Microsoft · Filed Nov 7, 2024 · Published May 7, 2026 · verified — real USPTO data

Microsoft Patents a Real-Time Risk-Scoring System for Human and Bot Identities

When an employee — or an automated script — asks for extra permissions, Microsoft's patent wants a risk score calculated on the spot before anyone says yes. The twist: that score gets handed to a human approver along with a flag for any weird behavior detected in real time.

Microsoft Patent: AI-Driven Identity Risk Scoring Explained — figure from US 2026/0129050 A1
FIG. 1A — rendered from the official USPTO publication PDF.
Publication number US 2026/0129050 A1
Applicant Microsoft Technology Licensing, LLC
Filing date Nov 7, 2024
Publication date May 7, 2026
Inventors Pushkar SARAF
CPC classification 726/28
Grant likelihood Medium
Examiner PARK, SANGSEOK (Art Unit 2499)
Status Non Final Action Mailed (Feb 4, 2026)
Document 20 claims

What Microsoft's identity risk-scoring system actually does

Imagine you work at a company and you need temporary admin access to fix a server. You send a request to your IT team. Now imagine that, at the exact same moment, the system notices your account just tried to download an unusual batch of files. Under Microsoft's patented approach, both pieces of information — your access request and the suspicious activity alert — land in front of the approver at the same time.

That approver can then make a more informed call: grant the access, deny it, or grant a reduced version. Once access is approved, the system keeps watching. If your behavior keeps looking off, your access level can be quietly dialed back — or cut entirely — without waiting for a manual review.

This applies not just to human employees but also to non-human identities like bots, service accounts, and automated pipelines — the kind of accounts that are increasingly common in cloud environments and are often the weakest link in a security breach.

How the anomaly detector gates elevated access requests

The patent describes a Just-In-Time (JIT) / Just-Enough-Access (JEA) access control system — meaning permissions are granted only when needed and only at the minimum level required, rather than baked in permanently.

Here's the core flow the patent claims:

  • A user (human or automated) requests elevated access to a resource.
  • The system simultaneously detects anomalous behavior — anything outside the user's normal activity pattern.
  • A risk score is assigned to the user based on that behavior.
  • The access request and the anomaly notification are bundled together and sent to a second user (an approver) for a decision.
  • Depending on the decision, access is granted, adjusted, or revoked — and the system continues monitoring afterward.

The continuous monitoring piece is notable. After access is granted, the system can downgrade permissions dynamically if behavior continues to look suspicious — even before a human manually intervenes. This is sometimes called adaptive access control (access levels that shift in response to live signals rather than being set-and-forget).

The patent explicitly covers both human identities (employees, contractors) and non-human identities (service accounts, APIs, bots) — a distinction that's increasingly important as enterprises run large fleets of automated workloads alongside their human workforce.

What this means for enterprise zero-trust security

Most enterprise access management today is still fairly static: you get a role, you keep it until someone manually revokes it. That gap — between when a threat appears and when access is actually cut — is where a lot of breaches happen. Microsoft's approach closes that window by making the approval workflow itself risk-aware, so approvers aren't flying blind.

For you as an end user inside a large organization, this could mean fewer surprise lockouts (because the system is more surgical) but also faster automatic downgrades if your account shows signs of compromise. For security teams, it's a meaningful step toward zero-trust architecture — the model where no identity, human or machine, is trusted by default, ever.

Editorial take

This is solid, unsexy enterprise security work — exactly the kind of infrastructure Microsoft needs to keep Entra ID (its identity platform) competitive with CrowdStrike and Okta. The non-human identity angle is genuinely timely; service account sprawl is a real and underappreciated attack surface. Don't expect a flashy product announcement, but do expect pieces of this to quietly show up in Microsoft Entra or Defender for Cloud.

Get one Big Tech patent every Sunday

Plain English, intelligent commentary, no hype. Free.

Source. Full patent text and figures from the official USPTO publication PDF.

Editorial commentary on a publicly published patent application. Not legal advice. Patentlyze may earn a commission if you click an affiliate link and make a purchase. This doesn't affect what we cover or how we cover it.