Patent attributes
A computer-implemented method, including receiving, by one or more computer systems, customer characteristic information for a user; applying, by the one or more computer systems, one or more recommendation rules to the customer characteristic information to determine a security tier; comparing, by the one or more computer systems, the customer characteristic information to one or more other users with a threshold level of similarity to the user for which the customer characteristic information is received; identifying, by the one or more computer systems, a security tier assigned to one of the one or more other users; and generating information indicative of a recommended security tier, based on the identified security tier and the determined security tier.