17942705. COMPUTER-BASED SYSTEMS CONFIGURED FOR EFFICIENT AND SECURE MULTI-USER ELECTRONIC ACTIVITIES AND METHODS OF USE THEREOF simplified abstract (Capital One Services, LLC)

From WikiPatents
Jump to navigation Jump to search

COMPUTER-BASED SYSTEMS CONFIGURED FOR EFFICIENT AND SECURE MULTI-USER ELECTRONIC ACTIVITIES AND METHODS OF USE THEREOF

Organization Name

Capital One Services, LLC

Inventor(s)

Latika Gulati of Vienna VA (US)

Michael Wolf of Ellicott City MD (US)

Lin Ni Lisa Cheng of Great Neck NY (US)

COMPUTER-BASED SYSTEMS CONFIGURED FOR EFFICIENT AND SECURE MULTI-USER ELECTRONIC ACTIVITIES AND METHODS OF USE THEREOF - A simplified explanation of the abstract

This abstract first appeared for US patent application 17942705 titled 'COMPUTER-BASED SYSTEMS CONFIGURED FOR EFFICIENT AND SECURE MULTI-USER ELECTRONIC ACTIVITIES AND METHODS OF USE THEREOF

Simplified Explanation

The patent application describes systems and methods for split communication routing, where a communication request is received with a virtual token and data content, and a split rule is used to determine how the data content is attributed to multiple actual data source profiles. A security score is calculated based on each data source profile and the proportion of data content attributed to it, and the communication request is authorized if the security score exceeds a threshold. Access to the data content in each data source profile is enabled, and the data content is consolidated into a single response for the electronic activity.

  • Split communication routing system
  • Communication request with virtual token and data content
  • Split rule to attribute data content to multiple data source profiles
  • Calculation of security score based on data source profiles and data content proportions
  • Authorization of communication request based on security score exceeding threshold
  • Access to data content in each data source profile enabled
  • Consolidation of data content into single response for electronic activity

Potential Applications

The technology described in the patent application could be applied in various industries such as telecommunications, data management, and cybersecurity.

Problems Solved

This technology solves the problem of efficiently routing and managing communication requests with multiple data source profiles while ensuring security and access control.

Benefits

The benefits of this technology include improved data routing efficiency, enhanced security measures, and streamlined access control for data content.

Potential Commercial Applications

A potential commercial application of this technology could be in secure communication platforms for businesses that handle sensitive data and require strict access control measures.

Possible Prior Art

One possible prior art for this technology could be systems for data routing and access control in telecommunications networks.

Unanswered Questions

How does the split rule determine the proportion of data content attributed to each data source profile?

The split rule could be based on factors such as data sensitivity, source reliability, or user preferences.

What measures are in place to prevent unauthorized access to the data content in each data source profile?

Security measures such as encryption, authentication protocols, and access control mechanisms could be implemented to prevent unauthorized access to the data content.


Original Abstract Submitted

Systems and methods of the present disclosure enable split communication routing. A communication request associated with an electronic activity is received, the communication request specifying a virtual token and a data content, where the virtual token is a proxy for multiple actual data source profiles. A split rule defining a proportion of the data content to be attributed to each actual data source profile is determined. A security score is determined based on each actual data source profile and each proportion of the data content. The communication request is authorized based on the security score exceeding a threshold security score and access to the proportion of the data content in each actual data source profile is enabled. Each proportion of the data content is consolidated into a single response, and the electronic activity is executed with the single response.