×

System and method for outlier and anomaly detection in identity management artificial intelligence systems using cluster based analysis of network identity graphs

  • US 10,681,056 B1
  • Filed: 11/22/2019
  • Issued: 06/09/2020
  • Est. Priority Date: 11/27/2018
  • Status: Active Grant
First Claim
Patent Images

1. An identity management system of using property graphs for risk detection, comprising:

  • a memory;

    a hardware processor;

    a non-transitory, computer-readable storage medium including computer instructions executable by the hardware processor for;

    obtaining first identity management data, at a first time, which is obtained from one or more identity management systems in a distributed enterprise computing environment;

    evaluating the obtained first identity management data to determine a first set of identities and a first set of entitlements associated with the first set of identities, wherein the first set of identities and the associated first set of entitlements utilized in identity management of the distributed enterprise computing environment;

    generating a first property graph from the first identity management data by;

    creating a node of the first property graph for each of the determined first set of identities,for each first identity and second identity, from the determined first set of identities, that share at least one entitlement of the determined first set of entitlements, creating an edge of the first property graph between a first node and a second node representing respectively the first identity and the second identity of the first property graph, andgenerating a similarity weight for each of the created edges of the first property graph based on the at least one shared entitlement between the first identity and the second identity;

    pruning a set of edges of the first property graph based on the set of similarity weights of the set of edges to generate a second property graph;

    storing the second property graph in a data store;

    analyzing the second property graph to identify an outlier node of the graph; and

    identifying an identity management artifact associated with the outlier node as a high risk identity management artifact.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×