Reallocation of resources system
First Claim
1. A system for reallocation of resources, the system comprising:
- a memory device with computer-readable program code stored thereon;
a communication device;
a processing device operatively coupled to the memory device and the communication device, wherein the processing device is configured to execute the computer-readable program code to;
determine resources available to a user including real-time resource balances, budgets, and goals for the resources;
generate a contextual visual representation of a goal product or service for the resources;
store the generated contextual visual representation on a mobile device associated with a user, wherein the contextual visual representation is coded for display based on a triggering event;
identify, on the mobile device associated with the user, one or more applications associated with resources, wherein the identified one or more applications are third party applications and allow the user to transfer resources;
generate a double verification requirement, wherein the double verification requirement is an authentication for transferring resources via the one or more application;
apply the double verification requirement within the one or more applications by inputting code that requires the user to verify using the double verification prior to allowing the application to transfer resources, wherein the double verification requirement is independent of any log in requirements of the one or more applications;
identify the triggering event; and
present the generated contextual visual representation on a display associated with the mobile device via an alert based on the identification of the triggering event and locking the functionality of the mobile device for a predetermined time period with the generated contextual visual representation on the display associated with the mobile device.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the invention are directed to a system, method, or computer program product for providing a reallocation of resources contextual visual element and double verification requirement for resource distribution. In this way, the system identifies goals associated with a user and generated contextual visual elements associated with those goals. Based on a triggering event, the system displays the customized contextual visual element on a display of the user'"'"'s device locking the functionality of the user device for a period of time the contextual visual element is displayed. Furthermore, the system may integrate and code a double verification requirement into resource distribution applications, requiring secondary authentication and additional verification for resource distribution.
37 Citations
18 Claims
-
1. A system for reallocation of resources, the system comprising:
-
a memory device with computer-readable program code stored thereon; a communication device; a processing device operatively coupled to the memory device and the communication device, wherein the processing device is configured to execute the computer-readable program code to; determine resources available to a user including real-time resource balances, budgets, and goals for the resources; generate a contextual visual representation of a goal product or service for the resources; store the generated contextual visual representation on a mobile device associated with a user, wherein the contextual visual representation is coded for display based on a triggering event; identify, on the mobile device associated with the user, one or more applications associated with resources, wherein the identified one or more applications are third party applications and allow the user to transfer resources; generate a double verification requirement, wherein the double verification requirement is an authentication for transferring resources via the one or more application; apply the double verification requirement within the one or more applications by inputting code that requires the user to verify using the double verification prior to allowing the application to transfer resources, wherein the double verification requirement is independent of any log in requirements of the one or more applications; identify the triggering event; and present the generated contextual visual representation on a display associated with the mobile device via an alert based on the identification of the triggering event and locking the functionality of the mobile device for a predetermined time period with the generated contextual visual representation on the display associated with the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product for reallocation of resources, the computer program product comprising at least one non-transitory computer-readable medium having computer-readable program code portions embodied therein, the computer-readable program code portions comprising:
-
an executable portion configured for determining resources available to a user including real-time resource balances, budgets, and goals for the resources; an executable portion configured for generating a contextual visual representation of a goal product or service for the resources; an executable portion configured for storing the generated contextual visual representation on a mobile device associated with a user, wherein the contextual visual representation is coded for display based on a triggering event; an executable portion configured for identifying, on the mobile device associated with the user, one or more applications associated with resources, wherein the identified one or more applications are third party applications and allow the user to transfer resources; an executable portion configured for generating a double verification requirement, wherein the double verification requirement is an authentication for transferring resources via the one or more application; an executable portion configured for applying the double verification requirement within the one or more applications by inputting code that requires the user to verify using the double verification prior to allowing the application to transfer resources, wherein the double verification requirement is independent of any log in requirements of the one or more applications; an executable portion configured for identifying the triggering event; and an executable portion configured for presenting the generated contextual visual representation on a display associated with the mobile device via an alert based on the identification of the triggering event and locking the functionality of the mobile device for a predetermined time period with the generated contextual visual representation on the display associated with the mobile device. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A computer-implemented method for reallocation of resources, the method comprising:
providing a computing system comprising a computer processing device and a non-transitory computer readable medium, where the computer readable medium comprises configured computer program instruction code, such that when said instruction code is operated by said computer processing device, said computer processing device performs the following operations; determining resources available to a user including real-time resource balances, budgets, and goals for the resources; generating a contextual visual representation of a goal product or service for the resources; storing the generated contextual visual representation on a mobile device associated with a user, wherein the contextual visual representation is coded for display based on a triggering event; identifying, on the mobile device associated with the user, one or more applications associated with resources, wherein the identified one or more applications are third party applications and allow the user to transfer resources; generating a double verification requirement, wherein the double verification requirement is an authentication for transferring resources via the one or more application; applying the double verification requirement within the one or more applications by inputting code that requires the user to verify using the double verification prior to allowing the application to transfer resources, wherein the double verification requirement is independent of any log in requirements of the one or more applications; identifying the triggering event; and presenting the generated contextual visual representation on a display associated with the mobile device via an alert based on the identification of the triggering event and locking the functionality of the mobile device for a predetermined time period with the generated contextual visual representation on the display associated with the mobile device. - View Dependent Claims (15, 16, 17, 18)
Specification