Systems and methods for verifying user identities
    61.
    发明授权
    Systems and methods for verifying user identities 有权
    验证用户身份的系统和方法

    公开(公告)号:US09077538B1

    公开(公告)日:2015-07-07

    申请号:US13326745

    申请日:2011-12-15

    IPC分类号: H04L29/06 H04L9/32

    摘要: A computer-implemented method for verifying user identities may include (1) identifying a request to ascertain whether a user account corresponds to a physical person, and, in response to the request, (2) identifying a password vault configured to store login information for at least one third-party Internet site for the user account, the third-party Internet site requiring a physical validation factor to log in to the third-party Internet site, (3) determining, based at least in part on the login information for the third-party Internet site, that the user account corresponds to the physical person, and (4) responding to the request with an indicator that the user account corresponds to the physical person. Various other methods, systems, and computer-readable media are also disclosed.

    摘要翻译: 用于验证用户身份的计算机实现的方法可以包括(1)识别用于确定用户帐户对应于物理人的请求,并且响应于该请求,(2)识别配置为存储登录信息的密码库 用于所述用户帐户的至少一个第三方因特网站点,需要物理验证因子的第三方因特网站点登录到所述第三方因特网站点,(3)至少部分地基于所述登录信息来确定 所述第三方因特网站点,所述用户帐户对应于所述身体人员,以及(4)用所述用户帐户对应于所述身体人员的指示符来响应所述请求。 还公开了各种其它方法,系统和计算机可读介质。

    Techniques for providing dynamic account and device management
    62.
    发明授权
    Techniques for providing dynamic account and device management 有权
    提供动态帐户和设备管理的技术

    公开(公告)号:US08984111B2

    公开(公告)日:2015-03-17

    申请号:US13524795

    申请日:2012-06-15

    IPC分类号: G06F15/173 H04L29/06

    摘要: Techniques for providing data in dynamic account and device management are disclosed. In one particular exemplary embodiment, the techniques may be realized as a system for providing data in dynamic account and device management. The system may comprise one or more processors communicatively coupled to a network. The one or more processors may be configured to identify a user device to be managed. The one or more processors may be configured to transmit a request for delegate authority to manage the user device. The one or more processors may be configured to receive delegate authority to manage the user device. The one or more processors may be configured to provide network access to the user device. The one or more processors may also be configured to manage the user device and monitor data communicated to and from the user device.

    摘要翻译: 公开了用于在动态帐户和设备管理中提供数据的技术。 在一个特定的示例性实施例中,这些技术可以被实现为用于在动态帐户和设备管理中提供数据的系统。 系统可以包括通信地耦合到网络的一个或多个处理器。 一个或多个处理器可以被配置为识别要管理的用户设备。 一个或多个处理器可以被配置为发送用于管理用户设备的委托权限的请求。 一个或多个处理器可以被配置为接收委托权限以管理用户设备。 一个或多个处理器可以被配置为向用户设备提供网络访问。 一个或多个处理器还可以被配置为管理用户设备并监视与用户设备通信的数据。

    Personal identifiable information (PII) theft detection and remediation system and method
    63.
    发明授权
    Personal identifiable information (PII) theft detection and remediation system and method 有权
    个人识别信息(PII)盗窃检测和修复系统及方法

    公开(公告)号:US08875284B1

    公开(公告)日:2014-10-28

    申请号:US12324174

    申请日:2008-11-26

    IPC分类号: G08B21/00 H04L29/06 G06F21/55

    摘要: Malicious code detected on a host computer system is remediated. Further, upon a determination that the user's personal identifiable information (PII) was previously exposed to the malicious code, the user is notified that the user may be a victim of theft of the user's personal identifiable information. The notification contains sufficient information for the user to take proactive steps to reduce the consequences of the personal identifiable information theft such as to contact the user's credit card company to prevent or minimize any loss associated with the personal identifiable information theft.

    摘要翻译: 在主机系统上检测到的恶意代码被修复。 此外,在确定用户的个人身份信息(PII)先前已经暴露于恶意代码的情况下,向用户通知用户可能是盗用用户的个人身份信息的受害者。 该通知包含足够的信息,供用户采取主动措施,减少个人身份信息窃取的后果,例如联系用户的信用卡公司,以防止或最小化与个人身份信息窃取相关的任何损失。

    Method and apparatus for identifying domain name abuse
    64.
    发明授权
    Method and apparatus for identifying domain name abuse 有权
    识别域名滥用的方法和设备

    公开(公告)号:US08869269B1

    公开(公告)日:2014-10-21

    申请号:US12128237

    申请日:2008-05-28

    IPC分类号: G06F21/00 H04L29/06 H04L29/12

    摘要: A method and apparatus for identifying domain name abuse in web-based content is described. In one embodiment, the method for identifying domain name abuse in web-based content to secure a computer comprising processing a first domain name and modifying the first domain name using a at least one rule for replacing characters. The modified first domain name indicates an imitation of a second domain name by the first domain name.

    摘要翻译: 描述了一种用于识别基于web的内容中的域名滥用的方法和装置。 在一个实施例中,用于识别基于web的内容中的域名滥用的方法以保护计算机,包括处理第一域名并使用用于替换字符的至少一个规则来修改第一域名。 修改的第一个域名表示第一个域名对第二个域名的模仿。

    Anti-phishing system based on end user data submission quarantine periods for new websites
    65.
    发明授权
    Anti-phishing system based on end user data submission quarantine periods for new websites 有权
    基于最终用户数据提交的反网络钓鱼系统检测新网站

    公开(公告)号:US08689341B1

    公开(公告)日:2014-04-01

    申请号:US12124999

    申请日:2008-05-21

    IPC分类号: H04L29/06

    摘要: Quarantine periods longer than anticipated working lifetimes for phishing websites are used to protect users from phishing attacks. A central server or the like receives data indicating user attempts to submit confidential information to websites from a plurality of user computers. The received data is aggregated, and used to track website activity concerning solicitation of confidential information. The central server acquires and maintains current statistical data concerning phishing website lifetimes. The aggregated data concerning attempts by users to submit confidential information to websites and the current statistics concerning phishing website lifetimes are used to determine appropriate quarantine periods for websites, which can be enforced when users try to transmit confidential information to these websites.

    摘要翻译: 网络钓鱼网站的检疫期比预期的工作寿命长,用于保护用户免受网络钓鱼攻击。 中央服务器等接收指示用户从多个用户计算机向网站提交机密信息的尝试的数据。 收集的数据汇总,用于跟踪关于机密信息征求的网站活动。 中央服务器获取和维护有关网络钓鱼网站生命周期的当前统计数据。 关于用户向网站提交机密信息的尝试的汇总数据和关于网络钓鱼网站使用寿命的当前统计数据,用于确定网站的适当检疫期限,当用户尝试向这些网站传送机密信息时,可以执行此类数据。

    Detecting suspicious domains using domain profiling
    66.
    发明授权
    Detecting suspicious domains using domain profiling 有权
    使用域分析检测可疑域

    公开(公告)号:US08549623B1

    公开(公告)日:2013-10-01

    申请号:US12055050

    申请日:2008-03-25

    申请人: Shaun Cooley

    发明人: Shaun Cooley

    IPC分类号: G06F11/00

    CPC分类号: G06F21/56 G06F21/552

    摘要: Outbound communication from a computer is monitored, and requests to access remote links are identified. This process identifies attempts by users to access links provided by third parties in emails and such, as well other attempts by users to access remote domains. Domains in the identified requests are profiled, by testing them for properties associated with known legitimate domains, and for properties associated with known fraudulent domains. A trustworthiness score for a domain is calculated based on the results of the profiling. The trustworthiness score is compared to a predetermined threshold, and from the results it is determined whether or not the domain is legitimate. If the domain is fraudulent, appropriate action is taken, such as blocking the attempt to access the domain.

    摘要翻译: 监视来自计算机的出站通信,并识别访问远程链路的请求。 此过程识别用户访问第三方在电子邮件中提供的链接的尝试,以及用户访问远程域的其他尝试。 识别的请求中的域被分析,通过测试它们与已知合法域相关联的属性以及与已知欺诈域相关联的属性。 根据分析结果计算域的可信度分数。 将可信度得分与预定阈值进行比较,从结果确定域是否合法。 如果域是欺诈性的,则采取适当的措施,例如阻止访问域的尝试。

    Systems and methods for providing security information about quick response codes
    67.
    发明授权
    Systems and methods for providing security information about quick response codes 有权
    提供有关快速响应代码的安全信息的系统和方法

    公开(公告)号:US08490861B1

    公开(公告)日:2013-07-23

    申请号:US13044877

    申请日:2011-03-10

    IPC分类号: G06F17/00 G06F21/00

    摘要: A computer-implemented method for providing security information about quick response codes may include (1) identifying a matrix barcode embedded in a web page, (2) determining that the matrix barcode includes a link to an Internet resource, (3) determining the trustworthiness of the Internet resource referenced by the matrix barcode, and then (4) augmenting the matrix barcode with a visual augmentation that is based at least in part on the trustworthiness of the Internet resource. Various other methods, systems, and computer-readable media are also disclosed.

    摘要翻译: 用于提供关于快速响应代码的安全信息的计算机实现的方法可以包括(1)识别嵌入在网页中的矩阵条形码,(2)确定矩阵条形码包括到因特网资源的链接,(3)确定可信度 的矩阵条形码引用的因特网资源,然后(4)至少部分地基于互联网资源的可信度的视觉增强来扩充矩阵条形码。 还公开了各种其它方法,系统和计算机可读介质。

    Systems and methods for distributing spam signatures
    68.
    发明授权
    Systems and methods for distributing spam signatures 有权
    用于分发垃圾邮件签名的系统和方法

    公开(公告)号:US08458268B1

    公开(公告)日:2013-06-04

    申请号:US12710056

    申请日:2010-02-22

    申请人: Shaun Cooley

    发明人: Shaun Cooley

    IPC分类号: G06F15/16

    CPC分类号: H04L51/12 G06Q10/107

    摘要: A computer-implemented method for distributing spam signatures may include identifying a set of spam e-mails. The computer-implemented method may also include identifying a plurality of clients, each client in the plurality of clients having received at least one e-mail in the set of spam e-mails. The computer-implemented method may further include identifying at least one mailing list by identifying at least one group of clients within the plurality of clients that have received a subset of the set of spam e-mails. The computer-implemented method may additionally include identifying at least one additional spam e-mail sent via the mailing list. The computer-implemented method may also include transmitting information identifying the additional spam e-mail to at least one client on the mailing list. Various other methods, systems, and computer-readable media are also disclosed.

    摘要翻译: 用于分发垃圾邮件签名的计算机实现的方法可以包括标识一组垃圾邮件。 计算机实现的方法还可以包括识别多个客户端,多个客户端中的每个客户端已经在该组垃圾邮件中接收了至少一个电子邮件。 计算机实现的方法还可以包括通过识别已经接收到该组垃圾邮件的子集的多个客户端内的至少一组客户端来识别至少一个邮件列表。 计算机实现的方法可以另外包括识别经由邮件列表发送的至少一个附加垃圾邮件的电子邮件。 计算机实现的方法还可以包括将标识附加垃圾邮件的信息发送到邮寄列表上的至少一个客户端。 还公开了各种其它方法,系统和计算机可读介质。

    Methods and systems for determining a file set
    69.
    发明授权
    Methods and systems for determining a file set 有权
    用于确定文件集的方法和系统

    公开(公告)号:US08364705B1

    公开(公告)日:2013-01-29

    申请号:US12236661

    申请日:2008-09-24

    IPC分类号: G06F17/30

    CPC分类号: G06F17/30082 G06F17/3012

    摘要: A computer-implemented method for determining a file set. The method may include identifying a file set. The method may also include identifying a first file in the file set. The first file may comprise a first value in a first property field. The method may further comprise identifying a second file in the file set. The second file may comprise a second value in the first property field. The first value may be different than the second value. The method may include transmitting a first file identifier of the first file and a second file identifier of the second file from a first computing device to a second computing device. The second computing device may identify a set of known-good-file identifiers. The second computing device may transmit the set of known-good-file identifiers to the first computing device. Corresponding systems and computer-readable media are also disclosed.

    摘要翻译: 一种用于确定文件集的计算机实现的方法。 该方法可以包括识别文件集。 该方法还可以包括识别文件集中的第一文件。 第一文件可以包括第一属性字段中的第一值。 该方法还可以包括识别文件集中的第二文件。 第二文件可以包括第一属性字段中的第二值。 第一个值可能不同于第二个值。 该方法可以包括将第一文件的第一文件标识符和第二文件的第二文件标识从第一计算设备发送到第二计算设备。 第二计算设备可以标识一组已知好文件标识符。 第二计算设备可以将已知好文件标识符的集合发送到第一计算设备。 还公开了相应的系统和计算机可读介质。

    Systems and methods for identifying spam mailing lists
    70.
    发明授权
    Systems and methods for identifying spam mailing lists 有权
    识别垃圾邮件列表的系统和方法

    公开(公告)号:US08316094B1

    公开(公告)日:2012-11-20

    申请号:US12691228

    申请日:2010-01-21

    申请人: Shaun Cooley

    发明人: Shaun Cooley

    IPC分类号: G06F15/16

    CPC分类号: H04L51/12

    摘要: A computer-implemented method for identifying spam mailing lists may include identifying a plurality of clients that receive e-mail messages. The computer-implemented method may also include, for each client in the plurality of clients, receiving, from the client, information identifying at least one e-mail message received by the client. The computer-implemented method may further include, for each client in the plurality of clients, recording the identifying information in a database. The computer-implemented method may additionally include identifying at least one mailing list by identifying at least one group of clients within the plurality of clients with similar patterns of identifying information. Various other methods, systems, and computer-readable media are also disclosed.

    摘要翻译: 用于识别垃圾邮件列表的计算机实现的方法可以包括识别接收电子邮件消息的多个客户端。 计算机实现的方法还可以包括对于多个客户端中的每个客户端,从客户端接收标识由客户端接收的至少一个电子邮件消息的信息。 计算机实现的方法还可以包括对于多个客户端中的每个客户端,将识别信息记录在数据库中。 计算机实现的方法可以另外包括通过用相似的识别信息模式识别多个客户端内的至少一组客户端来识别至少一个邮件列表。 还公开了各种其它方法,系统和计算机可读介质。