Preventing unauthorized account access using compromised login credentials
    1.
    发明授权
    Preventing unauthorized account access using compromised login credentials 有权
    使用受损的登录凭据防止未经授权的帐户访问

    公开(公告)号:US09298890B2

    公开(公告)日:2016-03-29

    申请号:US13424626

    申请日:2012-03-20

    IPC分类号: G06F21/00

    摘要: User login information submitted as part of an attempt to log into a computer system is evaluated for unauthorized or illegitimate use based on indicators of suspicious behavior. Example indicators of suspicious behavior include whether the login information is known to have been compromised, whether the login attempt originates from a network source or a physical source that has previously originated an attempt to log in using login information known to have been compromised, and whether multiple login attempts using the login information from multiple users has originated from the source. A suspicion index can be calculated based on the presence of the indicators of suspicious behavior. The system can require enhanced authentication based on the measurement of suspicious behavior.

    摘要翻译: 根据可疑行为指标,对用户登录信息作为尝试登录计算机系统的一部分进行评估,以进行未经授权或非法使用。 可疑行为的示例指标包括登录信息是否已知已被入侵,登录尝试是源自网络源还是以前曾使用已知已被破坏的登录信息发起尝试登录的物理源,以及是否 使用来自多个用户的登录信息的多次登录尝试源自源。 可以根据可疑行为指标的存在来计算怀疑指数。 该系统可以根据可疑行为的测量需要增强认证。

    Preventing Unauthorized Account Access Using Compromised Login Credentials
    2.
    发明申请
    Preventing Unauthorized Account Access Using Compromised Login Credentials 有权
    使用妥协的登录凭证防止未经授权的帐户访问

    公开(公告)号:US20130254857A1

    公开(公告)日:2013-09-26

    申请号:US13424626

    申请日:2012-03-20

    IPC分类号: G06F21/00

    摘要: User login information submitted as part of an attempt to log into a computer system is evaluated for unauthorized or illegitimate use based on indicators of suspicious behavior. Example indicators of suspicious behavior include whether the login information is known to have been compromised, whether the login attempt originates from a network source or a physical source that has previously originated an attempt to log in using login information known to have been compromised, and whether multiple login attempts using the login information from multiple users has originated from the source. A suspicion index can be calculated based on the presence of the indicators of suspicious behavior. The system can require enhanced authentication based on the measurement of suspicious behavior.

    摘要翻译: 根据可疑行为指标,对用户登录信息作为尝试登录计算机系统的一部分进行评估,以进行未经授权或非法使用。 可疑行为的示例指标包括登录信息是否已知已被入侵,登录尝试是源自网络源还是以前曾使用已知已被破坏的登录信息发起尝试登录的物理源,以及是否 使用来自多个用户的登录信息的多次登录尝试源自源。 可以根据可疑行为指标的存在来计算怀疑指数。 该系统可以根据可疑行为的测量需要增强认证。

    System and methods for URL entity extraction
    5.
    发明授权
    System and methods for URL entity extraction 有权
    URL实体提取的系统和方法

    公开(公告)号:US09286378B1

    公开(公告)日:2016-03-15

    申请号:US13601674

    申请日:2012-08-31

    摘要: To allow for detection of links to spam within a social networking system by identifying entities based on uniform resource locators (URLs). Identifiers that include at least one parent entity identifier representing a parent entity and at least one child entity identifier representing a child entity are extracted from URLs. An identifier sequence including the at least one parent entity identifier is designated as an attributable sequence when the child entity accounts for a value of traffic received by the parent entity that does not satisfy a threshold. In an embodiment, the child entity may be identified as an actionable target. The URLs may be classified within a hierarchical structure based on the identifiers. The hierarchical structure may comprise at least one parent node representing the parent entity and at least one child node representing the child entity. The hierarchical structure may be a tree.

    摘要翻译: 通过识别基于统一资源定位符(URL)的实体来允许在社交网络系统中检测到垃圾邮件的链接。 从URL中提取包含表示父实体的至少一个父实体标识符和表示子实体的至少一个子实体标识符的标识符。 当子实体考虑由父实体接收到的不满足阈值的业务值时,包括至少一个父实体标识符的标识符序列被指定为归属序列。 在一个实施例中,子实体可以被识别为可操作的目标。 这些URL可以基于标识符分类在分层结构中。 层次结构可以包括表示父实体的至少一个父节点和表示子实体的至少一个子节点。 层次结构可以是树。