×

System and method of fraud and misuse detection using event logs

  • US 9,202,189 B2
  • Filed: 12/10/2013
  • Issued: 12/01/2015
  • Est. Priority Date: 05/31/2005
  • Status: Active Grant
First Claim
Patent Images

1. A method of detecting improper access of business information in a customer relationship management (CRM) computer environment, the method comprising:

  • analyzing audit log data representing at least one of transactions or activities of an authorized user having access to the business information in the CRM computer environment, the business information including at least one of a customer record or a prospective customer record, to determine at least one of a number of accesses by the authorized user to the CRM computer environment or a time interval of access by the authorized user to the CRM computer environment;

    generating a rule for monitoring the analyzed audit log data, the rule comprising at least one criterion specifying at least one of a specific volume threshold of access by the authorized user to the CRM computer environment, or a predetermined time interval of access by the authorized user to the CRM computer environment;

    applying the rule to the analyzed audit log data to determine if an event has occurred, the event occurring if at least one of the number of accesses by the authorized user to the CRM computer environment exceeds an allowed access count corresponding to the specific volume threshold or the time interval of access by the authorized user to the CRM computer environment overlaps the predetermined time interval;

    storing, in a memory, a hit if the event has occurred; and

    providing notification if the event has occurred.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×