Peer-based, angular distance detection of anomalous rights

    公开(公告)号:US12124559B1

    公开(公告)日:2024-10-22

    申请号:US17357306

    申请日:2021-06-24

    Abstract: Devices and techniques are generally described for peer-based anomalous rights detection. In various examples, a rights vector may be determined for a first individual, the rights vector representing rights held by the first individual. A nearest neighbor algorithm may be used to determine a set of individuals having similar rights to the first individual. In various examples, a category label associated with the first individual may be determined. In some examples, a number of individuals of the set of individuals having the category label may be determined. In some examples, a determination may be made that the rights held by the first individual are anomalous based at least in part on the number. In some cases, alert data indicating that the rights held by the first individual are anomalous may be generated.

    Peer-based inference of unused identity and access management rights

    公开(公告)号:US12149549B1

    公开(公告)日:2024-11-19

    申请号:US17527808

    申请日:2021-11-16

    Abstract: Devices and techniques are generally described for unused identity and access management rights detection. In various examples, a first skill-usage vector associated with a first profile may be determined. A first nearest neighbor algorithm and the first skill-usage vector may be used to determine a second skill-usage vector grouped together with the first skill-usage vector in a feature space, where the second skill-usage vector is associated with a second profile. A first rights vector associated with the first profile may be determined. The first rights vector associated with the first profile may be compared to a second rights vector associated with the second profile. At least one unused right associated with the first profile may be determined based at least in part on the comparing of the first rights vector to the second rights vector.

    Detection of anomalous computer-implemented service activity

    公开(公告)号:US12047408B1

    公开(公告)日:2024-07-23

    申请号:US17745441

    申请日:2022-05-16

    Abstract: Devices and techniques are generally described for anomalous network activity detection. In various examples, first application log data comprising a plurality of computer log actions may be received. A hidden Markov model associated may generate a first hidden state vector, where a first value of the first hidden state vector is associated with anomalous activity. A first timing vector associated with a first account may be determined, wherein the timing vector indicates first time periods of typical activity and second periods of typical inactivity for the first account. A first number of elements of the first hidden state vector that have the first value and which correspond to the second time periods of the first timing vector may be determined. Network access may be disabled for the first account.

    Click-to-call fraud detection
    6.
    发明授权

    公开(公告)号:US11463475B1

    公开(公告)日:2022-10-04

    申请号:US17211299

    申请日:2021-03-24

    Abstract: Devices and techniques are generally described for fraud detection. In various examples, first data may be received from a remote computing device, the first data specifying at least one of a first internet protocol (IP) address or a first telephone number by a fraud detection service using an application programming interface (API) of the fraud detection service. In some examples, a first machine learning model of the fraud detection service may determine a first confidence score indicating a likelihood that at least one of the first telephone number or the first IP address is associated with fraudulent activity. In some examples, output data may be sent to the first remote computing device via the API, the output data indicating a determination as to whether at least one of the first IP address or the first telephone number is associated with fraudulent activity.

Patent Agency Ranking