Abstract
Reporters obtained the following quote from the background information supplied by the inventors:“Managers of electronic networks allowing access to resources and the distribution of resources have a hardertime than ever determining when a misappropriation of those resources is attempted and how to preventthe misapp ropriation without alerting the misappropriator. For instance, a potential misap propriator mayuse force, coercion, and/or the like to influence a user associat ed with a resource account in order forthe potential misappropriator to gain ac cess to the resources. Further, and where the misappropriator isable to gain ac cess to the resources through the user associated with the resource account, man agersof the electronic networks allowing access to resources may need to furthe r prevent the actual resourcesfrom being distributed to the misappropriator. Th us, there exists a need for a system to activate a decoyresource based on dures s triggers being tracked in an efficient, accurate, and secure manner.