20240037541. DETECTION OF USE OF A REMOTE ACCESS TOOL FOR SECURE TRANSACTIONS simplified abstract (BehavioSec Inc)

From WikiPatents
Jump to navigation Jump to search

DETECTION OF USE OF A REMOTE ACCESS TOOL FOR SECURE TRANSACTIONS

Organization Name

BehavioSec Inc

Inventor(s)

Tony Libell of Luleå (SE)

[[:Category:Per Burstr�m of Luleå (SE)|Per Burstr�m of Luleå (SE)]][[Category:Per Burstr�m of Luleå (SE)]]

[[:Category:Mikael Åhl�n of Västerås (SE)|Mikael Åhl�n of Västerås (SE)]][[Category:Mikael Åhl�n of Västerås (SE)]]

DETECTION OF USE OF A REMOTE ACCESS TOOL FOR SECURE TRANSACTIONS - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240037541 titled 'DETECTION OF USE OF A REMOTE ACCESS TOOL FOR SECURE TRANSACTIONS

Simplified Explanation

The abstract describes a method for determining if a secure transaction between a user's computing device and a server is being controlled remotely through a remote access tool. The method involves actively perturbing and probing the network during the transaction to change network conditions. Data related to user interactions with the device's user interface is collected and compared to reference data from previous interactions. Based on this comparison, a probability that the transaction is being carried out via a remote access tool is computed and compared to a predefined threshold. If the threshold is exceeded, the transaction is terminated.

  • The method actively perturbs and probes the network during a secure transaction.
  • Data on user interactions with the device's user interface is collected.
  • The collected data is compared to reference data from previous interactions.
  • A probability that the transaction is controlled remotely is computed.
  • The computed probability is compared to a predefined threshold.
  • If the threshold is exceeded, the transaction is terminated.

Potential applications of this technology:

  • Enhancing security in online transactions by detecting and preventing unauthorized remote access.
  • Protecting sensitive user information from being compromised during secure transactions.

Problems solved by this technology:

  • Preventing unauthorized access and control of user computing devices during secure transactions.
  • Detecting and terminating transactions that are being controlled remotely through a remote access tool.

Benefits of this technology:

  • Improved security and protection of user data during secure transactions.
  • Enhanced trust and confidence in online transactions.
  • Reduction in the risk of financial fraud and identity theft.


Original Abstract Submitted

a method for determining whether a secure transaction between a user computing device and a server, connected via a network, is controlled remotely via a remote access tool. the method includes, during the secure transaction, actively perturbing and/or probing the network to change the conditions in the network. during perturbing of the network, data relating to user interactions with a user interface associated with the user computing device is collected and compared to reference data relating to user interactions carried out prior to the secure transaction or prior to perturbing of the network. based on the comparison, a probability that the secure transaction is carried out via a remote access tool is computed and is compared to a predefined threshold. if the threshold is exceeded, the secure transaction is terminated.