The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
May. 21, 2019

Filed:

Dec. 08, 2016
Applicant:

Bank of America Corporation, Charlotte, NC (US);

Inventors:

Joseph Benjamin Castinado, Northglenn, CO (US);

Akiva D. Kates, Charlotte, NC (US);

Tracey Mochnal, Scotch Plains, NJ (US);

Assignee:

Bank of America Corporation, Charlotte, NC (US);

Attorneys:
Primary Examiner:
Int. Cl.
CPC ...
G06F 1/26 (2006.01); H04L 29/06 (2006.01); G06F 16/951 (2019.01);
U.S. Cl.
CPC ...
H04L 63/0876 (2013.01); G06F 16/951 (2019.01); H04L 63/083 (2013.01); H04L 63/10 (2013.01); H04L 63/1425 (2013.01); H04L 2463/082 (2013.01);
Abstract

Aspects of the disclosure relate to multicomputer processing of an event authentication request with centralized event orchestration. A computing platform may receive a request to authenticate an event. Subsequently, the computing platform may generate a first authentication dataset and receive a second authentication dataset. Then, the computing platform may calculate unauthorized access likelihood scores based on the first and second authentication datasets. Thereafter, the computing platform may calculate an event security score based on the unauthorized access likelihood scores. Subsequently, the computing platform may generate first event authentication commands. Next, the computing platform may send the first event authentication commands to an unauthorized access computing device. Then, the computing platform may receive a result of an unauthorized access analysis. Subsequently, the computing platform may generate, based on the result of the unauthorized access analysis, second event authentication commands. Thereafter, the computing platform may send the second event authentication commands.


Find Patent Forward Citations

Loading…