User behavior profile environment
First Claim
1. A computer-implementable method for monitoring user behavior elements, comprising:
- monitoring electronically-observable user behavior, the electronically-observable user behavior comprising interactions between a user and a user device, interactions between a user and a network and interactions between a user and a resource, the electronically-observable user behavior comprising a behavior exhibited by a user that is observed through the use of at least one of an electronic device, a computer system and a software application executing on the computing system;
converting the electronically-observable user behavior into electronic information representing the electronically-observable user behavior;
generating a user behavior profile based upon the electronic information representing the electronically-observable user behavior, the user behavior profile comprising a user behavior element, the user behavior element representing a user behavior activity;
identifying an anomalous interaction between at least one of the user and the user device, the user and the network and the user and the resource;
storing a representation of the anomalous interaction within the user behavior profile as a suspect user profile element;
providing the user behavior profile to a user behavior monitoring system;
generating a user behavior profile score for the user;
assessing a state of the user when enacting the user behavior activity, the accessing being based upon the user behavior profile score;
determining, via the user behavior monitoring system, whether the user behavior activity corresponds to a malicious activity, the determining using the user behavior element, the suspect user profile element and the state of the user when making the determination;
and,performing, via the user behavior monitoring system, an enforcement operation when the user behavior activity is determined to be malicious.
5 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and computer-readable medium are disclosed for monitoring user behavior elements, comprising: monitoring electronically-observable user behavior, the electronically-observable user behavior comprising interactions between a user and a user device, interactions between a user and a network and interactions between a user and a resource; converting the electronically-observable user behavior into electronic information representing the electronically-observable user behavior; generating a user behavior profile based upon the electronic information representing the electronically-observable user behavior; providing the user behavior profile to a user behavior monitoring system; and, generating a notification based upon the user behavior profile via the user behavior monitoring system.
143 Citations
20 Claims
-
1. A computer-implementable method for monitoring user behavior elements, comprising:
-
monitoring electronically-observable user behavior, the electronically-observable user behavior comprising interactions between a user and a user device, interactions between a user and a network and interactions between a user and a resource, the electronically-observable user behavior comprising a behavior exhibited by a user that is observed through the use of at least one of an electronic device, a computer system and a software application executing on the computing system; converting the electronically-observable user behavior into electronic information representing the electronically-observable user behavior; generating a user behavior profile based upon the electronic information representing the electronically-observable user behavior, the user behavior profile comprising a user behavior element, the user behavior element representing a user behavior activity; identifying an anomalous interaction between at least one of the user and the user device, the user and the network and the user and the resource; storing a representation of the anomalous interaction within the user behavior profile as a suspect user profile element; providing the user behavior profile to a user behavior monitoring system; generating a user behavior profile score for the user; assessing a state of the user when enacting the user behavior activity, the accessing being based upon the user behavior profile score; determining, via the user behavior monitoring system, whether the user behavior activity corresponds to a malicious activity, the determining using the user behavior element, the suspect user profile element and the state of the user when making the determination; and, performing, via the user behavior monitoring system, an enforcement operation when the user behavior activity is determined to be malicious. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system comprising:
-
a processor; a data bus coupled to the processor; and a non-transitory, computer-readable storage medium embodying computer program code, the non-transitory, computer-readable storage medium being coupled to the data bus, the computer program code interacting with a plurality of computer operations and comprising instructions executable by the processor and configured for; monitoring electronically-observable user behavior, the electronically-observable user behavior comprising interactions between a user and a user device, interactions between a user and a network and interactions between a user and a resource, the electronically-observable user behavior comprising a behavior exhibited by a user that is observed through the use of at least one of an electronic device, a computer system and a software application executing on the computing system; converting the electronically-observable user behavior into electronic information representing the electronically-observable user behavior; generating a user behavior profile based upon the electronic information representing the electronically-observable user behavior, the user behavior profile comprising a user behavior element, the user behavior element representing a user behavior activity; identifying an anomalous interaction between at least one of the user and the user device, the user and the network and the user and the resource; storing a representation of the anomalous interaction within the user behavior profile as a suspect user profile element; providing the user behavior profile to a user behavior monitoring system; generating a user behavior profile score for the user; assessing a state of the user when enacting the user behavior activity, the accessing being based upon the user behavior profile score; determining, via the user behavior monitoring system, whether the user behavior activity corresponds to a malicious activity, the determining using the user behavior element, the suspect user profile element and the state of the user when making the determination; and, performing, via the user behavior monitoring system, an enforcement operation when the user behavior activity is determined to be malicious. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory, computer-readable storage medium embodying computer program code, the computer program code comprising computer executable instructions configured for:
-
monitoring electronically-observable user behavior, the electronically-observable user behavior comprising interactions between a user and a user device, interactions between a user and a network and interactions between a user and a resource, the electronically-observable user behavior comprising a behavior exhibited by a user that is observed through the use of at least one of an electronic device, a computer system and a software application executing on the computing system; converting the electronically-observable user behavior into electronic information representing the electronically-observable user behavior; generating a user behavior profile based upon the electronic information representing the electronically-observable user behavior, the user behavior profile comprising a user behavior element, the user behavior element representing a user behavior activity; identifying an anomalous interaction between at least one of the user and the user device, the user and the network and the user and the resource; storing a representation of the anomalous interaction within the user behavior profile as a suspect user profile element; providing the user behavior profile to a user behavior monitoring system; generating a user behavior profile score for the user; assessing a state of the user when enacting the user behavior activity, the accessing being based upon the user behavior profile score; determining, via the user behavior monitoring system, whether the user behavior activity corresponds to a malicious activity, the determining using the user behavior element, the suspect user profile element and the state of the user when making the determination; and, performing, via the user behavior monitoring system, an enforcement operation when the user behavior activity is determined to be malicious. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification