×

Dynamically adaptive policy management for securing mobile financial transactions

  • US 10,360,625 B2
  • Filed: 06/22/2010
  • Issued: 07/23/2019
  • Est. Priority Date: 06/22/2010
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • storing, in a database, a plurality of patterns and a plurality of numerical probabilities that a user is either a cooperative user or a noncooperative user, the plurality of patterns corresponding to the plurality of numerical probabilities, respectively;

    presenting, via an external terminal, an input request associated with a vertex of a security policy;

    receiving, via the external terminal, user input in response to the input request;

    predicting whether the user of the external terminal is the cooperative user or the noncooperative user by;

    matching the user input to one of the plurality of patterns;

    identifying one of the plurality of numerical probabilities that corresponds to the one of the plurality of patterns obtained by the matching;

    comparing the one of the plurality of numerical probabilities obtained by the identifying to a predetermined threshold; and

    designating the user as either the cooperative user or the noncooperative user based on a result of the comparing;

    retrieving, from the database, a rule associated with the vertex;

    selecting an edge from a plurality of edges associated with the vertex based on the retrieved rule and a result of the predicting;

    routing a communication session of the external terminal to a subsequent vertex via the selected edge;

    generating, by a pseudorandom number generator, a pseudorandom number for each available edge of the subsequent vertex;

    selecting, based on the pseudorandom number, a first edge of the subsequent vertex;

    transmitting, by a security services module and in response to the selecting the first edge, false data to the external terminal;

    receiving, by the security services module and from the external terminal, a user response to the false data including a confirmation of the false data;

    compiling, by the security services module, the user response to the false data;

    gathering, by the security services module, information on a current hacking technique being utilized from the external terminal;

    recording, by the security services module, an IP address of the external terminal;

    transmitting, by the security services module, the IP address of the external terminal to a third party;

    computing, by the security services module, a probable payoff amount comprising an estimated payoff amount that the external terminal will obtain using the current hacking technique;

    computing, by the security services module, a decoy payoff amount by multiplying the probable payoff amount by a predetermined factor;

    routing, by the security services module, the communication session to a decoy payoff vertex; and

    transferring, by the security services module, the decoy payoff amount to the user.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×