DEVICE, METHOD, AND SYSTEM OF DETECTING REMOTE ACCESS USERS AND DIFFERENTIATING AMONG USERS
First Claim
1. A method comprising:
- determining whether a user, who utilizes a computing device to interact with a computerized service, (i) is co-located physically near said computing device, or (ii) is located remotely from said computing device and controlling remotely said computer device via a remote access channel;
wherein the determining comprises;
(a) monitoring interactions of the user with an input unit;
(b) based on said monitoring, determining whether said user (i) is co-located physically at said computing device, or (ii) is located remotely from said computing device and controlling remotely said computing device via said remote access channel.
6 Assignments
0 Petitions
Accused Products
Abstract
Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, detecting a possible cyber-attacker, detecting a remote access user, and detecting an automated script or malware. The methods include monitoring of user-side input-unit interactions, in general and in response to an interference introduced to user-interface elements. The monitored interactions are used for detecting an attacker that utilizes a remote access channel; for detecting a malicious automatic script, as well as malicious code injection; to identify a particular hardware assembly; to perform user segmentation or user characterization; to enable a visual login process with implicit two-factor authentication; to enable stochastic cryptography; and to detect that multiple users are utilizing the same subscription account.
122 Citations
32 Claims
-
1. A method comprising:
-
determining whether a user, who utilizes a computing device to interact with a computerized service, (i) is co-located physically near said computing device, or (ii) is located remotely from said computing device and controlling remotely said computer device via a remote access channel; wherein the determining comprises; (a) monitoring interactions of the user with an input unit; (b) based on said monitoring, determining whether said user (i) is co-located physically at said computing device, or (ii) is located remotely from said computing device and controlling remotely said computing device via said remote access channel. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
Specification