Detection of anomalies associated with fraudulent access to a service platform
In some implementations, a system may obtain a first model that is trained to identify feature data associated with a client system using one or more services of a service platform. The system may train, based on the feature data, a second model to identify anomalies associated with devices accessin...
Gespeichert in:
Hauptverfasser: | , , , , , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Gupta, Ashish Michel, Jeffrey Dzegilenko, Fedor Joshi, Rohit Hulawale, Vinayak Tan, Bozhao Weimer, Jonathan Tiwari, Vikash Panda, Meenakshi |
description | In some implementations, a system may obtain a first model that is trained to identify feature data associated with a client system using one or more services of a service platform. The system may train, based on the feature data, a second model to identify anomalies associated with devices accessing the one or more services in association with a client identifier of the client system. The system may receive access data associated with an acting device accessing a service of the service platform. The system may determine, using the second model, that the acting device accessing the service corresponds to potential anomalous activity based on the access information. The system may obtain, from a verification device, a verification that the acting device accessing the service is anomalous activity. The system may perform, based on obtaining the verification, an action associated with the acting device. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US11516240B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US11516240B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US11516240B23</originalsourceid><addsrcrecordid>eNqNyjkOwjAQBdA0FAi4w3AAJByWA7CJigaoo5HzLSw5HsszgevTcACq17xpczvB4C1KJgnEWQZOEUqsKj6yoadPtBeFymM_JmQj9h6qZEJMivqOHlQSW5A6zJtJ4KRY_Jw1y8v5cbyuUKSDFvbIsO55d27n9u12fWg3_5wvOBE24A</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Detection of anomalies associated with fraudulent access to a service platform</title><source>esp@cenet</source><creator>Gupta, Ashish ; Michel, Jeffrey ; Dzegilenko, Fedor ; Joshi, Rohit ; Hulawale, Vinayak ; Tan, Bozhao ; Weimer, Jonathan ; Tiwari, Vikash ; Panda, Meenakshi</creator><creatorcontrib>Gupta, Ashish ; Michel, Jeffrey ; Dzegilenko, Fedor ; Joshi, Rohit ; Hulawale, Vinayak ; Tan, Bozhao ; Weimer, Jonathan ; Tiwari, Vikash ; Panda, Meenakshi</creatorcontrib><description>In some implementations, a system may obtain a first model that is trained to identify feature data associated with a client system using one or more services of a service platform. The system may train, based on the feature data, a second model to identify anomalies associated with devices accessing the one or more services in association with a client identifier of the client system. The system may receive access data associated with an acting device accessing a service of the service platform. The system may determine, using the second model, that the acting device accessing the service corresponds to potential anomalous activity based on the access information. The system may obtain, from a verification device, a verification that the acting device accessing the service is anomalous activity. The system may perform, based on obtaining the verification, an action associated with the acting device.</description><language>eng</language><subject>CALCULATING ; COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2022</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20221129&DB=EPODOC&CC=US&NR=11516240B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76289</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20221129&DB=EPODOC&CC=US&NR=11516240B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Gupta, Ashish</creatorcontrib><creatorcontrib>Michel, Jeffrey</creatorcontrib><creatorcontrib>Dzegilenko, Fedor</creatorcontrib><creatorcontrib>Joshi, Rohit</creatorcontrib><creatorcontrib>Hulawale, Vinayak</creatorcontrib><creatorcontrib>Tan, Bozhao</creatorcontrib><creatorcontrib>Weimer, Jonathan</creatorcontrib><creatorcontrib>Tiwari, Vikash</creatorcontrib><creatorcontrib>Panda, Meenakshi</creatorcontrib><title>Detection of anomalies associated with fraudulent access to a service platform</title><description>In some implementations, a system may obtain a first model that is trained to identify feature data associated with a client system using one or more services of a service platform. The system may train, based on the feature data, a second model to identify anomalies associated with devices accessing the one or more services in association with a client identifier of the client system. The system may receive access data associated with an acting device accessing a service of the service platform. The system may determine, using the second model, that the acting device accessing the service corresponds to potential anomalous activity based on the access information. The system may obtain, from a verification device, a verification that the acting device accessing the service is anomalous activity. The system may perform, based on obtaining the verification, an action associated with the acting device.</description><subject>CALCULATING</subject><subject>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2022</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNyjkOwjAQBdA0FAi4w3AAJByWA7CJigaoo5HzLSw5HsszgevTcACq17xpczvB4C1KJgnEWQZOEUqsKj6yoadPtBeFymM_JmQj9h6qZEJMivqOHlQSW5A6zJtJ4KRY_Jw1y8v5cbyuUKSDFvbIsO55d27n9u12fWg3_5wvOBE24A</recordid><startdate>20221129</startdate><enddate>20221129</enddate><creator>Gupta, Ashish</creator><creator>Michel, Jeffrey</creator><creator>Dzegilenko, Fedor</creator><creator>Joshi, Rohit</creator><creator>Hulawale, Vinayak</creator><creator>Tan, Bozhao</creator><creator>Weimer, Jonathan</creator><creator>Tiwari, Vikash</creator><creator>Panda, Meenakshi</creator><scope>EVB</scope></search><sort><creationdate>20221129</creationdate><title>Detection of anomalies associated with fraudulent access to a service platform</title><author>Gupta, Ashish ; Michel, Jeffrey ; Dzegilenko, Fedor ; Joshi, Rohit ; Hulawale, Vinayak ; Tan, Bozhao ; Weimer, Jonathan ; Tiwari, Vikash ; Panda, Meenakshi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US11516240B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2022</creationdate><topic>CALCULATING</topic><topic>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Gupta, Ashish</creatorcontrib><creatorcontrib>Michel, Jeffrey</creatorcontrib><creatorcontrib>Dzegilenko, Fedor</creatorcontrib><creatorcontrib>Joshi, Rohit</creatorcontrib><creatorcontrib>Hulawale, Vinayak</creatorcontrib><creatorcontrib>Tan, Bozhao</creatorcontrib><creatorcontrib>Weimer, Jonathan</creatorcontrib><creatorcontrib>Tiwari, Vikash</creatorcontrib><creatorcontrib>Panda, Meenakshi</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Gupta, Ashish</au><au>Michel, Jeffrey</au><au>Dzegilenko, Fedor</au><au>Joshi, Rohit</au><au>Hulawale, Vinayak</au><au>Tan, Bozhao</au><au>Weimer, Jonathan</au><au>Tiwari, Vikash</au><au>Panda, Meenakshi</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Detection of anomalies associated with fraudulent access to a service platform</title><date>2022-11-29</date><risdate>2022</risdate><abstract>In some implementations, a system may obtain a first model that is trained to identify feature data associated with a client system using one or more services of a service platform. The system may train, based on the feature data, a second model to identify anomalies associated with devices accessing the one or more services in association with a client identifier of the client system. The system may receive access data associated with an acting device accessing a service of the service platform. The system may determine, using the second model, that the acting device accessing the service corresponds to potential anomalous activity based on the access information. The system may obtain, from a verification device, a verification that the acting device accessing the service is anomalous activity. The system may perform, based on obtaining the verification, an action associated with the acting device.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US11516240B2 |
source | esp@cenet |
subjects | CALCULATING COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS COMPUTING COUNTING ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY PHYSICS TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | Detection of anomalies associated with fraudulent access to a service platform |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-11T20%3A30%3A31IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Gupta,%20Ashish&rft.date=2022-11-29&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS11516240B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |