US 12,072,959 B2
Detecting separate login during action based knowledge-based authentication and disqualifying validity
Joshua Edwards, Philadelphia, PA (US); Samuel Rapowitz, Roswell, GA (US); Jenny Melendez, Falls Church, VA (US); David Septimus, New York, NY (US); Daniel Miller, Astoria, NY (US); Viraj Chaudhary, Katy, TX (US); Tyler Maiman, Melville, NY (US); and Vyjayanthi Vadrevu, Chicago, IL (US)
Assigned to Capital One Services, LLC, McLean, VA (US)
Filed by Capital One Services, LLC, McLean, VA (US)
Filed on Jun. 23, 2021, as Appl. No. 17/355,371.
Prior Publication US 2022/0414190 A1, Dec. 29, 2022
Int. Cl. G06F 21/00 (2013.01); G06F 21/31 (2013.01); G06Q 40/02 (2023.01)
CPC G06F 21/31 (2013.01) [G06Q 40/02 (2013.01); G06F 2221/2133 (2013.01); G06F 2221/2135 (2013.01)] 20 Claims
OG exemplary drawing
 
20. One or more non-transitory computer-readable media storing instructions that, when executed by one or more processors, cause the one or more processors to perform steps comprising:
receive a request for authorization to perform an action relating to a financial account;
receive, from one or more databases, financial transaction data relating to the financial account;
generate, based on the financial transaction data, an authorization question for determining whether to perform the action relating to the financial account;
generate, based on the financial transaction data and the authorization question, a correct answer to the authorization question;
provide the authorization question to a user;
receive a response to the authorization question;
determine, based on comparing a first timestamp associated with the authorization question and a second timestamp associated with a login access to the financial account, whether the login access to the financial account is detected after providing the authorization question to the user; and:
if the login access to the financial account is detected after providing the authorization question to the user, deny the request for authorization to perform the action relating to the financial account based on the response to the authorization question; or
if the login access to the financial account is not detected after providing the authorization question to the user, determine whether to grant the request for authorization to perform the action relating to the financial account based on the response to the authorization question.