Systems and methods for detecting user activities to identify deceptive activity
First Claim
Patent Images
1. A computer-implemented method to determine whether user interaction activities are indicative of deceptive actions, comprising:
- detecting performance of at least one user interaction activity on a computing device in order to detect confidence scheme intrusions into the computing device, wherein the user interaction activity comprises a user receiving a request to grant a remote computing device access to the computing device;
logging the performance of the at least one user interaction activity;
analyzing a past history of the logged user interaction activities on the computing device to determine a frequency of occurrence of each user interaction activity;
assigning a score to the detected at least one user interaction activity, wherein the score is based on the frequency of occurrence in the past of the at least one user interaction activity;
determining whether the logged user interaction activity matches a signature, wherein the signature comprises a sequence of at least one user interaction activity; and
generating a notification message based on the determination that the logged user interaction activity matches the signature, wherein the notification message comprises a query to the user of whether the user is in communication with another user and whether the other user is requesting that the user grant remote access to the computing device.
5 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method to determine whether user interaction activities are indicative of deceptive actions is described. Performance of at least one user interaction activity on a computing device is detected. The performance of the at least one user interaction activity is logged. A determination is made as to whether the logged user interaction activity matches a signature. A notification message is generated based on the determination that the logged user interaction activity matches the signature.
25 Citations
11 Claims
-
1. A computer-implemented method to determine whether user interaction activities are indicative of deceptive actions, comprising:
-
detecting performance of at least one user interaction activity on a computing device in order to detect confidence scheme intrusions into the computing device, wherein the user interaction activity comprises a user receiving a request to grant a remote computing device access to the computing device; logging the performance of the at least one user interaction activity; analyzing a past history of the logged user interaction activities on the computing device to determine a frequency of occurrence of each user interaction activity; assigning a score to the detected at least one user interaction activity, wherein the score is based on the frequency of occurrence in the past of the at least one user interaction activity; determining whether the logged user interaction activity matches a signature, wherein the signature comprises a sequence of at least one user interaction activity; and generating a notification message based on the determination that the logged user interaction activity matches the signature, wherein the notification message comprises a query to the user of whether the user is in communication with another user and whether the other user is requesting that the user grant remote access to the computing device. - View Dependent Claims (2, 3, 4)
-
-
5. A computing device configured to determine whether user interaction activities are indicative of deceptive actions, comprising:
-
a processor; memory in electronic communication with the processor; instructions stored in the memory, the instructions being executable by the processor to; detect performance of at least one user interaction activity on a computing device in order to detect confidence scheme intrusions into the computing device, wherein the user interaction activity comprises a user receiving a request to grant a remote computing device access to the computing device; log the performance of the at least one user interaction activity; analyze a past history of the logged user interaction activities on the computing device to determine a frequency of occurrence of each user interaction activity; assign a score to the detected at least one user interaction activity, wherein the score is based on the frequency of occurrence in the past of the at least one user interaction activity, determine whether the logged user interaction activity matches a signature wherein the signature comprises a sequence of at least one user interaction activity; and generate a notification message based on the determination that the logged user interaction activity matches the signature, wherein the notification message comprises a query to the user of whether the user is in communication with another user and whether the other user is requesting that the user grant remote access to the computing device. - View Dependent Claims (6, 7, 8, 9)
-
-
10. A computer-program product to determine, via a processor, whether user interaction activities are indicative of deceptive actions, the computer-program product comprising a non-transitory computer-readable medium storing instructions thereon, the instructions being executable by the processor to:
-
detect performance of at least one user interaction activity on a computing device in order to detect confidence scheme intrusions into the computing device, wherein the user interaction activity comprises a user receiving a request to grant a remote computing device access to the computing device; log the performance of the at least one user interaction activity; analyze a past history of the logged user interaction activities on the computing device to determine a frequency of occurrence of each user interaction activity; assign a score to the detected at least one user interaction activity, wherein the score is based on the frequency of occurrence in the past of the at least one user interaction activity, determine whether the logged user interaction activity matches a signature wherein the signature comprises a sequence of at least one user interaction activity; and generate a notification message based on the determination that the logged user interaction activity matches the signature, wherein the notification message comprises a query to the user of whether the user is in communication with another user and whether the other user is requesting that the user grant remote access to the computing device. - View Dependent Claims (11)
-
Specification