The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Feb. 07, 2017

Filed:

Mar. 24, 2015
Applicant:

Emc Corporation, Hopkinton, MA (US);

Inventors:

Uri Fleyder, Giv'at Shmuel, IL;

Rotem Kerner, Tel Aviv, IL;

Zeev Rabinovich, Tel Aviv, IL;

Rotem Salinas, Netanya, IL;

Lior Ben-Porat, Petah Tikva, IL;

Daniel Frank, Giv'at Shmuel, IL;

Assignee:

EMC IP Holding Company LLC, Hopkinton, MA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 21/00 (2013.01); G06F 11/34 (2006.01); H04L 29/06 (2006.01); H04L 29/08 (2006.01); G06Q 30/02 (2012.01); H04L 12/26 (2006.01); G06F 21/55 (2013.01); G06F 21/31 (2013.01); G06Q 30/00 (2012.01); H04L 9/32 (2006.01);
U.S. Cl.
CPC ...
H04L 63/1441 (2013.01); G06F 11/3485 (2013.01); G06F 21/316 (2013.01); G06F 21/552 (2013.01); G06Q 30/0248 (2013.01); H04L 12/2618 (2013.01); H04L 29/08675 (2013.01); H04L 67/10 (2013.01); H04L 67/22 (2013.01);
Abstract

A technique for detecting fraudulent activity in a compromised device involves downloading a software application from a processor that controls access to a resource to an electronic device requesting access to the resource. The software application includes instructions that gather selected information from the electronic device such as mouse coordinates and active windows at a selected time and transmitting the information to the processor for analysis. The analysis includes determining whether more than a single input operation is occurring simultaneously. Simultaneous input operations are an improbable combination of processes for a single electronic device, and suggest a potential fraudulent activity. The technique may include sending a message to a security location for further analysis of the potential fraudulent activity, or the user may be contacted while the transaction attempt is delayed, or the attempted transaction operation may be terminated until enhanced security procedures are implemented.


Find Patent Forward Citations

Loading…