US 12,113,800 B2
System and method for security management of a plurality of invalid interactions
Peter G. Kurrasch, Palatine, IL (US); and Nathan A. Dalpini, Lincolnville, ME (US)
Assigned to Bank of America Corporation, Charlotte, NC (US)
Filed by Bank of America Corporation, Charlotte, NC (US)
Filed on Sep. 28, 2023, as Appl. No. 18/477,308.
Application 18/477,308 is a continuation of application No. 17/448,381, filed on Sep. 22, 2021, granted, now 11,811,778.
Prior Publication US 2024/0022573 A1, Jan. 18, 2024
This patent is subject to a terminal disclaimer.
Int. Cl. G06Q 20/40 (2012.01); H04L 9/40 (2022.01)
CPC H04L 63/102 (2013.01) [G06Q 20/40 (2013.01); G06Q 20/4016 (2013.01); H04L 63/0876 (2013.01); H04L 63/08 (2013.01)] 20 Claims
OG exemplary drawing
 
1. An apparatus for security management of a plurality of interactions, comprising:
a memory, associated with a server, operable to:
store interaction information associated with at least one of a plurality of users and a first entity;
store entity account data for at least the first entity; and
a processor, associated with the server, operably coupled to the memory, configured to:
receive the plurality of interactions, each interaction comprising interaction information associated with a particular one of the plurality of users and the first entity;
determine a threshold value of the plurality of interactions and a threshold volume of the plurality of interactions;
determine that a value of each of the received plurality of interactions has not exceeded the threshold value of the plurality of interactions;
determine that the plurality of interactions has not exceeded the threshold volume of the plurality of interactions;
determine a number of instances of the plurality of interactions that were invalid;
determine that the number of instances of the plurality of interactions that were invalid exceeds a threshold; and
in response to determining that the number of instances of the plurality of interactions that were invalid exceeds the threshold, determine that the first entity is associated with suspicious indicators, wherein suspicious indicators indicate that there is unauthorized activity associated with the first entity.