US 11,657,139 B2
Computer-based platforms or systems, computing devices or components and/or computing methods for technological applications involving provision of a portal for managing user accounts having a login portal configured to defend against credential replay attacks
Salman Haq, McLean, VA (US); Jit Sen, Frisco, TX (US); Sreedhar Vedantam, Plano, TX (US); and Riteshkumar Hadawani, McKinney, TX (US)
Assigned to Capital One Services, LLC, McLean, VA (US)
Filed by Capital One Services, LLC, McLean, VA (US)
Filed on Dec. 14, 2021, as Appl. No. 17/551,076.
Application 17/551,076 is a continuation of application No. 16/833,849, filed on Mar. 30, 2020, granted, now 11,200,311.
Application 16/833,849 is a continuation of application No. 16/545,835, filed on Aug. 20, 2019, granted, now 10,628,576, issued on Apr. 21, 2020.
Prior Publication US 2022/0108002 A1, Apr. 7, 2022
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 21/44 (2013.01); G06F 21/55 (2013.01)
CPC G06F 21/44 (2013.01) [G06F 21/554 (2013.01); G06F 2221/034 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A system comprising:
one or more computing components, computer systems, or servers including or operationally coupled to one or more processors; and
at least one computer-readable media and/or memory in communication with the one or more processors and storing instructions that, when executed by the one or more processors, cause the one or more processors to:
collect, by at least one processor, prior login data associated with prior logins by one or more users;
processing, by the at least one processor, a login request, including capturing user credentials as well as current login attributes and an attributes checksum;
validating, by the at least one processor, the login request, including analyzing one or both of the current login attributes and the attributes checksum captured during the login request, wherein the analyzing comprises assessing the current login attributes and the attributes checksum for inconsistent browser attributes including:
flagging the login request as a potentially fraudulent login when at least one of the captured timestamp is stale, the captured timestamp is missing, the attributes checksum is invalid, or the attributes checksum is missing;
redirecting, by the at least one processor, an access attempt that is flagged as the potentially fraudulent login to an enhanced security process, wherein the enhanced security process includes generating and sending second factor authentication; and
performing additional processing such as allowing or denying login, by the at least one processor, to customer accounts or information associated with the user credentials based on the enhanced security process.