| CPC G06F 9/5072 (2013.01) [G06F 9/505 (2013.01); G06F 9/5083 (2013.01)] | 20 Claims |

|
1. A system for implementing dynamic authentication restrictions for resource instrument use, the system comprising:
at least one non-transitory storage device; and
at least one processor coupled to the at least one non-transitory storage device, wherein the at least one processor is configured to:
continuously monitor attributes associated with incoming resource transfer requests;
receive, from an endpoint device, one or more inputs associated with a compromise of a first resource transfer instrument;
receive a subsequent resource transfer request;
based on one or more attributes associated with the subsequent resource transfer request and the one or more inputs associated with the compromise of the first resource transfer instrument, generate a resource transfer restriction pattern using a machine learning model; and
execute one or more restrictions on the subsequent resource transfer request according to the resource transfer restriction pattern while allowing recurring and expected resource transfers to process, wherein executing one or more restrictions on the subsequent resource transfer request further comprises prompting a request for additional authentication credentials and inputs from a device associated with the subsequent resource transfer request.
|