FRAUD DETECTION FOR IDENTITY MANAGEMENT SYSTEMS
    2.
    发明申请
    FRAUD DETECTION FOR IDENTITY MANAGEMENT SYSTEMS 审中-公开
    对身份管理系统的欺诈检测

    公开(公告)号:US20140230051A1

    公开(公告)日:2014-08-14

    申请号:US13763553

    申请日:2013-02-08

    Applicant: APPLE INC.

    CPC classification number: H04L63/1416

    Abstract: Systems, methods and computer program products for identifying and remediating in real-time (or near real-time) fraudulent activities associated with identity management systems are disclosed. An event (e.g., client request to logon to an account) is received during a time interval. An abnormal pattern in one or more characteristics of the event is determined. The event is associated with a client identity. One or more reputation scores for the client identity are determined based on event history data associated with the client identity. One or more state objects for one or more client identifier attributes are updated with the reputation scores. One or more remedial actions are implemented against the client request using the one or more updated state objects.

    Abstract translation: 公开了用于识别和修复与身份管理系统相关的实时(或近实时)欺诈活动的系统,方法和计算机程序产品。 在一段时间间隔内收到事件(例如,登录到帐户的客户端请求)。 确定事件的一个或多个特征中的异常模式。 该事件与客户端身份相关联。 基于与客户端身份相关联的事件历史数据来确定客户端身份的一个或多个信誉分数。 一个或多个客户端标识符属性的一个或多个状态对象用信誉分数更新。 使用一个或多个更新的状态对象针对客户端请求实现一个或多个补救动作。

    CREDENTIAL STORAGE ACROSS MULTIPLE DEVICES
    9.
    发明申请

    公开(公告)号:US20170201550A1

    公开(公告)日:2017-07-13

    申请号:US15274880

    申请日:2016-09-23

    Applicant: Apple Inc.

    CPC classification number: H04L63/0815 G06F21/41

    Abstract: Techniques are disclosed relating to accessing credential information on multiple devices. In one embodiment, a computer system is disclosed that includes one or processors and memory having program instructions stored therein that are executable by the one or more processors to cause the computer system to perform operations. The operations include storing registration information identifying a plurality of devices as being registered to an organization and receiving, over a network from a first device, a request for credential information of a first of a plurality of users associated with the organization. The operations further include authenticating the first request, including verifying that the first device is being used by the first user and determining, based on the registration information, whether the first device is one of the plurality of devices. The operations include granting or denying the first request for the credential information based on the authenticating.

Patent Agency Ranking