×

Systems and methods for securing access to resources

  • US 10,110,621 B2
  • Filed: 11/14/2017
  • Issued: 10/23/2018
  • Est. Priority Date: 11/15/2016
  • Status: Active Grant
First Claim
Patent Images

1. A method for securing access to a resource, the method comprising performing, by a computer system:

  • determining a first set of previous access requests from a plurality of previous access requests, each previous access request of the first set including one or more parameters that involve one or more conditions of a potential access rule;

    determining a total predictive percentage for the potential access rule based on validity information corresponding to each previous access request of the first set of previous access requests, the validity information indicating whether each access request of the plurality of previous access requests is valid or invalid;

    segmenting the first set of previous access requests into a plurality of time-based subsets of access requests;

    determining a predictive percentage for each of the plurality of time-based subsets based on the validity information corresponding to each previous access request of the time-based subsets;

    determining a detection stability rating of the potential access rule by comparing the plurality of predictive percentages; and

    selecting the potential access rule to be a candidate access rule for use in an operational set of access rules based on the detection stability rating of the potential access rule compared to detection stability ratings of other access rules, wherein the candidate access rule is included in the operational set of access rules, the operational set of access rules is loaded into a system memory, a plurality of real-time access requests are received over a network from a plurality of devices, the system memory is accessed to obtain the operational set of access rules when one of the plurality of real-time access requests is received from a first device of the plurality of devices, the operational set of access rules is used to determine an access request outcome for the one real-time access request, and access to the resource is provided based on the access request outcome.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×