Method and system for detecting unauthorized access to and use of network resources
First Claim
Patent Images
1. A computer-implemented method performed by a computer system for detecting an unauthorized use of network resources, comprising:
- using at least one hardware processor of a server connected to a network for executing a code, the code comprising code instructions for;
receiving action data indicating use of an account for performing an activity associated with a target resource accessible by the account over said network;
obtaining, over said network from an account management system, credential retrieval data documenting credential retrieval actions to retrieve credentials for using said network resources;
determining, from said credential retrieval data, an absence of a providing of credentials to said account by said account management system in response to a credential retrieval request from said account and prior to said use of said account for performing said activity; and
in response to said determining said absence of said providing of credentials by said account management system to said account, automatically limiting use of said target resource by said account.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems are disclosed for detecting unauthorized actions associated with network resources, the actions including access to the resource and activity associated with the resource. The unauthorized actions are detected by analyzing action data of a client action associated with the network resource against credential retrieval data including records of authorized actions and/or procedures for performing an action associated with the network resource.
-
Citations
18 Claims
-
1. A computer-implemented method performed by a computer system for detecting an unauthorized use of network resources, comprising:
-
using at least one hardware processor of a server connected to a network for executing a code, the code comprising code instructions for; receiving action data indicating use of an account for performing an activity associated with a target resource accessible by the account over said network; obtaining, over said network from an account management system, credential retrieval data documenting credential retrieval actions to retrieve credentials for using said network resources; determining, from said credential retrieval data, an absence of a providing of credentials to said account by said account management system in response to a credential retrieval request from said account and prior to said use of said account for performing said activity; and in response to said determining said absence of said providing of credentials by said account management system to said account, automatically limiting use of said target resource by said account. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer system for detecting an unauthorized use of network resources, comprising:
-
a non-transient storage medium storing code instructions; and a hardware processor coupled to said storage medium and configured to execute said stored code, the code comprising code instructions for; receiving action data indicating use of an account for performing an activity associated with a target resource accessible by the account over a network; obtaining, over said network from an account management system, credential retrieval data documenting credential retrieval actions to retrieve credentials for using said network resources; determining, from said credential retrieval data, an absence of a providing of credentials to said account by said account management system in response to a credential retrieval request from said account and prior to said use of said account for performing said activity; and in response to said determining said absence of said providing of credentials by said account management system to said account, automatically limiting use of said target resource by said account. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A computer usable non-transitory storage medium having a computer program embodied thereon for causing a programmed system to determine an unauthorized use of network resources by performing the following steps when such program is executed on the system, the steps comprising:
-
receiving action data indicating use of an account for performing an activity associated with a target resource accessible by the account over a network; obtaining, over said network from an account management system, credential retrieval data documenting credential retrieval actions to retrieve credentials for using said network resources; determining, from said credential retrieval data, an absence of a providing of credentials to said account by said account management system in response to a credential retrieval request from said account and prior to said use of said account for performing said activity; and in response to said determining said absence of said providing of credentials by said account management system to said account, automatically limiting use of said target resource by said account.
-
Specification