×

Method of and system for processing an unauthorized user access to a resource

  • US 9,871,813 B2
  • Filed: 02/24/2015
  • Issued: 01/16/2018
  • Est. Priority Date: 10/31/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method of processing a potentially unauthorized user access request, the method executable on a server, the method comprising:

  • receiving a first session identifier associated with a first communication session associated with a user account;

    receiving a second session identifier associated with a second communication session associated with the user account, the second communication session being active concurrently with the first communication session;

    based on user behaviour within the first communication session, generating a first user behaviour model associated with the first communication session, the first user behaviour model having a first model portion based on at least one device-specific parameter and a second model portion based on at least one user-device interaction parameter, the user-device interaction parameter being indicative of a type of action performed by a first electronic device within the first communication session;

    based on user behaviour within the second communication session, generating a second user behaviour model associated with the second communication session the second user behaviour model having a first model portion based on at least one device-specific parameter and a second model portion based on at least one user-device interaction parameter, the user-device interaction parameter being indicative of a type of action performed by a second electronic device within the second communication session;

    responsive to one of the first user behaviour model and the second user behaviour model being different from a stored authorized user behaviour model associated with the user account, the stored authorized user behaviour model having a first model portion based on at least one device-specific parameter and a second model portion based on at least one user-device interaction parameter, restricting user activity within the respective one of the first communication session and the second communication session; and

    allowing unrestricted user activity within the other one of the first communication session and the second communication session.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×