Systems and methods for securing access to resources
First Claim
1. A method for securing access to a resource, the method comprising performing, by a computer system:
- segmenting a set of previous access requests into a plurality of time-based subsets of access requests, each previous access request of the set including one or more parameters that involve one or more conditions of a potential access rule;
determining a plurality of predictive percentages including a predictive percentage for each of the plurality of time-based subsets based on validity information corresponding to each previous access request of the time-based subsets, the validity information indicating whether each access request of the plurality of previous access requests is valid or invalid;
determining a detection stability rating of the potential access rule by comparing the plurality of predictive percentages; and
selecting the potential access rule to be a candidate access rule for use in an operational set of access rules based on the detection stability rating of the potential access rule compared to detection stability ratings of other access rules, wherein the candidate access rule is included in the operational set of access rules, the operational set of access rules is loaded into a system memory, and the operational set of access rules is used to determine an access request outcome for a real-time access request for the resource.
0 Assignments
0 Petitions
Accused Products
Abstract
In some embodiments, a resource security system may determine an access request outcome (e.g., accept, reject, or review) for an access request based on access rules. The resource security system may generate and select the access rules to be used for using stability information. For instance, the resource security system may select a training set from the received access requests, e.g., including recently received access requests, and generate a plurality of potential access rules based on the training set. The resource security system may determine and compare the detection performance and the stability performance of the potential access rules. The resource security system may select the best performing potential access rules to be used in operation for determining the outcome of access requests.
9 Citations
20 Claims
-
1. A method for securing access to a resource, the method comprising performing, by a computer system:
-
segmenting a set of previous access requests into a plurality of time-based subsets of access requests, each previous access request of the set including one or more parameters that involve one or more conditions of a potential access rule; determining a plurality of predictive percentages including a predictive percentage for each of the plurality of time-based subsets based on validity information corresponding to each previous access request of the time-based subsets, the validity information indicating whether each access request of the plurality of previous access requests is valid or invalid; determining a detection stability rating of the potential access rule by comparing the plurality of predictive percentages; and selecting the potential access rule to be a candidate access rule for use in an operational set of access rules based on the detection stability rating of the potential access rule compared to detection stability ratings of other access rules, wherein the candidate access rule is included in the operational set of access rules, the operational set of access rules is loaded into a system memory, and the operational set of access rules is used to determine an access request outcome for a real-time access request for the resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer system for securing access to a resource, the computer system comprising:
-
a computer readable storage medium storing a plurality of instructions; and one or more processors for executing the instructions stored on the computer readable storage medium to; segment a set of previous access requests into a plurality of time-based subsets of access requests, each previous access request of the set including one or more parameters that involve one or more conditions of a potential access rule; determine a plurality of predictive percentages including a predictive percentage for each of the plurality of time-based subsets based on validity information corresponding to each previous access request of the time-based subsets, the validity information indicating whether each access request of the plurality of previous access requests is valid or invalid; determine a detection stability rating of the potential access rule by comparing the plurality of predictive percentages; and select the potential access rule to be a candidate access rule for use in an operational set of access rules based on the detection stability rating of the potential access rule compared to detection stability ratings of other access rules, wherein the candidate access rule is included in the operational set of access rules, the operational set of access rules is loaded into a system memory, and the operational set of access rules is used to determine an access request outcome for a real-time access request for the resource. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification