Multicomputer processing of an event authentication request with centralized event orchestration
Abstract:
Aspects of the disclosure relate to multicomputer processing of an event authentication request with centralized event orchestration. A computing platform may receive a request to authenticate an event. Subsequently, the computing platform may generate a first authentication dataset and receive a second authentication dataset. Then, the computing platform may calculate unauthorized access likelihood scores based on the first and second authentication datasets. Thereafter, the computing platform may calculate an event security score based on the unauthorized access likelihood scores. Subsequently, the computing platform may generate first event authentication commands. Next, the computing platform may send the first event authentication commands to an unauthorized access computing device. Then, the computing platform may receive a result of an unauthorized access analysis. Subsequently, the computing platform may generate, based on the result of the unauthorized access analysis, second event authentication commands. Thereafter, the computing platform may send the second event authentication commands.
Information query
Patent Agency Ranking
0/0