US Patent Application 17824360. SYSTEM FOR IMPLEMENTING DYNAMIC MULTI-FACTOR SOFT LOCK ON USER IDENTIFIERS simplified abstract
Contents
SYSTEM FOR IMPLEMENTING DYNAMIC MULTI-FACTOR SOFT LOCK ON USER IDENTIFIERS
Organization Name
Inventor(s)
Adithya Gadwale of Falls Church VA (US)
Phanta Danielle Wynn of Charlotte NC (US)
SYSTEM FOR IMPLEMENTING DYNAMIC MULTI-FACTOR SOFT LOCK ON USER IDENTIFIERS - A simplified explanation of the abstract
This abstract first appeared for US patent application 17824360 titled 'SYSTEM FOR IMPLEMENTING DYNAMIC MULTI-FACTOR SOFT LOCK ON USER IDENTIFIERS
Simplified Explanation
The abstract describes a system, computer program, and method for implementing a dynamic multi-factor soft lock on user identifiers within a distributed network.
- The invention receives a network registration request from a user to obtain authorization for resource transfers within the network using a user identifier.
- It queries metadata associated with the user in the network to find traceable instances of the user's digital activities.
- Based on this metadata, it determines one or more user identifiers.
- It then executes a soft lock on these user identifiers using an authentication subsystem.
- After approving the authorization, it transmits control signals to display the authorization on the user's device.
Overall, the invention aims to enhance security and authentication processes within a distributed network by implementing a dynamic multi-factor soft lock on user identifiers.
Original Abstract Submitted
Systems, computer program products, and methods are described herein for implementing dynamic multi-factor soft lock on user identifiers. The present invention is configured to receive, from a first user input device, a network registration request from a user to obtain authorization to execute resource transfers within a distributed network using a first user identifier; query, using an information retrieval engine, metadata associated with the user within the distributed network for traceable instances of digital activities of the user; determine one or more user identifiers based on at least the metadata associated with the user; execute, using an authentication subsystem, a soft lock on the one or more user identifiers; approve authorization for the user to execute the resource transfers within the distributed network using the first user identifier; and transmit control signals configured to cause the first user device to display the authorization.