METHODS AND SYSTEMS FOR USING BEHAVIORAL ANALYSIS TOWARDS EFFICIENT CONTINUOUS AUTHENTICATION
    11.
    发明公开
    METHODS AND SYSTEMS FOR USING BEHAVIORAL ANALYSIS TOWARDS EFFICIENT CONTINUOUS AUTHENTICATION 审中-公开
    使用行为分析进行有效连续认证的方法和系统

    公开(公告)号:EP3207680A1

    公开(公告)日:2017-08-23

    申请号:EP15757108.4

    申请日:2015-08-20

    Abstract: A computing device processor may be configured with processor-executable instructions to implement methods of using behavioral analysis and machine learning techniques to identify, prevent, correct, and/or otherwise respond to malicious or performance-degrading behaviors of the computing device. As part of these operations, the processor may perform multifactor authentication operations that include determining one or more of a transaction type criticality value, a user confidence value, a software integrity confidence value, and a historical behavior value, using the one or more of these values to determine a number of authentication factors that are be evaluated when authenticating a user of the computing device, and authenticating the user by evaluating the determined number of authentication factors.

    Abstract translation: 计算设备处理器可以配置有处理器可执行指令以实现使用行为分析和机器学习技术来识别,防止,纠正和/或以其他方式对计算设备的恶意或性能退化行为做出响应的方法。 作为这些操作的一部分,处理器可执行多因素认证操作,其包括使用这些中的一个或多个来确定交易类型关键性值,用户置信度值,软件完整性置信度值和历史行为值中的一个或多个 值以确定在对计算设备的用户进行认证时被评估的认证因素的数量,以及通过评估所确定的认证因子的数量来认证用户。

    PRE-IDENTIFYING PROBABLE MALICIOUS BEHAVIOR BASED ON CONFIGURATION PATHWAYS
    12.
    发明公开
    PRE-IDENTIFYING PROBABLE MALICIOUS BEHAVIOR BASED ON CONFIGURATION PATHWAYS 审中-公开
    可能有害的基于行为的配置中的路径初步鉴定

    公开(公告)号:EP3053319A1

    公开(公告)日:2016-08-10

    申请号:EP14790806.5

    申请日:2014-09-19

    Abstract: The various aspects include systems and methods for enabling mobile computing devices (102) to recognize when they are at risk of experiencing malicious behavior in the near future given a current configuration. Thus, the various aspects enable mobile computing devices (102) to anticipate malicious behaviors before a malicious behavior begins rather than after the malicious behavior has begun. In the various aspects, a network server (116) may receive behavior vector information from multiple mobile computing devices (102) and apply pattern recognition techniques to the received behavior vector information to identify malicious configurations and pathway configurations that may lead to identified malicious configurations. The network server (116) may inform mobile computing devices (102) of identified malicious configurations and the corresponding pathway configurations, thereby enabling mobile computing devices (102) to anticipate and prevent malicious behavior from beginning by recognizing when they have entered a pathway configuration leading to malicious behavior.

Patent Agency Ranking