US 12,462,051 B2
User identity risk score generation in an enterprise network
Alen Puzic, Austin, TX (US); and David Endler, Austin, TX (US)
Assigned to SpyCloud, Inc., Austin, TX (US)
Filed by SpyCloud, Inc., Austin, TX (US)
Filed on Jan. 10, 2023, as Appl. No. 18/152,186.
Prior Publication US 2024/0232394 A1, Jul. 11, 2024
Int. Cl. G06F 21/60 (2013.01); G06F 21/31 (2013.01)
CPC G06F 21/604 (2013.01) [G06F 21/316 (2013.01); G06F 2221/2141 (2013.01)] 34 Claims
OG exemplary drawing
 
1. A non-transitory, machine-readable medium storing instructions that, when executed by one or more processors, effectuate operations comprising:
obtaining, by a computer system, an identity risk query identifying a user identification of a user;
retrieving, by the computer system and from a security database of compromised user information associated with a plurality of users, first compromised user information associated with the user identification, wherein the security database of the compromised user information associated with the plurality of users includes a portion of the compromised user information that was obtained by malware, wherein the retrieving includes:
performing, in response to the identity risk query and utilizing lambda functions, a first plurality of calls in parallel to the security database that includes the compromised user information,
receiving a first portion of the first compromised user information from at least some of the first plurality of calls,
performing, utilizing lambda functions and information obtained from the first plurality of calls, a second plurality of calls in parallel to the security database, and
receiving a second portion of the first compromised user information from at least some of the second plurality of calls;
generating, by the computer system, a first identity risk score for the user based on the first compromised user information, wherein the generating the first identity risk score based on the first compromised user information is based at least on a portion of the first compromised user information being harvested by malware; and
providing, by the computer system, the first identity risk score in response to the identity risk query.