×

System and method for detecting fraud and misuse of protected data by an authorized user using event logs

  • US 10,360,399 B2
  • Filed: 03/12/2018
  • Issued: 07/23/2019
  • Est. Priority Date: 05/31/2005
  • Status: Active Grant
First Claim
Patent Images

1. A method of detecting improper access of protected data by an authorized user, the method comprising:

  • extracting event data from an event log file including information associated with an attempt to access protected data, the extracting being performed by a computer system configured to recognize and parse the event data within the event log file for each of a plurality of different file formats to enable a monitoring system implemented by a processor to oversee authorized user activity across a plurality of applications across one or more computer environments for determining the attempt to access the protected data is fraudulent or indicative of probable misuse, wherein the authorized user has a plurality of different associated user identifiers;

    normalizing the event data based on a predefined format;

    processing the normalized event data to determine at least one of the plurality of different associated authorized user identifiers is linked to the attempt to access the protected data;

    processing the normalized event data and the at least one of the plurality of different associated authorized user identifiers to determine whether the attempt to access the protected data is fraudulent or indicative of probable misuse based on at least one rule applied by the monitoring system, the rule comprising at least one criterion related to accesses in excess of a specific volume, accesses during a pre-determined time interval, or accesses by a specific authorized user;

    storing normalized event data that is incapable of being associated with a known user in a list separate from normalized event data having the at least one of the plurality of different associated authorized user identifiers;

    generating a notification, based on a determination that the attempt to access the protected data is fraudulent or indicative of probable misuse; and

    generating additional data for the rule associated with the event data based on the notification,wherein the monitoring system continuously processes the normalized event data according to a predefined schedule, and the event log file corresponds with an application of the plurality of applications accessible by the authorized user, each application of the plurality of applications has a corresponding event log file, and the event log file of each application of the plurality of applications has a file format of the plurality of different file formats.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×