The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Aug. 05, 2025

Filed:

Apr. 22, 2021
Applicant:

Microsoft Technology Licensing, Llc, Redmond, WA (US);

Inventors:

Christopher Michael Jeffords, Bothell, WA (US);

Srikanth Bolisetty, Redmond, WA (US);

Ayala Miller, Bellevue, WA (US);

Pavan Gopal Bandla, Duvall, WA (US);

Ramin Leonard Halviatti, Kirkland, WA (US);

Lilei Cui, Sammamish, WA (US);

James Matthew Atkins, Redmond, WA (US);

Jessica Michelle Satnick, Seattle, WA (US);

Ravi Kumar Lingamallu, Redmond, WA (US);

Ahmed Awad-Idris, Sammamish, WA (US);

Amritaputra Bhattacharya, Bellevue, WA (US);

Sunil Pai, Yarrow Point, WA (US);

Kaymie Sato-Hayashi-Kagawa Shiozawa, Cambridge, MA (US);

Noah Bergman, Walnut Creek, CA (US);

Assignee:
Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 9/40 (2022.01); G06N 5/04 (2023.01); G06N 20/00 (2019.01);
U.S. Cl.
CPC ...
H04L 63/10 (2013.01); G06N 5/04 (2013.01); G06N 20/00 (2019.01); H04L 63/1425 (2013.01);
Abstract

Access to secured items in a computing system is requested instead of being persistent. Access requests may be granted on a just-in-time basis. Anomalous access requests are detected using machine learning models based on historic patterns. Models utilizing conditional probability or collaborative filtering also facilitate the creation of human-understandable explanations of threat assessments. Individual machine learning models are based on historic data of users, peers, cohorts, services, or resources. Models may be weighted, and then aggregated in a subsystem to produce an access request risk score. Scoring principles and conditions utilized in the scoring subsystem may include probabilities, distribution entropies, and data item counts. A feedback loop allows incremental refinement of the subsystem. Anomalous requests that would be automatically approved under a policy may instead face human review, and low threat requests that would have been delayed by human review may instead be approved automatically.


Find Patent Forward Citations

Loading…