18601608. ELECTRONIC PROFILE AND DATA SECURITY ENFORCEMENT WITH USER DEVICE DATA AND METHODS OF USE THEREOF simplified abstract (Capital One Services, LLC)

From WikiPatents
Jump to navigation Jump to search

ELECTRONIC PROFILE AND DATA SECURITY ENFORCEMENT WITH USER DEVICE DATA AND METHODS OF USE THEREOF

Organization Name

Capital One Services, LLC

Inventor(s)

Joshua Edwards of Philadelphia PA (US)

Michael Mossoba of Great Falls VA (US)

Abdelkader M'Hamed Benkreira of Brooklyn NY (US)

ELECTRONIC PROFILE AND DATA SECURITY ENFORCEMENT WITH USER DEVICE DATA AND METHODS OF USE THEREOF - A simplified explanation of the abstract

This abstract first appeared for US patent application 18601608 titled 'ELECTRONIC PROFILE AND DATA SECURITY ENFORCEMENT WITH USER DEVICE DATA AND METHODS OF USE THEREOF

Simplified Explanation: The patent application describes computer systems that enhance data security by analyzing user profiles and software application analytics to detect fraud.

Key Features and Innovation:

  • Receiving an authorization request with a time-stamp, profile identifier, and value.
  • Accessing application analytics data with open and close event indicators.
  • Determining the open period of the software application based on event indicators.
  • Selecting and executing a reduced set of fraud checks within the open period.
  • Generating a fraud determination and authorization notification based on the analysis.

Potential Applications: This technology can be applied in various industries such as finance, healthcare, and e-commerce to improve data security and prevent fraudulent activities.

Problems Solved: The technology addresses the need for efficient fraud detection and authorization processes to protect sensitive data and prevent unauthorized access.

Benefits:

  • Enhanced data security
  • Improved fraud detection capabilities
  • Streamlined authorization processes
  • Reduced risk of unauthorized access

Commercial Applications: The technology can be utilized by financial institutions, healthcare providers, and online retailers to safeguard customer information, prevent fraud, and enhance trust with users.

Prior Art: Researchers can explore prior art related to fraud detection, data security, and user authorization systems to understand the existing technologies in this field.

Frequently Updated Research: Researchers may find updated studies on fraud detection algorithms, data security measures, and user authentication methods relevant to this technology.

Questions about Data Security: 1. How does this technology improve data security measures? 2. What are the potential implications of using this technology in the finance industry?


Original Abstract Submitted

Systems and methods of the present disclosure include computer systems for improving data security. To do so, an authorization request associated with a user profile is received, including a time-stamp for a profile activity, a profile identifier, and a value. Application analytics data for a software application on a user device associated with the user profile is accessed, including an open event indicator indicating a time of a loading, and a close event indicator indicating a time of a termination. An open period of the software application at the time-stamp is determined based on the application open event indicator and the application close event indicator. A reduced set of fraud checks is selected and executed when the time-stamp associated with the profile activity is within the open period of the software application. A fraud determination is generated, and an authorization notification is generated based on the fraud determination.