Preventing unauthorized account access using compromised login credentials

User login information submitted as part of an attempt to log into a computer system is evaluated for unauthorized or illegitimate use based on indicators of suspicious behavior. Example indicators of suspicious behavior include whether the login information is known to have been compromised, whethe...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: FRANK JONATHAN H, MENGHRANJANI ALOK, PALOW CHRISTOPHER WILLIAM, STEWART ALLAN, JONES MATTHEW KNIGHT, BAJENOV ANDREI
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator FRANK JONATHAN H
MENGHRANJANI ALOK
PALOW CHRISTOPHER WILLIAM
STEWART ALLAN
JONES MATTHEW KNIGHT
BAJENOV ANDREI
description User login information submitted as part of an attempt to log into a computer system is evaluated for unauthorized or illegitimate use based on indicators of suspicious behavior. Example indicators of suspicious behavior include whether the login information is known to have been compromised, whether the login attempt originates from a network source or a physical source that has previously originated an attempt to log in using login information known to have been compromised, and whether multiple login attempts using the login information from multiple users has originated from the source. A suspicion index can be calculated based on the presence of the indicators of suspicious behavior. The system can require enhanced authentication based on the measurement of suspicious behavior.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US9298890B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US9298890B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US9298890B23</originalsourceid><addsrcrecordid>eNrjZPAKKEotS80rycxLVyjNSywtycgvyqxKTVFITE7OL80rAdGpxcUKpcUgFcn5uQVF-bmZxUAFOfnpmXkKyUWpKSDtiTnFPAysaUAqlRdKczMouLmGOHvophbkx6cWFyQmp-allsSHBlsaWVpYWBo4GRkToQQATRM2Dw</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Preventing unauthorized account access using compromised login credentials</title><source>esp@cenet</source><creator>FRANK JONATHAN H ; MENGHRANJANI ALOK ; PALOW CHRISTOPHER WILLIAM ; STEWART ALLAN ; JONES MATTHEW KNIGHT ; BAJENOV ANDREI</creator><creatorcontrib>FRANK JONATHAN H ; MENGHRANJANI ALOK ; PALOW CHRISTOPHER WILLIAM ; STEWART ALLAN ; JONES MATTHEW KNIGHT ; BAJENOV ANDREI</creatorcontrib><description>User login information submitted as part of an attempt to log into a computer system is evaluated for unauthorized or illegitimate use based on indicators of suspicious behavior. Example indicators of suspicious behavior include whether the login information is known to have been compromised, whether the login attempt originates from a network source or a physical source that has previously originated an attempt to log in using login information known to have been compromised, and whether multiple login attempts using the login information from multiple users has originated from the source. A suspicion index can be calculated based on the presence of the indicators of suspicious behavior. The system can require enhanced authentication based on the measurement of suspicious behavior.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2016</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20160329&amp;DB=EPODOC&amp;CC=US&amp;NR=9298890B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76289</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20160329&amp;DB=EPODOC&amp;CC=US&amp;NR=9298890B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>FRANK JONATHAN H</creatorcontrib><creatorcontrib>MENGHRANJANI ALOK</creatorcontrib><creatorcontrib>PALOW CHRISTOPHER WILLIAM</creatorcontrib><creatorcontrib>STEWART ALLAN</creatorcontrib><creatorcontrib>JONES MATTHEW KNIGHT</creatorcontrib><creatorcontrib>BAJENOV ANDREI</creatorcontrib><title>Preventing unauthorized account access using compromised login credentials</title><description>User login information submitted as part of an attempt to log into a computer system is evaluated for unauthorized or illegitimate use based on indicators of suspicious behavior. Example indicators of suspicious behavior include whether the login information is known to have been compromised, whether the login attempt originates from a network source or a physical source that has previously originated an attempt to log in using login information known to have been compromised, and whether multiple login attempts using the login information from multiple users has originated from the source. A suspicion index can be calculated based on the presence of the indicators of suspicious behavior. The system can require enhanced authentication based on the measurement of suspicious behavior.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2016</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZPAKKEotS80rycxLVyjNSywtycgvyqxKTVFITE7OL80rAdGpxcUKpcUgFcn5uQVF-bmZxUAFOfnpmXkKyUWpKSDtiTnFPAysaUAqlRdKczMouLmGOHvophbkx6cWFyQmp-allsSHBlsaWVpYWBo4GRkToQQATRM2Dw</recordid><startdate>20160329</startdate><enddate>20160329</enddate><creator>FRANK JONATHAN H</creator><creator>MENGHRANJANI ALOK</creator><creator>PALOW CHRISTOPHER WILLIAM</creator><creator>STEWART ALLAN</creator><creator>JONES MATTHEW KNIGHT</creator><creator>BAJENOV ANDREI</creator><scope>EVB</scope></search><sort><creationdate>20160329</creationdate><title>Preventing unauthorized account access using compromised login credentials</title><author>FRANK JONATHAN H ; MENGHRANJANI ALOK ; PALOW CHRISTOPHER WILLIAM ; STEWART ALLAN ; JONES MATTHEW KNIGHT ; BAJENOV ANDREI</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US9298890B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2016</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>FRANK JONATHAN H</creatorcontrib><creatorcontrib>MENGHRANJANI ALOK</creatorcontrib><creatorcontrib>PALOW CHRISTOPHER WILLIAM</creatorcontrib><creatorcontrib>STEWART ALLAN</creatorcontrib><creatorcontrib>JONES MATTHEW KNIGHT</creatorcontrib><creatorcontrib>BAJENOV ANDREI</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>FRANK JONATHAN H</au><au>MENGHRANJANI ALOK</au><au>PALOW CHRISTOPHER WILLIAM</au><au>STEWART ALLAN</au><au>JONES MATTHEW KNIGHT</au><au>BAJENOV ANDREI</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Preventing unauthorized account access using compromised login credentials</title><date>2016-03-29</date><risdate>2016</risdate><abstract>User login information submitted as part of an attempt to log into a computer system is evaluated for unauthorized or illegitimate use based on indicators of suspicious behavior. Example indicators of suspicious behavior include whether the login information is known to have been compromised, whether the login attempt originates from a network source or a physical source that has previously originated an attempt to log in using login information known to have been compromised, and whether multiple login attempts using the login information from multiple users has originated from the source. A suspicion index can be calculated based on the presence of the indicators of suspicious behavior. The system can require enhanced authentication based on the measurement of suspicious behavior.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US9298890B2
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
title Preventing unauthorized account access using compromised login credentials
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T23%3A50%3A00IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=FRANK%20JONATHAN%20H&rft.date=2016-03-29&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS9298890B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true