×

Method and system for implementing and managing an enterprise identity management for distributed security

  • US 8,015,205 B2
  • Filed: 06/15/2010
  • Issued: 09/06/2011
  • Est. Priority Date: 12/31/2002
  • Status: Expired due to Fees
First Claim
Patent Images

1. An audit system comprising:

  • a processor;

    a memory;

    a network interface communicating with the memory;

    said memory communicating with the processor for auditing; and

    said processor, when executing a computer program, performs operations comprising;

    monitoring, by said processor, changes in a relationship between a user and an identity of an account over a period of time to periodically perform an automatic adjustment of authentication questions in response to a deterioration of said relationship, wherein said deterioration of said relationship is based upon activity of said user;

    assigning, by said processor, a positive weight for a successful transaction by said user on said account, wherein said successful transaction is based on security requirements of said account and risk factors relating to various transaction types associated with said account;

    evaluating, by said processor, a current transaction of said user by comparing said current transaction to previous transactions performed by said user;

    assigning, by said processor, a positive weight for a similar transaction by said user;

    assigning, by said processor, a negative weight for an unsuccessful transaction by said user on said account, wherein the assigning the positive weight for the similar transaction and the assigning the negative weight are based on the comparing;

    aggregating, by said processor, said positive and negative weights to determine a usage history of said user;

    removing, by said processor, a relationship between said identity and said account in response to said aggregation failing to meet a predetermined criteria; and

    monitoring, by said processor, aggregated behaviors, wherein said aggregated behaviors are used to weight transactions to further verify ownership of said account, said operations further comprising receiving a request for the identity, said operations further comprising issuing said identity to said user in response to at least a portion of said authentication questions being correctly answered, wherein said authentication questions to be asked are based upon authentication rules associated with said account.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×