×

System and method for providing data-driven user authentication misuse detection

  • US 10,491,630 B2
  • Filed: 12/06/2018
  • Issued: 11/26/2019
  • Est. Priority Date: 09/07/2016
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method performed by a computing device, where the computing device includes at least a processor for executing instructions from a memory, the method comprising:

  • for a user authentication attempt to access a secure computer resource that results in generation of a user authentication log message, collecting, via at least the processor, user authentication log data having user attribute values;

    transforming, via at least the processor, the user authentication log data into a tracer data structure having the user attribute values organized in a defined format;

    augmenting, via at least the processor, the tracer data structure with timestamp data to generate an event data structure, wherein the timestamp data represents a time at which the user authentication log data is observed by the computing device;

    determining, via at least the processor, whether the tracer data structure matches an existing tracer data structure stored in a rules database;

    if the tracer data structure does not match the existing tracer data structure, setting a novelty flag to establish a new tracer data structure in the rules database for generating a new user behavior model filter; and

    if the tracer data structure matches the existing tracer data structure;

    (i) applying, via at least the processor, an existing user behavior model filter representing account usage patterns of the user for detecting a malicious authentication attempt to access the secure computer resource by a malicious user, (ii) controlling issuance of an alarm message or signal as a warning to a remote computing device in response to detecting the malicious authentication attempt, and (iii) updating, via at least the processor, the existing user behavior model filter based, at least in part, on the event data structure.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×