CPC G06F 21/62 (2013.01) [G06F 21/316 (2013.01); G06F 21/554 (2013.01); G06N 20/00 (2019.01); G06F 2221/032 (2013.01)] | 17 Claims |
1. A method for verifying user activity based on behavioral models, the method comprising:
receiving sensor data from at least one sensor in an environment;
parsing the sensor data to determine a first identifier of a person that is not authorized to access data via a computing device;
subsequent to determining the first identifier, intercepting a data access request on the computing device, wherein the data access request includes a second identifier of a user that is authorized to access the data via the computing device;
verifying whether the data access request is from the user authorized to access data by:
generating a chain of events for a period of time preceding the data access request, wherein the chain of events includes generated events including identifiers of the person that is not authorized to access the data via the computing device and the user that is authorized;
determining whether the chain of events corresponds to a behavioral model indicative of malicious activity; and
in response to determining that the chain of events do not correspond to the behavioral model, verifying that the data access request is from the user and granting the data access request.
|