×

Cross channel authentication elevation via logic repository

  • US 10,728,256 B2
  • Filed: 10/30/2017
  • Issued: 07/28/2020
  • Est. Priority Date: 10/30/2017
  • Status: Active Grant
First Claim
Patent Images

1. A system for elevated authentication model based on cross-channel data, the system comprising:

  • at least one non-transitory memory device with computer-readable code stored thereon;

    at least one processing device; and

    at least one module stored in said memory device and comprising instruction code that is executable by the at least one processing device and configured to cause said at least one processing device to;

    receive, via a distributed network of servers, one or more exposure events from a detection system, wherein the one or more exposure events is associated with a score, wherein the score for each of the one or more exposure events is assigned by a machine learning algorithm, wherein at least one of the one or more exposure events indicates that a user has failed an authentication requirement in one or more communication channels associated with the detection system, wherein the authentication requirement is associated with user access to one or more functions associated with one or more applications;

    store the one or more exposure events in a centralized data repository, wherein storing further comprises enabling one or more detection systems connected to the centralized data repository to access the one or more exposure events received from the detection system, wherein the one or more detection systems are configured to monitor the one or more communication channels used by the user for authentication each time the user attempts to access the one or more applications;

    electronically receive one or more categories dynamically generated within each of the one or more detection systems;

    categorize the one or more exposure events into the one or more categories for each of the one or more detection system;

    generate a prediction model using one or more parameters from the one or more exposure events stored in the centralized data repository to identify a pattern in the one or more exposure events, wherein the one or more parameters comprises at least the score associated with each of the one or more exposure events and a frequency of incidence of the one or more exposure events;

    determine, using the prediction model, that a combination of at least a portion of the one or more exposure events indicates an intrusion in at least one of the one or more detection systems, thereby requiring elevated review of each exposure event in the combination of at least a portion of the one or more exposure events, wherein determining further comprises continuously executing statistical analysis algorithms on the one or more exposure events stored in the centralized data repository to determine whether the combination of at least a portion of the one or more exposure events meets a threshold level associated with the intrusion;

    initiate the elevated review based on at least the indication of the intrusion, wherein initiating further comprises moving the one or more exposure events associated with the intrusion from the centralized data repository to a computing device associated with a user;

    initiate a presentation of a user interface for display on the computing device, wherein the user interface comprises information associated with each exposure event associated with the intrusion;

    receive, via the user interface, a user input indicating whether the intrusion is benign or harmful;

    re-train the machine learning algorithm based on at least determining whether the intrusion is benign or harmful based on at least receiving the user interface, thereby adjusting the score for future incidents of each exposure event in the combination of at least a portion of the one or more exposure events;

    determine one or more other communication channels across the one or more detection systems available for access to the user, wherein the one or more other communication channels are capable of authenticating the user; and

    increase an authentication requirement of the user in the one or more other communication channels, wherein increasing the authentication requirement further comprises increasing an authentication level required to enable the user to access at least one of the one or more functions associated with at least one of the one or more applications.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×