[go: up one dir, main page]

FR3047594B1 - MONITORING USER AUTHENTICITY - Google Patents

MONITORING USER AUTHENTICITY Download PDF

Info

Publication number
FR3047594B1
FR3047594B1 FR1650872A FR1650872A FR3047594B1 FR 3047594 B1 FR3047594 B1 FR 3047594B1 FR 1650872 A FR1650872 A FR 1650872A FR 1650872 A FR1650872 A FR 1650872A FR 3047594 B1 FR3047594 B1 FR 3047594B1
Authority
FR
France
Prior art keywords
user
item
specific
session
risk rating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
FR1650872A
Other languages
French (fr)
Other versions
FR3047594A1 (en
Inventor
Virginie Amar
Jeremie Barlet
Marc Campora
Hayek Joseph El
Romain Peicle
Olivier Thonnard
Jihane Zouaoui
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Amadeus SAS
Original Assignee
Amadeus SAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Amadeus SAS filed Critical Amadeus SAS
Priority to FR1650872A priority Critical patent/FR3047594B1/en
Publication of FR3047594A1 publication Critical patent/FR3047594A1/fr
Application granted granted Critical
Publication of FR3047594B1 publication Critical patent/FR3047594B1/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Educational Administration (AREA)
  • Development Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Economics (AREA)
  • Social Psychology (AREA)
  • Software Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Computer And Data Communications (AREA)

Abstract

Une méthode est procurée pour surveiller l'authenticité de l'utilisateur selon les activités de l'utilisateur sur au moins un serveur d'application. Un processus de vérification et de modélisation d'utilisateur est effectué. Dans le processus de modélisation de l'utilisateur, un modèle existant de l'utilisateur est adapté, session par session, aux activités de l'utilisateur, dans lequel le modèle d'utilisateur comprend une pluralité de modèles adaptatifs d'activité d'utilisateur, liés à un élément spécifique. Le processus de vérification d'utilisateur comprend la détermination d'une pluralité de valeurs d'évaluation de risque lié à un élément spécifique, qui comparent au moins un des modèles adaptatifs d'activité d'utilisateur lié à un élément spécifique avec un élément respectif extrait de l'activité de l'utilisateur lors de la session de l'utilisateur sur le serveur d'application, la détermination d'une valeur totale d'évaluation de risque indicative de l'authenticité de l'utilisateur en pondérant et en combinant la pluralité des valeurs d'évaluation de risque lié à un élément spécifique. Lorsque la valeur totale d'évaluation de risque dépasse un seuil donné, une action corrective est effectuée.A method is provided to monitor user authenticity based on user activities on at least one application server. A user verification and modeling process is performed. In the user modeling process, an existing user model is adapted, session by session, to the user's activities, wherein the user model includes a plurality of adaptive user activity models , related to a specific element. The user verification process includes determining a plurality of item-specific risk rating values, which compare at least one of the item-specific user activity adaptive models with a respective item extracted from the user's activity during the user's session on the application server, determining a total risk rating value indicative of the user's authenticity by weighting and combining the plurality of risk rating values related to a specific item. When the total risk assessment value exceeds a given threshold, corrective action is taken.

FR1650872A 2016-02-04 2016-02-04 MONITORING USER AUTHENTICITY Expired - Fee Related FR3047594B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
FR1650872A FR3047594B1 (en) 2016-02-04 2016-02-04 MONITORING USER AUTHENTICITY

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
FR1650872A FR3047594B1 (en) 2016-02-04 2016-02-04 MONITORING USER AUTHENTICITY

Publications (2)

Publication Number Publication Date
FR3047594A1 FR3047594A1 (en) 2017-08-11
FR3047594B1 true FR3047594B1 (en) 2022-04-15

Family

ID=57113405

Family Applications (1)

Application Number Title Priority Date Filing Date
FR1650872A Expired - Fee Related FR3047594B1 (en) 2016-02-04 2016-02-04 MONITORING USER AUTHENTICITY

Country Status (1)

Country Link
FR (1) FR3047594B1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110163407B (en) * 2019-04-02 2023-01-17 创新先进技术有限公司 Optimization method and device for quantization strategy

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006118968A2 (en) * 2005-04-29 2006-11-09 Bharosa Inc. System and method for fraud monitoring, detection, and tiered user authentication

Also Published As

Publication number Publication date
FR3047594A1 (en) 2017-08-11

Similar Documents

Publication Publication Date Title
Holdsworth et al. Offender engagement in group programs and associations with offender characteristics and treatment factors: A review
Tavana et al. An extended VIKOR method using stochastic data and subjective judgments
WO2014151842A3 (en) Methods and apparatus for promoting financial behavioral change
PH12018502562B1 (en) Methods for identifying crosses for use in plant breeding
WO2017004240A8 (en) Identifying fall risk using machine learning algorithms
MX2015002437A (en) System and method for determining a state of health of a power source of a portable device.
JP2016517305A5 (en)
JP2017515205A5 (en)
Konstantinides et al. 2014 ESC guidelines on the diagnosis and management of acute pulmonary embolism: the task force for the diagnosis and management of acute pulmonary embolism of the European Society of Cardiology (ESC)
WO2016022989A3 (en) Systems and methods for monitoring and controlling a cardiovascular state of a subject
WO2018231671A3 (en) Suspicious remittance detection through financial behavior analysis
WO2016049090A3 (en) System and method to assist a user in achieving a goal
WO2015102935A3 (en) Simultaneous latency and rate coding for automatic error correction
Dang et al. Learning effective connectivity from fMRI using autoregressive hidden Markov model with missing data
EP3806711A4 (en) Device and method for assessing, predicting and operating user's health in real time
WO2017125805A3 (en) Method and device for the real-time detection, classification and quantification of the feeding activity of ruminant animals
Kumar Sudden changes in extreme value volatility estimator: Modeling and forecasting with economic significance analysis
EP3779814A4 (en) Method and device for training adaptation level evaluation model, and method and device for evaluating adaptation level
FR3047594B1 (en) MONITORING USER AUTHENTICITY
Xiao et al. Random weighting approximation for Tobit regression models with longitudinal data
UA99462U (en) Method for identification of parameters of damages in thin bodies
MX2020002081A (en) Skin condition and risk evaluation methodology.
WO2017049301A3 (en) Animal voluntary weight lifting cage apparatus and related methods thereof
Henricks Where Are We Now
FR3047595B1 (en) MONITORING USER AUTHENTICITY IN A DISTRIBUTED SYSTEM

Legal Events

Date Code Title Description
PLFP Fee payment

Year of fee payment: 2

PLSC Publication of the preliminary search report

Effective date: 20170811

PLFP Fee payment

Year of fee payment: 3

PLFP Fee payment

Year of fee payment: 5

PLFP Fee payment

Year of fee payment: 6

PLFP Fee payment

Year of fee payment: 7

PLFP Fee payment

Year of fee payment: 8

PLFP Fee payment

Year of fee payment: 9

ST Notification of lapse

Effective date: 20251005