×

Data access verification for enterprise resources

  • US 9,591,008 B2
  • Filed: 04/16/2015
  • Issued: 03/07/2017
  • Est. Priority Date: 03/06/2015
  • Status: Active Grant
First Claim
Patent Images

1. A non-transitory computer-readable storage medium having instructions stored therein, wherein the instructions, when executed by a processor of a computing device, cause the computing device to perform operations responsive to a determination that a verification with a user is desired responsive to detection of activity indicative of a possible insider threat, wherein the computing device is to be communicatively coupled to a traffic capture and analysis module (TCAM), wherein the TCAM is to be coupled between a set of one or more client end stations and a set of one or more server end stations to analyze network traffic being sent between them, wherein the set of server end stations is to store enterprise resources including an enterprise application and enterprise data, wherein the possible insider threat comprises the use of one or more of a user account and a client end station to access the enterprise resources, and wherein the determination that the verification with the user is desired was based on one or more of the network traffic, current event data, and stored historical data, wherein the current event data describes an access to one of the enterprise resources that was detected and reported on by the TCAM, the operations comprising:

  • determining whether a number of detections of activity indicative of the possible insider threat caused by a rule exceeds a predetermined threshold within a predetermined period of time;

    when the number of detections of activity indicative of the possible insider threat caused by the rule exceeds the predetermined threshold within the predetermined period of time, notifying an administrator and forgoing the verification;

    otherwise, performing the following,selecting a target role and a target user for the verification based on an activity context and an enterprise context repository, wherein the activity context describes the activity by identifying the rule used to make the determination and by identifying one or more of the current event data and relevant historical data, wherein the enterprise context repository identifies roles within the enterprise and the users in those roles, the selecting including;

    selecting the target role from a plurality of target roles based on the activity context, wherein the plurality of target roles includes two or more of an owner of the client end station, an owner of the user account, an owner of a particular part of the enterprise data, and a position at the enterprise;

    selecting the target user in the selected target role based on the enterprise context repository, wherein the selected target role and the selected target user in that selected target role is intended to be the user of the enterprise having the requisite knowledge to confirm whether or not the activity is indicative of the possible insider threat, wherein the selected target user is a different individual than the owner of the user account and the administrator;

    determining whether a number of verifications with the target user exceeds another predetermined threshold within another predetermined period of time;

    when the number of verifications with the target user exceeds the another predetermined threshold within the another predetermined period of time, notifying the administrator and forgoing the verification;

    otherwise, performing the following,causing a verification request to be sent to the selected target user, wherein the verification request describes the activity and allows the selected target user to effectively confirm whether or not the activity is indicative of the possible insider threat; and

    generating an alert when a verification result, which is based on the verification request and any verification response, indicates that the activity is indicative of the possible insider threat.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×