SG10201909133YA - Systems and methods for matching and scoring sameness - Google Patents
Systems and methods for matching and scoring samenessInfo
- Publication number
- SG10201909133YA SG10201909133YA SG10201909133YA SG10201909133YA SG 10201909133Y A SG10201909133Y A SG 10201909133YA SG 10201909133Y A SG10201909133Y A SG 10201909133YA SG 10201909133Y A SG10201909133Y A SG 10201909133YA
- Authority
- SG
- Singapore
- Prior art keywords
- degree
- degree anchor
- matching
- systems
- methods
- Prior art date
Links
- 230000003993 interaction Effects 0.000 abstract 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
- G06F16/2228—Indexing structures
- G06F16/2255—Hash tables
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2457—Query processing with adaptation to user needs
- G06F16/24578—Query processing with adaptation to user needs using ranking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/28—Databases characterised by their database models, e.g. relational or object models
- G06F16/284—Relational databases
- G06F16/285—Clustering or classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/953—Querying, e.g. by the use of web search engines
- G06F16/9535—Search customisation based on user profiles and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/06—Arrangements for sorting, selecting, merging, or comparing data on individual record carriers
- G06F7/08—Sorting, i.e. grouping record carriers in numerical or other ordered sequence according to the classification of at least some of the information they carry
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/20—Network management software packages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/12—Network monitoring probes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/16—Threshold monitoring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/2866—Architectures; Arrangements
- H04L67/30—Profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/2866—Architectures; Arrangements
- H04L67/30—Profiles
- H04L67/303—Terminal profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/535—Tracking the activity of the user
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2145—Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/144—Detection or countermeasures against botnets
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Databases & Information Systems (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Data Mining & Analysis (AREA)
- Biomedical Technology (AREA)
- Social Psychology (AREA)
- Bioethics (AREA)
- Computational Linguistics (AREA)
- Computer And Data Communications (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
- Telephonic Communication Services (AREA)
- Information Transfer Between Computers (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Image Analysis (AREA)
- Apparatus For Radiation Diagnosis (AREA)
- Image Processing (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Testing And Monitoring For Control Systems (AREA)
- Debugging And Monitoring (AREA)
- Push-Button Switches (AREA)
- Measuring Or Testing Involving Enzymes Or Micro-Organisms (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201562214969P | 2015-09-05 | 2015-09-05 |
Publications (1)
Publication Number | Publication Date |
---|---|
SG10201909133YA true SG10201909133YA (en) | 2019-11-28 |
Family
ID=58187372
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG10201909133Y SG10201909133YA (en) | 2015-09-05 | 2016-09-04 | Systems and methods for matching and scoring sameness |
Country Status (8)
Country | Link |
---|---|
US (14) | US20170070521A1 (de) |
EP (3) | EP3345099B1 (de) |
CN (3) | CN108885666B (de) |
AU (7) | AU2016315900B2 (de) |
CA (3) | CA2997583C (de) |
IL (3) | IL257849B2 (de) |
SG (1) | SG10201909133YA (de) |
WO (3) | WO2017037544A2 (de) |
Families Citing this family (194)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9842204B2 (en) | 2008-04-01 | 2017-12-12 | Nudata Security Inc. | Systems and methods for assessing security risk |
CA2924049C (en) | 2008-04-01 | 2019-10-29 | Nudata Security Inc. | Systems and methods for implementing and tracking identification tests |
US8938053B2 (en) * | 2012-10-15 | 2015-01-20 | Twilio, Inc. | System and method for triggering on platform usage |
US20140250033A1 (en) | 2013-03-01 | 2014-09-04 | RedOwl Analytics, Inc. | Social behavior hypothesis testing |
GB2526501A (en) | 2013-03-01 | 2015-11-25 | Redowl Analytics Inc | Modeling social behavior |
US11165770B1 (en) * | 2013-12-06 | 2021-11-02 | A10 Networks, Inc. | Biometric verification of a human internet user |
CA2966605A1 (en) * | 2014-11-03 | 2016-05-12 | Level 3 Communications, Llc | Identifying a potential ddos attack using statistical analysis |
US10884891B2 (en) * | 2014-12-11 | 2021-01-05 | Micro Focus Llc | Interactive detection of system anomalies |
US9626680B1 (en) * | 2015-01-05 | 2017-04-18 | Kimbia, Inc. | System and method for detecting malicious payment transaction activity using aggregate views of payment transaction data in a distributed network environment |
US10866994B2 (en) * | 2015-06-23 | 2020-12-15 | Splunk Inc. | Systems and methods for instant crawling, curation of data sources, and enabling ad-hoc search |
US11042591B2 (en) | 2015-06-23 | 2021-06-22 | Splunk Inc. | Analytical search engine |
CZ2015471A3 (cs) * | 2015-07-07 | 2016-09-29 | Aducid S.R.O. | Způsob přiřazení alespoň dvou autentizačních zařízení k účtu jednoho uživatele pomocí autentizačního serveru |
US20170070521A1 (en) | 2015-09-05 | 2017-03-09 | Nudata Security Inc. | Systems and methods for detecting and scoring anomalies |
US10671337B2 (en) | 2015-09-25 | 2020-06-02 | Oracle International Corporation | Automatic sizing of agent's screen for html co-browsing applications |
US11657399B1 (en) * | 2015-10-06 | 2023-05-23 | Wells Fargo Bank, N.A. | Value-added services provided in a seamless life format |
US10346421B1 (en) * | 2015-10-16 | 2019-07-09 | Trifacta Inc. | Data profiling of large datasets |
US9985980B1 (en) * | 2015-12-15 | 2018-05-29 | EMC IP Holding Company LLC | Entropy-based beaconing detection |
US9967275B1 (en) * | 2015-12-17 | 2018-05-08 | EMC IP Holding Company LLC | Efficient detection of network anomalies |
US11068798B2 (en) | 2016-02-09 | 2021-07-20 | Upside Services, Inc | Systems and methods for short identifier behavioral analytics |
EP3430767B1 (de) * | 2016-03-16 | 2020-09-23 | Telefonaktiebolaget LM Ericsson (PUBL) | Verfahren und vorrichtung zur verarbeitung von echtzeit-netzwerkereignissen |
US10148683B1 (en) * | 2016-03-29 | 2018-12-04 | Microsoft Technology Licensing, Llc | ATO threat detection system |
US10469526B2 (en) | 2016-06-06 | 2019-11-05 | Paypal, Inc. | Cyberattack prevention system |
US10924479B2 (en) * | 2016-07-20 | 2021-02-16 | Aetna Inc. | System and methods to establish user profile using multiple channels |
US10165005B2 (en) * | 2016-09-07 | 2018-12-25 | Oracle International Corporation | System and method providing data-driven user authentication misuse detection |
US10769608B2 (en) * | 2016-09-15 | 2020-09-08 | International Business Machines Corporation | Intelligent checkout management system |
US10657146B2 (en) * | 2016-09-26 | 2020-05-19 | Splunk Inc. | Techniques for generating structured metrics from ingested events |
US10225731B2 (en) * | 2016-10-31 | 2019-03-05 | Mastercard International Incorporated | Anonymously linking cardholder information with communication service subscriber information |
US11074325B1 (en) * | 2016-11-09 | 2021-07-27 | Wells Fargo Bank, N.A. | Systems and methods for dynamic bio-behavioral authentication |
TWI622894B (zh) * | 2016-12-13 | 2018-05-01 | 宏碁股份有限公司 | 電子裝置及偵測惡意檔案的方法 |
CN108243115B (zh) * | 2016-12-26 | 2021-06-29 | 新华三技术有限公司 | 报文处理方法及装置 |
US10645086B1 (en) * | 2016-12-30 | 2020-05-05 | Charles Schwab & Co., Inc. | System and method for handling user requests for web services |
US9942255B1 (en) * | 2016-12-30 | 2018-04-10 | Google Llc | Method and system for detecting abusive behavior in hosted services |
US10419268B2 (en) * | 2017-01-27 | 2019-09-17 | Bmc Software, Inc. | Automated scoring of unstructured events in information technology environments |
US10574679B2 (en) * | 2017-02-01 | 2020-02-25 | Cisco Technology, Inc. | Identifying a security threat to a web-based resource |
US10305773B2 (en) * | 2017-02-15 | 2019-05-28 | Dell Products, L.P. | Device identity augmentation |
AU2018224839B2 (en) * | 2017-02-27 | 2021-12-09 | Ivanti, Inc. | Systems and methods for context-based mitigation of computer security risks |
US10503896B2 (en) | 2017-03-17 | 2019-12-10 | Chronicle Llc | Detecting data breaches |
US11093927B2 (en) * | 2017-03-29 | 2021-08-17 | International Business Machines Corporation | Sensory data collection in an augmented reality system |
US10402413B2 (en) * | 2017-03-31 | 2019-09-03 | Intel Corporation | Hardware accelerator for selecting data elements |
US10360391B2 (en) * | 2017-04-03 | 2019-07-23 | International Business Machines Corporation | Verifiable keyed all-or-nothing transform |
US11315010B2 (en) | 2017-04-17 | 2022-04-26 | Splunk Inc. | Neural networks for detecting fraud based on user behavior biometrics |
US11102225B2 (en) * | 2017-04-17 | 2021-08-24 | Splunk Inc. | Detecting fraud by correlating user behavior biometrics with other data sources |
US11372956B2 (en) | 2017-04-17 | 2022-06-28 | Splunk Inc. | Multiple input neural networks for detecting fraud |
US9990487B1 (en) | 2017-05-05 | 2018-06-05 | Mastercard Technologies Canada ULC | Systems and methods for distinguishing among human users and software robots |
US10007776B1 (en) | 2017-05-05 | 2018-06-26 | Mastercard Technologies Canada ULC | Systems and methods for distinguishing among human users and software robots |
US10127373B1 (en) | 2017-05-05 | 2018-11-13 | Mastercard Technologies Canada ULC | Systems and methods for distinguishing among human users and software robots |
US10038788B1 (en) * | 2017-05-09 | 2018-07-31 | Oracle International Corporation | Self-learning adaptive routing system |
US11888859B2 (en) | 2017-05-15 | 2024-01-30 | Forcepoint Llc | Associating a security risk persona with a phase of a cyber kill chain |
US10999296B2 (en) | 2017-05-15 | 2021-05-04 | Forcepoint, LLC | Generating adaptive trust profiles using information derived from similarly situated organizations |
US11394731B2 (en) * | 2017-05-16 | 2022-07-19 | Citrix Systems, Inc. | Computer system providing anomaly detection within a virtual computing sessions and related methods |
CN108966340B (zh) * | 2017-05-17 | 2020-10-13 | 腾讯科技(深圳)有限公司 | 一种设备定位方法及装置 |
WO2018213325A1 (en) * | 2017-05-19 | 2018-11-22 | Liveramp, Inc. | Distributed node cluster for establishing a digital touchpoint across multiple devices on a digital communications network |
US10567421B2 (en) * | 2017-05-24 | 2020-02-18 | Oath Inc. | Systems and methods for analyzing network data to identify human and non-human users in network communications |
US11095678B2 (en) * | 2017-07-12 | 2021-08-17 | The Boeing Company | Mobile security countermeasures |
US11128643B2 (en) * | 2017-07-17 | 2021-09-21 | Hewlett-Packard Development Company, L.P. | Activity detection based on time difference metrics |
US10318729B2 (en) | 2017-07-26 | 2019-06-11 | Forcepoint, LLC | Privacy protection during insider threat monitoring |
US10601849B2 (en) * | 2017-08-24 | 2020-03-24 | Level 3 Communications, Llc | Low-complexity detection of potential network anomalies using intermediate-stage processing |
US10984427B1 (en) * | 2017-09-13 | 2021-04-20 | Palantir Technologies Inc. | Approaches for analyzing entity relationships |
US10601864B1 (en) * | 2017-10-05 | 2020-03-24 | Symantec Corporation | Using disposable profiles for privacy in internet sessions |
US11503015B2 (en) | 2017-10-12 | 2022-11-15 | Mx Technologies, Inc. | Aggregation platform portal for displaying and updating data for third-party service providers |
US10803178B2 (en) | 2017-10-31 | 2020-10-13 | Forcepoint Llc | Genericized data model to perform a security analytics operation |
US11184369B2 (en) * | 2017-11-13 | 2021-11-23 | Vectra Networks, Inc. | Malicious relay and jump-system detection using behavioral indicators of actors |
US11682016B2 (en) * | 2017-11-30 | 2023-06-20 | Mastercard International Incorporated | System to perform identity verification |
US10965683B1 (en) | 2017-12-07 | 2021-03-30 | Wells Fargo Bank, N.A. | Login and authentication methods and systems |
US11349869B1 (en) * | 2017-12-22 | 2022-05-31 | Spins Ventures Llc | Network device detection and verification protocol |
FR3076922A1 (fr) * | 2018-01-12 | 2019-07-19 | Ingenico Group | Procede de determination d’une association entre une carte bancaire et un terminal de communication, dispositif, systeme et programme correspondant |
US11941491B2 (en) | 2018-01-31 | 2024-03-26 | Sophos Limited | Methods and apparatus for identifying an impact of a portion of a file on machine learning classification of malicious content |
US10719613B1 (en) * | 2018-02-23 | 2020-07-21 | Facebook, Inc. | Systems and methods for protecting neural network weights |
US10699190B1 (en) * | 2018-03-04 | 2020-06-30 | Facebook, Inc. | Systems and methods for efficiently updating neural networks |
US11354617B1 (en) | 2018-03-12 | 2022-06-07 | Amazon Technologies, Inc. | Managing shipments based on data from a sensor-based automatic replenishment device |
US11137479B1 (en) | 2018-03-20 | 2021-10-05 | Amazon Technologies, Inc. | Product specific correction for a sensor-based device |
US10373118B1 (en) | 2018-03-21 | 2019-08-06 | Amazon Technologies, Inc. | Predictive consolidation system based on sensor data |
US20190306170A1 (en) * | 2018-03-30 | 2019-10-03 | Yanlin Wang | Systems and methods for adaptive data collection using analytics agents |
US11144921B2 (en) * | 2018-04-05 | 2021-10-12 | The Toronto-Dominion Bank | Generation and provisioning of digital tokens based on dynamically obtained contextual data |
US11314787B2 (en) | 2018-04-18 | 2022-04-26 | Forcepoint, LLC | Temporal resolution of an entity |
US11361011B1 (en) * | 2018-04-26 | 2022-06-14 | Amazon Technologies, Inc. | Sensor-related improvements to automatic replenishment devices |
US11019059B2 (en) * | 2018-04-26 | 2021-05-25 | Radware, Ltd | Blockchain-based admission processes for protected entities |
US11102190B2 (en) | 2018-04-26 | 2021-08-24 | Radware Ltd. | Method and system for blockchain based cyber protection of network entities |
CN110535809B (zh) * | 2018-05-25 | 2021-08-31 | 腾讯科技(深圳)有限公司 | 一种标识码的拉取方法、存储介质及终端设备和服务器 |
GB2574209B (en) * | 2018-05-30 | 2020-12-16 | F Secure Corp | Controlling Threats on a Computer System by Searching for Matching Events on other Endpoints |
US20200007565A1 (en) * | 2018-07-02 | 2020-01-02 | Ebay Inc. | Passive automated content entry detection system |
US10860712B2 (en) * | 2018-07-11 | 2020-12-08 | Vmware, Inc. | Entropy based security detection system |
US11810012B2 (en) | 2018-07-12 | 2023-11-07 | Forcepoint Llc | Identifying event distributions using interrelated events |
US11755584B2 (en) | 2018-07-12 | 2023-09-12 | Forcepoint Llc | Constructing distributions of interrelated event features |
US10949428B2 (en) | 2018-07-12 | 2021-03-16 | Forcepoint, LLC | Constructing event distributions via a streaming scoring operation |
US11436512B2 (en) | 2018-07-12 | 2022-09-06 | Forcepoint, LLC | Generating extracted features from an event |
US11025638B2 (en) | 2018-07-19 | 2021-06-01 | Forcepoint, LLC | System and method providing security friction for atypical resource access requests |
US11005971B2 (en) * | 2018-08-02 | 2021-05-11 | Paul Swengler | System and method for user device authentication or identity validation without passwords or matching tokens |
US11157837B2 (en) | 2018-08-02 | 2021-10-26 | Sas Institute Inc. | Advanced detection of rare events and corresponding interactive graphical user interface |
US11017100B2 (en) * | 2018-08-03 | 2021-05-25 | Verizon Patent And Licensing Inc. | Identity fraud risk engine platform |
US10715471B2 (en) * | 2018-08-22 | 2020-07-14 | Synchronoss Technologies, Inc. | System and method for proof-of-work based on hash mining for reducing spam attacks |
US11811799B2 (en) | 2018-08-31 | 2023-11-07 | Forcepoint Llc | Identifying security risks using distributions of characteristic features extracted from a plurality of events |
US10997290B2 (en) * | 2018-10-03 | 2021-05-04 | Paypal, Inc. | Enhancing computer security via detection of inconsistent internet browser versions |
CN112823502B (zh) * | 2018-10-03 | 2023-07-25 | 维萨国际服务协会 | 针对资源访问规则配置的实时反馈服务 |
US11010257B2 (en) * | 2018-10-12 | 2021-05-18 | EMC IP Holding Company LLC | Memory efficient perfect hashing for large records |
US11947668B2 (en) | 2018-10-12 | 2024-04-02 | Sophos Limited | Methods and apparatus for preserving information between layers within a neural network |
US11025659B2 (en) | 2018-10-23 | 2021-06-01 | Forcepoint, LLC | Security system using pseudonyms to anonymously identify entities and corresponding security risk related behaviors |
US11558409B2 (en) * | 2018-10-31 | 2023-01-17 | SpyCloud, Inc. | Detecting use of passwords that appear in a repository of breached credentials |
US11171980B2 (en) | 2018-11-02 | 2021-11-09 | Forcepoint Llc | Contagion risk detection, analysis and protection |
US10904616B2 (en) * | 2018-11-06 | 2021-01-26 | International Business Machines Corporation | Filtering of content in near real time |
US11620180B2 (en) | 2018-11-29 | 2023-04-04 | Vmware, Inc. | Holo-entropy adaptive boosting based anomaly detection |
US11258655B2 (en) | 2018-12-06 | 2022-02-22 | Vmware, Inc. | Holo-entropy based alarm scoring approach |
CN109685670A (zh) * | 2018-12-13 | 2019-04-26 | 平安医疗健康管理股份有限公司 | 社保违规检测方法、装置、设备及计算机可读存储介质 |
US11743290B2 (en) * | 2018-12-21 | 2023-08-29 | Fireeye Security Holdings Us Llc | System and method for detecting cyberattacks impersonating legitimate sources |
US10885180B2 (en) | 2018-12-21 | 2021-01-05 | Paypal, Inc. | Detection of emulated computer systems using variable difficulty challenges |
RU2724783C1 (ru) * | 2018-12-28 | 2020-06-25 | Акционерное общество "Лаборатория Касперского" | Система и способ отбора кандидатов для сравнения отпечатков устройств |
CN109738220B (zh) * | 2019-01-07 | 2021-01-08 | 哈尔滨工业大学(深圳) | 一种基于多荷载工况结构响应关联的传感器优化布置方法 |
CA3132057A1 (en) * | 2019-03-01 | 2020-09-10 | Mastercard Technologies Canada ULC | Multi-page online application origination (oao) service for fraud prevention systems |
EP3912037A1 (de) * | 2019-03-04 | 2021-11-24 | Huawei Technologies Co., Ltd. | Automatisierte grundursachenanalyse für verteilte systeme unter verwendung von verfolgungsdaten |
RU2747474C2 (ru) * | 2019-03-29 | 2021-05-05 | Акционерное общество "Лаборатория Касперского" | Способ асинхронного выбора совместимых продуктов |
US11037428B2 (en) * | 2019-03-27 | 2021-06-15 | International Business Machines Corporation | Detecting and analyzing actions against a baseline |
US11171978B2 (en) * | 2019-03-27 | 2021-11-09 | Microsoft Technology Licensing, Llc. | Dynamic monitoring, detection of emerging computer events |
US11886888B2 (en) * | 2019-03-28 | 2024-01-30 | Lenovo (Singapore) Pte. Ltd. | Reduced application view during loading |
US20220027438A1 (en) * | 2019-04-04 | 2022-01-27 | Hewlett-Packard Development Company, L.P. | Determining whether received data is required by an analytic |
US11475125B2 (en) * | 2019-05-01 | 2022-10-18 | EMC IP Holding Company LLC | Distribution-based aggregation of scores across multiple events |
CN110222525B (zh) * | 2019-05-14 | 2021-08-06 | 新华三大数据技术有限公司 | 数据库操作审计方法、装置、电子设备及存储介质 |
US11245724B2 (en) * | 2019-06-07 | 2022-02-08 | Paypal, Inc. | Spoofed webpage detection |
US11550891B2 (en) | 2019-06-19 | 2023-01-10 | Preventice Solutions, Inc. | Login token management |
US11178163B2 (en) * | 2019-07-02 | 2021-11-16 | Easy Solutions Enterprises Corp. | Location spoofing detection using round-trip times |
US10498760B1 (en) * | 2019-07-16 | 2019-12-03 | ALSCO Software LLC | Monitoring system for detecting and preventing a malicious program code from being uploaded from a client computer to a webpage computer server |
EP4004792A4 (de) * | 2019-07-24 | 2023-03-29 | Hewlett-Packard Development Company, L.P. | Zugangsregelung von peripherievorrichtungen |
US11700247B2 (en) * | 2019-07-30 | 2023-07-11 | Slack Technologies, Llc | Securing a group-based communication system via identity verification |
US11086991B2 (en) * | 2019-08-07 | 2021-08-10 | Advanced New Technologies Co., Ltd. | Method and system for active risk control based on intelligent interaction |
EP4010829A4 (de) * | 2019-08-09 | 2023-09-06 | Mastercard Technologies Canada ULC | Bestimmung des betrugsrisikos im zusammenhang mit einer transaktion |
CN110505232A (zh) * | 2019-08-27 | 2019-11-26 | 百度在线网络技术(北京)有限公司 | 网络攻击的检测方法及装置、电子设备、存储介质 |
US11269987B2 (en) | 2019-09-09 | 2022-03-08 | International Business Machines Corporation | Security credentials management for client applications |
CN110599135B (zh) * | 2019-09-16 | 2024-05-28 | 腾讯科技(深圳)有限公司 | 评价用户的第三方支付账号的方法、装置及电子设备 |
US11297084B2 (en) * | 2019-09-30 | 2022-04-05 | Mcafee, Llc | Methods and apparatus to perform malware detection using a generative adversarial network |
US11928683B2 (en) | 2019-10-01 | 2024-03-12 | Mastercard Technologies Canada ULC | Feature encoding in online application origination (OAO) service for a fraud prevention system |
US11475515B1 (en) * | 2019-10-11 | 2022-10-18 | Wells Fargo Bank, N.A. | Adverse action methodology for credit risk models |
US12088473B2 (en) | 2019-10-23 | 2024-09-10 | Aryaka Networks, Inc. | Method, device and system for enhancing predictive classification of anomalous events in a cloud-based application acceleration as a service environment |
US12019784B2 (en) * | 2019-10-30 | 2024-06-25 | EMC IP Holding Company LLC | Privacy preserving evaluation of sensitive user features for anomaly detection |
US12047373B2 (en) | 2019-11-05 | 2024-07-23 | Salesforce.Com, Inc. | Monitoring resource utilization of an online system based on browser attributes collected for a session |
US11451396B2 (en) * | 2019-11-05 | 2022-09-20 | Microsoft Technology Licensing, Llc | False positive reduction in electronic token forgery detection |
CN110851839B (zh) * | 2019-11-12 | 2022-03-11 | 杭州安恒信息技术股份有限公司 | 基于风险的资产评分方法和系统 |
US11711323B2 (en) * | 2019-11-20 | 2023-07-25 | Medallia, Inc. | Systems and methods for managing bot-generated interactions |
US11368464B2 (en) * | 2019-11-28 | 2022-06-21 | Salesforce.Com, Inc. | Monitoring resource utilization of an online system based on statistics describing browser attributes |
US12069089B2 (en) * | 2019-12-03 | 2024-08-20 | Microsoft Technology Licensing, Llc | System for calculating trust of client session(s) |
US11075905B2 (en) * | 2019-12-09 | 2021-07-27 | Google Llc | Requesting and transmitting data for related accounts |
US11423406B2 (en) * | 2019-12-16 | 2022-08-23 | Paypal, Inc. | Multi-tiered approach to detect and mitigate online electronic attacks |
US11956252B2 (en) * | 2019-12-16 | 2024-04-09 | Armis Security Ltd. | Techniques for resolving contradictory device profiling data |
US11444961B2 (en) * | 2019-12-20 | 2022-09-13 | Intel Corporation | Active attack detection in autonomous vehicle networks |
US11381570B2 (en) * | 2019-12-20 | 2022-07-05 | Beijing Didi Infinity Technology And Development Co., Ltd. | Identity and access management dynamic control and remediation |
CN110995763B (zh) * | 2019-12-26 | 2022-08-05 | 深信服科技股份有限公司 | 一种数据处理方法、装置、电子设备和计算机存储介质 |
US11570197B2 (en) | 2020-01-22 | 2023-01-31 | Forcepoint Llc | Human-centric risk modeling framework |
US11630901B2 (en) | 2020-02-03 | 2023-04-18 | Forcepoint Llc | External trigger induced behavioral analyses |
US11394582B2 (en) | 2020-02-04 | 2022-07-19 | 360 It, Uab | Multi-part TCP connection over VPN |
US11863567B2 (en) * | 2020-02-04 | 2024-01-02 | Fastly, Inc. | Management of bot detection in a content delivery network |
US11050587B1 (en) | 2020-02-04 | 2021-06-29 | 360 It, Uab | Multi-part TCP connection over VPN |
US11736505B2 (en) | 2020-02-07 | 2023-08-22 | Mastercard Technologies Canada ULC | Automated web traffic anomaly detection |
RU2740027C1 (ru) * | 2020-02-12 | 2020-12-30 | Варити Менеджмент Сервисез Лимитед | Способ и система предотвращения вредоносных автоматизированных атак |
US11080109B1 (en) | 2020-02-27 | 2021-08-03 | Forcepoint Llc | Dynamically reweighting distributions of event observations |
US11429697B2 (en) | 2020-03-02 | 2022-08-30 | Forcepoint, LLC | Eventually consistent entity resolution |
US11836265B2 (en) | 2020-03-02 | 2023-12-05 | Forcepoint Llc | Type-dependent event deduplication |
US11080032B1 (en) | 2020-03-31 | 2021-08-03 | Forcepoint Llc | Containerized infrastructure for deployment of microservices |
CN111581641B (zh) * | 2020-04-03 | 2022-07-29 | 北京大学 | 一种基于Hook的轻量级WebAPI保护方法和装置 |
US11568136B2 (en) | 2020-04-15 | 2023-01-31 | Forcepoint Llc | Automatically constructing lexicons from unlabeled datasets |
CN111506819B (zh) * | 2020-04-24 | 2023-05-16 | 成都安易迅科技有限公司 | 一种硬件设备推荐方法、装置,服务器及存储介质 |
US11748460B2 (en) * | 2020-04-27 | 2023-09-05 | Imperva, Inc. | Procedural code generation for challenge code |
TWI734456B (zh) * | 2020-04-29 | 2021-07-21 | 正修學校財團法人正修科技大學 | 製程能力評估方法 |
US11451562B2 (en) | 2020-05-01 | 2022-09-20 | Mastercard Technologies Canada ULC | Recommending signals to monitor in a fraud prevention application |
US11516206B2 (en) | 2020-05-01 | 2022-11-29 | Forcepoint Llc | Cybersecurity system having digital certificate reputation system |
US20210342441A1 (en) * | 2020-05-01 | 2021-11-04 | Forcepoint, LLC | Progressive Trigger Data and Detection Model |
US11544390B2 (en) | 2020-05-05 | 2023-01-03 | Forcepoint Llc | Method, system, and apparatus for probabilistic identification of encrypted files |
US11895158B2 (en) | 2020-05-19 | 2024-02-06 | Forcepoint Llc | Cybersecurity system having security policy visualization |
US11290480B2 (en) | 2020-05-26 | 2022-03-29 | Bank Of America Corporation | Network vulnerability assessment tool |
CN111385313B (zh) * | 2020-05-28 | 2020-09-11 | 支付宝(杭州)信息技术有限公司 | 一种对象请求合法性验证的方法和系统 |
US11456917B2 (en) * | 2020-06-01 | 2022-09-27 | Cisco Technology, Inc. | Analyzing deployed networks with respect to network solutions |
US11574071B2 (en) | 2020-07-28 | 2023-02-07 | Bank Of America Corporation | Reliability of information security controls for attack readiness |
US11704387B2 (en) | 2020-08-28 | 2023-07-18 | Forcepoint Llc | Method and system for fuzzy matching and alias matching for streaming data sets |
US11019031B1 (en) | 2020-09-22 | 2021-05-25 | Netskope, Inc. | Client software connection inspection and access control |
US11789982B2 (en) * | 2020-09-23 | 2023-10-17 | Electronic Arts Inc. | Order independent data categorization, indication, and remediation across realtime datasets of live service environments |
CN112016939B (zh) * | 2020-10-19 | 2021-02-26 | 耀方信息技术(上海)有限公司 | 一种自动维护用户系统 |
US11190589B1 (en) | 2020-10-27 | 2021-11-30 | Forcepoint, LLC | System and method for efficient fingerprinting in cloud multitenant data loss prevention |
US11157614B1 (en) * | 2021-01-27 | 2021-10-26 | Malwarebytes Inc. | Prevention of false positive detection of malware |
US20220269662A1 (en) * | 2021-02-22 | 2022-08-25 | Mastercard Technologies Canada ULC | Event interval approximation |
US12002459B2 (en) * | 2021-02-24 | 2024-06-04 | International Business Machines Corporation | Autonomous communication initiation responsive to pattern detection |
US12010129B2 (en) * | 2021-04-23 | 2024-06-11 | Sophos Limited | Methods and apparatus for using machine learning to classify malicious infrastructure |
US20220366039A1 (en) * | 2021-05-13 | 2022-11-17 | Microsoft Technology Licensing, Llc | Abnormally permissive role definition detection systems |
US12026248B2 (en) | 2021-06-10 | 2024-07-02 | Armis Security Ltd. | Techniques for securing network environments by identifying device attributes based on string field conventions |
US20230007017A1 (en) * | 2021-06-30 | 2023-01-05 | Fortinet, Inc. | Enforcing javascript for mitb detection |
US11847598B2 (en) * | 2021-08-13 | 2023-12-19 | Edgeverve Systems Limited | Method and system for analyzing process flows for a process performed by users |
US12111919B2 (en) | 2021-08-23 | 2024-10-08 | Fortinet, Inc. | Systems and methods for quantifying file access risk exposure by an endpoint in a network environment |
US11997206B2 (en) | 2021-09-22 | 2024-05-28 | Radware, Ltd. | Techniques for protecting web-access |
US11461492B1 (en) * | 2021-10-15 | 2022-10-04 | Infosum Limited | Database system with data security employing knowledge partitioning |
CN114254308B (zh) * | 2021-12-22 | 2024-08-13 | 安天科技集团股份有限公司 | 物联网设备的威胁检测方法、装置、电子设备及存储介质 |
TWI789271B (zh) | 2022-03-16 | 2023-01-01 | 中原大學 | 封包資訊分析方法及網路流量監測裝置 |
US20230368115A1 (en) * | 2022-05-11 | 2023-11-16 | The Boeing Company | System and method for predictive product quality assessment |
US11995658B2 (en) * | 2022-05-25 | 2024-05-28 | Dell Products L.P. | Machine learning-based detection of potentially malicious behavior on an e-commerce platform |
US20230394136A1 (en) * | 2022-06-01 | 2023-12-07 | Armis Security Ltd. | System and method for device attribute identification based on queries of interest |
US20240013270A1 (en) * | 2022-07-07 | 2024-01-11 | Walmart Apollo, Llc | System and method for implementing an edge queuing platform |
US12118020B2 (en) | 2022-07-20 | 2024-10-15 | The Toronto-Dominion Bank | System and method for generating a graphical user interface to track, analyze and interpret a big data dataset |
US11693958B1 (en) * | 2022-09-08 | 2023-07-04 | Radiant Security, Inc. | Processing and storing event data in a knowledge graph format for anomaly detection |
US12028359B1 (en) * | 2023-10-25 | 2024-07-02 | Coalition, Inc. | Method of ranking and address network threats |
Family Cites Families (132)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5774525A (en) | 1995-01-23 | 1998-06-30 | International Business Machines Corporation | Method and apparatus utilizing dynamic questioning to provide secure access control |
US5892900A (en) | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5761652A (en) * | 1996-03-20 | 1998-06-02 | International Business Machines Corporation | Constructing balanced multidimensional range-based bitmap indices |
US5940751A (en) | 1996-06-27 | 1999-08-17 | Cellular Technical Services Company, Inc. | System and method for detection of fraud in a wireless telephone system |
US6272631B1 (en) * | 1997-06-30 | 2001-08-07 | Microsoft Corporation | Protected storage of core data secrets |
US7403922B1 (en) | 1997-07-28 | 2008-07-22 | Cybersource Corporation | Method and apparatus for evaluating fraud risk in an electronic commerce transaction |
US5870752A (en) * | 1997-08-21 | 1999-02-09 | Lucent Technologies Inc. | Incremental maintenance of an approximate histogram in a database system |
US20050114705A1 (en) | 1997-12-11 | 2005-05-26 | Eran Reshef | Method and system for discriminating a human action from a computerized action |
US6829711B1 (en) | 1999-01-26 | 2004-12-07 | International Business Machines Corporation | Personal website for electronic commerce on a smart java card with multiple security check points |
US20010020228A1 (en) * | 1999-07-09 | 2001-09-06 | International Business Machines Corporation | Umethod, system and program for managing relationships among entities to exchange encryption keys for use in providing access and authorization to resources |
US7159237B2 (en) * | 2000-03-16 | 2007-01-02 | Counterpane Internet Security, Inc. | Method and system for dynamic network intrusion monitoring, detection and response |
WO2001080525A1 (en) | 2000-04-14 | 2001-10-25 | Sun Microsystems, Inc. | Network access security |
AU2002228700A1 (en) | 2000-11-02 | 2002-05-15 | Cybersource Corporation | Method and apparatus for evaluating fraud risk in an electronic commerce transaction |
FI20002814A0 (fi) | 2000-12-21 | 2000-12-21 | Nokia Mobile Phones Ltd | Asiayhteyspohjainen tiedonsiirronvarmistamismenetelmä ja järjestely, tiedonsiirtoverkko sekä tiedonsiirtoverkon päätelaite |
US20040006532A1 (en) | 2001-03-20 | 2004-01-08 | David Lawrence | Network access risk management |
US7142651B2 (en) | 2001-11-29 | 2006-11-28 | Ectel Ltd. | Fraud detection in a distributed telecommunications networks |
ATE374493T1 (de) | 2002-03-29 | 2007-10-15 | Global Dataguard Inc | Adaptive verhaltensbezogene eindringdetektion |
US20040030764A1 (en) * | 2002-08-08 | 2004-02-12 | International Business Machines Corporation | Identity assertion token principal mapping for common secure interoperability |
US8201252B2 (en) | 2002-09-03 | 2012-06-12 | Alcatel Lucent | Methods and devices for providing distributed, adaptive IP filtering against distributed denial of service attacks |
US20040215574A1 (en) | 2003-04-25 | 2004-10-28 | First Data Corporation | Systems and methods for verifying identities in transactions |
US20040254793A1 (en) | 2003-06-12 | 2004-12-16 | Cormac Herley | System and method for providing an audio challenge to distinguish a human from a computer |
US20050039057A1 (en) * | 2003-07-24 | 2005-02-17 | Amit Bagga | Method and apparatus for authenticating a user using query directed passwords |
EP1664687A4 (de) | 2003-09-12 | 2009-01-14 | Rsa Security Inc | System und verfahren zur authentifikation auf risikobasis |
WO2005032111A1 (en) * | 2003-10-02 | 2005-04-07 | Viralg Oy | Limiting use of unauthorized digital content in a content-sharing peer-to-peer network |
US8578462B2 (en) * | 2003-12-12 | 2013-11-05 | Avaya Inc. | Method and system for secure session management in a web farm |
US20050144067A1 (en) | 2003-12-19 | 2005-06-30 | Palo Alto Research Center Incorporated | Identifying and reporting unexpected behavior in targeted advertising environment |
US8782405B2 (en) | 2004-03-18 | 2014-07-15 | International Business Machines Corporation | Providing transaction-level security |
US8572254B2 (en) * | 2004-04-08 | 2013-10-29 | Worldextend, Llc | Systems and methods for establishing and validating secure network sessions |
WO2005119648A2 (en) | 2004-06-01 | 2005-12-15 | Dna Digital Media Group | Character branding employing voice and speech recognition technology |
AU2005277198A1 (en) | 2004-08-18 | 2006-03-02 | Mastercard International Incorporated | Method and system for authorizing a transaction using a dynamic authorization code |
US20080010678A1 (en) | 2004-09-17 | 2008-01-10 | Jeff Burdette | Authentication Proxy |
US9535679B2 (en) * | 2004-12-28 | 2017-01-03 | International Business Machines Corporation | Dynamically optimizing applications within a deployment server |
US20060230039A1 (en) | 2005-01-25 | 2006-10-12 | Markmonitor, Inc. | Online identity tracking |
US20060212925A1 (en) | 2005-03-02 | 2006-09-21 | Markmonitor, Inc. | Implementing trust policies |
US20060206941A1 (en) | 2005-03-08 | 2006-09-14 | Praesidium Technologies, Ltd. | Communications system with distributed risk management |
US7630924B1 (en) | 2005-04-20 | 2009-12-08 | Authorize.Net Llc | Transaction velocity counting for fraud detection |
EP1875653B1 (de) | 2005-04-29 | 2018-12-12 | Oracle International Corporation | System und verfahren zur überwachung, entdeckung und abgestuften authentifizierung von betrugshandlungen |
US8578500B2 (en) | 2005-05-31 | 2013-11-05 | Kurt James Long | System and method of fraud and misuse detection |
US7945952B1 (en) | 2005-06-30 | 2011-05-17 | Google Inc. | Methods and apparatuses for presenting challenges to tell humans and computers apart |
GB2429094B (en) | 2005-08-09 | 2010-08-25 | Royal Bank Of Scotland Group P | Online transaction systems and methods |
US8082349B1 (en) | 2005-10-21 | 2011-12-20 | Entrust, Inc. | Fraud protection using business process-based customer intent analysis |
US8392963B2 (en) | 2005-11-28 | 2013-03-05 | Imperva, Inc. | Techniques for tracking actual users in web application security systems |
US20070124201A1 (en) | 2005-11-30 | 2007-05-31 | Hu Hubert C | Digital content access system and methods |
US8549651B2 (en) | 2007-02-02 | 2013-10-01 | Facebook, Inc. | Determining a trust level in a social network environment |
US20070140131A1 (en) | 2005-12-15 | 2007-06-21 | Malloy Patrick J | Interactive network monitoring and analysis |
US20070162761A1 (en) * | 2005-12-23 | 2007-07-12 | Davis Bruce L | Methods and Systems to Help Detect Identity Fraud |
US20070226053A1 (en) | 2006-03-21 | 2007-09-27 | Kevin Carl | System for uploading video advertisements, solicit user feedback, and create ratings/rankings |
US7818264B2 (en) | 2006-06-19 | 2010-10-19 | Visa U.S.A. Inc. | Track data encryption |
US8650080B2 (en) | 2006-04-10 | 2014-02-11 | International Business Machines Corporation | User-browser interaction-based fraud detection system |
US8001597B2 (en) | 2006-05-15 | 2011-08-16 | Fair Isaac Corporation | Comprehensive online fraud detection system and method |
US20080082662A1 (en) | 2006-05-19 | 2008-04-03 | Richard Dandliker | Method and apparatus for controlling access to network resources based on reputation |
US7680891B1 (en) | 2006-06-19 | 2010-03-16 | Google Inc. | CAPTCHA-based spam control for content creation systems |
US8601538B2 (en) | 2006-08-22 | 2013-12-03 | Fuji Xerox Co., Ltd. | Motion and interaction based CAPTCHA |
US20080049969A1 (en) | 2006-08-25 | 2008-02-28 | Jason David Koziol | Methods And Systems For Generating A Symbol Identification Challenge For An Automated Agent |
US8145560B2 (en) | 2006-11-14 | 2012-03-27 | Fmr Llc | Detecting fraudulent activity on a network |
US20080133348A1 (en) | 2006-12-01 | 2008-06-05 | Yahoo! Inc. | System and method for delivering online advertisements using captchas |
US20080133321A1 (en) | 2006-12-01 | 2008-06-05 | Yahoo! Inc. | System and method for measuring awareness of online advertising using captchas |
US20080133347A1 (en) | 2006-12-01 | 2008-06-05 | Yahoo! Inc. | System and method for providing semantic captchas for online advertising |
US7523016B1 (en) | 2006-12-29 | 2009-04-21 | Google Inc. | Detecting anomalies |
US8788419B2 (en) * | 2006-12-30 | 2014-07-22 | First Data Corporation | Method and system for mitigating risk of fraud in internet banking |
US20110047605A1 (en) | 2007-02-06 | 2011-02-24 | Vidoop, Llc | System And Method For Authenticating A User To A Computer System |
WO2008121945A2 (en) | 2007-03-30 | 2008-10-09 | Netqos, Inc. | Statistical method and system for network anomaly detection |
US7620596B2 (en) | 2007-06-01 | 2009-11-17 | The Western Union Company | Systems and methods for evaluating financial transaction risk |
US8200959B2 (en) * | 2007-06-28 | 2012-06-12 | Cisco Technology, Inc. | Verifying cryptographic identity during media session initialization |
US20090012855A1 (en) | 2007-07-06 | 2009-01-08 | Yahoo! Inc. | System and method of using captchas as ads |
US7958228B2 (en) | 2007-07-11 | 2011-06-07 | Yahoo! Inc. | Behavioral predictions based on network activity locations |
US8510795B1 (en) | 2007-09-04 | 2013-08-13 | Google Inc. | Video-based CAPTCHA |
US8880435B1 (en) | 2007-10-26 | 2014-11-04 | Bank Of America Corporation | Detection and tracking of unauthorized computer access attempts |
US20090113294A1 (en) | 2007-10-30 | 2009-04-30 | Yahoo! Inc. | Progressive captcha |
US8352598B2 (en) | 2007-11-27 | 2013-01-08 | Inha-Industry Partnership Institute | Method of providing completely automated public turing test to tell computer and human apart based on image |
DE102008003531A1 (de) | 2008-01-08 | 2009-07-09 | Giesecke & Devrient Gmbh | Softwareidentifikation |
US20090249477A1 (en) | 2008-03-28 | 2009-10-01 | Yahoo! Inc. | Method and system for determining whether a computer user is human |
CA2924049C (en) | 2008-04-01 | 2019-10-29 | Nudata Security Inc. | Systems and methods for implementing and tracking identification tests |
US9842204B2 (en) | 2008-04-01 | 2017-12-12 | Nudata Security Inc. | Systems and methods for assessing security risk |
US20090328163A1 (en) | 2008-06-28 | 2009-12-31 | Yahoo! Inc. | System and method using streaming captcha for online verification |
US20100077482A1 (en) | 2008-09-23 | 2010-03-25 | Robert Edward Adams | Method and system for scanning electronic data for predetermined data patterns |
CN101482847B (zh) * | 2009-01-19 | 2011-06-29 | 北京邮电大学 | 一种基于安全漏洞缺陷模式的检测方法 |
KR101048991B1 (ko) | 2009-02-27 | 2011-07-12 | (주)다우기술 | 봇넷 행동 패턴 분석 시스템 및 방법 |
AU2010246085A1 (en) | 2009-05-04 | 2011-12-01 | Visa International Service Association | Determining targeted incentives based on consumer transaction history |
US8312157B2 (en) | 2009-07-16 | 2012-11-13 | Palo Alto Research Center Incorporated | Implicit authentication |
US20110016052A1 (en) | 2009-07-16 | 2011-01-20 | Scragg Ernest M | Event Tracking and Velocity Fraud Rules for Financial Transactions |
US8713705B2 (en) * | 2009-08-03 | 2014-04-29 | Eisst Ltd. | Application authentication system and method |
JP5536891B2 (ja) | 2009-09-01 | 2014-07-02 | エヌイーシー ヨーロッパ リミテッド | ネットワークのモニタリング方法およびモニタリング機能を含むネットワーク |
US10360039B2 (en) * | 2009-09-28 | 2019-07-23 | Nvidia Corporation | Predicted instruction execution in parallel processors with reduced per-thread state information including choosing a minimum or maximum of two operands based on a predicate value |
EP2315465A1 (de) * | 2009-10-20 | 2011-04-27 | ETH Zurich | Verfahren zur sicheren Kommunikation zwischen Geräten |
US20120137367A1 (en) * | 2009-11-06 | 2012-05-31 | Cataphora, Inc. | Continuous anomaly detection based on behavior modeling and heterogeneous information analysis |
US8370278B2 (en) * | 2010-03-08 | 2013-02-05 | Microsoft Corporation | Ontological categorization of question concepts from document summaries |
US8707427B2 (en) | 2010-04-06 | 2014-04-22 | Triumfant, Inc. | Automated malware detection and remediation |
US8375427B2 (en) * | 2010-04-21 | 2013-02-12 | International Business Machines Corporation | Holistic risk-based identity establishment for eligibility determinations in context of an application |
US8868651B2 (en) * | 2010-08-16 | 2014-10-21 | Avon Products, Inc. | Web community pre-population method and system |
US8898759B2 (en) * | 2010-08-24 | 2014-11-25 | Verizon Patent And Licensing Inc. | Application registration, authorization, and verification |
WO2012054646A2 (en) | 2010-10-19 | 2012-04-26 | The 41St Parameter, Inc. | Variable risk engine |
US9329699B2 (en) * | 2010-10-22 | 2016-05-03 | Southern Methodist University | Method for subject classification using a pattern recognition input device |
US20120123821A1 (en) * | 2010-11-16 | 2012-05-17 | Raytheon Company | System and Method for Risk Assessment of an Asserted Identity |
US9665703B2 (en) * | 2010-11-29 | 2017-05-30 | Biocatch Ltd. | Device, system, and method of detecting user identity based on inter-page and intra-page navigation patterns |
GB2491101B (en) * | 2011-04-15 | 2013-07-10 | Bluecava Inc | Detection of spoofing of remote client system information |
RU2477929C2 (ru) | 2011-04-19 | 2013-03-20 | Закрытое акционерное общество "Лаборатория Касперского" | Система и способ предотвращения инцидентов безопасности на основании рейтингов опасности пользователей |
US10380585B2 (en) | 2011-06-02 | 2019-08-13 | Visa International Service Association | Local usage of electronic tokens in a transaction processing system |
US8447674B2 (en) | 2011-07-21 | 2013-05-21 | Bank Of America Corporation | Multi-stage filtering for fraud detection with customer history filters |
US8756651B2 (en) * | 2011-09-27 | 2014-06-17 | Amazon Technologies, Inc. | Policy compliance-based secure data access |
US9058486B2 (en) * | 2011-10-18 | 2015-06-16 | Mcafee, Inc. | User behavioral risk assessment |
CN103067337B (zh) * | 2011-10-19 | 2017-02-15 | 中兴通讯股份有限公司 | 一种身份联合的方法、IdP、SP及系统 |
US9141914B2 (en) * | 2011-10-31 | 2015-09-22 | Hewlett-Packard Development Company, L.P. | System and method for ranking anomalies |
WO2013119739A1 (en) | 2012-02-07 | 2013-08-15 | Visa International Service Association | Mobile human challenge-response test |
US9256715B2 (en) | 2012-03-09 | 2016-02-09 | Dell Products L.P. | Authentication using physical interaction characteristics |
US20150010688A1 (en) * | 2012-03-30 | 2015-01-08 | Fuji Oil Company Limited | Cheese-like food article |
US8898766B2 (en) | 2012-04-10 | 2014-11-25 | Spotify Ab | Systems and methods for controlling a local application through a web page |
US20130339186A1 (en) | 2012-06-15 | 2013-12-19 | Eventbrite, Inc. | Identifying Fraudulent Users Based on Relational Information |
US8997230B1 (en) | 2012-06-15 | 2015-03-31 | Square, Inc. | Hierarchical data security measures for a mobile device |
US20130339736A1 (en) * | 2012-06-19 | 2013-12-19 | Alex Nayshtut | Periodic platform based web session re-validation |
CA2818439A1 (en) * | 2012-07-05 | 2014-01-05 | Cyber-Ark Software Ltd. | System and method for out-of-band application authentication |
US9485118B1 (en) | 2012-09-28 | 2016-11-01 | Juniper Networks, Inc. | Penalty-box policers for network device control plane protection |
CN102970383B (zh) * | 2012-11-13 | 2018-07-06 | 中兴通讯股份有限公司 | 一种分配ip地址的方法及装置、信息处理的方法及装置 |
US9560014B2 (en) * | 2013-01-23 | 2017-01-31 | Mcafee, Inc. | System and method for an endpoint hardware assisted network firewall in a security environment |
US20140229414A1 (en) | 2013-02-08 | 2014-08-14 | Ebay Inc. | Systems and methods for detecting anomalies |
US8925056B2 (en) * | 2013-03-18 | 2014-12-30 | Rawllin International Inc. | Universal management of user profiles |
US20150382084A1 (en) | 2014-06-25 | 2015-12-31 | Allied Telesis Holdings Kabushiki Kaisha | Path determination of a sensor based detection system |
US9632858B2 (en) * | 2013-07-28 | 2017-04-25 | OpsClarity Inc. | Organizing network performance metrics into historical anomaly dependency data |
US20150052616A1 (en) | 2013-08-14 | 2015-02-19 | L-3 Communications Corporation | Protected mode for securing computing devices |
US9432375B2 (en) * | 2013-10-10 | 2016-08-30 | International Business Machines Corporation | Trust/value/risk-based access control policy |
US20150135316A1 (en) * | 2013-11-13 | 2015-05-14 | NetCitadel Inc. | System and method of protecting client computers |
US9608981B2 (en) * | 2013-12-11 | 2017-03-28 | Red Hat, Inc. | Strong user authentication for accessing protected network |
US9679125B2 (en) | 2014-04-29 | 2017-06-13 | PEGRight, Inc. | Characterizing user behavior via intelligent identity analytics |
US10412050B2 (en) * | 2014-05-23 | 2019-09-10 | Citrix Systems, Inc. | Protect applications from session stealing/hijacking attacks by tracking and blocking anomalies in end point characteristics throughout a user session |
US10171491B2 (en) | 2014-12-09 | 2019-01-01 | Fortinet, Inc. | Near real-time detection of denial-of-service attacks |
US10552994B2 (en) | 2014-12-22 | 2020-02-04 | Palantir Technologies Inc. | Systems and interactive user interfaces for dynamic retrieval, analysis, and triage of data items |
US9794229B2 (en) | 2015-04-03 | 2017-10-17 | Infoblox Inc. | Behavior analysis based DNS tunneling detection and classification framework for network security |
US10142353B2 (en) | 2015-06-05 | 2018-11-27 | Cisco Technology, Inc. | System for monitoring and managing datacenters |
US20170070521A1 (en) | 2015-09-05 | 2017-03-09 | Nudata Security Inc. | Systems and methods for detecting and scoring anomalies |
US10127373B1 (en) | 2017-05-05 | 2018-11-13 | Mastercard Technologies Canada ULC | Systems and methods for distinguishing among human users and software robots |
US9990487B1 (en) | 2017-05-05 | 2018-06-05 | Mastercard Technologies Canada ULC | Systems and methods for distinguishing among human users and software robots |
US10007776B1 (en) | 2017-05-05 | 2018-06-26 | Mastercard Technologies Canada ULC | Systems and methods for distinguishing among human users and software robots |
-
2016
- 2016-09-04 US US15/256,597 patent/US20170070521A1/en not_active Abandoned
- 2016-09-04 CA CA2997583A patent/CA2997583C/en active Active
- 2016-09-04 AU AU2016315900A patent/AU2016315900B2/en active Active
- 2016-09-04 EP EP16840901.9A patent/EP3345099B1/de active Active
- 2016-09-04 US US15/256,611 patent/US10212180B2/en active Active
- 2016-09-04 EP EP16840899.5A patent/EP3345117B1/de active Active
- 2016-09-04 IL IL257849A patent/IL257849B2/en unknown
- 2016-09-04 CA CA2997585A patent/CA2997585C/en active Active
- 2016-09-04 US US15/256,612 patent/US9813446B2/en active Active
- 2016-09-04 AU AU2016314061A patent/AU2016314061B2/en active Active
- 2016-09-04 US US15/256,607 patent/US10129279B2/en active Active
- 2016-09-04 US US15/256,617 patent/US9749358B2/en active Active
- 2016-09-04 WO PCT/IB2016/001454 patent/WO2017037544A2/en active Application Filing
- 2016-09-04 CA CA2997597A patent/CA2997597C/en active Active
- 2016-09-04 US US15/256,600 patent/US9749356B2/en active Active
- 2016-09-04 WO PCT/IB2016/001957 patent/WO2017060778A2/en active Application Filing
- 2016-09-04 CN CN201680064794.5A patent/CN108885666B/zh active Active
- 2016-09-04 AU AU2016334816A patent/AU2016334816A1/en not_active Abandoned
- 2016-09-04 US US15/256,616 patent/US9680868B2/en active Active
- 2016-09-04 CN CN201680064536.7A patent/CN108780479B/zh active Active
- 2016-09-04 US US15/256,613 patent/US9749357B2/en active Active
- 2016-09-04 SG SG10201909133Y patent/SG10201909133YA/en unknown
- 2016-09-04 CN CN201680064594.XA patent/CN108885659B/zh active Active
- 2016-09-04 US US15/256,603 patent/US9648034B2/en active Active
- 2016-09-04 WO PCT/IB2016/001413 patent/WO2017037542A1/en active Application Filing
- 2016-09-04 US US15/256,610 patent/US9979747B2/en active Active
- 2016-09-04 EP EP16853157.2A patent/EP3345349B1/de active Active
-
2017
- 2017-01-20 US US15/411,805 patent/US9800601B2/en active Active
- 2017-06-08 US US15/617,542 patent/US10965695B2/en active Active
-
2018
- 2018-02-28 US US15/908,228 patent/US10805328B2/en active Active
- 2018-03-04 IL IL257844A patent/IL257844B/en active IP Right Grant
- 2018-03-04 IL IL257852A patent/IL257852B/en active IP Right Grant
- 2018-12-26 US US16/232,789 patent/US10749884B2/en active Active
-
2019
- 2019-09-19 AU AU2019232865A patent/AU2019232865B2/en active Active
- 2019-11-25 AU AU2019271892A patent/AU2019271892B2/en active Active
- 2019-11-25 AU AU2019271891A patent/AU2019271891B2/en active Active
- 2019-11-25 AU AU2019271890A patent/AU2019271890B2/en active Active
Also Published As
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG10201909133YA (en) | Systems and methods for matching and scoring sameness | |
PH12018502049A1 (en) | Method and device for outputting risk information and constructing risk information | |
GB2541836A (en) | Systems and methods for multi-stage identity authentication | |
EA201990251A1 (ru) | Система распределенной обработки транзакций и аутентификации | |
MX2018008104A (es) | Identificacion de entidades utilizando un modelo de aprendizaje profundo. | |
WO2018183972A3 (en) | SYSTEMS AND METHODS OF USING IMPURITY BEHAVIOR AND TARGET PROTEIN DATA TO DESIGN DOWNSTREAM PROCESSES | |
SG10201807147TA (en) | Verification methods and verification devices | |
MX2015008570A (es) | Modificacion de consultas de busqueda estructuradas en redes sociales en linea. | |
EP3150963A3 (de) | Indexierung von routen unter verwendung von ähnlichkeits-hashing | |
NZ746653A (en) | Access control for encrypted data in machine-readable identifiers | |
WO2016035072A3 (en) | Sentiment rating system and method | |
SG10201907025VA (en) | Method and system for verifying identities | |
WO2016025623A3 (en) | Image linking and sharing | |
GB2538670A (en) | A method, system and computer program for scanning a plurality of storage regions within memory for specified quantity of results | |
EP4398578A3 (de) | Codierungssequenzcodierungsverfahren und vorrichtung dafür sowie decodierungsverfahren und vorrichtung dafür | |
SG10201810036QA (en) | Processing queries containing a union-type operation | |
PH12016500612A1 (en) | Relevance based visual media item modification | |
MX368053B (es) | Recapitulacion de datos de multiples sensores. | |
WO2018140515A8 (en) | SYSTEM AND METHODS FOR DETERMINING EVENTS OF INTEREST IN A MULTI-PLAYER ONLINE GAME | |
FI20185922A1 (fi) | Tekniset piirustukset ja digitaaliset kaksoset | |
IN2014MU00934A (de) | ||
WO2017051256A3 (en) | Method and system of performing a translation | |
MY196145A (en) | Systems and Methods for Allocating Hydrocarbon Production Values | |
MX2016010227A (es) | Recomendacion de intervencion para sitios de pozo. | |
PH12019500451A1 (en) | Random number generation method and device utilized in computer system |