SG179489A1 - System and method of fraud and misuse detection - Google Patents
System and method of fraud and misuse detectionInfo
- Publication number
- SG179489A1 SG179489A1 SG2012018172A SG2012018172A SG179489A1 SG 179489 A1 SG179489 A1 SG 179489A1 SG 2012018172 A SG2012018172 A SG 2012018172A SG 2012018172 A SG2012018172 A SG 2012018172A SG 179489 A1 SG179489 A1 SG 179489A1
- Authority
- SG
- Singapore
- Prior art keywords
- fraud
- rule
- event
- misuse
- transactions
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/034—Test or assess a computer or a system
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02A—TECHNOLOGIES FOR ADAPTATION TO CLIMATE CHANGE
- Y02A90/00—Technologies having an indirect contribution to adaptation to climate change
- Y02A90/10—Information and communication technologies [ICT] supporting adaptation to climate change, e.g. for weather forecasting or climate simulation
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Human Resources & Organizations (AREA)
- Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Strategic Management (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Game Theory and Decision Science (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- General Business, Economics & Management (AREA)
- Marketing (AREA)
- Educational Administration (AREA)
- Development Economics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Debugging And Monitoring (AREA)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US11/687,864 US8578500B2 (en) | 2005-05-31 | 2007-03-19 | System and method of fraud and misuse detection |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| SG179489A1 true SG179489A1 (en) | 2012-04-27 |
Family
ID=39767170
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| SG2012018172A SG179489A1 (en) | 2007-03-19 | 2008-03-17 | System and method of fraud and misuse detection |
Country Status (8)
| Country | Link |
|---|---|
| US (6) | US8578500B2 (enExample) |
| EP (1) | EP2140355A4 (enExample) |
| JP (1) | JP2010525424A (enExample) |
| AU (1) | AU2008229017A1 (enExample) |
| CA (1) | CA2682193C (enExample) |
| MY (1) | MY151504A (enExample) |
| SG (1) | SG179489A1 (enExample) |
| WO (1) | WO2008115864A1 (enExample) |
Families Citing this family (135)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9412141B2 (en) * | 2003-02-04 | 2016-08-09 | Lexisnexis Risk Solutions Fl Inc | Systems and methods for identifying entities using geographical and social mapping |
| US20060095787A1 (en) * | 2004-11-01 | 2006-05-04 | Aaron Jeffrey A | Communication networks and methods and computer program products for tracking network activity thereon and facilitating limited use of the collected information by external parties |
| US8578500B2 (en) * | 2005-05-31 | 2013-11-05 | Kurt James Long | System and method of fraud and misuse detection |
| US9418040B2 (en) * | 2005-07-07 | 2016-08-16 | Sciencelogic, Inc. | Dynamically deployable self configuring distributed network management system |
| BRPI0710939A2 (pt) * | 2006-04-25 | 2012-02-14 | Tektronix Int Sales Gmbh | sistema e método de teste remoto no modo loopback utilizando mgcp/ncs |
| US20080189789A1 (en) * | 2007-02-01 | 2008-08-07 | Elaine Lamontagne | System, method and apparatus for the detection and capturing of technological crime instances |
| US20080235258A1 (en) * | 2007-03-23 | 2008-09-25 | Hyen Vui Chung | Method and Apparatus for Processing Extensible Markup Language Security Messages Using Delta Parsing Technology |
| WO2008148180A1 (en) * | 2007-06-04 | 2008-12-11 | Bce Inc. | Methods and systems for validating online transactions using location information |
| WO2009070860A1 (en) * | 2007-12-05 | 2009-06-11 | Bce Inc. | Methods and computer-readable media for facilitating forensic investigations of online transactions |
| US20090172033A1 (en) * | 2007-12-28 | 2009-07-02 | Bce Inc. | Methods, systems and computer-readable media for facilitating forensic investigations of online activities |
| US9842204B2 (en) | 2008-04-01 | 2017-12-12 | Nudata Security Inc. | Systems and methods for assessing security risk |
| EP2266252B1 (en) | 2008-04-01 | 2018-04-25 | Nudata Security Inc. | Systems and methods for implementing and tracking identification tests |
| US8214364B2 (en) * | 2008-05-21 | 2012-07-03 | International Business Machines Corporation | Modeling user access to computer resources |
| US20090293121A1 (en) * | 2008-05-21 | 2009-11-26 | Bigus Joseph P | Deviation detection of usage patterns of computer resources |
| US8667568B2 (en) * | 2008-05-29 | 2014-03-04 | Red Hat, Inc. | Securing a password database |
| EP3553713A1 (en) * | 2008-06-12 | 2019-10-16 | Guardian Analytics, Inc. | Modeling users for fraud detection and analysis |
| US8312033B1 (en) | 2008-06-26 | 2012-11-13 | Experian Marketing Solutions, Inc. | Systems and methods for providing an integrated identifier |
| US11245708B2 (en) * | 2008-07-23 | 2022-02-08 | Mcafee, Llc | Model-based system, method, and computer program product for detecting at least potentially unwanted activity associated with confidential data |
| US9383911B2 (en) | 2008-09-15 | 2016-07-05 | Palantir Technologies, Inc. | Modal-less interface enhancements |
| US8838474B2 (en) * | 2009-01-26 | 2014-09-16 | Bank Of America Corporation | System update management |
| US10290053B2 (en) | 2009-06-12 | 2019-05-14 | Guardian Analytics, Inc. | Fraud detection and analysis |
| US8972325B2 (en) * | 2009-07-01 | 2015-03-03 | Oracle International Corporation | Role based identity tracker |
| US8280844B2 (en) * | 2010-02-15 | 2012-10-02 | Bank Of America Corporation | Anomalous activity detection |
| US8868728B2 (en) * | 2010-03-11 | 2014-10-21 | Accenture Global Services Limited | Systems and methods for detecting and investigating insider fraud |
| US8869258B2 (en) * | 2010-03-12 | 2014-10-21 | Microsoft Corporation | Facilitating token request troubleshooting |
| CN103026345B (zh) * | 2010-06-02 | 2016-01-20 | 惠普发展公司,有限责任合伙企业 | 用于事件监测优先级的动态多维模式 |
| US8832049B2 (en) | 2010-07-09 | 2014-09-09 | Bank Of America Corporation | Monitoring communications |
| US8407341B2 (en) | 2010-07-09 | 2013-03-26 | Bank Of America Corporation | Monitoring communications |
| US9450781B2 (en) * | 2010-12-09 | 2016-09-20 | Alcatel Lucent | Spam reporting and management in a communication network |
| US20120311696A1 (en) * | 2011-06-02 | 2012-12-06 | Microsoft Corporation | Override for Policy Enforcement System |
| US9665854B1 (en) * | 2011-06-16 | 2017-05-30 | Consumerinfo.Com, Inc. | Authentication alerts |
| US9092482B2 (en) | 2013-03-14 | 2015-07-28 | Palantir Technologies, Inc. | Fair scheduling for mixed-query loads |
| US10509890B2 (en) * | 2011-06-30 | 2019-12-17 | Verizon Patent And Licensing Inc. | Predictive modeling processes for healthcare fraud detection |
| US8745085B2 (en) | 2011-08-17 | 2014-06-03 | The Regents Of The University Of Michigan | System for explanation-based auditing of medical records data |
| US8732574B2 (en) | 2011-08-25 | 2014-05-20 | Palantir Technologies, Inc. | System and method for parameterizing documents for automatic workflow generation |
| US8504542B2 (en) | 2011-09-02 | 2013-08-06 | Palantir Technologies, Inc. | Multi-row transactions |
| US8683568B1 (en) * | 2011-09-22 | 2014-03-25 | Emc Corporation | Using packet interception to integrate risk-based user authentication into online services |
| US8595200B2 (en) * | 2012-01-03 | 2013-11-26 | Wizsoft Ltd. | Finding suspicious association rules in data records |
| US8682906B1 (en) | 2013-01-23 | 2014-03-25 | Splunk Inc. | Real time display of data field values based on manual editing of regular expressions |
| US10394946B2 (en) | 2012-09-07 | 2019-08-27 | Splunk Inc. | Refining extraction rules based on selected text within events |
| US8751963B1 (en) | 2013-01-23 | 2014-06-10 | Splunk Inc. | Real time indication of previously extracted data fields for regular expressions |
| US9594814B2 (en) | 2012-09-07 | 2017-03-14 | Splunk Inc. | Advanced field extractor with modification of an extracted field |
| US9753909B2 (en) | 2012-09-07 | 2017-09-05 | Splunk, Inc. | Advanced field extractor with multiple positive examples |
| US20140208217A1 (en) | 2013-01-22 | 2014-07-24 | Splunk Inc. | Interface for managing splittable timestamps across event records |
| US9348677B2 (en) | 2012-10-22 | 2016-05-24 | Palantir Technologies Inc. | System and method for batch evaluation programs |
| US9124619B2 (en) | 2012-12-08 | 2015-09-01 | International Business Machines Corporation | Directing audited data traffic to specific repositories |
| US9152929B2 (en) | 2013-01-23 | 2015-10-06 | Splunk Inc. | Real time display of statistics and values for selected regular expressions |
| US8763078B1 (en) * | 2013-03-14 | 2014-06-24 | Palantir Technologies, Inc. | System and method for monitoring authentication attempts |
| US10275778B1 (en) | 2013-03-15 | 2019-04-30 | Palantir Technologies Inc. | Systems and user interfaces for dynamic and interactive investigation based on automatic malfeasance clustering of related data in various data structures |
| US10664936B2 (en) | 2013-03-15 | 2020-05-26 | Csidentity Corporation | Authentication systems and methods for on-demand products |
| US9501202B2 (en) | 2013-03-15 | 2016-11-22 | Palantir Technologies, Inc. | Computer graphical user interface with genomic workflow |
| US8868486B2 (en) | 2013-03-15 | 2014-10-21 | Palantir Technologies Inc. | Time-sensitive cube |
| US8909656B2 (en) | 2013-03-15 | 2014-12-09 | Palantir Technologies Inc. | Filter chains with associated multipath views for exploring large data sets |
| US9633322B1 (en) | 2013-03-15 | 2017-04-25 | Consumerinfo.Com, Inc. | Adjustment of knowledge-based authentication |
| US9721147B1 (en) | 2013-05-23 | 2017-08-01 | Consumerinfo.Com, Inc. | Digital identity |
| US20150019238A1 (en) * | 2013-07-15 | 2015-01-15 | Verizon Patent And Licensing Inc. | Prescription/medication monitoring and fraud detection system |
| US8966074B1 (en) * | 2013-09-13 | 2015-02-24 | Network Kinetix, LLC | System and method for real-time analysis of network traffic |
| US9105000B1 (en) | 2013-12-10 | 2015-08-11 | Palantir Technologies Inc. | Aggregating data from a plurality of data sources |
| US9009827B1 (en) | 2014-02-20 | 2015-04-14 | Palantir Technologies Inc. | Security sharing system |
| US9215214B2 (en) | 2014-02-20 | 2015-12-15 | Nicira, Inc. | Provisioning firewall rules on a firewall enforcing device |
| US9485271B1 (en) * | 2014-03-11 | 2016-11-01 | Symantec Corporation | Systems and methods for anomaly-based detection of compromised IT administration accounts |
| US8935201B1 (en) | 2014-03-18 | 2015-01-13 | Palantir Technologies Inc. | Determining and extracting changed data from a data source |
| US9836580B2 (en) | 2014-03-21 | 2017-12-05 | Palantir Technologies Inc. | Provider portal |
| US8997176B1 (en) * | 2014-06-12 | 2015-03-31 | Flexera Software Llc | Device identification based on event logs |
| US9129219B1 (en) | 2014-06-30 | 2015-09-08 | Palantir Technologies, Inc. | Crime risk forecasting |
| US10572496B1 (en) | 2014-07-03 | 2020-02-25 | Palantir Technologies Inc. | Distributed workflow system and database with access controls for city resiliency |
| US9251221B1 (en) | 2014-07-21 | 2016-02-02 | Splunk Inc. | Assigning scores to objects based on search query results |
| US9509705B2 (en) * | 2014-08-07 | 2016-11-29 | Wells Fargo Bank, N.A. | Automated secondary linking for fraud detection systems |
| US10362133B1 (en) | 2014-12-22 | 2019-07-23 | Palantir Technologies Inc. | Communication data processing architecture |
| US10372879B2 (en) | 2014-12-31 | 2019-08-06 | Palantir Technologies Inc. | Medical claims lead summary report generation |
| US20160191665A1 (en) * | 2014-12-31 | 2016-06-30 | Samsung Electronics Co., Ltd. | Computing system with distributed compute-enabled storage group and method of operation thereof |
| US11302426B1 (en) | 2015-01-02 | 2022-04-12 | Palantir Technologies Inc. | Unified data interface and system |
| US9799058B2 (en) * | 2015-01-31 | 2017-10-24 | Foribus, LLC. | Vehicle valuation system and method |
| US11282597B2 (en) | 2015-03-27 | 2022-03-22 | Protenus Inc. | Methods and systems for analyzing accessing of drug dispensing systems |
| US10679737B1 (en) | 2015-03-27 | 2020-06-09 | Protenus, Inc. | Methods and systems for analyzing accessing of medical data |
| US9836598B2 (en) * | 2015-04-20 | 2017-12-05 | Splunk Inc. | User activity monitoring |
| US11580472B2 (en) | 2015-05-14 | 2023-02-14 | Palantir Technologies Inc. | Systems and methods for state machine management |
| US10585869B2 (en) | 2015-05-22 | 2020-03-10 | Open Text Holdings, Inc. | System and method for generating, maintaining, and querying a database for computer investigations |
| JP2016224871A (ja) * | 2015-06-03 | 2016-12-28 | 富士通株式会社 | 異常検出プログラム、異常検出装置及び異常検出方法 |
| US10628834B1 (en) | 2015-06-16 | 2020-04-21 | Palantir Technologies Inc. | Fraud lead detection system for efficiently processing database-stored data and automatically generating natural language explanatory information of system results for display in interactive user interfaces |
| US9755903B2 (en) | 2015-06-30 | 2017-09-05 | Nicira, Inc. | Replicating firewall policy across multiple data centers |
| US9418337B1 (en) | 2015-07-21 | 2016-08-16 | Palantir Technologies Inc. | Systems and models for data analytics |
| US9813446B2 (en) | 2015-09-05 | 2017-11-07 | Nudata Security Inc. | Systems and methods for matching and scoring sameness |
| US9798787B1 (en) | 2015-12-10 | 2017-10-24 | Palantir Technologies Inc. | System and user interfaces for searching resources and related documents using data structures |
| US10726032B2 (en) | 2015-12-30 | 2020-07-28 | Palantir Technologies, Inc. | Systems and methods for search template generation |
| US10380522B1 (en) | 2015-12-31 | 2019-08-13 | Palantir Technologies Inc. | Asset allocation evaluation system |
| US9460328B1 (en) | 2016-01-15 | 2016-10-04 | International Business Machines Corporation | Extracting information from surface coatings |
| CN108701122A (zh) * | 2016-01-25 | 2018-10-23 | 沃拉斯堤技术解决方案公司 | 用于企业资源计划系统中的事件管理的系统和方法 |
| CA3016667A1 (en) * | 2016-03-04 | 2017-09-08 | Georgia Tech Research Corporation | System and method for identifying suspicious healthcare behavior |
| US10832218B1 (en) | 2016-04-05 | 2020-11-10 | Palantir Technologies Inc. | User interface for visualization of an attrition value |
| US10348685B2 (en) | 2016-04-29 | 2019-07-09 | Nicira, Inc. | Priority allocation for distributed service rules |
| US10944722B2 (en) | 2016-05-01 | 2021-03-09 | Nicira, Inc. | Using activities to manage multi-tenant firewall configuration |
| US11171920B2 (en) * | 2016-05-01 | 2021-11-09 | Nicira, Inc. | Publication of firewall configuration |
| US11030307B2 (en) | 2016-06-02 | 2021-06-08 | Varonis Systems Ltd. | Audit log enhancement |
| EP3258661B1 (en) * | 2016-06-16 | 2020-11-18 | ABB Schweiz AG | Detection of abnormal configuration changes |
| US11258761B2 (en) | 2016-06-29 | 2022-02-22 | Nicira, Inc. | Self-service firewall configuration |
| US11088990B2 (en) | 2016-06-29 | 2021-08-10 | Nicira, Inc. | Translation cache for firewall configuration |
| US20180239870A1 (en) * | 2016-07-27 | 2018-08-23 | Intuit Inc. | Method and system for identifying and addressing potential healthcare-based fraud |
| US9805071B1 (en) | 2016-11-10 | 2017-10-31 | Palantir Technologies Inc. | System and methods for live data migration |
| GB201621627D0 (en) | 2016-12-19 | 2017-02-01 | Palantir Technologies Inc | Task allocation |
| US11271904B2 (en) * | 2016-12-22 | 2022-03-08 | Nicira, Inc. | Identification and adjustment of ineffective firewall rules |
| US11373752B2 (en) | 2016-12-22 | 2022-06-28 | Palantir Technologies Inc. | Detection of misuse of a benefit system |
| US10628278B2 (en) | 2017-01-26 | 2020-04-21 | International Business Machines Corporation | Generation of end-user sessions from end-user events identified from computer system logs |
| US11087334B1 (en) | 2017-04-04 | 2021-08-10 | Intuit Inc. | Method and system for identifying potential fraud activity in a tax return preparation system, at least partially based on data entry characteristics of tax return content |
| US11315010B2 (en) | 2017-04-17 | 2022-04-26 | Splunk Inc. | Neural networks for detecting fraud based on user behavior biometrics |
| US11372956B2 (en) | 2017-04-17 | 2022-06-28 | Splunk Inc. | Multiple input neural networks for detecting fraud |
| US11102225B2 (en) * | 2017-04-17 | 2021-08-24 | Splunk Inc. | Detecting fraud by correlating user behavior biometrics with other data sources |
| US10530642B1 (en) | 2017-06-07 | 2020-01-07 | Palantir Technologies Inc. | Remote configuration of a machine |
| US10176217B1 (en) | 2017-07-06 | 2019-01-08 | Palantir Technologies, Inc. | Dynamically performing data processing in a data pipeline system |
| US10628002B1 (en) | 2017-07-10 | 2020-04-21 | Palantir Technologies Inc. | Integrated data authentication system with an interactive user interface |
| US10839022B1 (en) | 2017-07-24 | 2020-11-17 | Palantir Technologies Inc. | System to manage document workflows |
| US10218574B1 (en) | 2017-07-26 | 2019-02-26 | Palantir Technologies Inc. | Detecting software misconfiguration at a remote machine |
| US10324759B1 (en) | 2017-08-03 | 2019-06-18 | Palantir Technologies Inc. | Apparatus and method of securely and efficiently interfacing with a cloud computing service |
| US10872023B2 (en) * | 2017-09-24 | 2020-12-22 | Microsoft Technology Licensing, Llc | System and method for application session monitoring and control |
| US10904272B2 (en) * | 2017-11-02 | 2021-01-26 | Allstate Insurance Company | Consumer threat intelligence service |
| US11829866B1 (en) | 2017-12-27 | 2023-11-28 | Intuit Inc. | System and method for hierarchical deep semi-supervised embeddings for dynamic targeted anomaly detection |
| CN108595513B (zh) * | 2018-03-23 | 2021-06-22 | 北京奇艺世纪科技有限公司 | 一种视频搜索作弊处理方法及装置 |
| FR3079987A1 (fr) * | 2018-04-06 | 2019-10-11 | Orange | Procede de traitement d'une transaction entre un terminal source et un terminal destinataire, systeme de services bancaires, terminal et programme d'ordinateur correspondants. |
| US10911234B2 (en) | 2018-06-22 | 2021-02-02 | Experian Information Solutions, Inc. | System and method for a token gateway environment |
| US11075951B1 (en) * | 2018-06-29 | 2021-07-27 | NortonLifeLock Inc. | Query learning for automated incident investigation and remediation |
| US11210349B1 (en) | 2018-08-02 | 2021-12-28 | Palantir Technologies Inc. | Multi-database document search system architecture |
| CN109815695A (zh) * | 2018-12-29 | 2019-05-28 | 360企业安全技术(珠海)有限公司 | 进程安全的检测方法、装置及设备 |
| US11310202B2 (en) | 2019-03-13 | 2022-04-19 | Vmware, Inc. | Sharing of firewall rules among multiple workloads in a hypervisor |
| CN110188082A (zh) * | 2019-04-25 | 2019-08-30 | 视联动力信息技术股份有限公司 | 一种日志文件的处理方法及装置 |
| US11941065B1 (en) | 2019-09-13 | 2024-03-26 | Experian Information Solutions, Inc. | Single identifier platform for storing entity data |
| US11356460B2 (en) * | 2019-12-31 | 2022-06-07 | Equifax Inc. | Secure online access control to prevent identification information misuse |
| CA3173206A1 (en) | 2020-03-26 | 2021-09-30 | David Croteau | System and method for automated sensitive information discovery, monitoring and remediation |
| US20230169433A1 (en) * | 2020-04-30 | 2023-06-01 | Nippon Telegraph And Telephone Corporation | Rule processing apparatus, method, and program |
| US11481787B2 (en) * | 2020-09-13 | 2022-10-25 | International Business Machines Corporation | Detecting user device usage and validating user claims |
| US11593309B2 (en) * | 2020-11-05 | 2023-02-28 | International Business Machines Corporation | Reliable delivery of event notifications from a distributed file system |
| US11463415B2 (en) * | 2020-11-19 | 2022-10-04 | Lexisnexis Risk Solutions, Inc. | Digital identity network alerts |
| CN114782204A (zh) * | 2022-03-08 | 2022-07-22 | 北京健康之家科技有限公司 | 风控方法、装置、终端设备及介质 |
| US12260707B2 (en) * | 2022-09-13 | 2025-03-25 | Aristocrat Technologies, Inc. | Electronic gaming systems and methods with persistent game tiers |
| US12069063B1 (en) * | 2023-05-31 | 2024-08-20 | Intuit Inc. | Fine grained access control in a data lake using least privilege access |
| GB2633000A (en) * | 2023-08-10 | 2025-03-05 | Next Dlp Ltd | Management of raised security events at a data processing system |
Family Cites Families (50)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5557742A (en) * | 1994-03-07 | 1996-09-17 | Haystack Labs, Inc. | Method and system for detecting intrusion into and misuse of a data processing system |
| US7600129B2 (en) * | 1995-10-02 | 2009-10-06 | Corestreet, Ltd. | Controlling access using additional data |
| JP3778652B2 (ja) * | 1997-04-18 | 2006-05-24 | 株式会社日立製作所 | ログデータ収集管理方法及びその装置 |
| US7403922B1 (en) * | 1997-07-28 | 2008-07-22 | Cybersource Corporation | Method and apparatus for evaluating fraud risk in an electronic commerce transaction |
| JPH11259571A (ja) * | 1998-03-13 | 1999-09-24 | Nippon Telegr & Teleph Corp <Ntt> | 電子商取引システム不正利用検出方法及び装置 |
| US6347374B1 (en) * | 1998-06-05 | 2002-02-12 | Intrusion.Com, Inc. | Event detection |
| US6304262B1 (en) * | 1998-07-21 | 2001-10-16 | Raytheon Company | Information security analysis system |
| US6510523B1 (en) * | 1999-02-22 | 2003-01-21 | Sun Microsystems Inc. | Method and system for providing limited access privileges with an untrusted terminal |
| US6839850B1 (en) * | 1999-03-04 | 2005-01-04 | Prc, Inc. | Method and system for detecting intrusion into and misuse of a data processing system |
| US6405318B1 (en) * | 1999-03-12 | 2002-06-11 | Psionic Software, Inc. | Intrusion detection system |
| EP1054529A3 (en) | 1999-05-20 | 2003-01-08 | Lucent Technologies Inc. | Method and apparatus for associating network usage with particular users |
| US6789202B1 (en) * | 1999-10-15 | 2004-09-07 | Networks Associates Technology, Inc. | Method and apparatus for providing a policy-driven intrusion detection system |
| US6978303B1 (en) * | 1999-10-26 | 2005-12-20 | Iontal Limited | Monitoring of computer usage |
| US20010047275A1 (en) * | 2000-03-27 | 2001-11-29 | Terretta Michael S. | Authentication system |
| US7299496B2 (en) * | 2001-08-14 | 2007-11-20 | Illinois Institute Of Technology | Detection of misuse of authorized access in an information retrieval system |
| KR100689932B1 (ko) * | 2002-03-06 | 2007-03-12 | 도레이 가부시끼가이샤 | 유전자 재조합 누에를 이용한 생리 활성 단백질 생산법 |
| AU2003237900A1 (en) * | 2002-05-16 | 2003-12-02 | Ndchealth Corporation | Systems and methods for identifying fraud and abuse in prescription claims |
| US7809595B2 (en) * | 2002-09-17 | 2010-10-05 | Jpmorgan Chase Bank, Na | System and method for managing risks associated with outside service providers |
| US20040068559A1 (en) * | 2002-10-04 | 2004-04-08 | Shaw Terry D. | Method for detection of unauthorized computer system usage |
| EP1563665A2 (en) * | 2002-11-18 | 2005-08-17 | Hipaat Inc. | A method and system for access control |
| US7421738B2 (en) * | 2002-11-25 | 2008-09-02 | Honeywell International Inc. | Skeptical system |
| US7739365B2 (en) * | 2002-12-19 | 2010-06-15 | Converged Data Solutions, Inc. | Methods for providing a report database for a plurality of localized devices using an abstraction layer and atomic error handling |
| US8141159B2 (en) * | 2002-12-31 | 2012-03-20 | Portauthority Technologies Inc. | Method and system for protecting confidential information |
| US7712133B2 (en) * | 2003-06-20 | 2010-05-04 | Hewlett-Packard Development Company, L.P. | Integrated intrusion detection system and method |
| FR2857986B1 (fr) * | 2003-07-22 | 2005-09-02 | Rieter Icbt | Godet chauffant rotatif pour la thermofixation de fil textile |
| US20050086529A1 (en) * | 2003-10-21 | 2005-04-21 | Yair Buchsbaum | Detection of misuse or abuse of data by authorized access to database |
| US9026467B2 (en) * | 2004-02-13 | 2015-05-05 | Fis Financial Compliance Solutions, Llc | Systems and methods for monitoring and detecting fraudulent uses of business applications |
| US20050209876A1 (en) * | 2004-03-19 | 2005-09-22 | Oversight Technologies, Inc. | Methods and systems for transaction compliance monitoring |
| US20050246242A1 (en) * | 2004-05-03 | 2005-11-03 | Proctor Neil F | System and method for collecting confidential customer information in conjunction with a live conversation between customer and vendor representative |
| US7490356B2 (en) * | 2004-07-20 | 2009-02-10 | Reflectent Software, Inc. | End user risk management |
| US7287692B1 (en) * | 2004-07-28 | 2007-10-30 | Cisco Technology, Inc. | System and method for securing transactions in a contact center environment |
| JP2006155212A (ja) * | 2004-11-29 | 2006-06-15 | Toshiba Corp | 病院情報システム、不正アクセスレポート作成システムおよび不正アクセスレポート作成方法 |
| JP4723866B2 (ja) * | 2005-01-12 | 2011-07-13 | 株式会社東芝 | 医用装置および不正アクセス監査システム |
| US7895167B2 (en) * | 2005-02-16 | 2011-02-22 | Xpolog Ltd. | System and method for analysis and management of logs and events |
| CA2606326A1 (en) * | 2005-04-29 | 2006-11-09 | Bharosa Inc. | System and method for fraud monitoring, detection, and tiered user authentication |
| US8578500B2 (en) * | 2005-05-31 | 2013-11-05 | Kurt James Long | System and method of fraud and misuse detection |
| US7873528B2 (en) * | 2005-06-27 | 2011-01-18 | Tc3 Health, Inc. | Healthcare claims loss control systems and methods |
| US7962616B2 (en) * | 2005-08-11 | 2011-06-14 | Micro Focus (Us), Inc. | Real-time activity monitoring and reporting |
| US7631362B2 (en) * | 2005-09-20 | 2009-12-08 | International Business Machines Corporation | Method and system for adaptive identity analysis, behavioral comparison, compliance, and application protection using usage information |
| US8402002B2 (en) * | 2005-09-23 | 2013-03-19 | Barclays Capital Inc. | System and method for event log review |
| US9081981B2 (en) * | 2005-12-29 | 2015-07-14 | Nextlabs, Inc. | Techniques and system to manage access of information using policies |
| US20060224419A1 (en) * | 2006-06-15 | 2006-10-05 | Servizio Louis A | System and method for medication misuse prevention |
| US20090089094A1 (en) * | 2007-09-28 | 2009-04-02 | General Electric Company | System and method for detection of abuse of patient data |
| US7880591B2 (en) * | 2008-02-01 | 2011-02-01 | Apple Inc. | Consumer abuse detection system and method |
| US8595834B2 (en) * | 2008-02-04 | 2013-11-26 | Samsung Electronics Co., Ltd | Detecting unauthorized use of computing devices based on behavioral patterns |
| US7991957B2 (en) * | 2008-05-27 | 2011-08-02 | Microsoft Corporation | Abuse detection using distributed cache |
| US20100063841A1 (en) * | 2008-09-05 | 2010-03-11 | Vital Data Technology, Llc | System and method of notifying designated entities of access to personal medical records |
| US8868728B2 (en) * | 2010-03-11 | 2014-10-21 | Accenture Global Services Limited | Systems and methods for detecting and investigating insider fraud |
| KR101058592B1 (ko) * | 2010-12-14 | 2011-08-23 | 주식회사 포드림 | 영상정보 오남용 감사 시스템 |
| US8528099B2 (en) * | 2011-01-27 | 2013-09-03 | Oracle International Corporation | Policy based management of content rights in enterprise/cross enterprise collaboration |
-
2007
- 2007-03-19 US US11/687,864 patent/US8578500B2/en active Active
-
2008
- 2008-03-17 SG SG2012018172A patent/SG179489A1/en unknown
- 2008-03-17 MY MYPI20093824 patent/MY151504A/en unknown
- 2008-03-17 WO PCT/US2008/057220 patent/WO2008115864A1/en not_active Ceased
- 2008-03-17 EP EP08743964A patent/EP2140355A4/en not_active Ceased
- 2008-03-17 CA CA2682193A patent/CA2682193C/en active Active
- 2008-03-17 AU AU2008229017A patent/AU2008229017A1/en not_active Abandoned
- 2008-03-17 JP JP2009554678A patent/JP2010525424A/ja active Pending
-
2013
- 2013-08-05 US US13/959,445 patent/US20130347106A1/en not_active Abandoned
- 2013-12-10 US US14/102,017 patent/US9202189B2/en active Active
-
2015
- 2015-11-30 US US14/954,470 patent/US9916468B2/en active Active
-
2018
- 2018-03-12 US US15/918,758 patent/US10360399B2/en active Active
-
2019
- 2019-05-13 US US16/410,918 patent/US20190362088A1/en not_active Abandoned
Also Published As
| Publication number | Publication date |
|---|---|
| EP2140355A1 (en) | 2010-01-06 |
| US20190362088A1 (en) | 2019-11-28 |
| CA2682193A1 (en) | 2008-09-25 |
| CA2682193C (en) | 2018-11-20 |
| WO2008115864A1 (en) | 2008-09-25 |
| US8578500B2 (en) | 2013-11-05 |
| US20160085986A1 (en) | 2016-03-24 |
| US20140188548A1 (en) | 2014-07-03 |
| US10360399B2 (en) | 2019-07-23 |
| US20180204021A1 (en) | 2018-07-19 |
| MY151504A (en) | 2014-05-30 |
| AU2008229017A1 (en) | 2008-09-25 |
| JP2010525424A (ja) | 2010-07-22 |
| EP2140355A4 (en) | 2011-05-25 |
| US9916468B2 (en) | 2018-03-13 |
| US20070220604A1 (en) | 2007-09-20 |
| US20130347106A1 (en) | 2013-12-26 |
| US9202189B2 (en) | 2015-12-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| SG179489A1 (en) | System and method of fraud and misuse detection | |
| WO2008100323A3 (en) | Methods of deterring, detecting, and mitigating fraud within an organization | |
| WO2006130874A3 (en) | Comprehensive identity protection system | |
| WO2007148314A3 (en) | Secure domain information protection apparatus and methods | |
| EP2348440A3 (en) | Collaborative malware detection and prevention on mobile devices | |
| WO2009132148A3 (en) | Systems and methods for security management based on cursor events | |
| GB2434670A (en) | Monitoring and management of distributed information systems | |
| WO2008070395A3 (en) | Method for secure data entry in an application | |
| WO2010005656A3 (en) | Brain condition assessment | |
| WO2006060284A3 (en) | Early detection and monitoring of online fraud | |
| WO2008042629A3 (en) | Systems and method for monitoring equipment | |
| PL2005414T3 (pl) | Urządzenie oraz sposób przetwarzania danych | |
| MY151479A (en) | Method and apparatus for detecting shellcode insertion | |
| WO2007124416A3 (en) | Backwards researching activity indicative of pestware | |
| WO2008054849A3 (en) | Systems and methods for detection of session tampering and fraud prevention | |
| WO2009025140A1 (ja) | 行動監視システム、及び、行動監視方法 | |
| GB2458849A (en) | Portable computing system docking security system and method | |
| GB201100039D0 (en) | Server, user device and malware detection method thereof | |
| WO2009022272A3 (en) | System and method providing fault detection capability | |
| WO2014008247A3 (en) | Systems and methods for detecting tax refund fraud | |
| WO2007030549A3 (en) | Threat detection and monitoring apparatus with integrated display system | |
| WO2008014212A3 (en) | Account management systems and methods | |
| GB2573970A (en) | System and method for detecting network topology | |
| GB2475444A (en) | Systems and methods for providing information regarding resource comsumption or enviromental impact associated with usage of a computer | |
| IN2014DN03075A (enExample) |