-
公开(公告)号:US20250112945A1
公开(公告)日:2025-04-03
申请号:US18978288
申请日:2024-12-12
Applicant: KOUNT INC.
Inventor: Matthew Lewis JONES
IPC: H04L9/40
Abstract: A method described herein involves various operations directed toward network security. The operations include accessing a traffic attribute describing a feature of network traffic. The operations further include determining a baseline distribution for the traffic attribute of a baseline set of transactions involving an online system over a baseline period and, additionally, determining an observed distribution for the traffic attribute of an observed set of transactions involving the online system over an observed period. Using the observed distribution and the baseline distribution, an attribute risk value for the traffic attribute is computed. The operations further include detecting that an anomaly exists in the traffic attribute of the observed set of transactions, based on the attribute risk value. Responsive to detecting the anomaly, an access control is implemented for access to the online system by additional transactions having a particular value in the traffic attribute meeting a pattern of the anomaly.
-
公开(公告)号:US11930034B2
公开(公告)日:2024-03-12
申请号:US17357866
申请日:2021-06-24
Applicant: KOUNT, INC.
Inventor: Matthew Lewis Jones
IPC: H04L9/40
CPC classification number: H04L63/1433 , H04L63/126
Abstract: Various aspects involve determining legitimacy of an email address for risk assessment or other purposes. For instance, a risk assessment computing system receives a risk assessment query that identifies an email address. The risk assessment computing system determines a set of features for the email address. For each feature, the risk assessment computing system calculates an illegitimacy score by calculating a deviation of the feature from an expected safe value for the feature that is determined from historical email addresses. The risk assessment computing system aggregates the illegitimacy scores of the plurality of features into an aggregated illegitimacy score and further transmits a legitimacy risk value to a remote computing system. The legitimacy risk value indicates the aggregated illegitimacy score and can be used in controlling access of a computing device associated with the email address to one or more interactive computing environments.
-
公开(公告)号:US11777972B2
公开(公告)日:2023-10-03
申请号:US17389159
申请日:2021-07-29
Applicant: KOUNT INC.
Inventor: Matthew Lewis Jones
CPC classification number: H04L63/1425 , H04L63/10
Abstract: A method described herein involves various operations directed toward network security. The operations include accessing a traffic attribute describing a feature of network traffic. The operations further include determining a baseline distribution for the traffic attribute of a baseline set of transactions involving an online system over a baseline period and, additionally, determining an observed distribution for the traffic attribute of an observed set of transactions involving the online system over an observed period. Using the observed distribution and the baseline distribution, an attribute risk value for the traffic attribute is computed. The operations further include detecting that an anomaly exists in the traffic attribute of the observed set of transactions, based on the attribute risk value. Responsive to detecting the anomaly, an access control is implemented for access to the online system by additional transactions having a particular value in the traffic attribute meeting a pattern of the anomaly.
-
公开(公告)号:US10402854B2
公开(公告)日:2019-09-03
申请号:US15223736
申请日:2016-07-29
Applicant: Kount Inc.
Inventor: Timothy P. Barber
Abstract: Online entities oftentimes desire to ascertain information about their audience members. To determine information about audience members and their activities, online transactions including information about transactions performed by audience members are collected. One or more audience analysis processes are applied to the online transactions to determine the collection of online transactions performed by a given audience member. With an accurate assignment of online transaction to the audience member, the audience member and associated transactions may be classified as a legitimate or illegitimate.
-
公开(公告)号:US20180300719A1
公开(公告)日:2018-10-18
申请号:US16015710
申请日:2018-06-22
Applicant: Kount Inc.
Inventor: Timothy P. Barber
IPC: G06Q20/40 , G06Q10/00 , H04L29/08 , G06Q30/02 , G06Q40/00 , G06Q30/06 , G06Q20/38 , G06Q20/36 , G06Q20/12 , G06Q20/10 , G06Q20/08
Abstract: An online machine data collection and archiving process generates a machine data profile of a customer computer accessing a transaction form of a merchant web site and links the machine data profile and a transaction record with customer identifying information using a unique transaction identification string. The process preferably captures parameters typically communicated as a part of web accesses, such as an IP address, an HTTP header, and cookie information. The process additionally causes the customer computer to process self-identification routines by processing coding within the merchant transaction form, the self-identification routines yielding further profile parameters. The process further includes a routine for bypassing an intervening proxy to the merchant web site to reveal the true IP address of the customer computer.
-
公开(公告)号:US09722968B2
公开(公告)日:2017-08-01
申请号:US14276689
申请日:2014-05-13
Applicant: Kount Inc.
Inventor: Timothy P. Barber
CPC classification number: H04L61/1511 , G06F2221/2129 , H04L29/12066 , H04L29/12801 , H04L61/2007 , H04L61/6004 , H04L63/102 , H04L67/1002 , H04L67/1027 , H04L67/1036 , H04L67/14 , H04L67/146
Abstract: A system establishes virtual DNS servers that are supported by a DNS server. Target IP addresses are assigned for the virtual DNS servers. Network capable devices are uniquely assigned to the virtual DNS servers for domain name resolution. Each network capable device accesses the communication network through a corresponding network device associated with a corresponding source IP address. A client's service plan is assigned to a first network capable device used by the client. The service plan is implemented through a DNS request under a session established between the first network capable device and its assigned first virtual DNS server. The session is uniquely identified by a first source IP address of a first network device used by the first network capable device to access the communication network and a first target IP address of the first virtual DNS server.
-
7.
公开(公告)号:US09075896B2
公开(公告)日:2015-07-07
申请号:US13905952
申请日:2013-05-30
Applicant: Kount Inc.
Inventor: Timothy P. Barber
CPC classification number: G06T11/206 , G06T11/20 , G06T11/203
Abstract: A method and system for graphical enumeration. The method includes creating an ordered set of vertices for a graph such that each vertex is associated with a corresponding index, and wherein each vertex in the ordered set of vertices includes information. A plurality of keys is created for defining the information. A plurality of lists of vertices is created, each of which is associated with a corresponding key such that vertices in a corresponding list include information associated with the corresponding key. For a first list of vertices, a least valued index is determined from a group of associated vertices based on vertices in the first list and vertices pointed to by the vertices in the first list. Also, all associated vertices are pointed to a root vertex associated with the least valued index.
Abstract translation: 一种用于图形化枚举的方法和系统。 该方法包括为图形创建有序的顶点集合,使得每个顶点与相应的索引相关联,并且其中顶点的有序集合中的每个顶点包括信息。 创建多个键来定义信息。 创建多个顶点列表,每个列表与对应的密钥相关联,使得相应列表中的顶点包括与对应密钥相关联的信息。 对于顶点的第一列表,基于第一列表中的顶点和由第一列表中的顶点指向的顶点,从一组相关联的顶点确定最小值索引。 此外,所有相关的顶点都指向与最小值索引相关联的根顶点。
-
公开(公告)号:US20140181919A1
公开(公告)日:2014-06-26
申请号:US14193450
申请日:2014-02-28
Applicant: Kount Inc.
Inventor: Timothy P. Barber
IPC: H04L29/06
CPC classification number: H04L63/08 , G06Q20/3821 , G06Q30/06 , G06Q30/0609 , H04L63/12 , H04L63/126
Abstract: A system and method for providing, as a service over a computer network (especially a packet-switched computer network) to a body of merchants connected to the computer network, verification of consumer identification based on data provided over the computer network by scanning devices attached to the computers operated by consumers.
-
公开(公告)号:US12200003B2
公开(公告)日:2025-01-14
申请号:US18475821
申请日:2023-09-27
Applicant: KOUNT INC.
Inventor: Matthew Lewis Jones
Abstract: A method described herein involves various operations directed toward network security. The operations include accessing a traffic attribute describing a feature of network traffic. The operations further include determining a baseline distribution for the traffic attribute of a baseline set of transactions involving an online system over a baseline period and, additionally, determining an observed distribution for the traffic attribute of an observed set of transactions involving the online system over an observed period. Using the observed distribution and the baseline distribution, an attribute risk value for the traffic attribute is computed. The operations further include detecting that an anomaly exists in the traffic attribute of the observed set of transactions, based on the attribute risk value. Responsive to detecting the anomaly, an access control is implemented for access to the online system by additional transactions having a particular value in the traffic attribute meeting a pattern of the anomaly.
-
公开(公告)号:US20230216866A1
公开(公告)日:2023-07-06
申请号:US17646696
申请日:2021-12-31
Applicant: Kount Inc.
Inventor: Nathan Daniel MONNIG , Andrew Nader RAFLA , Samuel Ward SCHRADER
IPC: H04L9/40
CPC classification number: H04L63/1416 , H04L63/1425 , H04L63/1466 , H04L63/20
Abstract: In an example of a method described herein, historical events occurring over a network are detected, and at least one of the historical events is associated with an observed value of a categorical variable. A numerical aggregate value representing the observed value is updated by applying an exponential smoothing function to (i) a prior numerical aggregate value representing prior historical events associated with the observed value and (ii) a count of the historical events associated with the observed value. An event occurring over the network is detected and is associated with the observed value. Features are extracted from the event, where the features include an encoded feature based on the numerical aggregate value to represent the observed value. A predictive model is applied to the features to determine a score representing likelihood of an outcome. Based on the score, access to a resource of the network is controlled.
-
-
-
-
-
-
-
-
-