System and method for calendar-based anomalous access detection
First Claim
Patent Images
1. A method of detecting anomalous access to a resource in a network environment, said method comprising:
- (a) providing a user calendar for a user,(b) providing a client in said network environment,(c) accessing a calendar record within said user calendar,(d) determining a location of said client when said client has sent a request to said resource,(e) comparing said location with a predicted location obtained from said calendar record,(f) rejecting said request if said location is inconsistent with said predicted location.
1 Assignment
0 Petitions
Accused Products
Abstract
An access control system is augmented with the ability to categorize access requests as anomalous, by correlating the time and location of the requesting user with information provided by the requesting user'"'"'s calendar entries. These entries provide the dates and times that a user is anticipated to be located in a particular geographic region.
-
Citations
10 Claims
-
1. A method of detecting anomalous access to a resource in a network environment, said method comprising:
-
(a) providing a user calendar for a user, (b) providing a client in said network environment, (c) accessing a calendar record within said user calendar, (d) determining a location of said client when said client has sent a request to said resource, (e) comparing said location with a predicted location obtained from said calendar record, (f) rejecting said request if said location is inconsistent with said predicted location. - View Dependent Claims (2, 3)
-
-
4. A system for detecting anomalous access to a resource in a network environment, comprising:
-
(a) a user calendar for a user containing a calendar record, (b) a resource comprising a software application, (c) a client which is able to send an access request to said resource on behalf of said user, (d) a software agent which will intercept said access request, (e) a database which is operationally connected to said agent. - View Dependent Claims (5, 6, 7)
-
-
8. A computer program product within a computer usable medium for anomalous access detection, comprising:
-
(a) instructions for accessing a calendar record within a user calendar, (b) instructions for determining a location of a client when said client has sent a request to a resource, (c) instructions for comparing said location with a predicted location obtained from said calendar record. - View Dependent Claims (9, 10)
-
Specification