Abstract: A system for identify threats to the security of an owner's electronic information by performing a secondary background authorization (SABA) that is transparent to the requester to verify or flag unauthorized access to systems, data or company offices being requested. The secondary background authorization relies on a proprietary security, big data pattern-matching, and modeling approach made possible by the creation, expansion, and analysis of new “data streams” that, together with Operating systems, applications, and devices data, uniquely allows the system to determine a security access risk and provide information to the owner.
Type:
Grant
Filed:
June 22, 2017
Date of Patent:
July 17, 2018
Assignee:
IDECSI
Inventors:
Daniel Rezlan, Jeremie Collonge, Luc Dubrois, Thibault Hue
Abstract: A system for identify threats to the security of an owner's electronic information by performing a secondary background authorization (SABA) that is transparent to the requester to verify or flag unauthorized access to systems, data or company offices being requested. The secondary background authorization relies on a proprietary security, big data pattern-matching, and modeling approach made possible by the creation, expansion, and analysis of new “data streams” that, together with Operating systems, applications, and devices data, uniquely allows the system to determine a security access risk and provide information to the owner.
Type:
Grant
Filed:
August 31, 2012
Date of Patent:
August 1, 2017
Assignee:
IDECSI SAS
Inventors:
Daniel Rezlan, Jeremie Collonge, Luc Dubrois, Thibault Hue
Abstract: A system for identify threats to the security of an owner's electronic information by performing a secondary background authorization (SABA) that is transparent to the requester to verify or flag unauthorized access to systems, data or company offices being requested. The secondary background authorization relies on a proprietary security, big data pattern-matching, and modeling approach made possible by the creation, expansion, and analysis of new “data streams” that, together with Operating systems, applications, and devices data, uniquely allows the system to determine a security access risk and provide information to the owner.
Type:
Application
Filed:
August 31, 2012
Publication date:
December 26, 2013
Applicant:
IDECSI
Inventors:
Daniel Rezlan, Jeremie Collonge, Luc Dubrois, Thibault Hue