18545491. Third Party Data Processing for Improvement of Authentication Questions simplified abstract (Capital One Services, LLC)

From WikiPatents
Revision as of 03:58, 16 April 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Third Party Data Processing for Improvement of Authentication Questions

Organization Name

Capital One Services, LLC

Inventor(s)

Joshua Edwards of Philadelphia PA (US)

Vyjayanthi Vadrevu of Pflugerville TX (US)

Tyler Maiman of Melville NY (US)

Viraj Chaudhary of Katy TX (US)

Daniel Miller of Brooklyn NY (US)

David Septimus of New York NY (US)

Jenny Melendez of Falls Church VA (US)

Samuel Rapowitz of Rosewell GA (US)

Third Party Data Processing for Improvement of Authentication Questions - A simplified explanation of the abstract

This abstract first appeared for US patent application 18545491 titled 'Third Party Data Processing for Improvement of Authentication Questions

Simplified Explanation

The patent application describes methods, systems, and apparatuses for improving the accuracy of synthetic authentication questions by analyzing third-party account data.

  • Request for access to a first account associated with a user received
  • Query transactions database for first account data
  • Receive second account data from a different organization
  • Identify unique second transactions
  • Generate a synthetic transaction different from first and second transactions
  • Generate an authentication question based on the synthetic transaction
  • Provide access to the first account based on the response to the authentication question

Potential Applications

This technology could be applied in the fields of cybersecurity, identity verification, and fraud prevention.

Problems Solved

This technology helps enhance the security of authentication processes by using unique synthetic transactions based on third-party account data.

Benefits

- Improved accuracy of authentication questions - Enhanced security for user accounts - Reduced risk of unauthorized access

Potential Commercial Applications

"Enhancing Authentication Security Using Third-Party Account Data" could be used in industries such as banking, e-commerce, and online services.

Possible Prior Art

There may be existing technologies that use third-party data for authentication purposes, but the specific method of generating synthetic transactions for authentication questions may be novel.

What are the specific techniques used to analyze third-party account data in this technology?

The specific techniques used to analyze third-party account data in this technology include querying a transactions database for first account data, receiving second account data from a different organization, identifying unique second transactions, and generating a synthetic transaction based on this data.

How does this technology ensure the generated authentication questions are secure and reliable?

This technology ensures the generated authentication questions are secure and reliable by using unique synthetic transactions that are different from transactions in the first and second accounts. This helps prevent unauthorized access and enhances the overall security of the authentication process.


Original Abstract Submitted

Methods, systems, and apparatuses are described herein for improving the accuracy of synthetic authentication questions by analyzing third party account data. A request for access to a first account associated with a user may be received. The first account may be managed by a first organization. A transactions database might be queried for first account data. Second account data corresponding to a second account associated with the user might be received. That second account may be managed by a second organization different from the first organization. One or more second transactions, unique to the second account, may be identified. A synthetic transaction, configured to be different from transactions in the first account and the one or more second transactions, may be generated. An authentication question may be generated based on the synthetic transaction. Access to the first account might be provided based on a response to the authentication question.