Movatterモバイル変換


[0]ホーム

URL:


US20140250048A1 - Analyzing behavior in light of social context - Google Patents

Analyzing behavior in light of social context
Download PDF

Info

Publication number
US20140250048A1
US20140250048A1US14/148,167US201414148167AUS2014250048A1US 20140250048 A1US20140250048 A1US 20140250048A1US 201414148167 AUS201414148167 AUS 201414148167AUS 2014250048 A1US2014250048 A1US 2014250048A1
Authority
US
United States
Prior art keywords
relational
event
actors
events
relational event
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/148,167
Inventor
Josh Lospinoso
Guy Louis Filippelli
Michael Marcus Gruen
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
RedOwl Analytics Inc
Original Assignee
RedOwl Analytics Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by RedOwl Analytics IncfiledCriticalRedOwl Analytics Inc
Priority to US14/148,167priorityCriticalpatent/US20140250048A1/en
Assigned to RedOwl Analytics, Inc.reassignmentRedOwl Analytics, Inc.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: FILIPPELLI, GUY LOUIS, GRUEN, Michael Marcus, LOSPINOSO, Josh
Priority to GB1517306.5Aprioritypatent/GB2526501A/en
Priority to PCT/US2014/020043prioritypatent/WO2014134630A1/en
Publication of US20140250048A1publicationCriticalpatent/US20140250048A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A relational event history is determined based on a data set, the relational event history. Data is populated in a probability model based on the relational event history, where the probability model is formulated as a series of conditional probabilities that correspond to a set of sequential decisions by an actor for each relational event, where the set of sequential decisions includes at least two decisions as to recipients of a relational event, where the probability model includes one or more statistical parameters and corresponding statistics that relate to one or more of senders, modes, topics, or recipients of relational events. A baseline communications behavior for the relational event history is determined based on the populated probability model, the baseline including a first set of values for the one or more statistical parameters, and departures within the relational event history from the baseline communications behavior are determined.

Description

Claims (17)

What is claimed is:
1. A method comprising:
determining a relational event history based on a data set, the relational event history comprising a set of relational events that occurred in time among a set of actors;
populating data in a probability model based on the relational event history, wherein the probability model is formulated as a series of conditional probabilities that correspond to a set of sequential decisions by an actor for each relational event, wherein the set of sequential decisions comprises at least two decisions as to recipients of a relational event, and wherein the probability model includes one or more statistical parameters and corresponding statistics that relate to one or more of senders of relational events, modes of relational events, topics of relational events, or recipients of relational events;
determining, by one or more processing devices, a baseline communications behavior for the relational event history based on the populated probability model, wherein the baseline comprises a first set of values for the one or more statistical parameters; and
determining departures from the baseline communications behavior within the relational event history.
2. The method ofclaim 1, wherein the at least two decisions as to recipients of the relational event comprise a first decision as to a social context of the communication, and one or more additional decisions as to which actors included within the social context will receive the relational event.
3. The method ofclaim 2, wherein a first social context includes a first set of actors, and wherein a second social context includes a second set of actors.
4. The method ofclaim 1, wherein the at least two decisions as to recipients of the communication comprise a first decision by an actor to send the relational event to a first recipient, and a second decision by the actor to send the relational event to a second recipient.
5. The method ofclaim 1, wherein a set of recipients of the relational event includes less than all of the actors in the set of actors.
6. The method ofclaim 1, further comprising determining a subset of actors included in the set of actors, wherein at least one decision included in the set of sequential decisions by the actor comprises selecting a recipient of the relational event from the subset of actors.
7. The method ofclaim 1, wherein determining departures from the baseline communications behavior within the relational event history comprises determining a second set of values for the statistical parameters based on one or more subsets of the relational events included in the relational event history and comparing the second set of values for the statistical parameters to the first set of values.
8. The method ofclaim 7, wherein comparing the second set of values for the statistical parameters to the first set of values comprises determining a hypothesis regarding communications behavior within the relational event history; and testing the hypothesis using the second set of values.
9. A system comprising:
one or more processing devices; and
one or more non-transitory computer-readable media coupled to the one or more processing devices having instructions stored thereon which, when executed by the one or more processing devices, cause the one or more processing devices to perform operations comprising:
determining a relational event history based on a data set, the relational event history comprising a set of relational events that occurred in time among a set of actors;
populating data in a probability model based on the relational event history, wherein the probability model is formulated as a series of conditional probabilities that correspond to a set of sequential decisions by an actor for each relational event, wherein the set of sequential decisions comprises at least two decisions as to recipients of a relational event, and wherein the probability model includes one or more statistical parameters and corresponding statistics that relate to one or more of senders of relational events, modes of relational events, topics of relational events, or recipients of relational events;
determining, by one or more processing devices, a baseline communications behavior for the relational event history based on the populated probability model, wherein the baseline comprises a first set of values for the one or more statistical parameters; and
determining departures from the baseline communications behavior within the relational event history.
10. The system ofclaim 9, wherein the at least two decisions as to recipients of the relational event comprise a first decision as to a social context of the communication, and one or more additional decisions as to which actors included within the social context will receive the relational event.
11. The system ofclaim 10, wherein a first social context includes a first set of actors, and wherein a second social context includes a second set of actors.
12. The system ofclaim 9, wherein the at least two decisions as to recipients of the communication comprise a first decision by an actor to send the relational event to a first recipient, and a second decision by the actor to send the relational event to a second recipient.
13. The system ofclaim 9, wherein a set of recipients of the relational event includes less than all of the actors in the set of actors.
14. The system ofclaim 9, further comprising determining a subset of actors included in the set of actors, wherein at least one decision included in the set of sequential decisions by the actor comprises selecting a recipient of the relational event from the subset of actors.
15. The system ofclaim 9, wherein determining departures from the baseline communications behavior within the relational event history comprises determining a second set of values for the statistical parameters based on one or more subsets of the relational events included in the relational event history and comparing the second set of values for the statistical parameters to the first set of values.
16. The system ofclaim 15, wherein comparing the second set of values for the statistical parameters to the first set of values comprises determining a hypothesis regarding communications behavior within the relational event history; and testing the hypothesis using the second set of values.
17. A non-transitory computer-readable medium embodying one or more instructions thereon which, when executed, cause one or more computer processors to perform steps comprising:
determining a relational event history based on a data set, the relational event history comprising a set of relational events that occurred in time among a set of actors;
populating data in a probability model based on the relational event history, wherein the probability model is formulated as a series of conditional probabilities that correspond to a set of sequential decisions by an actor for each relational event, wherein the set of sequential decisions comprises at least two decisions as to recipients of a relational event, and wherein the probability model includes one or more statistical parameters and corresponding statistics that relate to one or more of senders of relational events, modes of relational events, topics of relational events, or recipients of relational events;
determining, by one or more processing devices, a baseline communications behavior for the relational event history based on the populated probability model, wherein the baseline comprises a first set of values for the one or more statistical parameters; and
determining departures from the baseline communications behavior within the relational event history.
US14/148,1672013-03-012014-01-06Analyzing behavior in light of social contextAbandonedUS20140250048A1 (en)

Priority Applications (3)

Application NumberPriority DateFiling DateTitle
US14/148,167US20140250048A1 (en)2013-03-012014-01-06Analyzing behavior in light of social context
GB1517306.5AGB2526501A (en)2013-03-012014-03-03Modeling social behavior
PCT/US2014/020043WO2014134630A1 (en)2013-03-012014-03-03Modeling social behavior

Applications Claiming Priority (4)

Application NumberPriority DateFiling DateTitle
US201361771625P2013-03-012013-03-01
US201361771611P2013-03-012013-03-01
US201361803876P2013-03-212013-03-21
US14/148,167US20140250048A1 (en)2013-03-012014-01-06Analyzing behavior in light of social context

Publications (1)

Publication NumberPublication Date
US20140250048A1true US20140250048A1 (en)2014-09-04

Family

ID=51421388

Family Applications (7)

Application NumberTitlePriority DateFiling Date
US14/148,208AbandonedUS20140250052A1 (en)2013-03-012014-01-06Analyzing social behavior
US14/148,167AbandonedUS20140250048A1 (en)2013-03-012014-01-06Analyzing behavior in light of social context
US14/148,346Active2034-04-02US9542650B2 (en)2013-03-012014-01-06Analyzing behavior in light of social time
US14/148,181AbandonedUS20140250033A1 (en)2013-03-012014-01-06Social behavior hypothesis testing
US14/148,262AbandonedUS20140250049A1 (en)2013-03-012014-01-06Visualizing social behavior
US14/148,164AbandonedUS20140249785A1 (en)2013-03-012014-01-06Modeling social behavior
US15/399,147Active2036-05-10US10776708B2 (en)2013-03-012017-01-05Analyzing behavior in light of social time

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US14/148,208AbandonedUS20140250052A1 (en)2013-03-012014-01-06Analyzing social behavior

Family Applications After (5)

Application NumberTitlePriority DateFiling Date
US14/148,346Active2034-04-02US9542650B2 (en)2013-03-012014-01-06Analyzing behavior in light of social time
US14/148,181AbandonedUS20140250033A1 (en)2013-03-012014-01-06Social behavior hypothesis testing
US14/148,262AbandonedUS20140250049A1 (en)2013-03-012014-01-06Visualizing social behavior
US14/148,164AbandonedUS20140249785A1 (en)2013-03-012014-01-06Modeling social behavior
US15/399,147Active2036-05-10US10776708B2 (en)2013-03-012017-01-05Analyzing behavior in light of social time

Country Status (1)

CountryLink
US (7)US20140250052A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10607243B2 (en)*2016-08-112020-03-31Ricoh Company, Ltd.User behavior analysis method and device as well as non-transitory computer-readable medium
US11157824B2 (en)2015-10-212021-10-26Pairity, Inc.Technologies for evaluating relationships between social networking profiles

Families Citing this family (44)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
GB2526501A (en)2013-03-012015-11-25Redowl Analytics IncModeling social behavior
US20140250052A1 (en)*2013-03-012014-09-04RedOwl Analytics, Inc.Analyzing social behavior
US10425783B1 (en)*2014-09-102019-09-24West CorporationProviding data messaging support by intercepting and processing received short message service (SMS) messages at a customer support service
US11030584B2 (en)*2015-07-172021-06-08Adp, LlcSystem and method for managing events
US11468368B2 (en)*2015-10-282022-10-11Qomplx, Inc.Parametric modeling and simulation of complex systems using large datasets and heterogeneous data structures
US11888859B2 (en)2017-05-152024-01-30Forcepoint LlcAssociating a security risk persona with a phase of a cyber kill chain
US10999296B2 (en)2017-05-152021-05-04Forcepoint, LLCGenerating adaptive trust profiles using information derived from similarly situated organizations
US20190004926A1 (en)*2017-06-292019-01-03Nicira, Inc.Methods and systems that probabilistically generate testing loads
US10318729B2 (en)2017-07-262019-06-11Forcepoint, LLCPrivacy protection during insider threat monitoring
US10803178B2 (en)2017-10-312020-10-13Forcepoint LlcGenericized data model to perform a security analytics operation
US11977987B2 (en)*2017-11-082024-05-07Sparkbeyond LtdAutomatic hypothesis generation using geospatial data
US11314787B2 (en)2018-04-182022-04-26Forcepoint, LLCTemporal resolution of an entity
US11029809B2 (en)*2018-05-102021-06-08Citrix Systems, Inc.System for displaying electronic mail metadata and related methods
US11810012B2 (en)2018-07-122023-11-07Forcepoint LlcIdentifying event distributions using interrelated events
US11436512B2 (en)2018-07-122022-09-06Forcepoint, LLCGenerating extracted features from an event
US11755584B2 (en)2018-07-122023-09-12Forcepoint LlcConstructing distributions of interrelated event features
US10949428B2 (en)2018-07-122021-03-16Forcepoint, LLCConstructing event distributions via a streaming scoring operation
US11811799B2 (en)2018-08-312023-11-07Forcepoint LlcIdentifying security risks using distributions of characteristic features extracted from a plurality of events
US10891950B2 (en)2018-09-272021-01-12International Business Machines CorporationGraph based prediction for next action in conversation flow
US11025659B2 (en)2018-10-232021-06-01Forcepoint, LLCSecurity system using pseudonyms to anonymously identify entities and corresponding security risk related behaviors
US11171980B2 (en)2018-11-022021-11-09Forcepoint LlcContagion risk detection, analysis and protection
CN111294310B (en)*2018-12-062022-04-29上海西门子医疗器械有限公司 Automatic extraction of workflow methods and detection of intrusions in distributed systems
CN110716774B (en)*2019-08-222021-06-25华信永道(北京)科技股份有限公司Data driving method, system and storage medium for brain of financial business data
US12052333B2 (en)2019-11-082024-07-30Rambler Wheels, LlcContinuous time adjustment daylight saving time method and apparatus
US11570197B2 (en)2020-01-222023-01-31Forcepoint LlcHuman-centric risk modeling framework
US11630901B2 (en)2020-02-032023-04-18Forcepoint LlcExternal trigger induced behavioral analyses
US11080109B1 (en)2020-02-272021-08-03Forcepoint LlcDynamically reweighting distributions of event observations
US11836265B2 (en)2020-03-022023-12-05Forcepoint LlcType-dependent event deduplication
US11429697B2 (en)2020-03-022022-08-30Forcepoint, LLCEventually consistent entity resolution
US11080032B1 (en)2020-03-312021-08-03Forcepoint LlcContainerized infrastructure for deployment of microservices
US11568136B2 (en)2020-04-152023-01-31Forcepoint LlcAutomatically constructing lexicons from unlabeled datasets
US12130908B2 (en)2020-05-012024-10-29Forcepoint LlcProgressive trigger data and detection model
US11516206B2 (en)2020-05-012022-11-29Forcepoint LlcCybersecurity system having digital certificate reputation system
US11544390B2 (en)2020-05-052023-01-03Forcepoint LlcMethod, system, and apparatus for probabilistic identification of encrypted files
US11895158B2 (en)2020-05-192024-02-06Forcepoint LlcCybersecurity system having security policy visualization
US11266912B2 (en)*2020-05-302022-03-08Sony Interactive Entertainment LLCMethods and systems for processing disruptive behavior within multi-player video game
US11704387B2 (en)2020-08-282023-07-18Forcepoint LlcMethod and system for fuzzy matching and alias matching for streaming data sets
US11190589B1 (en)2020-10-272021-11-30Forcepoint, LLCSystem and method for efficient fingerprinting in cloud multitenant data loss prevention
US11556510B1 (en)*2022-02-182023-01-17Kpmg LlpSystem and method for enriching and normalizing data
US20240362194A1 (en)*2022-02-182024-10-31Kpmg LlpSystem and method for enriching and normalizing data
US20230281310A1 (en)*2022-03-012023-09-07Meta Plataforms, Inc.Systems and methods of uncertainty-aware self-supervised-learning for malware and threat detection
US12107700B2 (en)2022-08-292024-10-01Zoom Video Communications, Inc.User-aware communication feature identification
US12107814B2 (en)2022-08-292024-10-01Zoom Video Communications, Inc.Selective multi-modal and channel alerting of missed communications
US12099429B2 (en)2022-12-022024-09-24Bank Of America CorporationSystems, methods, and apparatuses for identifying, logging and reporting application events in an electronic network

Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20090182872A1 (en)*2008-01-162009-07-16Hong Jack LMethod and Apparatus for Detecting Events Indicative of Inappropriate Activity in an Online Community
US20120110087A1 (en)*2010-04-302012-05-03Andrew CulverCollaboration tool
US20130013550A1 (en)*2010-03-292013-01-10Eric James KerbyInception of Live Events
US20130317808A1 (en)*2012-05-242013-11-28About, Inc.System for and method of analyzing and responding to user generated content

Family Cites Families (152)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
DE69433509T2 (en)1994-10-272004-12-23International Business Machines Corp. METHOD AND DEVICE FOR SAFE IDENTIFICATION OF A MOBILE PARTICIPANT IN A COMMUNICATION NETWORK
US20020112015A1 (en)1999-03-022002-08-15International Business Machines CorporationSelective security encryption of electronic communication for selected recipients
US7206765B2 (en)2001-01-172007-04-17Contentguard Holdings, Inc.System and method for supplying and managing usage rights based on rules
US20040044613A1 (en)2002-05-152004-03-04Kabushiki Kaisha ToshibaPrice evaluation system and method for derivative security, and risk management system and method for power exchange
JP2006518080A (en)2003-02-142006-08-03プリベンシス,インコーポレイティド Network audit and policy assurance system
AU2004248608A1 (en)2003-06-092004-12-23Greenline Systems, Inc.A system and method for risk detection, reporting and infrastructure
US20050198099A1 (en)2004-02-242005-09-08Covelight Systems, Inc.Methods, systems and computer program products for monitoring protocol responses for a server application
US20050278178A1 (en)2004-06-102005-12-15International Business Machines CorporationSystem and method for intrusion decision-making in autonomic computing environments
US7694150B1 (en)2004-06-222010-04-06Cisco Technology, IncSystem and methods for integration of behavioral and signature based security
US7761920B2 (en)2004-09-032010-07-20Fortinet, Inc.Data structure for policy-based remediation selection
US7549158B2 (en)2004-08-312009-06-16Microsoft CorporationMethod and system for customizing a security policy
US7467293B2 (en)2004-11-122008-12-16Tsinghua UniversityMethod and computing system for transparence computing on the computer network
US20060112111A1 (en)2004-11-222006-05-25Nec Laboratories America, Inc.System and methods for data analysis and trend prediction
US7962960B2 (en)2005-02-252011-06-14Verizon Business Global LlcSystems and methods for performing risk analysis
US7877780B2 (en)2005-04-012011-01-25Parasoft CorporationSystem and method for enforcing functionality in computer software through policies
US8312064B1 (en)2005-05-112012-11-13Symantec CorporationMethod and apparatus for securing documents using a position dependent file system
US7882262B2 (en)2005-08-182011-02-01Cisco Technology, Inc.Method and system for inline top N query computation
US8046833B2 (en)2005-11-142011-10-25Sourcefire, Inc.Intrusion event correlation with network discovery information
US7792049B2 (en)2005-11-302010-09-07Novell, Inc.Techniques for modeling and evaluating protocol interactions
CN100556042C (en)2006-03-102009-10-28腾讯科技(深圳)有限公司A kind of accounts security management system and method based on instant messaging
US20070225995A1 (en)2006-03-172007-09-27Moore Barrett HMethod and Security Modules for an Incident Deployment and Response System for Facilitating Access to Private Civil Security Resources
US8151327B2 (en)2006-03-312012-04-03The 41St Parameter, Inc.Systems and methods for detection of session tampering and fraud prevention
US8490163B1 (en)2006-09-082013-07-16Intapp, Inc.Enforcing security policies across heterogeneous systems
US8424061B2 (en)2006-09-122013-04-16International Business Machines CorporationMethod, system and program product for authenticating a user seeking to perform an electronic service request
EP2069993B1 (en)2006-10-042016-03-09Behaviometrics ABSecurity system and method for detecting intrusion in a computerized system
US9015301B2 (en)2007-01-052015-04-21Digital Doors, Inc.Information infrastructure management tools with extractor, secure storage, content analysis and classification and method therefor
US20080168002A1 (en)2007-01-052008-07-10Kagarlis Marios APrice Indexing
US20080168453A1 (en)2007-01-092008-07-10Caterpillar Inc.Work prioritization system and method
US8792161B2 (en)2007-02-212014-07-29Globalfoundries Inc.Optical polarizer with nanotube array
US9063979B2 (en)2007-11-012015-06-23Ebay, Inc.Analyzing event streams of user sessions
US7933960B2 (en)2007-12-282011-04-26International Business Machines CorporationSystem and method for solving ambiguous meanings of unknown words used in instant messaging
WO2009115921A2 (en)2008-02-222009-09-24Ipath Technologies Private LimitedTechniques for enterprise resource mobilization
US9489495B2 (en)2008-02-252016-11-08Georgetown UniversitySystem and method for detecting, collecting, analyzing, and communicating event-related information
GB2458568B (en)2008-03-272012-09-19Covertix LtdSystem and method for dynamically enforcing security policies on electronic files
CA2727831C (en)2008-06-122019-02-05Guardian Analytics, Inc.Modeling users for fraud detection and analysis
US20100057662A1 (en)2008-07-312010-03-04Techfinity, Inc.System for real-time probablistic resource management
US20100058016A1 (en)2008-08-262010-03-04Jari NikaraMethod, apparatus and software product for multi-channel memory sandbox
US8826443B1 (en)2008-09-182014-09-02Symantec CorporationSelective removal of protected content from web requests sent to an interactive website
US8260823B2 (en)2008-10-092012-09-04International Business Machines CorporationDissemination, acquisition, discovery and use of people-oriented folksonomies
US8327443B2 (en)2008-10-292012-12-04Lockheed Martin CorporationMDL compress system and method for signature inference and masquerade intrusion detection
WO2010123586A2 (en)2009-04-242010-10-28Allgress, Inc.Enterprise information security management software for prediction modeling with interactive graphs
US20120137367A1 (en)2009-11-062012-05-31Cataphora, Inc.Continuous anomaly detection based on behavior modeling and heterogeneous information analysis
US10282702B2 (en)2010-01-042019-05-07Bank Of America CorporationDynamic employee security risk scoring
US9069954B2 (en)2010-05-252015-06-30Hewlett-Packard Development Company, L.P.Security threat detection associated with security events and an actor category model
US8812342B2 (en)2010-06-152014-08-19International Business Machines CorporationManaging and monitoring continuous improvement in detection of compliance violations
US8418229B2 (en)2010-08-172013-04-09Bank Of America CorporationSystems and methods for performing access entitlement reviews
US20120046989A1 (en)2010-08-172012-02-23Bank Of America CorporationSystems and methods for determining risk outliers and performing associated risk reviews
JP5731223B2 (en)2011-02-142015-06-10インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation Abnormality detection device, monitoring control system, abnormality detection method, program, and recording medium
US20130340035A1 (en)2011-03-092013-12-19Hewlett-Packard Development Company, L.P.Performing a change process based on a policy
US9373267B2 (en)2011-04-082016-06-21Wombat Security Technologies, Inc.Method and system for controlling context-aware cybersecurity training
US8380838B2 (en)2011-04-082013-02-19International Business Machines CorporationReduction of alerts in information technology systems
US8983887B2 (en)*2011-04-112015-03-17Xerox CorporationProbabilistic sampling using search trees constrained by heuristic bounds
RU2477929C2 (en)2011-04-192013-03-20Закрытое акционерное общество "Лаборатория Касперского"System and method for prevention safety incidents based on user danger rating
US9607336B1 (en)2011-06-162017-03-28Consumerinfo.Com, Inc.Providing credit inquiry alerts
US20130054433A1 (en)2011-08-252013-02-28T-Mobile Usa, Inc.Multi-Factor Identity Fingerprinting with User Behavior
US8839349B2 (en)2011-10-182014-09-16Mcafee, Inc.Integrating security policy and event management
US8892461B2 (en)2011-10-212014-11-18Alohar Mobile Inc.Mobile device user behavior analysis and authentication
US8973147B2 (en)2011-12-292015-03-03Mcafee, Inc.Geo-mapping system security events
US9043905B1 (en)2012-01-232015-05-26Hrl Laboratories, LlcSystem and method for insider threat detection
US9922333B2 (en)2012-03-092018-03-20Exponential Interactive, Inc.Automated multivariate behavioral prediction
US8990392B1 (en)2012-04-112015-03-24NCC Group Inc.Assessing a computing resource for compliance with a computing resource policy regime specification
US9342553B1 (en)2012-05-132016-05-17Google Inc.Identifying distinct combinations of values for entities based on information in an index
US9202047B2 (en)2012-05-142015-12-01Qualcomm IncorporatedSystem, apparatus, and method for adaptive observation of mobile device behavior
BR112014028739B1 (en)2012-05-182022-07-19Tata Consultancy Services Limited SYSTEM AND METHOD TO CREATE STRUCTURED EVENT OBJECTS
EP2856209B1 (en)2012-06-012019-05-22Landauer, Inc.Wireless, motion and position-sensing, integrating radiation sensor for occupational and environmental dosimetry
US9461876B2 (en)2012-08-292016-10-04LociSystem and method for fuzzy concept mapping, voting ontology crowd sourcing, and technology prediction
US8935769B2 (en)2012-09-282015-01-13Liveensure, Inc.Method for mobile security via multi-factor context authentication
US9262722B1 (en)*2012-11-272016-02-16Isaac S. DanielSystem and method of measuring a social networker's influence on social networking websites
US10417653B2 (en)2013-01-042019-09-17PlaceIQ, Inc.Inferring consumer affinities based on shopping behaviors with unsupervised machine learning models
US9742559B2 (en)2013-01-222017-08-22Qualcomm IncorporatedInter-module authentication for securing application execution integrity within a computing device
US9246941B1 (en)2013-02-272016-01-26Symantec CorporationSystems and methods for predicting the impact of security-policy changes on users
US20140250052A1 (en)*2013-03-012014-09-04RedOwl Analytics, Inc.Analyzing social behavior
US9060020B2 (en)2013-04-012015-06-16Arbor Networks, Inc.Adjusting DDoS protection based on traffic type
US9607146B2 (en)2013-09-182017-03-28Qualcomm IncorporatedData flow based behavioral analysis on mobile devices
KR101436874B1 (en)2013-10-182014-09-11한국전자통신연구원Apparatus and method for improving detection performance of intrusion detection system
WO2015084726A1 (en)2013-12-022015-06-11Qbase, LLCEvent detection through text analysis template models
US9544361B2 (en)2013-12-022017-01-10Qbase, LLCEvent detection through text analysis using dynamic self evolving/learning module
US9652362B2 (en)2013-12-062017-05-16Qualcomm IncorporatedMethods and systems of using application-specific and application-type-specific models for the efficient classification of mobile device behaviors
US9830450B2 (en)2013-12-232017-11-28Interset Software, Inc.Method and system for analyzing risk
US9177138B2 (en)2014-01-102015-11-03Bank Of America CorporationChange convergence risk planning and avoidance
US9721316B2 (en)2014-01-102017-08-01Bank Of America CorporationChange convergence risk mapping
US9563771B2 (en)2014-01-222017-02-07Object Security LTDAutomated and adaptive model-driven security system and method for operating the same
US20150220625A1 (en)2014-02-032015-08-06Interdigital Patent Holdings, Inc.Methods and apparatus for conveying surveillance targets using bloom filters
US10506053B2 (en)2014-03-072019-12-10Comcast Cable Communications, LlcLocation aware security system
US10284601B1 (en)2014-03-312019-05-07EMC IP Holding Company LLCManaging deviations between expected and normal operations of authentication systems
US9306964B2 (en)2014-04-042016-04-05Netscout Systems, Inc.Using trust profiles for network breach detection
US9286453B2 (en)2014-05-062016-03-15International Business Machines CorporationDynamic adjustment of authentication policy
US9529987B2 (en)2014-05-092016-12-27Behaviometrics AbBehavioral authentication system using a behavior server for authentication of multiple users based on their behavior
US9485267B2 (en)2014-06-022016-11-01Bastille Networks, Inc.Anomalous behavior detection using radio frequency fingerprints and access credentials
US10237298B1 (en)2014-06-172019-03-19Wells Fargo Bank, N.A.Session management
WO2015199719A1 (en)2014-06-272015-12-30Hewlett Packard Enterprise Development L.P.Security policy based on risk
JPWO2016006520A1 (en)2014-07-072017-04-27日本電信電話株式会社 Detection device, detection method, and detection program
US10230747B2 (en)2014-07-152019-03-12Cisco Technology, Inc.Explaining network anomalies using decision trees
US9787723B2 (en)2014-07-182017-10-10Ping Identify CorporationDevices and methods for threat-based authentication for access to computing resources
US9166999B1 (en)2014-07-252015-10-20Fmr LlcSecurity risk aggregation, analysis, and adaptive control
GB2529670A (en)2014-08-282016-03-02IbmStorage system
US20160078362A1 (en)2014-09-152016-03-17Qualcomm IncorporatedMethods and Systems of Dynamically Determining Feature Sets for the Efficient Classification of Mobile Device Behaviors
US20170279616A1 (en)2014-09-192017-09-28Interdigital Technology CorporationDynamic user behavior rhythm profiling for privacy preserving personalized service
US9747551B2 (en)2014-09-292017-08-29Pivotal Software, Inc.Determining and localizing anomalous network behavior
US9798883B1 (en)2014-10-062017-10-24Exabeam, Inc.System, method, and computer program product for detecting and assessing security risks in a network
US11200130B2 (en)2015-09-182021-12-14Splunk Inc.Automatic entity control in a machine data driven service monitoring system
US9245057B1 (en)2014-10-092016-01-26Splunk Inc.Presenting a graphical visualization along a time-based graph lane using key performance indicators derived from machine data
US10096065B2 (en)2015-01-162018-10-09Red Hat, Inc.Distributed transactions with extended locks
US9659166B2 (en)2015-01-302017-05-23International Business Machines CorporationRisk-based credential management
US20160232353A1 (en)2015-02-092016-08-11Qualcomm IncorporatedDetermining Model Protection Level On-Device based on Malware Detection in Similar Devices
US10412106B2 (en)2015-03-022019-09-10Verizon Patent And Licensing Inc.Network threat detection and management system based on user behavior information
US10063585B2 (en)2015-03-182018-08-28Qualcomm IncorporatedMethods and systems for automated anonymous crowdsourcing of characterized device behaviors
US20160277360A1 (en)2015-03-202016-09-22Migrate2, LLCDynamic Data Exfiltration Prevention Process (DDEPP)
WO2016160744A1 (en)2015-03-272016-10-06Twitter, Inc.Live video streaming services
EP3274928A4 (en)2015-03-272018-12-12Equifax, Inc.Optimizing neural networks for risk assessment
US9536072B2 (en)2015-04-092017-01-03Qualcomm IncorporatedMachine-learning behavioral analysis to detect device theft and unauthorized device usage
US10225268B2 (en)2015-04-202019-03-05Capital One Services, LlcSystems and methods for automated retrieval, processing, and distribution of cyber-threat information
US10320813B1 (en)2015-04-302019-06-11Amazon Technologies, Inc.Threat detection and mitigation in a virtualized computing environment
IL296064B2 (en)2015-05-042024-09-01Syed Kamran Hasan A method and device for managing security in a computer network
WO2016183167A1 (en)2015-05-132016-11-17Rajmy SayavongIdentified presence detection in and around premises
US10043006B2 (en)2015-06-172018-08-07Accenture Global Services LimitedEvent anomaly analysis and prediction
US10419428B2 (en)2015-07-052019-09-17NXT-ID, Inc.System and method to authenticate electronics using electronic-metrics
US10275671B1 (en)2015-07-142019-04-30Wells Fargo Bank, N.A.Validating identity and/or location from video and/or audio
US10430721B2 (en)2015-07-272019-10-01Pivotal Software, Inc.Classifying user behavior as anomalous
US10387880B2 (en)2015-08-182019-08-20International Business Machines CorporationLocation history and travel path knowledge based authentication
US9699205B2 (en)2015-08-312017-07-04Splunk Inc.Network security system
CN108780479B (en)2015-09-052022-02-11万事达卡技术加拿大无限责任公司System and method for detecting and scoring anomalies
US9876825B2 (en)2016-02-042018-01-23Amadeus S.A.S.Monitoring user authenticity
WO2017136695A1 (en)2016-02-052017-08-10Defensestorm, Inc.Enterprise policy tracking with security incident integration
US11080706B2 (en)2016-03-072021-08-03International Business Machines CorporationBlocking fraudulent transactions in an NFC device
US10599837B2 (en)2016-03-312020-03-24International Business Machines CorporationDetecting malicious user activity
US9888007B2 (en)2016-05-132018-02-06Idm Global, Inc.Systems and methods to authenticate users and/or control access made by users on a computer network using identity services
US10341391B1 (en)2016-05-162019-07-02EMC IP Holding Company LLCNetwork session based user behavior pattern analysis and associated anomaly detection and verification
US20170339160A1 (en)2016-05-172017-11-23International Business Machines CorporationThreat-aware provisioning and governance
US10372910B2 (en)2016-06-202019-08-06Jask Labs Inc.Method for predicting and characterizing cyber attacks
US10452840B2 (en)2016-07-142019-10-22Qualcomm IncorporatedDevices and methods for classifying an execution session
US20180082307A1 (en)2016-09-192018-03-22Experian Health, Inc.Selection of pre-arranged assistance from an electronic qualification transaction
US10104088B2 (en)2016-09-282018-10-16International Business Machines CorporationTraitor tracing for obfuscated credentials
US10187369B2 (en)2016-09-302019-01-22Idm Global, Inc.Systems and methods to authenticate users and/or control access made by users on a computer network based on scanning elements for inspection according to changes made in a relation graph
US10275828B2 (en)2016-11-022019-04-30Experian Health, IncExpanded data processing for improved entity matching
US9756061B1 (en)2016-11-182017-09-05Extrahop Networks, Inc.Detecting attacks using passive network monitoring
US10432669B1 (en)2016-11-282019-10-01Palo Alto Networks, Inc.Security appliance to monitor networked computing environment
US10635648B2 (en)2016-11-302020-04-28Nutanix, Inc.Entity identifier generation in distributed computing systems
EP3343422B1 (en)2016-12-302021-04-28Capital One Services, LLCSystems and methods for detecting resources responsible for events
US10397359B2 (en)2016-12-302019-08-27Google LlcStreaming media cache for media streaming service
US10601800B2 (en)2017-02-242020-03-24Fmr LlcSystems and methods for user authentication using pattern-based risk assessment and adjustment
US10817966B2 (en)2017-03-302020-10-27Experian Health, Inc.Expanded data processing for entity matching
US10721239B2 (en)2017-03-312020-07-21Oracle International CorporationMechanisms for anomaly detection and access management
US10389739B2 (en)2017-04-072019-08-20Amdocs Development LimitedSystem, method, and computer program for detecting regular and irregular events associated with various entities
US10878102B2 (en)2017-05-162020-12-29Micro Focus LlcRisk scores for entities
US20180341889A1 (en)2017-05-252018-11-29Centene CorporationEntity level classifier using machine learning
KR102369228B1 (en)2017-05-252022-02-28삼성에스디에스 주식회사Risk analysis apparatus and method for risk based authentication
US10410086B2 (en)2017-05-302019-09-10Google LlcSystems and methods of person recognition in video streams
CN108377240B (en)2018-02-072020-05-15平安科技(深圳)有限公司Abnormal interface detection method and device, computer equipment and storage medium
GB2572541A (en)2018-03-272019-10-09Innoplexus AgSystem and method for identifying at least one association of entity
US10417454B1 (en)2018-06-052019-09-17Cyberark Software Ltd.Automated secure operating system policy integration
US11205168B2 (en)2018-06-262021-12-21International Business Machines CorporationFrictionless microlocation detection and authorization

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20090182872A1 (en)*2008-01-162009-07-16Hong Jack LMethod and Apparatus for Detecting Events Indicative of Inappropriate Activity in an Online Community
US20130013550A1 (en)*2010-03-292013-01-10Eric James KerbyInception of Live Events
US20120110087A1 (en)*2010-04-302012-05-03Andrew CulverCollaboration tool
US20130317808A1 (en)*2012-05-242013-11-28About, Inc.System for and method of analyzing and responding to user generated content

Cited By (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US11157824B2 (en)2015-10-212021-10-26Pairity, Inc.Technologies for evaluating relationships between social networking profiles
US11436513B2 (en)2015-10-212022-09-06Ontario Systems, LlcTechnologies for evaluating relationships between social networking profiles
US12073335B2 (en)2015-10-212024-08-27Pairity, Inc.Technologies for evaluating relationships between social networking profiles
US10607243B2 (en)*2016-08-112020-03-31Ricoh Company, Ltd.User behavior analysis method and device as well as non-transitory computer-readable medium

Also Published As

Publication numberPublication date
US20170116541A1 (en)2017-04-27
US20140250049A1 (en)2014-09-04
US10776708B2 (en)2020-09-15
US20140249785A1 (en)2014-09-04
US20140250033A1 (en)2014-09-04
US20140250052A1 (en)2014-09-04
US9542650B2 (en)2017-01-10
US20140250050A1 (en)2014-09-04

Similar Documents

PublicationPublication DateTitle
US10776708B2 (en)Analyzing behavior in light of social time
US11783216B2 (en)Analyzing behavior in light of social time
US10614077B2 (en)Computer system for automated assessment at scale of topic-specific social media impact
Aral et al.Productivity effects of information diffusion in networks
US12223352B2 (en)Systems and methods for maintaining data objects to manage asynchronous workflows
US20160203316A1 (en)Activity model for detecting suspicious user activity
EP2885755B1 (en)Agent system, agent control method and agent control program with ability of natural conversation with users
US20110153383A1 (en)System and method for distributed elicitation and aggregation of risk information
US20130185232A1 (en)Probabilistic event networks based on distributed time-stamped data
US10042944B2 (en)Suggested keywords
US20240202057A1 (en)Methods and systems for determining stopping point
CN118945270A (en) Call strategy method, device, equipment and medium based on predicting user behavior
JP6357435B2 (en) SELECTION BEHAVIOR MODELING DEVICE, SELECTION BEHAVIOR PREDICTION DEVICE, METHOD, AND PROGRAM
SparksMonitoring communications: aiming to identify periods of unusually increased communications between parties of interest
FoxEstimation and inference for self-exciting point processes with applications to social networks and earthquake seismology
Collier et al.Alternative methods for interpreting Monte Carlo experiments
US12147876B1 (en)Methods and systems for facilitating stratified elusion and recall
US11699132B1 (en)Methods and systems for facilitating family-based review
Stewart et al.Why is it difficult to detect sudden and unexpected epidemic outbreaks in Twitter?
McLevey et al.Missing Network Data
Navaroli et al.Modeling individual email patterns over time with latent variable models
Wan et al.Evolutionary Prediction of Information Propagation Dynamics Based on Time Series Characteristics
Cangussu et al.On the selection of software defect estimation techniques
Ruiz-IrigoyenEffective and Efficient Analysis on Internet-based Social Networks

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:REDOWL ANALYTICS, INC., MARYLAND

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LOSPINOSO, JOSH;FILIPPELLI, GUY LOUIS;GRUEN, MICHAEL MARCUS;REEL/FRAME:031905/0822

Effective date:20140105

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp