US 12,141,805 B2
Account security system
Joshua Edwards, Philadelphia, PA (US); Michael Mossoba, Great Falls, VA (US); and Abdelkader Benkreira, Washington, DC (US)
Assigned to Capital One Services, LLC, McLean, VA (US)
Filed by Capital One Services, LLC, McLean, VA (US)
Filed on Mar. 3, 2023, as Appl. No. 18/177,815.
Application 17/375,102 is a division of application No. 16/773,466, filed on Jan. 27, 2020, granted, now 11,093,943, issued on Aug. 17, 2021.
Application 18/177,815 is a continuation of application No. 17/375,102, filed on Jul. 14, 2021, granted, now 11,615,418.
Prior Publication US 2023/0206240 A1, Jun. 29, 2023
Int. Cl. G06Q 30/00 (2023.01); G06F 16/51 (2019.01); G06Q 20/40 (2012.01); G06Q 30/018 (2023.01); G06Q 40/02 (2023.01); G06V 20/40 (2022.01); G06V 40/16 (2022.01); H04L 9/40 (2022.01)
CPC G06Q 20/40145 (2013.01) [G06F 16/51 (2019.01); G06Q 30/0185 (2013.01); G06Q 40/02 (2013.01); G06V 20/40 (2022.01); G06V 40/172 (2022.01); H04L 63/0861 (2013.01)] 16 Claims
OG exemplary drawing
 
1. A system for facilitating image-feature malicious-activity detection and access prevention, where an activity notification associated with a transaction triggers feature detection for at least one image related to a different transaction, the system comprising:
one or more processors programmed with instructions that, when executed by the one or more processors, cause operations comprising:
receiving a first image from a first user device in connection with a first transaction effectuated via the first user device, and storing a representation of the first image from the first user device;
associating the representation of the first image with the first transaction;
receiving a second image from a second user device in connection with a second transaction effectuated via the second user device, and storing a representation of the second image from the second user device;
associating the representation of the second image with the second transaction;
in response to receiving a malicious activity notification associated with the first transaction, retrieving the representation of the first image and analyzing the representation of the first image to detect an identifying characteristic; and
in response to a determination that the identifying characteristic is present in the representation of the second image being above a predetermined degree of certainty, preventing access to an account related to the second transaction.