Machine learning system for computing asset access
First Claim
1. A method comprising:
- accessing access data for a first user of a plurality of users, the access data for the first user indicating an access history by the first user to one or more of a plurality of available computing assets;
analyzing, by a machine learning algorithm executing on one or more hardware processors, the access data of the first user to generate a set of access characteristics for the first user, the expected access characteristics for the first user identifying one or more expected characteristics when the first user accesses data;
receiving an indication of a current access attempt for a first available computing asset, the current access attempt using an identity of the first user of the plurality of users;
comparing at least one access characteristic associated with the current access attempt to the set of access characteristics for the first user, yielding a first comparison;
determining a security level associated with the first available computing asset; and
selecting, based on the first comparison and the level of security associated with the first available computing asset, a first authentication process from a plurality of authentication processes for presentation to the first user.
1 Assignment
0 Petitions
Accused Products
Abstract
In various example embodiments, a method for controlling computing asset access using machine learning is presented. In an example embodiment, access data for each user of a plurality of users are accessed, wherein the access data for a user indicate an access history by that user to one or more available assets. Using a machine learning algorithm, the access data of each user are analyzed to generate a characteristic associated with the access data of each user. An indication of a current access attempt of one of the assets is received using an identity of a first user. A characteristic associated with the current access attempt is compared to the characteristic associated with the access data of the first user. Based on the comparison, an authentication process is selected for presentation to the first user for the current access attempt.
52 Citations
21 Claims
-
1. A method comprising:
-
accessing access data for a first user of a plurality of users, the access data for the first user indicating an access history by the first user to one or more of a plurality of available computing assets; analyzing, by a machine learning algorithm executing on one or more hardware processors, the access data of the first user to generate a set of access characteristics for the first user, the expected access characteristics for the first user identifying one or more expected characteristics when the first user accesses data; receiving an indication of a current access attempt for a first available computing asset, the current access attempt using an identity of the first user of the plurality of users; comparing at least one access characteristic associated with the current access attempt to the set of access characteristics for the first user, yielding a first comparison; determining a security level associated with the first available computing asset; and selecting, based on the first comparison and the level of security associated with the first available computing asset, a first authentication process from a plurality of authentication processes for presentation to the first user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
one or more computer processors; and one or more computer-readable mediums storing instructions that, when executed by the one or more computer processors, cause the system to perform operations comprising; accessing access data for a first user of a plurality of users, the access data for the first user indicating an access history by the first user to one or more of a plurality of available computing assets; analyzing, by a machine learning algorithm executing on one or more hardware processors, the access data of the first user to generate a set of access characteristics for the first user, the expected access characteristics for the first user identifying one or more expected characteristics when the first user accesses data; receiving an indication of a current access attempt for a first available computing asset, the current access attempt using an identity of the first user of the plurality of users; comparing at least one access characteristic associated with the current access attempt to the set of access characteristics for the first user, yielding a first comparison; determining a security level associated with the first available computing asset; and selecting, based on the first comparison and the level of security associated with the first available computing asset, a first authentication process from a plurality of authentication processes for presentation to the first user. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A non-transitory computer-readable medium storing instructions that, when executed by one or more computer processors of one or more computing devices, cause the one or more computing devices to perform operations comprising:
-
accessing access data for a first user of a plurality of users, the access data for the first user indicating an access history by the first user to one or more of a plurality of available computing assets; analyzing, by a machine learning algorithm executing on one or more hardware processors, the access data of the first user to generate a set of access characteristics for the first user, the expected access characteristics for the first user identifying one or more expected characteristics when the first user accesses data; receiving an indication of a current access attempt for a first available computing asset, the current access attempt using an identity of the first user of the plurality of users; comparing at least one access characteristic associated with the current access attempt to the set of access characteristics for the first user, yielding a first comparison; determining a security level associated with the first available computing asset; and selecting, based on the first comparison and the level of security associated with the first available computing asset, a first authentication process from a plurality of authentication processes for presentation to the first user. - View Dependent Claims (21)
-
Specification