DETECTING AND RESPONDING TO ATTEMPTS TO GAIN UNAUTHORIZED ACCESS TO USER ACCOUNTS IN AN ONLINE SYSTEM

In response to detected attempts to gain unauthorized access to user accounts of an online system, a security module of an online system applies an attack response policy to take actions in response to the attempts. Possible responses of the policy include reordering credential types requested by th...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: ERICKSON, Jason, VARTAK, Unmesh, VASEKAR, Amogh, WERMAN, Gabriel
Format: Patent
Sprache:eng ; fre ; ger
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator ERICKSON, Jason
VARTAK, Unmesh
VASEKAR, Amogh
WERMAN, Gabriel
description In response to detected attempts to gain unauthorized access to user accounts of an online system, a security module of an online system applies an attack response policy to take actions in response to the attempts. Possible responses of the policy include reordering credential types requested by the online system during multi-factor authentication-enabled login, switching to a mode in which login requests are accepted but login is not permitted for the requesting user, and logging information about the login requests. Logged information may be applied to enhance the ability to prevent future unauthorized accesses, such as adding credential values to a list of common credential values and prohibiting users from associating those values with their accounts, or training a model based on the logged information to predict a probability that a given login request is unauthorized.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_EP3874716A4</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EP3874716A4</sourcerecordid><originalsourceid>FETCH-epo_espacenet_EP3874716A43</originalsourceid><addsrcrecordid>eNqNjEEKwjAQRbtxIeod5gIupMW6HZKxDegkJJOFbkqRuBIt1PtjIh7A1f-P__jLKmkSUmK4A2QNnoKzrAuKBRShs5NQeoeGITJG6a03V9KASlH4bjGQL2gjZzl7yGD5ZJggXEL-WFeL-_iY0-aXqwqOJKrfpuk1pHkab-mZ3gO5-tA27W6PTf2H8gEhMDSC</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>DETECTING AND RESPONDING TO ATTEMPTS TO GAIN UNAUTHORIZED ACCESS TO USER ACCOUNTS IN AN ONLINE SYSTEM</title><source>esp@cenet</source><creator>ERICKSON, Jason ; VARTAK, Unmesh ; VASEKAR, Amogh ; WERMAN, Gabriel</creator><creatorcontrib>ERICKSON, Jason ; VARTAK, Unmesh ; VASEKAR, Amogh ; WERMAN, Gabriel</creatorcontrib><description>In response to detected attempts to gain unauthorized access to user accounts of an online system, a security module of an online system applies an attack response policy to take actions in response to the attempts. Possible responses of the policy include reordering credential types requested by the online system during multi-factor authentication-enabled login, switching to a mode in which login requests are accepted but login is not permitted for the requesting user, and logging information about the login requests. Logged information may be applied to enhance the ability to prevent future unauthorized accesses, such as adding credential values to a list of common credential values and prohibiting users from associating those values with their accounts, or training a model based on the logged information to predict a probability that a given login request is unauthorized.</description><language>eng ; fre ; ger</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2022</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20220608&amp;DB=EPODOC&amp;CC=EP&amp;NR=3874716A4$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76289</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20220608&amp;DB=EPODOC&amp;CC=EP&amp;NR=3874716A4$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>ERICKSON, Jason</creatorcontrib><creatorcontrib>VARTAK, Unmesh</creatorcontrib><creatorcontrib>VASEKAR, Amogh</creatorcontrib><creatorcontrib>WERMAN, Gabriel</creatorcontrib><title>DETECTING AND RESPONDING TO ATTEMPTS TO GAIN UNAUTHORIZED ACCESS TO USER ACCOUNTS IN AN ONLINE SYSTEM</title><description>In response to detected attempts to gain unauthorized access to user accounts of an online system, a security module of an online system applies an attack response policy to take actions in response to the attempts. Possible responses of the policy include reordering credential types requested by the online system during multi-factor authentication-enabled login, switching to a mode in which login requests are accepted but login is not permitted for the requesting user, and logging information about the login requests. Logged information may be applied to enhance the ability to prevent future unauthorized accesses, such as adding credential values to a list of common credential values and prohibiting users from associating those values with their accounts, or training a model based on the logged information to predict a probability that a given login request is unauthorized.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2022</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNjEEKwjAQRbtxIeod5gIupMW6HZKxDegkJJOFbkqRuBIt1PtjIh7A1f-P__jLKmkSUmK4A2QNnoKzrAuKBRShs5NQeoeGITJG6a03V9KASlH4bjGQL2gjZzl7yGD5ZJggXEL-WFeL-_iY0-aXqwqOJKrfpuk1pHkab-mZ3gO5-tA27W6PTf2H8gEhMDSC</recordid><startdate>20220608</startdate><enddate>20220608</enddate><creator>ERICKSON, Jason</creator><creator>VARTAK, Unmesh</creator><creator>VASEKAR, Amogh</creator><creator>WERMAN, Gabriel</creator><scope>EVB</scope></search><sort><creationdate>20220608</creationdate><title>DETECTING AND RESPONDING TO ATTEMPTS TO GAIN UNAUTHORIZED ACCESS TO USER ACCOUNTS IN AN ONLINE SYSTEM</title><author>ERICKSON, Jason ; VARTAK, Unmesh ; VASEKAR, Amogh ; WERMAN, Gabriel</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_EP3874716A43</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng ; fre ; ger</language><creationdate>2022</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>ERICKSON, Jason</creatorcontrib><creatorcontrib>VARTAK, Unmesh</creatorcontrib><creatorcontrib>VASEKAR, Amogh</creatorcontrib><creatorcontrib>WERMAN, Gabriel</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>ERICKSON, Jason</au><au>VARTAK, Unmesh</au><au>VASEKAR, Amogh</au><au>WERMAN, Gabriel</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>DETECTING AND RESPONDING TO ATTEMPTS TO GAIN UNAUTHORIZED ACCESS TO USER ACCOUNTS IN AN ONLINE SYSTEM</title><date>2022-06-08</date><risdate>2022</risdate><abstract>In response to detected attempts to gain unauthorized access to user accounts of an online system, a security module of an online system applies an attack response policy to take actions in response to the attempts. Possible responses of the policy include reordering credential types requested by the online system during multi-factor authentication-enabled login, switching to a mode in which login requests are accepted but login is not permitted for the requesting user, and logging information about the login requests. Logged information may be applied to enhance the ability to prevent future unauthorized accesses, such as adding credential values to a list of common credential values and prohibiting users from associating those values with their accounts, or training a model based on the logged information to predict a probability that a given login request is unauthorized.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng ; fre ; ger
recordid cdi_epo_espacenet_EP3874716A4
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title DETECTING AND RESPONDING TO ATTEMPTS TO GAIN UNAUTHORIZED ACCESS TO USER ACCOUNTS IN AN ONLINE SYSTEM
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T14%3A17%3A49IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=ERICKSON,%20Jason&rft.date=2022-06-08&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EEP3874716A4%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true