Abstract
Reporters obtained the following quote from the background information supplied by the inventors:“The modern web and Internet enable entities to engage and perform an incalculable number of activities.Many of these activities involve user-to-user activities, user-to-business activities (or the reverse), and thelike. These activities between users and between users and organizational entities over the web often involvethe access, use, and/or exchange of information by one or more of the parties of the activities. Becauseof the malleable nature of the digital realm that these activities operate within, there arise a countlessnumber of digital threats by digital actors that aim to commit digital fraud and/or digital abuse usingonline services and/or Internet-accessible applications (e.g., web or mobile applications). Additionally, someof these bad digital actors may also aim to misappropriate the information (e.g., hack) being exchangedbetween legitimate entities to these activities. These digital threats may also be perpetrated by maliciousthird parties who seek to unlawfully or otherwise, impermissibly take advantage of the data or information that is exchanged or, if not exchanged, data or information about the activities or actions of users and/orbusinesses on the web.