Compromised password detection based on abuse and attempted abuse
First Claim
1. A computer-implemented method, comprising:
- obtaining, by a computing device, a list that includes a record generated for each of a plurality of detected failed login attempts, each record including a corresponding account identifier, a corresponding piece of password data, a corresponding location reference, and a corresponding temporal reference associated with one of the plurality of detected failed login attempts;
determining, by the computing device, that a first piece of password data in the list is identical to a second piece of password data in the list, and that a first location reference in the list is different than a second location reference in the list, wherein the first location reference and the second location reference are included in a pair of records in the list and are sequentially-ordered based on two or more temporal references in the list;
based on the determination, accessing, by the computing device, a publicly-available travel resource to identify an average travel time between two physical locations determined based on the first location reference and the second location reference;
modifying, by the computing device, a password blacklist to include the first piece of password data based on a determination that the average travel time exceeds a calculated duration between the two or more temporal references; and
employing, by the computing device, the password blacklist to prevent an association of the first piece of password data with at least one account identifier associated with the password blacklist.
5 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are disclosed for analyzing a plurality of failed login records that correspond to failed login attempts detected by a computing system, to identify suspicious patterns of activity that can facilitate the supplementation of password blacklists for improving account security. To accomplish the foregoing, failed login records that include information associated with failed login attempts are obtained for analysis. The failed login records are analyzed to identify a set of failed login records that show initial characteristics of a suspicious pattern of activity. The information included in the set of failed login records are further analyzed to determine whether a suspicious pattern of activity is actually present. When a suspicious pattern of activity is identified in the set of failed login records, the passwords used in the failed login attempts are stored in password blacklists associated with the account identifier(s) with which the passwords were used.
23 Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
obtaining, by a computing device, a list that includes a record generated for each of a plurality of detected failed login attempts, each record including a corresponding account identifier, a corresponding piece of password data, a corresponding location reference, and a corresponding temporal reference associated with one of the plurality of detected failed login attempts; determining, by the computing device, that a first piece of password data in the list is identical to a second piece of password data in the list, and that a first location reference in the list is different than a second location reference in the list, wherein the first location reference and the second location reference are included in a pair of records in the list and are sequentially-ordered based on two or more temporal references in the list; based on the determination, accessing, by the computing device, a publicly-available travel resource to identify an average travel time between two physical locations determined based on the first location reference and the second location reference; modifying, by the computing device, a password blacklist to include the first piece of password data based on a determination that the average travel time exceeds a calculated duration between the two or more temporal references; and employing, by the computing device, the password blacklist to prevent an association of the first piece of password data with at least one account identifier associated with the password blacklist. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer-readable medium storing instructions that, when executed, cause performance of operations comprising:
-
obtaining a list that includes a record generated for each of a plurality of detected failed login attempts, each record including a corresponding account identifier, a corresponding piece of password data, a corresponding location reference, and a corresponding temporal reference associated with one of the plurality of detected failed login attempts; determining that a first piece of password data in the list is identical to a second piece of password data in the list, and that a first location reference in the list is different than a second location reference in the list, wherein the first location reference and the second location reference are included in a pair of records in the list and are sequentially-ordered based on two or more temporal references in the list; based on the determination, accessing a publicly-available travel resource to identify an average travel time between two physical locations determined based on the first location reference and the second location reference; modifying a password blacklist to include the first piece of password data based on a determination that the average travel time exceeds a calculated duration between the two or more temporal references; and employing the password blacklist to prevent an association of the first piece of password data with at least one account identifier associated with the password blacklist. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system comprising:
-
a processor; and a computer-readable medium storing instructions that, when executed by the processor, cause the processor to; obtain a list that includes a record generated for each of a plurality of detected failed login attempts, each record including a corresponding account identifier, a corresponding piece of password data, a corresponding location reference, and a corresponding temporal reference associated with one of the plurality of detected failed login attempts; determine that a first piece of password data in the list is identical to a second piece of password data in the list, and that a first location reference in the list is different than a second location reference in the list, wherein the first location reference and the second location reference are included in a pair of records in the list and are sequentially-ordered based on two or more temporal references in the list; based on the determination, access a publicly-available travel resource to identify an average travel time between two physical locations determined based on the first location reference and the second location reference; modify a password blacklist to include the first piece of password data based on a determination that the average travel time exceeds a calculated duration between the two or more temporal references; and employ the password blacklist to prevent an association of the first piece of password data with at least one account identifier associated with the password blacklist. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification