US 12,244,593 B2
Device-agnostic access control techniques
Dilip Singh, Alpharetta, GA (US); Gary Keller, Woodstock, GA (US); Robert Beatty, Decatur, GA (US); and Sriram Tirunellayi, Duluth, GA (US)
Assigned to Equifax Inc., Atlanta, GA (US)
Filed by EQUIFAX INC., Atlanta, GA (US)
Filed on Mar. 29, 2022, as Appl. No. 17/657,055.
Prior Publication US 2023/0319036 A1, Oct. 5, 2023
Int. Cl. G06F 7/04 (2006.01); G06F 18/214 (2023.01); H04L 9/40 (2022.01)
CPC H04L 63/0876 (2013.01) [G06F 18/214 (2023.01); H04L 63/107 (2013.01); H04L 63/20 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A system comprising:
a processor; and
a non-transitory computer-readable medium comprising instructions that are executable by the processor to cause the processor to perform operations comprising:
receiving authentication data associated with an authentication attempt by a first entity;
determining a historical entity vector for the first entity, the historical entity vector comprising a plurality of features each comprising a plurality of sub-features, the historical entity vector determined by:
generating synthetic data based on a plurality of historical authentication attempts associated with one or more second entities, each entity of the one or more second entities different than the first entity;
generating, based on the synthetic data, weights corresponding to the plurality of sub-features of the historical entity vector; and
determining a plurality of probabilities as respective values of the plurality of sub-features using the weights of the plurality of sub-features, each probability of the plurality of probabilities indicating a likelihood that a corresponding sub-feature is involved in the authentication attempt;
performing a comparison between the historical entity vector and the authentication data; and
providing a responsive message based on the comparison for use in controlling access to an interactive computing environment.