Systems for detecting biometric response to attempts at coercion

ABSTRACT

A system includes one or more memory devices storing instructions, and one or more processors configured to execute the instructions to perform steps of a method providing biometric detection of coercion of a user. The system may detect a trigger event associated with a potential transfer of funds and may receive user biometric data. The system may determine, based on stored user biometric data and the detected user biometric data, a confidence level that the stored user biometric data is indicative of biological information representative of a user being in a stressed state. The system may initiate one or more precautionary safety measures.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of, and claims priority under 35U.S.C. § 120 to, U.S. patent application Ser. No. 16/860,095, filed Apr.28, 2020, which is a continuation of U.S. patent application Ser. No.16/199,502, now U.S. Pat. No. 10,664,842, filed Nov. 26, 2018, theentire contents of which are fully incorporated herein by reference.

FIELD OF INVENTION

The present disclosure relates generally to biometric sensor-baseddetection of a stressed state of a user, and more particularly providingsystems and methods for determining that a user is being coerced totransfer funds.

BACKGROUND

Mobile applications for banking, cryptocurrencies, and othertechnologies have become increasingly popular. Such technologiesgenerally provide digital interfaces through which funds can be quicklyand easily transferred between parties. Certain technologies, such assome cryptocurrency exchanges, may provide an environment in which fundscan be easily transferred but cannot be easily tracked or refunded. Insome such environments, it may be impossible to track or refund atransaction. Thus, some environments may permit a recipient oftransferred funds to enjoy complete anonymity.

The availability of anonymity when receiving funds may provide certainpersons a means by which those persons can coerce others intotransferring funds. For example, a bad actor may forcibly coerce aperson into transferring funds to a financial account accessible by thecontemptible person, such as by forcing a person to transfer funds via abanking application installed on a mobile device. As another example, abad actor may nonviolently coerce a person into transferring funds toanother financial account, such as by blackmail. While the aboveexamples include illegal acts of coercion, not all acts of coercion areso limited.

Accordingly, there is a need for improved devices, systems, and methodsthat can detect a trigger event and determine whether biometric dataassociated with a user is indicative of the user being in a stressedstate. Such indication of a stressed state may suggest that the user isbeing coerced and may provide an opportunity to take precautionarysafety measures, which may prevent or correct completion of a coercedtransfer of funds and/or facilitate physical security of the user.

SUMMARY

Disclosed embodiments provide systems and methods for determining that acustomer is being coerced to transfer funds.

Consistent with the disclosed embodiments, the system may include one ormore memory devices storing instructions and one or more processorsconfigured to execute the instructions to perform steps of determiningan indication that a customer is being coerced to transfer funds. Thesystem may execute the instructions to receive, from one or moresensors, biometric sensor data, the biometric sensor data beingbiological information representative of a user being in a stressedstate and store the biometric sensor data via memory associated with theone or more processors. The system may detect, by the one or moreprocessors, a trigger event that is associated with a potential transferof funds, and responsive to detecting the trigger event, the system mayreceive, from the one or more sensors, situational data that includesbiological information associated with the user. The system candetermine, by the one or more processors, that the received situationaldata is above a predetermined level of similarity to the first biometricsensor data, and the system can initiate one or more precautionarysafety measures.

Consistent with the disclosed embodiments, methods for detecting that auser is being coerced to transfer funds are also disclosed.

Further features of the disclosed design, and the advantages offeredthereby, are explained in greater detail hereinafter with reference tospecific embodiments illustrated in the accompanying drawings, whereinlike elements are indicated be like reference designators.

BRIEF DESCRIPTION OF THE DRAWINGS

Reference will now be made to the accompanying drawings, which are notnecessarily drawn to scale, and which are incorporated into andconstitute a portion of this disclosure, illustrate variousimplementations and aspects of the disclosed technology and, togetherwith the description, serve to explain the principles of the disclosedtechnology. In the drawings:

FIG. 1 is a diagram of an example coercion detection system, inaccordance with some embodiments;

FIG. 2 is a component diagram of an example wearable user device, inaccordance with some embodiments;

FIG. 3 is a component diagram of an example user computing device, inaccordance with some embodiments;

FIG. 4 is a component diagram of an example biometrics authenticationdevice, in accordance with some embodiments;

FIG. 5 is a flowchart showing operation of an example coercion detectionsystem, in accordance with some embodiments;

FIG. 6 is a flowchart showing operation of an example coercion detectionsystem, in accordance with some embodiments; and

FIG. 7 is a flowchart showing operation of an example coercion detectionsystem, in accordance with some embodiments.

DETAILED DESCRIPTION

Throughout this disclosure, certain example embodiments are described inrelation to systems and methods for determining that a customer is beingcoerced to transfer funds. embodiments of the disclosed technology arenot so limited. In some embodiments, the disclosed technology may beeffective in determining that a user is being coerced to perform any ofa number of actions, such as transmitting a message, approving certainactions, or signing a contract. Those having skill in the art willrecognize that the disclosed technology can be applicable to multiplescenarios and applications.

Some implementations of the disclosed technology will be described morefully with reference to the accompanying drawings. This disclosedtechnology may, however, be embodied in many different forms and shouldnot be construed as limited to the implementations set forth herein. Thecomponents described hereinafter as making up various elements of thedisclosed technology are intended to be illustrative and notrestrictive. Many suitable components that would perform the same orsimilar functions as components described herein are intended to beembraced within the scope of the disclosed electronic devices andmethods. Such other components not described herein may include, but arenot limited to, for example, components developed after development ofthe disclosed technology.

It is also to be understood that the mention of one or more method stepsdoes not preclude the presence of additional method steps or interveningmethod steps between those steps expressly identified. Similarly, it isalso to be understood that the mention of one or more components in adevice or system does not preclude the presence of additional componentsor intervening components between those components expressly identified.

The disclosed embodiments are directed to systems and methods fordetermining that a user is being coerced to transfer funds. In someembodiments, the system may include one or more memory devices storinginstructions and one or more processors configured to execute theinstructions to perform steps of a method. Specifically, in someembodiments, the system may execute the instructions to receive, fromone or more sensors, biometric sensor data. The biometric sensor datamay include biological information representative of a user being in astressed state. They system may store the biometric sensor data viamemory associated with the one or more processors. The system maydetermine, by the one or more processors, that the received situationaldata is above a predetermined level of similarity to the first biometricsensor data, and the system may initiate one or more precautionarysafety measures. In some embodiments, the system may initiate the one ormore precautionary safety measures responsive to determining that thereceived situational data is above the predetermined level of similarityto the first biometric sensor data.

In some embodiments, a system for determining that a user is beingcoerced to transfer funds may include a non-transitory computer-readablemedium storing instructions that, when executed by one or moreprocessors, cause a system to perform steps of a method. Specifically,in some embodiments, the one or more processors may execute theinstructions to receive first biometric sensor data from one or moresensors and may store the first biometric sensor data via memoryassociated with the one or more processors. The first biometric sensordata may be biological information representative of a user being in astressed state. The one or more processors may also detect a triggerevent; in some embodiments, the one or more processors may detect thetrigger event by the one or more processors. The trigger event may beassociated with a potential transfer of funds. Responsive to detectingthe trigger event, the one or more processors may receive situationaldata from the one or more sensors. The situational data may includebiological information associated with the user. The one or moreprocessors may determine that the received situational data is above apredetermined level of similarity to the first biometric sensor data,and the system may initiate one or more precautionary safety measures.

In some embodiments, a method for determining that a user is beingcoerced to transfer funds is disclosed. The method may include detectinga trigger event. The trigger event may be associated with a potentialtransfer of funds. The method may include, responsive to detecting thetrigger event, requesting user biometric data. The user biometric datamay be indicative of biological information associated with the user.The method may include receiving the user biometric data anddetermining, based on a determination that the user biometric data iswithin a predetermined confidence threshold of similarity to stored userbiometric data, that the stored user biometric data is indicative ofbiological information representative of the user being in a stressedstate. The method may include receiving a request to transfer funds. Themethod may include transmitting, to a financial service provider, anotification that the requested transfer of funds was potentiallycoerced. The financial service provider may be associated with arecipient account associated with the rested transfer of funds. Themethod may include, subsequent to transmitting the notification,receiving a verification that the requested transfer of funds is acoerced transfer of funds. The method may include transmitting, to thefinancial service provider, a request to stop, cancel, and/or refund toa financial account associated with the user, the transfer of funds.

Although the above embodiments are described with respect to a system, anon-transitory computer-readable medium, and a method, it iscontemplated that embodiments with identical or substantially similarfeatures may alternatively be implemented as methods, systems, and/ornon-transitory computer-readable media.

Reference will now be made in detail to exemplary embodiments of thedisclosed technology, examples of which are illustrated in theaccompanying drawings and disclosed herein. Wherever convenient, thesame references numbers will be used throughout the drawings to refer tothe same or like parts.

FIG. 1 is a diagram of an example system 100 that may be configured toperform one or more processes that may determine whether a user is beingcoerced to transfer funds. The components and arrangements shown in FIG.1 are not intended to limit the disclosed embodiments as the componentsused to implement the disclosed processes and features may vary. Asshown, system 100 may include a wearable user device 102 and/or a usercomputing device 104, either of which may be connected to anorganization 108 via a network 106. Organization 108 may include, forexample, a web server 110, a transaction server 112, biometricsauthentication device 114, a biometrics database 116, and a localnetwork 118. In some embodiments, system 100 may include a third-partyserver 120, which may be connected to network 106.

According to some embodiments, organization 108 may be associated withan entity such as a business, corporation, individual, partnership, orany entity that may provide financial services or processing offinancial transactions such as a bank, a credit card company, or thelike. According to some embodiments, organization 108 may be associatedwith an entity that provides goods and services. According to someembodiments, third-party server 120 may be associated with an entitysuch as a business, corporation, individual, partnership, or any entitythat may provide financial services or processing of financialtransactions such as a bank, a credit card company, or the like. In someembodiments, merchant 107 and organization 108 may be associated withthe same or related entities. Accordingly, although organization 108 andthird-party server 120 are shown as being separate in FIG. 1, it shouldbe understood that in some embodiments, some or all of the elements oforganization 108 and third-party server 120 may be combined togetherinto a single organization and/or into one or more components.

In some embodiments, a customer may operate wearable user device 102.User device 102 can include one or more of a wearable device such as asmart ring, a smart watch, a smart bracelet, smart glasses, smartclothing (e.g., a jacket or shirt having at least some of theelectronics and/or operability discussed herein), or the like. Incertain embodiments, the customer may operate a user computing device104. User computing device may include one or more of a mobile device,smart phone, general purpose computer, tablet computer, laptop computer,telephone, a public switched telephone network (PSTN) landline, smartwearable device, voice command device, other mobile computing device, orany other device capable of communicating with network 106 and/or withone or more components of organization 108. According to someembodiments, some or all of the components and/or functionalities ofuser device 102 may be included in user computing device 104, and insome embodiments, some or all of the components and/or functionalitiesof computing device 104 may be included in user device 102. In certainembodiments, user device 102 and user computing device 104 may refer tothe same device. User device 102 may belong to or be provided by thecustomer, or may be borrowed, rented, or shared. Users 101 may includeindividuals such as, for example, subscribers, clients, prospectiveclients, or customers of an entity associated with organization 108and/or a third party, such as a third party associated with third-partyserver 120. According to some embodiments and as described more fullybelow, user device 102 and/or user computing device 104 may include oneor more of: an environmental sensor for obtaining audio or visual data(e.g., a microphone and/or digital camera), one or more biometricsensors for obtaining biometric data from a user (e.g., heartrate data,blood pressure data, hormonal data, body temperature data, retinal data,iris data, voice data, respiratory data, brainwave data, olfactory data,sweat data), a geographic location sensor for determining the locationof the device, an input/output device such as a transceiver for sendingand receiving data (e.g., via Wi-Fi, cellular communications, near-filedcommunications, Bluetooth™, and the like), a display for displayingdigital images, one or more processors, and a memory in communicationwith the one or more processors.

An example embodiment of wearable user device 102 is shown in moredetail in FIG. 2. Wearable user device 102 may have a similar structureand components that are similar to those described with respect to usercomputing device 104. As shown, wearable user device 102 may include aprocessor 210; an input/output (I/O) device 220; a memory 230, which maycontain an operating system (OS) 232, a storage device 234, which may beany suitable repository of data and may include a gesture databaseincluding data corresponding to one or more predetermined spatialgestures, and a program 236; a communication interface 240; and abiometrics sensor 250. In some embodiments, communication interface 240may include a transceiver. In some embodiments, payor computing device110 may further include a peripheral interface, a mobile networkinterface in communication with processor 210, a bus configured tofacilitate communication between the various components of wearable userdevice 102, and/or a power source configured to power one or morecomponents of wearable user device 102. In certain embodiments, wearableuser device 102 may include a geographic location sensor (GLS) fordetermining the geographic location of wearable user device 102. Incertain embodiments, wearable user device 102 may include a userinterface (U/I) device 260 for receiving user input data, such as datarepresentative of a click, a scroll, a tap, a press, a spatial gesture(e.g., as detected by one or more accelerometers and/or gyroscopes), ortyping on an input device that can detect tactile inputs. In someembodiments, biometric sensor 250 may be one or more biometric sensorsthat are configured to detect and/or measure one or types of biologicalinformation. For example, biometric sensor 250 may be configured tomeasure one or more of a user's heartrate, blood pressure, hormonelevels, body temperature, ocular characteristics (e.g., size, shape,color, and/or other characteristics associated with a user's retina,iris, and/or pupil), voice, respiratory rate (e.g., breathing rate),brainwaves, odor (i.e., olfactory data), and sweat (e.g., amountproduced, rate of production, molecular composition). Those having skillin the art will understand that the disclosed technology contemplatesany and all sensors configured to measure biological information,including those not yet created, and is not restricted to those types ofbiological information expressly recited herein. In some embodiments,wearable user device 102 may include a microphone and/or an imagecapture device, such as a digital camera. In certain embodiments,wearable user device 104 may include one or more sensors configured tomeasure environmental data, such as ambient temperature (e.g., by athermometer or thermocouple), ambient humidity (e.g., by a hygrometer),local wind speed (e.g., by an anemometer, manometer, or pressuretransducer), or any other environmental data that may be useful for themethods and techniques disclosed herein.

In some embodiments, wearable user device 102 may include a peripheralinterface, which may include the hardware, firmware, and/or softwarethat enables communication with various peripheral devices, such asmedia drives (e.g., magnetic disk, solid state, or optical disk drives),other processing devices, or any other input source used in connectionwith the instant techniques. In some embodiments, a peripheral interfacemay include a serial port, a parallel port, a general-purpose input andoutput (GPIO) port, a game port, a universal serial bus (USB), amicro-USB port, a high definition multimedia (HDMI) port, a video port,an audio port, a Bluetooth™ port, a near-field communication (NFC) port,another like communication interface, or any combination thereof.

In some embodiments, a transceiver may be configured to communicate withcompatible devices and ID tags when they are within a predeterminedrange. A transceiver may be compatible with one or more of:radio-frequency identification (RFID), near-field communication (NFC),Bluetooth™, Bluetooth™ low-energy (BLE) (e.g., BLE mesh and/or thread),Wi-Fi™, ZigBee™, ambient backscatter communications (ABC) protocols orsimilar technologies.

A mobile network interface may provide access to a cellular network, theInternet, or another wide-area network. In some embodiments, a mobilenetwork interface may include hardware, firmware, and/or software thatallows processor(s) 210 to communicate with other devices via wired orwireless networks, whether local or wide area, private or public. Apower source may be configured to provide an appropriate alternatingcurrent (AC) or direct current (DC) to power components.

As described above, wearable user device 102 may be configured toremotely communicate with one or more other devices, such as usercomputing device 104, organization 108, and/or third-party server 120.In some embodiments, wearable user device 102 may be configured tocommunication with one or more devices via network 106. According tosome embodiments, wearable user device 102 may be configured to detectand transmit biometric data indicative of biological informationassociated with a user.

Processor 210 may include one or more of an application specificintegrated circuit (ASIC), programmable logic device, microprocessor,microcontroller, digital signal processor, co-processor or the like orcombinations thereof capable of executing stored instructions andoperating upon stored data. Memory 230 may include, in someimplementations, one or more suitable types of memory (e.g., volatile ornon-volatile memory, random access memory (RAM), read only memory (ROM),programmable read-only memory (PROM), erasable programmable read-onlymemory (EPROM), electrically erasable programmable read-only memory(EEPROM), magnetic disks, optical disks, floppy disks, hard disks,removable cartridges, flash memory, a redundant array of independentdisks (RAID), and the like) for storing files including operating system232, application programs 236 (including, for example, a web browserapplication, a widget or gadget engine, and or other applications, asnecessary), executable instructions and data. In some embodiments,processor 210 may include a secure microcontroller, which may beconfigured to transmit and/or facilitate payment transactions and/orcryptography. In some embodiments, processor 210 may comprise a singlesecure microcontroller configured to transmit and/or facilitate payment,encrypt and/or decrypt data, and/or process any other programinstructions. In some embodiments, processor 210 may include one or moresecure microcontrollers and/or other processing devices such that one ormore secure microcontroller is configured to transmit and/or facilitatepayment and/or encrypt and/or decrypt data, while one or more otherprocessing device is configured to process any other programinstructions. In some embodiments, some or all of the processingtechniques described herein can be implemented as a combination ofexecutable instructions and data within memory 230.

Processor 210 may be one or more known processing devices, such as amicroprocessor from the Pentium™ family manufactured by Intel™, theTurion™ family manufactured by AMD™, or the Cortex™ family or SecurCore™manufactured by ARM™. Processor 210 may constitute a single-core ormultiple-core processor that executes parallel processes simultaneously.For example, processor 210 may be a single core processor that isconfigured with virtual processing technologies. In certain embodiments,processor 210 may use logical processors to simultaneously execute andcontrol multiple processes. Processor 210 may implement virtual machinetechnologies, or other similar known technologies to provide the abilityto execute, control, run, manipulate, store, etc. multiple softwareprocesses, applications, programs, etc. One of ordinary skill in the artwould understand that other types of processor arrangements could beimplemented that provide for the capabilities disclosed herein.

Wearable user device 102 may include one or more storage devices 234configured to store information used by processor 210 (or othercomponents) to perform certain functions related to the disclosedembodiments. As an example, wearable user device 102 may include memory230 that includes instructions to enable processor 210 to execute one ormore applications, network communication processes, and any other typeof application or software known to be available on computer systems.Alternatively, the instructions, application programs, etc. may bestored in an external storage or available from a memory over a network.The one or more storage devices may be a volatile or non-volatile,magnetic, semiconductor, tape, optical, removable, non-removable, orother type of storage device or tangible computer-readable medium.

In some embodiments, wearable user device 102 may include memory 230that includes instructions that, when executed by processor 210, performone or more processes consistent with the functionalities disclosedherein. Methods, systems, and articles of manufacture consistent withdisclosed embodiments are not limited to separate programs or computersconfigured to perform dedicated tasks. For example, wearable user device102 may include memory 230 that may include one or more programs 236 toperform one or more functions of the disclosed embodiments. Moreover,processor 210 may execute one or more programs 236 located remotelyfrom, for example and not limitation, web server 110, transaction server112, or biometrics authentication device 114. For example, wearable userdevice 102 may access one or more remote programs 236, that, whenexecuted, perform functions related to one or more disclosedembodiments. In some embodiments, one or more programs 236 may beconfigured to detect and/or measure biological information associatedwith a user, which may include, but is not limited to, a user'sheartrate, blood pressure, hormone levels, body temperature, retina,iris, pupil, voice, respiratory rate (e.g., breathing rate), brainwaves,odor, and/or sweat. In some embodiments, the program(s) 236 may beconfigured to determine that the obtained biological informationassociated with the user is representative of the user being in a calmstate or that the obtained biological information is representative ofthe user being in a stressed stated.

According to some embodiments, program(s) 236 may be configured todetect and/or obtain baseline biometric information associated with auser. In some embodiments, the baseline biometric data may include datarepresentative of the user being in a calm state. In some embodiments,the baseline biometric data may include data representative of the userbeing in a stressed state. In some embodiments, the baseline biometricdata may include a combination of data representative of the user beingin a calm state (e.g., baseline calm biometric data) and datarepresentative of the user being in a stressed state (e.g., baselinestressed biometric data). In some embodiments, the baseline calmbiometric data and the baseline stressed biometric data may include thesame types of biometric data (e.g., both include blood pressure data),and in some embodiments, the baseline calm biometric data and thebaseline stressed biometric data may include different types ofbiometric data (e.g., the baseline calm biometric data includes bloodpressure data but not heartrate data and the baseline stressed biometricdata includes heartrate data but not blood pressure data). In certainembodiments, program(s) 236 may be configured to provide a request(e.g., audibly or via a display associated with wearable user device102) for a user to provide baseline biometric data. In some embodiments,program(s) 236 may be configured to receive an indication from the userto begin recording biometric data that can be used as baseline biometricdata. In some embodiments, program(s) 236 may request a certain type ofbaseline biometric data (e.g., calm or stressed), and in someembodiments, program(s) 236 may be configured to receive an indicationfrom the user as to whether the biometric data being recorded isrepresentative of the user being in a calm state or in a stressed state.According to some embodiments, program(s) 236 may be configured torecord biometric data that can be used as baseline biometric data for apredetermined amount of time. For example, program(s) 236 may beconfigured to record biometric data for 1 minute, 5 minutes, 30 minutes,1 hour, 2 hours, 1 day, or any amount of time desired, required, ordeemed necessary to provide a sufficient amount of baseline data. Incertain embodiments, program(s) 236 may be configured to recordbiometric data that can be used as baseline biometric data untilindication from the user to stop recording has been received.

In some embodiments, program(s) 236 may be configured to determine,based on the recorded biometric data, a range of biometric datarepresentative of the user being in a stressed state. In someembodiments, program(s) 236 may be configured to determine, based on therecorded biometric data, a range of biometric data representative of theuser being in a calm state. In some embodiments, the range of stressedbiometric data and/or the range of calm biometric data may be stored instorage device 234 or some other memory location (e.g., a memorylocation associated with user computing device 104 or in biometricsdatabase 116).

In certain embodiments, program(s) 236 may be configured to updatebaseline biometric data on a regular or semi-regular basis. For example,program(s) 236 may be configured to measure, record, or otherwise obtainbiometric data associated with the user on a daily, semi-daily,bi-daily, weekly, semi-weekly, bi-weekly, monthly, semi-monthly,bi-monthly, annual, or some other predetermined basis. As anotherexample, program(s) 236 may be configured to measure, record, orotherwise obtain biometric data associated with the user whenever acertain event occurs, such as the user opening or logging into anapplication associated with program(s) 236 (such as an applicationassociated with wearable user device 102 and/or user computing device104).

In some embodiments, wearable user device 102 may determine one or moreranges of baseline biometric data (e.g., a range of baseline calmbiometric data and/or a range of baseline stressed biometric data),which may be based at least in part on the obtained baseline biometricdata. In some embodiments, wearable user device 102 may store thebaseline biometric data and/or the one or more ranges of baselinebiometric data locally. In some embodiments, wearable user device 102may transmit the baseline biometric data such that it can be stored atmemory associated with user computing device (e.g., storage location334), at memory associated with organization 108 (e.g., biometricsdatabase 116), or some other memory location. In some embodiments,wearable user device 102 may transmit the baseline biometric data suchthat user computing device 102, biometrics authentication device 114, orsome other device or component can determine one or more ranges ofbaseline biometric data, which may be based at least in part on theobtained baseline biometric data. In certain embodiments, the baselinebiometric data and/or ranges of baseline biometric data may be stored atmultiple locations (e.g., multiple memory locations may store redundantcopies of the baseline biometric data and/or ranges of baselinebiometric data).

According to some embodiments, program(s) 236 may be configured todetect a trigger event. Program(s) 236 may be configured to detect atrigger event by receiving data indicative of one or more of the triggerevents discussed herein. Such data may be received from one or moresensors or may be received within the program(s) 236 itself (e.g., bydetecting that the user has opened the program(s) 236, such as a mobilebanking application, and/or by detecting that the user has performed oneor more certain actions within the program(s) 236). The trigger eventmay be any predetermined event or set of predetermined events. In someembodiments, the trigger event may be an event that must occur prior toa user transferring funds via one or more devices. For example, a usermay desire to transfer funds via wearable user device 102 or usercomputing device 104, and to do so, a user is typically required to openor log into an application associated with wearable user device 102 oruser computing device 104. Thus, in some embodiments, the trigger eventmay be a user opening or logging into an application, website, or otherinterface that can be used to transfer funds. In some embodiments, thetrigger event may be opening or selecting a “transfer funds” function,tool, or window within the application or other interface (e.g., theuser is already logged into an application or website associated with afinancial service provider and a trigger event occurs when the userselects a “transfer funds” tool within the application or website). Incertain embodiments, a trigger event may occur when the user attempts toaccess a financial service account associated with the user via an ATMor at a physical location or storefront. In some embodiments, a triggerevent may occur when the user attempts to transfer money over apredetermined amount. In some embodiments, the predetermined amount maybe configurable and/or customizable by a user, a financial serviceprovider, or some other entity. In certain embodiments, a trigger eventmay be associated with a potential transfer of funds. In certainembodiments, a trigger event may occur if the user attempts to transferfunds to a financial account associated with a person or entity otherthan the user. In some embodiments, a trigger event may occur if theuser attempts to transfer funds to a person or entity to whom the userhas never before transferred funds or to whom the user has transferredfunds below a predetermined number of times. In some embodiments, atrigger event may occur if the user attempts to transfer funds to aperson or entity who is not associated with a “white list” of acceptabletransfer recipients. In some embodiments, the “white list” may includeaccounts and/or persons or entities with whom the user has previouslytransferred funds. In some embodiments, a trigger event may occur if theuser attempts to transfer funds to a person or entity who associatedwith a “black list” of acceptable transfer recipients. In someembodiments, a trigger event may occur if the user attempts to transferfunds to a person or entity who is a known criminal and/or has committedone or more predetermined actions. For example, in some embodiments, atrigger event may occur if the user attempts to transfer funds to aperson or entity who has committed fraud, larceny, robbery, or any otherpredetermined crime or action. In some embodiments, a list of personsand/or entities who are criminals or have committed certain actions maybe generated and maintained by organization 108 and may be saved in adatabase associated with organization 108. In certain embodiments, alist of persons and/or entities who are criminals or have committedcertain actions may be generated and maintained by one or more thirdparties (e.g., one or more law enforcement agencies, one or more privateentities) and may be accessible by organization 108.

In some embodiments, a trigger event may be based at least in part on ageographic location of wearable user device 102. For example, certainlocations and/or certain area (e.g., geofenced areas) may bepredetermined to be high-risk locations such that a trigger event mayoccur if the user opens a particular application or selects a certaintool while wearable user device 102 is located at a high-risk locationor within a high-risk area. In certain embodiments, one or morehigh-risk locations may be based at least in part on publicly orcommercially available information, such as overall crime rates, robberyrates, or other pertinent information. In some embodiments, one or morehigh-risk locations may be based on a history of locations visited bythe user (e.g., as determined by a GLS associated with wearable userdevice 102 and/or user computing device 104). For example, in someembodiments, a trigger event may occur if the user opens a particularapplication or selects a certain tool while wearable user device 102and/or user computing device 104 is located at a location or within anarea that the wearable user device 102 has never before visited. In someembodiments, a trigger event may occur if the user opens a particularapplication or selects a certain tool while wearable user device 102and/or user computing device 104 is located at a location or within anarea that the wearable user device 102 does not regularly visit.

In some embodiments, certain locations and/or certain areas (e.g.,geofenced areas) may be predetermined to be low-risk locations such thata trigger event will not occur if the user opens a particularapplication or selects a certain tool while wearable user device 102 islocated at a low-risk location or within a low-risk area. In someembodiments, a trigger event may occur if the user opens a particularapplication or selects a certain tool while wearable user device 102 isnot located at a low-risk location or is not within a low-risk area.

According to some embodiments, a trigger event may be based on a time ofthe day, day of the week, some other temporal characteristic, or anyrange or ranges thereof. In certain embodiments, this time or range oftimes may be configurable or customizable by the user, organization 108,or some other person or entity. In some embodiments, the time or rangeof times may be indicative of a time or range of times during which theuser is unlikely to transfer funds. For example, in some embodiments, atrigger event may occur if the user opens a particular application,selects a certain tool, or performs some other predetermined actionduring a range of time, such as between 11pm and 6am. In someembodiments, a trigger event may occur based on a combination of one ormore of the above discussed facts. For example, in some embodiments, atrigger event may not occur if the user opens a particular applicationat 2am while wearable user device 102 is located at a locationidentified as the user's home, but a trigger event may occur if the useropens the application at 2am while wearable user device is located at alocation identified as an alley in a neighborhood with a crime rateabove a predetermined threshold. As another example, a trigger event maynot occur if the user attempts to transfer less than $500 while wearableuser device 102 is located at a location identified as a workplace ofthe user, but a trigger event may occur if the user attempts to transfermore than $50 while wearable user device 102 is located at a locationidentified as a bar.

In some embodiments, wearable user device 102 (or user computing device104, biometrics authentication device 114, or some other device orcomponent) may be configured to request confirmation as to whether atrigger event was associated with a coerced transfer of funds (or anattempted coerced transfer of funds.

According to some embodiments, upon detecting a trigger event,program(s) 236 may be configured to detect and/or record biometricinformation associated with the user. In some embodiments, the detectedand/or recorded biometric information may be referred to as situationalbiometric data. In some embodiments, the situational biometric data mayinclude one or more of the types of biometric data included in thebaseline biometric data. For example, situational biometric data mayinclude one or more of images of the user (e.g., facial and/or bodyimages), height, weight, heartrate data, blood pressure data, hormonelevel data, body temperature data, retina data, iris data, pupil data,voice data (e.g., tone, pitch, rate of speech, accent, etc.),respiratory rate data (e.g., breathing rate data), brainwave data,odor/scent data (i.e., olfactory data), and sweat data (e.g., amountproduced, rate of production, molecular composition). In someembodiments, program(s) 236 may be configured to compare the situationalbiometric data to the baseline biometric data. In some embodiments,program(s) 236 may be configured to, based on the comparison, determinewhether the situational biometric data is representative of the userbeing in a calm state or in a stressed state. For example, in someembodiments, if a comparison of the situational biometric data and thebaseline biometric data representative of the user being in a calm stateis above a predetermined threshold of similarity, program(s) 236 maydetermine that the situational biometric data is representative of theuser being in a calm state. In some embodiments, if a comparison of thesituational biometric data and the baseline biometric datarepresentative of the user being in a calm state is below apredetermined threshold of similarity, program(s) 236 may determine thatthe situational biometric data is representative of the user being in astressed state. In some embodiments, if a comparison of the situationalbiometric data and the baseline biometric data representative of theuser being in a stressed state is above a predetermined threshold ofsimilarity, program(s) 236 may determine that the situational biometricdata is representative of the user being in a stressed state. In someembodiments, if a comparison of the situational biometric data and thebaseline biometric data representative of the user being in a stressedstate is below a predetermined threshold of similarity, program(s) 236may determine that the situational biometric data is representative ofthe user being in a calm state. In some embodiments, program(s) 236 maybe configured to transmit, to user computing device 104 or organization108 (e.g., to biometrics authentication device 114), an indication thatthe situational biometric data is representative of the user being in acalm state or a stressed state.

As described above, situational biometric data may include one orseveral types of biometric data associated with the user (e.g., one ormore of images of the user, heartrate data, blood pressure data, hormonelevel data, body temperature data, retina data, iris data, pupil data,various types of voice data (tone, pitch, rate of speech, accent, etc.),respiratory rate data, brainwave data, odor/scent data, and varioustypes of sweat data (amount produced, rate of production, molecularcomposition, etc.). In some embodiments, program(s) 236 may beconfigured to determine whether one, some, or all of the measured typesof biometric data is indicative of the user being in a stressed state.In some embodiments, program(s) 236 may be configured to require thattwo, three, four, five, six, seven, eight, nine, ten, or more of themeasured types of biometric data is indicative of the user being in astressed state in order for program(s) 236 to determine that the user isin a stressed state.

In some embodiments, program(s) 236 may be configured to determinewhether a majority of the various types of biometric data measuredsupport a determination of the user being in a stressed state. Forexample, if three types of biometric data are measured, program(s) maybe configured to determine that a user is in a stressed state if two ormore of the types of biometric data support this conclusion. As a moredetailed example, program(s) 236 may be configured to comparesituational biometric data A to baseline biometric data A (which isindicative of the user being in a stressed state), situational biometricdata B to baseline biometric data B (which is indicative of the userbeing in a stressed state), and situational biometric data C to baselinebiometric data C (which is indicative of the user being in a stressedstate). If situational biometric data A is sufficiently similar tobaseline biometric data A, but situational biometric data B and C arenot sufficiently similar to baseline biometric data B and C,respectively, program(s) 236 may be configured to determine that theuser is not in a stressed state. Conversely, if situational biometricdata A is not sufficiently similar to baseline biometric data A, butsituational biometric data B and C are sufficiently similar to baselinebiometric data B and C, respectively, program(s) 236 may be configuredto determine that the user is in a stressed state. Similarly, program(s)236 may be configured to determine that a user is in a stressed state ifa predetermined threshold percentage of types of measured biometric datais exceed. For example, in order for program(s) 236 to determine thatthe user is in a stressed state, some embodiments may require 40%, 50%,67%, 75%, 80%, 90%, or 100% of the measured types of biometric data tobe indicative (based on a comparison to corresponding types of baselinebiometric data) of the user being in a stressed state.

According to some embodiments, program(s) 236 may be configured tocompare one or more types of situational biometric data to one or moretypes of baseline biometric data. In certain embodiments, each of thevarious types of biometric data may be given an accuracy factor. Thatis, some types of biometric data may be deemed to more accuratelyindicate whether a user is undergoing stress, and an accuracy factor maypermit program(s) 236 to more accurately determine whether a user isundergoing stress. For example, in some embodiments, four types ofbiometric data may be stored, and four respective types of situationalbiometric data (situational biometric data A-D). Program(s) 236 maydetermine that three of the four types of biometric data (situationalbiometric data A-C) are indicative of the user being in a calm state(or, minimally, not being in a stressed state), and program(s) 236 maydetermine that the remaining type of biometric data (situationalbiometric data D) is indicative of the user being in a stressed state.Nonetheless, program(s) 236 may determine that the user is in a stressedstate if situational biometric data D has an accuracy factor thatsufficiently outweighs the corresponding accuracy factors of situationalbiometric data A-C. That is, if the type of biometric data associatedwith situational biometric data D is deemed to closely and accuratelycorrelate to a user's stressed state and the types of biometric dataassociated with situational biometric data A-C do not accuratelycorrelate to a user's stressed state, program(s) 236 may be configuredto more strongly weigh the situational biometric D when determiningwhether the user is in a stressed state.

In some embodiments, program(s) 236 may be configured to determine,based on the comparison, a stress value associated with the situationalbiometric data. For example, in some embodiments, program(s) 236 may beconfigured to determine a user's stress on a scale of 0 to 100, where 0represents total calmness (i.e., no stress) and 100 represents totalstress (i.e., no calmness). In some embodiments, program(s) 236 may beconfigured to determine if the situational biometric data has a stressvalue that is above a predetermined threshold (e.g., above 65 on a scaleof 0 to 100). In certain embodiments, program(s) 236 may be configuredto aggregate the stress value for all types of measured biometric dataand determine if the aggregated stress value is above a predeterminedthreshold. In some embodiments, program(s) 236 may be configured toaggregate the stress value for all types of measured biometric data,divide the aggregated stress value by the number of types of measuredbiometric data to determine an average stress value, and determine ifthe average stress value is above a predetermined threshold. Accordingto some embodiments, program(s) 236 may be configured to determinewhether a user is in a stressed state using a weighted stress value(according to any of the methods described herein), where the stressvalue of each type of measured biometric data is multiplied by thecorresponding accuracy factor for each type of measured biometric data.

In certain embodiments, program(s) 236 may not be configured to comparethe situational biometric data to the baseline biometric data but mayinstead be configured to transmit the situational biometric data to usercomputing device 104 or organization 108 (e.g., to biometricsauthentication device 114). In certain embodiments, program(s) 236 maybe configured to transmit a location of the wearable user device 102 touser computing device 104 or organization 108 (e.g., to biometricsauthentication device 114). In some embodiments, program(s) 236 may beconfigured to determine whether communication is established with usercomputing device 104 or organization 108 (e.g., to biometricsauthentication device 114). In some embodiments, if communication is notestablished, program(s) 236 may be configured to save obtainedsituational biometric data on local memory (e.g., storage location 234).In some embodiments, program(s) 236 may be configured to determine thatcommunication with user computing device 104 or organization 108 (e.g.,to biometrics authentication device 114) has subsequently beenestablished or re-established. In some embodiments, program(s) 236 maybe configured to transmit the saved situational biometric data to usercomputing device 104 or organization 108 (e.g., to biometricsauthentication device 114).

In certain embodiments, the program(s) 236 may be configured to detectand/or measure environmental data, which may include, but is not limitedto, ambient temperature, ambient humidity, and/or local wind speed. Insome embodiments, the program(s) 236 may be configured to determinewhether the obtained biological information is representative of theuser being in a calm state or a stressed stated based at least in partthe obtained environmental data. For example, wearable user device 102may determine that a user's body temperature is elevated and may alsodetermine that the ambient temperature is 90° F.; accordingly, theprogram(s) 236 may determine that the elevated body temperature haslittle to no correlation to the user being in a stressed state. As analternate example, wearable user device 102 may determine that a user'sbody temperature is elevated and may also determine that the ambienttemperature is 40° F.; accordingly, the program(s) 236 may determinethat the elevated body temperature has some level of correlation to theuser being in a stressed state. In certain embodiments, wearable userdevice 102 may incorporate environmental data without measuring the dataitself. For example, in some embodiments, wearable user device 102 mayobtain local weather data or other environmental data from a publiclyavailable or commercially available source of such information. Whilethis may provide comparatively generalized or approximated information(as compared to information measured by wearable user device 102), thismay also permit wearable user device 102 to require fewer components,which may provide a smaller, sleeker, and/or lighter wearable userdevice.

In some embodiments, wearable user device 102 may be configured totransmit situational biometric data, obtained environmental data, and/ordata indicative of a determination that the user is in a calm state or astressed state directly to the intended recipient, and in someembodiments wearable user device 102 may be configured to transmitsituational biometric data, obtained environmental data, and/or dataindicative of a determination that the user is in a calm state or astressed state via one or more components, such as by user computingdevice 104 and/or network 106.

In some embodiments, responsive to a determination (by wearable userdevice 102, user computing device 104, or some other device or system,such as biometrics authentication device 114) that situational biometricdata is indicative of the user being in a stressed state, program(s) 236of wearable user device 102 (or program(s) 336 of user computing deviceor some other device or system, such as biometrics authentication device114) may be configured to transmit a notification to the user. Forexample, the notification may include one or more of a phone call, anSMS message, and MMS message, an email, a voicemail, or any other typeof message. In some embodiments, the notification may requestconfirmation that the user is physically unharmed and/or that thetrigger event was associated with a coerced transfer of funds. In someembodiments, the notification may send to one or more third partiesinforming the third party that the user may be involved in a coercedtransfer of funds. In certain embodiments, a third party may be apredetermined contact input by the user (e.g., an emergency contact). Insome embodiments, the third party may be a law enforcement organization.In some embodiments, program(s) 236 (or some other device or system) maytransmit instructions to a camera and/or a microphone (e.g., of wearableuser device 102 or user computing device 104) to engage such thatenvironmental data may be recorded. In some embodiments, program(s) 236(or some other device or system) may be configured to determine from therecorded environmental data whether the user is in a potentiallydangerous situation or is becoming victim to a coerced transfer offunds. In some embodiments, program(s) 236 (or some other device orsystem) may be configured to transmit the recorded environmental data toone or more security personnel who may review the recorded environmentaldata to determine whether the user is in a potentially dangeroussituation or is becoming victim to a coerced transfer of funds. In someembodiments, responsive to determining that the situational data isabove a predetermined level of stress for a predetermined amount oftime, program(s) 236 (or some other device or system) may be configuredto transmit a notification to one or more law enforcement organizations,and the notification may include a last-known location of the wearableuser device 102 (and/or the user computing device 104).

In some embodiments, responsive to a determination that situationalbiometric data is indicative of the user being in a stressed state,program(s) 236 (or some other device or system) may be configured torequest that the user look at the camera and/or recite a safe word orsafe phrase. In some embodiments, the display of the wearable userdevice 102 or user computing device 104 may be configured to display aphrase, and the user may be requested to recite the displayed phrase. Incertain embodiments, program(s) 236 (or some other device or system) maybe configured to determine a secondary confirmation, based on abiometric analysis of the recording of the user's face and/or therecording of the user's voice, whether the situational data representsthe user being in a stressed state.

In some embodiments, program(s) 236 (or some other device or system) maywait a predetermined amount of time to transmit a request to the userasking for confirmation as to whether the user has undergone a dangeroussituation or has become victim to a coerced transfer of funds. This maypermit a dangerous situation to conclude to avoid the transmission tothe user unnecessarily escalating the dangerousness of the situation. Insome embodiments, program(s) 236 (or some other device or system) may beconfigured to wait to contact the user until after biometric data of theuser returns to a below a predetermined threshold stress or until thebiometric of the user is within a predetermined degree of similarity tobaseline biometric data that is indicative of the user being in a calmstate. In some embodiments, program(s) 236 (or some other device orsystem) may be configured to determine that, upon detecting that astress value associated with the user quickly decreases to zero (e.g.,low stress value or no new biometric data of the user), the user isstill in a stressed state, as the wearable user device 102 may have beenremoved from the user.

In some embodiments, program(s) 236 (or some other device or system) maybe configured to determine may be configured to measure a bodytemperature data of the user. In some embodiments, body temperature datathat is above or below a predetermined threshold may be indicative thatthe user is in a stressed state and/or is injured. For example, bodytemperature data below a predetermined threshold may be indicative ofthe user being injured, and body temperature data above a predeterminedthreshold may be indicative of the user being in a stressed state, orvice versa.

In certain embodiments, wearable user device 102 (or user computingdevice 104, biometrics authentication device 114, or some other deviceor component) may track past trigger events and whether those triggerevents were confirmed by the user to be associated with a coercedtransfer of funds or whether those trigger events were dismissed by theuser as being a false positive and/or not associated with a coercedtransfer of funds. In some embodiments, wearable user device 102 mayupdate the “sensitivity” of future trigger events depending on theoutcome of one or more past trigger events. For example, wearable userdevice 102 may dynamically change ranges of times associated withtrigger events if a predetermined numbered of trigger events occurringwithin a certain time period have resulted in false positives. Asanother example, wearable user device 102 may add a new transferrecipient to the “white list” of approved recipients if a predeterminednumber of trigger events associated with a transfer of funds to thatrecipient have been dismissed by the user as a false positive. Thosehaving skill in the art will recognize that other embodiments of machinelearning and/or dynamically updating trigger events is hereincontemplated.

Memory 230 may include one or more memory devices that store data andinstructions used to perform one or more features of the disclosedembodiments. Memory 230 may also include any combination of one or moredatabases controlled by memory controller devices (e.g., one or moreservers, etc.) or software, such as document management systems,Microsoft™ SQL databases, SharePoint™ databases, Oracle™ databases,Sybase™ databases, or other relational databases. Memory 230 may includesoftware components that, when executed by processor 210, perform one ormore processes consistent with the disclosed embodiments. In someembodiments, memory 230 may include a baseline biometrics databaseincluding data for storing related data to wearable user device 102 toperform one or more of the processes and functionalities associated withthe disclosed embodiments. The baseline biometrics database may includedata corresponding to one or more types of biological informationassociated with the user that is representative of the user being in acalm state and/or one or more types of biological information associatedwith the user that is representative of the user being in a stressedstate. In some embodiments, the baseline biometrics database may includedefault biometrics data that may be representative information thattypically representative of a person being in calm state or a stressedstate. While the use of default biometric data may permit the wearableuser device to perform various operations and functionalities withoutrequiring the user to provide baseline biometric data, determinationsthat the user is in a calm state or a stressed state that are based onthe default biometric data may not be as accurate as determinations thatare based on baseline biometric data specific to an individual user asbiological responses to stress may vary from person to person.

In some embodiments, wearable user device 102 may be configured todetermine whether wearable user device 102 is in communication rangewith (or that wearable user device does not have an established line ofcommunication with) user computing device 104, network 106, or any otherdevice or component. In some embodiments, upon determining that wearableuser device 102 is not in communication range with, or does not have anestablished line of communication with, a particular device orcomponent, wearable user device may be configured to save situationalbiometric data, obtained environmental data, and/or data indicative of adetermination that the user is in a calm state or a stressed state inmemory 230 (e.g., storage location 234) or some other storage location.In some embodiments, upon determining that wearable user device 102 hasreestablished communication with the particular device or component,wearable user device 102 may be configured to transmit the storedbiometric data, environmental data, and/or data indicative of adetermination that the user is in a calm state or a stressed state.

Wearable user device 102 may also be communicatively connected to one ormore memory devices (e.g., databases (not shown)) locally or through anetwork. The remote memory devices may be configured to storeinformation and may be accessed and/or managed by wearable user device102. By way of example, the remote memory devices may be documentmanagement systems, Microsoft™ SQL database, SharePoint™ databases,Oracle™ databases, Sybase™ databases, or other relational databases.Systems and methods consistent with disclosed embodiments, however, arenot limited to separate databases or even to the use of a database.

In example embodiments of the disclosed technology, wearable user device102 may include any number of hardware and/or software applications thatare executed to facilitate any of the operations. The one or more I/Ointerfaces may be utilized to receive or collect data and/or userinstructions from a wide variety of input devices. Received data may beprocessed by one or more computer processors as desired in variousimplementations of the disclosed technology and/or stored in one or morememory devices.

While wearable user device 102 has been described as one form forimplementing the techniques described herein, those having ordinaryskill in the art will appreciate that other functionally equivalenttechniques may be employed. For example, as known in the art, some orall of the functionality implemented via executable instructions mayalso be implemented using firmware and/or hardware devices such asapplication specific integrated circuits (ASICs), programmable logicarrays, state machines, etc. Furthermore, other implementations of thewearable user device 102 may include a greater or lesser number ofcomponents than those illustrated. Some embodiments may exclude certaincomponents discussed herein. For example, in certain embodiments,wearable user device 102 may not include an OS, depending on thecomplexity of the program instructions. Embodiments not including an OSmay have comparative limited functionality but may also decrease powerconsumption of wearable user device 102. The various components ofwearable user device 102 may include the same or similar attributes orcapabilities of the same or similar components discussed with respect touser computing device 104.

An example embodiment of user computing device 104 is shown in moredetail in FIG. 3. User computing device 104 may have a similar structureand components that are similar to those described with respect towearable user device 102. As shown, user computing device 104 mayinclude a processor 310; an I/O device 320; a memory 330 containing anOS 332, a storage device 334, which may be any suitable repository ofdata and may include a gesture database including data corresponding toone or more predetermined spatial gestures, and/or a program 336; and acommunication interface 340. In some embodiments, user computing device104 may include components such as an accelerometer; a gyroscope; a GLSfor determining the geographic location of user computing device 104; aU/I device for receiving user input data; such as data representative ofa click, a scroll, a tap, a press, or typing on an input device that candetect tactile inputs; a display; a microphone and/or an image capturedevice, such as a digital camera; one or more biometric sensorsconfigured to measure biological information associated with a user suchas one or more of a user's heartrate, blood pressure, hormone levels,body temperature, retina, iris, pupil, voice, respiratory rate (e.g.,breathing rate), brainwaves, odor (i.e., olfactory data), and sweat(e.g., amount produced, rate of production, molecular composition);and/or one or more sensors configured to measure environmental data,such as ambient temperature (e.g., by a thermometer or thermocouple),ambient humidity (e.g., by a hygrometer), local wind speed (e.g., by ananemometer, manometer, or pressure transducer), or any otherenvironmental data that may be useful for the methods and techniquesdisclosed herein. In some embodiments, communication interface 340 mayinclude a transceiver. In some embodiments, user computing device 104may further include a peripheral interface, a mobile network interfacein communication with processor 310, a bus configured to facilitatecommunication between the various components of user computing device104, and/or a power source configured to power one or more components ofuser computing device 104. The various components of user computingdevice 104 may include the same or similar attributes or capabilities ofthe same or similar components discussed with respect to wearable userdevice 102. In some embodiments, some or all of the functionalitiesdiscussed with respect to wearable user device 102 may be performed oraccomplished by user computing device 104. For example, in someembodiments, storage device 334 may include some or all (or a copy of)baseline biometric data. As another example, in some embodiments,program(s) 336 of user computing device 104 may be configured to receivesituational biometric data from wearable user device 102 and may beconfigured to determine, based on a comparison of the situationalbiometric data and the baseline biometric data, a stress valueassociated with the situational biometric data or that the situationalbiometric data is representative of the user being in a calm state or astressed state. In some embodiments, user computing device 104 may serveas a communication relay. For example, in some embodiments, program(s)336 may be configured to receive situational data from wearable userdevice 102 and may be configured to transmit the situational biometricdata to organization 108 (e.g., biometrics authentication device 114)via network 106 or some other communication method.

In some embodiments, responsive to a determination that situationalbiometric data is sufficiently indicative of the user being in astressed state, program(s) 336 of user computing device 104 may beconfigured to

Network 106 may be of any suitable type, including individualconnections via the internet such as cellular or Wi-Fi networks. In someembodiments, network 106 may connect terminals, services, and mobiledevices using direct connections such as RFID, NFC, Bluetooth™, BLE,Wi-Fi™, ZigBee™, ABC protocols, USB, WAN, or LAN. Because theinformation transmitted may be personal or confidential, securityconcerns may dictate one or more of these types of connections beencrypted or otherwise secured. In some embodiments, however, theinformation being transmitted may be less personal, and therefore thenetwork connections may be selected for convenience over security.

Network 106 may comprise any type of computer networking arrangementused to exchange data. For example, network 106 may be the Internet, aprivate data network, virtual private network using a public network,and/or other suitable connection(s) that enables components in systemenvironment 100 to send and receive information between the componentsof system 100. Network 106 may also include a PSTN and/or a wirelessnetwork.

Organization 108 may include one or more servers, devices, and computersystems for performing one or more functions associated with productsand/or services that organization 108 provides. Such servers, devices,and computer systems may include, for example, web server 110,transaction server 112, biometrics authentication device 114, biometricsdatabase 116, as well as any other computer systems necessary toaccomplish tasks associated with organization 108 or the needs ofcustomers (which may be customers of an entity associated withorganization 108).

Transaction server 114 may include a computer system configured toprocess one or more transactions involving an account associated with acustomer or user, or a request received from third party (e.g., anentity associated with third-party server 120) on behalf of a customeror user who is attempting to make a purchase. In some embodiments,transactions can include, for example, a product/service purchase,product/service return, financial transfer, financial deposit, financialwithdrawal, financial credit, financial debit, dispute request, warrantycoverage request, and any other type of transaction associated with theproducts and/or services that an entity associated with third-partyserver 120 and/or organization 108 provides to individuals such ascustomers. Transaction server 114 may have one or more processors 142and one or more transaction server databases 144, which may be anysuitable repository of transaction data. Information stored intransaction server 114 may be accessed (e.g., retrieved, updated, andadded to) via local network 118 and/or network 106 by one or moredevices.

In some embodiments, transaction server 114 tracks and stores event dataregarding interactions between a third party, such as third-party server120, with organization 108, on behalf of the individual (e.g., acustomer or user). For example, transaction server 114 may trackthird-party interactions such as purchase requests, refund requests,warranty claims, account withdrawals and deposits, and any other type ofinteraction that third-party server 120 may conduct with organization108 on behalf of an individual such as customer or user.

Local network 118 may comprise any type of computer networkingarrangement used to exchange data in a localized area, such as Wi-Fi,Bluetooth™Ethernet, and other suitable network connections that enablecomponents of organization 108 to interact with one another and toconnect to network 106 for interacting with components in systemenvironment 100. In some embodiments, local network 118 may comprise aninterface for communicating with or linking to network 106. In otherembodiments, components of a third party (e.g., an entity associatedwith third-party server 120) and/or organization 108 may communicate vianetwork 106, without a separate local network 118.

An example embodiment of biometrics authentication device 114 is shownin more detail in FIG. 4. Biometrics authentication device 114 may havea similar structure and components that are similar to those describedwith respect to user computing device 104. As shown, biometricsauthentication device 114 may include a processor 410; an I/O device420; and a memory 430 containing an OS 432, a storage device 434, whichmay be any suitable repository of data and may include a gesturedatabase including data corresponding to one or more predeterminedspatial gestures, and/or a program 436. In some embodiments, biometricsauthentication device 114 may include more or fewer components (e.g.,the components described herein with respect to user computing device104), and the various components of biometrics authentication device 114may include the same or similar attributes or capabilities of the sameor similar components discussed with respect to user computing device104 and/or wearable user device 102.

Biometrics authentication device 114 may include a computer systemconfigured to store, maintain, and update user biometric information. Insome embodiments, biometrics authentication device 114 may store and/ormaintain user biometric information in biometrics database 116.According to some embodiments, user biometric information may includebiological information that may be representative of a particular userbeing in a calm state. In some embodiments, user biometric informationmay include biological information that may be representative of aparticular user being in a stressed state. In some embodiments,biometrics authentication device 114 may include default biometricinformation, which may be based on an aggregation of all user biometricinformation stored in biometrics database 116 (i.e., biologicalinformation associated with a plurality of users) or a subset of theuser biometric information stored in biometrics database 116.

In some embodiments, biometrics database 116 may include a userbiometric profile, which may include biological information such as oneor more of images of the user (e.g., facial and/or body images), height,weight, heartrate data, blood pressure data, hormone level data, bodytemperature data, retina data, iris data, pupil data, voice data (e.g.,tone, pitch, rate of speech, accent, etc.), respiratory rate data (e.g.,breathing rate data), brainwave data, odor/scent data (i.e., olfactorydata), and sweat data (e.g., amount produced, rate of production,molecular composition). In certain embodiments, the user profile mayinclude baseline biometric data representative of the user being in acalm state. In some embodiments, biometrics authentication device 114may be configured to receive situational biometric data which mayinclude biological information associated with the user. In certainembodiments, biometrics authentication device 114 may be configured toreceive situational biometric data from wearable user device 102 and/oruser computing device 104. In some embodiments, programs(s) 436 ofbiometrics authentication device 114 may be configured to comparesituational biometric data (e.g., data obtained by wearable user device102) to the user profile and may be configured to determine whether thesituational biometric data is representative of the user being in a calmstate or a stressed state and/or to determine whether a stress value isabove a predetermined threshold. For example, if a comparison of thesituational biometric data and the baseline biometric data (i.e., datarepresentative of the user being in a calm state) is above apredetermined threshold of similarity, the biometrics authenticationdevice 114 may determine that the situational biometric data isrepresentative of the user being in a calm state (or a likelihood ofcoercion is below a predetermined threshold or a likelihood of coercionis below a predetermined threshold). Alternately, if a comparison of thesituational biometric data and the baseline biometric data (i.e., datarepresentative of the user being in a calm state) is below apredetermined threshold of similarity, the biometrics authenticationdevice 114 may determine that the situational biometric data isrepresentative of the user being in a stressed state (or a stress valueis above a predetermined threshold or a likelihood of coercion is abovea predetermined threshold).

In certain embodiments, the user biometric profile may include baselinebiometric data representative of the user being in a stressed state. Insome embodiments, if a comparison of the situational biometric data andthe baseline biometric data (i.e., data representative of the user beingin a stressed state) is above a predetermined threshold of similarity,the biometrics authentication device 114 may determine that thesituational biometric data is representative of the user being in astressed state (or a stress value is above a predetermined threshold ora likelihood of coercion is above a predetermined threshold).Alternately, in some embodiments, if a comparison of the situationalbiometric data and the baseline biometric data (i.e., datarepresentative of the user being in a stressed state) is below apredetermined threshold of similarity, the biometrics authenticationdevice 114 may determine that the situational biometric data isrepresentative of the user being in a calm state (or a stress value isbelow a predetermined threshold or a likelihood of coercion is below apredetermined threshold).

In some embodiments, the user biometric profile may include baselinecalm biometric data (i.e., data representative of the user being in acalm state) and baseline stressed biometric data (i.e., datarepresentative of the user being in a stressed state). In someembodiments, the baseline calm biometric data and the baseline stressedbiometric data may include the same types of biometric data (e.g., bothinclude blood pressure data), and in some embodiments, the baseline calmbiometric data and the baseline stressed biometric data may includedifferent types of biometric data (e.g., the baseline calm biometricdata includes blood pressure data but not heartrate data and thebaseline stressed biometric data includes heartrate data but not bloodpressure data).

In some embodiments, biometrics authentication device 114 may determinethat the situational biometric data is representative of the user beingin a calm state if a comparison of the situational biometric data andthe baseline calm biometric data is above a predetermined threshold ofsimilarity and/or if a comparison of the situational biometric data andthe baseline stressed biometric data is below a predetermined thresholdof similarity. In some embodiments, the biometrics authentication device114 may determine that the situational biometric data is representativeof the user being in a stressed state if a comparison of the situationalbiometric data and the baseline stressed biometric data is above apredetermined threshold of similarity and/or if a comparison of thesituational biometric data and the baseline calm biometric data is belowa predetermined threshold of similarity.

In some embodiments, biometrics authentication device 114 may receive anindication that the user has initiated a transfer of funds or requesteda transfer or funds (e.g., via wearable user device 102, user computingdevice 104, or some other device or component). In some embodiments,biometrics authentication device 104 may initiate one or more safetymeasures. In some embodiments, the safety measures include a request forthe user to confirm the status of the request to transfer funds (e.g.,indicate whether the transfer of funds was coerced or whether the userrequested the transfer of funds under the user's own volition). Incertain embodiments, the request for the user to confirm the status ofthe request to transfer funds may include one or more of a phone call,an SMS message, and MMS message, an email, a voicemail, or any othertype of message. In some embodiments, the notification may requestconfirmation that the user is physically unharmed and/or that thetrigger event was associated with a coerced transfer of funds. In someembodiments, the notification may send to one or more third parties(e.g., an emergency contact) informing the third party that the user maybe involved in a coerced transfer of funds. In some embodiments, thethird party may be a law enforcement organization, and in someembodiments, the notification may include a last-known location of thewearable user device 102 (and/or the user computing device 104). In someembodiments, biometrics authentication device 114 may transmitinstructions to a camera and/or a microphone (e.g., of wearable userdevice 102 or user computing device 104) to engage such thatenvironmental data may be recorded. In some embodiments, biometricsauthentication device 114 may be configured to determine from therecorded environmental data whether the user is in a potentiallydangerous situation or is becoming victim to a coerced transfer offunds. In some embodiments, biometrics authentication device 114 may beconfigured to transmit the recorded environmental data to one or moresecurity personnel who may review the recorded environmental data todetermine whether the user is in a potentially dangerous situation or isbecoming victim to a coerced transfer of funds.

In some embodiments, biometrics authentication device 114 may beconfigured to transmit an artificial confirmation notification to afinancial service provider or other third party associated with areceiving account that is associated with a potentially coerced transferof funds. In some embodiments, the artificial confirmation notificationmay indicate that the transfer of funds has successfully deposited fundsinto the receiving account. In some embodiments, if the user indicatesthat the transfer of funds was not coerced, biometrics authenticationdevice 114 may be configured to deposit the funds into the receivingaccount. In certain embodiments, if the user indicates that the transferof funds was coerced, biometrics authentication device 114 may beconfigured to cancel the transfer of funds such that the funds are notdeposited into the receiving account. According to some embodiments,biometrics authentication device 114 may also notify a law enforcementorganization and/or the financial service provider or third partyassociated with the receiving account such that the holder of receivingaccount may be identified as being accused of coercing a transfer offunds. In certain embodiments, biometrics authentication device 114 maybe configured to complete a transfer of funds to the financial serviceprovider associated with the receiving party such that the funds aretemporarily held by the financial service provider in a holding account.Upon confirmation that the transfer of funds was not coerced, biometricsauthentication device 114 may instruct the financial service provider tocomplete the transfer by transferring the funds from the holding accountto the receiving account. Upon confirmation that the transfer of fundswas coerced, biometrics authentication device 114 may instruct thefinancial service provider to cancel the transfer and refunds thetransferred funds to an account associated with the user. In someembodiments, upon confirmation that the transfer of funds was coerced,biometrics authentication device 114 may instruct the financial serviceprovider to freeze the receiving account.

According to some embodiments, the system (e.g., wearable user device102, user computing device 104, or biometrics authentication device 114)may be configured to determine one or more safety measures dependent ona risk rating associated with a trigger event. For example, someembodiments may include a first tier of precautionary safety measures,which corresponds to a low risk rating associated with the triggerevent, and some embodiments may include a second tier of precautionarysafety measures, which corresponds to a high risk rating associated withthe trigger event. In some embodiments, biometrics authentication device114 may determine that a risk rating associated with the trigger eventand/or situational data. The risk rating may be based at least in parton level of stress indicated by the situational data (e.g., how extremethe level of stress or level of calmness is). In some embodiments, therisk rating may be determined according to particular areas, the variouscrime rates associated with those particular areas, and whether the useror other users have been coerced to transfer funds in that area. Therisk rating may also be based at least in part on time of day or otherfactors discussed herein with respect to detection of a trigger event.In some embodiments, the first tier (i.e., low risk tier) may correspondto less severe safety measures as compared to safety measurescorresponding to the second tier (i.e., high risk tier). For example, insome embodiments, the first tier may comprise sending a pushnotification requesting that the user indicate whether a transfer isbeing coerced, and in some embodiments, the second tier may compriserecording environmental data without providing a notification to theuser.

Although the preceding description describes various functions ofwearable user device 102, user computing device 104, web server 110,transaction server 112, biometrics authentication device 114, biometricsdatabase 116, and third-party server 120, in some embodiments, some orall of these functions may be carried out by a single computing device.For example, although FIG. 1 depicts authentication device 120 as beingpresent in organization 108, in some embodiments, some or all of thefunctionalities of authentication device 120 may be carried out bywearable user device 102 and/or user computing device 104.

FIG. 5 shows a flowchart of a method 500 for determining whether a useris being coerced to transfer funds. Method 500 may be performed by someor all of wearable user device 102, user computing device 104, webserver 110, transaction server 112, biometrics authentication device114, biometrics database 116, and third-party server 120, or any usefulcombination thereof.

In block 505, method 500 (e.g., wearable user device 102, user computingdevice 104, and/or biometrics authentication device 114) may includereceiving first user data and second user data. The user data maycomprise biometric data, and in some embodiments, the first user datamay be indicative of biological information representative of the userbeing in a calm state, and the second user data may be indicative ofbiological information representative of the user being in a stressedstate. In block 510, method 500 may include determining a first range ofbiometric data based on the first user data and/or the second user data,and method 500 may include determining a second range of biometric databased on the first user data and/or the second user data. In someembodiments, the first user data may include a range of valuesindicative of a predetermined confidence level that biometric datafalling within that range of values is indicative of the user being in acalm state. In some embodiments, the second user data may include arange of values indicative of a predetermined confidence level thatbiometric data falling within that range of values is indicative of theuser being in a stressed state. In block 515, method 500 may includestoring the first and second ranges of biometric data in memory (e.g.,one or more of storage device 234, storage device 334, or storage device434).

In block 520, method 500 may include receiving an indication of atrigger event, as discussed above. The trigger event may be associatedwith a potential transfer of funds (e.g., the opening of a mobilebanking application on user computing device 104). In block 525, method500 may include receiving situational data. In some embodiments, thesituational data may include biological information (e.g., biometricinformation) associated with the user. In some embodiments, thesituational data may be a stream of biological information associatedwith the user. In certain embodiments, the situational data may includecurrent (e.g., real-time or near real-time) biological informationassociated with the user. In certain embodiments, the situational datamay be a continuous stream of data, and in some embodiments, thesituational data may include transmissions of data that occur at apredetermined interval.

In block 530, method 500 may include determining, based at least in parton a comparison of the situational data to the first range of biometricdata and/or the second range of biometric data, a likelihood of coercionassociated with the potential transfer of funds. In certain embodiments,the likelihood of coercion may correspond to a stress value, a stressvalue, or similar data. In block 535, method 500 may include receiving,from the user (e.g., via wearable user device 102 or user computingdevice 104), a request to transfer funds, and in block 540, the systemmay be configured to determine that the likelihood of coercion is abovea predetermined threshold. In certain embodiments, the predeterminedthreshold may be selected by the user, by an entity associated with thesystem, or dynamically (e.g., autonomously by the system). In someembodiments, method 500 may include dynamically selecting thepredetermined threshold, which may be based on various types ofhistorical data, such as previous instances of the user being coerced totransfer funds, information associated with the circumstancessurrounding previous instances of the user being coerced to transferfunds (e.g., location, time, crime rate of location), and/or falsepositives.

In block 540, method 500 may include transmitting an artificialnotification to a third party (e.g., the party potentially coercing thetransfer of funds) associated with a receiving account of the requestedtransfer of funds. According to some embodiments, this may includetransmitting a temporary transfer of funds to a financial serviceprovider associated with the receiving account such that the financialservice provider is enabled to transmit, to the third party, anindication of a completed transfer of funds without the funds havingbeen actually transferred into the receiving account. In someembodiments, method 500 may alternately include transmitting a flaggedtransfer of funds such that the financial service provider associatedwith the transfer of funds may track, investigate, or otherwise beapprised of the fact that the corresponding transfer of funds may havebeen coerced by the third party associated with the receiving account.According to various embodiments described herein, this may lead thethird party to believe that the coerced transfer of funds has beensuccessfully completed such that the third party leaves the user withoutfurther incident. Thus, method 500 may facilitate a safe resolution to asituation in which the third party attempts to coerce a transfer offunds from an account associated with the user to the receiving accountassociated with the third party.

In block 550, method 500 may include receiving (e.g., from the user viawearable user device 102 or via user computing device 104) confirmationthat the requested transfer of funds is a coerced transfer of funds. Inblock 555, method 500 may include canceling the coerced transfer offunds. In some embodiments, method 500 may include transmitting, to thefinancial service provider associated with the receiving account,instructions to stop, cancel, and/or refund the transfer of funds. Insome embodiments, the refunded funds may be transferred back to thefinancial account associated with the user.

FIG. 6 shows a flowchart of a method 600 for determining whether a useris being coerced to transfer funds. Method 600 may be performed by someor all of wearable user device 102, user computing device 104, webserver 110, transaction server 112, biometrics authentication device114, biometrics database 116, and third-party server 120, or any usefulcombination thereof.

In block 610, method 600 may include receiving (e.g., by wearable userdevice 102 or user computing device 104) first biometric sensor data,and in block 620, method 600 may include storing the first biometricsensor data in memory (e.g., storage device 234, storage device 334,storage device 434). In block 630, method 600 may include detecting atrigger event, as described herein. In block 640, method 600 may includereceiving situational data, and in some embodiments, the situationaldata may include biological information associated with the user. Asdiscussed with respect to block 525 of method 500, receipt of thesituational data may be continuous (e.g., a stream of data) for aduration of time following the trigger event, and in some embodiments,receipt of the situational data may occur at predetermined intervals. Insome embodiments, method 600 may include receiving the situational datauntil the situational data is indicative of a stress value of the userfalling below a predetermined level. In some embodiments, method 600 mayinclude receiving situational data in response to detecting a triggerevent.

In block 650, method 600 may include determining that the receivedsituational data is above a predetermined level of similarity to thefirst biometric sensor data. That is, method 600 may include determiningthat the received situational data is representative of the user beingin a stressed state or corresponds to a stress value that is above apredetermined threshold or corresponds to a likelihood of coercion thatis above a predetermined threshold. In some embodiments, method 600 mayinclude initiating one or more precautionary safety measures, asdescribed herein. In certain embodiments, method 600 may includeinitiating one or more precautionary safety measures in response todetermining that the received situational data is above a predeterminedlevel of similarity to the first biometric sensor data.

FIG. 7 shows a flowchart of a method 600 for determining whether a useris being coerced to transfer funds. Method 700 may be performed by someor all of wearable user device 102, user computing device 104, webserver 110, transaction server 112, biometrics authentication device114, biometrics database 116, and third-party server 120, or any usefulcombination thereof.

In block 710, method 700 may include detecting a trigger event. In someembodiments, a trigger event may include any event or action asdescribed herein. In block 720, method 700 may include requesting userbiometric data. In some embodiments, requesting user biometric data mayinclude transmitting a request for user biometric data to a device, suchas wearable user device 102 and/or user computing device 104. In someembodiments, requesting user biometric data may include transmitting arequest for user biometric data to a first device such that userbiometric data may be measured or otherwise gathered by a second device.For example, in some embodiments, method 700 may include transmitting,to user computing device 104, a response to for user biometric data,such that user computing device 104 can forward the request to wearableuser computing device 102. In block 730, method 700 may includereceiving the requested user biometric data. In certain embodiments, therequested user biometric data may be received from the same device towhich the request was transmitted, and in some embodiments, therequested biometric data may be received from a different that isdifferent than the device to which the request was transmitted.

In block 740, method 700 may include determining that the received userbiometric data is within a predetermined confidence threshold ofsimilarity to stored user biometric data. In some embodiments, thestored user biometric data may be indicative of a user being in astressed state. In some embodiments, the stored user biometric data maybe indicative of the user being in a calm state. In certain embodiments,the stored user biometric data may include data that is indicative ofthe user being in a stressed state and other data that is indicative ofthe user being in a calm state. In some embodiments, determining whetherthe received user biometric data is within a predetermined confidencethreshold of similarity to stored biometric data may include comparingthe received user biometric data to the stored user biometric data, andbased on that comparison, method 700 may include determining a level ofsimilarity. In some embodiments, determining a level of similarity mayinclude determining whether a stress value associated with the receiveduser biometric data is within a range of stress values that are derivedfrom the stored user biometric data. In some embodiments, determining alevel of similarity may include determining a stress value associatedwith the received user biometric data, comparing that stress value to astress value associated with the stored user biometric data, anddetermining whether the stress value associated with the received userbiometric data is within a predetermined range of the stress valueassociated with the stored user biometric data. For example, method 700may include determining whether the whether the stress value associatedwith the received user biometric data is in a range of values that arebetween 80% and 120% of the stress value associated with the stored userbiometric data. In block 750, method 700 may include determining, basedon the determination that the user biometric data is within apredetermined confidence threshold of similarity to stored userbiometric data, that the stored user biometric data is indicative ofbiological information representative of the user being in a stressedstate.

In block 760, method 700 may include receiving a request to transferfunds. For example, in some embodiments, method 700 may includereceiving, from a user and via wearable user device 102 or usercomputing device 104, a request to transfer funds from a financialaccount associated with the user to another financial account. In block770, method 700 may include transmitting, to a financial serviceprovider, a notification that the requested transfer of funds waspotentially coerced. In some embodiments, the financial service providermay be associated with a recipient account associated with the requestedtransfer of funds. In certain embodiments, the notification that therequested transfer of funds was potentially coerced may be transmittedintegrally with, simultaneously with, or separate from the request totransfer funds.

In block 770, method 700 may include receiving a verification that therequested transfer of funds is a coerced transfer of funds. In someembodiments, the verification is received from the user, such as fromthe user and via wearable user device 102 or user computing device 104.In certain embodiments, receiving the verification may occur subsequentto transmitting the notification to the financial service provider. Insome embodiments, prior to receiving the verification, method 700 mayinclude transmitting a request for verification that the that therequested transfer of funds is a coerced transfer of funds, and in someembodiments, the request for verification may be sent to wearable userdevice 102, user computing device 104, or some other device.

In block 780, method 700 may include transmitting, to the financialservice provider, a request to stop, cancel, and/or refund, to afinancial account associated with the user, the transfer of funds. Incertain embodiments, method 700 may include determining whether thereceived verification indicates that the requested transfer is a coercedtransfer of funds or whether the received verification indicates thatthe requested transfer is not a coerced transfer of funds. In someembodiments, responsive to determining that the requested transfer isnot a coerced transfer of funds, method 700 may include no furtheraction. In some embodiments, responsive to determining that therequested transfer is not a coerced transfer of funds, method 700 mayinclude transmitting, to the financial service provider, a secondnotification indicating that the requested transfer of funds is not acoerced transfer of funds. In certain embodiments, method 700 mayinclude transmitting, to the financial service provider, the request tostop, cancel, and/or refund the transfer of funds in response todetermining that the requested transfer is a coerced transfer of funds.

As used in this application, the terms “component,” “module,” “system,”“server,” “processor,” “memory,” and the like are intended to includeone or more computer-related units, such as but not limited to hardware,firmware, a combination of hardware and software, software, or softwarein execution. For example, a component may be, but is not limited tobeing, a process running on a processor, an object, an executable, athread of execution, a program, and/or a computer. By way ofillustration, both an application running on a computing device and thecomputing device can be a component. One or more components can residewithin a process and/or thread of execution and a component may belocalized on one computer and/or distributed between two or morecomputers. In addition, these components can execute from variouscomputer readable media having various data structures stored thereon.The components may communicate by way of local and/or remote processessuch as in accordance with a signal having one or more data packets,such as data from one component interacting with another component in alocal system, distributed system, and/or across a network such as theInternet with other systems by way of the signal.

Certain embodiments and implementations of the disclosed technology aredescribed above with reference to block and flow diagrams of systems andmethods and/or computer program products according to exampleembodiments or implementations of the disclosed technology. It will beunderstood that one or more blocks of the block diagrams and flowdiagrams, and combinations of blocks in the block diagrams and flowdiagrams, respectively, can be implemented by computer-executableprogram instructions. Likewise, some blocks of the block diagrams andflow diagrams may not necessarily need to be performed in the orderpresented, may be repeated, or may not necessarily need to be performedat all, according to some embodiments or implementations of thedisclosed technology.

These computer-executable program instructions may be loaded onto ageneral-purpose computer, a special-purpose computer, a processor, orother programmable data processing apparatus to produce a particularmachine, such that the instructions that execute on the computer,processor, or other programmable data processing apparatus create meansfor implementing one or more functions specified in the flow diagramblock or blocks. These computer program instructions may also be storedin a computer-readable memory that can direct a computer or otherprogrammable data processing apparatus to function in a particularmanner, such that the instructions stored in the computer-readablememory produce an article of manufacture including instruction meansthat implement one or more functions specified in the flow diagram blockor blocks.

As an example, embodiments or implementations of the disclosedtechnology may provide for a computer program product, including acomputer-usable medium having a computer-readable program code orprogram instructions embodied therein, said computer-readable programcode adapted to be executed to implement one or more functions specifiedin the flow diagram block or blocks. Likewise, the computer programinstructions may be loaded onto a computer or other programmable dataprocessing apparatus to cause a series of operational elements or stepsto be performed on the computer or other programmable apparatus toproduce a computer-implemented process such that the instructions thatexecute on the computer or other programmable apparatus provide elementsor steps for implementing the functions specified in the flow diagramblock or blocks.

Accordingly, blocks of the block diagrams and flow diagrams supportcombinations of means for performing the specified functions,combinations of elements or steps for performing the specifiedfunctions, and program instruction means for performing the specifiedfunctions. It will also be understood that each block of the blockdiagrams and flow diagrams, and combinations of blocks in the blockdiagrams and flow diagrams, can be implemented by special-purpose,hardware-based computer systems that perform the specified functions,elements or steps, or combinations of special-purpose hardware andcomputer instructions.

Certain implementations of the disclosed technology are described abovewith reference to user devices may include mobile computing devices.Those skilled in the art recognize that there are several categories ofmobile devices, generally known as portable computing devices that canrun on batteries but are not usually classified as laptops. For example,mobile devices can include, but are not limited to portable computers,tablet PCs, internet tablets, PDAs, ultra-mobile PCs (UMPCs), wearabledevices, and smart phones. Additionally, implementations of thedisclosed technology can be utilized with internet of things (IoT)devices, smart televisions and media devices, appliances, automobiles,toys, and voice command devices, along with peripherals that interfacewith these devices.

In this description, numerous specific details have been set forth. Itis to be understood, however, that implementations of the disclosedtechnology may be practiced without these specific details. In otherinstances, well-known methods, structures and techniques have not beenshown in detail in order not to obscure an understanding of thisdescription. References to “one embodiment,” “an embodiment,” “someembodiments,” “example embodiment,” “various embodiments,” “oneimplementation,” “an implementation,” “example implementation,” “variousimplementations,” “some implementations,” etc., indicate that theimplementation(s) of the disclosed technology so described may include aparticular feature, structure, or characteristic, but not everyimplementation necessarily includes the particular feature, structure,or characteristic. Further, repeated use of the phrase “in oneimplementation” does not necessarily refer to the same implementation,although it may.

Throughout the specification and the claims, the following terms take atleast the meanings explicitly associated herein, unless the contextclearly dictates otherwise. The term “connected” means that onefunction, feature, structure, or characteristic is directly joined to orin communication with another function, feature, structure, orcharacteristic. The term “coupled” means that one function, feature,structure, or characteristic is directly or indirectly joined to or incommunication with another function, feature, structure, orcharacteristic. The term “or” is intended to mean an inclusive “or.”Further, the terms “a,” “an,” and “the” are intended to mean one or moreunless specified otherwise or clear from the context to be directed to asingular form. By “comprising” or “containing” or “including” is meantthat at least the named element, or method step is present in article ormethod, but does not exclude the presence of other elements or methodsteps, even if the other such elements or method steps have the samefunction as what is named.

While certain embodiments of this disclosure have been described inconnection with what is presently considered to be the most practicaland various embodiments, it is to be understood that this disclosure isnot to be limited to the disclosed embodiments, but on the contrary, isintended to cover various modifications and equivalent arrangementsincluded within the scope of the appended claims. Although specificterms are employed herein, they are used in a generic and descriptivesense only and not for purposes of limitation.

This written description uses examples to disclose certain embodimentsof the technology and also to enable any person skilled in the art topractice certain embodiments of this technology, including making andusing any apparatuses or systems and performing any incorporatedmethods. The patentable scope of certain embodiments of the technologyis defined in the claims, and may include other examples that occur tothose skilled in the art. Such other examples are intended to be withinthe scope of the claims if they have structural elements that do notdiffer from the literal language of the claims, or if they includeequivalent structural elements with insubstantial differences from theliteral language of the claims.

Exemplary Use Cases

The following exemplary use cases describe examples of a typical userflow pattern. They are intended solely for explanatory purposes and notin limitation. As digital transfers of funds become increasinglyubiquitous, there may be a corresponding decrease usage of physicalcurrency and thus a decrease in the likelihood that a given person willbe carrying physical currency. In light of this, a first person (e.g., amugger) attempting to coerce, steal, or otherwise take money from asecond person may force or coerce the second person to digitallytransfer funds from an account associated with the second person to anaccount associated with, or accessible by, the first person, forexample, under threat of physical force or nonphysical threats such asblackmail. Thus, it may be useful to institute measures to identifysituations in which a coerced transfer of funds is occurring or about tooccur, as well as measures to rectify or correct such a coerced transferof funds that has already occurred.

The system (e.g., system 100) can measure biometric data associated witha user and stores that biometric data as stored user biometric data. Thestored user biometric data can include biometric data indicative of theuser being in a stressed state, biometric data indicative of the userbeing in a calm state, or some combination of the two.

A user may use a banking application on a mobile device (e.g., usercomputing device 104) to transfer funds, and a trigger event can occurwhen a user opens the banking application. Alternately or in addition, atrigger event can occur when a user enters a particular area, enters aparticular area during a particular range of time, initiates a transferof funds within the banking application, initiates a transfer of funds(regardless of the device being used or whether a device is used atall), or initiates a transfer of funds above a threshold amount offunds. One or more devices (e.g., wearable user device 102, usercomputing device 104, transaction server 112, biometrics authenticationdevice 114) can detect a trigger event by receiving data from one ormore sensors (e.g., location data received from a GLS of wearable userdevice 102 or user computing device 104), by receiving certain inputfrom a user (e.g., receiving instructions to open a mobile bankingapplication installed on wearable user device 102 or user computingdevice 104). In response to detecting a trigger event, thesystem—whether by some mobile device (e.g., user computing device 104),wearable device (e.g., wearable user device 102), or some backendcomputing device (e.g., transaction server 112, biometricsauthentication device 114)—can request user biometric data, which may bemeasured by one or more sensors of a device (e.g., user computing device104) or wearable device (e.g., wearable user device 102) associated withthe user. The user biometric data may be transmitted from the devicemeasuring the biometric data (e.g., wearable user device 102, usercomputing device 104) to another device for evaluation (e.g., usercomputing device 104, biometrics authentication device 114). As the userbiometric data is measured, it may be compared in real-time or nearreal-time to the stored user biometric data. The user biometric data canbe compared to the stored user biometric data (by any capable device,such as wearable user device 102, user computing device 104, and/orbiometrics authentication device 114) to determine a level of similarityof the user biometric data to the stored user biometric data. Dependingon this comparison, the system can determine if the user biometric datais indicative of the user being in a stressed state. If the systemdetermines that the user biometric data is not indicative of the userbeing in a stressed state, the system may perform no further action. Ifthe system determines that the user biometric data is indicative of theuser being in a stressed state, the system may perform additionalactions, such as those detailed below.

The system can receive a request to transfer funds, and if the systemdetermined that the user biometric data is indicative of the user beingin a stressed state, the system can transmit, to a financial serviceprovider associated with the receiving account of the transfer of funds,a notification indicating that the requested transfer of funds waspotentially coerced. The system can receive confirmation regardingwhether the transfer of funds was coerced or not. If the transfer offunds was not coerced, the system can transmit a notification to thefinancial service provider indicating that the transfer of funds was notcoerced. If the transfer of funds was coerced, the system can transmit,to the financial service provider, a request to stop, cancel, and/orrefund the transfer of funds. Alternately or in addition, if thetransfer of funds was coerced, the system can transmit, to a lawenforcement organization, a notification indicating that a transfer offunds has been coerced and a last-known location of the user.Alternately or in addition, the system may transmit, to the lawenforcement organization, a location of the user when the coercedtransfer of funds transpired, a time or range of time during which thecoerced transfer of funds transpired, and information regarding thereceiving account of the coerced transfer of funds. Alternately or inaddition, the system may perform other precautionary safety measures,such as those described herein.

Certain implementations of the disclosed technology are described abovewith reference to block and flow diagrams of systems and methods and/orcomputer program products according to example implementations of thedisclosed technology. It will be understood that one or more blocks ofthe block diagrams and flow diagrams, and combinations of blocks in theblock diagrams and flow diagrams, respectively, can be implemented bycomputer-executable program instructions. Likewise, some blocks of theblock diagrams and flow diagrams may not necessarily need to beperformed in the order presented, may be repeated, or may notnecessarily need to be performed at all, according to someimplementations of the disclosed technology.

These computer-executable program instructions may be loaded onto ageneral-purpose computer, a special-purpose computer, a processor, orother programmable data processing apparatus to produce a particularmachine, such that the instructions that execute on the computer,processor, or other programmable data processing apparatus create meansfor implementing one or more functions specified in the flow diagramblock or blocks. These computer program instructions may also be storedin a computer-readable memory that can direct a computer or otherprogrammable data processing apparatus to function in a particularmanner, such that the instructions stored in the computer-readablememory produce an article of manufacture including instruction meansthat implement one or more functions specified in the flow diagram blockor blocks. As an example, implementations of the disclosed technologymay provide for a computer program product, including a computer-usablemedium having a computer-readable program code or program instructionsembodied therein, said computer-readable program code adapted to beexecuted to implement one or more functions specified in the flowdiagram block or blocks. Likewise, the computer program instructions maybe loaded onto a computer or other programmable data processingapparatus to cause a series of operational elements or steps to beperformed on the computer or other programmable apparatus to produce acomputer-implemented process such that the instructions that execute onthe computer or other programmable apparatus provide elements or stepsfor implementing the functions specified in the flow diagram block orblocks.

As used herein, unless otherwise specified the use of the ordinaladjectives “first,” “second,” “third,” etc., to describe a commonobject, merely indicate that different instances of like objects arebeing referred to, and are not intended to imply that the objects sodescribed must be in a given sequence, either temporally, spatially, inranking, or in any other manner.

We claim:
 1. A user device comprising: one or more processors; a memoryin communication with the one or more processors and storinginstructions, that when executed by one or more processors, cause thedevice to: record, by one or more biometric sensors, user-specificbaseline stress data and user-specific baseline calm data, theuser-specific baseline stress data being representative of biologicalinformation of a user being in a stressed state and the user-specificbaseline calm data being representative of biological information of theuser in a calm state; identify a trigger event associated with apotential transfer of funds; record situational data includingbiological information associated with a user in response to theidentified trigger event; responsive to determining that the situationaldata is above a predetermined level of similarity to the user-specificbaseline stress data, determine that a suspicious transaction isoccurring; initiate one or more precautionary safety measures, the oneor more precautionary safety measures comprising causing at least one ofa camera and a microphone associated with the user device to beginrecording; and confirm whether the suspicious transaction was a coercedtransaction by: generating a request for a confirmation of safety of theuser for verification of whether a requested transfer of funds wascoerced, the verification comprising user recitation of a securityphrase; recording, via the microphone a security phrase provided by theuser; saving the security phrase as recorded security data; andresponsive to the recorded security data being determined to be outsidethe predetermined level of similarity to stored voice data, determiningthat the requested transfer of funds is a coerced transfer of funds. 2.The device of claim 1, wherein responsive to the recorded security databeing determined to be within a predetermined level of similarity to thestored voice data associated with a predetermined security phrase,determining that the requested transfer of funds is a voluntary transferof funds.
 3. The device of claim 1, wherein initiating the one or moreprecautionary safety measures comprises, responsive to a determinationthat the recorded situational data is above a predetermined level ofsimilarity to the user-specific baseline stress data, determining thatsubsequently recorded situational data is above a predetermined level ofsimilarity to of the user-specific baseline calm data.
 4. The device ofclaim 1, wherein initiating the one or more precautionary safetymeasures further comprises, responsive to determining that the recordedsituational data is above a predetermined level of similarity to theuser-specific baseline stress data for a predetermined amount of time,transmit, to a law enforcement organization, a notification including alast-known location of the user device.
 5. The device of claim 1,wherein the user-specific baseline stress data, the user-specificbaseline calm data, or both, comprises heart rate data, blood pressuredata, brainwave signal data, respiratory rate data, or body temperaturedata, or combinations thereof.
 6. The device of claim 1, wherein thetrigger event comprises a request from the user to transfer funds abovea predetermined threshold.
 7. The device of claim 1, wherein the triggerevent comprises a request from the user to transfer funds to a newrecipient.
 8. The device of claim 1, wherein the instructions, whenexecuted by the one or more processors, further cause the device to:determine, by the one or more processors and via a geolocational sensorof the user device, a current location of the user; and determinewhether the current location of the user is associated with an areahaving a crime rate that is above a predetermined threshold, wherein thetrigger event is based at least in part on a determination that thecurrent location of the user is associated with the area having thecrime rate that is above the predetermined threshold.
 9. The device ofclaim 1, wherein the trigger event comprises a request from the user totransfer funds during a high-risk time, the high-risk time being apredetermined time of day that is indicative of a time at which the useris unlikely to transfer funds.
 10. The device of claim 1, wherein thetrigger event comprises a request from the user to transfer funds to anaccount associated with a known criminal.
 11. The device of claim 1,wherein the one or more precautionary safety measures comprises anaction selected from: denying a requested transfer of funds;transmitting, to a financial service provider server, instructions todeny the requested transfer of funds; or transmitting, to a financialservice provider server, instructions to freeze a financial accountassociated with the user.
 12. The device of claim 1, wherein the one ormore precautionary safety measures includes transmitting, to anemergency contact, a notification indicating that the user is involvedin a potentially dangerous situation.
 13. The device of claim 1, whereinthe one or more precautionary safety measures comprises a first tier ofprecautionary safety measures and a second tier of precautionary safetymeasures, the first tier of precautionary safety measures correspondingto a low risk rating associated with the trigger event and the secondtier of precautionary safety measures corresponding to a high riskrating associated with the trigger event; wherein the instructions, whenexecuted by the one or more processors, further cause the device todetermine a risk rating associated with the trigger event; whereininitiating one or more precautionary safety measures includes:responsive to determining, based at least in part on the risk rating,that the trigger event corresponds to the first tier of precautionarysafety measures, initiating one or more precautionary safety measures ofthe first tier of precautionary safety measures; and responsive todetermining, based at least in part on the risk rating, that the triggerevent corresponds to the second tier of precautionary safety measures,initiating one or more precautionary safety measures of the second tierof precautionary safety measures.
 14. The device of claim 9, wherein thehigh-risk time is configurable by the user.
 15. The device of claim 1,wherein: the user-specific baseline stress data comprises a plurality oftypes of biometric data, the situational data comprises a plurality oftypes of biometric data, each type of the plurality of types biometricdata of the situational data corresponding to a respective type of theplurality of types biometric data of the user-specific baseline stressdata, and determining that the recorded situational data is above apredetermined level of similarity to the user-specific baseline stressdata comprises determining that a majority of the plurality of types ofbiometric data of the situational data is above a predetermined level ofsimilarity to the corresponding types of the plurality of types ofbiometric data of the user-specific baseline stress data.
 16. The deviceof claim 1, wherein the instructions, when executed by the one or moreprocessors, further cause the device to: responsive to determining thatthe situational data is above a predetermined level of similarity to theuser-specific baseline stress data, cause at least one componentselected from a camera and a microphone associated with the user deviceto record environmental data; and analyze the recorded environmentaldata to verify that the trigger event corresponds to a coerced transferof funds.
 17. The device of claim 16, wherein the instructions, whenexecuted by the one or more processors, further cause the device to:responsive to verifying that the trigger event corresponds to a coercedtransfer of funds, transmit the recorded environmental data to asecurity personnel device for confirming the user is in a potentiallydangerous situation or is being coerced to transfer funds.
 18. Thedevice of claim 1, wherein initiating the one or more precautionarysafety measures comprises generating, responsive to determining that therecorded situational data is above the predetermined level of similarityto the user-specific baseline stress data, an artificial confirmationnotification indicating that the requested transfer of funds hassuccessfully resulted in funds deposited in a receiving accountassociated with the requested transfer of funds, wherein the user devicehas not initiated the requested transfer of funds when the artificialconfirmation notification is transmitted; wherein the instructions, whenexecuted by the one or more processors, further cause the device to:responsive to verifying that the requested transfer of funds was notcoerced, initiate the requested transfer of funds.
 19. A non-transitorycomputer readable medium storing program instructions, that whenexecuted by one or more processors of a user device cause the userdevice to perform the steps of: recording, by one or more biometricsensors, user-specific baseline stress data and user-specific baselinecalm data, the user-specific baseline stress data being representativeof biological information of a user being in a stressed state and theuser-specific baseline calm data being representative of biologicalinformation of the user in a calm state; identifying a trigger eventassociated with a potential transfer of funds; recording situationaldata including biological information associated with a user in responseto the identified trigger event; responsive to determining that thesituational data is above a predetermined level of similarity to theuser-specific baseline stress data, determining that a suspicioustransaction is occurring; initiating one or more precautionary safetymeasures, the one or more precautionary safety measures comprisingcausing at least one of a camera and a microphone associated with theuser device to begin recording; and confirming whether the suspicioustransaction was a coerced transaction by: generating a request forconfirmation of safety of the user, the request asking the user torecite a security phrase to verify whether a requested transfer of fundswas coerced; recording, via the microphone a security phrase provided bythe user and recorded by the microphone; saving the security phrase asrecorded security data; and responsive to the recorded security databeing determined to be outside the predetermined level of similarity tostored voice data, determining that the requested transfer of funds is acoerced transfer of funds.
 20. A method comprising: recording, by one ormore biometric sensors, user-specific baseline stress data anduser-specific baseline calm data, the user-specific baseline stress databeing representative of biological information of a user being in astressed state and the user-specific baseline calm data beingrepresentative of biological information of the user in a calm state;identifying a trigger event associated with a potential transfer offunds; recording situational data including biological informationassociated with a user in response to the identified trigger event;responsive to determining that the situational data is above apredetermined level of similarity to the user-specific baseline stressdata, determining that a suspicious transaction is occurring; initiatingone or more precautionary safety measures, the one or more precautionarysafety measures comprising causing at least one of a camera and amicrophone associated with a user device to begin recording; andconfirming whether the suspicious transaction was a coerced transactionby: generating a request for confirmation of safety of the user, therequest asking the user to recite a security phrase to verify whether arequested transfer of funds was coerced; recording, via the microphone asecurity phrase provided by the user; saving the security phrase asrecorded security data; and responsive to the recorded security databeing determined to be outside the predetermined level of similarity tostored voice data, determining that the requested transfer of funds is acoerced transfer of funds.