Multicomputer processing of an event authentication request with centralized event orchestration

    公开(公告)号:US10298575B2

    公开(公告)日:2019-05-21

    申请号:US15372692

    申请日:2016-12-08

    Abstract: Aspects of the disclosure relate to multicomputer processing of an event authentication request with centralized event orchestration. A computing platform may receive a request to authenticate an event. Subsequently, the computing platform may generate a first authentication dataset and receive a second authentication dataset. Then, the computing platform may calculate unauthorized access likelihood scores based on the first and second authentication datasets. Thereafter, the computing platform may calculate an event security score based on the unauthorized access likelihood scores. Subsequently, the computing platform may generate first event authentication commands. Next, the computing platform may send the first event authentication commands to an unauthorized access computing device. Then, the computing platform may receive a result of an unauthorized access analysis. Subsequently, the computing platform may generate, based on the result of the unauthorized access analysis, second event authentication commands. Thereafter, the computing platform may send the second event authentication commands.

    Multicomputer Processing of an Event Authentication Request with Centralized Event Orchestration

    公开(公告)号:US20180167390A1

    公开(公告)日:2018-06-14

    申请号:US15372692

    申请日:2016-12-08

    Abstract: Aspects of the disclosure relate to multicomputer processing of an event authentication request with centralized event orchestration. A computing platform may receive a request to authenticate an event. Subsequently, the computing platform may generate a first authentication dataset and receive a second authentication dataset. Then, the computing platform may calculate unauthorized access likelihood scores based on the first and second authentication datasets. Thereafter, the computing platform may calculate an event security score based on the unauthorized access likelihood scores. Subsequently, the computing platform may generate first event authentication commands. Next, the computing platform may send the first event authentication commands to an unauthorized access computing device. Then, the computing platform may receive a result of an unauthorized access analysis. Subsequently, the computing platform may generate, based on the result of the unauthorized access analysis, second event authentication commands. Thereafter, the computing platform may send the second event authentication commands.

Patent Agency Ranking