×

Systems and methods to authenticate users and/or control access made by users on a computer network based on scanning elements for inspection according to changes made in a relation graph

  • US 10,187,369 B2
  • Filed: 03/20/2017
  • Issued: 01/22/2019
  • Est. Priority Date: 09/30/2016
  • Status: Active Grant
First Claim
Patent Images

1. A controller for user authentication and access control, the controller comprising:

  • at least one microprocessor;

    a network interface controlled by the at least one microprocessor to communicate over a computer network with at least one computing site; and

    memory coupled with the at least one microprocessor and storing;

    graph data representing a graph having;

    nodes representing data elements associated with accesses made using access tokens, including first nodes representing the access tokens and second nodes representing attributes of the accesses, andlinks among the nodes representing connections between the data elements identified in collected data about the accesses, including connects between the access tokens and the attributes of the accesses;

    instructions which, when executed by the at least one microprocessor, cause the controller to process an access made using an access token based on changes to the graph caused by the access, including;

    receive, from the computing site, input data specifying details of the access made using the access token;

    update the graph according to the input data of the access made using the access token;

    identify the changes in the graph resulting from updating the graph according to the input data of the access made using the access token;

    identify, for each respective change among the changes resulting from the updating of the graph caused by the access made using the access token, a first set of elements corresponding to nodes in the graph that are up to a first predetermined number of degrees of separation from the respective change;

    evaluate trustworthiness of first user identities corresponding to the first set of elements, wherein the trustworthiness of the first user identities is based on a trust score;

    process the access made using the access token based on the trustworthiness of the first user identities corresponding to the first set of elements; and

    in response to a determination that the trustworthiness of the first user identities does not meet a predetermined requirement;

    identify a second set of elements corresponding to nodes in the graph that are up to a second predetermined number of degrees of separation from the respective change, wherein the second predetermined number of degrees of separation is larger than the first predetermined number of degrees of separation;

    evaluate trustworthiness of second user identities corresponding to the second set of elements; and

    process the access made using the access token based at least in part on the trustworthiness of the second user identities corresponding to the second set of elements.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×