CPC G06F 21/566 (2013.01) [G06F 18/22 (2023.01); G06N 5/04 (2013.01); G06N 7/01 (2023.01); G06Q 20/389 (2013.01); G06Q 20/4016 (2013.01)] | 20 Claims |
1. A system comprising:
a non-transitory memory storing instructions; and
a processor configured to execute the instructions to cause the system to perform operations comprising:
receiving a first request to access an account associated with a first user from a first device;
receiving a second request to access the account associated with the first user from a second device;
based on the receiving the first request and the receiving the second request, initiating a malware detection check, wherein the malware detection check includes generating a first user transaction model for the first user associated with the first device and a second user transaction model for a second user associated with the second device;
determining that the second user is an unauthorized user of the account, wherein the determining is based in part on the malware detection check; and
preventing, based on the determining, the second user from accessing the account, wherein the preventing is performed at least in part by denying or suspending a transaction involving the second user or logging the second user out of the account.
|