17945620. COMPUTER-BASED SYSTEMS CONFIGURED FOR AUTOMATICALLY GENERATING FICTITIOUS CALL SESSION INTERACTION PARAMETER(S) AND METHODS OF USE THEREOF simplified abstract (Capital One Services, LLC)

From WikiPatents
Jump to navigation Jump to search

COMPUTER-BASED SYSTEMS CONFIGURED FOR AUTOMATICALLY GENERATING FICTITIOUS CALL SESSION INTERACTION PARAMETER(S) AND METHODS OF USE THEREOF

Organization Name

Capital One Services, LLC

Inventor(s)

Joshua Edwards of Philadelphia PA (US)

Asher Smith-rose of Midlothian VA (US)

Tyler Maiman of Melville NY (US)

Lin Ni Lisa Cheng of Great Neck NY (US)

Shabnam Kousha of Melville NY (US)

COMPUTER-BASED SYSTEMS CONFIGURED FOR AUTOMATICALLY GENERATING FICTITIOUS CALL SESSION INTERACTION PARAMETER(S) AND METHODS OF USE THEREOF - A simplified explanation of the abstract

This abstract first appeared for US patent application 17945620 titled 'COMPUTER-BASED SYSTEMS CONFIGURED FOR AUTOMATICALLY GENERATING FICTITIOUS CALL SESSION INTERACTION PARAMETER(S) AND METHODS OF USE THEREOF

Simplified Explanation

The abstract describes a method for verifying the identity of a user during a call session by generating fictitious call session interaction parameters.

  • The method involves obtaining permission from the user to monitor activities on the computing device.
  • A call session request is received from a second user's computing device.
  • A machine learning algorithm is used to confirm the user's identity based on the call session interaction parameters.
  • A fictitious call session interaction parameter is generated and used to modify the call session request.
  • The modified request is transmitted to the first user's device via a telecommunication network.
  • The first user's device is automatically instructed to display notification data on the call session notification GUI.

Potential Applications

This technology could be applied in secure communication systems, fraud prevention in call centers, and identity verification processes.

Problems Solved

This technology helps in verifying the identity of users during call sessions, preventing unauthorized access and fraud.

Benefits

The method enhances security during call sessions, protects user privacy, and reduces the risk of fraudulent activities.

Potential Commercial Applications

Potential commercial applications include secure communication platforms, call center services, and identity verification solutions.

Possible Prior Art

One possible prior art could be methods for call session verification using machine learning algorithms in telecommunication systems.

Unanswered Questions

How does this method ensure the privacy of user data during the verification process?

The method does not specify how user data is protected during the verification process. Additional information on data encryption or anonymization techniques would be helpful.

What measures are in place to prevent spoofing or manipulation of the fictitious call session interaction parameters?

The abstract does not mention any specific measures to prevent spoofing or manipulation of the fictitious parameters. Details on security protocols or authentication mechanisms would be beneficial.


Original Abstract Submitted

A computer-implemented method comprising: instructing a computing device to obtain a permission from the user to monitor a plurality of activities executed within the computing device; receiving a call session request from a computing device associated with a second user; utilizing a trained machine learning algorithm to confirm an identity of the user based on the call session interaction parameter to confirm the call interaction session as a verified call interaction session; generating a fictitious call session interaction parameter that differs from the at least one call session interaction parameter; modifying the call session request into a verified call session request by replacing the call session interaction parameter with the fictitious call session interaction parameter; utilizing a telecommunication network to transmit the verified call session request with the at least one fictitious session interaction parameter to the first calling-enabled computing device; automatically instructing the first calling-enabled computing device to modify a call session notification GUI to display notification data.