×

DATA ACCESS VERIFICATION FOR ENTERPRISE RESOURCES

  • US 20160261616A1
  • Filed: 04/16/2015
  • Published: 09/08/2016
  • Est. Priority Date: 03/06/2015
  • Status: Active Grant
First Claim
Patent Images

1. A non-transitory computer-readable storage medium having instructions stored therein, wherein the instructions, when executed by a processor a computing device, cause the computing device to perform operations responsive to a determination that a verification with a user is desired responsive to detection of activity indicative of a possible insider threat, wherein the computing device is to be communicatively coupled to a traffic capture and analysis module (TCAM), wherein the TCAM is to be coupled between a set of one or more client end stations and a set of one or more server end stations to analyze network traffic being sent between them, wherein the set of server end stations is to store enterprise resources including an enterprise application and enterprise data, wherein the possible insider threat comprises the use of one or more of a user account and a client end station to access the enterprise resources, and wherein the determination was based on one or more of the network traffic, current event data, and stored historical data, wherein the current event data describes an access to one of the enterprise resources that was detected and reported on by the TCAM, and the operations comprising:

  • selecting a target role and a target user for the verification based on an activity context and an enterprise context repository, wherein the activity context describes the activity by identifying a rule used to make the determination and by identifying one or more of the current event data and relevant historical data, wherein the enterprise context repository identifies the roles within the enterprise and the users in those roles, the selecting including;

    selecting the target role from a plurality of target roles based on the activity context and optionally the enterprise context repository, wherein the plurality of roles includes two or more of an owner of the client end station, an owner of the user account, an owner of a particular part of the enterprise data, and a position at the enterprise;

    selecting a target user in the selected target role based on the enterprise context repository, wherein the selected target role and the selected target user in that selected target role is intended to be the user of the enterprise having the requisite knowledge to confirm whether or not the activity is indicative of the possible insider threat;

    causing a verification request to be sent to the selected target user, wherein the verification request describes the activity and allows the selected target user to effectively confirm whether or not the activity is indicative of the possible insider threat; and

    generating an alert when a verification result, which is based on the verification request and any verification response, indicates that the activity is indicative of the possible insider threat.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×