GENERATING AND EXECUTING COMPUTER SYSTEM WORKFLOW ACTION ITEMS BASED UPON ANALYSIS OF CUSTOMER SOCIAL MEDIA ACTIVITY
First Claim
1. A computerized method for generating and executing computer system data security workflow action items based upon analysis of customer social media activity, the method comprisingreceiving, by a social media processing engine of a server computing device, social media activity data from each of a plurality of social media data sources;
- identifying, by the social media processing engine, an existing customer associated with a portion of the social media activity data, includingparsing the portion of the social media activity data to extract one or more social media account names and determining whether the social media account names correspond to the existing customer, andanalyzing demographic information contained in the portion of the social media activity data to determine a match with demographic information for the existing customer that is contained in a customer profile database;
selecting, by the social media processing engine, a data security workflow action item based upon an indication of potential unauthorized access to secure customer information contained in the portion of the social media activity data for the identified customer;
retrieving, by the social media processing engine, customer profile data and customer account data for the data security workflow action item based upon the identified customer;
populating, by the social media processing engine, the data security workflow action item with the customer profile data and the customer account data;
transmitting, by the social media processing engine, the populated data security workflow action item to a workflow processing engine;
executing, by the workflow processing engine of the server computing device, the populated data security workflow action item to transmit a transaction workflow request to an enterprise computing system that is responsive to the workflow action item, including translating the populated data security workflow action item into platform-specific programmatic instructions that comprise the transaction workflow request; and
modifying, by the enterprise computing system, an authentication credential profile associated with the identified customer based upon the transaction workflow request to restrict access to customer-specific data and online transaction services for one or more other customer accounts linked to the identified customer.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and apparatuses are described for generating and executing computer system workflow action items based upon analysis of customer social media activity. A social media processing engine receives social media activity data from each of a plurality of social media data sources and identifies a customer associated with the social media activity data. The social media processing engine selects a workflow action item based upon the portion of the social media activity data and retrieves customer profile data and customer account data for the workflow action item. The social media processing engine populates the workflow action item with the customer profile data and the customer account data and transmits the populated workflow action item to a workflow processing engine, which executes the populated workflow action item to transmit a workflow transaction request to an enterprise computing system that is responsive to the workflow action item.
36 Citations
29 Claims
-
1. A computerized method for generating and executing computer system data security workflow action items based upon analysis of customer social media activity, the method comprising
receiving, by a social media processing engine of a server computing device, social media activity data from each of a plurality of social media data sources; -
identifying, by the social media processing engine, an existing customer associated with a portion of the social media activity data, including parsing the portion of the social media activity data to extract one or more social media account names and determining whether the social media account names correspond to the existing customer, and analyzing demographic information contained in the portion of the social media activity data to determine a match with demographic information for the existing customer that is contained in a customer profile database; selecting, by the social media processing engine, a data security workflow action item based upon an indication of potential unauthorized access to secure customer information contained in the portion of the social media activity data for the identified customer; retrieving, by the social media processing engine, customer profile data and customer account data for the data security workflow action item based upon the identified customer; populating, by the social media processing engine, the data security workflow action item with the customer profile data and the customer account data; transmitting, by the social media processing engine, the populated data security workflow action item to a workflow processing engine; executing, by the workflow processing engine of the server computing device, the populated data security workflow action item to transmit a transaction workflow request to an enterprise computing system that is responsive to the workflow action item, including translating the populated data security workflow action item into platform-specific programmatic instructions that comprise the transaction workflow request; and modifying, by the enterprise computing system, an authentication credential profile associated with the identified customer based upon the transaction workflow request to restrict access to customer-specific data and online transaction services for one or more other customer accounts linked to the identified customer. - View Dependent Claims (2, 4, 8, 11, 12, 14)
-
- 3. (canceled)
-
6-7. -7. (canceled)
-
9-10. -10. (canceled)
-
13. (canceled)
-
15. A system for generating and executing computer system data security workflow action items based upon analysis of customer social media activity, the system comprising
a social media processing engine of a server computing device, the social media processing engine configured to receive social media activity data from each of a plurality of social media data sources; -
identify an existing customer associated with a portion of the social media activity data, including parsing the portion of the social media activity data to extract one or more social media account names and determining whether the social media account names correspond to the existing customer, and analyzing demographic information contained in the portion of the social media activity data to determine a match with demographic information for the existing customer that is contained in a customer profile database; select a data security workflow action item based upon an indication of potential unauthorized access to secure customer information contained in the portion of the social media activity data for the identified customer; retrieve customer profile data and customer account data for the data security workflow action item based upon the identified customer; and populate the data security workflow action item with the customer profile data and the customer account data; and a workflow processing engine of a server computing device, the workflow processing engine coupled to the social media processing engine and configured to receive the populated data security workflow action item from the social media processing engine; and execute the populated data security workflow action item to transmit a transaction workflow request to an enterprise computing system that is responsive to the workflow action item, including translating the populated data security workflow action item into platform-specific programmatic instructions that comprise the transaction workflow request; the enterprise computing system being configured to modify an authentication credential profile associated with the identified customer based upon the transaction workflow request to restrict access to customer-specific data and online transaction services for one or more other customer accounts linked to the identified customer. - View Dependent Claims (16, 18, 19, 22, 25, 26)
-
-
17. (canceled)
-
20-21. -21. (canceled)
-
23-24. -24. (canceled)
- 27. (canceled)
-
29. A computer program product, tangibly embodied in a non-transitory computer readable storage device, for generating and executing computer system data security workflow action items based upon analysis of customer social media activity, the computer program product comprising instructions operable to cause a social media processing engine of a server computing device to
receive social media activity data from each of a plurality of social media data sources; -
identify an existing customer associated with a portion of the social media activity data, including parsing the portion of the social media activity data to extract one or more social media account names and determining whether the social media account names correspond to the existing customer, and analyzing demographic information contained in the portion of the social media activity data to determine a match with demographic information for the existing customer that is contained in a customer profile database; select a data security workflow action item based upon an indication of potential unauthorized access to secure customer information contained in the portion of the social media activity data for the identified customer; retrieve customer profile data and customer account data for the data security workflow action item based upon the identified customer; and populate the data security workflow action item with the customer profile data and the customer account data; wherein the computer program product comprises further instructions operable to cause a workflow processing engine of a server computing device coupled to the social media processing engine to receive the populated workflow action item from the social media processing engine; and execute the populated data security workflow action item to transmit a transaction workflow request to an enterprise computing system that is responsive to the workflow action item, including translating the populated data security workflow action item into platform-specific programmatic instructions that comprise the transaction workflow request; the enterprise computing system being configured to modify an authentication credential profile associated with the identified customer based upon the transaction workflow request to restrict access to customer-specific data and online transaction services for one or more other customer accounts linked to the identified customer.
-
Specification