Please download the dossier by clicking on the dossier button x
×

User behavior profile

  • US 10,264,012 B2
  • Filed: 04/20/2018
  • Issued: 04/16/2019
  • Est. Priority Date: 05/15/2017
  • Status: Active Grant
First Claim
Patent Images

1. A system comprising:

  • a processor;

    a data bus coupled to the processor; and

    a non-transitory, computer-readable storage medium embodying computer program code for generating a cyber behavior profile, the non-transitory, computer-readable storage medium being coupled to the data bus, the computer program code interacting with a plurality of computer operations and comprising instructions executable by the processor and configured for;

    monitoring electronically-observable user interactions, the electronically-observable user interactions comprising a behavior exhibited by a user that is observed through the use of at least one of an electronic device, a computer system and a software application executing on the computing system;

    converting the electronically-observable user interactions into electronic information representing the electronically-observable user interactions, the electronic information representing the electronically-observable user interactions comprising multi-layered electronic information, each layer of the multi-layered electronic information corresponding to a respective layer of user interaction;

    generating a multi-dimensional cyber behavior profile based upon the multi-layered electronic information representing the user interactions;

    identifying a known good interaction between the user and the information handling system;

    storing a representation of the known good interaction between the user and the information handling system within the multi-dimensional cyber behavior profile as a known good user behavior element;

    identifying an anomalous interaction between the user and the information handling system;

    storing a representation of the anomalous interaction between the user and the information handling system within the multi-dimensional cyber behavior profile as a suspect user behavior element;

    generating a user behavior profile score and a hash based upon the known good interaction and the anomalous interaction; and

    ,storing the user behavior profile score and the hash within the multi-dimensional cyber behavior profile.

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×