Systems and methods to authenticate users and/or control access made by users on a computer network using a graph score
First Claim
1. A controller for user authentication and access control, the controller comprising:
- at least one microprocessor;
a network interface controlled by the at least one microprocessor to communicate over a computer network with at least one computing site; and
memory coupled with the at least one microprocessor and storing;
graph data representing a graph having nodes and links;
wherein the nodes of the graph represent data elements associated with accesses made using access tokens, andwherein the links of the graph among the nodes of the graph represent connections between the data elements identified in collected data about the accesses;
instructions which, when executed by the at least one microprocessor, cause the controller to;
receive, from the computing site, input data specifying details of an access made using an access token;
update the graph according to the input data;
determine a plurality of measurements of the graph;
compute a score of the graph based on a weighted average of the measurements; and
process the access made using the access token based on the score.
6 Assignments
0 Petitions
Accused Products
Abstract
A controller for user authentication and access control, configured to: store data representing a graph having: nodes representing data elements associated with accesses made using an access token; and links among the nodes representing connections between the data elements identified in details of the accesses. In response to receiving details of an access made using the access token, the controller updates the graph according to the details and determines a plurality of measurements of the graph. After computing a score of the graph based on a weighted average of the measurements, the controller authenticates the user of the access and/or controls the access based on the score.
-
Citations
20 Claims
-
1. A controller for user authentication and access control, the controller comprising:
-
at least one microprocessor; a network interface controlled by the at least one microprocessor to communicate over a computer network with at least one computing site; and memory coupled with the at least one microprocessor and storing; graph data representing a graph having nodes and links; wherein the nodes of the graph represent data elements associated with accesses made using access tokens, and wherein the links of the graph among the nodes of the graph represent connections between the data elements identified in collected data about the accesses; instructions which, when executed by the at least one microprocessor, cause the controller to; receive, from the computing site, input data specifying details of an access made using an access token; update the graph according to the input data; determine a plurality of measurements of the graph; compute a score of the graph based on a weighted average of the measurements; and process the access made using the access token based on the score. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer storage medium storing instructions which, when executed by a controller, cause the controller to perform a method for user authentication and access control, the method comprising:
-
storing, in the controller coupled to a network, graph data representing a graph having; nodes representing data elements associated with accesses made using access tokens, and links among the nodes representing connections between the data elements identified in collected data about the accesses; receiving, in the controller over the network from a computing site, input data specifying details of an access made using an access token; updating, by the controller, the graph according to the input data; determining, by the controller, a plurality of measurements of the graph; computing, by the controller, a score of the graph based on a weighted average of the measurements; and processing, by the controller, the access made using the access token based on the score.
-
-
18. A method for user authentication and access control, the method comprising:
-
storing, in a controller coupled to a network, graph data representing a graph having; nodes representing data elements that are; associated with accesses made using access tokens, and identified in collected data about the accesses; links among the nodes representing connections between the data elements identified in the collected data about the accesses; receiving, in the controller over the network from a computing site, input data specifying details of an access made using an access token; updating, by the controller, the graph according to the input data; determining, by the controller, a plurality of measurements of the graph; computing, by the controller, a score of the graph based on a weighted average of the measurements; and processing, by the controller, the access made using the access token based on the score. - View Dependent Claims (19, 20)
-
Specification