×

Systems and methods for detecting man-in-the-middle attacks

  • US 9,888,035 B2
  • Filed: 08/12/2015
  • Issued: 02/06/2018
  • Est. Priority Date: 06/30/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for detecting man-in-the-middle attacks, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:

  • registering a mobile device of a user within a computing environment as an authenticated mobile device that corresponds to the user;

    receiving an authentication request to log into a secure computing resource as the user;

    transmitting, in response to receiving the authentication request, an out-of-band push authentication prompt to the registered mobile device of the user through a different channel than a channel through which the authentication request was received;

    comparing a geolocation indicated by the authentication request with a geolocation indicated by the registered mobile device in response to the out-of-band push authentication prompt by comparing a measure of proximity with a proximity threshold that distinguishes between matching and nonmatching geolocations; and

    performing a remedial action in response to detecting a man-in-the-middle attack based on a determination that the geolocation indicated by the authentication request and the geolocation indicated by the registered mobile device do not match.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×