SYSTEM AND METHOD FOR IDENTIFYING SUSPICIOUS DESTINATIONS

    公开(公告)号:US20240362643A1

    公开(公告)日:2024-10-31

    申请号:US18767005

    申请日:2024-07-09

    IPC分类号: G06Q20/40 H04L9/40

    摘要: Transaction destinations are identified by identifying requests for a login page of a web server for a financial institution and determining a referring website for each of the requests; classifying the referring websites into classes, each of the classes having a risk rating; identifying logins to access the web server and determining a user associated with each login; associating each of the logins with one of the requests and the referring website for that request; for each of the users, identifying transactions occurring within a time period from when the login was initiated; for each of the transactions occurring within the time period, associating a transaction destination of that transaction with the referring website for that login; and assigning a risk rating to each of the transaction destinations based at least in part on a risk rating of the class of the associated referring website.

    Systems and methods of adaptively identifying anomalous network communication traffic

    公开(公告)号:US12126638B2

    公开(公告)日:2024-10-22

    申请号:US17386295

    申请日:2021-07-27

    IPC分类号: H04L9/40 G06F18/21

    摘要: Systems and methods for adaptively identifying anomalous network communication traffic. The system includes a processor and a memory coupled to the processor. The memory includes processor-executable instructions that configure the processor to: obtain data associated with a sequence of network communication events; determine that the sequence of communication events is generated by a computing agent based on a symmetricity measure associated with the sequence of network communication events; generate a threat prediction value for the sequence of network communication events prior-generated by the computing agent based on a combination of the symmetricity measure and a randomness measure associated with the network communication events; and transmit a signal for communicating that the sequence of network communication events is a potential malicious sequence of network communication events based on the threat prediction value.

    SYSTEM AND METHOD FOR SIGNAL PROCESSING FOR CYBER SECURITY

    公开(公告)号:US20240338439A1

    公开(公告)日:2024-10-10

    申请号:US18627414

    申请日:2024-04-04

    IPC分类号: G06F21/55 G06F21/62

    CPC分类号: G06F21/554 G06F21/6245

    摘要: System and method for signal processing for cyber fraud detection are disclosed. The method may include: receiving a trigger signal for fraud detection, the trigger signal comprising an event indicator and entity data associated with an entity profile stored in a database; determining, based on the trigger signal, a risk signal processing model comprising a plurality of risk components, each risk component associated with a respective weighing factor; computing, based on the risk signal processing model, a respective risk signal for each of the plurality of risk components; processing the respective risk signal for each of the plurality of risk components in real time or near real time to generate an aggregated risk signal; and generating, based on the aggregated risk signal, a fraud or cyber security alert signal.

    Systems and methods of dynamically presenting datasets in a graphical user interface

    公开(公告)号:US12073348B2

    公开(公告)日:2024-08-27

    申请号:US17013499

    申请日:2020-09-04

    摘要: Systems for dynamically updating a priority queue for scheduling data operations associated with data records. A method includes: detecting event data meeting a threshold value for identifying a shift in data operation relevance and traversing a cascading data structure to identify an auditable entity corresponding to one or more data records associated with the event data, the one or more data records corresponding to at least one branch of the cascading data structure. The method includes generating an updated priority queue for scheduling data operations based on priority weights associated with branches of the cascading data structure, the updated priority queue based on event data corresponding to the identified auditable entity relative to event data associated with one or more records corresponding to other auditable entities and transmitting a signal for dynamically communicating the updated priority queue for scheduling data operations associated with data records of respective auditable entities.

    SYSTEMS AND METHODS FOR EVALUATING ANTI-MONEY LAUNDERING REPORTS

    公开(公告)号:US20240257157A1

    公开(公告)日:2024-08-01

    申请号:US18428902

    申请日:2024-01-31

    IPC分类号: G06Q30/018

    CPC分类号: G06Q30/0185

    摘要: AML investigative reports are prepared based on detection and investigation of unusual banking transactions and activity. The volume of reports and associated data, and the length of the unstructured narratives make the analysis of the AMLRs difficult. A system and process are described that allows AML reports to be evaluated and the evaluation presented to users. The evaluation of the AMLRs and display of the information users to efficiently generate insights, develop and improve specialized transaction monitoring models; optimize processing streams; perform benchmarking and conduct targeted quality control assessments.

    Development and implementation of containerized applications

    公开(公告)号:US12039301B2

    公开(公告)日:2024-07-16

    申请号:US17815973

    申请日:2022-07-29

    IPC分类号: G06F8/36 G06F8/10 G06F8/60

    CPC分类号: G06F8/36 G06F8/10 G06F8/60

    摘要: A method for developing a containerized application using a pipeline platform consisting of a plurality of stages with associated development tools, the method comprising the steps of: receiving application parameters and a check-in code for the containerized application; generating a configuration file based on the application parameters, the configuration file containing configuration content including insert code; embedding the insert code into the check-in code; dynamically provisioning an opinionated pipeline based on contents of the configuration file, the opinionated pipeline including the plurality of stages with the associated development tools; setting up one or more control gates in one or more of the plurality of stages; receiving customized code for the containerized application, the customized code representing modifications of the insert code; and packaging the containerized application to include code contents of the check-in code, the customized code, and the insert code; wherein the containerized application is submitted for deployment to one or more environment platforms upon satisfying the one or more control gates or the containerized application is restricted from the subsequent deployment based on failure of the one or more control gates.