PREVENTING PHISHING ATTACKS BASED ON REPUTATION OF USER LOCATIONS
First Claim
1. A computer implemented method for authenticating a user session, the method comprising:
- storing one or more safe locations associated with a user account, each stored safe location having a location type;
receiving a request to create a session associated with the user account;
identifying a plurality of locations of different location types associated with a source of the request;
determining that the request is authorized if a location associated with the request matches a stored safe location; and
responsive to determining that the request is authorized;
creating the requested session, andadding at least one of the locations associated with the source of the request to the stored one or more safe locations for the user account.
3 Assignments
0 Petitions
Accused Products
Abstract
User sessions are authenticated based on locations associated with a user account used for sending a request for creating a session. Examples of locations of a source of a request include a geographical location, a network address, or a machine cookie associated with a device sending the request. Locations of the request are compared with stored safe locations associated with the user account and a suspiciousness index is determined for the session. The level of authentication required for the session is determined based on the suspiciousness index. Locations are associated with a reputation based on past history of sessions originating from the locations. A location associated with a history of creating suspicious session is considered an unsafe location. Reputation of the location originating the session is used to determine the level of authentication required for the session.
102 Citations
20 Claims
-
1. A computer implemented method for authenticating a user session, the method comprising:
-
storing one or more safe locations associated with a user account, each stored safe location having a location type; receiving a request to create a session associated with the user account; identifying a plurality of locations of different location types associated with a source of the request; determining that the request is authorized if a location associated with the request matches a stored safe location; and responsive to determining that the request is authorized; creating the requested session, and adding at least one of the locations associated with the source of the request to the stored one or more safe locations for the user account. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computer program product having a computer-readable storage medium storing computer-executable code for authenticating a user session, the code comprising:
-
a session manager configured to; store one or more safe locations associated with a user account, each stored safe location having a location type; receive a request to create a session associated with the user account; identify a plurality of locations of different location types associated with a source of the request; an authentication manager configured to; determine that the request is authorized if a location associated with the request matches a stored safe location; and the session manager further configured to; responsive to determining that the request is authorized; create the requested session, and add at least one of the locations associated with the source of the request to the stored one or more safe locations for the user account. - View Dependent Claims (17, 18, 19, 20)
-
Specification