Automatically executing responsive actions upon detecting an incomplete account lineage chain

    公开(公告)号:US12192291B2

    公开(公告)日:2025-01-07

    申请号:US18223286

    申请日:2023-07-18

    Abstract: Aspects of the disclosure relate to account lineage tracking and automatically executing responsive actions upon detecting an incomplete lineage chain. A computing platform may receive an account-change message from a database-level interceptor. The account-change message may include information identifying a first target account as a database-level source account and identifying a second target account associated with one or more target databases. The first target account may be associated with a target application configured to access the target database. After receiving the account-change message, the computing platform may determine, based on a failure to detect a source account associated with the first target account, that an account lineage chain associated with the account-change message is incomplete. In response to determining that the account lineage chain is incomplete, the computing platform may generate and send one or more commands to limit access of the first target account to the target database.

    Device manipulation system for counteracting facial recognition authentication security malfeasance

    公开(公告)号:US12160422B2

    公开(公告)日:2024-12-03

    申请号:US17712360

    申请日:2022-04-04

    Abstract: Systems, computer program products, and methods are described herein for implementing device manipulation for counteracting facial recognition authentication security malfeasance. The present invention is configured to receive a request from a user via a client device to access an authentication subsystem to execute a facial recognition authentication for access to an application; initiate the facial recognition authentication on the client device in response to receiving the request; receive, from the client device, one or more external inputs in response to one or more authentication prompts; determine, using a machine learning subsystem, that at least one of the one or more external inputs is associated with a first preconfigured duress code; trigger, using a breach detection subsystem, a first set of security protocols; and execute, using the breach detection subsystem, a first set of predefined actions associated with the first set of security protocols.

    Dynamic Passive Authentication
    3.
    发明公开

    公开(公告)号:US20240244048A1

    公开(公告)日:2024-07-18

    申请号:US18097729

    申请日:2023-01-17

    CPC classification number: H04L63/0861 H04L63/102

    Abstract: Arrangements for providing dynamic passive authentication are provided. In some aspects, registration data may be received for a plurality of users. The registration data may include biometric data of each user of the plurality of users, and identification of one or more user computing devices that each user is authorize to access. In response to receiving an indication of login to a user computing device by a first user, one or more passive authentication functions may be activated and biometric data may be received from devices associated with the user computing device. The computing platform may compare the received biometric data to registration biometric data associated with the first user. If the received data matches the registration data, the system may capture additional biometric data at a subsequent time. If the received data does not match the registration data, one or more mitigation actions may be identified and executed.

    Automatically Executing Responsive Actions Upon Detecting an Incomplete Account Lineage Chain

    公开(公告)号:US20230362263A1

    公开(公告)日:2023-11-09

    申请号:US18223286

    申请日:2023-07-18

    CPC classification number: H04L67/306 G06F16/235 G06Q40/02

    Abstract: Aspects of the disclosure relate to account lineage tracking and automatically executing responsive actions upon detecting an incomplete lineage chain. A computing platform may receive an account-change message from a database-level interceptor. The account-change message may include information identifying a first target account as a database-level source account and identifying a second target account associated with one or more target databases. The first target account may be associated with a target application configured to access the target database. After receiving the account-change message, the computing platform may determine, based on a failure to detect a source account associated with the first target account, that an account lineage chain associated with the account-change message is incomplete. In response to determining that the account lineage chain is incomplete, the computing platform may generate and send one or more commands to limit access of the first target account to the target database.

    USER RESPONSES TO CYBER SECURITY THREATS

    公开(公告)号:US20210029164A1

    公开(公告)日:2021-01-28

    申请号:US16520971

    申请日:2019-07-24

    Abstract: Aspects of the disclosure relate to improving user responses to cyber security threats. A computing platform may generate a test communication to simulate a potential cyber threat activity. Then, the computing platform may send, via the communication interface, the test communication to a user device associated with a target user. Then, the computing platform may receive, via the communication interface and from the user device, a response to the test communication. Subsequently, the computing platform may determine, based on the response, a threat awareness level for the target user, where the threat awareness level is indicative of a susceptibility of the target user to the potential cyber threat activity. Then, the computing platform may send, to the target user and based on the threat awareness level, an alert notification to counter the cyber threat activity.

    Automatically Executing Responsive Actions Upon Detecting An Incomplete Account Lineage Chain

    公开(公告)号:US20250071181A1

    公开(公告)日:2025-02-27

    申请号:US18944168

    申请日:2024-11-12

    Abstract: Aspects of the disclosure relate to account lineage tracking and automatically executing responsive actions upon detecting an incomplete lineage chain. A computing platform may receive an account-change message from a database-level interceptor. The account-change message may include information identifying a first target account as a database-level source account and identifying a second target account associated with one or more target databases. The first target account may be associated with a target application configured to access the target database. After receiving the account-change message, the computing platform may determine, based on a failure to detect a source account associated with the first target account, that an account lineage chain associated with the account-change message is incomplete. In response to determining that the account lineage chain is incomplete, the computing platform may generate and send one or more commands to limit access of the first target account to the target database.

    Dynamic Passive Authentication at Self-Service Kiosk

    公开(公告)号:US20240242219A1

    公开(公告)日:2024-07-18

    申请号:US18097739

    申请日:2023-01-17

    CPC classification number: G06Q20/40145 G06Q20/18

    Abstract: Arrangements for providing dynamic passive authentication at self-service kiosks are provided. In some aspects, registration data may be received for a plurality of users. The registration data may include biometric data of each user of the plurality of users. In response to receiving an indication of authentication of a user and a request for transaction processing, one or more passive authentication functions may be activated and biometric data may be received from devices associated with the self-service kiosk. The computing platform may compare the received biometric data to registration biometric data associated with the first user. If the received data matches the registration data, the system may capture additional biometric data at a subsequent time. If the received data does not match the registration data, one or more mitigation actions may be identified and executed.

    ARTIFICIAL INTELLIGENCE-SUPPORTED PROXY WORKER DETECTION USING VOICE AUTHENTICATION

    公开(公告)号:US20240236086A1

    公开(公告)日:2024-07-11

    申请号:US18094102

    申请日:2023-01-06

    CPC classification number: H04L63/0861 G10L17/04 G10L17/06 G10L17/22

    Abstract: Aspects of the disclosure relate to a voice authentication platform. The voice authentication platform may monitor remote communications to identify a first voice sample. The voice authentication platform may train a voice authentication model to output similarity scores, based on the first voice sample. The voice authentication platform may identify a second voice sample. The voice authentication platform may generate a similarity score by inputting the second voice sample into the model. The voice authentication platform may compare the similarity score to a threshold value. If the similarity score meets or exceeds the threshold value, the voice authentication platform may update a user profile. If the similarity score is below the threshold value, the voice authentication platform may initiate a security action. The voice authentication platform may create an iterative feedback loop to update the voice authentication model.

Patent Agency Ranking