×

Systems and methods for responding to security breaches

  • US 9,077,747 B1
  • Filed: 07/23/2013
  • Issued: 07/07/2015
  • Est. Priority Date: 07/23/2013
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for responding to security breaches, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:

  • receiving, via a security server, a notification that a website that provides network-based services has experienced a security breach;

    identifying, via the security server, a first user account that is potentially affected by the security breach by;

    identifying an account management database that stores users'"'"' account information for a plurality of different websites that provide network-based services;

    searching the account management database for user accounts associated with the website that experienced the security breach;

    identifying an account-access credential used to access the first user account, wherein the account-access credential used to access the first user account was potentially exposed during the security breach;

    identifying, via the security server, a second user account that is potentially at risk as a result of the potential exposure of the account-access credential used to access the first user account by;

    identifying a user associated with the first user account;

    searching the account management database for additional accounts associated with the user;

    while searching the account management database, determining that the second user account is associated with the user;

    identifying an account-access credential used to access the second user account;

    determining that the account access credential used to access the first account is not identical to the account access credential used to access the second user account;

    determining a distance between the account-access credential used to access the first user account and the account-access credential used to access the second user account;

    determining that the distance is below a predetermined threshold;

    determining, based on the determination that the distance is below the predetermined threshold, that the second user account is potentially at risk as a result of the potential exposure of the account-access credential used to access the first user account;

    performing, via the security server, for the first user account that is potentially affected by the security breach, a security action that addresses the security breach;

    performing, via the security server, for the second user account, an additional security action that addresses the security breach in response to determining that the second user account is potentially at risk.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×