US 12,113,815 B1
Systems and methods of using network traffic data to control data transmission
Justin Dax Haslam, San Antonio, TX (US); Jose L. Romero, Jr., San Antonio, TX (US); and Arthur Quentin Smith, Fredericksburg, TX (US)
Assigned to United Services Automobile Association (USAA), San Antonio, TX (US)
Filed by United Services Automobile Association (USAA), San Antonio, TX (US)
Filed on Dec. 9, 2021, as Appl. No. 17/546,865.
Claims priority of provisional application 63/125,735, filed on Dec. 15, 2020.
Int. Cl. H04L 9/40 (2022.01); H04L 45/00 (2022.01); H04L 45/12 (2022.01); H04W 4/02 (2018.01)
CPC H04L 63/1425 (2013.01) [H04L 45/123 (2013.01); H04L 45/20 (2013.01); H04L 45/22 (2013.01); H04L 63/107 (2013.01); H04W 4/025 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A method, comprising:
receiving, via a processor, a first set of data packets from a first computing device associated with a user over a first period of time;
generating, via the processor, a network hop model indicative of one or more network hops traversed by the first set of data packets;
receiving, via the processor, a second set of data packets from the first computing device over a second period of time;
determining, via the processor, whether the second set of data packets corresponds to the network hop model;
adjusting, via the processor, one or more operations associated with transmitting a third set of data packets to the first computing device in response to determining that the second set of data packets does not match the network hop model, wherein the one or more operations comprise:
generating an Internet Protocol (IP) tunnel configured to transmit the third set of data packets,
sending the third set of data packets to the first computing device via the IP tunnel;
generating a plurality of random pseudo bank data packets;
sending the plurality of random pseudo bank data packets via one or more additional IP tunnels; and
sending, via the processor, a notification to a second computing device associated with the user to authenticate the user in response to determining that the second set of data packets does not match the network hop model.