SYSTEM AND METHOD FOR SECURING COMPUTER SYSTEM AGAINST UNAUTHORIZED ACCESS
0 Assignments
0 Petitions
Accused Products
Abstract
The present invention described secures a computer account against unauthorized access caused as a result of identity-theft, and insider-espionage using artificial intelligence and behavioral modeling methods. The present invention has the ability to detect intruders or impersonators by observing “suspicious” activity under a computer account. When it sees such suspicious behavior, it uses artificial intelligence to authenticate the suspect by interrogation. The present invention asks the suspect questions that only the legitimate computer account owner can verify correctly. If the suspect fails the interrogation, that proves that he/she is an impersonator and therefore further access to the computer account is denied immediately. On the other hand if the suspect passes, access to the computer account is restored. The present invention uses a Programmable Artificial Intelligence Engine (PAIE) to interact with computer users in human natural language. The PAIE can also be programmed to suit other applications where natural language interaction with humans is helpful.
-
Citations
21 Claims
-
1. (canceled)
-
2. (canceled)
-
3. A method for securing access to a computer account, comprising:
-
based on user interaction and user activity monitoring of an authorized user over a predetermined time period, generating a use profile associated with the computer account; based on the use profile, detecting user behavior indicative of intrusion in the computer account; and in response to detecting the user behavior, interrogating a current user of the computer account using human natural language generated from the use profile. - View Dependent Claims (4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-readable memory medium for securing access to a computer system, including programmable instructions executable to:
-
based on a use profile describing usage of the computer system by an authorized user, detect user behavior indicative of intrusion in a computer account on the computer system; and in response to detecting the user behavior, interrogate a current user of the computer account to determine whether the current user is the authorized user, wherein said instructions to interrogate are executable to use human natural language generated from the use profile. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21)
-
Specification