The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Aug. 02, 2022

Filed:

Aug. 27, 2019
Applicant:

Box, Inc., Redwood City, CA (US);

Inventors:

Alok Ojha, Newark, CA (US);

David Vengerov, San Jose, CA (US);

Benjamin Draffin, Redwood City, CA (US);

Sesh Jalagam, Union City, CA (US);

Assignee:
Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); G06F 21/62 (2013.01); G06F 16/11 (2019.01); G06F 21/53 (2013.01); H04L 9/40 (2022.01); H04L 67/06 (2022.01); H04L 67/55 (2022.01); G06N 20/00 (2019.01); G06N 5/04 (2006.01); G06F 21/57 (2013.01);
U.S. Cl.
CPC ...
G06F 21/6218 (2013.01); G06F 16/11 (2019.01); G06F 21/53 (2013.01); G06F 21/577 (2013.01); G06F 21/6227 (2013.01); G06N 5/04 (2013.01); G06N 20/00 (2019.01); H04L 63/102 (2013.01); H04L 63/105 (2013.01); H04L 63/107 (2013.01); H04L 63/1416 (2013.01); H04L 63/1466 (2013.01); H04L 67/06 (2013.01); H04L 67/26 (2013.01); G06F 2221/034 (2013.01);
Abstract

Methods, systems and computer program products for computing system security. Techniques for classifying a potentially unauthorized user as an authorized user involve comparisons of two or more access request times that occur at different computing devices in different geographical locations. Based on those comparisons and the distance between the geographical locations of the different computing devices, a determination is made as to whether or not travel (e.g., via overland travel, via air travel, etc.) between those different geographical locations can be reasonably accomplished within a given time period. If it is determined that the required time for travel between the different geographical locations is greater than the time between the access request times—thus suggesting a spoofing attack or other malfeasance—then the potentially unauthorized (i.e., only potentially malfeasant) access can still be deemed as an authorizable access request by analyzing browser configurations and activity patterns of the potentially unauthorized user.


Find Patent Forward Citations

Loading…