US20040221171A1 - Intrusion detector based on mouse dynamics analysis - Google Patents
Intrusion detector based on mouse dynamics analysis Download PDFInfo
- Publication number
- US20040221171A1 US20040221171A1 US10/427,810 US42781003A US2004221171A1 US 20040221171 A1 US20040221171 A1 US 20040221171A1 US 42781003 A US42781003 A US 42781003A US 2004221171 A1 US2004221171 A1 US 2004221171A1
- Authority
- US
- United States
- Prior art keywords
- mouse
- mouse dynamics
- signature
- dynamics
- movement
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000012544 monitoring process Methods 0.000 claims description 3
- 230000006399 behavior Effects 0.000 abstract description 5
- 238000001514 detection method Methods 0.000 abstract description 5
- 238000013528 artificial neural network Methods 0.000 description 2
- 238000000034 method Methods 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
Definitions
- Biometric based detectors are considered of the most fast and accurate detectors, in this patent we introduce a new biometric detector, mouse dynamics detector.
- the detector functionality is to observe the user behavior, acquire input data, and analyze it in order to produce a list of factors characterizing the user behavior.
- FIG. 1 illustrates the generation of a mouse dynamics signature.
- FIG. 2 a shows a comparison of two mouse dynamics signatures for the same user.
- FIG. 2 b shows a comparison of mouse dynamics signatures for two different users.
- mouse actions are recorded and processed on a real time basis, movement characteristics being analyzed to produce a set of factors characterizing the behavior, the aim of the research work in this area is to produce what is called a mouse dynamics signature for each registered user.
- This signature is constructed from a set of factors describing the user behavior, using this signature the system will be able to detect if unauthorized user is using the system.
- Mouse input actions can be classified as follows:
- the analysis can be divided into two categories, movement analysis, and silence analysis; different approaches are used in each category to collect the factors characterizing it.
- Factors collected from the above mentioned analysis are passed to a detection unit which uses neural networks to compare the collected input data against a pre analyzed heuristic information, produce what we call ‘suspicious ratio’, and apply a decision making algorithm to propose the proper action.
- mouse dynamics signature is the traveled distance/movement speed curve (FIG. 1), a neural network is used to model this curve, the network is trained with the collected raw data, mouse dynamics signature is a curve generated from the output (movement speed) of the trained network against an input presenting the full spectrum of the traveled distances.
- a learning/tuning algorithm is used to improve the efficiency of the system for a reliable and accurate detection, and decrease the false acceptance/rejection ratios.
- FIG. 2 shows an example of the comparison process for two different cases
- FIG. 2 a shows a recorded mouse dynamics signature compared to reference signature of the same user
- FIG. 2 b shows a recorded mouse dynamics signature of an intruder compared to reference signature of the logged in user.
- Intrusion is detected if the difference between the curves is over a pre calculated threshold limit.
Abstract
A biometric intrusion detection system based on mouse dynamics analysis, the analysis of mouse dynamics for a specific user generates a number of factors (Mouse Dynamics Signature) which can be used to ensure the identity of the user, an intelligent detection technique is developed to recognize differences in behaviors and detect intrusion.
Description
- The main focus of this research is the development of an intelligent intrusion detection system that utilizes user biometric information in the identification and verification processes.
- Biometric based detectors are considered of the most fast and accurate detectors, in this patent we introduce a new biometric detector, mouse dynamics detector. The detector functionality is to observe the user behavior, acquire input data, and analyze it in order to produce a list of factors characterizing the user behavior.
- By monitoring mouse dynamics information, and analyzing the characteristics of this input over different sessions it is possible to calculate a user identification signature that can be used to ensure the user identity and detect any possible intrusion or misuse of the system.
- FIG. 1 illustrates the generation of a mouse dynamics signature.
- FIG. 2a shows a comparison of two mouse dynamics signatures for the same user.
- FIG. 2b shows a comparison of mouse dynamics signatures for two different users.
- 1. Mouse Movement Analysis
- In this detector mouse actions are recorded and processed on a real time basis, movement characteristics being analyzed to produce a set of factors characterizing the behavior, the aim of the research work in this area is to produce what is called a mouse dynamics signature for each registered user.
- This signature is constructed from a set of factors describing the user behavior, using this signature the system will be able to detect if unauthorized user is using the system.
- 2. Classification of Actions
- Mouse input actions can be classified as follows:
- Movement (General Movement)
- Drag and Drop (the action starts with mouse button down, movement, then mouse button up)
- Point & Click (mouse movement followed by a click or double click)
- Silence (No Movement)
- From the above mentioned classification, the analysis can be divided into two categories, movement analysis, and silence analysis; different approaches are used in each category to collect the factors characterizing it.
- Following are some examples on the type of factors collected from each analysis.
- Movement Analysis Examples:
- Calculating the average speed compared to the traveled distance, this produces three graphs for the 3 types of movement actions
- Calculating average speed compared to the movement direction, 8 different directions are considered
- Calculating the average traveled distance for a specific period of time, with regards to different movement directions; from this data we can build a pattern for the use of different directions.
- Silence Analysis Examples:
- Calculating the average of silence periods between movements
- Calculating amount of silence in a period of time
- Comparing the percentage of the silence time to movement time in a period of time
- Determining weights for different movement directions to answer the following questions:
- What is the major movement direction to start movement after a silence period
- What is the major movement direction to end with before a silence period
- Factors collected from the above mentioned analysis are passed to a detection unit which uses neural networks to compare the collected input data against a pre analyzed heuristic information, produce what we call ‘suspicious ratio’, and apply a decision making algorithm to propose the proper action.
- An example of the mouse dynamics signature is the traveled distance/movement speed curve (FIG. 1), a neural network is used to model this curve, the network is trained with the collected raw data, mouse dynamics signature is a curve generated from the output (movement speed) of the trained network against an input presenting the full spectrum of the traveled distances.
- A learning/tuning algorithm is used to improve the efficiency of the system for a reliable and accurate detection, and decrease the false acceptance/rejection ratios.
- FIG. 2 shows an example of the comparison process for two different cases, FIG. 2a shows a recorded mouse dynamics signature compared to reference signature of the same user, and FIG. 2b shows a recorded mouse dynamics signature of an intruder compared to reference signature of the logged in user.
- Intrusion is detected if the difference between the curves is over a pre calculated threshold limit.
Claims (2)
1. By monitoring and analyzing mouse dynamics for a specific user over a period of time it is possible to produce what is called a ‘Mouse Dynamics Signature’, Mouse Dynamics Signature is a set of curves describing the monitored behavior and characterizing the mouse dynamics of the user over that period of time.
2. By continuously monitoring mouse dynamics on an active workstation, and comparing the calculated mouse dynamics signature over a period of time to the stored mouse signature of the user who is logged in to the workstation it is possible to detect intrusion.
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/427,810 US20040221171A1 (en) | 2003-05-02 | 2003-05-02 | Intrusion detector based on mouse dynamics analysis |
CA2535542A CA2535542C (en) | 2003-05-02 | 2004-05-03 | System and method for determining a computer user profile from a motion-based input device |
US10/555,408 US8230232B2 (en) | 2003-05-02 | 2004-05-03 | System and method for determining a computer user profile from a motion-based input device |
PCT/CA2004/000669 WO2004097601A1 (en) | 2003-05-02 | 2004-05-03 | System and method for determining a computer user profile from a motion-based input device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/427,810 US20040221171A1 (en) | 2003-05-02 | 2003-05-02 | Intrusion detector based on mouse dynamics analysis |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/555,408 Continuation-In-Part US8230232B2 (en) | 2003-05-02 | 2004-05-03 | System and method for determining a computer user profile from a motion-based input device |
US10555408 Continuation-In-Part | 2004-05-03 |
Publications (1)
Publication Number | Publication Date |
---|---|
US20040221171A1 true US20040221171A1 (en) | 2004-11-04 |
Family
ID=33310267
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/427,810 Abandoned US20040221171A1 (en) | 2003-05-02 | 2003-05-02 | Intrusion detector based on mouse dynamics analysis |
US10/555,408 Active 2025-02-16 US8230232B2 (en) | 2003-05-02 | 2004-05-03 | System and method for determining a computer user profile from a motion-based input device |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/555,408 Active 2025-02-16 US8230232B2 (en) | 2003-05-02 | 2004-05-03 | System and method for determining a computer user profile from a motion-based input device |
Country Status (3)
Country | Link |
---|---|
US (2) | US20040221171A1 (en) |
CA (1) | CA2535542C (en) |
WO (1) | WO2004097601A1 (en) |
Cited By (44)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050008148A1 (en) * | 2003-04-02 | 2005-01-13 | Dov Jacobson | Mouse performance identification |
US20060023709A1 (en) * | 2004-08-02 | 2006-02-02 | Hall Michael L | Inline intrusion detection using a single physical port |
US20060161983A1 (en) * | 2005-01-20 | 2006-07-20 | Cothrell Scott A | Inline intrusion detection |
US20060224898A1 (en) * | 2003-05-02 | 2006-10-05 | Ahmed Ahmed E | System and method for determining a computer user profile from a motion-based input device |
EP2069993A2 (en) * | 2006-10-04 | 2009-06-17 | Behaviometrics AB | Security system and method for detecting intrusion in a computerized system |
US7562389B1 (en) | 2004-07-30 | 2009-07-14 | Cisco Technology, Inc. | Method and system for network security |
EP2382736A2 (en) * | 2009-01-23 | 2011-11-02 | Microsoft Corporation | Passive security enforcement |
US8209758B1 (en) | 2011-12-21 | 2012-06-26 | Kaspersky Lab Zao | System and method for classifying users of antivirus software based on their level of expertise in the field of computer security |
US8214905B1 (en) | 2011-12-21 | 2012-07-03 | Kaspersky Lab Zao | System and method for dynamically allocating computing resources for processing security information |
US8214904B1 (en) | 2011-12-21 | 2012-07-03 | Kaspersky Lab Zao | System and method for detecting computer security threats based on verdicts of computer users |
EP2584488A1 (en) | 2011-09-20 | 2013-04-24 | Kaspersky Lab Zao | System and method for detecting computer security threats based on verdicts of computer users |
CN104252595A (en) * | 2013-06-28 | 2014-12-31 | 贝壳网际(北京)安全技术有限公司 | Application program analysis method and device and client |
US20150178374A1 (en) * | 2013-12-23 | 2015-06-25 | Trusteer Ltd. | Method and system of providing user profile detection from an input device |
CN108460269A (en) * | 2018-03-21 | 2018-08-28 | 广州多益网络股份有限公司 | Verification method and device, verification terminal device |
US10262324B2 (en) | 2010-11-29 | 2019-04-16 | Biocatch Ltd. | System, device, and method of differentiating among users based on user-specific page navigation sequence |
US10298614B2 (en) * | 2010-11-29 | 2019-05-21 | Biocatch Ltd. | System, device, and method of generating and managing behavioral biometric cookies |
US10333917B2 (en) | 2017-01-04 | 2019-06-25 | International Business Machines Corporation | Controlling access to electronic resources based on a user's sociometric identification document |
US10397262B2 (en) | 2017-07-20 | 2019-08-27 | Biocatch Ltd. | Device, system, and method of detecting overlay malware |
US10404729B2 (en) | 2010-11-29 | 2019-09-03 | Biocatch Ltd. | Device, method, and system of generating fraud-alerts for cyber-attacks |
US10474815B2 (en) | 2010-11-29 | 2019-11-12 | Biocatch Ltd. | System, device, and method of detecting malicious automatic script and code injection |
US10476873B2 (en) * | 2010-11-29 | 2019-11-12 | Biocatch Ltd. | Device, system, and method of password-less user authentication and password-less detection of user identity |
US10523680B2 (en) * | 2015-07-09 | 2019-12-31 | Biocatch Ltd. | System, device, and method for detecting a proxy server |
US10579784B2 (en) | 2016-11-02 | 2020-03-03 | Biocatch Ltd. | System, device, and method of secure utilization of fingerprints for user authentication |
US10586036B2 (en) | 2010-11-29 | 2020-03-10 | Biocatch Ltd. | System, device, and method of recovery and resetting of user authentication factor |
US10621585B2 (en) | 2010-11-29 | 2020-04-14 | Biocatch Ltd. | Contextual mapping of web-pages, and generation of fraud-relatedness score-values |
US10685355B2 (en) | 2016-12-04 | 2020-06-16 | Biocatch Ltd. | Method, device, and system of detecting mule accounts and accounts used for money laundering |
US10719765B2 (en) | 2015-06-25 | 2020-07-21 | Biocatch Ltd. | Conditional behavioral biometrics |
US10728761B2 (en) | 2010-11-29 | 2020-07-28 | Biocatch Ltd. | Method, device, and system of detecting a lie of a user who inputs data |
US10747305B2 (en) | 2010-11-29 | 2020-08-18 | Biocatch Ltd. | Method, system, and device of authenticating identity of a user of an electronic device |
US20200279266A1 (en) * | 2019-03-01 | 2020-09-03 | Mastercard Technologies Canada ULC | Multi-page online application origination (oao) service for fraud prevention systems |
US10776476B2 (en) | 2010-11-29 | 2020-09-15 | Biocatch Ltd. | System, device, and method of visual login |
US10834590B2 (en) | 2010-11-29 | 2020-11-10 | Biocatch Ltd. | Method, device, and system of differentiating between a cyber-attacker and a legitimate user |
US10897482B2 (en) | 2010-11-29 | 2021-01-19 | Biocatch Ltd. | Method, device, and system of back-coloring, forward-coloring, and fraud detection |
US10917431B2 (en) | 2010-11-29 | 2021-02-09 | Biocatch Ltd. | System, method, and device of authenticating a user based on selfie image or selfie video |
US10949514B2 (en) | 2010-11-29 | 2021-03-16 | Biocatch Ltd. | Device, system, and method of differentiating among users based on detection of hardware components |
US10949757B2 (en) | 2010-11-29 | 2021-03-16 | Biocatch Ltd. | System, device, and method of detecting user identity based on motor-control loop model |
US10970394B2 (en) | 2017-11-21 | 2021-04-06 | Biocatch Ltd. | System, device, and method of detecting vishing attacks |
US11055395B2 (en) | 2016-07-08 | 2021-07-06 | Biocatch Ltd. | Step-up authentication |
US20210329030A1 (en) * | 2010-11-29 | 2021-10-21 | Biocatch Ltd. | Device, System, and Method of Detecting Vishing Attacks |
US11210674B2 (en) | 2010-11-29 | 2021-12-28 | Biocatch Ltd. | Method, device, and system of detecting mule accounts and accounts used for money laundering |
US11223619B2 (en) * | 2010-11-29 | 2022-01-11 | Biocatch Ltd. | Device, system, and method of user authentication based on user-specific characteristics of task performance |
US11269977B2 (en) | 2010-11-29 | 2022-03-08 | Biocatch Ltd. | System, apparatus, and method of collecting and processing data in electronic devices |
US11606353B2 (en) | 2021-07-22 | 2023-03-14 | Biocatch Ltd. | System, device, and method of generating and utilizing one-time passwords |
US11928683B2 (en) | 2019-10-01 | 2024-03-12 | Mastercard Technologies Canada ULC | Feature encoding in online application origination (OAO) service for a fraud prevention system |
Families Citing this family (147)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9412123B2 (en) | 2003-07-01 | 2016-08-09 | The 41St Parameter, Inc. | Keystroke analysis |
JP4556103B2 (en) * | 2004-02-24 | 2010-10-06 | ソニー株式会社 | Encryption apparatus and encryption method |
US10999298B2 (en) | 2004-03-02 | 2021-05-04 | The 41St Parameter, Inc. | Method and system for identifying users and detecting fraud by use of the internet |
US20060136731A1 (en) * | 2004-12-21 | 2006-06-22 | Signaturelink, Inc. | System and method for providing an online electronic signature |
US8588483B2 (en) * | 2004-12-21 | 2013-11-19 | Signaturelink, Inc. | System and method for providing a real-time, online biometric signature |
US8438264B2 (en) * | 2004-12-28 | 2013-05-07 | At&T Intellectual Property I, L.P. | Method and apparatus for collecting, analyzing, and presenting data in a communication network |
US9323922B2 (en) * | 2005-01-06 | 2016-04-26 | Oracle International Corporation | Dynamically differentiating service in a database based on a security profile of a user |
US10127130B2 (en) | 2005-03-18 | 2018-11-13 | Salesforce.Com | Identifying contributors that explain differences between a data set and a subset of the data set |
US9129226B2 (en) * | 2011-12-04 | 2015-09-08 | Beyondcore, Inc. | Analyzing data sets with the help of inexpert humans to find patterns |
US11301585B2 (en) | 2005-12-16 | 2022-04-12 | The 41St Parameter, Inc. | Methods and apparatus for securely displaying digital images |
US8938671B2 (en) | 2005-12-16 | 2015-01-20 | The 41St Parameter, Inc. | Methods and apparatus for securely displaying digital images |
US8151327B2 (en) | 2006-03-31 | 2012-04-03 | The 41St Parameter, Inc. | Systems and methods for detection of session tampering and fraud prevention |
US20070255818A1 (en) * | 2006-04-29 | 2007-11-01 | Kolnos Systems, Inc. | Method of detecting unauthorized access to a system or an electronic device |
US20070261109A1 (en) * | 2006-05-04 | 2007-11-08 | Martin Renaud | Authentication system, such as an authentication system for children and teenagers |
US20070271466A1 (en) * | 2006-05-18 | 2007-11-22 | Genevieve Mak | Security or authentication system and method using manual input measurements, such as via user manipulation of a computer mouse |
US8051468B2 (en) * | 2006-06-14 | 2011-11-01 | Identity Metrics Llc | User authentication system |
US7818290B2 (en) | 2006-06-14 | 2010-10-19 | Identity Metrics, Inc. | System to associate a demographic to a user of an electronic system |
WO2008008473A2 (en) * | 2006-07-11 | 2008-01-17 | Agent Science Technologies, Inc. | Behaviormetrics application system for electronic transaction authorization |
US8452978B2 (en) * | 2006-09-15 | 2013-05-28 | Identity Metrics, LLC | System and method for user authentication and dynamic usability of touch-screen devices |
US8843754B2 (en) * | 2006-09-15 | 2014-09-23 | Identity Metrics, Inc. | Continuous user identification and situation analysis with identification of anonymous users through behaviormetrics |
US9026638B2 (en) * | 2007-02-05 | 2015-05-05 | Novell, Inc. | Stealth entropy collection |
KR101452704B1 (en) * | 2007-02-14 | 2014-10-23 | 삼성전자주식회사 | Method for setting up and authenticating password for a portable device having a plurality of buttons |
US20090043812A1 (en) * | 2007-08-06 | 2009-02-12 | The Boeing Company | Information assessment associate for checkpoint operations |
US8176159B2 (en) * | 2007-08-16 | 2012-05-08 | Avaya Inc. | Habit-based authentication |
EP2291725A4 (en) * | 2008-04-22 | 2012-01-25 | 41St Parameter Inc | Systems and methods for security management based on cursor events |
JP5121681B2 (en) * | 2008-04-30 | 2013-01-16 | 株式会社日立製作所 | Biometric authentication system, authentication client terminal, and biometric authentication method |
US9112850B1 (en) | 2009-03-25 | 2015-08-18 | The 41St Parameter, Inc. | Systems and methods of sharing information through a tag-based consortium |
US8204833B2 (en) * | 2009-05-27 | 2012-06-19 | Softroute Corporation | Method for fingerprinting and identifying internet users |
US8296425B2 (en) * | 2009-12-14 | 2012-10-23 | Electronics And Telecommunications Research Institute | Method and system for lawful interception of internet service |
WO2012054646A2 (en) | 2010-10-19 | 2012-04-26 | The 41St Parameter, Inc. | Variable risk engine |
US10083439B2 (en) | 2010-11-29 | 2018-09-25 | Biocatch Ltd. | Device, system, and method of differentiating over multiple accounts between legitimate user and cyber-attacker |
US9477826B2 (en) * | 2010-11-29 | 2016-10-25 | Biocatch Ltd. | Device, system, and method of detecting multiple users accessing the same account |
US10069852B2 (en) | 2010-11-29 | 2018-09-04 | Biocatch Ltd. | Detection of computerized bots and automated cyber-attack modules |
US10055560B2 (en) | 2010-11-29 | 2018-08-21 | Biocatch Ltd. | Device, method, and system of detecting multiple users accessing the same account |
US9450971B2 (en) * | 2010-11-29 | 2016-09-20 | Biocatch Ltd. | Device, system, and method of visual login and stochastic cryptography |
US9483292B2 (en) * | 2010-11-29 | 2016-11-01 | Biocatch Ltd. | Method, device, and system of differentiating between virtual machine and non-virtualized device |
US10032010B2 (en) * | 2010-11-29 | 2018-07-24 | Biocatch Ltd. | System, device, and method of visual login and stochastic cryptography |
US9838373B2 (en) * | 2010-11-29 | 2017-12-05 | Biocatch Ltd. | System, device, and method of detecting a remote access user |
US10395018B2 (en) | 2010-11-29 | 2019-08-27 | Biocatch Ltd. | System, method, and device of detecting identity of a user and authenticating a user |
US10037421B2 (en) | 2010-11-29 | 2018-07-31 | Biocatch Ltd. | Device, system, and method of three-dimensional spatial user authentication |
US9531733B2 (en) | 2010-11-29 | 2016-12-27 | Biocatch Ltd. | Device, system, and method of detecting a remote access user |
US9621567B2 (en) * | 2010-11-29 | 2017-04-11 | Biocatch Ltd. | Device, system, and method of detecting hardware components |
US10164985B2 (en) * | 2010-11-29 | 2018-12-25 | Biocatch Ltd. | Device, system, and method of recovery and resetting of user authentication factor |
WO2013006071A1 (en) | 2011-07-07 | 2013-01-10 | Critical Software, S.A. | System and method for intrusion detection through keystroke dynamics |
US8869241B2 (en) | 2011-09-24 | 2014-10-21 | Elwha Llc | Network acquired behavioral fingerprint for authentication |
US9348985B2 (en) | 2011-11-23 | 2016-05-24 | Elwha Llc | Behavioral fingerprint controlled automatic task determination |
US9729549B2 (en) | 2011-09-24 | 2017-08-08 | Elwha Llc | Behavioral fingerprinting with adaptive development |
US9621404B2 (en) | 2011-09-24 | 2017-04-11 | Elwha Llc | Behavioral fingerprinting with social networking |
US9015860B2 (en) | 2011-09-24 | 2015-04-21 | Elwha Llc | Behavioral fingerprinting via derived personal relation |
US8688980B2 (en) | 2011-09-24 | 2014-04-01 | Elwha Llc | Trust verification schema based transaction authorization |
US8555077B2 (en) | 2011-11-23 | 2013-10-08 | Elwha Llc | Determining device identity using a behavioral fingerprint |
US9825967B2 (en) | 2011-09-24 | 2017-11-21 | Elwha Llc | Behavioral fingerprinting via social networking interaction |
US9298900B2 (en) | 2011-09-24 | 2016-03-29 | Elwha Llc | Behavioral fingerprinting via inferred personal relation |
US9083687B2 (en) | 2011-09-24 | 2015-07-14 | Elwha Llc | Multi-device behavioral fingerprinting |
US8713704B2 (en) | 2011-09-24 | 2014-04-29 | Elwha Llc | Behavioral fingerprint based authentication |
US10754913B2 (en) | 2011-11-15 | 2020-08-25 | Tapad, Inc. | System and method for analyzing user device information |
US10796232B2 (en) | 2011-12-04 | 2020-10-06 | Salesforce.Com, Inc. | Explaining differences between predicted outcomes and actual outcomes of a process |
US10802687B2 (en) | 2011-12-04 | 2020-10-13 | Salesforce.Com, Inc. | Displaying differences between different data sets of a process |
US9633201B1 (en) | 2012-03-01 | 2017-04-25 | The 41St Parameter, Inc. | Methods and systems for fraud containment |
US9521551B2 (en) | 2012-03-22 | 2016-12-13 | The 41St Parameter, Inc. | Methods and systems for persistent cross-application mobile device identification |
US20150073987A1 (en) | 2012-04-17 | 2015-03-12 | Zighra Inc. | Fraud detection system, method, and device |
US9832189B2 (en) | 2012-06-29 | 2017-11-28 | Apple Inc. | Automatic association of authentication credentials with biometrics |
US9959539B2 (en) | 2012-06-29 | 2018-05-01 | Apple Inc. | Continual authorization for secured functions |
US9819676B2 (en) | 2012-06-29 | 2017-11-14 | Apple Inc. | Biometric capture for unauthorized user identification |
US10212158B2 (en) | 2012-06-29 | 2019-02-19 | Apple Inc. | Automatic association of authentication credentials with biometrics |
US9317810B2 (en) | 2012-07-26 | 2016-04-19 | The Boeing Company | Intelligence analysis |
EP2880619A1 (en) | 2012-08-02 | 2015-06-10 | The 41st Parameter, Inc. | Systems and methods for accessing records via derivative locators |
WO2014078569A1 (en) | 2012-11-14 | 2014-05-22 | The 41St Parameter, Inc. | Systems and methods of global identification |
WO2014205149A1 (en) * | 2013-06-19 | 2014-12-24 | Arizona Board Of Regents For The University Of Arizona | Automated detection method for insider threat |
US10694987B1 (en) | 2013-06-27 | 2020-06-30 | Neurametrix, Inc. | Neurological disorder determining and monitoring system and method |
EP3019991B1 (en) * | 2013-07-09 | 2019-02-20 | BioCatch Ltd. | Device, system, and method of differentiating among users of a computerized service |
US10902327B1 (en) | 2013-08-30 | 2021-01-26 | The 41St Parameter, Inc. | System and method for device identification and uniqueness |
US10331866B2 (en) | 2013-09-06 | 2019-06-25 | Apple Inc. | User verification for changing a setting of an electronic device |
US20150073998A1 (en) | 2013-09-09 | 2015-03-12 | Apple Inc. | Use of a Biometric Image in Online Commerce |
US9942396B2 (en) | 2013-11-01 | 2018-04-10 | Adobe Systems Incorporated | Document distribution and interaction |
US9444804B2 (en) | 2013-11-25 | 2016-09-13 | Roy S. Melzer | Dynamic security question generation |
US9817880B1 (en) * | 2013-12-03 | 2017-11-14 | Google Inc. | Social-aware resource allocation for large-scale distributed systems |
US9544149B2 (en) | 2013-12-16 | 2017-01-10 | Adobe Systems Incorporated | Automatic E-signatures in response to conditions and/or events |
CN103699822B (en) * | 2013-12-31 | 2016-11-02 | 同济大学 | User's anomaly detection method in ecommerce based on mouse behavior |
US9747428B2 (en) | 2014-01-30 | 2017-08-29 | Qualcomm Incorporated | Dynamic keyboard and touchscreen biometrics |
US20150220931A1 (en) | 2014-01-31 | 2015-08-06 | Apple Inc. | Use of a Biometric Image for Authorization |
WO2015116905A1 (en) | 2014-01-31 | 2015-08-06 | Arizona Board Of Regents For The University Of Arizona | Fraudulent application detection system and method of use |
WO2015191828A1 (en) * | 2014-06-11 | 2015-12-17 | Arizona Board Of Regents For The University Of Arizona | Adaptive web analytic response environment |
US9264419B1 (en) * | 2014-06-26 | 2016-02-16 | Amazon Technologies, Inc. | Two factor authentication with authentication objects |
US10694947B2 (en) | 2014-06-27 | 2020-06-30 | Neurametrix, Inc. | System and method for continuous monitoring of central nervous system diseases |
US10474849B2 (en) | 2014-06-27 | 2019-11-12 | Microsoft Technology Licensing, Llc | System for data protection in power off mode |
US10423766B2 (en) * | 2014-06-27 | 2019-09-24 | Microsoft Technology Licensing, Llc | Data protection system based on user input patterns on device |
US10372937B2 (en) | 2014-06-27 | 2019-08-06 | Microsoft Technology Licensing, Llc | Data protection based on user input during device boot-up, user login, and device shut-down states |
US9639445B2 (en) | 2014-10-09 | 2017-05-02 | Insightete Corporation | System and method for comprehensive performance and availability tracking using passive monitoring and intelligent synthetic activity generation for monitoring a system |
US10091312B1 (en) | 2014-10-14 | 2018-10-02 | The 41St Parameter, Inc. | Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups |
US9703982B2 (en) | 2014-11-06 | 2017-07-11 | Adobe Systems Incorporated | Document distribution and interaction |
US20160162900A1 (en) | 2014-12-09 | 2016-06-09 | Zighra Inc. | Fraud detection system, method, and device |
US10255358B2 (en) * | 2014-12-30 | 2019-04-09 | Facebook, Inc. | Systems and methods for clustering items associated with interactions |
US9935777B2 (en) | 2015-08-31 | 2018-04-03 | Adobe Systems Incorporated | Electronic signature framework with enhanced security |
US9860227B2 (en) | 2015-09-11 | 2018-01-02 | Google Llc | Identifying panelists based on input interaction patterns |
US9626653B2 (en) | 2015-09-21 | 2017-04-18 | Adobe Systems Incorporated | Document distribution and interaction with delegation of signature authority |
US11100201B2 (en) | 2015-10-21 | 2021-08-24 | Neurametrix, Inc. | Method and system for authenticating a user through typing cadence |
US11079856B2 (en) | 2015-10-21 | 2021-08-03 | Neurametrix, Inc. | System and method for authenticating a user through unique aspects of the user's keyboard |
RU2626337C1 (en) | 2016-02-18 | 2017-07-26 | Акционерное общество "Лаборатория Касперского" | Method of detecting fraudulent activity on user device |
US10097541B2 (en) * | 2016-05-04 | 2018-10-09 | Ca, Inc. | Computer security based on mouse device speed setting authentication |
US10347215B2 (en) | 2016-05-27 | 2019-07-09 | Adobe Inc. | Multi-device electronic signature framework |
RU2634211C1 (en) | 2016-07-06 | 2017-10-24 | Общество с ограниченной ответственностью "Траст" | Method and system of protocols analysis of harmful programs interaction with control centers and detection of computer attacks |
RU2649793C2 (en) * | 2016-08-03 | 2018-04-04 | ООО "Группа АйБи" | Method and system of detecting remote connection when working on web resource pages |
US11301550B2 (en) * | 2016-09-07 | 2022-04-12 | Cylance Inc. | Computer user authentication using machine learning |
RU2634209C1 (en) | 2016-09-19 | 2017-10-24 | Общество с ограниченной ответственностью "Группа АйБи ТДС" | System and method of autogeneration of decision rules for intrusion detection systems with feedback |
US10198122B2 (en) | 2016-09-30 | 2019-02-05 | Biocatch Ltd. | System, device, and method of estimating force applied to a touch surface |
RU2671991C2 (en) | 2016-12-29 | 2018-11-08 | Общество с ограниченной ответственностью "Траст" | System and method for collecting information for detecting phishing |
RU2637477C1 (en) | 2016-12-29 | 2017-12-04 | Общество с ограниченной ответственностью "Траст" | System and method for detecting phishing web pages |
US10579166B2 (en) * | 2017-04-05 | 2020-03-03 | Board Of Supervisors Of Louisiana State University And Agricultural And Mechanical College | Pointer acceleration system modeling |
US10503919B2 (en) | 2017-04-10 | 2019-12-10 | Adobe Inc. | Electronic signature framework with keystroke biometric authentication |
US11372956B2 (en) | 2017-04-17 | 2022-06-28 | Splunk Inc. | Multiple input neural networks for detecting fraud |
US11102225B2 (en) | 2017-04-17 | 2021-08-24 | Splunk Inc. | Detecting fraud by correlating user behavior biometrics with other data sources |
US11315010B2 (en) | 2017-04-17 | 2022-04-26 | Splunk Inc. | Neural networks for detecting fraud based on user behavior biometrics |
US10999297B2 (en) | 2017-05-15 | 2021-05-04 | Forcepoint, LLC | Using expected behavior of an entity when prepopulating an adaptive trust profile |
US10915644B2 (en) | 2017-05-15 | 2021-02-09 | Forcepoint, LLC | Collecting data for centralized use in an adaptive trust profile event via an endpoint |
US9882918B1 (en) | 2017-05-15 | 2018-01-30 | Forcepoint, LLC | User behavior profile in a blockchain |
US10129269B1 (en) | 2017-05-15 | 2018-11-13 | Forcepoint, LLC | Managing blockchain access to user profile information |
US10917423B2 (en) | 2017-05-15 | 2021-02-09 | Forcepoint, LLC | Intelligently differentiating between different types of states and attributes when using an adaptive trust profile |
US10999296B2 (en) | 2017-05-15 | 2021-05-04 | Forcepoint, LLC | Generating adaptive trust profiles using information derived from similarly situated organizations |
US10862927B2 (en) | 2017-05-15 | 2020-12-08 | Forcepoint, LLC | Dividing events into sessions during adaptive trust profile operations |
US10318729B2 (en) | 2017-07-26 | 2019-06-11 | Forcepoint, LLC | Privacy protection during insider threat monitoring |
RU2689816C2 (en) | 2017-11-21 | 2019-05-29 | ООО "Группа АйБи" | Method for classifying sequence of user actions (embodiments) |
RU2680736C1 (en) | 2018-01-17 | 2019-02-26 | Общество с ограниченной ответственностью "Группа АйБи ТДС" | Malware files in network traffic detection server and method |
RU2668710C1 (en) | 2018-01-17 | 2018-10-02 | Общество с ограниченной ответственностью "Группа АйБи ТДС" | Computing device and method for detecting malicious domain names in network traffic |
RU2677368C1 (en) | 2018-01-17 | 2019-01-16 | Общество С Ограниченной Ответственностью "Группа Айби" | Method and system for automatic determination of fuzzy duplicates of video content |
RU2676247C1 (en) | 2018-01-17 | 2018-12-26 | Общество С Ограниченной Ответственностью "Группа Айби" | Web resources clustering method and computer device |
RU2677361C1 (en) | 2018-01-17 | 2019-01-16 | Общество с ограниченной ответственностью "Траст" | Method and system of decentralized identification of malware programs |
RU2681699C1 (en) | 2018-02-13 | 2019-03-12 | Общество с ограниченной ответственностью "Траст" | Method and server for searching related network resources |
US11156020B2 (en) * | 2018-05-29 | 2021-10-26 | Spectrum Brands, Inc. | Tamper alarm for electronic lock |
WO2020027773A1 (en) * | 2018-07-30 | 2020-02-06 | Hewlett-Packard Development Company, L.P. | User interface modification |
US11164206B2 (en) * | 2018-11-16 | 2021-11-02 | Comenity Llc | Automatically aggregating, evaluating, and providing a contextually relevant offer |
RU2708508C1 (en) | 2018-12-17 | 2019-12-09 | Общество с ограниченной ответственностью "Траст" | Method and a computing device for detecting suspicious users in messaging systems |
RU2701040C1 (en) | 2018-12-28 | 2019-09-24 | Общество с ограниченной ответственностью "Траст" | Method and a computer for informing on malicious web resources |
US11151232B2 (en) * | 2019-01-28 | 2021-10-19 | EMC IP Holding Company LLC | User authentication by endpoint device using local policy engine and endpoint data |
SG11202101624WA (en) | 2019-02-27 | 2021-03-30 | Group Ib Ltd | Method and system for user identification by keystroke dynamics |
US10853496B2 (en) | 2019-04-26 | 2020-12-01 | Forcepoint, LLC | Adaptive trust profile behavioral fingerprint |
RU2728498C1 (en) | 2019-12-05 | 2020-07-29 | Общество с ограниченной ответственностью "Группа АйБи ТДС" | Method and system for determining software belonging by its source code |
RU2728497C1 (en) | 2019-12-05 | 2020-07-29 | Общество с ограниченной ответственностью "Группа АйБи ТДС" | Method and system for determining belonging of software by its machine code |
RU2743974C1 (en) | 2019-12-19 | 2021-03-01 | Общество с ограниченной ответственностью "Группа АйБи ТДС" | System and method for scanning security of elements of network architecture |
SG10202001963TA (en) | 2020-03-04 | 2021-10-28 | Group Ib Global Private Ltd | System and method for brand protection based on the search results |
US11475090B2 (en) | 2020-07-15 | 2022-10-18 | Group-Ib Global Private Limited | Method and system for identifying clusters of affiliated web resources |
RU2743619C1 (en) | 2020-08-06 | 2021-02-20 | Общество с ограниченной ответственностью "Группа АйБи ТДС" | Method and system for generating the list of compromise indicators |
US11630886B2 (en) * | 2020-09-17 | 2023-04-18 | International Business Machines Corporation | Computer security forensics based on temporal typing changes of authentication credentials |
CA3194322A1 (en) | 2020-09-30 | 2022-04-07 | Sik Suen CHAN | User identification with blended response from dual-layer identification service |
AU2021354156A1 (en) * | 2020-09-30 | 2023-05-04 | Mastercard Technologies Canada ULC | User identification with input profile record |
US11947572B2 (en) | 2021-03-29 | 2024-04-02 | Group IB TDS, Ltd | Method and system for clustering executable files |
US20230315216A1 (en) * | 2022-03-31 | 2023-10-05 | Rensselaer Polytechnic Institute | Digital penmanship |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040095384A1 (en) * | 2001-12-04 | 2004-05-20 | Applied Neural Computing Ltd. | System for and method of web signature recognition system based on object map |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5229764A (en) * | 1991-06-20 | 1993-07-20 | Matchett Noel D | Continuous biometric authentication matrix |
US5596718A (en) * | 1992-07-10 | 1997-01-21 | Secure Computing Corporation | Secure computer network using trusted path subsystem which encrypts/decrypts and communicates with user through local workstation user I/O devices without utilizing workstation processor |
US5557686A (en) * | 1993-01-13 | 1996-09-17 | University Of Alabama | Method and apparatus for verification of a computer user's identification, based on keystroke characteristics |
JPH07303209A (en) * | 1994-05-06 | 1995-11-14 | Matsushita Electric Ind Co Ltd | Special effect editing device |
JPH0855021A (en) * | 1994-08-10 | 1996-02-27 | Fujitsu Ltd | Key authentication system |
US6943845B2 (en) * | 2000-12-15 | 2005-09-13 | Canon Kabushiki Kaisha | Apparatus and method for data processing, and storage medium |
JP2002222051A (en) * | 2001-01-29 | 2002-08-09 | Tookado:Kk | Index slight movement structure of mouse |
US7350078B1 (en) * | 2001-04-26 | 2008-03-25 | Gary Odom | User selection of computer login |
US20050008148A1 (en) * | 2003-04-02 | 2005-01-13 | Dov Jacobson | Mouse performance identification |
US20040221171A1 (en) * | 2003-05-02 | 2004-11-04 | Ahmed Ahmed Awad E. | Intrusion detector based on mouse dynamics analysis |
-
2003
- 2003-05-02 US US10/427,810 patent/US20040221171A1/en not_active Abandoned
-
2004
- 2004-05-03 WO PCT/CA2004/000669 patent/WO2004097601A1/en active Application Filing
- 2004-05-03 US US10/555,408 patent/US8230232B2/en active Active
- 2004-05-03 CA CA2535542A patent/CA2535542C/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040095384A1 (en) * | 2001-12-04 | 2004-05-20 | Applied Neural Computing Ltd. | System for and method of web signature recognition system based on object map |
Cited By (69)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050008148A1 (en) * | 2003-04-02 | 2005-01-13 | Dov Jacobson | Mouse performance identification |
US20060224898A1 (en) * | 2003-05-02 | 2006-10-05 | Ahmed Ahmed E | System and method for determining a computer user profile from a motion-based input device |
US8230232B2 (en) | 2003-05-02 | 2012-07-24 | Uvic Industry Partnerships Inc. | System and method for determining a computer user profile from a motion-based input device |
US7562389B1 (en) | 2004-07-30 | 2009-07-14 | Cisco Technology, Inc. | Method and system for network security |
US20060023709A1 (en) * | 2004-08-02 | 2006-02-02 | Hall Michael L | Inline intrusion detection using a single physical port |
US7555774B2 (en) | 2004-08-02 | 2009-06-30 | Cisco Technology, Inc. | Inline intrusion detection using a single physical port |
US20060161983A1 (en) * | 2005-01-20 | 2006-07-20 | Cothrell Scott A | Inline intrusion detection |
US9009830B2 (en) | 2005-01-20 | 2015-04-14 | Cisco Technology, Inc. | Inline intrusion detection |
US7725938B2 (en) | 2005-01-20 | 2010-05-25 | Cisco Technology, Inc. | Inline intrusion detection |
US20100146622A1 (en) * | 2006-10-04 | 2010-06-10 | Nordstroem Peder | Security system and method for detecting intrusion in a computerized system |
EP2069993A4 (en) * | 2006-10-04 | 2011-05-18 | Behaviometrics Ab | Security system and method for detecting intrusion in a computerized system |
EP2069993A2 (en) * | 2006-10-04 | 2009-06-17 | Behaviometrics AB | Security system and method for detecting intrusion in a computerized system |
US8443443B2 (en) | 2006-10-04 | 2013-05-14 | Behaviometrics Ab | Security system and method for detecting intrusion in a computerized system |
EP2382736A2 (en) * | 2009-01-23 | 2011-11-02 | Microsoft Corporation | Passive security enforcement |
US10389712B2 (en) | 2009-01-23 | 2019-08-20 | Microsoft Technology Licensing, Llc | Passive security enforcement |
US9641502B2 (en) | 2009-01-23 | 2017-05-02 | Microsoft Technology Licensing, Llc | Passive security enforcement |
US8898758B2 (en) | 2009-01-23 | 2014-11-25 | Microsoft Corporation | Passive security enforcement |
EP2382736A4 (en) * | 2009-01-23 | 2014-06-18 | Microsoft Corp | Passive security enforcement |
US10621585B2 (en) | 2010-11-29 | 2020-04-14 | Biocatch Ltd. | Contextual mapping of web-pages, and generation of fraud-relatedness score-values |
US11250435B2 (en) | 2010-11-29 | 2022-02-15 | Biocatch Ltd. | Contextual mapping of web-pages, and generation of fraud-relatedness score-values |
US11838118B2 (en) * | 2010-11-29 | 2023-12-05 | Biocatch Ltd. | Device, system, and method of detecting vishing attacks |
US11736478B2 (en) * | 2010-11-29 | 2023-08-22 | Biocatch Ltd. | Device, system, and method of user authentication based on user-specific characteristics of task performance |
US11580553B2 (en) | 2010-11-29 | 2023-02-14 | Biocatch Ltd. | Method, device, and system of detecting mule accounts and accounts used for money laundering |
US11425563B2 (en) | 2010-11-29 | 2022-08-23 | Biocatch Ltd. | Method, device, and system of differentiating between a cyber-attacker and a legitimate user |
US10262324B2 (en) | 2010-11-29 | 2019-04-16 | Biocatch Ltd. | System, device, and method of differentiating among users based on user-specific page navigation sequence |
US10298614B2 (en) * | 2010-11-29 | 2019-05-21 | Biocatch Ltd. | System, device, and method of generating and managing behavioral biometric cookies |
US11330012B2 (en) * | 2010-11-29 | 2022-05-10 | Biocatch Ltd. | System, method, and device of authenticating a user based on selfie image or selfie video |
US11314849B2 (en) | 2010-11-29 | 2022-04-26 | Biocatch Ltd. | Method, device, and system of detecting a lie of a user who inputs data |
US20220116389A1 (en) * | 2010-11-29 | 2022-04-14 | Biocatch Ltd. | Device, system, and method of user authentication based on user-specific characteristics of task performance |
US10404729B2 (en) | 2010-11-29 | 2019-09-03 | Biocatch Ltd. | Device, method, and system of generating fraud-alerts for cyber-attacks |
US10474815B2 (en) | 2010-11-29 | 2019-11-12 | Biocatch Ltd. | System, device, and method of detecting malicious automatic script and code injection |
US10476873B2 (en) * | 2010-11-29 | 2019-11-12 | Biocatch Ltd. | Device, system, and method of password-less user authentication and password-less detection of user identity |
US11269977B2 (en) | 2010-11-29 | 2022-03-08 | Biocatch Ltd. | System, apparatus, and method of collecting and processing data in electronic devices |
US11223619B2 (en) * | 2010-11-29 | 2022-01-11 | Biocatch Ltd. | Device, system, and method of user authentication based on user-specific characteristics of task performance |
US10586036B2 (en) | 2010-11-29 | 2020-03-10 | Biocatch Ltd. | System, device, and method of recovery and resetting of user authentication factor |
US11210674B2 (en) | 2010-11-29 | 2021-12-28 | Biocatch Ltd. | Method, device, and system of detecting mule accounts and accounts used for money laundering |
US20210329030A1 (en) * | 2010-11-29 | 2021-10-21 | Biocatch Ltd. | Device, System, and Method of Detecting Vishing Attacks |
US10949757B2 (en) | 2010-11-29 | 2021-03-16 | Biocatch Ltd. | System, device, and method of detecting user identity based on motor-control loop model |
US10949514B2 (en) | 2010-11-29 | 2021-03-16 | Biocatch Ltd. | Device, system, and method of differentiating among users based on detection of hardware components |
US10728761B2 (en) | 2010-11-29 | 2020-07-28 | Biocatch Ltd. | Method, device, and system of detecting a lie of a user who inputs data |
US10747305B2 (en) | 2010-11-29 | 2020-08-18 | Biocatch Ltd. | Method, system, and device of authenticating identity of a user of an electronic device |
US10917431B2 (en) | 2010-11-29 | 2021-02-09 | Biocatch Ltd. | System, method, and device of authenticating a user based on selfie image or selfie video |
US10897482B2 (en) | 2010-11-29 | 2021-01-19 | Biocatch Ltd. | Method, device, and system of back-coloring, forward-coloring, and fraud detection |
US10776476B2 (en) | 2010-11-29 | 2020-09-15 | Biocatch Ltd. | System, device, and method of visual login |
US10834590B2 (en) | 2010-11-29 | 2020-11-10 | Biocatch Ltd. | Method, device, and system of differentiating between a cyber-attacker and a legitimate user |
EP2584488A1 (en) | 2011-09-20 | 2013-04-24 | Kaspersky Lab Zao | System and method for detecting computer security threats based on verdicts of computer users |
US8214904B1 (en) | 2011-12-21 | 2012-07-03 | Kaspersky Lab Zao | System and method for detecting computer security threats based on verdicts of computer users |
US8214905B1 (en) | 2011-12-21 | 2012-07-03 | Kaspersky Lab Zao | System and method for dynamically allocating computing resources for processing security information |
US8209758B1 (en) | 2011-12-21 | 2012-06-26 | Kaspersky Lab Zao | System and method for classifying users of antivirus software based on their level of expertise in the field of computer security |
CN104252595A (en) * | 2013-06-28 | 2014-12-31 | 贝壳网际(北京)安全技术有限公司 | Application program analysis method and device and client |
US20150178374A1 (en) * | 2013-12-23 | 2015-06-25 | Trusteer Ltd. | Method and system of providing user profile detection from an input device |
US10719765B2 (en) | 2015-06-25 | 2020-07-21 | Biocatch Ltd. | Conditional behavioral biometrics |
US11238349B2 (en) | 2015-06-25 | 2022-02-01 | Biocatch Ltd. | Conditional behavioural biometrics |
US11323451B2 (en) | 2015-07-09 | 2022-05-03 | Biocatch Ltd. | System, device, and method for detection of proxy server |
US10834090B2 (en) * | 2015-07-09 | 2020-11-10 | Biocatch Ltd. | System, device, and method for detection of proxy server |
US10523680B2 (en) * | 2015-07-09 | 2019-12-31 | Biocatch Ltd. | System, device, and method for detecting a proxy server |
US11055395B2 (en) | 2016-07-08 | 2021-07-06 | Biocatch Ltd. | Step-up authentication |
US10579784B2 (en) | 2016-11-02 | 2020-03-03 | Biocatch Ltd. | System, device, and method of secure utilization of fingerprints for user authentication |
US10685355B2 (en) | 2016-12-04 | 2020-06-16 | Biocatch Ltd. | Method, device, and system of detecting mule accounts and accounts used for money laundering |
US10666636B2 (en) | 2017-01-04 | 2020-05-26 | International Business Machines Corporation | Controlling access to electronic services based on a user's sociometric identification document |
US10333917B2 (en) | 2017-01-04 | 2019-06-25 | International Business Machines Corporation | Controlling access to electronic resources based on a user's sociometric identification document |
US10397262B2 (en) | 2017-07-20 | 2019-08-27 | Biocatch Ltd. | Device, system, and method of detecting overlay malware |
US10970394B2 (en) | 2017-11-21 | 2021-04-06 | Biocatch Ltd. | System, device, and method of detecting vishing attacks |
CN108460269A (en) * | 2018-03-21 | 2018-08-28 | 广州多益网络股份有限公司 | Verification method and device, verification terminal device |
US11410187B2 (en) | 2019-03-01 | 2022-08-09 | Mastercard Technologies Canada ULC | Feature drift hardened online application origination (OAO) service for fraud prevention systems |
US20200279266A1 (en) * | 2019-03-01 | 2020-09-03 | Mastercard Technologies Canada ULC | Multi-page online application origination (oao) service for fraud prevention systems |
WO2020176977A1 (en) * | 2019-03-01 | 2020-09-10 | Mastercard Technologies Canada ULC | Multi-page online application origination (oao) service for fraud prevention systems |
US11928683B2 (en) | 2019-10-01 | 2024-03-12 | Mastercard Technologies Canada ULC | Feature encoding in online application origination (OAO) service for a fraud prevention system |
US11606353B2 (en) | 2021-07-22 | 2023-03-14 | Biocatch Ltd. | System, device, and method of generating and utilizing one-time passwords |
Also Published As
Publication number | Publication date |
---|---|
US20060224898A1 (en) | 2006-10-05 |
CA2535542A1 (en) | 2004-11-11 |
CA2535542C (en) | 2016-04-19 |
US8230232B2 (en) | 2012-07-24 |
WO2004097601A1 (en) | 2004-11-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20040221171A1 (en) | Intrusion detector based on mouse dynamics analysis | |
Nickel et al. | Classifying accelerometer data via hidden markov models to authenticate people by the way they walk | |
US8443443B2 (en) | Security system and method for detecting intrusion in a computerized system | |
Garg et al. | Profiling users in GUI based systems for masquerade detection | |
CN105139029B (en) | A kind of Activity recognition method and device of prison prisoner | |
CN107145778B (en) | Intrusion detection method and device | |
WO2009090584A2 (en) | Method and system for activity recognition and its application in fall detection | |
Almalki et al. | Continuous authentication using mouse clickstream data analysis | |
Shitharth et al. | An enriched RPCO-BCNN mechanisms for attack detection and classification in SCADA systems | |
CN111625792B (en) | Identity recognition method based on abnormal behavior detection | |
Deutschmann et al. | Behavioral biometrics for DARPA's active authentication program | |
Dholi et al. | Typing pattern recognition using keystroke dynamics | |
Fornaciari et al. | The effect of personality type on deceptive communication style | |
Anderka et al. | Automatic ATM Fraud Detection as a Sequence-based Anomaly Detection Problem. | |
CN115438102A (en) | Space-time data anomaly identification method and device and electronic equipment | |
KR101329100B1 (en) | Apparatus for contest awareness and method using the same | |
Shen et al. | A hypo-optimum feature selection strategy for mouse dynamics in continuous identity authentication and monitoring | |
Hemmer et al. | Comparative assessment of process mining for supporting IoT predictive security | |
Yıldırım et al. | Novel feature extraction methods for authentication via mouse dynamics with semi-supervised learning | |
US20050283511A1 (en) | Cross-feature analysis | |
CN110943974B (en) | DDoS (distributed denial of service) anomaly detection method and cloud platform host | |
CN113438239B (en) | Network attack detection method and device based on depth k nearest neighbor | |
Ahmed et al. | Mouse dynamics biometric technology | |
Changshui et al. | AR model for keystroker verification | |
Khalifa et al. | Comparison between mixed binary classification and voting technique for active user authentication using mouse dynamics |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |