US 12,229,275 B2
Security model utilizing multi-channel data with risk-entity facing cybersecurity alert engine and portal
Shane Cross, Matthews, NC (US); Daniel Fricano, San Francisco, CA (US); Thomas Gilheany, San Francisco, CA (US); Peter Anatole Makohon, San Francisco, CA (US); Dale Miller, San Francisco, CA (US); Charles Steven Edison, San Francisco, CA (US); Kodzo Wegba, San Francisco, CA (US); and James Bonk, San Francisco, CA (US)
Assigned to Wells Fargo Bank, N.A., San Francisco, CA (US)
Filed by Wells Fargo Bank, N.A., San Francisco, CA (US)
Filed on Jun. 22, 2023, as Appl. No. 18/213,183.
Application 18/213,183 is a continuation of application No. 17/129,777, filed on Dec. 21, 2020, granted, now 11,720,686.
Application 17/129,777 is a continuation in part of application No. 17/081,275, filed on Oct. 27, 2020, granted, now 11,706,241.
Claims priority of provisional application 63/007,045, filed on Apr. 8, 2020.
Prior Publication US 2023/0351026 A1, Nov. 2, 2023
Int. Cl. G06F 21/57 (2013.01); G06F 9/455 (2018.01); G06F 3/04842 (2022.01)
CPC G06F 21/577 (2013.01) [G06F 9/455 (2013.01); G06F 3/04842 (2013.01); G06F 2221/034 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method comprising:
providing a content portal to a user, wherein the content portal is configured to display a security risk profile via a generated graphical user interface (GUI);
receiving, via the generated GUI, a first input from the user, the first input comprising a selection of a component identified in the security risk profile and a response parameter;
providing, via the generated GUI, parameters for a targeted scan of the selected component;
receiving, via the generated GUI, a second input from the user, the second input comprising a selection of a confirmation of the parameters;
identifying at least one vulnerability associated with a first property or a second property from device connectivity data, wherein identifying the at least one vulnerability is based on the parameters;
initiating the targeted scan of the selected component associated with the at least one vulnerability;
determining a result of the targeted scan;
updating the security risk profile; and
updating a multi-dimensional score based on the updated security risk profile.