet management interface including initiating presentation of a digital wallet; initiating presentation of an original token associated with the digital wallet; initiating presentation of a toggle switch comprising a first position and a second position and associated with the original token and configured for graphical manipulation by the user between the first position and the second position, wherein the first position corresponds to the original token being available for use as a payment credential; and where the second position corresponds to the original token being unavailable for use as a payment credential. | 09-10-2015 |
20150254642 | DIGITAL WALLET EXPOSURE REDUCTION - Embodiments are directed to reducing digital wallet exposure. Embodiments determine that a potential exposure associated with a first payment credential associated with a digital wallet has been detected; determine that the digital wallet has at least one additional associated payment credential; and, in response to determining the potential exposure has been detected and determining that the digital wallet has at least one additional associated payment credential, initiate at least one exposure reduction measure intended to reduce potential exposure to the at least one additional associated payment credential. | 09-10-2015 |
20150254641 | MOBILE DEVICE CREDENTIAL EXPOSURE REDUCTION - Embodiments are directed to reducing digital wallet exposure. Embodiments determine that a potential exposure associated with the apparatus has been detected; determine that the apparatus has at least one associated payment credential; and, in response to determining the potential exposure has been detected and determining that the apparatus has at least one associated payment credential, deactivating the at least one payment credential. | 09-10-2015 |
20150254638 | ONLINE BANKING DIGITAL WALLET MANAGEMENT - Embodiments are directed to digital wallet management. Embodiments initiate presentation of a digital wallet management interface, comprising initiating presentation of at least one digital wallet; and initiating presentation of at least one representation of at least one payment credential and at least one indication of which of the at least one digital wallets are associated with each of the at least one payment credentials. | 09-10-2015 |
20150254635 | LIMITING THE USE OF A TOKEN BASED ON A USER LOCATION - Systems, methods, and computer program products for limiting the use of a token based on a user location are provided. Embodiments of the invention involve a memory device; and a processing device operatively coupled to the memory device, wherein the processing device is configured to execute computer-readable program code to: receive a payment authorization request associated with a transaction from a merchant, wherein the payment authorization request comprises a transaction information, wherein the transaction is conducted using a token between a user and a merchant; determine a response associated with the payment authorization request based on one or more limits, wherein the one or more limits are based on at least a user location; and transmit the response associated with the payment authorization request to the merchant. | 09-10-2015 |
20150254241 | HELP DESK SEARCH ENGINE - Embodiments of the invention relate to systems, methods, and computer program products for providing a searchable shared drive. The system, method, and computer program product are configured to: (a) provide a search engine tool configured for searching a central database receiving information and documents from a plurality of data sources within a business entity; (b) receive, via the search engine tool, a search query, wherein the search engine tool comprises an interface for receiving the search query; (c) in response to receiving the search query, perform a search of the central database using key elements from the search query; and (d) provide results of the performed search to a display accessible to a user. | 09-10-2015 |
20150248280 | Build Deployment Automation for Information Technology Management - A computer-executable mechanism captures code modifications for a computer-executable process from a development environment into build packages that may be deployed onto specified target environments with trace, audit, code compliance and rollback options from one single web portal. The mechanism supports build package code changes from different sources, automated test of the resulting build packages, and phantom source control of all packaged code base to reduce the burden on developers to manually source control code. The computer-executable mechanism supports a portal web server for building and deploying build packages to render user responses to configurable actions that may be passed on to a job sequencer to execute a series of jobs. A computer-executable roll-back mechanism takes a snapshot of the target environment prior to deployment of a build package so that a complete release rollback or an incremental release rollback may occur as needed. | 09-03-2015 |
20150248129 | SAMPLE-KEYED ADAPTIVE PRODUCT DEVELOPMENT TOOL - Apparatus, methods, media and code for a product development tool. The tool may control a processor. The processor may be configured to determine that a first set of performance metrics does not satisfy a threshold analysis criterion. The performance metrics may correspond to a deployed product and a user segment. A user segment may be a set of individuals that use a product or service. The segment may be a sample of a population of users. An institution may provide the product to one or more of the customers to provide the customer with an opportunity to acquire or use additional measures of goods that the customer already has or uses. | 09-03-2015 |
20150242858 | Risk Assessment On A Transaction Level - Assessing risk associated with a transaction may comprise identifying a potential vendor for supplying a product to an entity in a transaction. A response to one or more of a first plurality of questions for measuring risk to the entity associated with engaging the potential vendor to supply the product in the transaction is determined. Responsive to determining the response to the one or more of the first plurality of questions, a dynamically-triggered question for measuring risk to the entity associated with engaging the potential vendor to supply the product in the transaction is identified. A response to the dynamically-triggered question is determined. A provision for insertion into a contract associated with the transaction is determined according to at least one of the response determined for the one or more of the first plurality of questions and the response determined for the dynamically-triggered question. | 08-27-2015 |
20150242857 | Transaction Risk Assessment Aggregation - Aggregating risk assessments associated with a vendor may comprise retrieving a transaction risk assessment for a first transaction. A transaction risk assessment for a second transaction is retrieved. A first response to a question for measuring risk to an entity is determined. The first response is associated with the first transaction and indicative of risk associated with engaging a vendor to supply a first product to the entity. A second response to the question for measuring risk to the entity is determined. The second response is associated with the second transaction and indicative of risk associated with engaging the vendor to supply a second product to the entity. The first response is aggregated with the second response to determine an aggregated response to the question according to a highest level of risk perceived by the vendor from outsourcing the first product and the second product to the vendor. | 08-27-2015 |
20150242789 | PROPENSITY MULTIPLIER FOR CUSTOMER MESSAGE AND OPPORTUNITY MANAGEMENT - Embodiments of the invention are directed to a system, method, or computer program product for providing a propensity multiplier for customer message and opportunity management, such that an associate can more effectively assist a customer. The system may provide a customer profile associated with the customer to the channel. The profile compiles customer interaction data, including real-time and batched historic customer interaction data. This data is utilized to predict communication points and opportunities for the customer that may be most relevant to the customer. In this way, the system determines a propensity for each of the communication points and/or opportunities and modifies the ranking of each based on triggers from the received customer interaction data. Thus, providing the communication points and opportunities to an associate within a customer profile, such that the associate is prepared with communication points and opportunities tailored for the customer he/she is interacting with. | 08-27-2015 |
20150242778 | Vendor Management System - Managing a vendor may comprise identifying a product to be supplied to an entity. Risk elements associated with the product may be determined by performing a product category-driven risk assessment. A transaction level risk assessment is performed for one or more vendors proposed to supply the product to the entity. At least one management action is determined for reducing risk for a risk element of the plurality of risk elements associated with supplying the product to the entity by a selected vendor from a group comprising the one or more vendors proposed to the supply the product to the entity, wherein the at least one management action is determined according to results of the product category-driven risk assessment and the transaction level risk assessment for the selected entity. A vendor level quality plan for the selected vendor is created that comprises the at least one management action. | 08-27-2015 |
20150242777 | Category-Driven Risk Identification - Determining risk associated with a product may comprise identifying a product to be supplied to an entity. A product category associated with the product that is one of a plurality of predetermined product categories is determined. A plurality of risk element associated with the product according to the product category is retrieved from a category standards database. A risk level associated with the product category for each of the plurality of risk elements is determined. An inherent risk associated with the product is calculated according to the risk level determined for each of the plurality of risk elements from the category standards database and independent of any vendor selected to supply product. | 08-27-2015 |
20150242776 | Vendor Risk And Performance Profile - Establishing a vendor profile may comprise identifying a plurality of risk elements associated with a vendor that supplies one or more products to an entity. Any completed management actions for the vendor that mitigate risk associated with any of the identified risk elements are identified. A performance requirement for the vendor associated with at least one of the products supplied by the vendor to the entity is identified. A performance measurement for the identified performance requirement for the vendor is identified. A residual risk for at least one of the identified risk elements is determined according to a completed management action that reduces risk associated with the at least one of the identified risk elements. A performance level is determined according to the performance requirement and the performance measurement. A vendor profile is created according to the identified risk elements, completed management actions, identified performance requirements, and performance measurement. | 08-27-2015 |
20150242775 | Designation Of A Vendor Manager - Determining vendor management requirements comprises identifying a plurality of risk elements associated with a vendor that supplies one or more products to an entity. Any completed management actions for the vendor that mitigate risk associated with any of the identified risk elements are identified. A residual risk is determined for at least one of the identified risk elements according to a completed management action that reduces risk associated with the at least one of the identified risk elements. A determination is made as to whether to assign a vendor manager to the vendor according to the residual risk for the at least one of the identified risk elements. | 08-27-2015 |
20150242774 | Identification Of Risk Management Actions - Determining actions associated with managing risk may comprise accessing an action mappings database that maintains information for managing a plurality of risk elements associated with supplying a product to an entity. That the action mappings database indicates that a first risk element of the plurality of risk elements should be identified in an identification phase of a vendor management process is determined. That the action mappings database indicates that the first risk element of the plurality of risk elements should be identified using a specified identification tool is determined. That the action mapping database indicates that at least one management action for reducing risk associated with the first risk element should be performed in a performance phase of the vendor management process is determined. | 08-27-2015 |
20150242773 | Distributed Vendor Management Control Function - Executing a distributed control function of an entity may comprise identifying a control function test associated with one or more requirements of a vendor management process for an entity, wherein the control function test is defined by an entity control function. The control function test is applied to an organization within the entity to test compliance of the organization with the one or more requirements of the vendor management process for the entity, wherein applying the control function test is performed at least in part by an internal control function associated with the organization. Results of applying the control function test are stored in a central repository. | 08-27-2015 |
20150237051 | SYSTEM FOR ALLOCATING A WORK REQUEST - Embodiments of the present invention are directed to a system, method, and computer program product for allocating work requests. A system is configured to initiate the presentation of a first user interface to enable a first user to receive a work request received from a source; assign a category to the work request based on at least an objective and a priority level associated with the work request; and allocate the work request to a second user based on at least the category; transmit the allocated work request to the second user; initiate the presentation of a second user interface to enable a second user to retrieve the work request, and process the work request, wherein processing the work request further comprises addressing the work request based on at least the status and the priority level; and transmit the processed work request to third user for a quality assessment. | 08-20-2015 |
20150235324 | DETECTING SUSPICIOUS ACTIVITY RELATED TO BALANCING TRANSACTIONS AT A CASH DRAWER - Systems, apparatus, methods, and computer program products are provided for automatically monitoring cash balancing transactions conducted by individuals responsible for a cash drawer to determine unique behaviors/patterns of such individuals that are abnormal to the overall population of cash drawer users. Such proactive monitoring of cash balancing transactions provides for suspicious activity to be identified at the onset of such activity. As such, the identified suspicious activity can be further investigated to determine the cause of the activity. Thus, by identifying the suspicious activity at an earlier stage, financial losses to the financial institution can be reduced and reputational risk can be minimized. | 08-20-2015 |
20150235221 | PROOF-OF-VERIFICATION NETWORK FOR THIRD PARTY ISSUERS - Apparatus and methods for allocating transaction liability are provided. A first transaction participant may be immunized from undesirable effects of fraud/chargebacks associated with a transaction if information responsive to a level of verification is submitted directly to a second transaction participant. The transaction may be an on-us transaction or may be associated with any issuer. The second transaction participant may include a payment guarantee provider. The information may be routed to the second transaction participant via a proof-of-verification network. Transactions that are associated with a level of verification may be subject to variable interchange rates. The interchange rates or level of immunization from fraud/chargeback may vary with respect to the level of verification performed by the first transaction participant. | 08-20-2015 |
20150235220 | LOCATION BASED RISK MITIGATING TRANSACTION AUTHORIZATION - Apparatus and methods for risk mitigating transaction authorization are provided. A transaction participant may responds to a request for transaction authorization with “PIN Entry Required,” and restrict signature based transaction authorizations. The risk mitigating transaction authorization may be transmitted for a transaction based on a stock-keeping-unit of an item included in a purchase. The risk mitigating transaction authorization may be transmitted for a transaction based on an amount of the transaction. The risk mitigating transaction authorization may be transmitted for a transaction based on a merchant category code identifier assigned to a merchant and/or a location of a purchase. | 08-20-2015 |
20150235219 | ITEM/VALUE BASED RISK MITIGATING TRANSACTION AUTHORIZATION - Apparatus and methods for risk mitigating transaction authorization are provided. A transaction participant may responds to a request for transaction authorization with “PIN Entry Required,” and restrict signature based transaction authorizations. The risk mitigating transaction authorization may be transmitted for a transaction based on a stock-keeping-unit of an item included in a purchase. The risk mitigating transaction authorization may be transmitted for a transaction based on an amount of the transaction. The risk mitigating transaction authorization may be transmitted for a transaction based on a merchant category code identifier assigned to a merchant and/or a location of a purchase. | 08-20-2015 |
20150235218 | INFORMATIONAL BASED TRANSACTION LIABILITY ALLOCATION - Apparatus and methods for allocating transaction liability are provided. Transaction liability may include a risk that the transaction may incur a post-authorization charge, such as a fraud investigation and/or a chargeback. The transaction liability may be allocated among one or more transaction participants. Transaction liability may be allocated based on a stock-keeping-unit of an item purchased by customer that initiates the transaction. Transaction liability may be allocated based on an amount of the transaction. Transaction liability may be allocated based on a merchant category code identifier assigned to a merchant. Transaction liability may be allocated based on a location of a merchant. A default allocation of transaction liability may be re-allocated among transaction participants based on level of verification performed by a transaction participant at a point-of-sale. | 08-20-2015 |
20150235214 | User Authentication and Authorization - Systems, methods and apparatuses for authenticating a user and/or authorizing use of a reusable payment device associated with the user. In some examples, user identifying information, such as a checking account number, driver's license number, username, or the like, may be received. Based on this received information, a reusable payment device number associated with a reusable payment device of the user may be determined. This information may then be encrypted. Further, additional authenticating information may be received. For instance, a user personal identification number (PIN) may be received. The PIN may also be encrypted. The encrypted PIN and encrypted reusable payment device number may be analyzed to determine whether they are associated with the same reusable payment device. If so, a user may be authenticated. | 08-20-2015 |
20150235208 | PROOF-OF-VERIFICATION NETWORK - Apparatus and methods for allocating transaction liability are provided. A first transaction participant may be may be immunized from undesirable effects of fraud/chargebacks associated with a transaction if information responsive to a level of verification is submitted directly to a second transaction participant. The transaction may be an on-us transaction or may be associated with any issuer. The second transaction participant may include a payment guarantee provider. The information may be routed to the second transaction participant via a proof-of-verification network. Transactions that are associated with a level of verification may be subject to variable interchange rates. The interchange rates or level of immunization from fraud/chargeback may vary with respect to the level of verification performed by the first transaction participant. | 08-20-2015 |
20150235207 | RISK MITIGATING TRANSACTION AUTHORIZATION - Apparatus and methods for risk mitigating transaction authorization are provided. A transaction participant may responds to a request for transaction authorization with “PIN Entry Required,” and restrict signature based transaction authorizations. The risk mitigating transaction authorization may be transmitted for a transaction based on a stock-keeping-unit of an item included in a purchase. The risk mitigating transaction authorization may be transmitted for a transaction based on an amount of the transaction. The risk mitigating transaction authorization may be transmitted for a transaction based on a merchant category code identifier assigned to a merchant and/or a location of a purchase. | 08-20-2015 |
20150235206 | ITEM/VALUE BASED TRANSACTION LIABILITY ALLOCATION - Apparatus and methods for allocating transaction liability are provided. Transaction liability may include a risk that the transaction may incur a post-authorization charge, such as a fraud investigation and/or a chargeback. The transaction liability may be allocated among one or more transaction participants. Transaction liability may be allocated based on a stock-keeping-unit of an item purchased by customer that initiates the transaction. Transaction liability may be allocated based on an amount of the transaction. Transaction liability may be allocated based on a merchant category code identifier assigned to a merchant. Transaction liability may be allocated based on a location of a merchant. A default allocation of transaction liability may be re-allocated among transaction participants based on level of verification performed by a transaction participant at a point-of-sale. | 08-20-2015 |
20150235162 | SYSTEM FOR GENERATING A TRACKING REPORT - Embodiments of the invention are directed to a system, method, and computer program product for generating reports. The system typically including a memory, a processor and a module configured to receive a work request from a source, wherein the work request comprises at least one status; determine a duration of time that the work request has been associated with the status; generate a report, wherein the report comprises a graphical representation of each of the at least one status and the duration of time the work request has been associated with the at least one status; and transmit the report to the user. | 08-20-2015 |
20150235158 | SYSTEM FOR HANDLING WORK REQUESTS - Embodiments of the invention are directed to a system, method, and computer program product for handling work requests. The system typically including a memory, a processor and a module configured to initiate the presentation of a first interface to enable an allocator to assign the work request to an associate to complete the work request based on at least a priority level, wherein the work request comprises at least a priority level; initiate the presentation of a second interface to enable the associate to complete the work request and transmit the completed work request to an analyst for review; initiate the presentation of a third interface to enable the analyst to review the completed work request and transmit the reviewed and completed work request to the associate; and initiate the presentation of a fourth interface to enable the administrator to generate a report. | 08-20-2015 |
20150229701 | SENDING FILES WITH MULTIPLE JOB SESSIONS - A file transfer system and method for transferring large files to a destination quickly may include dividing up a large file into a plurality of components and transmitting the components simultaneously to the destination. A file can be separated into a plurality of segments and transmitted from a first module to a second module through a network simultaneously using multiple jobs corresponding to the segments. Once the second module receives the segments, the second module can implement a supply command to recreate the original saved file from the segments received from the first module. The simultaneous transmission of the segments may assist in transferring of the file at a faster rate. | 08-13-2015 |
20150229650 | USER AUTHENTICATION BY GEO-LOCATION AND PROXIMITY TO USER'S CLOSE NETWORK - Embodiments provide user authentication based on proximity to a close network of a user. Embodiments receive from a user a request to execute a user action associated with an application, wherein execution of the user action requires validation of one or more authentication credentials; collect a set of data comprising information related to a physical location of the user; determine a close network score associated with the user; determine a level of authentication associated with the close network score; determine which one or more authentication types are associated with the level of authentication associated with the close network score; request one or more authentication credentials corresponding to the determined one or more authentication types; receive credentials from the user; validate the credentials, thereby resulting in a successful validation of the credentials; and, in response to the successful validation of the credentials, execute the user action. | 08-13-2015 |
20150229631 | Caller Validation - A computer system supports a validation system that enables a business client to validate a business associate who has called the client using a pass phrase. The computer system manages one or more pass phrases that have been previously configured by the business client. The client can then challenge a caller (the purported business associate) with the phrase or keyword to make sure the caller is actually the authorized business associate before providing any sensitive information. Management of phrases and/or keywords may include a computer-executable process where in the client may set up phrases (for example, a challenge question and a corresponding answer) or keyword through an on-line application, telephone, e-mail or any other suitable communication mechanism. The business client may have an option to change, delete or create phrases and/or keywords at any time through appropriate security measures. | 08-13-2015 |
20150229625 | AUTHENTICATION LEVEL OF FUNCTION BUCKET BASED ON CIRCUMSTANCES - Embodiments are directed to systems, methods and computer program products for assigning a level of authentication to an authentication bucket. Embodiments determine a current level of authentication corresponding to a first authentication bucket comprising a plurality of mobile banking functions; collect a set of circumstantial data corresponding with the apparatus; determine a circumstances score based at least in part on the set of circumstantial data; and determine whether the current level of authentication corresponding to the first authentication bucket is appropriate based at least in part on the circumstances score. | 08-13-2015 |
20150229624 | USER AUTHENTICATION BASED ON HISTORICAL USER BEHAVIOR - Embodiments are directed to systems, methods and computer program products for providing user authentication based on historical user patterns. Embodiments receive from a user, a request to execute a user action associated with an application, wherein execution of the user action requires validation of authentication credentials; collect a set of data comprising information related to usage patterns associated with the apparatus of the user; determine a user pattern score associated with the user; determine a level of authentication; determine which authentication types are associated with the level of authentication; request authentication credentials corresponding to the authentication types; receive authentication credentials from the user; validate the authentication credentials, thereby resulting in a successful validation of the authentication credentials; and, in response to the successful validation, execute the user action. | 08-13-2015 |
20150229623 | USER AUTHENTICATION BASED ON HISTORICAL TRANSACTION DATA - Embodiments are directed to systems, methods and computer program products for providing user authentication based on transaction data. Embodiments receive from a user, a request to execute a user action associated with an application, wherein execution of the user action requires validation of authentication credentials; collect a transaction set of data comprising information related to transactions conducted by the user; collect a location set of data comprising information related to a physical location of the user; determine a transaction proximity score associated with the user and the transactions; determine a level of authentication associated with the determined transaction proximity score; determine which authentication types are associated with the level of authentication; request authentication credentials; receive authentication credentials from the user; validate the authentication credentials, thereby resulting in a successful validation of the authentication credentials; and, in response to the successful validation of the authentication credentials, execute the user action. | 08-13-2015 |
20150229622 | SHUTTING DOWN ACCESS TO ALL USER ACCOUNTS - Disclosed is a system and associated method or restricting access to a user's account via one or more account access channels. The system typically includes a processor, a memory, and an access restriction module stored in the memory. The module is typically configured for: integrating one or more account access channels associated with the user's account with an access restriction procedure; receiving a request from the user to implement the access restriction procedure; based on receiving the request from the user to implement the access restriction procedure, implementing the access restriction procedure, wherein implementing the access restriction procedure comprises restricting access to the user's account via the account access channel(s). | 08-13-2015 |
20150227927 | REVOCATION OF APPLICATION ACCESS BASED ON NON-CO-LOCATED - Embodiments of the invention relate to an invention for accessing a remotely located mobile device of a user based on certain events is provided. The system, method, and computer program product are configured to: (a) monitor one or more transaction involving a transaction vehicle of a user; (b) determine a physical location of a transaction vehicle based at least partially on the one or more transactions; (c) determine a geographic location of a mobile device of the user, wherein the mobile device is associated with the transaction vehicle; (d) determine whether or not the transaction vehicle of the user and the mobile device of the user are co-located; and (e) reconfigure one or more applications accessible to the mobile device or one or more functional features of the mobile device based at least partially on determining that the mobile device and the transaction vehicle of the user are not co-located. | 08-13-2015 |
20150227926 | DETERMINING USER AUTHENTICATION REQUIREMENTS BASED ON THE CURRENT LOCATION OF THE USER IN COMPARISON TO A USER'S TRAVEL ROUTE - Systems, apparatus, methods, and computer program products are provided for determining a user's authentication requirements/credentials for a specific mobile network access session based on the current location of the user in comparison to a known typical travel route of the user. In this regard, if the user is located within the boundaries of the travel route during the time period when the user is typically travelling on the route, less, or in some instances no, authentication requirements are needed. Moreover, as the user deviates from the travel route in terms of distance and/or time the greater the authentication requirements/credentials may be required. Once the deviation is considered to significant in terms of distance and/or time full authentication requirements may be required. | 08-13-2015 |
20150227924 | DETERMINING AUTHENTICATION REQUIREMENTS ALONG A CONTINUUM BASED ON A CURRENT STATE OF THE USER AND/OR THE SERVICE REQUIRING AUTHENTICATION - Systems, apparatus, methods, and computer program products are provided for determining a user's authentication requirements/credentials for a specific service access request based on determining a location along a an authentication continuum. The location along the authentication continuum defines the degree of authentication/credentials required to access the service and is determined based on a current state of the user and/or service attributes. The more or less that is known about the current state of the user, in comparison to historical data about the user, the more or less likely the user is, in fact, the user that is attempting to access the service and, thus, the authentication requirements required to access the service can be adjusted according (increased or decreased). | 08-13-2015 |
20150227903 | REMOTE REVOCATION OF APPLICATION ACCESS BASED ON LOST OR MISAPPROPRIATED CARD - Embodiments of the invention relate to systems, methods, and computer program products for accessing a remotely located mobile device of a user based on certain events is provided. The system, method, and computer program product are configured to: (a) receive an indication that a transaction vehicle of the user is compromised; (b) identify a mobile device of the user that is associated with the transaction vehicle of the user that is compromised; (c) upon identifying the mobile device of the user, remotely access the mobile device of the user; and (d) reconfigure one or more applications accessible to the mobile device or one or more functional features of the mobile device based at least partially on receiving the indication. | 08-13-2015 |
20150227902 | SPECIALIST PRESENTATION - Embodiments of the invention provide a specialist presentation tool that presents a specialist from an institution to a user in a website or application the user is viewing, an application running in the background of a user system, or through a communication channel. The specialist may be presented to the user based on triggers that occur when the user takes actions, or when actions are taken with respect to a user account. The determination of the one or more specialists to present to a user from a group of specialists that satisfy a trigger may be based on one or more conditions that match the specialist with the user. The conditions may include but are not limited to locations of the user and specialists, profile information of the user and specialists, social networking contacts for the user and specialists, or other like account profile information for the user and specialists. | 08-13-2015 |
20150227901 | SPECIALIST PRESENTATION THROUGH AN ONLINE BANKING ACCOUNT - Embodiments of the invention provide a specialist presentation tool that presents a specialist from an institution to a user in an online banking account. The specialist may be presented to the user based on triggers that occur when the user takes actions, or when actions are taken with respect to a user account. The determination of the one or more specialists to present to a user from a group of specialists that satisfy a trigger may be based on one or more conditions that match the specialist with the user. The conditions may include but are not limited to locations of the user and specialists, profile information of the user and specialists, social networking contacts or information for the user and specialists, or other like account profile information for the user and specialists. | 08-13-2015 |
20150227879 | SPECIALIST PRESENTATION USING A SOCIAL NETWORKING ACCOUNT - Embodiments of the invention provide a specialist presentation tool that presents a specialist from an institution to a user. The specialist may be presented to the user based on triggers that occur when the user takes actions, or when actions are taken with respect to a user account. The determination of the one or more specialists to present to a user from a group of specialists that satisfy a trigger may be based on one or more conditions that match the specialists with the user. At least one condition used to match the specialist with the user is the social networking contacts of the user that have a relationship with the specialists. Additional conditions may include, but are not limited to, locations of the user and specialists, social networking profile information of the user and specialists, or other like account profile information for the user and specialists. | 08-13-2015 |
20150227869 | RISK SELF-ASSESSMENT TOOL - A method for using a risk self-assessment tool may include soliciting risk information from a business unit about a process subject to a risk, communicating the risk information to a risk assessment system, and/or performing a risk self-assessment process by selecting one or more parameters for inclusion on one or more user interface templates. The risk assessment system may determine a risk score associated with the process based on the risk information received from the business unit, and communicate the risk score to a user for approval. After approval, the risk self-assessment tool may communicate information about an approved risk management project to a second user, the risk management project including at least one control designed to mitigate a risk identified by the risk assessment system. The method may include creating, via the user interface device, a risk self-assessment questionnaire for soliciting information about a business process subject to risk. | 08-13-2015 |
20150227868 | RISK SELF-ASSESSMENT PROCESS CONFIGURATION USING A RISK SELF-ASSESSMENT TOOL - A method for using a risk self-assessment tool may include soliciting risk information from a business unit about a process subject to a risk, communicating the risk information to a risk assessment system, and/or performing a risk self-assessment process by selecting one or more parameters for inclusion on one or more user interface templates. The risk assessment system may determine a risk score associated with the process based on the risk information received from the business unit, and communicate the risk score to a user for approval. After approval, the risk self-assessment tool may communicate information about an approved risk management project to a second user, the risk management project including at least one control designed to mitigate a risk identified by the risk assessment system. The method may include creating, via the user interface device, a risk self-assessment questionnaire for soliciting information about a business process subject to risk. | 08-13-2015 |
20150227787 | PHOTOGRAPH BILLPAY TAGGING - Tools for photograph billpay tagging of a digital image are provided. The digital image may correspond to a portion of text positioned upon a medium. The text may correspond to billpay information. The tool may define a graphical reference frame for the digital image. The tool may identify a set of glyphs within the text. The tool may translate a portion of the digital image into an estimated group of characters. The translated portion of the digital image may correspond to at least a part of the set of glyphs. The tool may tag the portion of the digital image with a tag. The tag may be coupled with a billpay input field. The billpay input field may be populated. The billpay input field may be populated with the group of estimated characters. The bill input field may be populated based on the coupling. | 08-13-2015 |
20150227731 | USER AUTHENTICATION BASED ON OTHER APPLICATIONS - The present invention includes a system for authenticating a second action based on a first action, wherein the system is configured to: receive a first request to execute a first action associated with a first application; determine that execution of the first action requires user authentication; request one or more authentication credentials from the user; receive a first authentication credential associated with the first action; validate the first authentication credential, thereby resulting in a successful validation of the received first authentication credential; in response to the successful validation, execute the first action; receive a second request to execute a second action associated with a second application; determine that execution of the second action requires user authentication; use the successful validation of the first authentication credential to validate a second authentication credential so that the second action may be executed. | 08-13-2015 |
20150227730 | USER AUTHENTICATION BASED ON SELF-SELECTED PREFERENCES - Embodiments of the invention are directed to a system, method, and a computer program product for a user authentication based on self-selected preferences. The system typically including a memory, a processor, and a module configured to receive a request to execute a user action from a user associated with an application, wherein the user action requires validation of one or more authentication credentials; access a user-selected preference indicating a level of authentication associated with a user-selected preference as desired by the user; determine authentication types from a plurality of authentication types associated with the level of authentication and the user-selected preference; request one or more authentication credentials corresponding to the determined one or more authentication types; receive one or more authentication credentials from the user; validate the one or more authentication credentials and in response to the successful validation of the one or more authentication credentials, execute the user action. | 08-13-2015 |
20150227729 | SELF-SELECTED USER ACCESS BASED ON SPECIFIC AUTHENTICATION TYPES - Embodiments of the invention are directed to a system, method, and a computer program product self-selected user access based on specific authentication types. The system typically including a memory, a processor, and a module configured to receive from a user, a user-selected preference, wherein the user-selected preference comprises one or more authentication types desired by the user; determine a level of authentication from a plurality of levels of authentication are associated with the one or more authentication types associated with the user-selected preference; initiate the presentation of a user interface that enables the user to select one or more application functions, wherein the one or more application functions are associated with the determined level of authentication; receive from a user, a selection of one or more application functions. | 08-13-2015 |
20150227728 | DETERMINING USER AUTHENTICATION REQUIREMENTS BASED ON THE CURRENT LOCATION OF THE USER BEING WITHIN A PREDETERMINED AREA REQUIRING ALTERED AUTHENTICATION REQUIREMENTS - Systems, apparatus, methods, and computer program products are provided for determining a user's authentication requirements/credentials for a specific network access session based on the current location of the user in comparison to predetermined boundaries of location that have altered authentication requirements, in the form of, increased or decreased authentication requirements/credentials that differ from the standard authentication requirements. | 08-13-2015 |
20150227727 | DETERMINING USER AUTHENTICATION REQUIREMENTS BASED ON THE CURRENT LOCATION OF THE USER IN COMPARISON TO THE USERS'S NORMAL BOUNDARY OF LOCATION - Systems, apparatus, methods, and computer program products are provided for determining a user's authentication requirements/credentials for a specific network access session based on the current location of the user in comparison to known boundaries of location associated with the user, such as the user's residence, place of business or the like. As such, the present invention serves to expedite the process for authenticating a user who desires to gain access to a network service, such as a banking application or the like. | 08-13-2015 |
20150227726 | USER AUTHENTICATION BASED ON FOB/INDICIA SCAN - Embodiments of the invention are directed to systems, methods and computer program products for receiving a request from a user for access to at least one function associated with a first application; determining that access to at least one function requires user authentication; initiating sensing of an authentication validating carrier comprising a first credential; determining the first credential based at least in part on the sensed authentication validating carrier; validating the first credential, thereby resulting in a first successful user authentication; and granting access to at least one function associated with the first application based on the validation of the first successful user authentication. | 08-13-2015 |
20150227725 | PROVIDING AUTHENTICATION USING PREVIOUSLY-VALIDATED AUTHENTICATION CREDENTIALS - Embodiments of the invention are directed to systems, methods and computer program products for providing authentication using previously-validated authentication credentials. An exemplary apparatus is configured to receive a request to access a framework application, request, from a user, one or more authentication credentials corresponding to a primary level of user authentication, receive and validate the one or more authentication credentials, create, using the framework application, an authentication token based at least partially on the validation of the primary level of user authentication, wherein the authentication token is accessible by a plurality of applications, receive a request, from the user, to access one or more non-framework applications; and authenticate the one or more non-framework applications, where authenticating the non-framework applications requires accessing the authentication token created by the framework application such that the authentication is at least partially based on the primary level of user authentication. | 08-13-2015 |
20150227724 | SORTING MOBILE BANKING FUNCTIONS INTO AUTHENTICATION BUCKETS - Embodiments are directed to systems, methods and computer program products for sorting mobile banking functions into authentication buckets. Embodiments determine, for each of a plurality of mobile banking functions, a corresponding authentication buckets, where each authentication bucket corresponds with a level of authentication. Some embodiments receive a request, from a user, to access a function; access the plurality of authentication buckets to determine which of the authentication buckets corresponds with the requested function; determine the level of authentication associated with the determined authentication bucket; determine which authentication types are associated with the level of authentication; request authentication credentials corresponding to the authentication types; receive authentication credentials from the user; validate the authentication credentials, thereby resulting in a successful validation of the authentication credentials; and, in response to the successful validation of the authentication credentials, enable access to the function requested by the user. | 08-13-2015 |
20150227302 | DEPLOYING MULTI-CHANNEL OR DEVICE AGNOSTIC APPLICATIONS - Various user interface components and features can be tested and simulated with the unified framework module, and the full application user experience can be tested, experienced and evaluated. This can assist the design process of an application in providing the ability to test and explore different user interface components. During this process the user components can be simulated to provide the user experience so it can be determined whether the user components are organized properly and the prototype can be validated before the full blown application is launched. Also user interface features can be further modified or added based on the user feedback. The unified framework module can be configured to package a program in a form that is suitable for any targeted device and/or channel to make deployment across various devices and channels more efficient and cost effective. | 08-13-2015 |
20150221044 | SYSTEMS AND METHODS FOR DETERMINING A FINANCIAL HEALTH INDICATOR - Systems, methods, and computer program products are provided for a financial health indicator. The financial health indicator provides a dynamic indication of a user's financial health in terms of their current credit and their current ability to save in relation to a budget. The systems, methods, and computer program products also provide for user-configured spending guardrails in a budget tracking system. The use of spending guardrails is instrumental in insuring that the user of the budget tracking system adheres to their assigned budget. By providing for dynamically configurable spending thresholds the user may define, change, suspend, or the like spending guardrails as dictated by current circumstances. The configurable nature of the guardrails insures that guardrails are tailored to the needs of the individual user. | 08-06-2015 |
20150221035 | RETIREMENT SAVINGS PLAN MYTHBUSTER - A microsite for busting retirement savings plan myths, particularly for small businesses, is disclosed. A user may access the disclosed microsite via an Internet website. The microsite, hosted at an enhanced computing server, may display common small business retirement savings plan myths. Upon request, the microsite may provide facts busting each of the common myths. The microsite may also display a series of questions to aid the user in selecting an appropriate retirement savings plan type. Using permutation rules stored at the enhanced computing server, the microsite is able to analyze the user's answers to the series of questions and provide feedback in the form of a suggested retirement savings plan type. Thus, the microsite is able to quickly and efficiently educate the user and bust previously held myths about retirement savings plans for small business owners that may be standing in the way of their establishing one to save for their retirement. | 08-06-2015 |
20150215310 | SYSTEM AND METHOD FOR CROSS-CHANNEL AUTHENTICATION - A system may include a memory and processor. The memory may store a user account identifier associated with a user account. The processor may be able to receive at least one user credential and authenticate the user account based at least in part on the at least one user credential. The processor may also receive a first request, from a device associated with the user account, to generate a one-time password and generate the one-time password in response to receiving the first request. The processor may associate the one-time password to the user account and communicate the one-time password to the device associated with the user account. The processor is further able to receive a second request, from a transaction device, the second request comprising an attempted one-time password, determine whether the attempted one-time password is valid and communicate, to the transaction device, an indication that the attempted one-time password is valid in response to determining that the attempted one-time password is valid. | 07-30-2015 |
20150215178 | SERVER INVENTORY TRENDS - Methods for monitoring and reporting server inventory trends are disclosed. An authorized user may access a website and input a specified time period and platform to view pertinent server inventory trends. A managing computing server receives the request for server inventory trends and may run one or more procedures to retrieve relevant information from at least one database. The relevant information may be transferred from the database to a fusion chart to be plotted for display. The managing computing server may display a report of server inventory information, such as the number of active servers, added servers, and retired servers for the platform over the specified time period. | 07-30-2015 |
20150213455 | CLIENT REQUEST WORKFLOW ASSIGNMENT USING AN ASSIGMENT TOOL - Embodiments of the present invention provide clients with single contact points for communication channels in order to submit client requests for accounts in various regions. Depending on the type of client and the type of client request, the client requests are routed to the appropriate representatives for resolving the client requests without passing off the clients to multiple representatives that handle different types of client requests. The representatives may include dedicated service representatives, a group of dedicated service representatives, general service representatives, a general international team of representatives working the business hours of the client, and individual regional teams of representatives. The representatives may utilize a case management tool to open cases for client requests and track the cases throughout the resolution process. Additionally, representatives may utilize an assignment tool as a source of information to determine how to route the client requests within the institution for resolution. | 07-30-2015 |
20150213394 | CLIENT REQUEST FULFILLMENT USING A CASE MANAGEMENT TOOL - Embodiments of the present invention provide clients with single contact points for communication channels in order to submit client requests for accounts in various regions. Depending on the type of client and the type of client request, the client requests are routed to the appropriate representatives for resolving the client requests without passing off the clients to multiple representatives that handle different types of client requests. The representatives may include dedicated service representatives, a group of dedicated service representatives, general service representatives, a general international team of representatives working the business hours of the client, and individual regional teams of representatives. The representatives may utilize a case management tool to open cases for client requests and track the cases throughout the resolution process. Additionally, representatives may utilize an assignment tool as a source of information to determine how to route the client requests within the institution for resolution. | 07-30-2015 |
20150213390 | Competitive Pricing Framework - A framework for determining best in class pricing achievement for negotiated deals and underlying products and services is disclosed. An enterprise, such as a financial institution, may develop a list of industry standard pricing metrics for use when benchmarking or comparing similar products and services. The enterprise and competitive analysis firms may apply the scoring metrics to analyze negotiated deals and establish benchmarks of the deals to reach best in class. The deals may be reached using both internal and external analyses, and a deal score and executive summary template may be delivered to the enterprise at request. | 07-30-2015 |
20150212927 | Application Testing Automation - According to one embodiment of the present invention, a test for an application is created. An application is identified with functionality applied through a graphical user interface. A determination is made of expected characteristics of an application object that will be included in a version of the application once the version of the application becomes available for testing through the graphical user interface. A virtual object is created according to the expected characteristics of the application object. A step associated with the virtual object is incorporated into a test case to be used on the version of the application. The test case that includes the virtual object is executed on the version of the application when the version of the application becomes available for testing through the graphical user interface. | 07-30-2015 |
20150206218 | Augmented Reality Based Mobile App for Home Buyers - According to some embodiments, an apparatus comprises a camera, one or more processors, and a display. The camera is pointed at a real estate property. The one or more processors determine information associated with the real estate property. Determining the information comprises, determining a camera position based on a longitude, a latitude, and an orientation of the camera, applying a correction factor to the camera position to yield an approximate longitude and an approximate latitude of the real estate property, determining an address of the real estate property based on the approximate longitude and the approximate latitude, and retrieving the information associated with the real estate property based on the address. The display displays at least a portion of the information associated with the real estate property. | 07-23-2015 |
20150206149 | MULTI-LAYER TRANSACTION TRACKING AND ENCRYPTION - Embodiments for tracking multi-layer secured transactions include systems for providing a dedicated secure transaction channel to a user and sending pre-authorization code to the user via the transaction channel. The systems allow the user to encrypt transaction data and receive the encrypted transaction data from the user via the transaction channel. The systems further unlock the encrypted data and match the sent pre-authorization code to the received pre-authorization code. The systems send a post verification notification to the user comprising the one or more transactions via the transaction channel and receive a post verification confirmation from user in response to the post verification notification. | 07-23-2015 |
20150206144 | MULTI-LAYER TRANSACTION TRACKING - Embodiments for tracking multi-layer secured transactions include systems for receiving request for pre-authorization from a user and sending pre-authorization code to the user in response to the request. The systems for receive transaction data from the user that includes the pre-authorization code and match the received pre-authorization code and the sent pre-authorization code. The systems further send a post-verification code to the user and receive post-verification confirmation from the user. | 07-23-2015 |
20150206141 | MULTI-LAYER TRANSACTION TRACKING - Embodiments for tracking multi-layer secured transactions include systems for providing a first transaction channel to a user and sending pre-authorization code to the user via the first transaction channel. The systems terminate the first transaction channel and provide a second transaction channel to the user and receive transaction data from the user comprising the pre-authorization code via the second transaction channel. The systems further identify one or more verifiers associated with the user for one or more transactions based on the transaction data, send a post verification notification to the one or more verifiers, and receive a post verification confirmation from at least one of the one or more verifiers in response to the post verification notification. | 07-23-2015 |
20150206082 | IDENTIFYING EMPLOYEE CAPACITY ISSUES - Methods, systems, computer-readable media, and apparatuses for identifying employee capacity issues for performing document review are presented. In some embodiments, a computing device may categorize delegations of authority for a plurality of employees. Subsequently, the computing device may group a volume of documents into a plurality of groups by their monetary value. The computing device may then calculate the required employee capacity and the actual employee capacity available to assess each group of documents. Subsequently, the computing device may compare the actual employee capacity with the required employee capacity for each group of documents and determine, based on the comparison, whether a difference exists between the actual employee capacity and the required employee capacity. In response to determining that a difference exists, the computing device may provide one or more resolution. | 07-23-2015 |
20150199767 | System for Consolidating Customer Transaction Data - According to one embodiment, a system receives a plurality of system records corresponding to one of a plurality of financial transactions. The system determines a subset of system records comprising a posting record, a channel record, and an instrument record that correspond to a selected transaction of the plurality of financial transactions. The posting record comprises one or more posting attributes indicating a change in an account balance that a first source associates with the selected transaction. The channel record comprises one or more channel attributes indicating how a customer interfaced with a financial institution that a second source associates with the selected transaction. The instrument record comprises one or more instrument attributes indicating an exchange medium. The posting record, channel record, and instrument record are consolidated and linked to yield a transaction record. The system stores the transaction record in a transaction database. The system communicates the transaction record. | 07-16-2015 |
20150199756 | LINKING LOGIC FEATURE - Embodiments for linking account data are included in systems for receiving account data and non-account data and filtering the account data by customer or account information. The embodiments further include identifying a customer and customer accounts based on the filtered account data and linking at least a portion of the non-account data to the customer, and combining the non-account data portion and the filtered account data, and identifying one or more guarantors of the customer accounts based on the combined data. | 07-16-2015 |
20150199688 | System and Method for Analyzing an Alert - According to one embodiment, a method comprises receiving an alert indicating one or more financial transactions associated with potentially suspicious activity. The method performs a validation of the alert, the validation comprising: determining that the alert comprises sufficient detail; determining whether the alert corresponds to an overlapping alert; and determining that the potentially suspicious activity corresponds to a potential risk. In response to a determination that the alert corresponds to an overlapping alert, the method consolidates the alert and the overlapping alert. The alert is associated with a customer profile. Alert data and customer information associated with the customer profile are enriched to yield an enriched alert. An event is created and communicated if the enriched alert satisfies an event-worthiness test. | 07-16-2015 |
20150199660 | COMMUNICATION NETWORK FOR COLLECTING DATA AND EXECUTING ELECTRONIC TRANSACTION SERVICES - A system for executing electronic fund transfers includes a memory comprising a database, the database configured to store electronic fund transfer data, a first interface communicatively coupled to the memory and configured to receive electronic fund transfer customer data associated with a customer and requested electronic fund transfer data describing a requested electronic fund transfer requested by the customer, and one or more processors communicatively coupled to the first interface and configured to determine, based on the received customer data, stored electronic fund transfer data associated with the received customer data and populate fields of the first interface with the stored electronic fund transfer data associated with the received customer data. | 07-16-2015 |
20150199657 | REAL-TIME TRANSACTIONS FOR A VIRTUAL ACCOUNT - According to some embodiments, a system comprises one or more processors associated with a financial institution. The financial institution provides a financial account for a user. The system also comprises a dedicated interface between the financial institution and an electronic payment service external to the financial institution. The electronic payment service provides a virtual account for the user. The one or more processors are configured to determine when the user requests a financial transaction to transfer funds from a source to a destination (one of which corresponds to the virtual account), validate the financial transaction based on data received from the electronic payment service over the dedicated interface, and transfer the funds to the destination. The funds are transferred prior to hard-posting such that the funds become available at the destination in real-time while the financial transaction is pending. | 07-16-2015 |
20150199645 | Customer Profile View of Consolidated Customer Attributes - According to one embodiment, a system receives a request to generate a customer profile comprising a plurality of customer attributes for a customer. The system determines a first record comprising a plurality of first record attributes associated with the customer by correlating at least one first record attribute to a customer identifier indicated by the request. A new customer profile is created in response to the request if no matched customer profile is found. The system communicates one or more of the consolidated customer attributes in response to the request. | 07-16-2015 |
20150199629 | CHANGE CONVERGENCE RISK MAPPING - Disclosed is a change convergence risk mapping system. The change convergence risk mapping system typically includes a processor, a memory, and a risk aggregation module stored in the memory. The change convergence risk mapping system is typically configured for: determining an event risk score for each of a plurality of events; aggregating the event risk scores of the plurality of events and determining a first aggregated risk score associated with a first time period; determining if the first aggregated risk score exceeds a first predefined aggregated risk score threshold or if a first predefined number of events associated with the first time period have an event risk score exceeding a first predefined event risk score threshold; determining a risk level for the first time period; and graphically presenting a first indicator to a user computing system of the risk level associated with the first time period. | 07-16-2015 |
20150199626 | Incident Recordation and Repair - Systems, methods, and apparatus integrating applications with a common purpose of information technology incident resolution are provided. An indication of an information technology incident is received and may include an incident record associated with the incident. Information may be extracted from the incident record. Various components may be executed to determine a cause of the incident and assist the interacting user with diagnosis and response to the incident. A description of the cause may be identified and a determination may be made as to whether the identified description or keyword statement is available for selection from a list of predefined selections in the incident record. An interacting user can choose to build a keyword statement using the selection lists within the software and then apply the keyword statement to the restoral description of the incident record. Any new descriptions created may be added to the list of predefined descriptions. | 07-16-2015 |
20150199511 | CHANGE CONVERGENCE RISK PLANNING AND AVOIDANCE - Disclosed is a change convergence risk mitigation system. The change convergence risk mitigation system typically includes a processor, a memory, and a risk mitigation module stored in the memory. The change convergence risk mitigation system is typically configured for: receiving information associated with a plurality of events; determining an event risk score for each of the plurality of events; aggregating the event risk scores of the plurality of events and, based on the event risk scores, determining a risk level for each of the plurality of time periods; identifying a risk mitigation event; determining a risk mitigation time period from the plurality of time periods such that the risk mitigation time period would not have a predefined level if the risk mitigation event occurred during the risk mitigation time period; and providing a recommendation that the risk mitigation event occur during the risk mitigation time period. | 07-16-2015 |
20150199191 | INFRASTRUCTURE SOFTWARE PATCH REPORTING AND ANALYTICS - A computer system for determining whether or not a tool for deploying a software patch should be invoked is provided. The system may include a receiver that receives information regarding patch deployment over a first pre-determined amount of time. The system may include a processor configured to determine, based on the historical information, a patch deployment index. The patch deployment index may characterize patch deployment as a number of patches deployed per unit time. The receiver may receive historical information regarding patch deployment over a second amount of time. The processor may use the historical information regarding patch deployment of the second pre-determined amount of time to determine a second patch deployment index. The processor may compare the first deployment to the second patch deployment index. When the difference between the second index and the first index is greater than a pre-determined threshold, the processor may invoke the tool. | 07-16-2015 |
20150195180 | WORKFILE MONITOR - Methods and apparatus for monitoring workfiles are disclosed. An authorized user or system programmer may input workfile threshold values and other monitoring information into a configuration file. A server reads the configuration file and starts traces to monitor workfile usage in a system. The server may continuously monitor the system to determine whether workfile usage in the system reaches workfile threshold values set in the configuration file. The server may list SQL queries using workfiles and then alert the system programmer when the threshold values are reached and is capable of reclaiming disk space by dropping and recreating overgrown workfiles with their original definitions. | 07-09-2015 |
20150195157 | Data Metrics Analytics - Aspects of the present disclosure provide systems and methods directed toward identifying causes of attenuated performance at computing systems. Performance data corresponding to performance metrics may be stored at a data store. Performance metrics may be associated with application servers. Alerts may be received from a performance monitoring agent triggered by performance attenuations at the application servers. A timeframe in which a performance attenuation occurred may be selected and the performance data may be searched in order to identify another performance attenuation that occurred at one of the application servers during or before the selected timeframe. Performance data may be evaluated to identify one of the application servers associated with the additional performance attenuation as a potential source of the performance attenuation that triggered the alert. Information corresponding to the potential source of the performance attenuation that triggered the alert may be presented to a user at a display device. | 07-09-2015 |
20150193865 | Improper Financial Activity Detection Tool - An illustrative method for identifying information associated with a ring of individuals performing improper financial activities may include combining a list of user identifiers with one or more attributes tables corresponding to the financial transactions. A computer device may analyze a first list of identifiers in relation to an attribute table, where the identifiers may be associated with one or more suspected improper financial activities and the attribute table may include attributes of one or more financial transactions performed over a specified duration. The computer device may then link the first list of identifiers with one or more attributes included in the attribute table to determine a second list of identifiers and the process may be repeated until a stopping condition has been reached. After the stopping condition has been met, the computer device may communicate a report to a user. | 07-09-2015 |
20150193840 | CUSTOMER CONTEXT ANALYSIS AGENT COMMUNICATION AID - Embodiments of the invention are directed to a system, method, or computer program product for providing an agent communication aid based on customer context analysis, such that the agent or communication channel can more effectively assist a customer. As such, the system may provide a customer context profile associated with the customer to the channel. The profile compiles event data associated with the customer from online, inquiry, transactional, status, or external sources. Subsequently, this data is processed through rules and logic to provide real-time data associated with prior customer communications via the customer context profile. Furthermore, the system may predict one or more reasons for future customer communications and provided options for the customer's communications. Thus, providing the agent or communication channel with a customer context profile with a holistic view of the customer prior to a future customer communication. | 07-09-2015 |
20150193783 | Assessing Client Impact - Methods and systems for assessing client impact are presented. In particular, some aspects of the disclosure provide ways of assessing the effects of various projects and deployments on different clients of an organization. In some embodiments, a computer system may gather project data associated with one or more projects. Subsequently, the computer system may identify one or more client impacts based on the gathered project data. The computer system then may publish an inventory based on the one or more identified client impacts. In some instances, in publishing the inventory, the computer system may analyze a volume of change activity for at least one client, and may determine, based on this analysis, that at least one deployment event of at least one project should be delayed for the at least one client. | 07-09-2015 |
20150193781 | Knowledge Based Verification of the Identity of a User - According to certain embodiments of the disclosure, a system receives a request from a user device to conduct an activity with an enterprise and determines an authentication level associated with the activity. The system receives information associated with the user from a plurality of disparate channels and calculates a risk score associated with the user based on the received information associated with the user. The system generates a token based on the authentication level and risk score and communicates the token to the user device. | 07-09-2015 |
20150193721 | TRACKING PROCESSING OF EXCEPTIONS TO STRAIGHT-THROUGH PROCESSING PROCEDURES - A record corresponding to a commercial financial transaction that involves an exception to a straight-through processing procedure of a financial institution may be identified. A graphical user interface for the commercial financial transaction may be generated. The graphical user interface may comprise data from a plurality of fields of the record and one or more graphical user interface elements for controlling a timer configured to track an amount of time expended by an associate of the financial institution to process the commercial financial transaction that involves the exception to the straight-through processing procedure of the financial institution. An associate of the financial institution to process the commercial financial transaction may be identified, and the graphical user interface for the commercial financial transaction may be communicated to a computing device associated with the associate of the financial institution. | 07-09-2015 |
20150193720 | ASSESSING TECHNOLOGY ISSUES - Methods, systems, computer-readable media, and apparatuses for assessing the criticality of a technology issue or incident are presented. In some embodiments, a computing device may receive customer experience data regarding a technology incident and one or more pieces of additional information including a flame chart regarding similar technology incidents. Subsequently, the computing device may assess the customer experience data based on the flame chart. The computing device may then generate an impact assessment of the technology incident based on the assessment of the customer experience data, and identify one or more triage options, based on the impact assessment, in response to the technology incident. Subsequently, the computing device may notify one or more subject matter experts to implement the one or more triage options. In response to determining that a difference exists, the computing device may provide a notification that the technology issue has been resolved. | 07-09-2015 |