Identifying Related User Accounts Based on Authentication Data
    12.
    发明申请
    Identifying Related User Accounts Based on Authentication Data 审中-公开
    基于验证数据识别相关用户帐户

    公开(公告)号:US20160094529A1

    公开(公告)日:2016-03-31

    申请号:US14499959

    申请日:2014-09-29

    Applicant: Dropbox, Inc.

    Inventor: Anton Mityagin

    CPC classification number: H04L63/08 H04L63/1416

    Abstract: In some embodiments, upon detecting malicious activity associated with a user account, a content management system can identify other user accounts related to the malicious user account. The content management system can identify related user accounts by comparing authentication information collected for the malicious user account with authentication information collected for other user accounts. Authentication information can include IP address information, geographic information, device type, browser type, email addresses, and/or referral information, for example. The content management system can compare the content items associated with the malicious user account to content items associated with other user accounts to determine relatedness or maliciousness. After identifying related malicious user accounts, the content management system can block all related malicious user accounts.

    Abstract translation: 在一些实施例中,当检测到与用户帐户相关联的恶意活动时,内容管理系统可以识别与恶意用户帐户相关的其他用户帐户。 内容管理系统可以通过将针对恶意用户帐户收集的认证信息与为其他用户帐户收集的认证信息进行比较来识别相关用户帐户。 认证信息可以包括例如IP地址信息,地理信息,设备类型,浏览器类型,电子邮件地址和/或推荐信息。 内容管理系统可以将与恶意用户帐户相关联的内容项目与与其他用户帐户相关联的内容项目进行比较,以确定相关性或恶意性。 识别相关的恶意用户帐户后,内容管理系统可以阻止所有相关的恶意用户帐号。

    SECURE PEER-TO-PEER DATA SYCHRONIZATION
    13.
    发明申请
    SECURE PEER-TO-PEER DATA SYCHRONIZATION 审中-公开
    安全对等数据同步

    公开(公告)号:US20150358297A1

    公开(公告)日:2015-12-10

    申请号:US14448972

    申请日:2014-07-31

    Applicant: Dropbox, Inc.

    Abstract: The disclosed embodiments relate to a feature of a content-item-uploading system that facilitates secure, peer-to-peer distributed sharing of a version of a content item by a user that created the version of the content item (e.g., by modifying a previous version of the content item or by creating a new content item). During operation, the system receives a cryptographic key from the user. In response, the system provides the cryptographic key to recipients in the system. Subsequently, the recipients can use the cryptographic key for secure, peer-to-peer distributed sharing of the version of the content item among the user and the recipients in a shared network without synchronization conflicts with previous versions of the content item in the system.

    Abstract translation: 所公开的实施例涉及内容项目上传系统的特征,其促进由创建内容项目的版本的用户对内容项目的版本的安全,对等分布式共享(例如,通过修改 内容项的先前版本或通过创建新的内容项)。 在操作期间,系统从用户接收密码密钥。 作为响应,系统向系统中的收件人提供加密密钥。 随后,收件人可以使用加密密钥来在共享网络中的用户和收件人之间的内容项目的版本的安全,对等分布式共享,而不与系统中的内容项目的先前版本同步冲突。

    Malware detection and content item recovery

    公开(公告)号:US11580221B2

    公开(公告)日:2023-02-14

    申请号:US15394385

    申请日:2016-12-29

    Applicant: DROPBOX, INC.

    Abstract: Disclosed are systems, methods, and non-transitory computer-readable storage media for malware detection and content item recovery. For example, a content management system can receive information describing changes made to content items stored on a user device. The content management system can analyze the information to determine if the described changes are related to malicious software on the user device. When the changes are related to malicious software, the content management system can determine which content items are effected by the malicious software and/or determine when the malicious software first started making changes to the user device. The content management system can recover effected content items associated with the user device by replacing the effected versions of the content items with versions of the content items that existed immediately before the malicious software started making changes to the user device.

    Identifying Related User Accounts Based on Authentication Data

    公开(公告)号:US20200228514A1

    公开(公告)日:2020-07-16

    申请号:US16832463

    申请日:2020-03-27

    Applicant: Dropbox, Inc.

    Inventor: Anton Mityagin

    Abstract: In some embodiments, upon detecting malicious activity associated with a user account, a content management system can identify other user accounts related to the malicious user account. The content management system can identify related user accounts by comparing authentication information collected for the malicious user account with authentication information collected for other user accounts. Authentication information can include IP address information, geographic information, device type, browser type, email addresses, and/or referral information, for example. The content management system can compare the content items associated with the malicious user account to content items associated with other user accounts to determine relatedness or maliciousness. After identifying related malicious user accounts, the content management system can block all related malicious user accounts.

    Identifying and blocking prohibited content items in a content management system

    公开(公告)号:US10534927B2

    公开(公告)日:2020-01-14

    申请号:US15983180

    申请日:2018-05-18

    Applicant: Dropbox, Inc.

    Inventor: Anton Mityagin

    Abstract: To identify whether a content item is prohibited, a content management system can generate a content item fingerprint for the content item and then compare the generated content item fingerprint to a blacklist of content item fingerprints for prohibited content items. If the generated content item fingerprint matches any of the content item fingerprints included in the blacklist, the content management system can determine that the content item is prohibited. The content management system can deny requests to share prohibited content items and/or requests to assign prohibited content items to a user account on the content management system. The content management system can generate the content item fingerprint using the content item as input in a fingerprinting algorithm that was used to generate the content item fingerprints on the blacklist.

    Identifying Related User Accounts Based on Authentication Data

    公开(公告)号:US20180359236A1

    公开(公告)日:2018-12-13

    申请号:US16108245

    申请日:2018-08-22

    Applicant: Dropbox, Inc.

    Inventor: Anton Mityagin

    CPC classification number: H04L63/08 H04L63/1416

    Abstract: In some embodiments, upon detecting malicious activity associated with a user account, a content management system can identify other user accounts related to the malicious user account. The content management system can identify related user accounts by comparing authentication information collected for the malicious user account with authentication information collected for other user accounts. Authentication information can include IP address information, geographic information, device type, browser type, email addresses, and/or referral information, for example. The content management system can compare the content items associated with the malicious user account to content items associated with other user accounts to determine relatedness or maliciousness. After identifying related malicious user accounts, the content management system can block all related malicious user accounts.

    Scanning content items based on user activity

    公开(公告)号:US09959408B2

    公开(公告)日:2018-05-01

    申请号:US15649410

    申请日:2017-07-13

    Applicant: DROPBOX INC.

    Inventor: Anton Mityagin

    CPC classification number: G06F21/561 G06F21/566 H04L63/1433 H04L63/20

    Abstract: In some embodiments, a content management system can initiate a scan of a content item when the content management system detects that activity associated with the content item triggers a scan policy. In some embodiments, a content management system can initiate a scan of a user's account when the content management system detects that activity associated with the content item triggers a scan policy. A scan policy can specify, for example, a number of shares, downloads and/or previews of the content item allowable in a period of time. When the number of shares, downloads, and/or previews exceeds the specified number in the policy in the specified period of time, the content management system can initiate a scan (e.g., virus scan, malware scan, etc.) of the content item and/or the user's account.

    Restricting access to content
    19.
    发明授权

    公开(公告)号:US09817987B2

    公开(公告)日:2017-11-14

    申请号:US14139469

    申请日:2013-12-23

    Applicant: Dropbox, Inc.

    Inventor: Anton Mityagin

    Abstract: Various embodiments restrict or enable access to content items of an account based on login information or content request properties. For example, a synchronized online content management system can receive a request including one or more content request properties from a client device to access a user account. Access rules for the user account can be obtained and applied based on the content request properties to generate an access status. In one instance, the client device is provided with full account access if the access status indicates that the client device is an authorized device. In another instance, if the client device is an unauthorized device, at least one aspect of access to the user account is restricted.

    ADVANCED SECURITY PROTOCOL FOR BROADCASTING AND SYNCHRONIZING SHARED FOLDERS OVER LOCAL AREA NETWORK

    公开(公告)号:US20170214668A1

    公开(公告)日:2017-07-27

    申请号:US15483751

    申请日:2017-04-10

    Applicant: Dropbox, Inc.

    Abstract: A method, system, and manufacture for securely broadcasting shared folders from one client device to other client devices and synchronizing the shared folders over a local area network. A first client device, associated with a content management system, generates a secure identifier for a shared folder, using a shared secret key that is associated with the shared folder. The first client device announces the secure identifier over a local area network to other client devices on the local area network including a second client device. The first client device receives a synchronization request for the shared folder from the second client device. After authenticating, using the shared secret key, that the second client device has authorization to access the shared folder, the first client device synchronizes the shared folder with the second client device over the local area network.

Patent Agency Ranking