ANOMALY DETECTION BASED ON BEHAVIOR MODELING LEARNED FROM MONITORED COMPUTER ACTIVITIES

    公开(公告)号:US20250094573A1

    公开(公告)日:2025-03-20

    申请号:US18469314

    申请日:2023-09-18

    Abstract: A system may receive, from a monitored system, behavior data that indicates one or more types of computer activities requested by a requester. The system may identify a behavior profile that was generated during a training phase to learn behaviors of the requester, the behavior profile including information that identifies one or more computer activities that were monitored during the training phase. The system may provide, during a detection phase, the behavior data to the behavior classifier to detect whether the behavior data is anomalous. The system may generate an anomaly classification based on the behavior data and the behavior profile. The anomaly classification indicates a predicted anomalousness of the behavior data with respect to the behavior profile and is used to determine whether a mitigative action is to be taken in response to the one or more types of activities requested by the requester.

    DATA LABEL CREATION FROM REDUCED DATA LABELS FOR MODEL TRAINING

    公开(公告)号:US20240354645A1

    公开(公告)日:2024-10-24

    申请号:US18637643

    申请日:2024-04-17

    CPC classification number: G06N20/00 G06N5/01

    Abstract: Systems, methods, and non-transitory computer-readable media for creating labels for training a machine learning model using a limited dataset. A label creation application receives raw data from a storage device. The raw data includes requests associated with user accounts. The application determines an account type of each of the user accounts. The application generates a raw data set based on account types, requests, and user accounts. The application cleans the raw data set using client feedback data. The feedback data is the limited dataset that includes fraud events associated with user accounts identified by a client. The application extracts a request history for a user account from the raw data that is cleaned. The application generates a training profile for the user account based on the request history. The application creates training labels based on the training profile, and the model is trained by processing the created labels.

    Systems, methods, computer-readable media, and devices for authenticating users

    公开(公告)号:US12034562B2

    公开(公告)日:2024-07-09

    申请号:US17564371

    申请日:2021-12-29

    CPC classification number: H04L12/282 H04L12/281 H04L12/2838 H04L2012/285

    Abstract: Embodiment described herein provide a system for authenticating an identity of a user. The system includes a first device, a second device, a user device, and a remote computing device. The first device, the second device, and the user device are connected to and operable to communicate over the first communications network. The user device is connected to and operable to communicate over a second communications network. The user device is configured to detect the first device or the second device when the first device or the second device is connected the first communications network, and to generate one or more signals related to the detection of the first device or the second device. The remote computing device is configured to receive the one or more signals from the user device and authenticate the identity of the user based on the one or more signals.

    SESSIONS CORRELATION FOR MULTIPLE DEVICE AUTHENTICATION

    公开(公告)号:US20240223559A1

    公开(公告)日:2024-07-04

    申请号:US18400805

    申请日:2023-12-29

    Inventor: Perry McGee

    CPC classification number: H04L63/0884 H04L65/1069

    Abstract: Devices, methods, and computer-readable media that perform sessions correlation for multiple device authentication. In one embodiment, a server may include an electronic processor communicatively coupled to the memory, the electronic processor is configured to: establish a first session with a first user interface device, establish a second session with a second user interface device that is different from the first user interface device, receive, from a third-party server, a score request including information that correlates the second session with the first session, generate a score on a correlation of the first session to the second session, and output the score indicating a level of multiple device authentication, the score also being a control signal for authorizing or denying a multi-factor authentication at the third-party server.

    USER AUTHENTICATION WITH BIOMETRIC DATA IN CONJUNCTION WITH AUTOFILL ASSISTANCE

    公开(公告)号:US20240220593A1

    公开(公告)日:2024-07-04

    申请号:US18148900

    申请日:2022-12-30

    CPC classification number: G06F21/32 G06F40/174

    Abstract: Devices, methods, and non-transitory computer-readable media for user authentication with biometric data in conjunction with autofill assistance. In one example, an electronic computing device includes a memory including a user account and an electronic processor communicatively coupled to the memory. The electronic processor is configured to receive a request to access the user account and biometric data associated with the request, determine whether an autofill assistance occurred while the biometric data was captured, responsive to determining that the autofill assistance occurred while the biometric data was captured, identify data associated with the autofill assistance in the biometric data, generate second biometric data by excluding the data associated with the autofill assistance from the biometric data, and perform user authentication based on the second biometric data.

    Determining a fraud risk score associated with a transaction

    公开(公告)号:US11727406B2

    公开(公告)日:2023-08-15

    申请号:US16988142

    申请日:2020-08-07

    CPC classification number: G06Q20/4016 G06N20/00

    Abstract: A system for determining a fraud risk score associated with a transaction. The system includes a server including an electronic processor. The electronic processor is configured to determine a plurality of rules based on a plurality of transactions over time and extract one or more features of the transaction. The electronic processor is also configured to select, based on the plurality of rules, a plurality of fraud risk features Each non-categorical fraud risk feature selected is associated with a fraud risk feature value and each categorical fraud risk feature selected is associated with a categorical variable value. The electronic processor is configured to determine, for each categorical fraud risk feature, a fraud risk feature value. The electronic processor is also configured to determine the fraud risk score based on the one or more of the transformed fraud risk feature values.

    PROTECTING SENSITIVE DATA IN INTERNET-OF-THINGS (IOT) DEVICE

    公开(公告)号:US20230198966A1

    公开(公告)日:2023-06-22

    申请号:US17559720

    申请日:2021-12-22

    Inventor: Igor Opushnyev

    Abstract: Protecting sensitive data in an internet-of-things (IoT) device. In one embodiment, a computing device includes network communications, a memory, and an electronic processor communicatively coupled to the memory and the network communications. The electronic processor is configured to receive a transaction setup request, determine, with the network communications, whether minimally required network environment attributes are available, prompt a user that sensitive data can be securely stored in the memory and to enter the sensitive data in response to determining that the minimally required network environment attributes are available, and prompt the user that the sensitive data cannot be securely stored in the memory in response to determining that the minimally required network environment attributes are not available.

    SYSTEMS AND METHODS FOR CONTINUOUS USER AUTHENTICATION

    公开(公告)号:US20230052407A1

    公开(公告)日:2023-02-16

    申请号:US17401172

    申请日:2021-08-12

    Abstract: A computer device configured to passively authenticate a user includes a memory device including a user profile, and at least one processor coupled to the memory device. The at least one processor is programmed to execute a passive authentication system programmed to receive an indication that the user successfully performed an active authentication by interacting with the computing device, and set an authentication state of the user as authenticated in response to the successful active authentication. The passive authentication system is further programmed to receive a first plurality of interaction data indicative of one or more interactions between the user and the computer device, the one or more interactions performed after the indication of the successful active authentication; compare the one or more interactions to the user profile; and update the authentication state of the user based on the comparison.

Patent Agency Ranking