×

System and method providing data-driven user authentication misuse detection

  • US 10,165,005 B2
  • Filed: 09/07/2016
  • Issued: 12/25/2018
  • Est. Priority Date: 09/07/2016
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method performed by a computing device, where the computing device includes at least a hardware processor for executing instructions from a memory, the method comprising:

  • for each of a first user authentication attempt to access a secure computer resource and a second user authentication attempt to access the secure computer resource;

    (i) collecting, via at least the hardware processor, user authentication log data having user attribute values;

    (ii) transforming, via at least the hardware processor, the user authentication log data into a tracer data structure having the user attribute values organized in a common format; and

    (iii) associating, via at least the hardware processor, the tracer data structure with timestamp data to generate an event data structure, wherein the timestamp data represents a time corresponding to the respective user authentication attempt to access the secure computer resource;

    performing a comparison of the event data structure for the first user authentication attempt to the event data structure for the second user authentication attempt;

    based on a result of the comparison, detecting an impossible event pattern, wherein the impossible event pattern indicates that the first user authentication attempt and the second user authentication attempt possibly originated from different geographic locations, and physically traveling between the different geographic locations within a time defined by the timestamp data of the event data structures is not realizable;

    applying, via at least the hardware processor, a filter to the impossible event pattern to determine whether the impossible event pattern is attributable to a non-malicious cause;

    if application of the filter results in the impossible event pattern being attributed to the non-malicious cause, resolving the impossible event pattern as non-malicious; and

    if application of the filter does not attribute the impossible event pattern to the non-malicious cause;

    (i) designating, via at least the hardware processor, at least one of the first user authentication attempt or the second user authentication attempt as a malicious authentication attempt to access the secure computer resource; and

    (ii) controlling issuance of an alarm message or signal as a warning to a remote computing device.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×