Risk assessment of electronic communication using time zone data
First Claim
1. A method comprising:
- detecting, by a network interface device, one or more electronic communications from a telecommunications network and extracting an access request for protected data from the one or more electronic communications, the access request including an internet protocol address of a proxy device from which the one or more electronic communications are received;
extracting, by the network interface device, browser information from the one or more electronic communications in response to a command transmitted to the telecommunications network, the browser information being about a browser on a user device used by a user to initiate the access request and indicating a first time zone associated with the browser, the internet protocol address and the browser information being independent of data about the user and of data transmitted from the network interface device;
using the internet protocol address of the proxy device and stored data about internet protocol addresses to determine a second time zone for the proxy device; and
determining a risk level for the user device based on a comparison of the first time zone and the second time zone, a geolocation associated with the internet protocol address of the proxy device, and a potential location of the user device in the first time zone;
wherein the risk level corresponds to a level of authentication to require for the user device before allowing the protected data to be transmitted to the user device.
2 Assignments
0 Petitions
Accused Products
Abstract
A network interface device can (i) detect electronic communications from a telecommunications network; (ii) extract an access request for protected data; and (iii) extract browser information about a browser on a user device used by a user to initiate the access request. The access request can include a network address of a device from which the electronic communications were transmitted. The browser information can indicate a time zone associated with the browser. The network address and the browser information can be independent of data about the user and of data transmitted from the network interface device. The network address and stored data about network addresses can be used to determine a time zone for the device. A result of comparing the time zones can be used to determine a level of authentication to require before allowing the protected data to be transmitted to the user device.
-
Citations
20 Claims
-
1. A method comprising:
-
detecting, by a network interface device, one or more electronic communications from a telecommunications network and extracting an access request for protected data from the one or more electronic communications, the access request including an internet protocol address of a proxy device from which the one or more electronic communications are received; extracting, by the network interface device, browser information from the one or more electronic communications in response to a command transmitted to the telecommunications network, the browser information being about a browser on a user device used by a user to initiate the access request and indicating a first time zone associated with the browser, the internet protocol address and the browser information being independent of data about the user and of data transmitted from the network interface device; using the internet protocol address of the proxy device and stored data about internet protocol addresses to determine a second time zone for the proxy device; and determining a risk level for the user device based on a comparison of the first time zone and the second time zone, a geolocation associated with the internet protocol address of the proxy device, and a potential location of the user device in the first time zone; wherein the risk level corresponds to a level of authentication to require for the user device before allowing the protected data to be transmitted to the user device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
a network interface device; a processing device communicatively coupleable to the network interface device; and a memory device on which instructions are stored for causing the processing device to; receive one or more electronic communications from a telecommunications network; extract an access request for protected data from the one or more electronic communications, the access request including an internet protocol address of a proxy device from which the one or more electronic communications are received; and extract browser information from the one or more electronic communications in response to a command transmitted to the telecommunications network, the browser information being about a browser on a user device used by a user to initiate the access request and indicating a first time zone associated with the browser, the internet protocol address and the browser information being independent of data about the user and data transmitted from the network interface device; use the internet protocol address of the proxy device and stored data about internet protocol addresses to determine a second time zone for the proxy device; and determine a risk level for the user device based on a comparison of the first time zone and the second time zone, a geolocation associated with the internet protocol address of the proxy device, and a potential location of the user device in the first time zone; wherein the risk level corresponds to a level of authentication to require from the user device before allowing the protected data to be transmitted to the user device. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A non-transitory computer-readable medium in which instructions are stored, the instructions being executable by a processing device for causing the processing device to:
-
receive an access request for protected data from a network interface device communicatively coupleable to a telecommunications network for detecting one or more electronic communications and extracting the access requests from the one or more electronic communications, the access request including an internet protocol address of a proxy device from which the electronic communication is received by the network interface device; receive information from the network interface device, the information extracted from the one or more electronic communications in response to a command transmitted to the telecommunications network, the information indicating a first time zone associated with a user device used by a user to initiate the access request, the internet protocol address and the information being independent of data about the user and of data transmitted from the network interface device; using the internet protocol address of the proxy device and stored data about internet protocol addresses to determine a second time zone for the proxy device; determine a risk level for the user device based on a comparison between the first time zone and the second time zone, a geolocation associated with the internet protocol address of the proxy device, and a potential location of the user device in the first time zone; and wherein the risk level corresponds to a level of authentication to require for the user device before allowing the protected data to be transmitted to the user device. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification