System and method for an automated system for continuous observation, audit and control of user activities as they occur within a mobile network

A system for providing continuous automated verification of user identity and intent includes a processor within at least one server that implements a first processing node and a second processing node for monitoring a mirrored live-data flow of a live-data flow passing through the first processing...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Richards Carissa, Richards Peter, Ramachandran Hariharan
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:A system for providing continuous automated verification of user identity and intent includes a processor within at least one server that implements a first processing node and a second processing node for monitoring a mirrored live-data flow of a live-data flow passing through the first processing node in a non-intrusive manner that does not affect the live-data flow passing through the first processing node to detect relevant network access and activity in the mirrored live data flow. At the second processing node, a first set of verification criteria, comprising a first set of dynamically generated dialog of questions with associated answers to be provided by the at least one user, are dynamically generated based on live data inputs from the mirrored live-data flow and external data sources to verify an identify and an activity of the at least one user attempting to access the network prior to access and performing an activity on the network. A second set of verification criteria, comprising a second set of dynamically generated dialog of questions with associated answers to be provided by the at least one user, are dynamically generated at the second processing node based on the responses provided by the at least one user to the first set of dynamically generated dialog of questions to verify the identity and the activity of the at least one user attempting to access the network. A required threshold level is adjusted at which the first and second verification criteria must be met by the at least one user attempting the network access in order to allow or deny the network access and activity by the at least one user. The relevant network access and activity are denied if the verification criteria are not met at the required threshold level, to preempt unverified and unwanted access to and activity on the network by the at least one user. The relevant network access and activity are allowed if the verification criteria are met at the required threshold level. The system continues to monitor and verify the user identity and the user activity for a dynamic time period after access and activity on the network is granted to ensure continued user identity and activity fidelity.