SYSTEM AND METHOD FOR RESOURCE ACCESS AUTHENTICATION

    公开(公告)号:US20190342298A1

    公开(公告)日:2019-11-07

    申请号:US16399865

    申请日:2019-04-30

    Abstract: A method of providing continuous user authentication for resource access control includes launching a continuous authentication service at a boot time of a first device, wherein the first device includes a processor, a memory, and one or more sensors configured to collect authentication information. Additionally, the method includes receiving authentication information comprising one or more of explicit authentication information or implicit authentication information, and receiving a request for access to a resource of the first device. Further, the method includes the operations of determining, by the continuous authentication service, a current value of a security state, the current value of the security state based in part on a time interval between a receipt time of the authentication information and a current time and controlling access to the resource based on the current value of the security state.

    System and method for resource access authentication

    公开(公告)号:US11985132B2

    公开(公告)日:2024-05-14

    申请号:US16399865

    申请日:2019-04-30

    CPC classification number: H04L63/102 H04L63/08

    Abstract: A method of providing continuous user authentication for resource access control includes launching a continuous authentication service at a boot time of a first device, wherein the first device includes a processor, a memory, and one or more sensors configured to collect authentication information. Additionally, the method includes receiving authentication information comprising one or more of explicit authentication information or implicit authentication information, and receiving a request for access to a resource of the first device. Further, the method includes the operations of determining, by the continuous authentication service, a current value of a security state, the current value of the security state based in part on a time interval between a receipt time of the authentication information and a current time and controlling access to the resource based on the current value of the security state.

    MALWARE DETECTION BY EXPLOITING MALWARE RE-COMPOSITION VARIATIONS USING FEATURE EVOLUTIONS AND CONFUSIONS

    公开(公告)号:US20170353481A1

    公开(公告)日:2017-12-07

    申请号:US15388460

    申请日:2016-12-22

    Abstract: One embodiment provides a method comprising, in a training phase, receiving one or more malware samples, extracting multi-aspect features of malicious behaviors triggered by the malware samples, determining evolution patterns of the malware samples based on the multi-aspect features, and predicting mutations of the malware samples based on the evolution patterns. Another embodiment provides a method comprising, in a testing phase, receiving a new mobile application, extracting a first set of multi-aspect features for the new mobile application using a learned feature model, and determining whether the new mobile application is a mutation of a malicious application using a learned classification model and the first set of multi-aspect features.

Patent Agency Ranking