×

GENERATING AND EXECUTING COMPUTER SYSTEM WORKFLOW ACTION ITEMS BASED UPON ANALYSIS OF CUSTOMER SOCIAL MEDIA ACTIVITY

  • US 20160232463A1
  • Filed: 02/06/2015
  • Published: 08/11/2016
  • Est. Priority Date: 02/06/2015
  • Status: Abandoned Application
First Claim
Patent Images

1. A computerized method for generating and executing computer system data security workflow action items based upon analysis of customer social media activity, the method comprisingreceiving, by a social media processing engine of a server computing device, social media activity data from each of a plurality of social media data sources;

  • identifying, by the social media processing engine, an existing customer associated with a portion of the social media activity data, includingparsing the portion of the social media activity data to extract one or more social media account names and determining whether the social media account names correspond to the existing customer, andanalyzing demographic information contained in the portion of the social media activity data to determine a match with demographic information for the existing customer that is contained in a customer profile database;

    selecting, by the social media processing engine, a data security workflow action item based upon an indication of potential unauthorized access to secure customer information contained in the portion of the social media activity data for the identified customer;

    retrieving, by the social media processing engine, customer profile data and customer account data for the data security workflow action item based upon the identified customer;

    populating, by the social media processing engine, the data security workflow action item with the customer profile data and the customer account data;

    transmitting, by the social media processing engine, the populated data security workflow action item to a workflow processing engine;

    executing, by the workflow processing engine of the server computing device, the populated data security workflow action item to transmit a transaction workflow request to an enterprise computing system that is responsive to the workflow action item, including translating the populated data security workflow action item into platform-specific programmatic instructions that comprise the transaction workflow request; and

    modifying, by the enterprise computing system, an authentication credential profile associated with the identified customer based upon the transaction workflow request to restrict access to customer-specific data and online transaction services for one or more other customer accounts linked to the identified customer.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×