-
公开(公告)号:US11831648B1
公开(公告)日:2023-11-28
申请号:US18079211
申请日:2022-12-12
Applicant: Wells Fargo Bank, N.A.
Inventor: Mark David Castonguay , Upul D. Hanwella , Bryan Hall , Nicola A. Maiorana , David Lerner
CPC classification number: H04L63/102 , G06F21/31 , H04L63/083 , H04L63/0853 , G06F2221/2103 , G06F2221/2133 , H04L2463/082 , H04L2463/144
Abstract: Systems, methods, and apparatuses for authenticating requests to access one or more accounts over a network using authenticity evaluations of two or more automated decision engines are discussed. A login request for access to a user account may be submitted to multiple decision engines that each apply different rulesets for authenticating the login request, and output an evaluation of the authenticity of the login request. Based on evaluations from multiple automated decision engines, the login request may be allowed to proceed to validation of user identity and, if user identity is validated, access to the user account may be authorized. Based on the evaluations, the login attempt may also be rejected. One or more additional challenge question may be returned to the computing device used to request account access, and the login request allowed to proceed to validation of identity if the response to the challenge question is deemed acceptable.
-
公开(公告)号:US11038862B1
公开(公告)日:2021-06-15
申请号:US16729788
申请日:2019-12-30
Applicant: Wells Fargo Bank, N.A.
Inventor: Chemere Davis , Andrew J. Garner, IV , Bryan D. Hall , H. Brock Kolls , Nicola A. Maiorana , Ximing Zhao
IPC: H04L29/06 , G06F16/2455 , G06F21/45
Abstract: A computing system includes a network circuit enabling the computing system to exchange information over a network, a customer database storing information pertaining to various user accounts pertaining to a plurality of users, and a risk assessment circuit. The risk assessment circuit is configured search at least one data source to identify a user attribute, determine that the user attribute bears a relationship to a first security credential that is either associated with or potentially associated with a user account, generate a security prompt responsive to the determination, and transmit the security prompt to a user computing device associated with the user.
-
公开(公告)号:US11848943B2
公开(公告)日:2023-12-19
申请号:US17811710
申请日:2022-07-11
Applicant: Wells Fargo Bank, N.A.
Inventor: Chad E. Adams , Daniel Robert Caricato , Kahlidah B. Covington , Ashley Brook Godfrey , Christopher Wayne Howser , Nicola A. Maiorana , Nirali J. Patel , Richard Joseph Schroeder , Roger Daryll White
CPC classification number: H04L63/1416 , G06F21/44 , H04L63/0876
Abstract: Systems and techniques for centralized threat intelligence are described herein. A connection may be established to a plurality of threat data sources. An anonymized set of threat data may be obtained by application of a set of privacy rules to the threat data from the plurality of threat data. A threat database may be populated with the anonymized set of threat data. A registration request may be received for a user of a device. A unique user identifier may be assigned for the user and a unique device identifier may be assigned for the device. A threat model may be generated based on a set of the characteristics from the threat database. A set of data access attributes may be received for a data access request. The data access request may be blocked based on an evaluation of the data access attributes using the threat model.
-
公开(公告)号:US20230353537A1
公开(公告)日:2023-11-02
申请号:US18332303
申请日:2023-06-09
Applicant: Wells Fargo Bank, N.A.
Inventor: Bryan D. Hall , Richard Joseph Schroeder , Nicola A. Maiorana
IPC: H04L9/40
CPC classification number: H04L63/0236 , H04L63/083 , H04L63/1416 , H04L63/20
Abstract: In an example aspect, a method includes receiving a plurality of login attempts from a network address over a length of time, querying log data to determine, for the network address, an average number of login failures of the plurality of login attempts over the length of time, calculating a failure rate metric based on the average number of login failures, determining that the failure rate metric exceeds a reference number of login failures for the length of time, the reference number of login failures based on a historical average number of login failures for the length of time, and based in part on the determining, adding the network address to a system deny list.
-
5.
公开(公告)号:US11356472B1
公开(公告)日:2022-06-07
申请号:US16716346
申请日:2019-12-16
Applicant: Wells Fargo Bank, N.A.
Inventor: Nicola A. Maiorana , Bryan D. Hall , Richard Joseph Schroeder
Abstract: Disclosed herein are systems and methods for using machine learning for geographic analysis of access attempts. In an embodiment, a trained machine-learning model classifies source IP addresses of login attempts to a system as either blacklisted or allowed based on a set of aggregated features that correspond to login attempts to the system from the source IP addresses. The set of aggregated features includes, in association with each respective source IP address, a geographical login-attempt failure rate of login attempts to the system from each of one or more geographical areas that each correspond to the respective source IP address. Source IP addresses that are classified by the machine-learning model as blacklisted are added to a system blacklist, such that the system will disallow login attempts from such source IP addresses.
-
公开(公告)号:US11914719B1
公开(公告)日:2024-02-27
申请号:US16849589
申请日:2020-04-15
Applicant: Wells Fargo Bank, N.A.
Inventor: Chad E. Adams , Daniel Robert Caricato , Kahlidah B. Covington , Ashley Brook Godfrey , Christopher Wayne Howser , Nicola A. Maiorana , Nirali J. Patel , Richard Joseph Schroeder , Roger Daryll White
IPC: G06F21/57 , G06F16/9535 , G06Q10/107 , G06Q50/26 , G09B7/00 , G09B19/00 , G06F3/0482 , H04L9/40 , H04L67/306
CPC classification number: G06F21/577 , G06F16/9535 , G06Q10/107 , G06Q50/265 , G09B7/00 , G09B19/0053 , G06F3/0482 , G06F2221/034 , H04L63/1483 , H04L67/306
Abstract: A system determines a baseline cyberthreat-risk score for a user, and displays the baseline cyberthreat-risk score via a user interface. The system presents at least one cyberthreat-education activity via the user interface, and receives, via the user interface, at least one user input associated with the presented at least one cyberthreat-education activity. The system generates an updated cyberthreat-risk score at least in part by updating the baseline cyberthreat-risk score based at least in part on the user input, and displays the updated cyberthreat-risk score via the user interface.
-
公开(公告)号:US11855989B1
公开(公告)日:2023-12-26
申请号:US17303777
申请日:2021-06-07
Applicant: Wells Fargo Bank, N.A.
Inventor: Bryan D. Hall , Nicola A. Maiorana , Richard Joseph Schroeder
CPC classification number: H04L63/101
Abstract: A method may include receiving a first classification of a network address associated with a login attempt as an AVA, and in response, generating a first random number, selecting a first blocking length of time from a plurality of blocking lengths of time, calculating a first deny list duration based on summing the first random number and the first blocking length of time, and adding the network address to a deny list for the first deny list duration, and adding the network address to a parole list for a parole duration, receiving a second classification of the address as an AVA during the duration; and in response selecting a second blocking length of time from a plurality of blocking lengths, calculating a second deny list duration based on summing the second random number and the second blocking length and adding the address to the deny list for the second duration.
-
公开(公告)号:US11722459B1
公开(公告)日:2023-08-08
申请号:US17303776
申请日:2021-06-07
Applicant: Wells Fargo Bank, N.A.
Inventor: Bryan D. Hall , Richard Joseph Schroeder , Nicola A. Maiorana
IPC: H04L9/40
CPC classification number: H04L63/0236 , H04L63/083 , H04L63/1416 , H04L63/20
Abstract: In an example aspect, a method includes receiving a plurality of login attempts from a network address over a length of time, querying log data to determine, for the network address, an average number of login failures of the plurality of login attempts over the length of time, calculating a failure rate metric based on the average number of login failures, determining that the failure rate metric exceeds a reference number of login failures for the length of time, the reference number of login failures based on a historical average number of login failures for the length of time, and based in part on the determining, adding the network address to a system deny list.
-
公开(公告)号:US20220353281A1
公开(公告)日:2022-11-03
申请号:US17811710
申请日:2022-07-11
Applicant: Wells Fargo Bank, N.A.
Inventor: Chad E. Adams , Daniel Robert Caricato , Kahlidah B. Covington , Ashley Brook Godfrey , Christopher Wayne Howser , Nicola A. Maiorana , Nirali J. Patel , Richard Joseph Schroeder , Roger Daryll White
Abstract: Systems and techniques for centralized threat intelligence are described herein. A connection may be established to a plurality of threat data sources. An anonymized set of threat data may be obtained by application of a set of privacy rules to the threat data from the plurality of threat data. A threat database may be populated with the anonymized set of threat data. A registration request may be received for a user of a device. A unique user identifier may be assigned for the user and a unique device identifier may be assigned for the device. A threat model may be generated based on a set of the characteristics from the threat database. A set of data access attributes may be received for a data access request. The data access request may be blocked based on an evaluation of the data access attributes using the threat model.
-
公开(公告)号:US10965683B1
公开(公告)日:2021-03-30
申请号:US16207807
申请日:2018-12-03
Applicant: Wells Fargo Bank, N.A.
Inventor: Mark David Castonguay , Upul D. Hanwella , Bryan Hall , Nicola A. Maiorana , David Lerner
Abstract: Systems, methods, and apparatuses for authenticating requests to access one or more accounts over a network using authenticity evaluations of two or more automated decision engines are discussed. A login request for access to a user account may be submitted to multiple decision engines that each apply different rulesets for authenticating the login request, and output an evaluation of the authenticity of the login request. Based on evaluations from multiple automated decision engines, the login request may be allowed to proceed to validation of user identity and, if user identity is validated, access to the user account may be authorized. Based on the evaluations, the login attempt may also be rejected. One or more additional challenge question may be returned to the computing device used to request account access, and the login request allowed to proceed to validation of identity if the response to the challenge question is deemed acceptable.
-
-
-
-
-
-
-
-
-