Secure impersonation detection

Techniques of performing impersonation detection involve using encrypted access request data. Along these lines, an impersonation detection server stores historical access request data only in encrypted form and has no way to decrypt such data. When a new access request is received by a client, the...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Lindell Yehuda, Kolman Eyal, Kaufman Alon, Pinkas Binyamin
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Lindell Yehuda
Kolman Eyal
Kaufman Alon
Pinkas Binyamin
description Techniques of performing impersonation detection involve using encrypted access request data. Along these lines, an impersonation detection server stores historical access request data only in encrypted form and has no way to decrypt such data. When a new access request is received by a client, the client sends the username associated with the request to the server, which in turns sends the client the encrypted historical access request data. In addition, the server sends the client instructions to perform impersonation detection. The client then carries out the instructions based on the encrypted historical access request data and data contained in the new access request.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US9906511B1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US9906511B1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US9906511B13</originalsourceid><addsrcrecordid>eNrjZJALTk0uLUpVyMwtSC0qzs9LLMnMz1NISS1JTQaxeBhY0xJzilN5oTQ3g4Kba4izh25qQX58anFBYnJqXmpJfGiwpaWBmamhoZOhMRFKAOYMJME</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Secure impersonation detection</title><source>esp@cenet</source><creator>Lindell Yehuda ; Kolman Eyal ; Kaufman Alon ; Pinkas Binyamin</creator><creatorcontrib>Lindell Yehuda ; Kolman Eyal ; Kaufman Alon ; Pinkas Binyamin</creatorcontrib><description>Techniques of performing impersonation detection involve using encrypted access request data. Along these lines, an impersonation detection server stores historical access request data only in encrypted form and has no way to decrypt such data. When a new access request is received by a client, the client sends the username associated with the request to the server, which in turns sends the client the encrypted historical access request data. In addition, the server sends the client instructions to perform impersonation detection. The client then carries out the instructions based on the encrypted historical access request data and data contained in the new access request.</description><language>eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2018</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20180227&amp;DB=EPODOC&amp;CC=US&amp;NR=9906511B1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20180227&amp;DB=EPODOC&amp;CC=US&amp;NR=9906511B1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Lindell Yehuda</creatorcontrib><creatorcontrib>Kolman Eyal</creatorcontrib><creatorcontrib>Kaufman Alon</creatorcontrib><creatorcontrib>Pinkas Binyamin</creatorcontrib><title>Secure impersonation detection</title><description>Techniques of performing impersonation detection involve using encrypted access request data. Along these lines, an impersonation detection server stores historical access request data only in encrypted form and has no way to decrypt such data. When a new access request is received by a client, the client sends the username associated with the request to the server, which in turns sends the client the encrypted historical access request data. In addition, the server sends the client instructions to perform impersonation detection. The client then carries out the instructions based on the encrypted historical access request data and data contained in the new access request.</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2018</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZJALTk0uLUpVyMwtSC0qzs9LLMnMz1NISS1JTQaxeBhY0xJzilN5oTQ3g4Kba4izh25qQX58anFBYnJqXmpJfGiwpaWBmamhoZOhMRFKAOYMJME</recordid><startdate>20180227</startdate><enddate>20180227</enddate><creator>Lindell Yehuda</creator><creator>Kolman Eyal</creator><creator>Kaufman Alon</creator><creator>Pinkas Binyamin</creator><scope>EVB</scope></search><sort><creationdate>20180227</creationdate><title>Secure impersonation detection</title><author>Lindell Yehuda ; Kolman Eyal ; Kaufman Alon ; Pinkas Binyamin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US9906511B13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2018</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Lindell Yehuda</creatorcontrib><creatorcontrib>Kolman Eyal</creatorcontrib><creatorcontrib>Kaufman Alon</creatorcontrib><creatorcontrib>Pinkas Binyamin</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Lindell Yehuda</au><au>Kolman Eyal</au><au>Kaufman Alon</au><au>Pinkas Binyamin</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Secure impersonation detection</title><date>2018-02-27</date><risdate>2018</risdate><abstract>Techniques of performing impersonation detection involve using encrypted access request data. Along these lines, an impersonation detection server stores historical access request data only in encrypted form and has no way to decrypt such data. When a new access request is received by a client, the client sends the username associated with the request to the server, which in turns sends the client the encrypted historical access request data. In addition, the server sends the client instructions to perform impersonation detection. The client then carries out the instructions based on the encrypted historical access request data and data contained in the new access request.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US9906511B1
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Secure impersonation detection
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-21T07%3A11%3A06IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Lindell%20Yehuda&rft.date=2018-02-27&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS9906511B1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true