×

Intrusion detection on computing devices

  • US 9,686,300 B1
  • Filed: 07/14/2015
  • Issued: 06/20/2017
  • Est. Priority Date: 07/14/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • collecting, by a processing device, raw data corresponding to physical manipulations of a user interface device;

    converting, by the processing device, the raw data to characteristic test data (CTD), wherein the CTD represents behavior characteristics of a current user, wherein the CTD comprises a first plurality of data sets, each of the first plurality of data sets identifies an individual behavioral characteristic corresponding to one of the physical manipulations of the user interface device by the current user;

    identifying, by the processing device, a characteristic model corresponding to the behavior characteristics represented by the CTD, wherein the characteristic model comprises a second plurality of data sets, each of the second plurality of data sets identifies an expected behavioral characteristic corresponding to one of the physical manipulations of the user device by an authenticated user;

    determining, by the processing device, a set of threat scores, wherein each of the set of threat scores is determined by comparing one of the first plurality of data sets against a corresponding one of the second plurality of data sets stored in the characteristic model; and

    determining, by the processing device, that the current user is not the authenticated user when more than one of the individual behavioral characteristics of the current user deviates from the expected behavioral characteristics of the authenticated user as reflected in the set of threat scores;

    performing, by the processing device, a corrective action when the current user is not the authenticated user; and

    collecting, by the processing device, additional raw data corresponding to additional physical manipulations of the user interface device when none or one of the individual behavioral characteristics of the current user deviates from the expected behavioral characteristics of the authenticated user as reflected in the set of threat scores.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×