US 11,722,480 B2
Systems and methods for tiered authentication including position-based credentials
Paul Y. Moreton, Glen Allen, VA (US); Ryan Fox, Lebanon, OH (US); and Matthew Thompson, Alexandria, VA (US)
Assigned to Capital One Services, LLC, McLean, VA (US)
Filed by Capital One Services, LLC, McLean, VA (US)
Filed on May 19, 2022, as Appl. No. 17/748,233.
Application 17/748,233 is a continuation of application No. 16/945,544, filed on Jul. 31, 2020, granted, now 11,374,923.
Application 16/945,544 is a continuation of application No. 16/423,411, filed on May 28, 2019, granted, now 10,812,472, issued on Oct. 20, 2020.
Application 16/423,411 is a continuation of application No. 15/872,060, filed on Jan. 16, 2018, granted, now 10,349,275, issued on Jul. 9, 2019.
Application 15/872,060 is a continuation of application No. 15/806,905, filed on Nov. 8, 2017, granted, now 10,075,847, issued on Sep. 11, 2018.
Prior Publication US 2022/0278976 A1, Sep. 1, 2022
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 21/00 (2013.01); H04L 9/40 (2022.01); H04W 12/08 (2021.01); H04W 4/02 (2018.01); H04W 12/065 (2021.01)
CPC H04L 63/083 (2013.01) [H04L 63/0853 (2013.01); H04L 63/0861 (2013.01); H04L 63/107 (2013.01); H04W 4/023 (2013.01); H04W 12/065 (2021.01); H04W 12/08 (2013.01); H04L 2463/082 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A system for facilitating authentication based on a dynamic distance threshold, comprising:
a computer system comprising one or more physical processors programmed with computer program instructions that, when executed, cause operations comprising:
receiving an authentication request from a first user device associated with a user;
obtaining first location information of the first user device and second location information of a second user device;
determining a distance between the first user device and the second user device based on the first and second location information;
adjusting a distance threshold based on (i) whether the first and second location information are obtained over a same wireless network, (ii) whether the first or second location information is obtained over a public wireless network, or (iii) whether an IP address from which the first or second location information is obtained matches a stored IP address;
subsequent to the adjustment, comparing the distance to the distance threshold; and
authenticating the user based on a result of the comparison.