NETWORK SECURITY TECHNIQUES COMPARING OBSERVED DISTRIBUTIONS TO BASELINE DISTRIBUTIONS

    公开(公告)号:US20250112945A1

    公开(公告)日:2025-04-03

    申请号:US18978288

    申请日:2024-12-12

    Applicant: KOUNT INC.

    Abstract: A method described herein involves various operations directed toward network security. The operations include accessing a traffic attribute describing a feature of network traffic. The operations further include determining a baseline distribution for the traffic attribute of a baseline set of transactions involving an online system over a baseline period and, additionally, determining an observed distribution for the traffic attribute of an observed set of transactions involving the online system over an observed period. Using the observed distribution and the baseline distribution, an attribute risk value for the traffic attribute is computed. The operations further include detecting that an anomaly exists in the traffic attribute of the observed set of transactions, based on the attribute risk value. Responsive to detecting the anomaly, an access control is implemented for access to the online system by additional transactions having a particular value in the traffic attribute meeting a pattern of the anomaly.

    Techniques for determining legitimacy of email addresses for online access control

    公开(公告)号:US11930034B2

    公开(公告)日:2024-03-12

    申请号:US17357866

    申请日:2021-06-24

    Applicant: KOUNT, INC.

    CPC classification number: H04L63/1433 H04L63/126

    Abstract: Various aspects involve determining legitimacy of an email address for risk assessment or other purposes. For instance, a risk assessment computing system receives a risk assessment query that identifies an email address. The risk assessment computing system determines a set of features for the email address. For each feature, the risk assessment computing system calculates an illegitimacy score by calculating a deviation of the feature from an expected safe value for the feature that is determined from historical email addresses. The risk assessment computing system aggregates the illegitimacy scores of the plurality of features into an aggregated illegitimacy score and further transmits a legitimacy risk value to a remote computing system. The legitimacy risk value indicates the aggregated illegitimacy score and can be used in controlling access of a computing device associated with the email address to one or more interactive computing environments.

    Network security techniques comparing observed distributions to baseline distributions

    公开(公告)号:US11777972B2

    公开(公告)日:2023-10-03

    申请号:US17389159

    申请日:2021-07-29

    Applicant: KOUNT INC.

    CPC classification number: H04L63/1425 H04L63/10

    Abstract: A method described herein involves various operations directed toward network security. The operations include accessing a traffic attribute describing a feature of network traffic. The operations further include determining a baseline distribution for the traffic attribute of a baseline set of transactions involving an online system over a baseline period and, additionally, determining an observed distribution for the traffic attribute of an observed set of transactions involving the online system over an observed period. Using the observed distribution and the baseline distribution, an attribute risk value for the traffic attribute is computed. The operations further include detecting that an anomaly exists in the traffic attribute of the observed set of transactions, based on the attribute risk value. Responsive to detecting the anomaly, an access control is implemented for access to the online system by additional transactions having a particular value in the traffic attribute meeting a pattern of the anomaly.

    Authenticating users for accurate online audience measurement

    公开(公告)号:US10402854B2

    公开(公告)日:2019-09-03

    申请号:US15223736

    申请日:2016-07-29

    Applicant: Kount Inc.

    Abstract: Online entities oftentimes desire to ascertain information about their audience members. To determine information about audience members and their activities, online transactions including information about transactions performed by audience members are collected. One or more audience analysis processes are applied to the online transactions to determine the collection of online transactions performed by a given audience member. With an accurate assignment of online transaction to the audience member, the audience member and associated transactions may be classified as a legitimate or illegitimate.

    Online Machine Data Collection and Archiving Process

    公开(公告)号:US20180300719A1

    公开(公告)日:2018-10-18

    申请号:US16015710

    申请日:2018-06-22

    Applicant: Kount Inc.

    Abstract: An online machine data collection and archiving process generates a machine data profile of a customer computer accessing a transaction form of a merchant web site and links the machine data profile and a transaction record with customer identifying information using a unique transaction identification string. The process preferably captures parameters typically communicated as a part of web accesses, such as an IP address, an HTTP header, and cookie information. The process additionally causes the customer computer to process self-identification routines by processing coding within the merchant transaction form, the self-identification routines yielding further profile parameters. The process further includes a routine for bypassing an intervening proxy to the merchant web site to reveal the true IP address of the customer computer.

    Fast component enumeration in graphs with implicit edges
    7.
    发明授权
    Fast component enumeration in graphs with implicit edges 有权
    快速组件枚举在具有隐式边的图形中

    公开(公告)号:US09075896B2

    公开(公告)日:2015-07-07

    申请号:US13905952

    申请日:2013-05-30

    Applicant: Kount Inc.

    CPC classification number: G06T11/206 G06T11/20 G06T11/203

    Abstract: A method and system for graphical enumeration. The method includes creating an ordered set of vertices for a graph such that each vertex is associated with a corresponding index, and wherein each vertex in the ordered set of vertices includes information. A plurality of keys is created for defining the information. A plurality of lists of vertices is created, each of which is associated with a corresponding key such that vertices in a corresponding list include information associated with the corresponding key. For a first list of vertices, a least valued index is determined from a group of associated vertices based on vertices in the first list and vertices pointed to by the vertices in the first list. Also, all associated vertices are pointed to a root vertex associated with the least valued index.

    Abstract translation: 一种用于图形化枚举的方法和系统。 该方法包括为图形创建有序的顶点集合,使得每个顶点与相应的索引相关联,并且其中顶点的有序集合中的每个顶点包括信息。 创建多个键来定义信息。 创建多个顶点列表,每个列表与对应的密钥相关联,使得相应列表中的顶点包括与对应密钥相关联的信息。 对于顶点的第一列表,基于第一列表中的顶点和由第一列表中的顶点指向的顶点,从一组相关联的顶点确定最小值索引。 此外,所有相关的顶点都指向与最小值索引相关联的根顶点。

    Network security techniques comparing observed distributions to baseline distributions

    公开(公告)号:US12200003B2

    公开(公告)日:2025-01-14

    申请号:US18475821

    申请日:2023-09-27

    Applicant: KOUNT INC.

    Abstract: A method described herein involves various operations directed toward network security. The operations include accessing a traffic attribute describing a feature of network traffic. The operations further include determining a baseline distribution for the traffic attribute of a baseline set of transactions involving an online system over a baseline period and, additionally, determining an observed distribution for the traffic attribute of an observed set of transactions involving the online system over an observed period. Using the observed distribution and the baseline distribution, an attribute risk value for the traffic attribute is computed. The operations further include detecting that an anomaly exists in the traffic attribute of the observed set of transactions, based on the attribute risk value. Responsive to detecting the anomaly, an access control is implemented for access to the online system by additional transactions having a particular value in the traffic attribute meeting a pattern of the anomaly.

    EXPONENTIALLY SMOOTHED CATEGORICAL ENCODING TO CONTROL ACCESS TO A NETWORK RESOURCE

    公开(公告)号:US20230216866A1

    公开(公告)日:2023-07-06

    申请号:US17646696

    申请日:2021-12-31

    Applicant: Kount Inc.

    CPC classification number: H04L63/1416 H04L63/1425 H04L63/1466 H04L63/20

    Abstract: In an example of a method described herein, historical events occurring over a network are detected, and at least one of the historical events is associated with an observed value of a categorical variable. A numerical aggregate value representing the observed value is updated by applying an exponential smoothing function to (i) a prior numerical aggregate value representing prior historical events associated with the observed value and (ii) a count of the historical events associated with the observed value. An event occurring over the network is detected and is associated with the observed value. Features are extracted from the event, where the features include an encoded feature based on the numerical aggregate value to represent the observed value. A predictive model is applied to the features to determine a score representing likelihood of an outcome. Based on the score, access to a resource of the network is controlled.

Patent Agency Ranking