Movatterモバイル変換


[0]ホーム

URL:


US20170070521A1 - Systems and methods for detecting and scoring anomalies - Google Patents

Systems and methods for detecting and scoring anomalies
Download PDF

Info

Publication number
US20170070521A1
US20170070521A1US15/256,597US201615256597AUS2017070521A1US 20170070521 A1US20170070521 A1US 20170070521A1US 201615256597 AUS201615256597 AUS 201615256597AUS 2017070521 A1US2017070521 A1US 2017070521A1
Authority
US
United States
Prior art keywords
values
bucket
count
attribute
buckets
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/256,597
Inventor
Christopher Everett Bailey
Randy Lukashuk
Gary Wayne Richardson
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nudata Security Inc
Original Assignee
Nudata Security Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nudata Security IncfiledCriticalNudata Security Inc
Priority to US15/256,597priorityCriticalpatent/US20170070521A1/en
Assigned to NUDATA SECURITY INC.reassignmentNUDATA SECURITY INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: BAILEY, CHRISTOPHER EVERETT, LUKASHUK, Randy, RICHARDSON, GARY WAYNE
Publication of US20170070521A1publicationCriticalpatent/US20170070521A1/en
Assigned to Mastercard Technologies Canada ULCreassignmentMastercard Technologies Canada ULCCERTIFICATE OF AMALGAMATIONAssignors: NUDATA SECURITY INC.
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Systems and methods for detecting and scoring anomalies. In some embodiments, a method is provided, comprising acts of: (A) identifying a plurality of values of an attribute, each value of the plurality of values corresponding respectively to a digital interaction of the plurality of digital interactions; (B) dividing the plurality of values into a plurality of buckets; (C) for at least one bucket of the plurality of buckets, determining a count of values from the plurality of values that fall within the at least one bucket; (D) comparing the count of values from the plurality of values that fall within the at least one bucket against historical information regarding the attribute; and (E) determining whether the attribute is anomalous based at least in part on a result of the act (D).

Description

Claims (30)

What is claimed is:
1. A computer-implemented method for analyzing a plurality of digital interactions, the method comprising acts of:
(A) identifying a plurality of values of an attribute, each value of the plurality of values corresponding respectively to a digital interaction of the plurality of digital interactions;
(B) dividing the plurality of values into a plurality of buckets;
(C) for at least one bucket of the plurality of buckets, determining a count of values from the plurality of values that fall within the at least one bucket;
(D) comparing the count of values from the plurality of values that fall within the at least one bucket against historical information regarding the attribute; and
(E) determining whether the attribute is anomalous based at least in part on a result of the act (D).
2. The method ofclaim 1, wherein:
each value of the plurality of values comprises a time measurement between a first point and a second point in the corresponding digital interaction; and
each bucket of the plurality of buckets comprises a range of time measurements.
3. The method ofclaim 1, wherein:
the act (B) of dividing the plurality of values into a plurality of buckets comprises applying a hash-modding operation to each value of the plurality of values; and
each bucket of the plurality of buckets corresponds to a residue of the hash-modding operation.
4. The method ofclaim 3, further comprising acts of:
(F) recording a plurality of observations with respect to the attribute, each observation of the plurality of observations being recorded from a corresponding digital interaction of the plurality of digital interactions; and
(G) deriving each value of the plurality of values based on the observation recorded from the corresponding digital interaction.
5. The method ofclaim 1, wherein the historical information regarding the attribute comprises an expected count for the at least one bucket, and wherein the act (D) comprises:
comparing the count of values from the plurality of values that fall within the at least one bucket against the expected count for the at least one bucket.
6. The method ofclaim 5, wherein the act (E) comprises:
determining if the count of values from the plurality of values that fall within the at least one bucket exceeds the expected count for the at least one bucket by at least a selected threshold amount, wherein the attribute is determined to be anomalous in response to determining that the count of values from the plurality of values that fall within the at least one bucket exceeds the expected count for the at least one bucket by at least the selected threshold amount.
7. The method ofclaim 5, wherein:
the plurality of digital interactions comprises a plurality of first digital interactions observed from a first time period;
the plurality of values comprises a plurality of first values of the attribute;
dividing a plurality of second values of the attribute into the plurality of buckets, each value of the plurality of second values corresponding respectively to a digital interaction of a plurality of second digital interactions;
the expected count for the at least one bucket comprises a count of values from the plurality of second values that fall within the at least one bucket;
the plurality of second digital interactions were observed from a second time period, the second time period having a same length as the first time period; and
the first time period occurs after the second time period.
8. The method ofclaim 5, wherein the plurality of buckets comprises a plurality of first buckets, and wherein the method further comprises acts of:
determining if the count of values from the plurality of values that fall within the at least one bucket exceeds the expected count for the at least one bucket by at least a selected threshold amount; and
in response to determining that the count of values that fall within the at least one bucket exceeds the expected count for the at least one bucket by at least the selected threshold amount, dividing the plurality of values into a plurality of second buckets, wherein there are more second buckets than first buckets.
9. The method ofclaim 1, wherein the historical information regarding the attribute comprises an expected ratio for the at least one bucket, and wherein the act (D) comprises:
determining a ratio between the count of values from the plurality of values that fall within the at least one bucket, and a total count of values from the plurality of values; and
comparing the ratio against the expected ratio for the at least one bucket.
10. The method ofclaim 1, further comprising acts of:
selecting a plurality of attributes, the plurality of attributes comprising the attribute, wherein acts (A)-(E) are performed for each attribute of the plurality of attributes; and
storing, in a profile, information regarding one or more attributes that are determined to be anomalous.
11. A system comprising at least one processor and at least one computer-readable storage medium having stored thereon instructions which, when executed, program the at least one processor to perform a method for analyzing a plurality of digital interactions, the method comprising acts of:
(A) identifying a plurality of values of an attribute, each value of the plurality of values corresponding respectively to a digital interaction of the plurality of digital interactions;
(B) dividing the plurality of values into a plurality of buckets;
(C) for at least one bucket of the plurality of buckets, determining a count of values from the plurality of values that fall within the at least one bucket;
(D) comparing the count of values from the plurality of values that fall within the at least one bucket against historical information regarding the attribute; and
(E) determining whether the attribute is anomalous based at least in part on a result of the act (D).
12. The system ofclaim 11, wherein:
each value of the plurality of values comprises a time measurement between a first point and a second point in the corresponding digital interaction; and
each bucket of the plurality of buckets comprises a range of time measurements.
13. The system ofclaim 11, wherein:
the act (B) of dividing the plurality of values into a plurality of buckets comprises applying a hash-modding operation to each value of the plurality of values; and
each bucket of the plurality of buckets corresponds to a residue of the hash-modding operation.
14. The system ofclaim 13, wherein the method further comprises acts of:
(F) recording a plurality of observations with respect to the attribute, each observation of the plurality of observations being recorded from a corresponding digital interaction of the plurality of digital interactions; and
(G) deriving each value of the plurality of values based on the observation recorded from the corresponding digital interaction.
15. The system ofclaim 11, wherein the historical information regarding the attribute comprises an expected count for the at least one bucket, and wherein the act (D) comprises:
comparing the count of values from the plurality of values that fall within the at least one bucket against the expected count for the at least one bucket.
16. The system ofclaim 15, wherein the act (E) comprises:
determining if the count of values from the plurality of values that fall within the at least one bucket exceeds the expected count for the at least one bucket by at least a selected threshold amount, wherein the attribute is determined to be anomalous in response to determining that the count of values from the plurality of values that fall within the at least one bucket exceeds the expected count for the at least one bucket by at least the selected threshold amount.
17. The system ofclaim 15, wherein:
the plurality of digital interactions comprises a plurality of first digital interactions observed from a first time period;
the plurality of values comprises a plurality of first values of the attribute;
dividing a plurality of second values of the attribute into the plurality of buckets, each value of the plurality of second values corresponding respectively to a digital interaction of a plurality of second digital interactions;
the expected count for the at least one bucket comprises a count of values from the plurality of second values that fall within the at least one bucket;
the plurality of second digital interactions were observed from a second time period, the second time period having a same length as the first time period; and
the first time period occurs after the second time period.
18. The system ofclaim 15, wherein the plurality of buckets comprises a plurality of first buckets, and wherein the method further comprises acts of:
determining if the count of values from the plurality of values that fall within the at least one bucket exceeds the expected count for the at least one bucket by at least a selected threshold amount; and
in response to determining that the count of values that fall within the at least one bucket exceeds the expected count for the at least one bucket by at least the selected threshold amount, dividing the plurality of values into a plurality of second buckets, wherein there are more second buckets than first buckets.
19. The system ofclaim 11, wherein the historical information regarding the attribute comprises an expected ratio for the at least one bucket, and wherein the act (D) comprises:
determining a ratio between the count of values from the plurality of values that fall within the at least one bucket, and a total count of values from the plurality of values; and
comparing the ratio against the expected ratio for the at least one bucket.
20. The system ofclaim 11, wherein the method further comprises acts of:
selecting a plurality of attributes, the plurality of attributes comprising the attribute, wherein acts (A)-(E) are performed for each attribute of the plurality of attributes; and
storing, in a profile, information regarding one or more attributes that are determined to be anomalous.
21. At least one computer-readable storage medium having stored thereon instructions which, when executed, program at least one processor to perform a method for analyzing a plurality of digital interactions, the method comprising acts of:
(A) identifying a plurality of values of an attribute, each value of the plurality of values corresponding respectively to a digital interaction of the plurality of digital interactions;
(B) dividing the plurality of values into a plurality of buckets;
(C) for at least one bucket of the plurality of buckets, determining a count of values from the plurality of values that fall within the at least one bucket;
(D) comparing the count of values from the plurality of values that fall within the at least one bucket against historical information regarding the attribute; and
(E) determining whether the attribute is anomalous based at least in part on a result of the act (D).
22. The at least one computer-readable storage medium ofclaim 21, wherein:
each value of the plurality of values comprises a time measurement between a first point and a second point in the corresponding digital interaction; and
each bucket of the plurality of buckets comprises a range of time measurements.
23. The at least one computer-readable storage medium ofclaim 21, wherein:
the act (B) of dividing the plurality of values into a plurality of buckets comprises applying a hash-modding operation to each value of the plurality of values; and
each bucket of the plurality of buckets corresponds to a residue of the hash-modding operation.
24. The at least one computer-readable storage medium ofclaim 23, wherein the method further comprises acts of:
(F) recording a plurality of observations with respect to the attribute, each observation of the plurality of observations being recorded from a corresponding digital interaction of the plurality of digital interactions; and
(G) deriving each value of the plurality of values based on the observation recorded from the corresponding digital interaction.
25. The at least one computer-readable storage medium ofclaim 21, wherein the historical information regarding the attribute comprises an expected count for the at least one bucket, and wherein the act (D) comprises:
comparing the count of values from the plurality of values that fall within the at least one bucket against the expected count for the at least one bucket.
26. The at least one computer-readable storage medium ofclaim 25, wherein the act (E) comprises:
determining if the count of values from the plurality of values that fall within the at least one bucket exceeds the expected count for the at least one bucket by at least a selected threshold amount, wherein the attribute is determined to be anomalous in response to determining that the count of values from the plurality of values that fall within the at least one bucket exceeds the expected count for the at least one bucket by at least the selected threshold amount.
27. The at least one computer-readable storage medium ofclaim 25, wherein:
the plurality of digital interactions comprises a plurality of first digital interactions observed from a first time period;
the plurality of values comprises a plurality of first values of the attribute;
dividing a plurality of second values of the attribute into the plurality of buckets, each value of the plurality of second values corresponding respectively to a digital interaction of a plurality of second digital interactions;
the expected count for the at least one bucket comprises a count of values from the plurality of second values that fall within the at least one bucket;
the plurality of second digital interactions were observed from a second time period, the second time period having a same length as the first time period; and
the first time period occurs after the second time period.
28. The at least one computer-readable storage medium ofclaim 25, wherein the plurality of buckets comprises a plurality of first buckets, and wherein the method further comprises acts of:
determining if the count of values from the plurality of values that fall within the at least one bucket exceeds the expected count for the at least one bucket by at least a selected threshold amount; and
in response to determining that the count of values that fall within the at least one bucket exceeds the expected count for the at least one bucket by at least the selected threshold amount, dividing the plurality of values into a plurality of second buckets, wherein there are more second buckets than first buckets.
29. The at least one computer-readable storage medium ofclaim 21, wherein the historical information regarding the attribute comprises an expected ratio for the at least one bucket, and wherein the act (D) comprises:
determining a ratio between the count of values from the plurality of values that fall within the at least one bucket, and a total count of values from the plurality of values; and
comparing the ratio against the expected ratio for the at least one bucket.
30. The at least one computer-readable storage medium ofclaim 21, wherein the method further comprises acts of:
selecting a plurality of attributes, the plurality of attributes comprising the attribute, wherein acts (A)-(E) are performed for each attribute of the plurality of attributes; and
storing, in a profile, information regarding one or more attributes that are determined to be anomalous.
US15/256,5972015-09-052016-09-04Systems and methods for detecting and scoring anomaliesAbandonedUS20170070521A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US15/256,597US20170070521A1 (en)2015-09-052016-09-04Systems and methods for detecting and scoring anomalies

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US201562214969P2015-09-052015-09-05
US15/256,597US20170070521A1 (en)2015-09-052016-09-04Systems and methods for detecting and scoring anomalies

Publications (1)

Publication NumberPublication Date
US20170070521A1true US20170070521A1 (en)2017-03-09

Family

ID=58187372

Family Applications (14)

Application NumberTitlePriority DateFiling Date
US15/256,600ActiveUS9749356B2 (en)2015-09-052016-09-04Systems and methods for detecting and scoring anomalies
US15/256,613ActiveUS9749357B2 (en)2015-09-052016-09-04Systems and methods for matching and scoring sameness
US15/256,616ActiveUS9680868B2 (en)2015-09-052016-09-04Systems and methods for matching and scoring sameness
US15/256,597AbandonedUS20170070521A1 (en)2015-09-052016-09-04Systems and methods for detecting and scoring anomalies
US15/256,610ActiveUS9979747B2 (en)2015-09-052016-09-04Systems and methods for detecting and preventing spoofing
US15/256,611ActiveUS10212180B2 (en)2015-09-052016-09-04Systems and methods for detecting and preventing spoofing
US15/256,607ActiveUS10129279B2 (en)2015-09-052016-09-04Systems and methods for detecting and preventing spoofing
US15/256,612ActiveUS9813446B2 (en)2015-09-052016-09-04Systems and methods for matching and scoring sameness
US15/256,603ActiveUS9648034B2 (en)2015-09-052016-09-04Systems and methods for detecting and scoring anomalies
US15/256,617ActiveUS9749358B2 (en)2015-09-052016-09-04Systems and methods for matching and scoring sameness
US15/411,805ActiveUS9800601B2 (en)2015-09-052017-01-20Systems and methods for detecting and scoring anomalies
US15/617,542ActiveUS10965695B2 (en)2015-09-052017-06-08Systems and methods for matching and scoring sameness
US15/908,228Active2037-07-07US10805328B2 (en)2015-09-052018-02-28Systems and methods for detecting and scoring anomalies
US16/232,789ActiveUS10749884B2 (en)2015-09-052018-12-26Systems and methods for detecting and preventing spoofing

Family Applications Before (3)

Application NumberTitlePriority DateFiling Date
US15/256,600ActiveUS9749356B2 (en)2015-09-052016-09-04Systems and methods for detecting and scoring anomalies
US15/256,613ActiveUS9749357B2 (en)2015-09-052016-09-04Systems and methods for matching and scoring sameness
US15/256,616ActiveUS9680868B2 (en)2015-09-052016-09-04Systems and methods for matching and scoring sameness

Family Applications After (10)

Application NumberTitlePriority DateFiling Date
US15/256,610ActiveUS9979747B2 (en)2015-09-052016-09-04Systems and methods for detecting and preventing spoofing
US15/256,611ActiveUS10212180B2 (en)2015-09-052016-09-04Systems and methods for detecting and preventing spoofing
US15/256,607ActiveUS10129279B2 (en)2015-09-052016-09-04Systems and methods for detecting and preventing spoofing
US15/256,612ActiveUS9813446B2 (en)2015-09-052016-09-04Systems and methods for matching and scoring sameness
US15/256,603ActiveUS9648034B2 (en)2015-09-052016-09-04Systems and methods for detecting and scoring anomalies
US15/256,617ActiveUS9749358B2 (en)2015-09-052016-09-04Systems and methods for matching and scoring sameness
US15/411,805ActiveUS9800601B2 (en)2015-09-052017-01-20Systems and methods for detecting and scoring anomalies
US15/617,542ActiveUS10965695B2 (en)2015-09-052017-06-08Systems and methods for matching and scoring sameness
US15/908,228Active2037-07-07US10805328B2 (en)2015-09-052018-02-28Systems and methods for detecting and scoring anomalies
US16/232,789ActiveUS10749884B2 (en)2015-09-052018-12-26Systems and methods for detecting and preventing spoofing

Country Status (8)

CountryLink
US (14)US9749356B2 (en)
EP (3)EP3345099B1 (en)
CN (3)CN108780479B (en)
AU (7)AU2016315900B2 (en)
CA (3)CA2997585C (en)
IL (3)IL257849B2 (en)
SG (1)SG10201909133YA (en)
WO (3)WO2017060778A2 (en)

Cited By (65)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20170192872A1 (en)*2014-12-112017-07-06Hewlett Packard Enterprise Development LpInteractive detection of system anomalies
US9800601B2 (en)2015-09-052017-10-24Nudata Security Inc.Systems and methods for detecting and scoring anomalies
US9842204B2 (en)2008-04-012017-12-12Nudata Security Inc.Systems and methods for assessing security risk
US9946864B2 (en)2008-04-012018-04-17Nudata Security Inc.Systems and methods for implementing and tracking identification tests
US9990487B1 (en)2017-05-052018-06-05Mastercard Technologies Canada ULCSystems and methods for distinguishing among human users and software robots
US10007776B1 (en)2017-05-052018-06-26Mastercard Technologies Canada ULCSystems and methods for distinguishing among human users and software robots
US20180219890A1 (en)*2017-02-012018-08-02Cisco Technology, Inc.Identifying a security threat to a web-based resource
US20180285854A1 (en)*2017-03-292018-10-04International Business Machines CorporationSensory data collection in an augmented reality system
US20180302425A1 (en)*2017-04-172018-10-18Splunk Inc.Detecting fraud by correlating user behavior biometrics with other data sources
US10127373B1 (en)2017-05-052018-11-13Mastercard Technologies Canada ULCSystems and methods for distinguishing among human users and software robots
US20190020676A1 (en)*2017-07-122019-01-17The Boeing CompanyMobile security countermeasures
US20190068623A1 (en)*2017-08-242019-02-28Level 3 Communications, LlcLow-complexity detection of potential network anomalies using intermediate-stage processing
US10305773B2 (en)*2017-02-152019-05-28Dell Products, L.P.Device identity augmentation
US10419268B2 (en)*2017-01-272019-09-17Bmc Software, Inc.Automated scoring of unstructured events in information technology environments
US20190306170A1 (en)*2018-03-302019-10-03Yanlin WangSystems and methods for adaptive data collection using analytics agents
US20200019698A1 (en)*2018-07-112020-01-16Vmware, Inc.Entropy based security detection system
US10642995B2 (en)*2017-07-262020-05-05Forcepoint LlcMethod and system for reducing risk score volatility
US20200233958A1 (en)*2019-08-072020-07-23Alibaba Group Holding LimitedMethod and system for active risk control based on intelligent interaction
US10769283B2 (en)2017-10-312020-09-08Forcepoint, LLCRisk adaptive protection
WO2020176978A1 (en)*2019-03-012020-09-10Mastercard Technologies Canada ULCFeature drift hardened online application origination (oao) service for fraud prevention systems
US10776708B2 (en)2013-03-012020-09-15Forcepoint, LLCAnalyzing behavior in light of social time
US10832153B2 (en)2013-03-012020-11-10Forcepoint, LLCAnalyzing behavior in light of social time
US10949428B2 (en)2018-07-122021-03-16Forcepoint, LLCConstructing event distributions via a streaming scoring operation
US11003525B2 (en)*2019-03-232021-05-11AO Kaspersky LabSystem and method of identifying and addressing anomalies in a system
US11010257B2 (en)*2018-10-122021-05-18EMC IP Holding Company LLCMemory efficient perfect hashing for large records
US11025659B2 (en)2018-10-232021-06-01Forcepoint, LLCSecurity system using pseudonyms to anonymously identify entities and corresponding security risk related behaviors
US11025638B2 (en)2018-07-192021-06-01Forcepoint, LLCSystem and method providing security friction for atypical resource access requests
US11037428B2 (en)*2019-03-272021-06-15International Business Machines CorporationDetecting and analyzing actions against a baseline
US11042591B2 (en)2015-06-232021-06-22Splunk Inc.Analytical search engine
US11068798B2 (en)*2016-02-092021-07-20Upside Services, IncSystems and methods for short identifier behavioral analytics
US11080109B1 (en)2020-02-272021-08-03Forcepoint LlcDynamically reweighting distributions of event observations
US11080032B1 (en)2020-03-312021-08-03Forcepoint LlcContainerized infrastructure for deployment of microservices
WO2021155471A1 (en)*2020-02-072021-08-12Mastercard Technologies Canada ULCAutomated web traffic anomaly detection
US11113342B2 (en)*2015-06-232021-09-07Splunk Inc.Techniques for compiling and presenting query results
US11157614B1 (en)*2021-01-272021-10-26Malwarebytes Inc.Prevention of false positive detection of malware
US11171980B2 (en)2018-11-022021-11-09Forcepoint LlcContagion risk detection, analysis and protection
US11188550B2 (en)2016-09-262021-11-30Splunk Inc.Metrics store system
US11190589B1 (en)2020-10-272021-11-30Forcepoint, LLCSystem and method for efficient fingerprinting in cloud multitenant data loss prevention
US11223646B2 (en)2020-01-222022-01-11Forcepoint, LLCUsing concerning behaviors when performing entity-based risk calculations
US11258655B2 (en)2018-12-062022-02-22Vmware, Inc.Holo-entropy based alarm scoring approach
US11310343B2 (en)*2018-08-022022-04-19Paul SwenglerUser and user device registration and authentication
US11314787B2 (en)2018-04-182022-04-26Forcepoint, LLCTemporal resolution of an entity
US11315010B2 (en)2017-04-172022-04-26Splunk Inc.Neural networks for detecting fraud based on user behavior biometrics
US11368464B2 (en)*2019-11-282022-06-21Salesforce.Com, Inc.Monitoring resource utilization of an online system based on statistics describing browser attributes
US11372956B2 (en)2017-04-172022-06-28Splunk Inc.Multiple input neural networks for detecting fraud
US11381570B2 (en)*2019-12-202022-07-05Beijing Didi Infinity Technology And Development Co., Ltd.Identity and access management dynamic control and remediation
US11411973B2 (en)2018-08-312022-08-09Forcepoint, LLCIdentifying security risks using distributions of characteristic features extracted from a plurality of events
US11429697B2 (en)2020-03-022022-08-30Forcepoint, LLCEventually consistent entity resolution
US11436512B2 (en)2018-07-122022-09-06Forcepoint, LLCGenerating extracted features from an event
US11475125B2 (en)*2019-05-012022-10-18EMC IP Holding Company LLCDistribution-based aggregation of scores across multiple events
US11516225B2 (en)2017-05-152022-11-29Forcepoint LlcHuman factors framework
US11516206B2 (en)2020-05-012022-11-29Forcepoint LlcCybersecurity system having digital certificate reputation system
US11544390B2 (en)2020-05-052023-01-03Forcepoint LlcMethod, system, and apparatus for probabilistic identification of encrypted files
US11568136B2 (en)2020-04-152023-01-31Forcepoint LlcAutomatically constructing lexicons from unlabeled datasets
US11620180B2 (en)2018-11-292023-04-04Vmware, Inc.Holo-entropy adaptive boosting based anomaly detection
US11630901B2 (en)2020-02-032023-04-18Forcepoint LlcExternal trigger induced behavioral analyses
US11704387B2 (en)2020-08-282023-07-18Forcepoint LlcMethod and system for fuzzy matching and alias matching for streaming data sets
US11755584B2 (en)2018-07-122023-09-12Forcepoint LlcConstructing distributions of interrelated event features
US11810012B2 (en)2018-07-122023-11-07Forcepoint LlcIdentifying event distributions using interrelated events
US11836265B2 (en)2020-03-022023-12-05Forcepoint LlcType-dependent event deduplication
US11888859B2 (en)2017-05-152024-01-30Forcepoint LlcAssociating a security risk persona with a phase of a cyber kill chain
US11895158B2 (en)2020-05-192024-02-06Forcepoint LlcCybersecurity system having security policy visualization
US11928683B2 (en)2019-10-012024-03-12Mastercard Technologies Canada ULCFeature encoding in online application origination (OAO) service for a fraud prevention system
US12047373B2 (en)2019-11-052024-07-23Salesforce.Com, Inc.Monitoring resource utilization of an online system based on browser attributes collected for a session
US12130908B2 (en)2020-05-012024-10-29Forcepoint LlcProgressive trigger data and detection model

Families Citing this family (148)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8938053B2 (en)2012-10-152015-01-20Twilio, Inc.System and method for triggering on platform usage
US11165770B1 (en)*2013-12-062021-11-02A10 Networks, Inc.Biometric verification of a human internet user
HK1243512A1 (en)2014-11-032018-07-13Level 3 Communications, LlcIdentifying a potential ddos attack using statistical analysis
US9600651B1 (en)*2015-01-052017-03-21Kimbia, Inc.System and method for determining use of non-human users in a distributed computer network environment
CZ2015471A3 (en)*2015-07-072016-09-29Aducid S.R.O.Method of assignment of at least two authentication devices to the account of a user using authentication server
US10671337B2 (en)2015-09-252020-06-02Oracle International CorporationAutomatic sizing of agent's screen for html co-browsing applications
US11657399B1 (en)*2015-10-062023-05-23Wells Fargo Bank, N.A.Value-added services provided in a seamless life format
US10346421B1 (en)*2015-10-162019-07-09Trifacta Inc.Data profiling of large datasets
US9985980B1 (en)*2015-12-152018-05-29EMC IP Holding Company LLCEntropy-based beaconing detection
US9967275B1 (en)*2015-12-172018-05-08EMC IP Holding Company LLCEfficient detection of network anomalies
EP3430767B1 (en)*2016-03-162020-09-23Telefonaktiebolaget LM Ericsson (PUBL)Method and device for real-time network event processing
US10148683B1 (en)*2016-03-292018-12-04Microsoft Technology Licensing, LlcATO threat detection system
US10187421B2 (en)2016-06-062019-01-22Paypal, Inc.Cyberattack prevention system
US10924479B2 (en)*2016-07-202021-02-16Aetna Inc.System and methods to establish user profile using multiple channels
US10165005B2 (en)*2016-09-072018-12-25Oracle International CorporationSystem and method providing data-driven user authentication misuse detection
US10769608B2 (en)*2016-09-152020-09-08International Business Machines CorporationIntelligent checkout management system
US10225731B2 (en)*2016-10-312019-03-05Mastercard International IncorporatedAnonymously linking cardholder information with communication service subscriber information
US11074325B1 (en)*2016-11-092021-07-27Wells Fargo Bank, N.A.Systems and methods for dynamic bio-behavioral authentication
TWI622894B (en)*2016-12-132018-05-01宏碁股份有限公司Electronic device and method for detecting malicious file
CN108243115B (en)*2016-12-262021-06-29新华三技术有限公司 Message processing method and device
US9942255B1 (en)*2016-12-302018-04-10Google LlcMethod and system for detecting abusive behavior in hosted services
US10645086B1 (en)*2016-12-302020-05-05Charles Schwab & Co., Inc.System and method for handling user requests for web services
US12266018B1 (en)2017-01-162025-04-01Bind Benefits, Inc.Use determination risk coverage datastructure for on-demand and increased efficiency coverage detection and rebalancing apparatuses, processes and systems
CA3054319A1 (en)*2017-02-272018-08-30Ivanti, Inc.Systems and methods for context-based mitigation of computer security risks
US10503896B2 (en)*2017-03-172019-12-10Chronicle LlcDetecting data breaches
US10402413B2 (en)*2017-03-312019-09-03Intel CorporationHardware accelerator for selecting data elements
US10360391B2 (en)*2017-04-032019-07-23International Business Machines CorporationVerifiable keyed all-or-nothing transform
US10038788B1 (en)*2017-05-092018-07-31Oracle International CorporationSelf-learning adaptive routing system
US11394731B2 (en)*2017-05-162022-07-19Citrix Systems, Inc.Computer system providing anomaly detection within a virtual computing sessions and related methods
CN108966340B (en)*2017-05-172020-10-13腾讯科技(深圳)有限公司Equipment positioning method and device
EP3625748B1 (en)*2017-05-192023-06-07LiveRamp, Inc.Distributed node cluster for establishing a digital touchpoint across multiple devices on a digital communications network
US10567421B2 (en)*2017-05-242020-02-18Oath Inc.Systems and methods for analyzing network data to identify human and non-human users in network communications
US11128643B2 (en)*2017-07-172021-09-21Hewlett-Packard Development Company, L.P.Activity detection based on time difference metrics
US10984427B1 (en)*2017-09-132021-04-20Palantir Technologies Inc.Approaches for analyzing entity relationships
US10601864B1 (en)*2017-10-052020-03-24Symantec CorporationUsing disposable profiles for privacy in internet sessions
US10635813B2 (en)2017-10-062020-04-28Sophos LimitedMethods and apparatus for using machine learning on multiple file fragments to identify malware
US10911439B2 (en)*2017-10-122021-02-02Mx Technologies, Inc.Aggregation platform permissions
US11184369B2 (en)*2017-11-132021-11-23Vectra Networks, Inc.Malicious relay and jump-system detection using behavioral indicators of actors
US11682016B2 (en)*2017-11-302023-06-20Mastercard International IncorporatedSystem to perform identity verification
US10965683B1 (en)2017-12-072021-03-30Wells Fargo Bank, N.A.Login and authentication methods and systems
US11349869B1 (en)*2017-12-222022-05-31Spins Ventures LlcNetwork device detection and verification protocol
FR3076922A1 (en)*2018-01-122019-07-19Ingenico Group METHOD FOR DETERMINING AN ASSOCIATION BETWEEN A BANKING CARD AND A COMMUNICATION TERMINAL, DEVICE, SYSTEM AND PROGRAM THEREOF
US11003774B2 (en)2018-01-262021-05-11Sophos LimitedMethods and apparatus for detection of malicious documents using machine learning
US11941491B2 (en)2018-01-312024-03-26Sophos LimitedMethods and apparatus for identifying an impact of a portion of a file on machine learning classification of malicious content
US10719613B1 (en)*2018-02-232020-07-21Facebook, Inc.Systems and methods for protecting neural network weights
US10699190B1 (en)*2018-03-042020-06-30Facebook, Inc.Systems and methods for efficiently updating neural networks
US11354617B1 (en)2018-03-122022-06-07Amazon Technologies, Inc.Managing shipments based on data from a sensor-based automatic replenishment device
US11137479B1 (en)2018-03-202021-10-05Amazon Technologies, Inc.Product specific correction for a sensor-based device
US10373118B1 (en)2018-03-212019-08-06Amazon Technologies, Inc.Predictive consolidation system based on sensor data
US11144921B2 (en)*2018-04-052021-10-12The Toronto-Dominion BankGeneration and provisioning of digital tokens based on dynamically obtained contextual data
US11102190B2 (en)2018-04-262021-08-24Radware Ltd.Method and system for blockchain based cyber protection of network entities
US10924484B2 (en)2018-04-262021-02-16Radware, Ltd.Method for determining a cost to allow a blockchain-based admission to a protected entity
US11361011B1 (en)*2018-04-262022-06-14Amazon Technologies, Inc.Sensor-related improvements to automatic replenishment devices
CN110535809B (en)*2018-05-252021-08-31腾讯科技(深圳)有限公司 Method for pulling identification code, storage medium, terminal device and server
GB2574209B (en)*2018-05-302020-12-16F Secure CorpControlling Threats on a Computer System by Searching for Matching Events on other Endpoints
US20200007565A1 (en)*2018-07-022020-01-02Ebay Inc.Passive automated content entry detection system
US11157837B2 (en)2018-08-022021-10-26Sas Institute Inc.Advanced detection of rare events and corresponding interactive graphical user interface
US11017100B2 (en)*2018-08-032021-05-25Verizon Patent And Licensing Inc.Identity fraud risk engine platform
WO2020030913A1 (en)2018-08-072020-02-13Sophos LimitedMethods and apparatus for management of a machine-learning model to adapt to changes in landscape of potentially malicious artifacts
US10715471B2 (en)*2018-08-222020-07-14Synchronoss Technologies, Inc.System and method for proof-of-work based on hash mining for reducing spam attacks
US10997290B2 (en)*2018-10-032021-05-04Paypal, Inc.Enhancing computer security via detection of inconsistent internet browser versions
CN112823502B (en)*2018-10-032023-07-25维萨国际服务协会Real-time feedback service for resource access rule configuration
US11947668B2 (en)2018-10-122024-04-02Sophos LimitedMethods and apparatus for preserving information between layers within a neural network
US11558409B2 (en)*2018-10-312023-01-17SpyCloud, Inc.Detecting use of passwords that appear in a repository of breached credentials
US10904616B2 (en)*2018-11-062021-01-26International Business Machines CorporationFiltering of content in near real time
CN109685670A (en)*2018-12-132019-04-26平安医疗健康管理股份有限公司Social security violation detection method, device, equipment and computer readable storage medium
US10885180B2 (en)*2018-12-212021-01-05Paypal, Inc.Detection of emulated computer systems using variable difficulty challenges
US11743290B2 (en)*2018-12-212023-08-29Fireeye Security Holdings Us LlcSystem and method for detecting cyberattacks impersonating legitimate sources
RU2724783C1 (en)*2018-12-282020-06-25Акционерное общество "Лаборатория Касперского"Candidate fingerprint matching and comparison system and method
CN109738220B (en)*2019-01-072021-01-08哈尔滨工业大学(深圳)Sensor optimal arrangement method based on multi-load working condition structure response correlation
CN113454600B (en)*2019-03-042024-04-09华为云计算技术有限公司 Automatic root cause analysis in distributed systems using trace data
US11171978B2 (en)*2019-03-272021-11-09Microsoft Technology Licensing, Llc.Dynamic monitoring, detection of emerging computer events
US11886888B2 (en)*2019-03-282024-01-30Lenovo (Singapore) Pte. Ltd.Reduced application view during loading
WO2020204927A1 (en)*2019-04-042020-10-08Hewlett-Packard Development Company, L.P.Determining whether received data is required by an analytic
CN110222525B (en)*2019-05-142021-08-06新华三大数据技术有限公司Database operation auditing method and device, electronic equipment and storage medium
US11245724B2 (en)*2019-06-072022-02-08Paypal, Inc.Spoofed webpage detection
US11550891B2 (en)*2019-06-192023-01-10Preventice Solutions, Inc.Login token management
US11178163B2 (en)*2019-07-022021-11-16Easy Solutions Enterprises Corp.Location spoofing detection using round-trip times
US10498760B1 (en)*2019-07-162019-12-03ALSCO Software LLCMonitoring system for detecting and preventing a malicious program code from being uploaded from a client computer to a webpage computer server
EP4004792A4 (en)*2019-07-242023-03-29Hewlett-Packard Development Company, L.P.Access regulation of peripheral devices
US11700247B2 (en)*2019-07-302023-07-11Slack Technologies, LlcSecuring a group-based communication system via identity verification
US12200013B2 (en)2019-08-072025-01-14Musarubra Us LlcSystem and method for detecting cyberattacks impersonating legitimate sources
EP4010829A4 (en)*2019-08-092023-09-06Mastercard Technologies Canada ULC DETERMINING THE RISK OF FRAUD IN CONNECTION WITH A TRANSACTION
CN110505232A (en)*2019-08-272019-11-26百度在线网络技术(北京)有限公司The detection method and device of network attack, electronic equipment, storage medium
US11269987B2 (en)2019-09-092022-03-08International Business Machines CorporationSecurity credentials management for client applications
CN110599135B (en)*2019-09-162024-05-28腾讯科技(深圳)有限公司 Method, device and electronic device for evaluating user's third-party payment account
US11297084B2 (en)*2019-09-302022-04-05Mcafee, LlcMethods and apparatus to perform malware detection using a generative adversarial network
US11475515B1 (en)*2019-10-112022-10-18Wells Fargo Bank, N.A.Adverse action methodology for credit risk models
US12088473B2 (en)2019-10-232024-09-10Aryaka Networks, Inc.Method, device and system for enhancing predictive classification of anomalous events in a cloud-based application acceleration as a service environment
US12019784B2 (en)*2019-10-302024-06-25EMC IP Holding Company LLCPrivacy preserving evaluation of sensitive user features for anomaly detection
US11451396B2 (en)*2019-11-052022-09-20Microsoft Technology Licensing, LlcFalse positive reduction in electronic token forgery detection
CN110851839B (en)*2019-11-122022-03-11杭州安恒信息技术股份有限公司Risk-based asset scoring method and system
US11711323B2 (en)*2019-11-202023-07-25Medallia, Inc.Systems and methods for managing bot-generated interactions
US12069089B2 (en)*2019-12-032024-08-20Microsoft Technology Licensing, LlcSystem for calculating trust of client session(s)
US11075905B2 (en)*2019-12-092021-07-27Google LlcRequesting and transmitting data for related accounts
US11956252B2 (en)2019-12-162024-04-09Armis Security Ltd.Techniques for resolving contradictory device profiling data
US11423406B2 (en)*2019-12-162022-08-23Paypal, Inc.Multi-tiered approach to detect and mitigate online electronic attacks
US11444961B2 (en)*2019-12-202022-09-13Intel CorporationActive attack detection in autonomous vehicle networks
CN110995763B (en)*2019-12-262022-08-05深信服科技股份有限公司Data processing method and device, electronic equipment and computer storage medium
US11050587B1 (en)2020-02-042021-06-29360 It, UabMulti-part TCP connection over VPN
US11863567B2 (en)*2020-02-042024-01-02Fastly, Inc.Management of bot detection in a content delivery network
US11394582B2 (en)2020-02-042022-07-19360 It, UabMulti-part TCP connection over VPN
RU2740027C1 (en)*2020-02-122020-12-30Варити Менеджмент Сервисез ЛимитедMethod and system for preventing malicious automated attacks
CN111581641B (en)*2020-04-032022-07-29北京大学 A Hook-based Lightweight WebAPI Protection Method and Device
CN111506819B (en)*2020-04-242023-05-16成都安易迅科技有限公司Hardware equipment recommendation method and device, server and storage medium
US11748460B2 (en)*2020-04-272023-09-05Imperva, Inc.Procedural code generation for challenge code
TWI734456B (en)*2020-04-292021-07-21正修學校財團法人正修科技大學 Process capability evaluation method
US11451562B2 (en)*2020-05-012022-09-20Mastercard Technologies Canada ULCRecommending signals to monitor in a fraud prevention application
US11290480B2 (en)2020-05-262022-03-29Bank Of America CorporationNetwork vulnerability assessment tool
CN111385313B (en)*2020-05-282020-09-11支付宝(杭州)信息技术有限公司Method and system for verifying object request validity
US11456917B2 (en)*2020-06-012022-09-27Cisco Technology, Inc.Analyzing deployed networks with respect to network solutions
US11574071B2 (en)2020-07-282023-02-07Bank Of America CorporationReliability of information security controls for attack readiness
CN112019521B (en)*2020-08-072023-04-07杭州安恒信息技术股份有限公司Asset scoring method and device, computer equipment and storage medium
US11019031B1 (en)2020-09-222021-05-25Netskope, Inc.Client software connection inspection and access control
US11789982B2 (en)*2020-09-232023-10-17Electronic Arts Inc.Order independent data categorization, indication, and remediation across realtime datasets of live service environments
CN112016939B (en)*2020-10-192021-02-26耀方信息技术(上海)有限公司Automatic maintenance user system
JP6925549B1 (en)*2021-01-072021-08-25三谷産業株式会社 Risk management system and risk management method
US20220269662A1 (en)*2021-02-222022-08-25Mastercard Technologies Canada ULCEvent interval approximation
US12211033B1 (en)2021-02-232025-01-28Wells Fargo Bank, N.A.Dynamic account status indicator via server-to-device secure data exchange
US12002459B2 (en)*2021-02-242024-06-04International Business Machines CorporationAutonomous communication initiation responsive to pattern detection
US12333225B2 (en)2021-02-252025-06-17General Electric CompanySystem and method for monitoring and diagnosis of engine health using a snapshot-CEOD based approach
US11533373B2 (en)*2021-02-262022-12-20Trackerdetect Ltd.Global iterative clustering algorithm to model entities' behaviors and detect anomalies
US12010129B2 (en)*2021-04-232024-06-11Sophos LimitedMethods and apparatus for using machine learning to classify malicious infrastructure
US12242600B2 (en)*2021-05-132025-03-04Microsoft Technology Licensing, LlcAbnormally permissive role definition detection systems
US12026248B2 (en)*2021-06-102024-07-02Armis Security Ltd.Techniques for securing network environments by identifying device attributes based on string field conventions
US20230007017A1 (en)*2021-06-302023-01-05Fortinet, Inc.Enforcing javascript for mitb detection
US11847598B2 (en)*2021-08-132023-12-19Edgeverve Systems LimitedMethod and system for analyzing process flows for a process performed by users
US12111919B2 (en)2021-08-232024-10-08Fortinet, Inc.Systems and methods for quantifying file access risk exposure by an endpoint in a network environment
US11997206B2 (en)2021-09-222024-05-28Radware, Ltd.Techniques for protecting web-access
US11461492B1 (en)*2021-10-152022-10-04Infosum LimitedDatabase system with data security employing knowledge partitioning
US12386956B1 (en)*2021-10-262025-08-12NTT DATA Services, LLCAutomatic discovery and enterprise control of a robotic workforce
CN113742681B (en)*2021-11-042022-04-19苏州浪潮智能科技有限公司Account management method and device, computer equipment and storage medium
CN114531682A (en)*2021-12-222022-05-24中国电信股份有限公司Risk user identification method and device, electronic equipment and storage medium
CN114254308B (en)*2021-12-222024-08-13安天科技集团股份有限公司Threat detection method and device for Internet of things equipment, electronic equipment and storage medium
US12278831B2 (en)*2021-12-302025-04-15Pelatro Pte. Ltd.System and method for real time distributed adaptive cube aggregation, heuristics based hierarchical clustering and anomaly detection framework for high volume streaming datasets
TWI789271B (en)2022-03-162023-01-01中原大學Packet information analysis method and network traffic monitoring device
US12411864B2 (en)2022-05-112025-09-09The Toronto-Dominion BankSystem and method for processing instructions associated with one or more data transfers
US12169808B2 (en)*2022-05-112024-12-17The Boeing CompanySystem and method for predictive product quality assessment
US11995658B2 (en)*2022-05-252024-05-28Dell Products L.P.Machine learning-based detection of potentially malicious behavior on an e-commerce platform
US20230394136A1 (en)*2022-06-012023-12-07Armis Security Ltd.System and method for device attribute identification based on queries of interest
US20240013270A1 (en)*2022-07-072024-01-11Walmart Apollo, LlcSystem and method for implementing an edge queuing platform
US12335254B2 (en)2022-07-192025-06-17Bank Of America CorporationMalicious universal resource locator and file detector and response action engine
US12118020B2 (en)2022-07-202024-10-15The Toronto-Dominion BankSystem and method for generating a graphical user interface to track, analyze and interpret a big data dataset
US11693958B1 (en)*2022-09-082023-07-04Radiant Security, Inc.Processing and storing event data in a knowledge graph format for anomaly detection
US12289307B2 (en)*2022-10-182025-04-29Bank Of America CorporationSystem and method for using a validated card in a virtual environment
US12411758B1 (en)*2023-03-082025-09-09David Pahl IsaacAutonomous software testing agent
US12028359B1 (en)*2023-10-252024-07-02Coalition, Inc.Method of ranking and address network threats
US20250193236A1 (en)*2023-12-062025-06-12Microsoft Technology Licensing, LlcPhishing protection

Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20110247071A1 (en)*2010-04-062011-10-06Triumfant, Inc.Automated Malware Detection and Remediation
US20130024339A1 (en)*2011-07-212013-01-24Bank Of America CorporationMulti-stage filtering for fraud detection with customer history filters

Family Cites Families (130)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5774525A (en)1995-01-231998-06-30International Business Machines CorporationMethod and apparatus utilizing dynamic questioning to provide secure access control
US5892900A (en)1996-08-301999-04-06Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US5761652A (en)*1996-03-201998-06-02International Business Machines CorporationConstructing balanced multidimensional range-based bitmap indices
US5940751A (en)1996-06-271999-08-17Cellular Technical Services Company, Inc.System and method for detection of fraud in a wireless telephone system
US6272631B1 (en)*1997-06-302001-08-07Microsoft CorporationProtected storage of core data secrets
US7403922B1 (en)1997-07-282008-07-22Cybersource CorporationMethod and apparatus for evaluating fraud risk in an electronic commerce transaction
US5870752A (en)*1997-08-211999-02-09Lucent Technologies Inc.Incremental maintenance of an approximate histogram in a database system
US20050114705A1 (en)1997-12-112005-05-26Eran ReshefMethod and system for discriminating a human action from a computerized action
US6829711B1 (en)1999-01-262004-12-07International Business Machines CorporationPersonal website for electronic commerce on a smart java card with multiple security check points
US20010020228A1 (en)*1999-07-092001-09-06International Business Machines CorporationUmethod, system and program for managing relationships among entities to exchange encryption keys for use in providing access and authorization to resources
US7159237B2 (en)*2000-03-162007-01-02Counterpane Internet Security, Inc.Method and system for dynamic network intrusion monitoring, detection and response
WO2001080525A1 (en)2000-04-142001-10-25Sun Microsystems, Inc.Network access security
WO2002037219A2 (en)2000-11-022002-05-10Cybersource CorporationMethod and apparatus for evaluating fraud risk in an electronic commerce transaction
FI20002814A0 (en)2000-12-212000-12-21Nokia Mobile Phones Ltd Context-based communication backup method and arrangement, communication network and communication network terminal
US20040006532A1 (en)2001-03-202004-01-08David LawrenceNetwork access risk management
US7142651B2 (en)2001-11-292006-11-28Ectel Ltd.Fraud detection in a distributed telecommunications networks
ATE374493T1 (en)2002-03-292007-10-15Global Dataguard Inc ADAPTIVE BEHAVIORAL INTRUSION DETECTION
US20040030764A1 (en)*2002-08-082004-02-12International Business Machines CorporationIdentity assertion token principal mapping for common secure interoperability
US8201252B2 (en)2002-09-032012-06-12Alcatel LucentMethods and devices for providing distributed, adaptive IP filtering against distributed denial of service attacks
US20040215574A1 (en)*2003-04-252004-10-28First Data CorporationSystems and methods for verifying identities in transactions
US20040254793A1 (en)2003-06-122004-12-16Cormac HerleySystem and method for providing an audio challenge to distinguish a human from a computer
US20050039057A1 (en)*2003-07-242005-02-17Amit BaggaMethod and apparatus for authenticating a user using query directed passwords
CN104200152B (en)2003-09-122020-02-14Emc公司System and method for risk-based authentication
CA2540738A1 (en)*2003-10-022005-04-07Viralg OyLimiting use of unauthorized digital content in a content-sharing peer-to-peer network
US8578462B2 (en)2003-12-122013-11-05Avaya Inc.Method and system for secure session management in a web farm
US20050144067A1 (en)2003-12-192005-06-30Palo Alto Research Center IncorporatedIdentifying and reporting unexpected behavior in targeted advertising environment
US8782405B2 (en)2004-03-182014-07-15International Business Machines CorporationProviding transaction-level security
US8572254B2 (en)*2004-04-082013-10-29Worldextend, LlcSystems and methods for establishing and validating secure network sessions
WO2005119648A2 (en)2004-06-012005-12-15Dna Digital Media GroupCharacter branding employing voice and speech recognition technology
KR101150241B1 (en)2004-08-182012-06-12마스터카드 인터내셔날, 인코포레이티드Method and system for authorizing a transaction using a dynamic authorization code
US20080010678A1 (en)2004-09-172008-01-10Jeff BurdetteAuthentication Proxy
US9535679B2 (en)*2004-12-282017-01-03International Business Machines CorporationDynamically optimizing applications within a deployment server
US20060230039A1 (en)2005-01-252006-10-12Markmonitor, Inc.Online identity tracking
CA2600344A1 (en)2005-03-022006-09-08Markmonitor Inc.Distribution of trust data
US20060206941A1 (en)2005-03-082006-09-14Praesidium Technologies, Ltd.Communications system with distributed risk management
US7630924B1 (en)2005-04-202009-12-08Authorize.Net LlcTransaction velocity counting for fraud detection
JP4954979B2 (en)2005-04-292012-06-20オラクル・インターナショナル・コーポレイション Systems and methods for fraud monitoring, detection, and hierarchical user authentication
US8578500B2 (en)2005-05-312013-11-05Kurt James LongSystem and method of fraud and misuse detection
US7945952B1 (en)2005-06-302011-05-17Google Inc.Methods and apparatuses for presenting challenges to tell humans and computers apart
GB2429094B (en)2005-08-092010-08-25Royal Bank Of Scotland Group POnline transaction systems and methods
US8082349B1 (en)*2005-10-212011-12-20Entrust, Inc.Fraud protection using business process-based customer intent analysis
US8392963B2 (en)2005-11-282013-03-05Imperva, Inc.Techniques for tracking actual users in web application security systems
US20070124201A1 (en)2005-11-302007-05-31Hu Hubert CDigital content access system and methods
US8549651B2 (en)2007-02-022013-10-01Facebook, Inc.Determining a trust level in a social network environment
US20070140131A1 (en)2005-12-152007-06-21Malloy Patrick JInteractive network monitoring and analysis
US20070162761A1 (en)*2005-12-232007-07-12Davis Bruce LMethods and Systems to Help Detect Identity Fraud
US20070226053A1 (en)2006-03-212007-09-27Kevin CarlSystem for uploading video advertisements, solicit user feedback, and create ratings/rankings
US7818264B2 (en)2006-06-192010-10-19Visa U.S.A. Inc.Track data encryption
US8650080B2 (en)2006-04-102014-02-11International Business Machines CorporationUser-browser interaction-based fraud detection system
WO2007133799A2 (en)2006-05-152007-11-22Fair Isaac CorporationComprehensive online fraud detection system and method
US20080082662A1 (en)2006-05-192008-04-03Richard DandlikerMethod and apparatus for controlling access to network resources based on reputation
US7680891B1 (en)2006-06-192010-03-16Google Inc.CAPTCHA-based spam control for content creation systems
US8601538B2 (en)2006-08-222013-12-03Fuji Xerox Co., Ltd.Motion and interaction based CAPTCHA
US20080049969A1 (en)2006-08-252008-02-28Jason David KoziolMethods And Systems For Generating A Symbol Identification Challenge For An Automated Agent
US8145560B2 (en)2006-11-142012-03-27Fmr LlcDetecting fraudulent activity on a network
US20080133347A1 (en)2006-12-012008-06-05Yahoo! Inc.System and method for providing semantic captchas for online advertising
US20080133321A1 (en)2006-12-012008-06-05Yahoo! Inc.System and method for measuring awareness of online advertising using captchas
US20080133348A1 (en)2006-12-012008-06-05Yahoo! Inc.System and method for delivering online advertisements using captchas
US7523016B1 (en)2006-12-292009-04-21Google Inc.Detecting anomalies
US8788419B2 (en)2006-12-302014-07-22First Data CorporationMethod and system for mitigating risk of fraud in internet banking
US20110047605A1 (en)2007-02-062011-02-24Vidoop, LlcSystem And Method For Authenticating A User To A Computer System
US8601575B2 (en)2007-03-302013-12-03Ca, Inc.Statistical method and system for network anomaly detection
US7620596B2 (en)2007-06-012009-11-17The Western Union CompanySystems and methods for evaluating financial transaction risk
US8200959B2 (en)*2007-06-282012-06-12Cisco Technology, Inc.Verifying cryptographic identity during media session initialization
US20090012855A1 (en)2007-07-062009-01-08Yahoo! Inc.System and method of using captchas as ads
US7958228B2 (en)*2007-07-112011-06-07Yahoo! Inc.Behavioral predictions based on network activity locations
US8510795B1 (en)2007-09-042013-08-13Google Inc.Video-based CAPTCHA
US8880435B1 (en)2007-10-262014-11-04Bank Of America CorporationDetection and tracking of unauthorized computer access attempts
US20090113294A1 (en)2007-10-302009-04-30Yahoo! Inc.Progressive captcha
US8352598B2 (en)2007-11-272013-01-08Inha-Industry Partnership InstituteMethod of providing completely automated public turing test to tell computer and human apart based on image
DE102008003531A1 (en)2008-01-082009-07-09Giesecke & Devrient Gmbh software identification
US20090249477A1 (en)2008-03-282009-10-01Yahoo! Inc.Method and system for determining whether a computer user is human
CA2924049C (en)2008-04-012019-10-29Nudata Security Inc.Systems and methods for implementing and tracking identification tests
US9842204B2 (en)2008-04-012017-12-12Nudata Security Inc.Systems and methods for assessing security risk
US20090328163A1 (en)2008-06-282009-12-31Yahoo! Inc.System and method using streaming captcha for online verification
US20100077482A1 (en)2008-09-232010-03-25Robert Edward AdamsMethod and system for scanning electronic data for predetermined data patterns
CN101482847B (en)*2009-01-192011-06-29北京邮电大学 A Detection Method Based on Defect Patterns of Security Vulnerabilities
KR101048991B1 (en)2009-02-272011-07-12(주)다우기술 Botnet Behavior Pattern Analysis System and Method
CA2760835A1 (en)2009-05-042010-11-11Visa International Service AssociationFrequency-based transaction prediction and processing
US20110016052A1 (en)2009-07-162011-01-20Scragg Ernest MEvent Tracking and Velocity Fraud Rules for Financial Transactions
US8312157B2 (en)2009-07-162012-11-13Palo Alto Research Center IncorporatedImplicit authentication
US8713705B2 (en)*2009-08-032014-04-29Eisst Ltd.Application authentication system and method
JP5536891B2 (en)2009-09-012014-07-02エヌイーシー ヨーロッパ リミテッド Network monitoring method and network including monitoring function
US10360039B2 (en)*2009-09-282019-07-23Nvidia CorporationPredicted instruction execution in parallel processors with reduced per-thread state information including choosing a minimum or maximum of two operands based on a predicate value
EP2315465A1 (en)*2009-10-202011-04-27ETH ZurichMethod for secure communication between devices
US20120137367A1 (en)*2009-11-062012-05-31Cataphora, Inc.Continuous anomaly detection based on behavior modeling and heterogeneous information analysis
US8370278B2 (en)*2010-03-082013-02-05Microsoft CorporationOntological categorization of question concepts from document summaries
US8375427B2 (en)*2010-04-212013-02-12International Business Machines CorporationHolistic risk-based identity establishment for eligibility determinations in context of an application
US8868651B2 (en)*2010-08-162014-10-21Avon Products, Inc.Web community pre-population method and system
US8898759B2 (en)*2010-08-242014-11-25Verizon Patent And Licensing Inc.Application registration, authorization, and verification
WO2012054646A2 (en)2010-10-192012-04-26The 41St Parameter, Inc.Variable risk engine
US9329699B2 (en)*2010-10-222016-05-03Southern Methodist UniversityMethod for subject classification using a pattern recognition input device
US20120123821A1 (en)*2010-11-162012-05-17Raytheon CompanySystem and Method for Risk Assessment of an Asserted Identity
US9665703B2 (en)*2010-11-292017-05-30Biocatch Ltd.Device, system, and method of detecting user identity based on inter-page and intra-page navigation patterns
GB2491101B (en)*2011-04-152013-07-10Bluecava IncDetection of spoofing of remote client system information
RU2477929C2 (en)2011-04-192013-03-20Закрытое акционерное общество "Лаборатория Касперского"System and method for prevention safety incidents based on user danger rating
US10380585B2 (en)2011-06-022019-08-13Visa International Service AssociationLocal usage of electronic tokens in a transaction processing system
US8756651B2 (en)*2011-09-272014-06-17Amazon Technologies, Inc.Policy compliance-based secure data access
US8881289B2 (en)*2011-10-182014-11-04Mcafee, Inc.User behavioral risk assessment
CN103067337B (en)*2011-10-192017-02-15中兴通讯股份有限公司Identity federation method, identity federation intrusion detection & prevention system (IdP), identity federation service provider (SP) and identity federation system
US9141914B2 (en)*2011-10-312015-09-22Hewlett-Packard Development Company, L.P.System and method for ranking anomalies
AU2013217048B2 (en)2012-02-072017-03-09Visa International Service AssociationMobile human challenge-response test
US9256715B2 (en)2012-03-092016-02-09Dell Products L.P.Authentication using physical interaction characteristics
SG11201405970XA (en)*2012-03-302014-11-27Fuji Oil Co LtdCheese-like food article
US8898766B2 (en)*2012-04-102014-11-25Spotify AbSystems and methods for controlling a local application through a web page
US20130339186A1 (en)2012-06-152013-12-19Eventbrite, Inc.Identifying Fraudulent Users Based on Relational Information
US10409984B1 (en)2012-06-152019-09-10Square, Inc.Hierarchical data security measures for a mobile device
US20130339736A1 (en)*2012-06-192013-12-19Alex NayshtutPeriodic platform based web session re-validation
CA2818439A1 (en)*2012-07-052014-01-05Cyber-Ark Software Ltd.System and method for out-of-band application authentication
US9485118B1 (en)2012-09-282016-11-01Juniper Networks, Inc.Penalty-box policers for network device control plane protection
CN102970383B (en)*2012-11-132018-07-06中兴通讯股份有限公司A kind of method and device, method and device of information processing for distributing IP address
US9560014B2 (en)*2013-01-232017-01-31Mcafee, Inc.System and method for an endpoint hardware assisted network firewall in a security environment
US20140229414A1 (en)2013-02-082014-08-14Ebay Inc.Systems and methods for detecting anomalies
US8925056B2 (en)*2013-03-182014-12-30Rawllin International Inc.Universal management of user profiles
US20150382084A1 (en)2014-06-252015-12-31Allied Telesis Holdings Kabushiki KaishaPath determination of a sensor based detection system
US9632858B2 (en)*2013-07-282017-04-25OpsClarity Inc.Organizing network performance metrics into historical anomaly dependency data
US20150052616A1 (en)2013-08-142015-02-19L-3 Communications CorporationProtected mode for securing computing devices
US9432375B2 (en)*2013-10-102016-08-30International Business Machines CorporationTrust/value/risk-based access control policy
US20150135316A1 (en)2013-11-132015-05-14NetCitadel Inc.System and method of protecting client computers
US9608981B2 (en)*2013-12-112017-03-28Red Hat, Inc.Strong user authentication for accessing protected network
WO2015168203A1 (en)2014-04-292015-11-05PEGRight, Inc.Characterizing user behavior via intelligent identity analytics
US10412050B2 (en)*2014-05-232019-09-10Citrix Systems, Inc.Protect applications from session stealing/hijacking attacks by tracking and blocking anomalies in end point characteristics throughout a user session
US10171491B2 (en)2014-12-092019-01-01Fortinet, Inc.Near real-time detection of denial-of-service attacks
US10552994B2 (en)2014-12-222020-02-04Palantir Technologies Inc.Systems and interactive user interfaces for dynamic retrieval, analysis, and triage of data items
US9794229B2 (en)2015-04-032017-10-17Infoblox Inc.Behavior analysis based DNS tunneling detection and classification framework for network security
US10142353B2 (en)2015-06-052018-11-27Cisco Technology, Inc.System for monitoring and managing datacenters
CN108780479B (en)2015-09-052022-02-11万事达卡技术加拿大无限责任公司System and method for detecting and scoring anomalies
US10127373B1 (en)2017-05-052018-11-13Mastercard Technologies Canada ULCSystems and methods for distinguishing among human users and software robots
US9990487B1 (en)2017-05-052018-06-05Mastercard Technologies Canada ULCSystems and methods for distinguishing among human users and software robots
US10007776B1 (en)2017-05-052018-06-26Mastercard Technologies Canada ULCSystems and methods for distinguishing among human users and software robots

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20110247071A1 (en)*2010-04-062011-10-06Triumfant, Inc.Automated Malware Detection and Remediation
US20130024339A1 (en)*2011-07-212013-01-24Bank Of America CorporationMulti-stage filtering for fraud detection with customer history filters

Cited By (138)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10997284B2 (en)2008-04-012021-05-04Mastercard Technologies Canada ULCSystems and methods for assessing security risk
US10839065B2 (en)2008-04-012020-11-17Mastercard Technologies Canada ULCSystems and methods for assessing security risk
US9842204B2 (en)2008-04-012017-12-12Nudata Security Inc.Systems and methods for assessing security risk
US9946864B2 (en)2008-04-012018-04-17Nudata Security Inc.Systems and methods for implementing and tracking identification tests
US11036847B2 (en)2008-04-012021-06-15Mastercard Technologies Canada ULCSystems and methods for assessing security risk
US10860942B2 (en)2013-03-012020-12-08Forcepoint, LLCAnalyzing behavior in light of social time
US10832153B2 (en)2013-03-012020-11-10Forcepoint, LLCAnalyzing behavior in light of social time
US10776708B2 (en)2013-03-012020-09-15Forcepoint, LLCAnalyzing behavior in light of social time
US11783216B2 (en)2013-03-012023-10-10Forcepoint LlcAnalyzing behavior in light of social time
US10884891B2 (en)*2014-12-112021-01-05Micro Focus LlcInteractive detection of system anomalies
US20170192872A1 (en)*2014-12-112017-07-06Hewlett Packard Enterprise Development LpInteractive detection of system anomalies
US11868411B1 (en)2015-06-232024-01-09Splunk Inc.Techniques for compiling and presenting query results
US11113342B2 (en)*2015-06-232021-09-07Splunk Inc.Techniques for compiling and presenting query results
US11042591B2 (en)2015-06-232021-06-22Splunk Inc.Analytical search engine
US10129279B2 (en)2015-09-052018-11-13Mastercard Technologies Canada ULCSystems and methods for detecting and preventing spoofing
US9979747B2 (en)2015-09-052018-05-22Mastercard Technologies Canada ULCSystems and methods for detecting and preventing spoofing
US10805328B2 (en)2015-09-052020-10-13Mastercard Technologies Canada ULCSystems and methods for detecting and scoring anomalies
US10965695B2 (en)2015-09-052021-03-30Mastercard Technologies Canada ULCSystems and methods for matching and scoring sameness
US10212180B2 (en)2015-09-052019-02-19Mastercard Technologies Canada ULCSystems and methods for detecting and preventing spoofing
US10749884B2 (en)2015-09-052020-08-18Mastercard Technologies Canada ULCSystems and methods for detecting and preventing spoofing
US9800601B2 (en)2015-09-052017-10-24Nudata Security Inc.Systems and methods for detecting and scoring anomalies
US12136046B2 (en)2016-02-092024-11-05Upside Services, IncSystems and methods for short identifier behavioral analytics
US11605014B2 (en)*2016-02-092023-03-14Upside Services, IncSystems and methods for short identifier behavioral analytics
US11842293B2 (en)2016-02-092023-12-12Upside Services, IncSystems and methods for short identifier behavioral analytics
US20210334686A1 (en)*2016-02-092021-10-28Upside Services, IncSystems and methods for short identifier behavioral analytics
US11068798B2 (en)*2016-02-092021-07-20Upside Services, IncSystems and methods for short identifier behavioral analytics
US11188550B2 (en)2016-09-262021-11-30Splunk Inc.Metrics store system
US11314759B2 (en)2016-09-262022-04-26Splunk Inc.In-memory catalog for searching metrics data
US11314758B2 (en)2016-09-262022-04-26Splunk Inc.Storing and querying metrics data using a metric-series index
US11238057B2 (en)2016-09-262022-02-01Splunk Inc.Generating structured metrics from log data
US11200246B2 (en)*2016-09-262021-12-14Splunk Inc.Hash bucketing of data
US10419268B2 (en)*2017-01-272019-09-17Bmc Software, Inc.Automated scoring of unstructured events in information technology environments
US10574679B2 (en)*2017-02-012020-02-25Cisco Technology, Inc.Identifying a security threat to a web-based resource
US20180219890A1 (en)*2017-02-012018-08-02Cisco Technology, Inc.Identifying a security threat to a web-based resource
US10305773B2 (en)*2017-02-152019-05-28Dell Products, L.P.Device identity augmentation
US11093927B2 (en)*2017-03-292021-08-17International Business Machines CorporationSensory data collection in an augmented reality system
US20180285854A1 (en)*2017-03-292018-10-04International Business Machines CorporationSensory data collection in an augmented reality system
US20180302425A1 (en)*2017-04-172018-10-18Splunk Inc.Detecting fraud by correlating user behavior biometrics with other data sources
US11811805B1 (en)2017-04-172023-11-07Splunk Inc.Detecting fraud by correlating user behavior biometrics with other data sources
US12204619B1 (en)2017-04-172025-01-21Cisco Technology, Inc.Multiple input neural networks for detecting fraud
US11372956B2 (en)2017-04-172022-06-28Splunk Inc.Multiple input neural networks for detecting fraud
US11315010B2 (en)2017-04-172022-04-26Splunk Inc.Neural networks for detecting fraud based on user behavior biometrics
US11102225B2 (en)*2017-04-172021-08-24Splunk Inc.Detecting fraud by correlating user behavior biometrics with other data sources
US10127373B1 (en)2017-05-052018-11-13Mastercard Technologies Canada ULCSystems and methods for distinguishing among human users and software robots
US10007776B1 (en)2017-05-052018-06-26Mastercard Technologies Canada ULCSystems and methods for distinguishing among human users and software robots
US9990487B1 (en)2017-05-052018-06-05Mastercard Technologies Canada ULCSystems and methods for distinguishing among human users and software robots
US11843613B2 (en)2017-05-152023-12-12Forcepoint LlcUsing a behavior-based modifier when generating a user entity risk score
US11902296B2 (en)2017-05-152024-02-13Forcepoint LlcUsing a security analytics map to trace entity interaction
US11888861B2 (en)2017-05-152024-01-30Forcepoint LlcUsing an entity behavior catalog when performing human-centric risk modeling operations
US11621964B2 (en)2017-05-152023-04-04Forcepoint LlcAnalyzing an event enacted by a data entity when performing a security operation
US11888864B2 (en)2017-05-152024-01-30Forcepoint LlcSecurity analytics mapping operation within a distributed security analytics environment
US11888859B2 (en)2017-05-152024-01-30Forcepoint LlcAssociating a security risk persona with a phase of a cyber kill chain
US11528281B2 (en)2017-05-152022-12-13Forcepoint LlcSecurity analytics mapping system
US11888860B2 (en)2017-05-152024-01-30Forcepoint LlcCorrelating concerning behavior during an activity session with a security risk persona
US11546351B2 (en)2017-05-152023-01-03Forcepoint LlcUsing human factors when performing a human factor risk operation
US11888862B2 (en)2017-05-152024-01-30Forcepoint LlcDistributed framework for security analytics
US11902293B2 (en)2017-05-152024-02-13Forcepoint LlcUsing an entity behavior catalog when performing distributed security operations
US12212581B2 (en)2017-05-152025-01-28Forcepoint LlcUsing an entity behavior profile when performing human-centric risk modeling operations
US11902295B2 (en)2017-05-152024-02-13Forcepoint LlcUsing a security analytics map to perform forensic analytics
US11516225B2 (en)2017-05-152022-11-29Forcepoint LlcHuman factors framework
US11563752B2 (en)2017-05-152023-01-24Forcepoint LlcUsing indicators of behavior to identify a security persona of an entity
US11902294B2 (en)2017-05-152024-02-13Forcepoint LlcUsing human factors when calculating a risk score
US11838298B2 (en)2017-05-152023-12-05Forcepoint LlcGenerating a security risk persona using stressor data
US11979414B2 (en)2017-05-152024-05-07Forcepoint LlcUsing content stored in an entity behavior catalog when performing a human factor risk operation
US11601441B2 (en)2017-05-152023-03-07Forcepoint LlcUsing indicators of behavior when performing a security operation
US11888863B2 (en)2017-05-152024-01-30Forcepoint LlcMaintaining user privacy via a distributed framework for security analytics
US20190020676A1 (en)*2017-07-122019-01-17The Boeing CompanyMobile security countermeasures
US11095678B2 (en)*2017-07-122021-08-17The Boeing CompanyMobile security countermeasures
US11250158B2 (en)2017-07-262022-02-15Forcepoint, LLCSession-based security information
US11379607B2 (en)2017-07-262022-07-05Forcepoint, LLCAutomatically generating security policies
US10642995B2 (en)*2017-07-262020-05-05Forcepoint LlcMethod and system for reducing risk score volatility
US11132461B2 (en)2017-07-262021-09-28Forcepoint, LLCDetecting, notifying and remediating noisy security policies
US11244070B2 (en)2017-07-262022-02-08Forcepoint, LLCAdaptive remediation of multivariate risk
US11379608B2 (en)2017-07-262022-07-05Forcepoint, LLCMonitoring entity behavior using organization specific security policies
US20230239316A1 (en)*2017-08-242023-07-27Level 3 Communications, LlcLow-complexity detection of potential network anomalies using intermediate-stage processing
US20190068623A1 (en)*2017-08-242019-02-28Level 3 Communications, LlcLow-complexity detection of potential network anomalies using intermediate-stage processing
US11621971B2 (en)*2017-08-242023-04-04Level 3 Communications, LlcLow-complexity detection of potential network anomalies using intermediate-stage processing
US10601849B2 (en)*2017-08-242020-03-24Level 3 Communications, LlcLow-complexity detection of potential network anomalies using intermediate-stage processing
US20210385240A1 (en)*2017-08-242021-12-09Level 3 Communications, LlcLow-complexity detection of potential network anomalies using intermediate-stage processing
US11108801B2 (en)*2017-08-242021-08-31Level 3 Communications, LlcLow-complexity detection of potential network anomalies using intermediate-stage processing
US10769283B2 (en)2017-10-312020-09-08Forcepoint, LLCRisk adaptive protection
US10803178B2 (en)2017-10-312020-10-13Forcepoint LlcGenericized data model to perform a security analytics operation
US20190306170A1 (en)*2018-03-302019-10-03Yanlin WangSystems and methods for adaptive data collection using analytics agents
US11314787B2 (en)2018-04-182022-04-26Forcepoint, LLCTemporal resolution of an entity
US20200019698A1 (en)*2018-07-112020-01-16Vmware, Inc.Entropy based security detection system
US10860712B2 (en)*2018-07-112020-12-08Vmware, Inc.Entropy based security detection system
US10949428B2 (en)2018-07-122021-03-16Forcepoint, LLCConstructing event distributions via a streaming scoring operation
US11436512B2 (en)2018-07-122022-09-06Forcepoint, LLCGenerating extracted features from an event
US11544273B2 (en)2018-07-122023-01-03Forcepoint LlcConstructing event distributions via a streaming scoring operation
US11810012B2 (en)2018-07-122023-11-07Forcepoint LlcIdentifying event distributions using interrelated events
US11755585B2 (en)2018-07-122023-09-12Forcepoint LlcGenerating enriched events using enriched data and extracted features
US11755584B2 (en)2018-07-122023-09-12Forcepoint LlcConstructing distributions of interrelated event features
US11025638B2 (en)2018-07-192021-06-01Forcepoint, LLCSystem and method providing security friction for atypical resource access requests
US20220217222A1 (en)*2018-08-022022-07-07Paul SwenglerUser and client device registration with server
US11496586B2 (en)*2018-08-022022-11-08Paul SwenglerUser and client device registration with server
US11310343B2 (en)*2018-08-022022-04-19Paul SwenglerUser and user device registration and authentication
US11811799B2 (en)2018-08-312023-11-07Forcepoint LlcIdentifying security risks using distributions of characteristic features extracted from a plurality of events
US11411973B2 (en)2018-08-312022-08-09Forcepoint, LLCIdentifying security risks using distributions of characteristic features extracted from a plurality of events
US11010257B2 (en)*2018-10-122021-05-18EMC IP Holding Company LLCMemory efficient perfect hashing for large records
US11595430B2 (en)2018-10-232023-02-28Forcepoint LlcSecurity system using pseudonyms to anonymously identify entities and corresponding security risk related behaviors
US11025659B2 (en)2018-10-232021-06-01Forcepoint, LLCSecurity system using pseudonyms to anonymously identify entities and corresponding security risk related behaviors
US11171980B2 (en)2018-11-022021-11-09Forcepoint LlcContagion risk detection, analysis and protection
US11620180B2 (en)2018-11-292023-04-04Vmware, Inc.Holo-entropy adaptive boosting based anomaly detection
US11258655B2 (en)2018-12-062022-02-22Vmware, Inc.Holo-entropy based alarm scoring approach
US11410187B2 (en)2019-03-012022-08-09Mastercard Technologies Canada ULCFeature drift hardened online application origination (OAO) service for fraud prevention systems
US12354118B2 (en)2019-03-012025-07-08Mastercard Technologies Canada ULCOnline application origination (OAO) service for fraud prevention systems
WO2020176978A1 (en)*2019-03-012020-09-10Mastercard Technologies Canada ULCFeature drift hardened online application origination (oao) service for fraud prevention systems
EP3931731A4 (en)*2019-03-012022-11-23Mastercard Technologies Canada ULCFeature drift hardened online application origination (oao) service for fraud prevention systems
US12223516B2 (en)2019-03-012025-02-11Mastercard Technologies Canada ULCMulti-page online application origination (OAO) service for fraud prevention systems
US11003525B2 (en)*2019-03-232021-05-11AO Kaspersky LabSystem and method of identifying and addressing anomalies in a system
US11037428B2 (en)*2019-03-272021-06-15International Business Machines CorporationDetecting and analyzing actions against a baseline
US11475125B2 (en)*2019-05-012022-10-18EMC IP Holding Company LLCDistribution-based aggregation of scores across multiple events
US20200233958A1 (en)*2019-08-072020-07-23Alibaba Group Holding LimitedMethod and system for active risk control based on intelligent interaction
US11086991B2 (en)*2019-08-072021-08-10Advanced New Technologies Co., Ltd.Method and system for active risk control based on intelligent interaction
US11928683B2 (en)2019-10-012024-03-12Mastercard Technologies Canada ULCFeature encoding in online application origination (OAO) service for a fraud prevention system
US12047373B2 (en)2019-11-052024-07-23Salesforce.Com, Inc.Monitoring resource utilization of an online system based on browser attributes collected for a session
US11368464B2 (en)*2019-11-282022-06-21Salesforce.Com, Inc.Monitoring resource utilization of an online system based on statistics describing browser attributes
US11381570B2 (en)*2019-12-202022-07-05Beijing Didi Infinity Technology And Development Co., Ltd.Identity and access management dynamic control and remediation
US11570197B2 (en)2020-01-222023-01-31Forcepoint LlcHuman-centric risk modeling framework
US11223646B2 (en)2020-01-222022-01-11Forcepoint, LLCUsing concerning behaviors when performing entity-based risk calculations
US11489862B2 (en)2020-01-222022-11-01Forcepoint LlcAnticipating future behavior using kill chains
US11630901B2 (en)2020-02-032023-04-18Forcepoint LlcExternal trigger induced behavioral analyses
WO2021155471A1 (en)*2020-02-072021-08-12Mastercard Technologies Canada ULCAutomated web traffic anomaly detection
US12301604B2 (en)*2020-02-072025-05-13Mastercard Technologies Canada ULCAutomated web traffic anomaly detection
US11736505B2 (en)2020-02-072023-08-22Mastercard Technologies Canada ULCAutomated web traffic anomaly detection
US20240064164A1 (en)*2020-02-072024-02-22Mastercard Technologies Canada ULCAutomated web traffic anomaly detection
US11080109B1 (en)2020-02-272021-08-03Forcepoint LlcDynamically reweighting distributions of event observations
US11836265B2 (en)2020-03-022023-12-05Forcepoint LlcType-dependent event deduplication
US11429697B2 (en)2020-03-022022-08-30Forcepoint, LLCEventually consistent entity resolution
US11080032B1 (en)2020-03-312021-08-03Forcepoint LlcContainerized infrastructure for deployment of microservices
US11568136B2 (en)2020-04-152023-01-31Forcepoint LlcAutomatically constructing lexicons from unlabeled datasets
US12130908B2 (en)2020-05-012024-10-29Forcepoint LlcProgressive trigger data and detection model
US11516206B2 (en)2020-05-012022-11-29Forcepoint LlcCybersecurity system having digital certificate reputation system
US11544390B2 (en)2020-05-052023-01-03Forcepoint LlcMethod, system, and apparatus for probabilistic identification of encrypted files
US11895158B2 (en)2020-05-192024-02-06Forcepoint LlcCybersecurity system having security policy visualization
US11704387B2 (en)2020-08-282023-07-18Forcepoint LlcMethod and system for fuzzy matching and alias matching for streaming data sets
US11190589B1 (en)2020-10-272021-11-30Forcepoint, LLCSystem and method for efficient fingerprinting in cloud multitenant data loss prevention
US11157614B1 (en)*2021-01-272021-10-26Malwarebytes Inc.Prevention of false positive detection of malware

Also Published As

Publication numberPublication date
US20170070525A1 (en)2017-03-09
AU2019271892A1 (en)2019-12-19
AU2016315900B2 (en)2019-11-21
CA2997583C (en)2021-04-20
US9749358B2 (en)2017-08-29
EP3345349B1 (en)2024-05-15
IL257844A (en)2018-04-30
US20170070527A1 (en)2017-03-09
CA2997585A1 (en)2017-03-09
WO2017037542A1 (en)2017-03-09
US10749884B2 (en)2020-08-18
US9800601B2 (en)2017-10-24
US10129279B2 (en)2018-11-13
AU2019232865B2 (en)2021-03-18
EP3345117A1 (en)2018-07-11
IL257849A (en)2018-04-30
US9749357B2 (en)2017-08-29
US20170070526A1 (en)2017-03-09
AU2019271892B2 (en)2021-02-18
WO2017060778A3 (en)2017-07-20
US9813446B2 (en)2017-11-07
AU2019271891B2 (en)2021-02-18
CA2997597A1 (en)2017-04-13
AU2019271891A1 (en)2019-12-19
US10212180B2 (en)2019-02-19
EP3345117B1 (en)2024-09-18
IL257849B1 (en)2023-08-01
CA2997585C (en)2021-02-23
CA2997597C (en)2021-01-26
US10965695B2 (en)2021-03-30
US20180367555A9 (en)2018-12-20
AU2016314061B2 (en)2020-02-27
AU2019271890A1 (en)2019-12-19
CN108885659A (en)2018-11-23
WO2017037544A2 (en)2017-03-09
US9749356B2 (en)2017-08-29
US20170070523A1 (en)2017-03-09
IL257844B (en)2021-04-29
US20170339184A1 (en)2017-11-23
WO2017060778A2 (en)2017-04-13
AU2019271890B2 (en)2021-02-18
IL257852A (en)2018-04-30
CA2997583A1 (en)2017-03-09
EP3345099A4 (en)2019-08-28
AU2016315900A1 (en)2018-03-29
US20170070533A1 (en)2017-03-09
US10805328B2 (en)2020-10-13
US20170070534A1 (en)2017-03-09
US20170070522A1 (en)2017-03-09
EP3345099A2 (en)2018-07-11
AU2016314061A1 (en)2018-03-29
AU2016334816A1 (en)2018-03-29
US20180191762A1 (en)2018-07-05
EP3345117A4 (en)2019-10-09
US20170070517A1 (en)2017-03-09
CN108885666B (en)2022-06-10
US20170070524A1 (en)2017-03-09
CN108885666A (en)2018-11-23
US9648034B2 (en)2017-05-09
EP3345349A4 (en)2019-08-14
US20190149567A1 (en)2019-05-16
US9979747B2 (en)2018-05-22
WO2017037544A3 (en)2017-04-20
CN108885659B (en)2022-02-11
US20170134414A1 (en)2017-05-11
US9680868B2 (en)2017-06-13
SG10201909133YA (en)2019-11-28
EP3345099B1 (en)2021-12-01
EP3345349A2 (en)2018-07-11
IL257849B2 (en)2023-12-01
AU2019232865A1 (en)2019-10-10
CN108780479A (en)2018-11-09
IL257852B (en)2021-04-29
CN108780479B (en)2022-02-11

Similar Documents

PublicationPublication DateTitle
AU2019232865B2 (en)Systems and methods for detecting and scoring anomalies
US10467294B2 (en)Systems and methods of using a bitmap index to determine bicliques
US10296918B1 (en)Providing risk assessments to compromised payment cards

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:NUDATA SECURITY INC., CANADA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BAILEY, CHRISTOPHER EVERETT;LUKASHUK, RANDY;RICHARDSON, GARY WAYNE;REEL/FRAME:040594/0526

Effective date:20161123

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

ASAssignment

Owner name:MASTERCARD TECHNOLOGIES CANADA ULC, CANADA

Free format text:CERTIFICATE OF AMALGAMATION;ASSIGNOR:NUDATA SECURITY INC.;REEL/FRAME:045997/0492

Effective date:20180101


[8]ページ先頭

©2009-2025 Movatter.jp