US 12,287,890 B2
Computer-based systems configured for efficient and secure multi-user electronic activities and methods of use thereof
Latika Gulati, Vienna, VA (US); Michael Wolf, Ellicott City, MD (US); and Lin Ni Lisa Cheng, Great Neck, NY (US)
Assigned to Capital One Services, LLC, McLean, VA (US)
Filed by Capital One Services, LLC, McLean, VA (US)
Filed on Sep. 12, 2022, as Appl. No. 17/942,705.
Prior Publication US 2024/0086555 A1, Mar. 14, 2024
Int. Cl. G06F 21/60 (2013.01); G06F 21/31 (2013.01)
CPC G06F 21/606 (2013.01) [G06F 21/31 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method comprising:
receiving, by at least one processor, a communication request associated with an electronic activity being executed at an initiator device;
wherein the communication request comprises a plurality of communication attributes associated with a communication;
wherein the plurality of communication attributes comprises:
virtual token,
an entity identifier identifying an entity associated with the initiator device, and
a data content associated with communication request;
determining, by the at least one processor, that the virtual token is a proxy profile identifier;
wherein the proxy profile identifier identifies a plurality of actual data source profiles;
wherein the virtual token comprises a multi-part schema that:
defines a virtual profile for recording split activities and
enabling the routing of the communication request via split communication requests to the plurality of actual data source profiles;
wherein each actual data source profile of the plurality of actual data source profiles comprises an actual profile identifier different from the proxy profile identifier;
determining, by the at least one processor, based at least in part on the plurality of communication attributes, at least one split rule defining a proportion of the data content to be attributed to each actual data source profile of the plurality of actual data source profiles;
determining, by the at least one processor, at least one security risk sub-score for each actual data source profile of the plurality of actual data source profiles based at least in part on the proportion of the data content attributed to each actual data source profile of the plurality of actual data source profiles, the at least one security risk sub-score for each actual data source profile being representative of a level of risk to each actual data source associated with the communication request;
determining, by the at least one processor, a security risk score associated with the virtual token based at least in part on an aggregation of the at least one security risk sub-score for each actual data source profile of the plurality of actual data source profiles;
determining, by the at least one processor, a communication request authorization based at least in part on the security risk score satisfying a threshold security score;
accessing, by the at least one processor, based on the communication request authorization, each actual data source profile of the plurality of actual data source profiles to access the proportion of the data content of each actual data source profile of the plurality of actual data source profiles;
consolidating, by the at least one processor, the proportion of the data content accessed from each actual data source profile of the plurality of actual data source profiles into a single response; and
executing, by the at least one processor, the electronic activity with the single response.