17942705. COMPUTER-BASED SYSTEMS CONFIGURED FOR EFFICIENT AND SECURE MULTI-USER ELECTRONIC ACTIVITIES AND METHODS OF USE THEREOF simplified abstract (Capital One Services, LLC)
Contents
- 1 COMPUTER-BASED SYSTEMS CONFIGURED FOR EFFICIENT AND SECURE MULTI-USER ELECTRONIC ACTIVITIES AND METHODS OF USE THEREOF
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 COMPUTER-BASED SYSTEMS CONFIGURED FOR EFFICIENT AND SECURE MULTI-USER ELECTRONIC ACTIVITIES AND METHODS OF USE THEREOF - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Original Abstract Submitted
COMPUTER-BASED SYSTEMS CONFIGURED FOR EFFICIENT AND SECURE MULTI-USER ELECTRONIC ACTIVITIES AND METHODS OF USE THEREOF
Organization Name
Inventor(s)
Latika Gulati of Vienna VA (US)
Michael Wolf of Ellicott City MD (US)
Lin Ni Lisa Cheng of Great Neck NY (US)
COMPUTER-BASED SYSTEMS CONFIGURED FOR EFFICIENT AND SECURE MULTI-USER ELECTRONIC ACTIVITIES AND METHODS OF USE THEREOF - A simplified explanation of the abstract
This abstract first appeared for US patent application 17942705 titled 'COMPUTER-BASED SYSTEMS CONFIGURED FOR EFFICIENT AND SECURE MULTI-USER ELECTRONIC ACTIVITIES AND METHODS OF USE THEREOF
Simplified Explanation
The patent application describes systems and methods for split communication routing, where a communication request is received with a virtual token and data content, and a split rule is used to determine how the data content is attributed to multiple actual data source profiles. A security score is calculated based on each data source profile and the proportion of data content attributed to it, and the communication request is authorized if the security score exceeds a threshold. Access to the data content in each data source profile is enabled, and the data content is consolidated into a single response for the electronic activity.
- Split communication routing system
- Communication request with virtual token and data content
- Split rule to attribute data content to multiple data source profiles
- Calculation of security score based on data source profiles and data content proportions
- Authorization of communication request based on security score exceeding threshold
- Access to data content in each data source profile enabled
- Consolidation of data content into single response for electronic activity
Potential Applications
The technology described in the patent application could be applied in various industries such as telecommunications, data management, and cybersecurity.
Problems Solved
This technology solves the problem of efficiently routing and managing communication requests with multiple data source profiles while ensuring security and access control.
Benefits
The benefits of this technology include improved data routing efficiency, enhanced security measures, and streamlined access control for data content.
Potential Commercial Applications
A potential commercial application of this technology could be in secure communication platforms for businesses that handle sensitive data and require strict access control measures.
Possible Prior Art
One possible prior art for this technology could be systems for data routing and access control in telecommunications networks.
Unanswered Questions
How does the split rule determine the proportion of data content attributed to each data source profile?
The split rule could be based on factors such as data sensitivity, source reliability, or user preferences.
What measures are in place to prevent unauthorized access to the data content in each data source profile?
Security measures such as encryption, authentication protocols, and access control mechanisms could be implemented to prevent unauthorized access to the data content.
Original Abstract Submitted
Systems and methods of the present disclosure enable split communication routing. A communication request associated with an electronic activity is received, the communication request specifying a virtual token and a data content, where the virtual token is a proxy for multiple actual data source profiles. A split rule defining a proportion of the data content to be attributed to each actual data source profile is determined. A security score is determined based on each actual data source profile and each proportion of the data content. The communication request is authorized based on the security score exceeding a threshold security score and access to the proportion of the data content in each actual data source profile is enabled. Each proportion of the data content is consolidated into a single response, and the electronic activity is executed with the single response.