-
公开(公告)号:US20180076960A1
公开(公告)日:2018-03-15
申请号:US15814331
申请日:2017-11-15
Applicant: DROPBOX INC.
Inventor: Anton Mityagin
CPC classification number: H04L9/0891 , H04L9/08 , H04L9/0819 , H04L9/12 , H04L9/16 , H04L63/0428 , H04L63/068
Abstract: Systems, methods, and non-transitory computer-readable storage media for rotating security keys for an online synchronized content management system client. A client having a first security key as an active security key may send a request to a server for a new security key as a replacement for the first security key. The server may receive the request and generate a candidate security key. The server can issue the candidate security key to the client device. After receiving the candidate security key, the client may send a key receipt confirmation message to the server. In response to the confirmation message, the server may mark the candidate key as the new security key for the client and discard the client's old security key. The server may send an acknowledgment message to the client device. In response, the client may also mark the candidate key as its new active key.
-
公开(公告)号:US09843446B2
公开(公告)日:2017-12-12
申请号:US14513938
申请日:2014-10-14
Applicant: Dropbox, Inc.
Inventor: Anton Mityagin
CPC classification number: H04L9/0891 , H04L9/08 , H04L9/0819 , H04L9/12 , H04L9/16 , H04L63/0428 , H04L63/068
Abstract: Systems, methods, and non-transitory computer-readable storage media for rotating security keys for an online synchronized content management system client. A client having a first security key as an active security key may send a request to a server for a new security key as a replacement for the first security key. The server may receive the request and generate a candidate security key. The server can issue the candidate security key to the client device. After receiving the candidate security key, the client may send a key receipt confirmation message to the server. In response to the confirmation message, the server may mark the candidate key as the new security key for the client and discard the client's old security key. The server may send an acknowledgment message to the client device. In response, the client may also mark the candidate key as its new active key.
-
公开(公告)号:US20170346821A1
公开(公告)日:2017-11-30
申请号:US15166194
申请日:2016-05-26
Applicant: Dropbox, Inc.
Inventor: Kapil Yedidi , Anton Mityagin , Sean Byrne , Andrew Scheff
IPC: H04L29/06
CPC classification number: H04L63/0884 , H04L63/083 , H04L63/0876 , H04L63/1425
Abstract: Disclosed are systems, methods, and non-transitory computer-readable storage media for identifying accounts having shared credentials. In some implementations, a content management system can collect user login context data when a user logs in to or accesses a user account of the content management system. For example, the content management system can collect client device data, client application data, internet protocol (IP) address data, and/or other data from the user's device when the user logs in to the user account. The content management system can analyze the login context data to determine patterns that indicate that the user account login credentials are being shared among multiple users.
-
公开(公告)号:US09727727B2
公开(公告)日:2017-08-08
申请号:US14498908
申请日:2014-09-26
Applicant: Dropbox, Inc.
Inventor: Anton Mityagin
CPC classification number: G06F21/561 , G06F21/566 , H04L63/1433 , H04L63/20
Abstract: In some embodiments, a content management system can initiate a scan of a content item when the content management system detects that activity associated with the content item triggers a scan policy. In some embodiments, a content management system can initiate a scan of a user's account when the content management system detects that activity associated with the content item triggers a scan policy. A scan policy can specify, for example, a number of shares, downloads and/or previews of the content item allowable in a period of time. When the number of shares, downloads, and/or previews exceeds the specified number in the policy in the specified period of time, the content management system can initiate a scan (e.g., virus scan, malware scan, etc.) of the content item and/or the user's account.
-
公开(公告)号:US20160092683A1
公开(公告)日:2016-03-31
申请号:US14498908
申请日:2014-09-26
Applicant: Dropbox, Inc.
Inventor: Anton Mityagin
CPC classification number: G06F21/561 , G06F21/566 , H04L63/1433 , H04L63/20
Abstract: In some embodiments, a content management system can initiate a scan of a content item when the content management system detects that activity associated with the content item triggers a scan policy. In some embodiments, a content management system can initiate a scan of a user's account when the content management system detects that activity associated with the content item triggers a scan policy. A scan policy can specify, for example, a number of shares, downloads and/or previews of the content item allowable in a period of time. When the number of shares, downloads, and/or previews exceeds the specified number in the policy in the specified period of time, the content management system can initiate a scan (e.g., virus scan, malware scan, etc.) of the content item and/or the user's account.
Abstract translation: 在一些实施例中,当内容管理系统检测到与内容项目相关联的活动触发扫描策略时,内容管理系统可以发起内容项目的扫描。 在一些实施例中,当内容管理系统检测到与内容项目相关联的活动触发扫描策略时,内容管理系统可以发起用户帐户的扫描。 扫描策略可以指定例如在一段时间内允许的内容项目的数量的共享,下载和/或预览。 当指定时间段内的共享,下载和/或预览次数超过规定的数量时,内容管理系统可以启动内容项的扫描(例如,病毒扫描,恶意软件扫描等) 和/或用户的帐户。
-
公开(公告)号:US12177199B2
公开(公告)日:2024-12-24
申请号:US17528819
申请日:2021-11-17
Applicant: Dropbox, Inc.
Inventor: Anton Mityagin
IPC: H04L9/40
Abstract: In some embodiments, upon detecting malicious activity associated with a user account, a content management system can identify other user accounts related to the malicious user account. The content management system can identify related user accounts by comparing authentication information collected for the malicious user account with authentication information collected for other user accounts. Authentication information can include IP address information, geographic information, device type, browser type, email addresses, and/or referral information, for example. The content management system can compare the content items associated with the malicious user account to content items associated with other user accounts to determine relatedness or maliciousness. After identifying related malicious user accounts, the content management system can block all related malicious user accounts.
-
公开(公告)号:US20230362165A1
公开(公告)日:2023-11-09
申请号:US18353631
申请日:2023-07-17
Applicant: Dropbox, Inc.
Inventor: Kapil Yedidi , Anton Mityagin , Sean Byrne , Andrew Scheff
IPC: H04L9/40
CPC classification number: H04L63/0884 , H04L63/083 , H04L63/0876
Abstract: Disclosed are systems, methods, and non-transitory computer-readable storage media for identifying accounts having shared credentials. In some implementations, a content management system can collect user login context data when a user logs in to or accesses a user account of the content management system. For example, the content management system can collect client device data, client application data, internet protocol (IP) address data, and/or other data from the user's device when the user logs in to the user account. The content management system can analyze the login context data to determine patterns that indicate that the user account login credentials are being shared among multiple users.
-
公开(公告)号:US11750607B2
公开(公告)日:2023-09-05
申请号:US17303444
申请日:2021-05-28
Applicant: Dropbox, Inc.
Inventor: Kapil Yedidi , Anton Mityagin , Sean Byrne , Andrew Scheff
IPC: H04L9/40
CPC classification number: H04L63/0884 , H04L63/083 , H04L63/0876
Abstract: Disclosed are systems, methods, and non-transitory computer-readable storage media for identifying accounts having shared credentials. In some implementations, a content management system can collect user login context data when a user logs in to or accesses a user account of the content management system. For example, the content management system can collect client device data, client application data, internet protocol (IP) address data, and/or other data from the user's device when the user logs in to the user account. The content management system can analyze the login context data to determine patterns that indicate that the user account login credentials are being shared among multiple users.
-
公开(公告)号:US20220078177A1
公开(公告)日:2022-03-10
申请号:US17528819
申请日:2021-11-17
Applicant: Dropbox, Inc.
Inventor: Anton Mityagin
IPC: H04L29/06
Abstract: In some embodiments, upon detecting malicious activity associated with a user account, a content management system can identify other user accounts related to the malicious user account. The content management system can identify related user accounts by comparing authentication information collected for the malicious user account with authentication information collected for other user accounts. Authentication information can include IP address information, geographic information, device type, browser type, email addresses, and/or referral information, for example. The content management system can compare the content items associated with the malicious user account to content items associated with other user accounts to determine relatedness or maliciousness. After identifying related malicious user accounts, the content management system can block all related malicious user accounts.
-
公开(公告)号:US20200014687A1
公开(公告)日:2020-01-09
申请号:US16576006
申请日:2019-09-19
Applicant: Dropbox, Inc.
Inventor: Kapil Yedidi , Anton Mityagin , Sean Byrne , Andrew Scheff
IPC: H04L29/06
Abstract: Disclosed are systems, methods, and non-transitory computer-readable storage media for identifying accounts having shared credentials. In some implementations, a content management system can collect user login context data when a user logs in to or accesses a user account of the content management system. For example, the content management system can collect client device data, client application data, internet protocol (IP) address data, and/or other data from the user's device when the user logs in to the user account. The content management system can analyze the login context data to determine patterns that indicate that the user account login credentials are being shared among multiple users.
-
-
-
-
-
-
-
-
-