IDENTIFYING UNAUTHORIZED ACCESS TO A NETWORK RESOURCE
First Claim
1. A method for identifying an unauthorized access, comprising:
- accessing received access information comprising a received timestamp, a received network internet protocol (IP) address, and a received TCP/UDP port identifier of an unverified accessing client that accessed a network resource using authorization information of an authorized user;
accessing trusted access information comprising a trusted timestamp, a trusted network IP address, and a trusted TCP/UDP port identifier of a trusted accessing client that accesses the network resource by an authorized user;
comparing the received access information to the trusted access information;
identifying an unauthorized access if the received access information does not match the trusted access information.
0 Assignments
0 Petitions
Accused Products
Abstract
An online service gathers information about a user'"'"'s access to an online account and makes that information available to the account owner and/or other authorized user. When an online account is accessed, the online service logs a time stamp, a network address from which the account was accessed, a port number, a user ID, routing data, and/or other access data. The online service may use the access information to obtain address ownership name, geographic location, and/or other ownership information associated with the account access. The accessing client also stores access data. The client, account owner, and/or another decision maker evaluates all, or portions of information to detect unauthorized access to the account. The decision maker may dynamically evaluate and display the access data or later compare log files of the online service and the account owner'"'"'s local log file.
97 Citations
20 Claims
-
1. A method for identifying an unauthorized access, comprising:
-
accessing received access information comprising a received timestamp, a received network internet protocol (IP) address, and a received TCP/UDP port identifier of an unverified accessing client that accessed a network resource using authorization information of an authorized user; accessing trusted access information comprising a trusted timestamp, a trusted network IP address, and a trusted TCP/UDP port identifier of a trusted accessing client that accesses the network resource by an authorized user; comparing the received access information to the trusted access information; identifying an unauthorized access if the received access information does not match the trusted access information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for identifying an unauthorized access, comprising:
-
a communication interface in communication with a network; a memory for storing instructions; and a processor in communication with the communication interface and with the memory, wherein the processor performs actions based at least in part on the stored instructions, including; accessing received access information comprising a received timestamp, a received network internet protocol (IP) address, and a received TCP/UDP port identifier of an unverified accessing client that accessed a network resource using authorization information of an authorized user; accessing trusted access information comprising a trusted timestamp, a trusted network IP address, and a trusted TCP/UDP port identifier of a trusted accessing client that accesses the network resource by an authorized user; comparing the received access information to the trusted access information; identifying an unauthorized access if the received access information does not match the trusted access information. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification