scispace - formally typeset
Patent

Authenticating user sessions based on reputation of user locations

TLDR
In this article, a session is authenticated based on locations associated with a user account used for sending a request for creating a session and the level of authentication required for the session is determined based on the suspiciousness index.
Abstract
User sessions are authenticated based on locations associated with a user account used for sending a request for creating a session. Examples of locations of a source of a request include a geographical location, a network address, or a machine cookie associated with a device sending the request. Locations of the request are compared with stored safe locations associated with the user account and a suspiciousness index is determined for the session. The level of authentication required for the session is determined based on the suspiciousness index. Locations are associated with a reputation based on past history of sessions originating from the locations. A location associated with a history of creating suspicious session is considered an unsafe location. Reputation of the location originating the session is used to determine the level of authentication required for the session.

read more

Citations
More filters
Patent

Hygiene-Based Computer Security

TL;DR: In this article, a reputation server is coupled to multiple clients via a network and each client has a security module that detects malware at the client and provides it to the reputation server.
Patent

Identifying application reputation based on resource accesses

TL;DR: In this paper, the authors present techniques for identifying malware based on the reputations of remote resources (e.g., web content, files, databases, IP addresses, services, and users) accessed by an application.
Patent

Communication-based reputation system

TL;DR: In this paper, reputation information associated with a set of other entities that communicate with the host is identified, and a reputation score associated with an entity is generated based on the reputation scores associated with the other entities.
Patent

Inferring file and website reputations by belief propagation leveraging machine reputation

TL;DR: In this article, the authors inferred the probability of a computer file being malware by iteratively propagating domain knowledge among computer files, related clients, and/or related source domains, and generated a graph to include machine nodes representing clients, file nodes representing files residing on the clients and optionally domain nodes representing source domains hosting the files.
Patent

System and method for identity protection using mobile device signaling network derived location pattern recognition

TL;DR: In this paper, a system and method for recognizing patterns in wireless device locations using wireless device location data derived from a communications signaling network is provided, which can reveal potential geographic patterns that may indicate meaningful behaviors of the purported users of the wireless devices.
References
More filters
Patent

System and method for fraud monitoring, detection, and tiered user authentication

TL;DR: In this paper, a plurality of graphical user interfaces selected depending on a perceived risk of fraud associated with the devices are presented, and a number of communicating modules are implemented to identify user devices, assess their risks of fraud, present selected user interfaces, and maintain databases of fraud experiences.
Patent

Techniques for fraud monitoring and detection using application fingerprinting

TL;DR: In this article, a plurality of historical application fingerprints are stored for data previously submitted to a software application, and each historical application fingerprint is associated with one or more contexts in which its corresponding data was submitted.

HOTP: An HMAC-Based One-Time Password Algorithm

TL;DR: This document describes an algorithm to generate one-time password values, based on Hashed Message Authentication Code (HMAC), which will facilitate adoption of two-factor authentication on the Internet by enabling interoperability across commercial and open-source implementations.
Patent

Secure authentication systems and methods

TL;DR: In this article, the authors provided a method for user authentication, the method including receiving a username/password pair associated with a user; requesting one or more responses to a first Reverse Turing Test (RTT) and granting access to the user if a valid response to the first RTT is received and the username/ password pair is valid.
Patent

Location based fraud reduction system and method

TL;DR: In this article, the location from where a request is submitted is compared against a predetermined permissible location(s) or a current user location, and a determination is made to whether to service the request, based at least in part on the location of where the request was submitted.