| CPC G06Q 20/3827 (2013.01) [G06Q 20/4014 (2013.01); G06Q 20/407 (2013.01)] | 16 Claims |

|
1. A real-time payment security system for preventing eavesdropping attacks comprising:
a dynamic sensor plugin comprising a plurality of sensors configured to detect anomaly-type behavior indicative of a security threat, wherein the plurality of sensors are configured to share data, and wherein the plurality of sensors are configured to eliminate false-positive anomaly-type behavior indicative of a security threat;
a hash chain network comprising:
a first hash node comprising a first hash node processor and a first hash node memory;
a plurality of second hash nodes each comprising a second hash node processor and a second hash node memory; and
a master checker node comprising a master checker node processor and master checker node memory; and
a computing device connected to the dynamic sensor plugin, the computing device comprising a computing device memory and a computing device processor, the computing device memory storing a dynamic authentication mapper, wherein the dynamic authentication mapper is powered by a cognitive artificial intelligence (AI) engine, and the computing device memory further computing device instructions which, when executed by the computing device processor, cause the computing device processor to perform operation of:
activating, using the dynamic sensor plugin, the plurality of sensors to detect the anomaly-type behavior indicative of a security threat;
wherein the plurality of sensors of the dynamic sensor plugin, after being activated by the computing device, are configured to:
detect the anomaly-type behavior indicative of a security threat and generate data representing the anomaly-type behavior indicative of a security threat;
broadcast, to the hash chain network, the generated data;
wherein the first hash node memory comprises first hash node instructions which, when executed by the first hash node processor, causes the first hash node processor to perform the operations of:
evaluating the generated data;
identifying a spike value in the generated data;
wherein each second hash node memory of each of the plurality of second hash nodes comprises second hash node instructions which, when executed by each second hash node processor of each of the plurality of second hash nodes, cause the second hash node processor to perform an operation of:
evaluating the generated data to reconcile the spike value in the generated data;
wherein the master checker node memory comprises master checker node instructions which, when executed by the master checker node processor, cause the master checker node processor to perform an operation of: activating the dynamic authentication mapper; and
wherein the computing device instructions, when executed by the computing device processor, further cause the computing device processor to perform operations of:
evaluating, using the dynamic authentication mapper, a severity of a valid anomaly-type behavior indicative of a threat for the spike in value data; and
generating, using the dynamic authentication mapper, a user notification of a threat comprising a required authentication level thereby preventing an eavesdropping attack.
|