User-browser interaction analysis authentication system

a technology of interaction analysis and authentication system, applied in the field of data processing systems, can solve the problems of internet fraud, slow adoption of internet commerce, and costing both businesses and consumers time, money and other resources, and hackers conduct internet fraud

Inactive Publication Date: 2007-10-11
IBM CORP
View PDF6 Cites 108 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0005] The problems identified above are in large part addressed by systems, methods and media for authenticating a user based on user-browser interaction. Embodiments may include, during an e-commerce session with a user, receiving a request for an action from the user and determining whether the requested action requires additional authentication. Embodiments may also include, in response to determining that the requested action requires additional authentication, requesting analysis of user-browser interaction for the session and receiving a pattern matching score for the session. The pattern matching score may provide an indication of a comparison between the user's interaction with a browser during the session and a user-browser interaction profile for the user. Embodiments may also include performing an action based on the pattern matching score and the requested action. The performed action may include, for example, completing an e-commerce transaction, accessing restricted information, modifying user information, changing

Problems solved by technology

While Internet commerce continues to dramatically rise in importance to both businesses and consumers, fraudulent behavior slows adoption of Internet commerce and costs both businesses and consumers time, money, and other resources.
Hackers conduct Internet fraud by hijacking accounts (i.e., stealing account information) and performing tasks with the stolen account information, improperly acquiring goods, services, or money.
Many solutions have been developed for Internet commerce fraud by businesses, browser developers, and others to prevent Internet commerce fraud, but all have failed to provide an effective and efficient solution.
O

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User-browser interaction analysis authentication system
  • User-browser interaction analysis authentication system
  • User-browser interaction analysis authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The following is a detailed description of example embodiments of the invention depicted in the accompanying drawings. The example embodiments are in such detail as to clearly communicate the invention. However, the amount of detail offered is not intended to limit the anticipated variations of embodiments; on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the present invention as defined by the appended claims. The descriptions below are designed to make such embodiments obvious to a person of ordinary skill in the art.

[0019] Generally speaking, systems, methods and media for authenticating a user based on user-browser interaction are disclosed. Embodiments of a method may include, during an e-commerce session with a user, receiving a request for an action from the user and determining whether the requested action requires additional authentication. Embodiments may also include, in response to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Systems, methods and media for authenticating a user based on user-browser interaction are disclosed. Embodiments of a method may include, during an e-commerce session with a user, receiving a request for an action from the user and determining whether the requested action requires additional authentication. Embodiments may also include requesting analysis of user-browser interaction for the session, receiving a pattern matching score for the session, and performing an action based on the pattern matching score and the requested action. The pattern matching score may provide an indication of a comparison between the user's interaction with a browser during the session and a user-browser interaction profile for the user. The performed action may include completing an e-commerce transaction, accessing or modifying information, changing a password, requesting additional information, denying the requested action, or other action. Further embodiments may provide for authenticating the user with a first-level authentication.

Description

FIELD OF INVENTION [0001] The present invention is in the field of data processing systems and, in particular, to systems, methods and media for authenticating a user based on analysis of user-browser interaction, such as for providing authentication for an Internet or e-commerce transaction. BACKGROUND [0002] Personal computer systems are well known in the art. They have attained widespread use for providing computer power to many segments of today's modern society. Personal computers (PCs) may be defined as a desktop, floor standing, or portable microcomputer that includes a system unit having a central processing unit (CPU) and associated volatile and non-volatile memory, including random access memory (RAM) and basic input / output system read only memory (BIOS ROM), a system monitor, a keyboard, one or more flexible diskette drives, a CD-ROM or DVD-ROM drive, a fixed disk storage drive (also known as a “hard drive”), a pointing device such as a mouse, and an optional network inte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
CPCG06F21/55
Inventor O'CONNELL, BRIAN M.WALKER, KEITH R.
Owner IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products