Authentication information update based on fraud detection

    公开(公告)号:US10176318B1

    公开(公告)日:2019-01-08

    申请号:US15795812

    申请日:2017-10-27

    IPC分类号: H04L9/00 G06F21/46

    摘要: Techniques for maintaining and updating authentication information for a plurality of accounts may be provided. In an example a first set of authentication information for the plurality of accounts may be maintained. A second set of authentication information that has been marked as potentially compromised may be received. A third set of authentication information may be generated based on the overlap between the first set of authentication information and the second set of authentication information. The first set of authentication information may be updated based at least in part on one or more security authentication protocols and the third set of authentication information.

    Service for notifying users of item review status changes

    公开(公告)号:US10185982B1

    公开(公告)日:2019-01-22

    申请号:US14667196

    申请日:2015-03-24

    IPC分类号: G06Q30/00 G06Q30/06 G06Q30/02

    摘要: The present disclosure provides computer-implemented systems and processes for determining and analyzing a user review status for a first item purchased or otherwise selected by a user; automatically and periodically monitoring review statutes for various alternative items, which may include competing, substitute, or replacement items relative to the first item; and generating an item recommendation based at least in part on a determination of which alternative items may be more positively rated than the first item. When a determination is made that an alternative item may be earning more positive feedback than the first item of interest, the system notifies the user that a possibly better item is available. Candidate alternative items may be identified based on the user's browsing history, groups of related items, or other sources. Candidate items may be weighted based on various attributes of the reviews, including average rating, number of ratings, number of reviews, and type.

    Dictionary generation for identifying coded credentials
    6.
    发明授权
    Dictionary generation for identifying coded credentials 有权
    用于识别编码凭证的字典生成

    公开(公告)号:US09465942B1

    公开(公告)日:2016-10-11

    申请号:US14459037

    申请日:2014-08-13

    IPC分类号: G06F21/00 G06F21/57

    摘要: Techniques are described for identifying security credentials or other sensitive information by creating a dictionary of data elements included in documents such as source code files, object code files, or other types of files. The data elements may be identified for inclusion in the dictionary based on parsing the documents for delimiter characters, and based on the context of the data elements within the documents. The data elements may also be identified through an entropy-based analysis to detect portions of the documents exhibiting a high degree of entropy compared to a baseline entropy for the documents. The dictionary may be used in a dictionary attack against various systems to determine whether any of the data elements included in the dictionary enable access the systems. The data elements that enable access may be designated as sensitive information hard-coded into the documents.

    摘要翻译: 描述了通过创建诸如源代码文件,目标代码文件或其他类型的文件的文档中包括的数据元素的字典来识别安全凭证或其他敏感信息的技术。 可以基于解析用于定界符字符的文档,并且基于文档内的数据元素的上下文来识别数据元素以包括在字典中。 也可以通过基于熵的分析来识别数据元素,以便与文档的基线熵相比较,以检测表现出高度熵的文档的部分。 字典可以用于针对各种系统的字典攻击,以确定包括在字典中的任何数据元素是否能够访问系统。 可以将访问的数据元素指定为硬编码到文档中的敏感信息。

    Authentication information update based on fraud detection

    公开(公告)号:US09824207B1

    公开(公告)日:2017-11-21

    申请号:US14571254

    申请日:2014-12-15

    IPC分类号: G06F7/04 G06F21/46

    CPC分类号: G06F21/46

    摘要: Techniques for maintaining and updating authentication information for a plurality of accounts may be provided. In an example a first set of authentication information for the plurality of accounts may be maintained. A second set of authentication information that has been marked as potentially compromised may be received. A third set of authentication information may be generated based on the overlap between the first set of authentication information and the second set of authentication information. The first set of authentication information may be updated based at least in part on one or more security authentication protocols and the third set of authentication information.