-
公开(公告)号:US12192222B2
公开(公告)日:2025-01-07
申请号:US18301862
申请日:2023-04-17
Applicant: KOUNT INC.
Inventor: Joshua Michael Johnston , Matthew Lewis Jones , Nathan Daniel Monnig , Divyanshu Rohit Murli
Abstract: A method described herein involves various operations directed toward network security. The operations include accessing transaction data describing network traffic associated with a web server during an interval. Based on a count of new transactions involving an online entity during the interval according to the transaction data, a short-term trend is determined for the online entity. The operations further include applying exponential smoothing to a history of transactions of the online entity to compute a long-term trend for the online entity. Based on a comparison between the short-term trend and the long-term trend for the online entity, an anomaly is detected with respect to the online entity in the network traffic associated with the web server. Responsive to detecting the anomaly, an access control is implemented between the online entity and the web server.
-
公开(公告)号:US20230291756A1
公开(公告)日:2023-09-14
申请号:US18007268
申请日:2021-07-29
Applicant: KOUNT INC.
Inventor: Nathan Daniel MONNIG , Joshua Michael JOHNSTON
IPC: H04L9/40
CPC classification number: H04L63/1425 , H04L63/102 , H04L63/105
Abstract: Certain aspects involve a system, computer-implemented method, and computer-readable medium for identifying attributes associated with a target entity such as a person. A hierarchical characterization system receives an attribute and a request for associated identity data. The system generates an identity graph that includes attribute nodes corresponding to respective attributes and online interaction nodes corresponding to respective online interactions. The system correlates at least a subset of the online interactions and at least a subset of the attributes with a particular entity. The system generates a report indicating an identity of the entity and a behavior of the entity based on the correlated online interactions and the correlated attributes.
-
公开(公告)号:US20230254333A1
公开(公告)日:2023-08-10
申请号:US18301862
申请日:2023-04-17
Applicant: KOUNT INC.
Inventor: Joshua Michael JOHNSTON , Matthew Lewis JONES , Nathan Daniel MONNIG , Divyanshu Rohit MURLI
IPC: H04L9/40
CPC classification number: H04L63/1425 , H04L63/1433 , H04L63/1458
Abstract: A method described herein involves various operations directed toward network security. The operations include accessing transaction data describing network traffic associated with a web server during an interval. Based on a count of new transactions involving an online entity during the interval according to the transaction data, a short-term trend is determined for the online entity. The operations further include applying exponential smoothing to a history of transactions of the online entity to compute a long-term trend for the online entity. Based on a comparison between the short-term trend and the long-term trend for the online entity, an anomaly is detected with respect to the online entity in the network traffic associated with the web server. Responsive to detecting the anomaly, an access control is implemented between the online entity and the web server.
-
公开(公告)号:US20230229767A1
公开(公告)日:2023-07-20
申请号:US18007148
申请日:2021-07-21
Applicant: KOUNT INC.
Inventor: Christopher John GALLI , James Gregory DAVIS , Arthur Jacob PUTNAM
IPC: G06F21/56
CPC classification number: G06F21/56 , G06F2221/034
Abstract: Systems and methods for validating online activities through proof-of-work techniques are provided. In one example, a validating computing system receives a request for a proof-of-work instruction from a client device that has submitted an online activity request to an online server system. The validating computing system generates and transmits a proof-of-work instruction for solving a problem to the client device. The validating computing system further receives a response to the proof-of-work instruction from the client device. The validating computing system generates a validity decision based on whether the client device correctly solved the problem, and transmits, to the online server system, the validity decision for use in granting the online activity request to the online server system.
-
公开(公告)号:US11658994B2
公开(公告)日:2023-05-23
申请号:US17754854
申请日:2021-07-14
Applicant: KOUNT INC.
Inventor: Joshua Michael Johnston , Matthew Lewis Jones , Nathan Daniel Monnig , Divyanshu Rohit Murli
CPC classification number: H04L63/1425 , H04L63/1433 , H04L63/1458
Abstract: A method described herein involves various operations directed toward network security. The operations include accessing transaction data describing network traffic associated with a web server during an interval. Based on a count of new transactions involving an online entity during the interval according to the transaction data, a short-term trend is determined for the online entity. The operations further include applying exponential smoothing to a history of transactions of the online entity to compute a long-term trend for the online entity. Based on a comparison between the short-term trend and the long-term trend for the online entity, an anomaly is detected with respect to the online entity in the network traffic associated with the web server. Responsive to detecting the anomaly, an access control is implemented between the online entity and the web server.
-
公开(公告)号:US20220038481A1
公开(公告)日:2022-02-03
申请号:US17389159
申请日:2021-07-29
Applicant: KOUNT INC.
Inventor: Matthew Lewis JONES
IPC: H04L29/06
Abstract: A method described herein involves various operations directed toward network security. The operations include accessing a traffic attribute describing a feature of network traffic. The operations further include determining a baseline distribution for the traffic attribute of a baseline set of transactions involving an online system over a baseline period and, additionally, determining an observed distribution for the traffic attribute of an observed set of transactions involving the online system over an observed period. Using the observed distribution and the baseline distribution, an attribute risk value for the traffic attribute is computed. The operations further include detecting that an anomaly exists in the traffic attribute of the observed set of transactions, based on the attribute risk value. Responsive to detecting the anomaly, an access control is implemented for access to the online system by additional transactions having a particular value in the traffic attribute meeting a pattern of the anomaly.
-
公开(公告)号:US11176573B2
公开(公告)日:2021-11-16
申请号:US16513041
申请日:2019-07-16
Applicant: Kount Inc.
Inventor: Timothy P. Barber
Abstract: Online entities oftentimes desire to ascertain information about their audience members. To determine information about audience members and their activities, online transactions including information about transactions performed by audience members are collected. One or more audience analysis processes are applied to the online transactions to determine the collection of online transactions performed by a given audience member. With an accurate assignment of online transaction to the audience member, the audience member and associated transactions may be classified as a legitimate or illegitimate.
-
公开(公告)号:US20170295133A1
公开(公告)日:2017-10-12
申请号:US15633387
申请日:2017-06-26
Applicant: Kount Inc.
Inventor: Timothy P. Barber
Abstract: A system establishes virtual DNS servers that are supported by a DNS server. Target IP addresses are assigned for the virtual DNS servers. Network capable devices are uniquely assigned to the virtual DNS servers for domain name resolution. Each network capable device accesses the communication network through a corresponding network device associated with a corresponding source IP address. A client's service plan is assigned to a first network capable device used by the client. The service plan is implemented through a DNS request under a session established between the first network capable device and its assigned first virtual DNS server. The session is uniquely identified by a first source IP address of a first network device used by the first network capable device to access the communication network and a first target IP address of the first virtual DNS server.
-
49.
公开(公告)号:US20170272424A1
公开(公告)日:2017-09-21
申请号:US15612117
申请日:2017-06-02
Applicant: Kount Inc.
Inventor: Timothy P. Barber
CPC classification number: H04L63/08 , G06Q20/3821 , G06Q30/06 , G06Q30/0609 , H04L63/12 , H04L63/126
Abstract: A system and method for providing, as a service over a computer network (especially a packet-switched computer network) to a body of merchants connected to the computer network, verification of consumer identification based on data provided over the computer network by scanning devices attached to the computers operated by consumers.
-
公开(公告)号:US09699164B2
公开(公告)日:2017-07-04
申请号:US14863604
申请日:2015-09-24
Applicant: Kount Inc.
Inventor: Timothy P. Barber
CPC classification number: H04L63/08 , G06Q20/3821 , G06Q30/06 , G06Q30/0609 , H04L63/12 , H04L63/126
Abstract: A system and method for providing, as a service over a computer network (especially a packet-switched computer network) to a body of merchants connected to the computer network, verification of consumer identification based on data provided over the computer network by scanning devices attached to the computers operated by consumers.
-
-
-
-
-
-
-
-
-