Card-less financial transaction

ABSTRACT

Systems (and corresponding methodologies) that facilitate card-less financial transactions are provided. The innovation enables card-less ATM (automated teller machine) transactions such as cash withdrawals, transfers, balance inquiries, etc. In aspects, customers can set up an ‘electronic wallet’ account based upon a pre-set range or otherwise. Accordingly, access to the ‘electronic wallet’ is granted or denied based upon responses to challenges presented.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a Continuation of pending U.S. patent applicationSer. No. 12/233,162 entitled “CARD-LESS FINANCIAL TRANSACTION” and filedSep. 18, 2008. The entirety of the above-noted application isincorporated by reference herein.

BACKGROUND

Today, many users conduct their day-to-day cash withdrawals usingautomated teller machines or ATMs. Financial institutions issuecustomers ATM cards by which money can be accessed from customer'saccounts. Additionally, customers can conduct banking business, such astransfers, deposits, etc. by way of an ATM. In order to use their ATMcard to withdraw cash or transact business, customers must enter theirpersonal identification number (PIN) in addition to physically enteringtheir card into the machine.

Most often, a PIN number is a four digit numerical number. This number,or secret pass-code, is often randomly generated by the financialinstitution that issues the card. Oftentimes, customers are able tomodify or personalize this code either by contacting customer service oralternative via a Web or Internet interface. Many users select numberssuch as birthdays, telephone numbers, anniversaries, social securitynumbers or the like as their PIN numbers.

As will be understood, the selection of logical and meaningful numberscan greatly decrease security of the ATM card/PIN combination. In otherwords, if a physical card ends up in the hands of an unscrupulous ormalicious offender, it may be possible for the PIN code to discovered,if logical codes are selected.

As described above, an ATM is a computerized device that providesfinancial institution customers with access to funds and the ability totrigger transactions in a public space without the need for a human(e.g., bank teller) interaction. With regard to most conventional ATMs,the customer is identified by inserting a bank-issued plastic card(e.g., ‘ATM card’). This ATM card is similar to a conventional creditcard in that it is usually equipped with a magnetic strip (or chip) thatincludes a unique card number together with security and identificationinformation. As described above, to eliminate the possibility ofunauthorized use, the customer enters a PIN number to validate identityor authorization.

Similar to physical visits to a bank branch, an ATM enables customers toaccess their bank accounts in order to make cash withdrawals or advances(e.g., credit card cash advances). Unfortunately, the conventionalmechanisms that require a plastic card are inconvenient in that theyrequire a user to carry the plastic card in order to be able accessfunds via an ATM.

SUMMARY

The following presents a simplified summary of the innovation in orderto provide a basic understanding of some aspects of the innovation. Thissummary is not an extensive overview of the innovation. It is notintended to identify key/critical elements of the innovation or todelineate the scope of the innovation. Its sole purpose is to presentsome concepts of the innovation in a simplified form as a prelude to themore detailed description that is presented later.

The innovation disclosed and claimed herein, in one aspect thereof,comprises systems (and corresponding methodologies) that facilitatecard-less financial transactions. For example, the innovation enablescard-less ATM (automated teller machine) transactions such as cashwithdrawals, transfers, balance inquiries, etc. In aspects, customerscan set up an ‘electronic wallet’ account based upon a pre-set range orotherwise. Accordingly, access to the ‘electronic wallet’ is granted ordenied based upon responses to challenges presented. These challengescan represent most any information known by the customer, for example,personal identification number (PIN), social security number, mother'smaiden name, etc.

In another aspect of the subject innovation, retrofits of existing ATMswould not require a change in hardware. Rather, a software update orpush could be accomplished to enable the ATMs to service card-lesstransactions. As well, biometrics can be employed to enhanceverification/authentication prior to permitting a card-less financialtransaction, e.g., cash withdrawal. However, it is to be understood thatbiometric validation is optional to aspects of the innovation.

In yet other aspects thereof, a machine learning and reasoning componentis provided that employs a probabilistic and/or statistical-basedanalysis to prognose or infer an action that a user desires to beautomatically performed.

To the accomplishment of the foregoing and related ends, certainillustrative aspects of the innovation are described herein inconnection with the following description and the annexed drawings.These aspects are indicative, however, of but a few of the various waysin which the principles of the innovation can be employed and thesubject innovation is intended to include all such aspects and theirequivalents. Other advantages and novel features of the innovation willbecome apparent from the following detailed description of theinnovation when considered in conjunction with the drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates an example system that enables card-less automatedteller transactions in accordance with aspects of the innovation.

FIG. 2 illustrates an example card-less interface component thatfacilitates card-less teller transactions in accordance with aspects ofthe innovation.

FIG. 3 illustrates an example analysis component in accordance with anaspect of the innovation.

FIG. 4 illustrates an example challenge/response component that enablesa user to manage security preferences such as questions presented, fundsavailability, etc. in accordance with aspects of the innovation.

FIG. 5 illustrates an architecture including a machine learning andreasoning component that can automate functionality in accordance withan aspect of the innovation.

FIG. 6 illustrates an example flow chart of procedures that facilitatecard-less transactions in accordance with an aspect of the innovation.

FIG. 7 illustrates an example flow chart of procedures that facilitatesetting of security parameters in accordance with an aspect of theinnovation.

FIG. 8 illustrates a block diagram of a computer operable to execute thedisclosed architecture.

FIG. 9 illustrates a schematic block diagram of an exemplary computingenvironment in accordance with the subject innovation.

DETAILED DESCRIPTION

The innovation is now described with reference to the drawings, whereinlike reference numerals are used to refer to like elements throughout.In the following description, for purposes of explanation, numerousspecific details are set forth in order to provide a thoroughunderstanding of the subject innovation. It may be evident, however,that the innovation can be practiced without these specific details. Inother instances, well-known structures and devices are shown in blockdiagram form in order to facilitate describing the innovation.

As used in this application, the terms “component” and “system” areintended to refer to a computer-related entity, either hardware, acombination of hardware and software, software, or software inexecution. For example, a component can be, but is not limited to being,a process running on a processor, a processor, an object, an executable,a thread of execution, a program, and/or a computer. By way ofillustration, both an application running on a server and the server canbe a component. One or more components can reside within a processand/or thread of execution, and a component can be localized on onecomputer and/or distributed between two or more computers.

As used herein, the term to “infer” or “inference” refer generally tothe process of reasoning about or inferring states of the system,environment, and/or user from a set of observations as captured viaevents and/or data. Inference can be employed to identify a specificcontext or action, or can generate a probability distribution overstates, for example. The inference can be probabilistic—that is, thecomputation of a probability distribution over states of interest basedon a consideration of data and events. Inference can also refer totechniques employed for composing higher-level events from a set ofevents and/or data. Such inference results in the construction of newevents or actions from a set of observed events and/or stored eventdata, whether or not the events are correlated in close temporalproximity, and whether the events and data come from one or severalevent and data sources.

Referring initially to the drawings, FIG. 1 illustrates an example blockdiagram of a system 100 that facilitates card-less transactions inaccordance with aspects of the innovation. While specific examples aredescribed herein, it is to be understood that these examples areprovided to add perspective to the innovation. Accordingly, thefeatures, functions and benefits described herein can be applied toalternative aspects which are to be included within the scope of thisdisclosure and claims appended hereto.

Generally, the system 100 can include an account access managementsystem 102 that enables card-less interface and security related toaccount management and related transactions. As illustrated, customers,such as ATM (automated teller machine) customers can interact and gainaccess to the account access management system 102 merely by inputtinginformation (e.g., without the use of a conventional plastic card). Inaspects, the customer can set preferences, policies, balances, etc. byway of a user interface (UI). These preferences, policies and balancescan regulate exposure with regard to an account, such as an ‘electronicwallet’ account.

By way of example, a user can transfer some fixed amount of money intoan ‘electronic wallet’ account (separate from their main savingsaccount). This balance amount can be based upon a transfer, oralternatively, can be based upon a policy or preference (e.g., tomaintain a specified balance in the account). Still further, it can bepossible for the system 100 to employ machine learning and reasoning(MLR) schemes to infer an appropriate amount to hold within thecard-less accessible account based upon an inferred user intention orcontext. These MLR examples will be better understood upon a review ofthe discussion infra.

Turning to an example related to the innovation, suppose a user goes outfor an exercise jog. Additionally, suppose the user forgets to take (orintentionally leaves) her wallet at home. Here, in the event that thejogger wanted to purchase a bottle of water, it is not possible towithdraw money from a conventional ATM. However, in accordance with theinnovation, so long as funds are available or, alternatively, the joggerpre-transfers funds to a specified account prior to leaving to exercise,it can be possible to withdraw cash without a physical plastic card.Here, the jogger can merely enter their account number (or otheridentification information) followed by a secret pass-code or PIN(personal identification number) to gain access to the funds. As will beunderstood upon a review of the examples and figures that follow,additional security features (e.g., policy-based and adaptivechallenge/response systems) can be employed to enhance security of thecard-less systems.

While many examples employ a separate account to enhance security, it isto be understood that the features, functions and benefits of theinnovation can be employed in connection with most any account withoutdeparting from the spirit and/or scope of the innovation. In otherwords, in accordance with aspects, an account separated from acustomer's primary account(s) can be employed as a ‘temporary’ or‘electronic wallet’ account. As well, if desired, access to primaryaccounts can also be effected by way of the card-less systems andtechniques described herein.

In operation, in aspects, a user can employ a card-less interfacecomponent 104 to set security preferences as well as to transfer moniesfrom a primary account into a temporary or card-less accessible account.As described supra, and described in great detail infra, a user canaccess funds within a temporary account or ‘electronic wallet’ merely byentering information into a system, for example an ATM. While atemporary account scenario is described herein, it is to be understoodthat other examples employ access to a primary account without departingfrom the spirit and/or scope of the innovation and claims appendedhereto.

An analysis component 106 can be employed to evaluate credentials andother information thereby granting or denying access to funds. As well,the analysis component 106 can grant or deny access or permission totransact without a physical card, for example, without an ATM card asused by traditional ATMs. As shown in FIG. 1, the account accessmanagement component 102, together with sub-components 104, 106, enablesa customer to access funds and/or to transact banking actions (e.g.,transfers) without a need for a physical card. Rather, the customer canemploy only information committed to memory thereby eliminating a needfor an ATM or other card-like media. Additionally, because informationis transferred from memory, security is enhanced.

Still further, in aspects, customers are able to personalize theirsecurity challenge/responses, thus, security can further be enhanced.This, together with the ability to regulate funds, e.g., amounts in atemporary account, it is possible for customers to regulate theirexposure. In other words, customers can maintain most any amount in anaccount which is accessible without a physical card.

Turning now to FIG. 2, a block diagram of a card-less interfacecomponent 104 is shown in accordance with an aspect of the innovation.As illustrated, the card-less interface component 104 can include aretrieval component 202 and an action component 204. Together, thesesub-components 202, 204 facilitate implementation of an action which canbe triggered without a physical card, as used in conventional systems.

In other words, a user can trigger an action merely by enteringcredentials into a machine or other UI (e.g., card-less interfacecomponent 104). Information entered by a customer can be captured by theretrieval component 202 which interacts with the analysis component (106of FIG. 1). As described above, the analysis component 106 evaluates thecredentials thereby permitting or denying an action which can beeffected by the action component 204. For instance, the action component204 can effect actions such as cash withdrawals, for example, from aprimary or ‘electronic wallet’ account. Additionally, the actioncomponent 204 can effect, fund transfers, postage purchases, ticketpurchases, among other actions.

FIG. 3 illustrates an example block diagram of an analysis component 106in accordance with aspects of the innovation. As described above, theanalysis component 106 interacts with the card-less interface component104 to effect actions without a physical medium (e.g., ATM card).Rather, the analysis component 106 is capable of evaluating credentialsin order to permit or deny actions.

In addition to verifying credentials, the analysis component 106 can beemployed to select challenge/response parameters which verify identitythat regulates access. For instance, the challenge can be as simple as arequest for a PIN (personal identification number) to more personalparameters, such as, the customer's mother's maiden name, first pet'sname, favorite car, favorite food, etc. It is to be understood that mostany criteria or parameter can be employed in a challenge/responsescheme. In one simple example, a user can be prompted to enter theiraccount number together with a PIN to gain access to funds or tootherwise transaction financial business.

It is to be understood that other aspects can employ biometricauthentication and/or verification. For example, a fingerprint, voiceprint, facial scan, retina scan or the like can be employed to effectthe verification process and therefore permit or deny access. It is tobe understood that most of the features, functions and benefits can beimplemented merely by updating or pushing updates to conventionalsystems (e.g., ATMs) thereby retrofitting conventional machines toutilize the card-less aspects and functionality. Additionally, in otheraspects, biometrics or the like can be employed in specially equippedmachines or retrofitted machines as appropriate.

As shown, the analysis component 106 can include a challenge/responsecomponent 302 and a verification component 304. In operation, thechallenge/response component 302 can select an appropriatechallenge/response based upon a preference, policy or inference. Forinstance, a user can set the challenge/response questions which will berendered for identification. By way of example, challenges/responses canrange from entry of a PIN, mother's maiden name, favorite food, licenseplate number, or the like. As well, selection of appropriate questionscan be triggered or presented based upon user identity, type oftransaction, amount of withdrawal or the like. Essentially, logic can bebuilt-in which manages selection.

The verification component 304 can verify the identity (orauthorization) of a user based upon analysis of challenge/responseinformation. As shown, a store 306 can be employed to maintain a set ofchallenge/responses together with preferences and policies by which theyare selected for identity verification. As well, the store 306 can beemployed to maintain account information, for example, theamount/balance of funds in a temporary account which is accessible byway of card-less verification.

Turning now to FIG. 4, a block diagram of an example system 400 thatfacilitates management of challenge/response information in accordancewith aspects is shown. Additionally, system 400 can be employed to setaside (or otherwise designate) funds which are accessible by way ofcard-less transactions. As shown in FIG. 4, a user interface (UI)component 402 can be employed to facilitate interaction between a userand the challenge/response component 302.

In one aspect, the UI component 402 enables a user to designate anamount of funds which can be transferred into an ‘electronic wallet’ andtherefore, accessible by way of card-less transactions. Additionally,most any preference and/or policy can be set by way of the UI component402. For example, preferences and policies that identify securitythresholds (e.g., types of challenges/responses, number ofchallenges/responses . . . ) can be set by way of the UI component 402.

As illustrated in FIG. 4, the challenge/response management component302 can include a security question management component 404, a securityanswer management component 406 and an account information managementcomponent 408. Together, these sub-components (404, 406, 408) facilitateidentification of, tracking of, indexing of, and retrieval ofappropriate security challenge/response information with respect to anidentity, type of transaction, amount of transaction, etc. Additionally,the account information management component 408 can be employed toregulate access to funds, the amount of which can be identified by auser via UI component 402.

FIG. 5 illustrates an example block diagram of an alternative system 500in accordance with aspects of the innovation. As shown system 500employs a machine learning and reasoning (MLR) component 502 whichfacilitates automating one or more features in accordance with thesubject innovation. The subject innovation (e.g., in connection withselecting security challenges) can employ various MLR-based schemes forcarrying out various aspects thereof. For example, a process fordetermining which security questions or challenges to present based uponan amount of withdrawal, type of transaction, etc. can be facilitatedvia an automatic classifier system and process.

A classifier is a function that maps an input attribute vector, x=(x1,x2, x3, x4, xn), to a confidence that the input belongs to a class, thatis, f(x)=confidence(class). Such classification can employ aprobabilistic and/or statistical-based analysis (e.g., factoring intothe analysis utilities and costs) to prognose or infer an action that auser desires to be automatically performed.

A support vector machine (SVM) is an example of a classifier that can beemployed. The SVM operates by finding a hypersurface in the space ofpossible inputs, which the hypersurface attempts to split the triggeringcriteria from the non-triggering events. Intuitively, this makes theclassification correct for testing data that is near, but not identicalto training data. Other directed and undirected model classificationapproaches include, e.g., naïve Bayes, Bayesian networks, decisiontrees, neural networks, fuzzy logic models, and probabilisticclassification models providing different patterns of independence canbe employed. Classification as used herein also is inclusive ofstatistical regression that is utilized to develop models of priority.

As will be readily appreciated from the subject specification, thesubject innovation can employ classifiers that are explicitly trained(e.g., via a generic training data) as well as implicitly trained (e.g.,via observing user behavior, receiving extrinsic information). Forexample, SVM's are configured via a learning or training phase within aclassifier constructor and feature selection module. Thus, theclassifier(s) can be used to automatically learn and perform a number offunctions, including but not limited to determining according to apredetermined criteria which security challenges to present, how manysecurity challenges to present, when/if to replenish funds in an‘electronic wallet,’ etc.

FIG. 6 illustrates a methodology of card-less financial transactions inaccordance with an aspect of the innovation. While, for purposes ofsimplicity of explanation, the one or more methodologies shown herein,e.g., in the form of a flow chart, are shown and described as a seriesof acts, it is to be understood and appreciated that the subjectinnovation is not limited by the order of acts, as some acts may, inaccordance with the innovation, occur in a different order and/orconcurrently with other acts from that shown and described herein. Forexample, those skilled in the art will understand and appreciate that amethodology could alternatively be represented as a series ofinterrelated states or events, such as in a state diagram. Moreover, notall illustrated acts may be required to implement a methodology inaccordance with the innovation.

At 602, user/account identification information can be received. Forexample, a user can enter information by way of a UI, for example, at anATM, kiosk, etc. In one example, the information can be a user'snumerical account number. Additionally, information related to the typeof transaction or amount of withdrawal can be entered. Verificationrules can be accessed at 604. Alternatively, verification (e.g.,security) rules can be inferred, for example, based upon a type oftransaction, amount of withdrawal or other preference or policy. Whilethis example includes input of a proposed transaction prior toverification, it is to be understood that other aspects exist wherebyverification is performed prior to verification of identification.

At 606, an appropriate security challenge is presented. As describedabove, the security challenge can be based upon the transaction type (orcharacteristics) as well as preferences, policies, etc. While a singlechallenge is illustrated, it is to be understood that this process canbe recursive such that additional challenges can be selected andpresented. At 608, a determination is made to establish if the responseto a subject challenge is correct. Effectively, the decision at 608establishes the verification which grants or denies access to accountfeatures and/or funds.

As illustrated, if the response is deemed incorrect at 608, themethodology returns to 606 to render another challenge. Although notillustrated, this recursive path can be limited to a specified number ofincorrect responses, or alternatively, to a single incorrect response.If the response to the challenge is deemed correct at 608, themethodology progresses to 610 to permit access to the action.

As illustrated, cash can be dispensed at 612 or other transactions(e.g., postage purchase, funds transfer . . . ) can be effected at 614.While specific actions are illustrated in FIG. 6, it is to be understoodthat other aspects can employ other actions without departing from thespirit and/or scope of the innovation and claims appended hereto.

Turning now to FIG. 7, a process flow of a methodology that facilitatessetting user preferences/policies in accordance with aspects is shown.At 702, a UI can be rendered to a user. As described herein, this UI canbe rendered by way of an online (e.g., Internet, intranet) site, an ATM,a kiosk, a mobile phone applet, etc. A user can interact with the UI andinput(s) can be received at 704. For example, a user can specifychallenges and correct responses. Additionally, a user can specifytransfer amounts to place into an ‘electronic wallet’ account which isaccessible by way of a card-less transaction.

The input is processed at 706 to establish the type of input, purpose ofinput, etc. The additional input decision block at 708 demonstrates therecursive characteristics of the process flow. Here, additional inputscan be received by returning the flow to 702. Once all inputs areentered, the information (e.g., challenges, responses, amounts totransfer . . . ) is recorded at 710. For example, the information can berecorded into a store, e.g., store 306 of FIG. 3.

Referring now to FIG. 8, there is illustrated a block diagram of acomputer operable to execute the disclosed architecture. In order toprovide additional context for various aspects of the subjectinnovation, FIG. 8 and the following discussion are intended to providea brief, general description of a suitable computing environment 800 inwhich the various aspects of the innovation can be implemented. Whilethe innovation has been described above in the general context ofcomputer-executable instructions that may run on one or more computers,those skilled in the art will recognize that the innovation also can beimplemented in combination with other program modules and/or as acombination of hardware and software.

Generally, program modules include routines, programs, components, datastructures, etc., that perform particular tasks or implement particularabstract data types. Moreover, those skilled in the art will appreciatethat the inventive methods can be practiced with other computer systemconfigurations, including single-processor or multiprocessor computersystems, minicomputers, mainframe computers, as well as personalcomputers, hand-held computing devices, microprocessor-based orprogrammable consumer electronics, and the like, each of which can beoperatively coupled to one or more associated devices.

The illustrated aspects of the innovation may also be practiced indistributed computing environments where certain tasks are performed byremote processing devices that are linked through a communicationsnetwork. In a distributed computing environment, program modules can belocated in both local and remote memory storage devices.

A computer typically includes a variety of computer-readable media.Computer-readable media can be any available media that can be accessedby the computer and includes both volatile and nonvolatile media,removable and non-removable media. By way of example, and notlimitation, computer-readable media can comprise computer storage mediaand communication media. Computer storage media includes both volatileand nonvolatile, removable and non-removable media implemented in anymethod or technology for storage of information such ascomputer-readable instructions, data structures, program modules orother data. Computer storage media includes, but is not limited to, RAM,ROM, EEPROM, flash memory or other memory technology, CD-ROM, digitalversatile disk (DVD) or other optical disk storage, magnetic cassettes,magnetic tape, magnetic disk storage or other magnetic storage devices,or any other medium which can be used to store the desired informationand which can be accessed by the computer.

Communication media typically embodies computer-readable instructions,data structures, program modules or other data in a modulated datasignal such as a carrier wave or other transport mechanism, and includesany information delivery media. The term “modulated data signal” means asignal that has one or more of its characteristics set or changed insuch a manner as to encode information in the signal. By way of example,and not limitation, communication media includes wired media such as awired network or direct-wired connection, and wireless media such asacoustic, RF, infrared and other wireless media. Combinations of the anyof the above should also be included within the scope ofcomputer-readable media.

With reference again to FIG. 8, the exemplary environment 800 forimplementing various aspects of the innovation includes a computer 802,the computer 802 including a processing unit 804, a system memory 806and a system bus 808. The system bus 808 couples system componentsincluding, but not limited to, the system memory 806 to the processingunit 804. The processing unit 804 can be any of various commerciallyavailable processors. Dual microprocessors and other multi-processorarchitectures may also be employed as the processing unit 804.

The system bus 808 can be any of several types of bus structure that mayfurther interconnect to a memory bus (with or without a memorycontroller), a peripheral bus, and a local bus using any of a variety ofcommercially available bus architectures. The system memory 806 includesread-only memory (ROM) 810 and random access memory (RAM) 812. A basicinput/output system (BIOS) is stored in a non-volatile memory 810 suchas ROM, EPROM, EEPROM, which BIOS contains the basic routines that helpto transfer information between elements within the computer 802, suchas during start-up. The RAM 812 can also include a high-speed RAM suchas static RAM for caching data.

The computer 802 further includes an internal hard disk drive (HDD) 814(e.g., EIDE, SATA), which internal hard disk drive 814 may also beconfigured for external use in a suitable chassis (not shown), amagnetic floppy disk drive (FDD) 816, (e.g., to read from or write to aremovable diskette 818) and an optical disk drive 820, (e.g., reading aCD-ROM disk 822 or, to read from or write to other high capacity opticalmedia such as the DVD). The hard disk drive 814, magnetic disk drive 816and optical disk drive 820 can be connected to the system bus 808 by ahard disk drive interface 824, a magnetic disk drive interface 826 andan optical drive interface 828, respectively. The interface 824 forexternal drive implementations includes at least one or both ofUniversal Serial Bus (USB) and IEEE 1394 interface technologies. Otherexternal drive connection technologies are within contemplation of thesubject innovation.

The drives and their associated computer-readable media providenonvolatile storage of data, data structures, computer-executableinstructions, and so forth. For the computer 802, the drives and mediaaccommodate the storage of any data in a suitable digital format.Although the description of computer-readable media above refers to aHDD, a removable magnetic diskette, and a removable optical media suchas a CD or DVD, it should be appreciated by those skilled in the artthat other types of media which are readable by a computer, such as zipdrives, magnetic cassettes, flash memory cards, cartridges, and thelike, may also be used in the exemplary operating environment, andfurther, that any such media may contain computer-executableinstructions for performing the methods of the innovation.

A number of program modules can be stored in the drives and RAM 812,including an operating system 830, one or more application programs 832,other program modules 834 and program data 836. All or portions of theoperating system, applications, modules, and/or data can also be cachedin the RAM 812. It is appreciated that the innovation can be implementedwith various commercially available operating systems or combinations ofoperating systems.

A user can enter commands and information into the computer 802 throughone or more wired/wireless input devices, e.g., a keyboard 838 and apointing device, such as a mouse 840. Other input devices (not shown)may include a microphone, an IR remote control, a joystick, a game pad,a stylus pen, touch screen, or the like. These and other input devicesare often connected to the processing unit 804 through an input deviceinterface 842 that is coupled to the system bus 808, but can beconnected by other interfaces, such as a parallel port, an IEEE 1394serial port, a game port, a USB port, an IR interface, etc.

A monitor 844 or other type of display device is also connected to thesystem bus 808 via an interface, such as a video adapter 846. Inaddition to the monitor 844, a computer typically includes otherperipheral output devices (not shown), such as speakers, printers, etc.

The computer 802 may operate in a networked environment using logicalconnections via wired and/or wireless communications to one or moreremote computers, such as a remote computer(s) 848. The remotecomputer(s) 848 can be a workstation, a server computer, a router, apersonal computer, portable computer, microprocessor-based entertainmentappliance, a peer device or other common network node, and typicallyincludes many or all of the elements described relative to the computer802, although, for purposes of brevity, only a memory/storage device 850is illustrated. The logical connections depicted include wired/wirelessconnectivity to a local area network (LAN) 852 and/or larger networks,e.g., a wide area network (WAN) 854. Such LAN and WAN networkingenvironments are commonplace in offices and companies, and facilitateenterprise-wide computer networks, such as intranets, all of which mayconnect to a global communications network, e.g., the Internet.

When used in a LAN networking environment, the computer 802 is connectedto the local network 852 through a wired and/or wireless communicationnetwork interface or adapter 856. The adapter 856 may facilitate wiredor wireless communication to the LAN 852, which may also include awireless access point disposed thereon for communicating with thewireless adapter 856.

When used in a WAN networking environment, the computer 802 can includea modem 858, or is connected to a communications server on the WAN 854,or has other means for establishing communications over the WAN 854,such as by way of the Internet. The modem 858, which can be internal orexternal and a wired or wireless device, is connected to the system bus808 via the serial port interface 842. In a networked environment,program modules depicted relative to the computer 802, or portionsthereof, can be stored in the remote memory/storage device 850. It willbe appreciated that the network connections shown are exemplary andother means of establishing a communications link between the computerscan be used.

The computer 802 is operable to communicate with any wireless devices orentities operatively disposed in wireless communication, e.g., aprinter, scanner, desktop and/or portable computer, portable dataassistant, communications satellite, any piece of equipment or locationassociated with a wirelessly detectable tag (e.g., a kiosk, news stand,restroom), and telephone. This includes at least Wi-Fi and Bluetooth™wireless technologies. Thus, the communication can be a predefinedstructure as with a conventional network or simply an ad hoccommunication between at least two devices.

Wi-Fi, or Wireless Fidelity, allows connection to the Internet from acouch at home, a bed in a hotel room, or a conference room at work,without wires. Wi-Fi is a wireless technology similar to that used in acell phone that enables such devices, e.g., computers, to send andreceive data indoors and out; anywhere within the range of a basestation. Wi-Fi networks use radio technologies called IEEE 802.11(a, b,g, etc.) to provide secure, reliable, fast wireless connectivity. AWi-Fi network can be used to connect computers to each other, to theInternet, and to wired networks (which use IEEE 802.3 or Ethernet).Wi-Fi networks operate in the unlicensed 2.4 and 5 GHz radio bands, atan 11 Mbps (802.11a) or 54 Mbps (802.11b) data rate, for example, orwith products that contain both bands (dual band), so the networks canprovide real-world performance similar to the basic 10BaseT wiredEthernet networks used in many offices.

Referring now to FIG. 9, there is illustrated a schematic block diagramof an exemplary computing environment 900 in accordance with the subjectinnovation. The system 900 includes one or more client(s) 902. Theclient(s) 902 can be hardware and/or software (e.g., threads, processes,computing devices). The client(s) 902 can house cookie(s) and/orassociated contextual information by employing the innovation, forexample.

The system 900 also includes one or more server(s) 904. The server(s)904 can also be hardware and/or software (e.g., threads, processes,computing devices). The servers 904 can house threads to performtransformations by employing the innovation, for example. One possiblecommunication between a client 902 and a server 904 can be in the formof a data packet adapted to be transmitted between two or more computerprocesses. The data packet may include a cookie and/or associatedcontextual information, for example. The system 900 includes acommunication framework 906 (e.g., a global communication network suchas the Internet) that can be employed to facilitate communicationsbetween the client(s) 902 and the server(s) 904.

Communications can be facilitated via a wired (including optical fiber)and/or wireless technology. The client(s) 902 are operatively connectedto one or more client data store(s) 908 that can be employed to storeinformation local to the client(s) 902 (e.g., cookie(s) and/orassociated contextual information). Similarly, the server(s) 904 areoperatively connected to one or more server data store(s) 910 that canbe employed to store information local to the servers 904.

What has been described above includes examples of the innovation. Itis, of course, not possible to describe every conceivable combination ofcomponents or methodologies for purposes of describing the subjectinnovation, but one of ordinary skill in the art may recognize that manyfurther combinations and permutations of the innovation are possible.Accordingly, the innovation is intended to embrace all such alterations,modifications and variations that fall within the spirit and scope ofthe appended claims. Furthermore, to the extent that the term “includes”is used in either the detailed description or the claims, such term isintended to be inclusive in a manner similar to the term “comprising” as“comprising” is interpreted when employed as a transitional word in aclaim.

What is claimed is:
 1. A system that facilitates a card-less financialtransaction, comprising: employing a processor that executes computerexecutable instructions stored on the memory to implement the followingcomponents: an interface component that facilitates card-less input of aplurality of account credentials; and an analysis component thatevaluates a subset of the account credentials and at least one ofapproves or denies the card-less financial transaction, wherein thefinancial transaction is associated with a non-virtual account.
 2. Thesystem of claim 1, wherein the financial transaction is a withdrawal andwherein a balance of the non-virtual account is replenished with anamount based upon the cash withdrawal.
 3. The system of claim 1, whereinthe withdrawal is made from an account separate from a primary accountwherein funds are maintained in the account separate from the primaryaccount and designated for card-less access.
 4. The system of claim 1,wherein the financial transaction is at least one of a fund transfer, orbalance inquiry.
 5. The system of claim 1, further comprising aretrieval component that captures the plurality of account credentialsvia verbal input from an account owner.
 6. The system of claim 1,further comprising an action component that triggers the card-lessfinancial transaction based upon a successful validation of the subsetof the plurality of account credentials.
 7. The system of claim 6,wherein the transaction is at least one of a withdrawal, fund transfer,balance inquiry.
 8. The system of claim 1, further comprising avalidation component that facilitates confirmation of a subset of theplurality of account credentials.
 9. The system of claim 1, furthercomprising a challenge/response component that establishes anappropriate challenge based upon at least one of type of the financialaction or amount of the financial action.
 10. The system of claim 9,further comprising a security question management component thatmaintains the appropriate challenge based upon the at least one of typeof financial action or amount of the financial action.
 11. The system ofclaim 9, further comprising a security answer management component thatmaintains an answer to the appropriate challenge based upon a userpreference.
 12. The system of claim 9, further comprising an accountinformation management component facilitates designation of funds in an‘electronic wallet’ account that is accessible via the card-lessfinancial transaction.
 13. The system of claim 1, further comprising amachine learning and reasoning component that employs at least one of aprobabilistic and a statistical-based analysis that infers an action onbehalf of a user.
 14. A computer-implemented method of card-lessfinancial transaction, comprising: employing a processor that executescomputer readable instructions stored on a computer readable storagemedium to implement the following acts: evaluating a plurality ofcard-less account credentials based as least in part upon one of type oramount of the card-less financial transaction; and at least one ofpermitting or denying the card-less transaction as a function of aresult of the evaluation.
 15. The computer-implemented method of claim14, further comprising receiving information related to the card-lessfinancial transaction, wherein the financial transaction is a cashwithdrawal from an ‘electronic wallet’ account, wherein the ‘electronicwallet’ account maintains a designated balance.
 16. Thecomputer-implemented method of claim 15, further comprising transferringfunds into the ‘electronic wallet’ account based upon a policy.
 17. Thecomputer-implemented method of claim 14, further comprising: accessing arule based upon the card-less financial transaction; presenting asecurity challenge based upon the rule; receiving a response to thesecurity challenge; and evaluating the response, wherein the act ofpermitting or denying is based upon the evaluation.
 18. Acomputer-executable system, comprising: employing a processor thatexecutes computer executable instructions stored on a computer readablestorage medium to implement the following means: means for receivingcard-less credentials; means for evaluating a subset of the card-lesscredentials; and means for granting or denying access to funds in an‘electronic wallet’ account based at least in part upon the evaluation.19. The computer-executable system of claim 18, further comprising meansfor replenishing funds into the ‘electronic wallet’ account based uponan amount of the financial transaction.
 20. The computer-executablesystem of claim 18, further comprising: means for accepting andanalyzing verbal instructions; and means for converting the verbalinstructions into the plurality of card-less credentials.