18381561. SYSTEMS AND METHODS FOR NETWORK SECURITY simplified abstract (Capital One Services, LLC)

From WikiPatents
Jump to navigation Jump to search

SYSTEMS AND METHODS FOR NETWORK SECURITY

Organization Name

Capital One Services, LLC

Inventor(s)

Tyler Maiman of Melville NY (US)

Abdelkader Benkreira of Washington DC (US)

Brendan Way of Brooklyn NY (US)

SYSTEMS AND METHODS FOR NETWORK SECURITY - A simplified explanation of the abstract

This abstract first appeared for US patent application 18381561 titled 'SYSTEMS AND METHODS FOR NETWORK SECURITY

Simplified Explanation

The security system described in the patent application is designed to detect and respond to failed authentication attempts on a network. Here are the key points of the innovation:

  • The system detects failed authentication attempts by a user device trying to access the network.
  • It calculates a risk score based on the number of failed attempts.
  • If the risk score exceeds a threshold, a notification is generated to alert the network administrator of a potential unauthorized access attempt.
  • Once the user device is successfully authenticated, network activity restrictions are applied to it.

Potential Applications

The technology described in the patent application could be applied in various industries and settings, including:

  • Corporate networks
  • Government agencies
  • Financial institutions
  • Healthcare organizations

Problems Solved

This technology addresses several key issues related to network security, such as:

  • Unauthorized access attempts
  • Data breaches
  • Insider threats

Benefits

The benefits of implementing this security system include:

  • Improved network security
  • Early detection of potential threats
  • Enhanced protection of sensitive data

Potential Commercial Applications

The technology could be commercially applied in sectors such as:

  • Cybersecurity companies
  • Network security providers
  • IT consulting firms

Possible Prior Art

One possible prior art for this technology could be traditional network security systems that rely solely on password authentication without advanced risk scoring mechanisms.

Unanswered Questions

How does the system differentiate between legitimate and illegitimate authentication attempts?

The system likely uses various factors such as user behavior analysis, device fingerprinting, and IP reputation to distinguish between legitimate and illegitimate authentication attempts.

What measures are in place to prevent false positives in identifying unauthorized access attempts?

To prevent false positives, the system may incorporate machine learning algorithms to continuously refine its risk scoring and notification processes based on historical data and feedback from network administrators.


Original Abstract Submitted

A security system for a network may be configured to detect one or more failed authentication attempts to access the network by at least one user device and determine the number of the failed authentication attempts. The system may determine a first risk score based on the number of failed authentication attempts and determine whether the first risk score is greater than or equal to a first risk score threshold and generate a first notification indicating that the user device is attempting to gain unauthorized access onto the network. The system may transmit the first notification to an administrator of the network, determine the user device is successfully authenticated to access the network after the number of failed authentication attempts has been detected, and apply a first set of network activity restrictions to the user device.