ITERATIVE DATA PATTERN PROCESSING ENGINE LEVERAGING DEEP LEARNING TECHNOLOGY

    公开(公告)号:US20200184271A1

    公开(公告)日:2020-06-11

    申请号:US16210125

    申请日:2018-12-05

    Abstract: An artificial intelligence system and method leveraging deep learning technology for data pattern processing and identifying misappropriation are provided herein comprising a deep learning engine comprising a data patterning component and a reasoning component. A controller is configured to: monitor a data stream comprising user interaction data; extract the interaction data from the data stream; determine, using the data patterning component, a data pattern from the extracted interaction data, wherein the data pattern is output to the reasoning component; analyze, using the reasoning component, the data pattern by comparing the data pattern to predetermined rules and factual reference data; identify an anomaly in the data pattern based on comparing the data pattern, wherein the anomaly is associated with misappropriation resources; in response, generate a revised data pattern, wherein the revised data pattern is output to the data patterning component; and confirm the revised data pattern using the data patterning component.

    ALTERNATE DISPLAY GENERATION BASED ON USER IDENTIFICATION

    公开(公告)号:US20190373019A1

    公开(公告)日:2019-12-05

    申请号:US15995837

    申请日:2018-06-01

    Abstract: The invention relates generally to an alternate display generation based on user identification of unauthorized users. When the user is identified as an unauthorized user, the organization may present an alternative interface to the unauthorized user. The organization monitors how the unauthorized user utilizes the alternative interface, such as action requests that the unauthorized user may take through the use of the alternative interface. In response to any action requests from the unauthorized user, the organization may take alternative actions in order to make it seem that the unauthorized user was successful in the action request. In this way, the organization may monitor the use of the alternative interface by the unauthorized user, and capture additional information from the unauthorized user in order to identify, track, and/or prevent access by unauthorized users in the future.

    Alternate user communication routing for a onetime credential

    公开(公告)号:US11297053B2

    公开(公告)日:2022-04-05

    申请号:US16915492

    申请日:2020-06-29

    Abstract: The invention relates to alternate user communication routing for a one-time credential. When a user is determined to be an unauthorized user, the unauthorized user may be provided with an alternative one-time credential (e.g., one-time password, or the like) in response to the user trying to take an action (e.g., to access the organization systems in order to access information). When the unauthorized user tries to utilize the alternative one-time credential, the organization may identify the user as unauthorized and determine how to respond to the unauthorized user. In addition to the alternative one-time credential, one or more additional alternate treatments may be presented to the unauthorized user in order to identify, track, and/or prevent access by the unauthorized user.

    SECURITY SYSTEM WITH ADAPTIVE AUTHENTICATION BASED ON TOKENIZATION CHAINING

    公开(公告)号:US20210051015A1

    公开(公告)日:2021-02-18

    申请号:US16537888

    申请日:2019-08-12

    Abstract: A system for generating a hybrid token architecture for chaining authenticated interactions is provided. The system comprises a memory device for storing computer-readable program; a communication device connected to a network; and a processing device, wherein the processing device is configured to: initiate an authentication session of a user associated with a user interaction; determine an authentication identifier based on at least one of the authentication session and the user interaction, the authentication identifier comprising at least one of a device portion, a user portion, and an authentication record portion; generate a unique token based on the authentication identifier, wherein the unique token is required for a subsequent authentication session, and wherein the unique token links the authentication session with the subsequent authentication session, the authentication session and the subsequent authentication session forming a chain of successive authentication sessions; and store the unique token for the subsequent authentication session.

    ALTERNATE USER COMMUNICATION ROUTING FOR A ONE-TIME CREDENTIAL

    公开(公告)号:US20200329030A1

    公开(公告)日:2020-10-15

    申请号:US16915496

    申请日:2020-06-29

    Abstract: The invention relates to alternate user communication routing for a one-time credential. When a user is determined to be an unauthorized user, the unauthorized user may be provided with an alternative one-time credential (e.g., one-time password, or the like) in response to the user trying to take an action (e.g., to access the organization systems in order to access information). When the unauthorized user tries to utilize the alternative one-time credential, the organization may identify the user as unauthorized and determine how to respond to the unauthorized user. In addition to the alternative one-time credential, one or more additional alternate treatments may be presented to the unauthorized user in order to identify, track, and/or prevent access by the unauthorized user.

    ALTERNATE USER COMMUNICATION ROUTING FOR A ONE-TIME CREDENTIAL

    公开(公告)号:US20190372966A1

    公开(公告)日:2019-12-05

    申请号:US15995831

    申请日:2018-06-01

    Abstract: The invention relates to alternate user communication routing for a one-time credential. When a user is determined to be an unauthorized user, the unauthorized user may be provided with an alternative one-time credential (e.g., one-time password, or the like) in response to the user trying to take an action (e.g., to access the organization systems in order to access information). When the unauthorized user tries to utilize the alternative one-time credential, the organization may identify the user as unauthorized and determine how to respond to the unauthorized user. In addition to the alternative one-time credential, one or more additional alternate treatments may be presented to the unauthorized user in order to identify, track, and/or prevent access by the unauthorized user.

Patent Agency Ranking