SYSTEM AND METHOD PROVIDING DATA-DRIVEN USER AUTHENTICATION MISUSE DETECTION

    公开(公告)号:US20180069896A1

    公开(公告)日:2018-03-08

    申请号:US15258135

    申请日:2016-09-07

    Abstract: Systems, methods, and other embodiments are disclosed for data-driven user authentication misuse detection. In one embodiment, for each of multiple authentication attempts to a computing device by a user via user authentication log messages: user authentication log data having user attribute values is collected; the user authentication log data is transformed into a tracer data structure having the user attribute values organized in a common format; the tracer data structure is augmented with timestamp data to generate an event data structure, where the timestamp data represents a time at which the user authentication log data is observed by the computing device; a user behavior model filter, representing account usage patterns of the user, is updated based at least in part on the event data structure. A malicious authentication attempt to the computing device by a malicious user is detected based on, at least in part, the user behavior model filter.

    EVICTION OF WEAKLY CORRELATED SIGNALS FROM COLLECTIONS

    公开(公告)号:US20230327789A1

    公开(公告)日:2023-10-12

    申请号:US17715449

    申请日:2022-04-07

    CPC classification number: H04B17/3912

    Abstract: Systems, methods, and other embodiments associated with eviction of weakly correlated signals from collections are described. In one embodiment, a mock signal that has random signal properties is generated. A mock correlation coefficient between the mock signal and a measured time series signal from a collection of measured time series signals is then generated. A discrimination value that indicates a weak signal correlation is then selected, based at least in part on the mock correlation coefficient. A first measured signal is then identified from the collection of measured time series signals that has the weak signal correlation by determining that a first correlation coefficient between the first measured signal and a second measured signal is weak based on the discrimination value. The first measured signal is then evicted from the collection of signals in response to the determination that the first measured signal has the weak signal correlation.

    RAPID SORTING-BASED SUPPLY ASSIGNMENT TOOL FOR ORDER FULFILLMENT WITH SHORT SUPPLY

    公开(公告)号:US20210182755A1

    公开(公告)日:2021-06-17

    申请号:US16879219

    申请日:2020-05-20

    Abstract: Systems, methods, and other embodiments for sorting-based assignment to optimize order fulfillment with short supply. One embodiment includes identifying a set of one or more distributions within a series of days. Sorting all demands of a first priority level occurring in the series of days by ascending order of size of the demand. For each demand of the first priority level in sorted order, (a) selecting an initial distribution during which the demand is scheduled to be fulfilled from the set of distributions, and (b) generating an indication that the demand can cannot be completely fulfilled, based on the size of the demand and the amount of supply available. Automatically arranging a graphical representation of a schedule of supplies and met and unmet demands for the series of days in a graphical user interface based at least on the indications generated for each demand.

    SYSTEM AND METHOD FOR PROVIDING DATA-DRIVEN USER AUTHENTICATION MISUSE DETECTION

    公开(公告)号:US20190109875A1

    公开(公告)日:2019-04-11

    申请号:US16211819

    申请日:2018-12-06

    Abstract: Systems, methods, and other embodiments are disclosed for data-driven user authentication misuse detection. In one embodiment, for a user authentication attempt to access a secure computer resource, user authentication log data having user attribute values is collected. The user authentication log data is transformed into a tracer data structure. The tracer data structure is augmented with timestamp data to generate an event data structure. It is determined whether the tracer data structure matches an existing tracer data structure stored in a rules database and, if not, a novelty flag is set to generate a new user behavior model filter. If the tracer data structure matches the existing tracer data structure: an existing user behavior model filter is applied, issuance of an alarm message or signal is controlled, and the existing user behavior model filter is updated based, at least in part, on the event data structure.

Patent Agency Ranking