DATA OBFUSCATION AUTHENTICATION SECURITY DISPLAY SESSION SYSTEM

    公开(公告)号:US20230362159A1

    公开(公告)日:2023-11-09

    申请号:US17736745

    申请日:2022-05-04

    CPC classification number: H04L63/0876 G06F21/6263 H04L63/16

    Abstract: Systems, computer program products, and methods are described herein for a data obfuscation authentication security display session. The invention provides a secondary authentication by recognizing the initial access to a display screen and overlaying and presenting false information on the screen. The false screen may mimic that of a real account screen, but the personal information about the user is false. The invention then requires the user to perform a secondary authentication to gain access information on the display session that is not false. The invention may allow for a duress code implementation in place of the secondary authentication, which initiates security protocols, include a continuum based protocol arrangement of security protocols.

    Countermeasure Implementation Platform For Preventing Information Misuse

    公开(公告)号:US20250047708A1

    公开(公告)日:2025-02-06

    申请号:US18228137

    申请日:2023-07-31

    Abstract: A computing platform may train, using historical information access pattern information, a machine learning model to identify unauthorized information access patterns. The computing platform may obscure internal traffic pattern information, and monitor access of the obscured internal traffic pattern information. The computing platform may generate, by inputting information of the access into the machine learning model, a user evaluation output, and may compare the user evaluation output to a first user evaluation threshold. Based on identifying that the user evaluation output meets or exceeds the first user evaluation threshold, the computing platform may modify traffic routing rules corresponding to the user, which may cause activity by the user to be routed to a secure sandbox for further analysis.

    Automatically executing responsive actions upon detecting an incomplete account lineage chain

    公开(公告)号:US12192291B2

    公开(公告)日:2025-01-07

    申请号:US18223286

    申请日:2023-07-18

    Abstract: Aspects of the disclosure relate to account lineage tracking and automatically executing responsive actions upon detecting an incomplete lineage chain. A computing platform may receive an account-change message from a database-level interceptor. The account-change message may include information identifying a first target account as a database-level source account and identifying a second target account associated with one or more target databases. The first target account may be associated with a target application configured to access the target database. After receiving the account-change message, the computing platform may determine, based on a failure to detect a source account associated with the first target account, that an account lineage chain associated with the account-change message is incomplete. In response to determining that the account lineage chain is incomplete, the computing platform may generate and send one or more commands to limit access of the first target account to the target database.

    DATA PROCESSING TRANSACTIONS BETWEEN DISPARATE SYSTEMS USING A UNIVERSAL PROCESSOR

    公开(公告)号:US20240406272A1

    公开(公告)日:2024-12-05

    申请号:US18799890

    申请日:2024-08-09

    Abstract: A system is provided including a host processor, a plurality of service processors, a universal processor associated with the host processor and capable of exchanging data with each service processor, a first user device of the first user and a second user device of a second user. The universal processor receives a request from the first user device for a data transaction between the host processor and a service processor, and in response generates a code that can be interpreted by the service processor. Universal processor transmits the code to the first user device, which transmits the code to the second user device. The second user device transmits the code to the service processor. The service processor decodes the code and requests the universal processor to perform the data transaction with the host processor. In response, the universal processor sets up the data transaction.

Patent Agency Ranking