Patent
Monitoring user authenticity in distributed system
Reads0
Chats0
TLDR
In this article, the authors present a system for monitoring user authenticity during user activities in a user session on an application server, which is carried out in a distributed manner by a distributed server system.Abstract:
Systems and methods for monitoring user authenticity during user activities in a user session on an application server is provided. The method being carried out in a distributed manner by a distributed server system. The method comprises a user modeling-process and a user-verification process. The user-modeling process is performed on a user-model server in which a user model is adapted session-by-session to user activity data received from the application server. The user-verification process is performed on the application server on the basis of the user model adapted on the user-model server. The user-verification process comprises comparing the user model with features extracted from user activity in the user session on the application server and determining a total risk-score value based on the comparison. If the total risk-score value is greater than a given threshold, a corrective action is performed.read more
Citations
More filters
Patent
Multi-input user interaction and behavioral based authentication system for context aware applications
TL;DR: A mobile device which can identify a change in possession of the device and implement different types of security protocols to follow based on a scoring system regarding threat of the user to the data on the mobile device.
Patent
User profile definition and management
TL;DR: In this paper, the authors present a method, system and computer-usable medium for performing a security analysis operation within a security environment, comprising: monitoring electronically-observable user behavior about a particular entity; maintaining a state about the particular entity, the state representing a context of a particular event; generating a user behavior profile based upon the electronic information representing the electronically observable user behavior; and, analyzing the event using the state of the entity and the user behaviour profile.
Patent
Discerning psychological state from correlated user behavior and contextual information
TL;DR: In this paper, the psychological profile operation includes: monitoring user interactions between a user and an information handling system, converting the user interactions into electronic information representing the user interaction, determining when the interaction is associated with the generation of an electronic communication, associating the interaction with the electronic communication; and, generating a psychological profile of the user based upon user interactions and the electronic communications.
Patent
Dividing events into sessions during adaptive trust profile operations
TL;DR: In this article, a system, method, and computer-readable medium are disclosed for generating an adaptive trust profile via an adaptive-trust profile operation, which includes monitoring a plurality of electronically-observable actions of an entity, converting the plurality of actions of the entity to electronic information, and generating the adaptive trust profiles based upon the entity's actions.
Patent
Inline secret sharing
TL;DR: In this paper, a secure communication session is established between two computers based on an exchange of handshake information associated with the secure communication sessions, such that the key information may be encrypted by the key provider.
References
More filters
Patent
System and method for fraud monitoring, detection, and tiered user authentication
TL;DR: In this paper, a plurality of graphical user interfaces selected depending on a perceived risk of fraud associated with the devices are presented, and a number of communicating modules are implemented to identify user devices, assess their risks of fraud, present selected user interfaces, and maintain databases of fraud experiences.
Patent
Method and system for controlling context-aware cybersecurity training
TL;DR: In this paper, a context-aware training system senses a user action that may expose the user to a threat, such as a cybersecurity threat, and selects a training action from a collection of available training actions and causes the training action to be delivered to the user or a group of users.
Patent
Fraud detection and analysis
Craig Priess,Steve Schramm +1 more
TL;DR: In this article, a risk engine coupled with an analytical user interface displays for the actions in the target account at least one of the risk score and event data of any event in the account.
Patent
Data processing apparatus, data processing method, and program
Masato Ito,Kohtaro Sabe +1 more
TL;DR: In this paper, the authors present an approach for estimating a parameter for modeling a time series signal with stochastic dynamics model, and a method for obtaining data representing the mixed signals of two or more time series signals.
Patent
Behavioral fingerprint based authentication
Marc Davis,Matthew G. Dyor,Daniel A. Gerrity,Xuedong Huang,Roderick A. Hyde,Royce A. Levien,Richard T. Lord,Robert W. Lord,Mark A. Malamud,Nathan P. Myhrvold,Clarence T. Tegreene +10 more
TL;DR: In this paper, the first user of a computing device is associated with the computing device, and the level of authentication associated with that first user via the computing devices is determined based on a behavioral fingerprint.