Movatterモバイル変換


[0]ホーム

URL:


SG10202001963TA - System and method for brand protection based on the search results - Google Patents

System and method for brand protection based on the search results

Info

Publication number
SG10202001963TA
SG10202001963TASG10202001963TASG10202001963TASG 10202001963T ASG10202001963T ASG 10202001963TASG 10202001963T ASG10202001963T ASG 10202001963TASG 10202001963T ASG10202001963T ASG 10202001963TA
Authority
SG
Singapore
Prior art keywords
search results
protection based
brand protection
brand
search
Prior art date
Application number
Inventor
Ilia Rozhnov
Original Assignee
Group Ib Global Private Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Group Ib Global Private LtdfiledCriticalGroup Ib Global Private Ltd
Priority to SG10202001963TpriorityCriticalpatent/SG10202001963TA/en
Priority to RU2020113308Aprioritypatent/RU2740635C1/en
Priority to US16/895,331prioritypatent/US11151581B2/en
Priority to NL2025836Aprioritypatent/NL2025836B1/en
Publication of SG10202001963TApublicationCriticalpatent/SG10202001963TA/en

Links

Classifications

Landscapes

SG10202001963T2020-03-042020-03-04System and method for brand protection based on the search resultsSG10202001963TA (en)

Priority Applications (4)

Application NumberPriority DateFiling DateTitle
SG10202001963TSG10202001963TA (en)2020-03-042020-03-04System and method for brand protection based on the search results
RU2020113308ARU2740635C1 (en)2020-03-042020-04-10Brand protection system and method based on search distribution
US16/895,331US11151581B2 (en)2020-03-042020-06-08System and method for brand protection based on search results
NL2025836ANL2025836B1 (en)2020-03-042020-06-16System and method for brand protection based on the search results

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
SG10202001963TSG10202001963TA (en)2020-03-042020-03-04System and method for brand protection based on the search results

Publications (1)

Publication NumberPublication Date
SG10202001963TAtrue SG10202001963TA (en)2021-10-28

Family

ID=73498220

Family Applications (1)

Application NumberTitlePriority DateFiling Date
SG10202001963TSG10202001963TA (en)2020-03-042020-03-04System and method for brand protection based on the search results

Country Status (4)

CountryLink
US (1)US11151581B2 (en)
NL (1)NL2025836B1 (en)
RU (1)RU2740635C1 (en)
SG (1)SG10202001963TA (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20230325841A1 (en)*2022-04-072023-10-12Gen Digital Inc.Systems and methods for detecting websites that perpetrate at least one of scams or frauds
US20250165992A1 (en)*2023-11-162025-05-22Kathy MillerGenuine Scanner System & Method

Family Cites Families (179)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7389351B2 (en)2001-03-152008-06-17Microsoft CorporationSystem and method for identifying and establishing preferred modalities or channels for communications based on participants' preferences and contexts
US7565692B1 (en)2000-05-302009-07-21At&T Wireless Services, Inc.Floating intrusion detection platforms
DE60124295T8 (en)2000-11-302007-12-06Lancope, Inc. RIVER-BASED DETECTION OF AN INSERT INTO A NETWORK
US7325252B2 (en)2001-05-182008-01-29Achilles Guard Inc.Network security testing
US20090138342A1 (en)2001-11-142009-05-28Retaildna, LlcMethod and system for providing an employee award using artificial intelligence
US7225343B1 (en)2002-01-252007-05-29The Trustees Of Columbia University In The City Of New YorkSystem and methods for adaptive model generation for detecting intrusions in computer systems
US8132250B2 (en)2002-03-082012-03-06Mcafee, Inc.Message profiling systems and methods
EP1349081A1 (en)2002-03-282003-10-01LION Bioscience AGMethod and apparatus for querying relational databases
US7496628B2 (en)2003-02-252009-02-24Susquehanna International Group, LlpElectronic message filter
US20040221171A1 (en)2003-05-022004-11-04Ahmed Ahmed Awad E.Intrusion detector based on mouse dynamics analysis
US7457725B1 (en)*2003-06-242008-11-25Cisco Technology Inc.Electronic component reliability determination system and method
US8990928B1 (en)2003-12-112015-03-24Radix Holdings, LlcURL salience
US7392278B2 (en)2004-01-232008-06-24Microsoft CorporationBuilding and using subwebs for focused search
US8561177B1 (en)2004-04-012013-10-15Fireeye, Inc.Systems and methods for detecting communication channels of bots
US8528086B1 (en)2004-04-012013-09-03Fireeye, Inc.System and method of detecting computer worms
US8539582B1 (en)2004-04-012013-09-17Fireeye, Inc.Malware containment and security analysis on connection
US7953814B1 (en)2005-02-282011-05-31Mcafee, Inc.Stopping and remediating outbound messaging abuse
WO2006032028A2 (en)2004-09-132006-03-23Reactivity, Inc.Metric-based monitoring and control of a limited resource
US7540025B2 (en)2004-11-182009-05-26Cisco Technology, Inc.Mitigating network attacks using automatic signature generation
US20060253582A1 (en)2005-05-032006-11-09Dixon Christopher JIndicating website reputations within search results
CA2606998C (en)2005-05-052014-09-09Ironport Systems, Inc.Detecting unwanted electronic mail messages based on probabilistic analysis of referenced resources
US7609625B2 (en)2005-07-062009-10-27Fortinet, Inc.Systems and methods for detecting and preventing flooding attacks in a network environment
US7730040B2 (en)2005-07-272010-06-01Microsoft CorporationFeedback-driven malware detector
US7707284B2 (en)2005-08-032010-04-27Novell, Inc.System and method of searching for classifying user activity performed on a computer system
KR20070049514A (en)2005-11-082007-05-11한국정보보호진흥원 Malware Monitoring System and Monitoring Method Using the Same
US8650080B2 (en)2006-04-102014-02-11International Business Machines CorporationUser-browser interaction-based fraud detection system
ATE540515T1 (en)2006-04-132012-01-15Art Of Defence Gmbh METHOD FOR PROVIDING WEB APPLICATION SECURITY
US7984500B1 (en)2006-10-052011-07-19Amazon Technologies, Inc.Detecting fraudulent activity by analysis of information requests
US7865953B1 (en)2007-05-312011-01-04Trend Micro Inc.Methods and arrangement for active malicious web pages discovery
US8238669B2 (en)2007-08-222012-08-07Google Inc.Detection and classification of matches between time-based media
US7958555B1 (en)2007-09-282011-06-07Trend Micro IncorporatedProtecting computer users from online frauds
US9779403B2 (en)2007-12-072017-10-03Jpmorgan Chase Bank, N.A.Mobile fraud prevention system and method
US8219549B2 (en)2008-02-062012-07-10Microsoft CorporationForum mining for suspicious link spam sites detection
US20110222787A1 (en)2008-02-282011-09-15Stefan ThiemertFrame sequence comparison in multimedia streams
US8082187B2 (en)2008-05-072011-12-20AcademixDirect, Inc.Method of generating a referral website URL using website listings in a cookie
US8856937B1 (en)2008-06-272014-10-07Symantec CorporationMethods and systems for identifying fraudulent websites
US10027688B2 (en)2008-08-112018-07-17Damballa, Inc.Method and system for detecting malicious and/or botnet-related domain names
US8086480B2 (en)2008-09-252011-12-27Ebay Inc.Methods and systems for activity-based recommendations
US8850571B2 (en)2008-11-032014-09-30Fireeye, Inc.Systems and methods for detecting malicious network content
US8285830B1 (en)2009-01-062012-10-09Citizenhawk, Inc.System and method for combating cybersquatting
US8448245B2 (en)2009-01-172013-05-21Stopthehacker.com, Jaal LLCAutomated identification of phishing, phony and malicious web sites
US8695091B2 (en)2009-02-112014-04-08Sophos LimitedSystems and methods for enforcing policies for proxy website detection using advertising account ID
US20100228636A1 (en)*2009-03-042010-09-09Google Inc.Risk premiums for conversion-based online advertisement bidding
WO2010105184A2 (en)2009-03-132010-09-16Breach Security , Inc.A method and apparatus for phishing and leeching vulnerability detection
US8229219B1 (en)2009-08-062012-07-24Google Inc.Full-length video fingerprinting
US8600993B1 (en)2009-08-262013-12-03Google Inc.Determining resource attributes from site address attributes
US8396857B2 (en)2009-08-312013-03-12Accenture Global Services LimitedSystem to modify websites for organic search optimization
EP2323046A1 (en)2009-10-162011-05-18Telefónica, S.A.Method for detecting audio and video copy in multimedia streams
US8625033B1 (en)2010-02-012014-01-07Google Inc.Large-scale matching of audio and video
US9501644B2 (en)2010-03-152016-11-22F-Secure OyjMalware protection
US8612463B2 (en)2010-06-032013-12-17Palo Alto Research Center IncorporatedIdentifying activities using a hybrid user-activity model
US8260914B1 (en)2010-06-222012-09-04Narus, Inc.Detecting DNS fast-flux anomalies
RU2446459C1 (en)2010-07-232012-03-27Закрытое акционерное общество "Лаборатория Касперского"System and method for checking web resources for presence of malicious components
RU2013108363A (en)2010-07-262014-09-10КВ Йонг КИМ INTEGRATED VIRUS OPERATION SECURITY MANAGEMENT DEVICE
US8924488B2 (en)2010-07-272014-12-30At&T Intellectual Property I, L.P.Employing report ratios for intelligent mobile messaging classification and anti-spam defense
JP6019484B2 (en)2010-08-252016-11-02ルックアウト、アイエヌシー. Systems and methods for server-bound malware prevention
EP2609537A1 (en)2010-08-262013-07-03Verisign, Inc.Method and system for automatic detection and analysis of malware
US8837769B2 (en)2010-10-062014-09-16Futurewei Technologies, Inc.Video signature based on image hashing and shot detection
US9626677B2 (en)2010-11-292017-04-18Biocatch Ltd.Identification of computerized bots, and identification of automated cyber-attack modules
US8521667B2 (en)2010-12-152013-08-27Microsoft CorporationDetection and categorization of malicious URLs
CN102082792A (en)2010-12-312011-06-01成都市华为赛门铁克科技有限公司Phishing webpage detection method and device
US8972412B1 (en)2011-01-312015-03-03Go Daddy Operating Company, LLCPredicting improvement in website search engine rankings based upon website linking relationships
US8726376B2 (en)2011-03-112014-05-13Openet Telecom Ltd.Methods, systems and devices for the detection and prevention of malware within a network
US8402543B1 (en)2011-03-252013-03-19Narus, Inc.Machine learning based botnet detection with dynamic adaptation
RU107616U1 (en)2011-03-282011-08-20Закрытое акционерное общество "Лаборатория Касперского" SYSTEM OF QUICK ANALYSIS OF DATA STREAM ON THE AVAILABILITY OF MALICIOUS OBJECTS
US9363278B2 (en)2011-05-112016-06-07At&T Mobility Ii LlcDynamic and selective response to cyber attack for telecommunications carrier networks
US8151341B1 (en)2011-05-232012-04-03Kaspersky Lab ZaoSystem and method for reducing false positives during detection of network attacks
US8555388B1 (en)2011-05-242013-10-08Palo Alto Networks, Inc.Heuristic botnet detection
EP2729895B1 (en)2011-07-082016-07-06The UAB Research FoundationSyntactical fingerprinting
WO2013008778A1 (en)2011-07-112013-01-17Mizunuma TakeshiIdentifier management method and system
GB2493514B (en)2011-08-022015-04-08Qatar FoundationCopy detection
US8677472B1 (en)2011-09-272014-03-18Emc CorporationMulti-point collection of behavioral data relating to a virtualized browsing session with a secure server
US8645355B2 (en)2011-10-212014-02-04Google Inc.Mapping Uniform Resource Locators of different indexes
US8584235B2 (en)2011-11-022013-11-12Bitdefender IPR Management Ltd.Fuzzy whitelisting anti-malware systems and methods
US9519781B2 (en)2011-11-032016-12-13Cyphort Inc.Systems and methods for virtualization and emulation assisted malware detection
RU2487406C1 (en)2011-11-242013-07-10Закрытое акционерное общество "Лаборатория Касперского"System and method of detecting malicious entities distributed over peer-to-peer networks
US8660296B1 (en)2012-01-102014-02-25Google Inc.Systems and methods for facilitating video fingerprinting using local descriptors
US9111090B2 (en)2012-04-022015-08-18Trusteer, Ltd.Detection of phishing attempts
RU2523114C2 (en)2012-04-062014-07-20Закрытое акционерное общество "Лаборатория Касперского"Method of analysing malicious activity on internet, detecting malicious network nodes and neighbouring intermediate nodes
US10304036B2 (en)2012-05-072019-05-28Nasdaq, Inc.Social media profiling for one or more authors using one or more social media platforms
RU2488880C1 (en)2012-05-112013-07-27Закрытое акционерное общество "Лаборатория Касперского"System and method of adaptive optimisation of inspection of data flow sent in network for availability of threats
US9154517B2 (en)2012-06-192015-10-06AO Kaspersky LabSystem and method for preventing spread of malware in peer-to-peer network
US9282117B2 (en)2012-07-242016-03-08Webroot Inc.System and method to provide automatic classification of phishing sites
RU2495486C1 (en)2012-08-102013-10-10Закрытое акционерное общество "Лаборатория Касперского"Method of analysing and detecting malicious intermediate nodes in network
CN103685174B (en)2012-09-072016-12-21中国科学院计算机网络信息中心A kind of detection method for phishing site of independent of sample
US9386030B2 (en)2012-09-182016-07-05Vencore Labs, Inc.System and method for correlating historical attacks with diverse indicators to generate indicator profiles for detecting and predicting future network attacks
US9215239B1 (en)2012-09-282015-12-15Palo Alto Networks, Inc.Malware detection based on traffic analysis
US10965775B2 (en)2012-11-202021-03-30Airbnb, Inc.Discovering signature of electronic social networks
RU2522019C1 (en)2012-12-252014-07-10Закрытое акционерное общество "Лаборатория Касперского"System and method of detecting threat in code executed by virtual machine
RU2536664C2 (en)2012-12-252014-12-27Закрытое акционерное общество "Лаборатория Касперского"System and method for automatic modification of antivirus database
RU2530210C2 (en)2012-12-252014-10-10Закрытое акционерное общество "Лаборатория Касперского"System and method for detecting malware preventing standard user interaction with operating system interface
RU129279U1 (en)2013-01-092013-06-20ОБЩЕСТВО С ОГРАНИЧЕННОЙ ОТВЕТСТВЕННОСТЬЮ "МФИ Софт" DEVICE FOR DETECTION AND PROTECTION AGAINST ANOMALOUS ACTIVITY ON DATA TRANSMISSION NETWORKS
US20160127402A1 (en)2014-11-042016-05-05Patternex, Inc.Method and apparatus for identifying and detecting threats to an enterprise or e-commerce system
US10425429B2 (en)2013-04-102019-09-24Gabriel BassettSystem and method for cyber security analysis and human behavior prediction
CN105324786A (en)*2013-04-112016-02-10布兰德席德有限公司 Device, system and method for protecting brand names and domain names
GB201306628D0 (en)2013-04-112013-05-29F Secure OyjDetecting and marking client devices
WO2014184711A2 (en)2013-05-132014-11-20Yandex Europe AgMethod of and system for providing a client device with an automatic update of an ip address associated with a domain name
US9357469B2 (en)2013-05-292016-05-31Rivada Networks, LlcMethods and system for dynamic spectrum arbitrage with mobility management
US9443075B2 (en)2013-06-272016-09-13The Mitre CorporationInterception and policy application for malicious communications
US9300686B2 (en)2013-06-282016-03-29Fireeye, Inc.System and method for detecting malicious links in electronic messages
CN103368958A (en)2013-07-052013-10-23腾讯科技(深圳)有限公司Method, device and system for detecting webpage
RU2538292C1 (en)2013-07-242015-01-10Открытое Акционерное Общество "Информационные Технологии И Коммуникационные Системы"Method of detecting computer attacks to networked computer system
KR102120823B1 (en)2013-08-142020-06-09삼성전자주식회사Method of controlling read sequence of nov-volatile memory device and memory system performing the same
CN103491205B (en)2013-09-302016-08-17北京奇虎科技有限公司The method for pushing of a kind of correlated resources address based on video search and device
US9330258B1 (en)2013-09-302016-05-03Symantec CorporationSystems and methods for identifying uniform resource locators that link to potentially malicious resources
BR112016007145A8 (en)2013-10-212020-03-03Microsoft Technology Licensing Llc method for searching layered audio-video, method for building a layered audio-video index, system, computer-readable medium, mobile device and computing device
GB2520987B (en)2013-12-062016-06-01Cyberlytic LtdUsing fuzzy logic to assign a risk level profile to a potential cyber threat
IN2013CH05744A (en)2013-12-122015-06-19Infosys Ltd
US20150363791A1 (en)2014-01-102015-12-17Hybrid Application Security Ltd.Business action based fraud detection system and method
US9060018B1 (en)2014-02-052015-06-16Pivotal Software, Inc.Finding command and control center computers by communication link tracking
US9262635B2 (en)2014-02-052016-02-16Fireeye, Inc.Detection efficacy of virtual machine-based analysis with application specific events
KR101514984B1 (en)2014-03-032015-04-24(주)엠씨알시스템Detecting system for detecting Homepage spreading Virus and Detecting method thereof
RU2543564C1 (en)2014-03-202015-03-10Закрытое акционерное общество "Научно-производственное предприятие "Информационные технологии в бизнесе"System of detection and prevention of intrusions based on control of access to resources
US9853997B2 (en)2014-04-142017-12-26Drexel UniversityMulti-channel change-point malware detection
CN103986731A (en)2014-05-302014-08-13北京奇虎科技有限公司 Method and device for detecting phishing web pages through image matching
US9332022B1 (en)2014-07-072016-05-03Symantec CorporationSystems and methods for detecting suspicious internet addresses
US9800592B2 (en)2014-08-042017-10-24Microsoft Technology Licensing, LlcData center architecture that supports attack detection and mitigation
US20160036837A1 (en)2014-08-042016-02-04Microsoft CorporationDetecting attacks on data centers
US9942250B2 (en)2014-08-062018-04-10Norse Networks, Inc.Network appliance for dynamic protection from risky network activities
KR101587161B1 (en)2014-09-032016-01-20한국전자통신연구원Apparatus and method for real-time network antivirus
RU2589310C2 (en)2014-09-302016-07-10Закрытое акционерное общество "Лаборатория Касперского"System and method of calculating interval of repeated determination of categories of network resource
WO2016064919A1 (en)2014-10-212016-04-28Abramowitz Marc LaurenDynamic security rating for cyber insurance products
US9832216B2 (en)2014-11-212017-11-28Bluvector, Inc.System and method for network data characterization
US10574675B2 (en)2014-12-052020-02-25T-Mobile Usa, Inc.Similarity search for discovering multiple vector attacks
US9367872B1 (en)2014-12-222016-06-14Palantir Technologies Inc.Systems and user interfaces for dynamic and interactive investigation of bad actor behavior based on automatic clustering of related data in various data structures
US9934376B1 (en)2014-12-292018-04-03Fireeye, Inc.Malware detection appliance architecture
US10230526B2 (en)2014-12-312019-03-12William ManningOut-of-band validation of domain name system records
US9712549B2 (en)2015-01-082017-07-18Imam Abdulrahman Bin Faisal UniversitySystem, apparatus, and method for detecting home anomalies
CN104504307B (en)2015-01-082017-09-29北京大学Audio frequency and video copy detection method and device based on copy cell
US11328307B2 (en)2015-02-242022-05-10OpSec Online, Ltd.Brand abuse monitoring system with infringement detection engine and graphical user interface
EP3065076A1 (en)2015-03-042016-09-07Secure-Nok ASSystem and method for responding to a cyber-attack-related incident against an industrial control system
US9253208B1 (en)2015-03-052016-02-02AO Kaspersky LabSystem and method for automated phishing detection rule evolution
US9769201B2 (en)2015-03-062017-09-19Radware, Ltd.System and method thereof for multi-tiered mitigation of cyber-attacks
US9712553B2 (en)2015-03-272017-07-18The Boeing CompanySystem and method for developing a cyber-attack scenario
US10382484B2 (en)2015-06-082019-08-13Illusive Networks Ltd.Detecting attackers who target containerized clusters
US9917852B1 (en)2015-06-292018-03-13Palo Alto Networks, Inc.DGA behavior detection
RU164629U1 (en)2015-06-302016-09-10Акционерное общество "Институт точной механики и вычислительной техники имени С.А. Лебедева Российской академии наук" ELECTRONIC MODULE OF PROTECTION AGAINST NETWORK ATTACKS ON THE BASIS OF THE NETWORK PROCESSOR NP-5
EP3125147B1 (en)2015-07-272020-06-03Swisscom AGSystem and method for identifying a phishing website
US9456000B1 (en)2015-08-062016-09-27Palantir Technologies Inc.Systems, methods, user interfaces, and computer-readable media for investigating potential malicious communications
CN106506435B (en)2015-09-082019-08-06中国电信股份有限公司For detecting the method and firewall system of network attack
WO2017049045A1 (en)2015-09-162017-03-23RiskIQ, Inc.Using hash signatures of dom objects to identify website similarity
CN105429956B (en)2015-11-022018-09-25重庆大学Malware detection system based on P2P dynamic clouds and method
US10200382B2 (en)2015-11-052019-02-05Radware, Ltd.System and method for detecting abnormal traffic behavior using infinite decaying clusters
RU2622870C2 (en)2015-11-172017-06-20Общество с ограниченной ответственностью "САЙТСЕКЬЮР"System and method for evaluating malicious websites
US9894036B2 (en)2015-11-172018-02-13Cyber Adapt, Inc.Cyber threat attenuation using multi-source threat data analysis
CN106709777A (en)2015-11-182017-05-24阿里巴巴集团控股有限公司Order clustering method and apparatus thereof, and anti-malicious information method and apparatus thereof
US10594710B2 (en)2015-11-202020-03-17Webroot Inc.Statistical analysis of network behavior using event vectors to identify behavioral anomalies using a composite score
RU2613535C1 (en)2015-11-202017-03-16Илья Самуилович РабиновичMethod for detecting malicious software and elements
US20180307832A1 (en)2015-12-142018-10-25Mitsubishi Electric CorporationInformation processing device, information processing method, and computer readable medium
US9723344B1 (en)2015-12-292017-08-01Google Inc.Early detection of policy violating media
US11069370B2 (en)2016-01-112021-07-20University Of Tennessee Research FoundationTampering detection and location identification of digital audio recordings
RU2628192C2 (en)2016-01-272017-08-15Акционерное общество "Творческо-производственное объединение "Центральная киностудия детских и юношеских фильмов им. М. Горького"Device for semantic classification and search in archives of digitized film materials
US9900338B2 (en)2016-02-092018-02-20International Business Machines CorporationForecasting and classifying cyber-attacks using neural embeddings based on pattern of life data
CA3015697C (en)2016-02-292022-11-22Securekey Technologies Inc.Systems and methods for distributed identity verification
US10063572B2 (en)2016-03-282018-08-28Accenture Global Solutions LimitedAntivirus signature distribution with distributed ledger
US10313382B2 (en)2016-03-292019-06-04The Mitre CorporationSystem and method for visualizing and analyzing cyber-attacks using a graph model
US10178107B2 (en)2016-04-062019-01-08Cisco Technology, Inc.Detection of malicious domains using recurring patterns in domain names
US10212145B2 (en)2016-04-062019-02-19Avaya Inc.Methods and systems for creating and exchanging a device specific blockchain for device authentication
CN105897714B (en)2016-04-112018-11-09天津大学Botnet detection method based on DNS traffic characteristics
RU2625050C1 (en)2016-04-252017-07-11Акционерное общество "Лаборатория Касперского"System and method of transactions trusted declaration
US11223598B2 (en)2016-05-032022-01-11Nokia Of America CorporationInternet security
RU2634211C1 (en)2016-07-062017-10-24Общество с ограниченной ответственностью "Траст"Method and system of protocols analysis of harmful programs interaction with control centers and detection of computer attacks
RU2636702C1 (en)2016-07-072017-11-27Общество С Ограниченной Ответственностью "Яндекс"Method and device for selecting network resource as source of content in recommendations system
US20180012144A1 (en)2016-07-112018-01-11Qualcomm Innovation Center, Inc.Incremental and speculative analysis of javascripts based on a multi-instance model for web security
CN106131016B (en)2016-07-132019-05-03北京知道创宇信息技术有限公司Malice URL detects interference method, system and device
US10212133B2 (en)2016-07-292019-02-19ShieldX Networks, Inc.Accelerated pattern matching using pattern functions
WO2018025157A1 (en)2016-07-312018-02-08Cymmetria, Inc.Deploying deception campaigns using communication breadcrumbs
US10498761B2 (en)2016-08-232019-12-03Duo Security, Inc.Method for identifying phishing websites and hindering associated activity
US10313352B2 (en)2016-10-262019-06-04International Business Machines CorporationPhishing detection with machine learning
WO2018095192A1 (en)2016-11-232018-05-31腾讯科技(深圳)有限公司Method and system for website attack detection and prevention
CN106713312A (en)2016-12-212017-05-24深圳市深信服电子科技有限公司Method and device for detecting illegal domain name
EP3649767A1 (en)2017-07-062020-05-13PixmPhishing detection method and system
CN107392456A (en)2017-07-142017-11-24武汉理工大学A kind of multi-angle rating business credit modeling method for merging internet information
RU2670906C9 (en)2017-12-282018-12-12Общество С Ограниченной Ответственностью "Центр Разработки И Внедрения Инновационных Технологий"Self-adjusting interactive system, method for message and/or call exchange between users of different web sites using client-server technology and computer readable medium
RU2676247C1 (en)2018-01-172018-12-26Общество С Ограниченной Ответственностью "Группа Айби"Web resources clustering method and computer device
RU2681699C1 (en)2018-02-132019-03-12Общество с ограниченной ответственностью "Траст"Method and server for searching related network resources
CN108737423B (en)2018-05-242020-07-14国家计算机网络与信息安全管理中心Phishing website discovery method and system based on webpage key content similarity analysis
RU2697925C1 (en)*2018-07-122019-08-21Акционерное Общество "Ремпаро"Hybrid automatic system for controlling users access to information resources in public computer networks
RU2701040C1 (en)2018-12-282019-09-24Общество с ограниченной ответственностью "Траст"Method and a computer for informing on malicious web resources

Also Published As

Publication numberPublication date
RU2740635C1 (en)2021-01-18
NL2025836B1 (en)2021-10-14
US20210279743A1 (en)2021-09-09
US11151581B2 (en)2021-10-19

Similar Documents

PublicationPublication DateTitle
EP3545644B8 (en)System and method for information protection
GB2581331B (en)A method and system for vehicle protection
AU2018347196A1 (en)System and method for information protection
PL3745637T3 (en)System and method for information protection
AU2018347197A1 (en)System and method for information protection
EP3523919A4 (en)System and method for information protection
ZA201903109B (en)System and method for information protection
EP3853772A4 (en)Machine-learning-assisted self-improving object-identification system and method
SG11202006772QA (en)System and method for decentralized-identifier creation
SG11202108509VA (en)Method and system for seizure detection
SG11202110410UA (en)Detection method and detection system
GB2593828B (en)Method, system and apparatus for auxiliary label detection and association
GB201901832D0 (en)Improved method and system for text based searching
GB201910654D0 (en)System event detection system and method
EP3803049A4 (en)Method and system for stick-slip mitigation
SG11202012810TA (en)System and method for storage
GB201904454D0 (en)Tracking system and method
IL289318A (en)System and method for contolling engine
EP3857395A4 (en)System and method for tagging database properties
SG10202001963TA (en)System and method for brand protection based on the search results
EP3746956A4 (en)Method and system for recycling reimbursement
EP4051462A4 (en)System and method for robotic evaluation
EP3991086A4 (en)Method and system for identifying object
GB202104016D0 (en)Workshop assistance system and workshop assistance method
EP4354407A4 (en)Position search system and position search method

[8]ページ先頭

©2009-2025 Movatter.jp