×

Compromised password detection based on abuse and attempted abuse

  • US 10,270,801 B2
  • Filed: 01/25/2016
  • Issued: 04/23/2019
  • Est. Priority Date: 01/25/2016
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • obtaining, by a computing device, a list that includes a record generated for each of a plurality of detected failed login attempts, each record including a corresponding account identifier, a corresponding piece of password data, a corresponding location reference, and a corresponding temporal reference associated with one of the plurality of detected failed login attempts;

    determining, by the computing device, that a first piece of password data in the list is identical to a second piece of password data in the list, and that a first location reference in the list is different than a second location reference in the list, wherein the first location reference and the second location reference are included in a pair of records in the list and are sequentially-ordered based on two or more temporal references in the list;

    based on the determination, accessing, by the computing device, a publicly-available travel resource to identify an average travel time between two physical locations determined based on the first location reference and the second location reference;

    modifying, by the computing device, a password blacklist to include the first piece of password data based on a determination that the average travel time exceeds a calculated duration between the two or more temporal references; and

    employing, by the computing device, the password blacklist to prevent an association of the first piece of password data with at least one account identifier associated with the password blacklist.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×