CyberArk Software Ltd.
DETECTING AND PREVENTING UNAUTHORIZED CREDENTIAL CHANGE

Last updated:

Abstract:

Techniques include securely accessing data associated with at least one identity capable of accessing one or more access-controlled network resources; generating an intermediate value based on the data associated with the at least one identity; generating, based on application of a secret logic algorithm to the intermediate value, a secret data element; making available, the secret data element, to be embedded in an authentication credential associated with the at least one identity; identifying an attempt to change the authentication credential, the attempt including new authentication credential data to replace data in the authentication credential; validating, conditional on a determination whether the new authentication credential data includes the secret data element in a predefined location, the attempt to change the authentication credential; and determining, based on the validating, whether to perform a control action based on the new authentication credential data.

Status:
Application
Type:

Utility

Filling date:

24 Nov 2021

Issue date:

17 Mar 2022