{"search_session":{},"preferences":{"l":"en","queryLanguage":"en"},"patentId":"165-287-173-671-262","frontPageModel":{"patentViewModel":{"ref":{"entityRefId":"165-287-173-671-262","entityRefType":"PATENT"},"entityMetadata":{"linkedIds":{"empty":true},"tags":[],"collections":[],"notes":[],"inventorships":[],"privateCollections":[],"publicCollections":[],"privateNotes":[],"landscapeCollections":[],"landscapeNotes":[]},"document":{"record_lens_id":"165-287-173-671-262","lens_id":["165-287-173-671-262","130-400-918-278-070"],"doc_key":"US_20170272418_A1_20170921","created":"2017-09-29T05:56:35.227","docdb_id":483937489,"lens_internal":{"earliest_lens_id_created_time":"2017-09-29T05:56:35.227","last_modified":"2024-03-25T02:44:56.226","legacy_pub_key":"US_2017_0272418_A1","has_doc_lang":true,"has_biblio_lang":true,"has_all_title_lang":true,"has_all_abstract_lang":true,"has_all_claims_lang":true,"has_description_lang":true},"jurisdiction":"US","doc_number":"20170272418","kind":"A1","date_published":"2017-09-21","year_published":2017,"ids":["US_2017_0272418_A1","165-287-173-671-262","130-400-918-278-070","US_20170272418_A1_20170921","US","20170272418","A1","US20170272418A1","US20170272418","20170272418A1"],"lang":"en","publication_type":"PATENT_APPLICATION","application_reference":{"jurisdiction":"US","doc_number":"201615074908","kind":"A","date":"2016-03-18"},"priority_claim":[{"jurisdiction":"US","doc_number":"201615074908","kind":"A","date":"2016-03-18"}],"priority_claim.source":"DOCDB","earliest_priority_claim_date":"2016-03-18","title":{"en":[{"text":"MULTI-LEVEL AUTHENTICATION FOR ONBOARD SYSTEMS","lang":"en","source":"DOCDB","data_format":"DOCDBA"}]},"title_lang":["en"],"has_title":true,"applicant":[{"name":"KIM NANCY","residence":"US","sequence":1,"app_type":"applicant"},{"name":"GIBSON SHARON","residence":"US","sequence":2,"app_type":"applicant"},{"name":"HOWARD KELVAN","residence":"US","sequence":3,"app_type":"applicant"}],"applicant_count":3,"has_applicant":true,"inventor":[{"name":"KIM NANCY","residence":"US","sequence":1},{"name":"GIBSON SHARON","residence":"US","sequence":2},{"name":"HOWARD KELVAN","residence":"US","sequence":3}],"inventor_count":3,"has_inventor":true,"agent":[],"agent_count":0,"has_agent":false,"owner":[{"name":"VISA INTERNATIONAL SERVICE ASSOCIATION","address":"PO BOX 8999, SAN FRANCISCO, CALIFORNIA, 94128","sequence":1,"recorded_date":"2016-07-01","execution_date":"2016-04-06","is_current_owner":true}],"owner_count":1,"owner_all":[{"name":"VISA INTERNATIONAL SERVICE ASSOCIATION","address":"PO BOX 8999, SAN FRANCISCO, CALIFORNIA, 94128","sequence":1,"recorded_date":"2016-07-01","execution_date":"2016-04-06","is_current_owner":true}],"owner_all_count":1,"has_owner":true,"has_examiner":false,"class_ipcr":[{"symbol":"H04L29/06","version_indicator":"2006-01-01","class_symbol_position":"F","class_value":"I","action_date":"2017-09-21","class_status":"B","class_data_source":"H","generating_office":"US","sequence":1},{"symbol":"H04L29/08","version_indicator":"2006-01-01","class_symbol_position":"L","class_value":"I","action_date":"2017-09-21","class_status":"B","class_data_source":"H","generating_office":"US","sequence":2}],"class_ipcr.first_symbol":"H04L29/06","class_ipcr.later_symbol":["H04L29/08"],"class_ipcr.inv_symbol":["H04L29/06","H04L29/08"],"class_ipcr.add_symbol":[],"class_ipcr.source":"DOCDB","class_cpc":[{"symbol":"H04L63/08","version_indicator":"2013-01-01","class_symbol_position":"F","class_value":"I","action_date":"2017-09-21","class_status":"B","class_data_source":"H","generating_office":"EP","sequence":1},{"symbol":"H04L63/08","version_indicator":"2013-01-01","class_symbol_position":"F","class_value":"I","action_date":"2017-09-21","class_status":"B","class_data_source":"H","generating_office":"US","sequence":2},{"symbol":"H04L63/0853","version_indicator":"2013-01-01","class_symbol_position":"L","class_value":"A","action_date":"2019-10-11","class_status":"B","class_data_source":"H","generating_office":"US","sequence":3},{"symbol":"H04L63/0853","version_indicator":"2013-01-01","class_symbol_position":"L","class_value":"A","action_date":"2018-03-20","class_status":"B","class_data_source":"H","generating_office":"EP","sequence":4},{"symbol":"H04L63/0861","version_indicator":"2013-01-01","class_symbol_position":"L","class_value":"A","action_date":"2018-03-20","class_status":"B","class_data_source":"H","generating_office":"EP","sequence":5},{"symbol":"H04L63/0861","version_indicator":"2013-01-01","class_symbol_position":"L","class_value":"A","action_date":"2019-10-11","class_status":"B","class_data_source":"H","generating_office":"US","sequence":6},{"symbol":"H04L63/107","version_indicator":"2013-01-01","class_symbol_position":"L","class_value":"A","action_date":"2019-10-11","class_status":"B","class_data_source":"H","generating_office":"US","sequence":7},{"symbol":"H04L63/107","version_indicator":"2013-01-01","class_symbol_position":"L","class_value":"A","action_date":"2018-03-20","class_status":"B","class_data_source":"H","generating_office":"EP","sequence":8},{"symbol":"H04L63/108","version_indicator":"2013-01-01","class_symbol_position":"L","class_value":"A","action_date":"2018-03-20","class_status":"B","class_data_source":"H","generating_office":"EP","sequence":9},{"symbol":"H04L63/108","version_indicator":"2013-01-01","class_symbol_position":"L","class_value":"A","action_date":"2019-10-11","class_status":"B","class_data_source":"H","generating_office":"US","sequence":10},{"symbol":"H04L63/20","version_indicator":"2013-01-01","class_symbol_position":"L","class_value":"I","action_date":"2018-08-07","class_status":"B","class_data_source":"H","generating_office":"EP","sequence":11},{"symbol":"H04L63/20","version_indicator":"2013-01-01","class_symbol_position":"L","class_value":"I","action_date":"2018-08-07","class_status":"B","class_data_source":"H","generating_office":"US","sequence":12},{"symbol":"H04L67/12","version_indicator":"2013-01-01","class_symbol_position":"L","class_value":"I","action_date":"2017-09-21","class_status":"B","class_data_source":"H","generating_office":"US","sequence":13},{"symbol":"H04L67/12","version_indicator":"2013-01-01","class_symbol_position":"L","class_value":"I","action_date":"2017-09-21","class_status":"B","class_data_source":"H","generating_office":"EP","sequence":14},{"symbol":"H04W12/062","version_indicator":"2021-01-01","class_symbol_position":"L","class_value":"I","action_date":"2021-01-01","class_status":"R","class_data_source":"H","generating_office":"EP","sequence":15},{"symbol":"H04W12/062","version_indicator":"2021-01-01","class_symbol_position":"L","class_value":"I","action_date":"2021-01-01","class_status":"R","class_data_source":"C","generating_office":"US","sequence":16},{"symbol":"H04W12/068","version_indicator":"2021-01-01","class_symbol_position":"L","class_value":"I","action_date":"2021-01-01","class_status":"R","class_data_source":"H","generating_office":"EP","sequence":17},{"symbol":"H04W12/068","version_indicator":"2021-01-01","class_symbol_position":"L","class_value":"I","action_date":"2021-01-01","class_status":"R","class_data_source":"C","generating_office":"US","sequence":18}],"class_cpc_cset":[],"class_cpc.first_symbol":"H04L63/08","class_cpc.later_symbol":["H04L63/0853","H04L63/0853","H04L63/0861","H04L63/0861","H04L63/107","H04L63/107","H04L63/108","H04L63/108","H04L63/20","H04L63/20","H04L67/12","H04L67/12","H04W12/062","H04W12/062","H04W12/068","H04W12/068"],"class_cpc.inv_symbol":["H04L63/08","H04L63/08","H04L63/20","H04L63/20","H04L67/12","H04L67/12","H04W12/062","H04W12/062","H04W12/068","H04W12/068"],"class_cpc.add_symbol":["H04L63/0853","H04L63/0853","H04L63/0861","H04L63/0861","H04L63/107","H04L63/107","H04L63/108","H04L63/108"],"class_cpc.source":"DOCDB","class_national":[],"class_national.later_symbol":[],"reference_cited":[{"patent":{"num":1,"document_id":{"jurisdiction":"US","doc_number":"2014189350","kind":"A1","date":"2014-07-03","name":"BAGHDASARYAN DAVIT [US], et al"},"lens_id":"184-925-333-840-647","srep_office":"US","category":[],"us_category":[],"cited_phase":"PRS","rel_claims":[],"sequence":1}}],"reference_cited.source":"DOCDB","reference_cited.patent_count":1,"cites_patent":true,"reference_cited.npl_count":0,"reference_cited.npl_resolved_count":0,"cites_npl":false,"cites_resolved_npl":false,"cited_by":{"patent_count":21,"patent":[{"lens_id":"076-884-309-044-25X","document_id":{"jurisdiction":"US","doc_number":"10430566","kind":"B2"}},{"lens_id":"152-905-574-575-232","document_id":{"jurisdiction":"US","doc_number":"10984458","kind":"B1"}},{"lens_id":"106-604-539-046-768","document_id":{"jurisdiction":"US","doc_number":"11257071","kind":"B2"}},{"lens_id":"115-009-546-057-836","document_id":{"jurisdiction":"US","doc_number":"11743288","kind":"B2"}},{"lens_id":"127-164-516-625-674","document_id":{"jurisdiction":"US","doc_number":"20220232035","kind":"A1"}},{"lens_id":"089-741-543-604-546","document_id":{"jurisdiction":"US","doc_number":"11297001","kind":"B2"}},{"lens_id":"083-893-070-693-693","document_id":{"jurisdiction":"US","doc_number":"11558906","kind":"B2"}},{"lens_id":"152-020-284-643-024","document_id":{"jurisdiction":"US","doc_number":"20200111086","kind":"A1"}},{"lens_id":"018-082-961-425-792","document_id":{"jurisdiction":"US","doc_number":"11685339","kind":"B2"}},{"lens_id":"133-353-811-931-295","document_id":{"jurisdiction":"US","doc_number":"11386678","kind":"B2"}},{"lens_id":"129-951-186-727-349","document_id":{"jurisdiction":"US","doc_number":"20220048470","kind":"A1"}},{"lens_id":"188-455-222-986-178","document_id":{"jurisdiction":"US","doc_number":"10911949","kind":"B2"}},{"lens_id":"042-010-264-396-153","document_id":{"jurisdiction":"US","doc_number":"10911423","kind":"B2"}},{"lens_id":"149-085-879-170-421","document_id":{"jurisdiction":"US","doc_number":"10805234","kind":"B2"}},{"lens_id":"063-677-451-715-006","document_id":{"jurisdiction":"US","doc_number":"20210056555","kind":"A1"}},{"lens_id":"178-995-733-193-406","document_id":{"jurisdiction":"US","doc_number":"11336682","kind":"B2"}},{"lens_id":"117-697-766-633-027","document_id":{"jurisdiction":"US","doc_number":"20210377261","kind":"A1"}},{"lens_id":"120-195-953-890-449","document_id":{"jurisdiction":"US","doc_number":"20240046717","kind":"A1"}},{"lens_id":"014-754-841-984-489","document_id":{"jurisdiction":"US","doc_number":"20200029213","kind":"A1"}},{"lens_id":"103-600-373-094-024","document_id":{"jurisdiction":"US","doc_number":"11488220","kind":"B1"}},{"lens_id":"080-593-874-669-820","document_id":{"jurisdiction":"US","doc_number":"10540839","kind":"B2"}}]},"cited_by_patent":true,"family":{"simple":{"size":10,"id":196422666,"member":[{"lens_id":"185-353-434-771-869","document_id":{"jurisdiction":"CN","doc_number":"108713307","kind":"A","date":"2018-10-26"}},{"lens_id":"020-559-610-889-648","document_id":{"jurisdiction":"WO","doc_number":"2017160491","kind":"A1","date":"2017-09-21"}},{"lens_id":"094-067-022-620-371","document_id":{"jurisdiction":"EP","doc_number":"3430765","kind":"A1","date":"2019-01-23"}},{"lens_id":"093-597-810-630-206","document_id":{"jurisdiction":"AU","doc_number":"2017233691","kind":"A1","date":"2018-07-12"}},{"lens_id":"023-797-135-806-091","document_id":{"jurisdiction":"EP","doc_number":"3430765","kind":"A4","date":"2019-03-27"}},{"lens_id":"115-523-067-798-807","document_id":{"jurisdiction":"CN","doc_number":"108713307","kind":"B","date":"2020-02-21"}},{"lens_id":"165-287-173-671-262","document_id":{"jurisdiction":"US","doc_number":"20170272418","kind":"A1","date":"2017-09-21"}},{"lens_id":"176-337-485-515-228","document_id":{"jurisdiction":"US","doc_number":"10044697","kind":"B2","date":"2018-08-07"}},{"lens_id":"042-010-264-396-153","document_id":{"jurisdiction":"US","doc_number":"10911423","kind":"B2","date":"2021-02-02"}},{"lens_id":"137-997-322-801-317","document_id":{"jurisdiction":"US","doc_number":"20180324165","kind":"A1","date":"2018-11-08"}}]},"extended":{"size":10,"id":196163984,"member":[{"lens_id":"185-353-434-771-869","document_id":{"jurisdiction":"CN","doc_number":"108713307","kind":"A","date":"2018-10-26"}},{"lens_id":"020-559-610-889-648","document_id":{"jurisdiction":"WO","doc_number":"2017160491","kind":"A1","date":"2017-09-21"}},{"lens_id":"094-067-022-620-371","document_id":{"jurisdiction":"EP","doc_number":"3430765","kind":"A1","date":"2019-01-23"}},{"lens_id":"093-597-810-630-206","document_id":{"jurisdiction":"AU","doc_number":"2017233691","kind":"A1","date":"2018-07-12"}},{"lens_id":"115-523-067-798-807","document_id":{"jurisdiction":"CN","doc_number":"108713307","kind":"B","date":"2020-02-21"}},{"lens_id":"023-797-135-806-091","document_id":{"jurisdiction":"EP","doc_number":"3430765","kind":"A4","date":"2019-03-27"}},{"lens_id":"165-287-173-671-262","document_id":{"jurisdiction":"US","doc_number":"20170272418","kind":"A1","date":"2017-09-21"}},{"lens_id":"176-337-485-515-228","document_id":{"jurisdiction":"US","doc_number":"10044697","kind":"B2","date":"2018-08-07"}},{"lens_id":"042-010-264-396-153","document_id":{"jurisdiction":"US","doc_number":"10911423","kind":"B2","date":"2021-02-02"}},{"lens_id":"137-997-322-801-317","document_id":{"jurisdiction":"US","doc_number":"20180324165","kind":"A1","date":"2018-11-08"}}]}},"has_sequence":false,"legal_status":{"ipr_type":"patent for invention","granted":true,"earliest_filing_date":"2016-03-18","grant_date":"2018-08-07","anticipated_term_date":"2036-03-18","has_disclaimer":false,"patent_status":"ACTIVE","publication_count":2,"has_spc":false,"has_grant_event":true,"has_entry_into_national_phase":false},"abstract":{"en":[{"text":"Described herein is a platform and method for providing multi-level authentication by an onboard system in relation to a transaction. In response to receiving information related to a transaction, one or more authentication policies may be identified and provided to an onboard system associated with the transaction. The authentication policies may be executed by the onboard system to generate a result set indicating a pass/fail for each authentication policy. Once the result set has been generated, success actions and/or failure actions associated with each authentication policy may be executed in accordance with the generated result set.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"}]},"abstract_lang":["en"],"has_abstract":true,"claim":{"en":[{"text":"1 . A method of authenticating a transaction via an onboard system, the method comprising: receiving, by a processing computer, information associated with a transaction conducted using an account; identifying, by the processing computer, a set of authentication policies associated with the account; identifying, by the processing computer, an onboard system associated with the account; determining, by the processing computer, based at least in part on the information associated with the transaction, a subset of the set of authentication policies relevant to the transaction, the subset of the set of authentication policies being determined based on the information associated with the transaction and being compatible with the identified onboard system, wherein the subset of authentication policies is less than the set of authentication policies and each authentication policy in the subset of authentication policies is determined to be relevant based on one or more conditions associated with the authentication policy being met by the transaction; providing instructions to the identified onboard system to cause the onboard system to activate one or more input sensors to collect information related to authentication policies in the subset of authentication policies; receiving, from the onboard system, the information related to authentication policies in the subset of authentication policies; determining, based on the received information, whether each of the authentication policies in the subset of authentication policies has been satisfied; and processing the transaction based on the determination as to whether each of the authentication policies in the subset of authentication policies has been satisfied.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"2 . The method of claim 1 , further comprising: providing the subset of the set of authentication policies to the onboard system; and receiving a result set from the onboard system, the result set including a pass/fail indication for each of the subset of the set of authentication policies.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"3 . The method of claim 2 , further comprising taking at least one action associated with the subset of the set of authentication policies based at least in part on the result set.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"4 . The method of claim 1 , wherein at least one authentication policy of the subset of the set of authentication policies comprises instructions to request authentication from a mobile device associated with the account.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"5 . The method of claim 4 , wherein the instructions to request authentication from a mobile device associated with the account include instructions for the onboard system to establish a short range communication session with the mobile device.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"6 . The method of claim 1 , wherein at least one authentication policy of the subset of the set of authentication policies comprises instructions to: activate at least one sensor of the onboard system to collect sensor input data; compare the collected sensor input data to data associated with the account; and determine whether the collected sensor input data is within an acceptable range of the data associated with the account.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"7 . A processing computer, comprising: a processor; and a memory including instructions that, when executed with the processor, cause the processing computer to, at least: receive, from a processing computer, transaction information associated with a transaction to be completed; identify an onboard system associated with the account; determine, based at least in part on the information associated with the transaction, a set of authentication policies relevant to the transaction such that the set of authentication policies is compatible with the identified onboard system; determine, based at least in part on the information associated with the transaction, a subset of the set of authentication policies relevant to the transaction, the subset of the set of authentication policies being determined based on the information associated with the transaction, wherein the subset of authentication policies is less than the set of authentication policies and each authentication policy in the subset of authentication policies is determined to be relevant based on one or more conditions associated with the authentication policy being met by the transaction, wherein the subset of policies are used to authenticate the transaction.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"8 . The processing computer of claim 7 , wherein the transaction to be completed is associated with a physical location, and wherein the set of authentication policies are provided to the onboard system upon detecting that the onboard system is within a predetermined distance from the physical location.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"9 . The processing computer of claim 7 , wherein the instructions further cause the processing computer to: execute a failure action associated with each failed authentication policy in the set of authentication policies; and execute a success action associated with each passed authentication policy in the set of authentication policies.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"10 . The processing computer of claim 7 , wherein the instructions further cause the processing computer to initiate completion of the transaction based on the result set.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"11 . A method of authenticating an user of an onboard system, comprising: receiving, from a processing computer, transaction information associated with a transaction to be completed; identifying, based at least in part on one or more conditions indicated in the transaction information, a set of authentication policies to be executed to authenticate a user of the onboard system, wherein the set of authentication policies is less than a number of authentication policies available; executing each authentication policy in the set of authentication policies; generating a result set to include a pass/fail indicator for each authentication policy in the set of authentication policies; and providing the result set to the processing computer, such that the processing computer is cause to execute at least one additional action based on the generated result set, wherein the at least one additional action comprises at least one of a failure action based on a fail indicator associated with at least one authentication policy in the set of authentication policies or a success action based on a pass indicator associated with at least one authentication policy in the set of authentication policies.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"12 . The method of claim 11 , wherein executing each authentication policy in the set of authentication policies comprises: activating an input sensor associated with the onboard system; collecting input data from the input sensor; and comparing the input data collected from the input sensor to acceptable parameters.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"13 - 15 . (canceled)","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"16 . An onboard system, comprising: one or more input sensors; a processor; and a memory including instructions that, when executed with the processor, cause the onboard system to, at least: receive, from a processing computer, transaction information associated with a transaction to be completed; identify, based at least in part on one or more conditions indicated in the transaction information, a set of authentication policies to be executed, the set of authentication policies configured to authenticate a user of the onboard system, wherein the set of authentication policies is less than a number of authentication policies available; generate a result set by, for each authentication policy in the set of authentication policies: activating at least one of the one or more input sensors to collect input data related to the user of the onboard system; and determining, based on the input data, whether one or more conditions specified in the authentication policy is met; and providing the result set to the processing computer.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"17 . (canceled)","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"18 . The onboard system of claim 16 , wherein the one or more conditions specified in the authentication policy are time-based conditions.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"19 . The onboard system of claim 16 , wherein the one or more input sensors includes at least one of a keyboard, a mouse, a microphone, a camera, a motion sensor, a accelerometer, a pressure sensor, a thermometer, or a global positioning system (GPS) device.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"20 . The onboard system of claim 16 , wherein determining whether one or more conditions specified in the authentication policy is met comprises determining whether the collected input data is within provided parameters.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"21 . The method of claim 1 , wherein the subset of the set of authentication policies is determined based at least in part on one or more capabilities associated with the identified onboard system.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"22 . The method of claim 1 , wherein the subset of the set of authentication policies is determined based at least in part on the transaction exceeding one or more currency thresholds, wherein the subset of the set of authentication policies includes different authentication policies based on whether the transaction is for an amount above or below the one or more currency thresholds.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"23 . The method of claim 1 , wherein each authentication policy in the subset of authentication policies includes at least one failure action and at least one success action, the failure action indicating an action to be taken in the event that the policy is not satisfied, and the success action indicating an action to be taken in the event that the policy is satisfied.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"24 . The method of claim 1 , wherein the onboard system is installed within a vehicle.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"25 . The method of claim 23 , wherein the at least one failure action does not prevent completion of the transaction.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"}]},"claim_lang":["en"],"has_claim":true,"description":{"en":{"text":"CROSS-REFERENCES TO RELATED APPLICATIONS Not Applicable BACKGROUND In recent years, consumer electronics have become increasingly integrated. Functionality that used to be available only on specific hardware devices is now available from multi-purpose devices. As users of various electronic devices become acclimated to this increased integration of functionality, users are demanding increased convenience in relation to conducted transactions. However, increasing the convenience of a transaction for a user often has an adverse effect on the security of that transaction. For example, making a transaction easier to conduct often increases the likelihood that the transaction will be fraudulently conducted. On the other hand, increasing the security of a transaction can make the transaction difficult to conduct for a user, and may make a user decide to forgo conducting the transaction entirely. Hence, architects of a system are often torn between making the system convenient for a user to conduct a transaction and making transactions conducted using the system more secure. Embodiments of the invention address these and other problems, individually and collectively. BRIEF SUMMARY Embodiments of the invention are directed to a platform for providing multi-level authentication by an onboard system in relation to a transaction. In some embodiments, in response to receiving information related to a transaction, a processing computer may identify one or more authentication policies to be provided to an onboard system associated with the transaction. The authentication policies may be executed by the onboard system to generate a result set indicating a pass/fail for each authentication policy, resulting in multiple levels of authentication for a transaction. Once the result set has been generated by the onboard system, it may be provided to the processing computer and success actions and/or failure actions associated with each authentication policy may be executed in accordance with the generated result set. One embodiment of the invention is directed to a method comprising receiving information associated with a transaction conducted using an account, identifying a set of authentication policies associated with the account, and identifying an onboard system associated with the account. Once each of these has been identified, the method comprises determining a subset of the set of authentication policies relevant to the transaction based on the information associated with the transaction and based on being compatible with the identified onboard system. The method further comprises providing the subset of the set of authentication policies to the onboard system and receiving a result set from the onboard system, the result set including a pass/fail indication for each of the subset of the set of authentication policies. Another embodiment of the invention is directed to a server computer comprising a processor and memory including instructions that, when executed with the processor, cause the processing computer to perform the above described method. Another embodiment of the invention is directed to a method comprising receiving, from a processing computer, transaction information associated with a transaction to be completed. The method further comprises identifying, based at least in part on one or more conditions indicated in the transaction information, a set of authentication policies to be executed to authenticate a user of the onboard system. The method further comprises executing each authentication policy in the set of authentication policies and generating a result set to include a pass/fail indicator for each authentication policy in the set of authentication policies. Finally, the method comprises providing the result set to the processing computer. Another embodiment of the invention is directed to an onboard system comprising a processor and memory including instructions that, when executed with the processor, cause the processing computer to perform the above described method. These and other embodiments of the invention are described in further detail below. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 depicts an example architecture capable of implementing at least some embodiments of the current disclosure; FIG. 2 depicts an illustrative example of an processing computer 104 capable of authenticating a transaction using a multi-level authentication platform in accordance with at least some embodiments; FIG. 3 depicts a data flow that may be implemented in accordance with at least some embodiments; FIG. 4 depicts a flow chart illustrating a process for providing multiple levels of authentication for an onboard system in accordance with at least some embodiments; FIG. 5 depicts an illustrative example of a user interaction with a multi-level authentication platform in accordance with at least some embodiments; and FIG. 6 depicts a flow diagram illustrating a process for processing a transaction using the multi-level authentication platform in accordance with at least some embodiments. DETAILED DESCRIPTION In the following description, various embodiments will be described. For purposes of explanation, specific configurations and details are set forth in order to provide a thorough understanding of the embodiments. However, it will also be apparent to one skilled in the art that the embodiments may be practiced without the specific details. Furthermore, well-known features may be omitted or simplified in order not to obscure the embodiment being described. Embodiments of the present invention are directed to systems, methods, apparatuses, and computer readable media for providing Prior to discussing the details of some embodiments of the present invention, description of some terms may be helpful in understanding the various embodiments. “Account parameters” may refer to information relating to an account that can be used to conduct a transaction on the account. Examples of account parameters may include information that can be used to identify an account of the user (e.g., real account identifier, alternate account identifier, token, etc.), data or information relating to the status of the account, one or more keys that are used to generate cryptographic information, data or information relating to the one or more keys, etc. An account parameter can be semi-static or dynamic. A dynamic account parameter may be an account parameter that has a limited lifespan, and which once expired, can no longer be used to conduct a transaction until the account parameter is replenished, refreshed, or renewed. A dynamic account parameter may be replenished frequently during the lifetime of an account. A semi-static account parameter may be an account parameter that has an extended lifespan that is longer than a dynamic account parameter, and can be replenished less frequently than a dynamic account parameter or not at all during the lifetime of the account. An “acquirer” may typically be a business entity (e.g., a commercial bank) that has a business relationship with a particular merchant or other entity. Some entities can perform both issuer and acquirer functions. Some embodiments may encompass such single entity issuer-acquirers The term “authentication” and its derivatives may refer to a process by which the credential of an endpoint (including but not limited to applications, people, devices, processes, and systems) can be verified to ensure that the endpoint is who they are declared to be. An “authentication policy” may include any setting, instruction, or set of instructions that indicates an authentication technique to be performed. In some embodiments, an authentication policy may include a set of computer executable instructions that, when executed by a processor, cause one or more authentication techniques to be initiated. In some embodiments, the authentication policy may be associated with a particular type of input sensor and/or input data type such that execution of the authentication policy will cause the input sensor to activate and/or the input data type to be collected. In some embodiments, the authentication policy may be associated with an acceptable range or acceptable value for the input data. In some embodiments, the authentication policy may be associated with one or more success actions and/or failure actions that may be executed in the event of a pass or failure (respectively). In some embodiments, a failure of one authentication policy may trigger execution of a second authentication policy. In some embodiments, an authentication policy may take the form of an extensible markup language (xml) document or text-based document. For example, an authentication policy may be an xml document that includes data in a format similar to:
receiving, by a processing computer, information associated with a transaction conducted using an account;\n
identifying, by the processing computer, a set of authentication policies associated with the account;\n
identifying, by the processing computer, an onboard system associated with the account;\n
determining, by the processing computer, based at least in part on the information associated with the transaction, a subset of the set of authentication policies relevant to the transaction, the subset of the set of authentication policies being determined based on the information associated with the transaction and being compatible with the identified onboard system, wherein the subset of authentication policies is less than the set of authentication policies and each authentication policy in the subset of authentication policies is determined to be relevant based on one or more conditions associated with the authentication policy being met by the transaction;\n
providing instructions to the identified onboard system to cause the onboard system to activate one or more input sensors to collect information related to authentication policies in the subset of authentication policies;\n
receiving, from the onboard system, the information related to authentication policies in the subset of authentication policies;\n
determining, based on the received information, whether each of the authentication policies in the subset of authentication policies has been satisfied; and\n
processing the transaction based on the determination as to whether each of the authentication policies in the subset of authentication policies has been satisfied."],"number":1,"annotation":false,"claim":true,"title":false},{"lines":["The method of claim 1, further comprising:\n
providing the subset of the set of authentication policies to the onboard system; and\n
receiving a result set from the onboard system, the result set including a pass/fail indication for each of the subset of the set of authentication policies."],"number":2,"annotation":false,"claim":true,"title":false},{"lines":["The method of claim 2, further comprising taking at least one action associated with the subset of the set of authentication policies based at least in part on the result set."],"number":3,"annotation":false,"claim":true,"title":false},{"lines":["The method of claim 1, wherein at least one authentication policy of the subset of the set of authentication policies comprises instructions to request authentication from a mobile device associated with the account."],"number":4,"annotation":false,"claim":true,"title":false},{"lines":["The method of claim 4, wherein the instructions to request authentication from a mobile device associated with the account include instructions for the onboard system to establish a short range communication session with the mobile device."],"number":5,"annotation":false,"claim":true,"title":false},{"lines":["The method of claim 1, wherein at least one authentication policy of the subset of the set of authentication policies comprises instructions to:\n
activate at least one sensor of the onboard system to collect sensor input data;\n
compare the collected sensor input data to data associated with the account; and\n
determine whether the collected sensor input data is within an acceptable range of the data associated with the account."],"number":6,"annotation":false,"claim":true,"title":false},{"lines":["A processing computer, comprising:\n
a processor; and\n
a memory including instructions that, when executed with the processor, cause the processing computer to, at least:\n"],"number":7,"annotation":false,"claim":true,"title":false},{"lines":["The processing computer of claim 7, wherein the transaction to be completed is associated with a physical location, and wherein the set of authentication policies are provided to the onboard system upon detecting that the onboard system is within a predetermined distance from the physical location."],"number":8,"annotation":false,"claim":true,"title":false},{"lines":["The processing computer of claim 7, wherein the instructions further cause the processing computer to:\nreceive, from a processing computer, transaction information associated with a transaction to be completed;\nidentify an onboard system associated with the account;\ndetermine, based at least in part on the information associated with the transaction, a set of authentication policies relevant to the transaction such that the set of authentication policies is compatible with the identified onboard system;\ndetermine, based at least in part on the information associated with the transaction, a subset of the set of authentication policies relevant to the transaction, the subset of the set of authentication policies being determined based on the information associated with the transaction, wherein the subset of authentication policies is less than the set of authentication policies and each authentication policy in the subset of authentication policies is determined to be relevant based on one or more conditions associated with the authentication policy being met by the transaction, wherein the subset of policies are used to authenticate the transaction.\n
execute a failure action associated with each failed authentication policy in the set of authentication policies; and\n
execute a success action associated with each passed authentication policy in the set of authentication policies."],"number":9,"annotation":false,"claim":true,"title":false},{"lines":["The processing computer of claim 7, wherein the instructions further cause the processing computer to initiate completion of the transaction based on the result set."],"number":10,"annotation":false,"claim":true,"title":false},{"lines":["A method of authenticating an user of an onboard system, comprising:\n
receiving, from a processing computer, transaction information associated with a transaction to be completed;\n
identifying, based at least in part on one or more conditions indicated in the transaction information, a set of authentication policies to be executed to authenticate a user of the onboard system, wherein the set of authentication policies is less than a number of authentication policies available;\n
executing each authentication policy in the set of authentication policies;\n
generating a result set to include a pass/fail indicator for each authentication policy in the set of authentication policies; and\n
providing the result set to the processing computer, such that the processing computer is cause to execute at least one additional action based on the generated result set, wherein the at least one additional action comprises at least one of a failure action based on a fail indicator associated with at least one authentication policy in the set of authentication policies or a success action based on a pass indicator associated with at least one authentication policy in the set of authentication policies."],"number":11,"annotation":false,"claim":true,"title":false},{"lines":["The method of claim 11, wherein executing each authentication policy in the set of authentication policies comprises:\n
activating an input sensor associated with the onboard system;\n
collecting input data from the input sensor; and\n
comparing the input data collected from the input sensor to acceptable parameters."],"number":12,"annotation":false,"claim":true,"title":false},{"lines":["13-15. (canceled)"],"number":-1,"annotation":false,"claim":true,"title":false},{"lines":["An onboard system, comprising:\n
one or more input sensors;\n
a processor; and\n
a memory including instructions that, when executed with the processor, cause the onboard system to, at least:\n"],"number":16,"annotation":false,"claim":true,"title":false},{"lines":["(canceled)"],"number":17,"annotation":false,"claim":true,"title":false},{"lines":["The onboard system of claim 16, wherein the one or more conditions specified in the authentication policy are time-based conditions."],"number":18,"annotation":false,"claim":true,"title":false},{"lines":["The onboard system of claim 16, wherein the one or more input sensors includes at least one of a keyboard, a mouse, a microphone, a camera, a motion sensor, a accelerometer, a pressure sensor, a thermometer, or a global positioning system (GPS) device."],"number":19,"annotation":false,"claim":true,"title":false},{"lines":["The onboard system of claim 16, wherein determining whether one or more conditions specified in the authentication policy is met comprises determining whether the collected input data is within provided parameters."],"number":20,"annotation":false,"claim":true,"title":false},{"lines":["The method of claim 1, wherein the subset of the set of authentication policies is determined based at least in part on one or more capabilities associated with the identified onboard system."],"number":21,"annotation":false,"claim":true,"title":false},{"lines":["The method of claim 1, wherein the subset of the set of authentication policies is determined based at least in part on the transaction exceeding one or more currency thresholds, wherein the subset of the set of authentication policies includes different authentication policies based on whether the transaction is for an amount above or below the one or more currency thresholds."],"number":22,"annotation":false,"claim":true,"title":false},{"lines":["The method of claim 1, wherein each authentication policy in the subset of authentication policies includes at least one failure action and at least one success action, the failure action indicating an action to be taken in the event that the policy is not satisfied, and the success action indicating an action to be taken in the event that the policy is satisfied."],"number":23,"annotation":false,"claim":true,"title":false},{"lines":["The method of claim 1, wherein the onboard system is installed within a vehicle."],"number":24,"annotation":false,"claim":true,"title":false},{"lines":["The method of claim 23, wherein the at least one failure action does not prevent completion of the transaction."],"number":25,"annotation":false,"claim":true,"title":false}]}},"filters":{"npl":[],"notNpl":[],"applicant":[],"notApplicant":[],"inventor":[],"notInventor":[],"owner":[],"notOwner":[],"tags":[],"dates":[],"types":[],"notTypes":[],"j":[],"notJ":[],"fj":[],"notFj":[],"classIpcr":[],"notClassIpcr":[],"classNat":[],"notClassNat":[],"classCpc":[],"notClassCpc":[],"so":[],"notSo":[],"sat":[]},"sequenceFilters":{"s":"SEQIDNO","d":"ASCENDING","p":0,"n":10,"sp":[],"si":[],"len":[],"t":[],"loc":[]}}receive, from a processing computer, transaction information associated with a transaction to be completed;\nidentify, based at least in part on one or more conditions indicated in the transaction information, a set of authentication policies to be executed, the set of authentication policies configured to authenticate a user of the onboard system, wherein the set of authentication policies is less than a number of authentication policies available;\ngenerate a result set by, for each authentication policy in the set of authentication policies:\n\nactivating at least one of the one or more input sensors to collect input data related to the user of the onboard system; and\ndetermining, based on the input data, whether one or more conditions specified in the authentication policy is met; and\nproviding the result set to the processing computer.\n