CPC H04L 45/742 (2013.01) [H04L 47/286 (2013.01); H04L 49/206 (2013.01)] | 18 Claims |
1. A computer-implemented method comprising:
detecting, in a data stream, first information associated with a user;
storing, based on the detecting, the first information in an application cache associated with an application;
receiving, by a server and from the application, the first information from the application cache;
prepopulating a first action cache with at least some of the first information received from the application cache;
receiving a first request, by the server and from the application, a first request comprising a request for performing a first action associated with the user;
performing the first action;
prepopulating, with second information and based on the performance of the first action, a second action cache with at least some of the first information from the first action cache, wherein the second action cache is associated with detecting fraudulent transactions;
receiving, by the server and from the application, a second request comprising a request for performing a second action, wherein the second action comprises a transaction associated with a user account associated with the user;
determining, by the server and based on the second information in the prepopulated second cache, whether the second request, for performing the second action, is fraudulent; and
based on a determination that the second request is not fraudulent, performing the second action.
|