The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jun. 27, 2023

Filed:

Oct. 28, 2020
Applicant:

AO Kaspersky Lab, Moscow, RU;

Inventor:

Sergey N. Ivanov, Moscow, RU;

Assignee:

AO Kaspersky Lab, Moscow, RU;

Attorneys:
Primary Examiner:
Int. Cl.
CPC ...
G06Q 30/00 (2023.01); G06Q 30/018 (2023.01); G06Q 30/0204 (2023.01); G06Q 40/02 (2023.01); H04L 9/40 (2022.01); H04L 67/50 (2022.01); G06Q 20/10 (2012.01); H04L 67/10 (2022.01);
U.S. Cl.
CPC ...
G06Q 30/0185 (2013.01); G06Q 30/0204 (2013.01); G06Q 40/02 (2013.01); H04L 63/1416 (2013.01); H04L 63/1425 (2013.01); H04L 63/1466 (2013.01); H04L 67/535 (2022.05); G06Q 20/108 (2013.01); H04L 67/10 (2013.01);
Abstract

An example of a method for detecting hacking activities includes identifying one or more attributes of each interaction in a sequence of interactions between one or more users and bank services during a predetermined time period. The one or more users are categorized into a plurality of groups based on the identified attributes. Each of the plurality of groups includes users performing the sequence of interactions with the bank services during the predetermined time period. A degree of anomaly is calculated for each of the plurality of groups based on a total number of users associated with a corresponding sequence of interactions and based on a number of users associated with the corresponding sequence of interactions during the predetermined time period. The calculated degree of anomaly is compared with a predetermined threshold. Hacking activity is identified, in response to determining that the calculated degree of anomaly exceeds the predetermined threshold.


Find Patent Forward Citations

Loading…