Detection of anomalies associated with fraudulent access to a service platform

In some implementations, a system may obtain a first model that is trained to identify feature data associated with a client system using one or more services of a service platform. The system may train, based on the feature data, a second model to identify anomalies associated with devices accessin...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Gupta, Ashish, Michel, Jeffrey, Dzegilenko, Fedor, Joshi, Rohit, Hulawale, Vinayak, Tan, Bozhao, Weimer, Jonathan, Tiwari, Vikash, Panda, Meenakshi
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Gupta, Ashish
Michel, Jeffrey
Dzegilenko, Fedor
Joshi, Rohit
Hulawale, Vinayak
Tan, Bozhao
Weimer, Jonathan
Tiwari, Vikash
Panda, Meenakshi
description In some implementations, a system may obtain a first model that is trained to identify feature data associated with a client system using one or more services of a service platform. The system may train, based on the feature data, a second model to identify anomalies associated with devices accessing the one or more services in association with a client identifier of the client system. The system may receive access data associated with an acting device accessing a service of the service platform. The system may determine, using the second model, that the acting device accessing the service corresponds to potential anomalous activity based on the access information. The system may obtain, from a verification device, a verification that the acting device accessing the service is anomalous activity. The system may perform, based on obtaining the verification, an action associated with the acting device.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US11516240B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US11516240B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US11516240B23</originalsourceid><addsrcrecordid>eNqNyjkOwjAQBdA0FAi4w3AAJByWA7CJigaoo5HzLSw5HsszgevTcACq17xpczvB4C1KJgnEWQZOEUqsKj6yoadPtBeFymM_JmQj9h6qZEJMivqOHlQSW5A6zJtJ4KRY_Jw1y8v5cbyuUKSDFvbIsO55d27n9u12fWg3_5wvOBE24A</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Detection of anomalies associated with fraudulent access to a service platform</title><source>esp@cenet</source><creator>Gupta, Ashish ; Michel, Jeffrey ; Dzegilenko, Fedor ; Joshi, Rohit ; Hulawale, Vinayak ; Tan, Bozhao ; Weimer, Jonathan ; Tiwari, Vikash ; Panda, Meenakshi</creator><creatorcontrib>Gupta, Ashish ; Michel, Jeffrey ; Dzegilenko, Fedor ; Joshi, Rohit ; Hulawale, Vinayak ; Tan, Bozhao ; Weimer, Jonathan ; Tiwari, Vikash ; Panda, Meenakshi</creatorcontrib><description>In some implementations, a system may obtain a first model that is trained to identify feature data associated with a client system using one or more services of a service platform. The system may train, based on the feature data, a second model to identify anomalies associated with devices accessing the one or more services in association with a client identifier of the client system. The system may receive access data associated with an acting device accessing a service of the service platform. The system may determine, using the second model, that the acting device accessing the service corresponds to potential anomalous activity based on the access information. The system may obtain, from a verification device, a verification that the acting device accessing the service is anomalous activity. The system may perform, based on obtaining the verification, an action associated with the acting device.</description><language>eng</language><subject>CALCULATING ; COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2022</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20221129&amp;DB=EPODOC&amp;CC=US&amp;NR=11516240B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76289</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20221129&amp;DB=EPODOC&amp;CC=US&amp;NR=11516240B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Gupta, Ashish</creatorcontrib><creatorcontrib>Michel, Jeffrey</creatorcontrib><creatorcontrib>Dzegilenko, Fedor</creatorcontrib><creatorcontrib>Joshi, Rohit</creatorcontrib><creatorcontrib>Hulawale, Vinayak</creatorcontrib><creatorcontrib>Tan, Bozhao</creatorcontrib><creatorcontrib>Weimer, Jonathan</creatorcontrib><creatorcontrib>Tiwari, Vikash</creatorcontrib><creatorcontrib>Panda, Meenakshi</creatorcontrib><title>Detection of anomalies associated with fraudulent access to a service platform</title><description>In some implementations, a system may obtain a first model that is trained to identify feature data associated with a client system using one or more services of a service platform. The system may train, based on the feature data, a second model to identify anomalies associated with devices accessing the one or more services in association with a client identifier of the client system. The system may receive access data associated with an acting device accessing a service of the service platform. The system may determine, using the second model, that the acting device accessing the service corresponds to potential anomalous activity based on the access information. The system may obtain, from a verification device, a verification that the acting device accessing the service is anomalous activity. The system may perform, based on obtaining the verification, an action associated with the acting device.</description><subject>CALCULATING</subject><subject>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2022</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNyjkOwjAQBdA0FAi4w3AAJByWA7CJigaoo5HzLSw5HsszgevTcACq17xpczvB4C1KJgnEWQZOEUqsKj6yoadPtBeFymM_JmQj9h6qZEJMivqOHlQSW5A6zJtJ4KRY_Jw1y8v5cbyuUKSDFvbIsO55d27n9u12fWg3_5wvOBE24A</recordid><startdate>20221129</startdate><enddate>20221129</enddate><creator>Gupta, Ashish</creator><creator>Michel, Jeffrey</creator><creator>Dzegilenko, Fedor</creator><creator>Joshi, Rohit</creator><creator>Hulawale, Vinayak</creator><creator>Tan, Bozhao</creator><creator>Weimer, Jonathan</creator><creator>Tiwari, Vikash</creator><creator>Panda, Meenakshi</creator><scope>EVB</scope></search><sort><creationdate>20221129</creationdate><title>Detection of anomalies associated with fraudulent access to a service platform</title><author>Gupta, Ashish ; Michel, Jeffrey ; Dzegilenko, Fedor ; Joshi, Rohit ; Hulawale, Vinayak ; Tan, Bozhao ; Weimer, Jonathan ; Tiwari, Vikash ; Panda, Meenakshi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US11516240B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2022</creationdate><topic>CALCULATING</topic><topic>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Gupta, Ashish</creatorcontrib><creatorcontrib>Michel, Jeffrey</creatorcontrib><creatorcontrib>Dzegilenko, Fedor</creatorcontrib><creatorcontrib>Joshi, Rohit</creatorcontrib><creatorcontrib>Hulawale, Vinayak</creatorcontrib><creatorcontrib>Tan, Bozhao</creatorcontrib><creatorcontrib>Weimer, Jonathan</creatorcontrib><creatorcontrib>Tiwari, Vikash</creatorcontrib><creatorcontrib>Panda, Meenakshi</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Gupta, Ashish</au><au>Michel, Jeffrey</au><au>Dzegilenko, Fedor</au><au>Joshi, Rohit</au><au>Hulawale, Vinayak</au><au>Tan, Bozhao</au><au>Weimer, Jonathan</au><au>Tiwari, Vikash</au><au>Panda, Meenakshi</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Detection of anomalies associated with fraudulent access to a service platform</title><date>2022-11-29</date><risdate>2022</risdate><abstract>In some implementations, a system may obtain a first model that is trained to identify feature data associated with a client system using one or more services of a service platform. The system may train, based on the feature data, a second model to identify anomalies associated with devices accessing the one or more services in association with a client identifier of the client system. The system may receive access data associated with an acting device accessing a service of the service platform. The system may determine, using the second model, that the acting device accessing the service corresponds to potential anomalous activity based on the access information. The system may obtain, from a verification device, a verification that the acting device accessing the service is anomalous activity. The system may perform, based on obtaining the verification, an action associated with the acting device.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US11516240B2
source esp@cenet
subjects CALCULATING
COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
PHYSICS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Detection of anomalies associated with fraudulent access to a service platform
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-11T20%3A30%3A31IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Gupta,%20Ashish&rft.date=2022-11-29&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS11516240B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true