Multi-source anomaly detection and automated dynamic resolution system

    公开(公告)号:US11948157B2

    公开(公告)日:2024-04-02

    申请号:US17728486

    申请日:2022-04-25

    CPC classification number: G06Q30/0185 G06N20/00

    Abstract: Arrangements for detecting anomalies and dynamically generating a response are presented. In some examples, attribute data including a plurality of source elements may be received. The source element data may be received from a plurality of source computing systems. The attribute data, including the source element data, may be analyzed using machine learning techniques to identify any anomalies in the attribute data. If an anomaly is detected, a notification may be generated including data associated with the anomaly, a user associated with the anomaly and the like. The notification may be transmitted to a computing device for display. In some examples, if an anomaly is detected, data associated with the anomaly may be compared to pre-stored rules to determine whether a pre-stored rule applies to the identified anomaly. If a pre-stored rule applies, an instruction or command may be generated and transmitted to one or more source computing devices or systems.

    Secure User Authentication Based on Dynamically Generated User Prompts

    公开(公告)号:US20240020697A1

    公开(公告)日:2024-01-18

    申请号:US17866921

    申请日:2022-07-18

    CPC classification number: G06Q20/4014 G06F21/31 G06F2221/2103

    Abstract: Arrangements for providing dynamic user authentication are provided. In some aspects, a user may initiate a transaction at a merchant point-of-sale (POS) system, via a merchant website, or the like. In response, user data from one or more pre-registered user devices may be retrieved. The data may be analyzed to identify one or more data points for use as a correct answer to an authentication question. An authentication question may be dynamically generated and transmitted to the merchant system for display and the user may provide authentication response data. The authentication response data may be received and compared to the data points providing the basis for the authentication question. If the data matches, the user may be authenticated and the transaction may be processed. If not, additional user authentication data may be requested. The system may then delete the received user data.

    GENERATING AND SECURING DIGITAL CHECKS USING DISTRIBUTED LEDGER AND EMBEDDED CHIP METHODS

    公开(公告)号:US20230351337A1

    公开(公告)日:2023-11-02

    申请号:US17733069

    申请日:2022-04-29

    Abstract: Aspects of the disclosure relate to digital check generation. A computing platform may receive, from a first user device, a digital check generation request, requesting a transfer of funds from an account of a first individual to an account of a second individual. The computing platform may generate, based on the digital check generation request, a first digital check, which may be traceable and configured for cancellation by the first individual prior to deposit. The computing platform may record the first digital check to a distributed ledger. The computing platform may send, to a second user device, a notification of the first digital check. The computing platform may receive, from the second user device, a check processing request requesting one of: a transfer of the first digital check, a deposit of the first digital check, or generation of a second digital check, and may proceed accordingly.

    Application Programming Interface (API) for Uniform Security Access on a 5G Network

    公开(公告)号:US20230171599A1

    公开(公告)日:2023-06-01

    申请号:US17536256

    申请日:2021-11-29

    CPC classification number: H04W12/082 H04W12/06 H04W12/35

    Abstract: Aspects of the disclosure relate to computing hardware and software for uniform security access. A computing platform may receive, from a 5G device, a request to access a collaborative experience service. The computing platform may identify whether the 5G device is authenticated. Based on identifying that the 5G device is authenticated, the computing platform may grant the 5G device access to an API that may be used to access the collaborative experience service. The computing platform may identify that attributes of the 5G device comply with a stored security policy, and grant access to the collaborative experience service in response. The computing platform may receive user interaction information from the 5G device, and may input the user interaction information into an anomaly detection model. Based on identifying that the interactions do not comprise an anomaly for the user, the computing platform may maintain the access to the collaborative experience service.

    System for isolated access and analysis of suspicious code in a disposable computing environment

    公开(公告)号:US11636203B2

    公开(公告)日:2023-04-25

    申请号:US16907994

    申请日:2020-06-22

    Abstract: Providing an isolation system that allows analysts to analyze suspicious information in a way that aids in preventing harmful information from spreading to other applications and systems on a network. A plurality of virtual containers may be used by analysts to analyze suspicious information. The analyst may set the virtual environment configurations (e.g., applications, programs, settings, etc.) of the virtual container. The analyst may determine how the suspicious information effects the virtual environment configuration and/or use tools to analyze the suspicious information. When harmful information is identified the virtual container may be discarded (e.g., folded up and deleted), and a new virtual container may be provided to the analyst to continue to analyze the suspicious information and/or new suspicious information.

    Voice Analysis Platform for Voiceprint Tracking and Anomaly Detection

    公开(公告)号:US20230016130A1

    公开(公告)日:2023-01-19

    申请号:US17954422

    申请日:2022-09-28

    Abstract: Aspects of the disclosure relate to voiceprint tracking and anomaly detection. A computing platform may detect voice information from a call management system. The computing platform may establish voiceprints for employees and clients of an enterprise. The computing platform may detect a call between an employee and a caller attempting to access a client account. The computing platform may identify a first voiceprint corresponding to the employee and a second voiceprint corresponding to the caller. The computing platform may compare the second voiceprint to a known voiceprint corresponding to the client. Based on the comparison of the second voiceprint to the known voiceprint, the computing platform may determine that the second voiceprint does not match the known voiceprint. The computing platform may identify that the second voiceprint corresponds to another employee of the enterprise, and may send a security notification indicating potential unauthorized account access to an enterprise computing device.

Patent Agency Ranking