17944887. COMPUTER-BASED SYSTEMS PROGRAMMED FOR AUTOMATIC GENERATION OF INTERACTIVE NOTIFICATIONS FOR SUSPECT INTERACTION SESSIONS AND METHODS OF USE THEREOF simplified abstract (Capital One Services, LLC)

From WikiPatents
Jump to navigation Jump to search

COMPUTER-BASED SYSTEMS PROGRAMMED FOR AUTOMATIC GENERATION OF INTERACTIVE NOTIFICATIONS FOR SUSPECT INTERACTION SESSIONS AND METHODS OF USE THEREOF

Organization Name

Capital One Services, LLC

Inventor(s)

Shabnam Kousha of Washington DC (US)

Lin Ni Lisa Cheng of Great Neck NY (US)

Asher Smith-rose of Midlothian VA (US)

Joshua Edwards of Philadelphia PA (US)

Tyler Maiman of Melville NY (US)

COMPUTER-BASED SYSTEMS PROGRAMMED FOR AUTOMATIC GENERATION OF INTERACTIVE NOTIFICATIONS FOR SUSPECT INTERACTION SESSIONS AND METHODS OF USE THEREOF - A simplified explanation of the abstract

This abstract first appeared for US patent application 17944887 titled 'COMPUTER-BASED SYSTEMS PROGRAMMED FOR AUTOMATIC GENERATION OF INTERACTIVE NOTIFICATIONS FOR SUSPECT INTERACTION SESSIONS AND METHODS OF USE THEREOF

Simplified Explanation

The patent application abstract describes a method for monitoring activities on computing devices, identifying suspect interaction sessions, and generating interaction notifications based on certain parameters.

  • Obtaining permission from the user to monitor activities on the computing device
  • Receiving monitoring data for a predetermined period of time
  • Identifying incoming interaction sessions and verifying common session parameters
  • Determining frequency metrics and threshold values for suspect interaction sessions
  • Generating interaction notifications for suspect sessions
  • Receiving responses to the notifications and updating the database of known session parameters

Potential Applications

This technology could be applied in cybersecurity systems to detect and prevent suspicious activities on computing devices.

Problems Solved

This technology helps in identifying and addressing potential security threats and suspicious interactions on computing devices.

Benefits

The benefits of this technology include enhanced security measures, early detection of potential threats, and improved user privacy protection.

Potential Commercial Applications

One potential commercial application of this technology could be in the development of security software for businesses to protect their sensitive data and information.

Possible Prior Art

One possible prior art for this technology could be existing cybersecurity systems that monitor and analyze user activities on computing devices.

Unanswered Questions

How does this technology handle privacy concerns of users?

This technology ensures user privacy by obtaining permission before monitoring activities and by updating the database of known session parameters to improve accuracy and reduce false positives.

What measures are in place to prevent false positives in identifying suspect interaction sessions?

The technology uses threshold values for frequency metrics and verifies common session parameters to accurately identify suspect interaction sessions and minimize false positives.


Original Abstract Submitted

In some embodiments, the present disclosure provides an exemplary method that may include steps of obtaining a permission from the user to monitor a plurality of activities executed within the computing device; receiving monitoring data of the activities executed within the plurality of computing devices for a predetermined period of time; identifying incoming interaction sessions across the plurality of computing devices; verifying one common session parameter associated with the incoming interaction sessions to identify the incoming interaction sessions as suspect interaction sessions; determining a frequency metric for the suspect interaction sessions; determining a threshold value for the frequency metric; receiving new monitoring data; determining that the new incoming interaction session has at least one common session interaction parameter with the suspect interaction sessions; automatically generating an interaction notification for transmission to the computing device; receiving a response to the interactive communication; and updating the database of known session interaction parameters.