Internal footprint repository
First Claim
1. A computing platform, comprising:
- at least one processor;
a communication interface communicatively coupled to the at least one processor; and
memory storing computer-readable instructions that, when executed by the at least one processor, cause the computing platform to;
receive, by the at least one processor, via the communication interface, and from a first user device, metadata comprising first user device identification information and accessed account information;
generate, based on the first user device identification information, one or more commands directing an internal device verification server to determine whether the first user device is one of a plurality of internal devices;
transmit, via the communication interface and to the internal device verification server, the one or more commands to determine whether the first user device is the one of the plurality of internal devices;
receive, via the communication interface and from the internal device verification server, internal device verification information indicating the first user device is the one of the plurality of internal devices;
in response to receiving the internal device verification information, identify, based on the accessed account information, an action indicating the first user device accessed an account;
generate, based on the action and the accessed account information, one or more commands directing an external account authorization server to determine whether the action is authorized;
transmit, via the communication interface and to the external account authorization server, the one or more commands directing the external account authorization server to determine whether the action is authorized;
receive, via the communication interface and from the external account authorization server, information indicating unauthorized use of the account by the first user device;
transmit, via the communication interface and to a case management server, the information indicating unauthorized use of the account by the first user device;
receive, via the communication interface and from the case management server, updated unauthorized use information; and
update unauthorized use criteria information based on the updated unauthorized use information received from the case management server.
1 Assignment
0 Petitions
Accused Products
Abstract
Aspects of the disclosure relate to a system to monitor devices for unauthorized access of an external account. A computing platform may receive, via a communication interface, and from a first user device, metadata comprising first user device identification information and accessed account information. The computing platform may determine, based on the first user device identification information, whether the first user device is one of a plurality of internal user devices. The computing platform may identify, based on the accessed account information, an action indicating the first user device is accessing an account. The computing platform may determine, based on the action and the accessed account information, whether the action is authorized. The computing platform may receive information indicating unauthorized use of the account by the first user device. The computing platform may transmit the information indicating unauthorized use of the account by the first user device.
64 Citations
20 Claims
-
1. A computing platform, comprising:
-
at least one processor; a communication interface communicatively coupled to the at least one processor; and memory storing computer-readable instructions that, when executed by the at least one processor, cause the computing platform to; receive, by the at least one processor, via the communication interface, and from a first user device, metadata comprising first user device identification information and accessed account information; generate, based on the first user device identification information, one or more commands directing an internal device verification server to determine whether the first user device is one of a plurality of internal devices; transmit, via the communication interface and to the internal device verification server, the one or more commands to determine whether the first user device is the one of the plurality of internal devices; receive, via the communication interface and from the internal device verification server, internal device verification information indicating the first user device is the one of the plurality of internal devices; in response to receiving the internal device verification information, identify, based on the accessed account information, an action indicating the first user device accessed an account; generate, based on the action and the accessed account information, one or more commands directing an external account authorization server to determine whether the action is authorized; transmit, via the communication interface and to the external account authorization server, the one or more commands directing the external account authorization server to determine whether the action is authorized; receive, via the communication interface and from the external account authorization server, information indicating unauthorized use of the account by the first user device; transmit, via the communication interface and to a case management server, the information indicating unauthorized use of the account by the first user device; receive, via the communication interface and from the case management server, updated unauthorized use information; and update unauthorized use criteria information based on the updated unauthorized use information received from the case management server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method, comprising:
at a computing platform comprising at least one processor, memory, and a communication interface; receiving, by the at least one processor, via the communication interface, and from a first user device, metadata comprising first user device identification information and accessed account information; generating, based on the first user device identification information, one or more commands directing an internal device verification server to determine whether the first user device is one of a plurality of internal devices; transmitting, via the communication interface and to the internal device verification server, the one or more commands to determine whether the first user device is the one of the plurality of internal devices; receiving, via the communication interface and from the internal device verification server, internal device verification information indicating the first user device is the one of the plurality of internal devices; in response to receiving the internal device verification information, identifying, based on the accessed account information, an action indicating the first user device accessed an account; generating, based on the action and the accessed account information, one or more commands directing an external account authorization server to determine whether the action is authorized; transmitting, via the communication interface and to the external account authorization server, the one or more commands directing the external account authorization server to determine whether the action is authorized; receiving, via the communication interface and from the external account authorization server, information indicating unauthorized use of the account by the first user device; transmitting, via the communication interface and to a case management server, the information indicating unauthorized access of the account by the first user device; receiving, via the communication interface and from the case management server, updated unauthorized use information; and updating unauthorized use criteria information based on the updated unauthorized use information received from the case management server.
-
20. One or more non-transitory computer-readable media storing instructions that, when executed by a computing platform comprising at least one processor, memory, and a communication interface, cause the computing platform to:
-
receive, via the communication interface and from a first user device, metadata comprising first user device identification information and accessed account information; generate, based on the first user device identification information, one or more commands directing an internal device verification server to determine whether the first user device is one of a plurality of internal devices; transmit, via the communication interface and to the internal device verification server, the one or more commands to determine whether the first user device is the one of the plurality of internal devices; receive, via the communication interface and from the internal device verification server, internal device verification information indicating the first user device is the one of the plurality of internal devices; in response to receiving the internal device verification information, identify, based on the accessed account information, an action indicating the first user device accessed an account; generate, based on the action and the accessed account information, one or more commands directing an external account authorization server to determine whether the action is authorized; transmit, via the communication interface and to the external account authorization server, the one or more commands directing the external account authorization server to determine whether the action is authorized; receive, via the communication interface and from the external account authorization server, information indicating unauthorized use of the account by the first user device; transmit, via the communication interface and to a case management server, the information indicating unauthorized use of the account by the first user device; receive, via the communication interface and from the case management server, updated unauthorized use information; and update unauthorized use criteria information based on the updated unauthorized use information received from the case management server.
-
Specification