Addressing login platform security risks
First Claim
Patent Images
1. A computer-implemented method comprising:
- identifying suspected fraudulent attempts being associated with a primary login platform by determining whether one or more matching sensitive information artefacts match a primary sensitive information artefact of a matching login platform;
responsive to the one or more matching sensitive information artefacts matching the primary sensitive information artefact, determining a security divergence factor between the primary login platform and each of the matching login platforms based on at least one of one or more security levels associated with each of the primary login factor and each of the matching login platforms and one or more security categories associated with each of the primary login factor and each of the matching login platform; and
responsive to identifying the one or more security developments, automatically updating the security credentials of the user to decrease the access level, increasing the security category for the primary login platform, and modifying one or more sensitive information artefacts associated with the primary login platform for the user, wherein identifying said one or more security developments comprises accessing at least one security analysis service provider at predefined regular intervals.
3 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method includes identifying a primary login platform and identifying one or more security developments associated with the primary login platform. The computer-implemented method further includes determining one or more security corrective actions based on the one or more security developments. A corresponding computer program product and computer system are also disclosed.
-
Citations
17 Claims
-
1. A computer-implemented method comprising:
-
identifying suspected fraudulent attempts being associated with a primary login platform by determining whether one or more matching sensitive information artefacts match a primary sensitive information artefact of a matching login platform; responsive to the one or more matching sensitive information artefacts matching the primary sensitive information artefact, determining a security divergence factor between the primary login platform and each of the matching login platforms based on at least one of one or more security levels associated with each of the primary login factor and each of the matching login platforms and one or more security categories associated with each of the primary login factor and each of the matching login platform; and responsive to identifying the one or more security developments, automatically updating the security credentials of the user to decrease the access level, increasing the security category for the primary login platform, and modifying one or more sensitive information artefacts associated with the primary login platform for the user, wherein identifying said one or more security developments comprises accessing at least one security analysis service provider at predefined regular intervals. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer program product comprising:
-
one or more computer readable storage device and program instructions stored on the one or more computer readable storage device, the program instructions comprising; program instructions to identify suspected fraudulent attempts being associated with a primary login platform by determining whether one or more matching sensitive information artefacts match a primary sensitive information artefact of a matching login platform; program instructions to, responsive to the one or more matching sensitive information artefacts matching the primary sensitive information artefact, determine a security divergence factor between the primary login platform and each of the matching login platforms based on at least one of one or more security levels associated with each of the primary login factor and each of the matching login platforms and one or more security categories associated with each of the primary login factor and each of the matching login platform; and program instructions to responsive to identifying the one or more security developments, automatically updating the security credentials of the user to decrease the access level, increase the security category for the primary login platform, and modifying one or more sensitive information artefacts associated with the primary login platform for the user, wherein the program instructions to identify said one or more security developments comprises accessing at least one security analysis service provider at predefined regular intervals. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer system comprising:
-
one or more computer processors; one or more computer readable storage device; and program instructions stored on the one or more computer readable storage device for execution by at least one of the one or more computer processors, the program instructions comprising; program instructions to identify suspected fraudulent attempts being associated with a primary login platform by determining whether one or more matching sensitive information artefacts match a primary sensitive information artefact of a matching login platform; program instructions to, responsive to the one or more matching sensitive information artefacts matching the primary sensitive information artefact, determine a security divergence factor between the primary login platform and each of the matching login platforms based on at least one of one or more security levels associated with each of the primary login factor and each of the matching login platforms and one or more security categories associated with each of the primary login factor and each of the matching login platform; and program instructions to responsive to identifying the one or more security developments, automatically updating the security credentials of the user to decrease the access level, increase the security category for the primary login platform, and modifying one or more sensitive information artefacts associated with the primary login platform for the user, wherein the program instructions to identify said one or more security developments comprises accessing at least one security analysis service provider at predefined regular intervals. - View Dependent Claims (14, 15, 16, 17)
-
Specification