Authenticating users in the presence of small transaction volumes

    公开(公告)号:US11042880B1

    公开(公告)日:2021-06-22

    申请号:US14573213

    申请日:2014-12-17

    Abstract: A method involves performing a mathematical estimation operation identifying a risk score threshold. The operation identifies the risk score threshold as a point on a curve rather than a value of a particular risk score. Such a curve approximates the distribution of risk score values output over a time interval and represents a function embodied by a plot of risk score percentile vs. risk score value. The risk engine, rather than selecting a particular risk score, selects a curve from a family of curves that is known to accurately represent such risk score distributions. For example, the risk engine may choose the curve that provides the best fit to the previous week's risk scores over the family of curves. The risk engine identifies the risk score threshold by finding a risk score value such that the function evaluated at that risk score value produces a specified risk score percentile.

    Smart television data sharing to provide security
    2.
    发明授权
    Smart television data sharing to provide security 有权
    智能电视数据共享提供安全保障

    公开(公告)号:US09098699B1

    公开(公告)日:2015-08-04

    申请号:US14036635

    申请日:2013-09-25

    Abstract: A technique shares smart television data among subscribing organizations to provide security. The technique involves collecting, by an electronic server apparatus, data elements from multiple smart television devices. The technique further involves performing, by the electronic server apparatus, a set of risk analysis operations to generate risk scores corresponding to the multiple smart television devices. Each risk score (e.g., a numerical value) indicates an amount of risk (e.g., a probability) that a respective smart television device is malicious. The technique further involves providing, by the electronic server apparatus, an ordered list of the multiple smart television devices, the ordered list ranking the multiple television devices based on the risk scores. Information from the ordered list is well suited for use by an anti-fraud service in which subscriber organizations are informed of the information and use the information to identify and stop fraudulent activity in the future.

    Abstract translation: 一种技术在订阅组织之间共享智能电视数据以提供安全性。 该技术涉及由电子服务器装置收集来自多个智能电视装置的数据元素。 该技术还包括由电子服务器设备执行一组风险分析操作,以产生与多个智能电视设备相对应的风险评分。 每个风险分数(例如,数值)表示相应的智能电视设备是恶意的风险量(例如概率)。 该技术还包括通过电子服务器设备提供多个智能电视设备的有序列表,该排序列表基于风险分数对多个电视设备进行排名。 来自有序列表的信息非常适合于反欺诈服务使用,其中向用户组织通知信息,并使用该信息来识别和停止未来的欺诈活动。

    User authentication
    4.
    发明授权

    公开(公告)号:US10142308B1

    公开(公告)日:2018-11-27

    申请号:US14319175

    申请日:2014-06-30

    Abstract: There is disclosed a technique for use in authentication. In one embodiment, the technique comprises receiving behavioral information associated with a user. The technique also comprises performing an analysis based on the behavioral information. The technique further comprises determining whether to authenticate the user based on the analysis.

    Open data collection for threat intelligence posture assessment

    公开(公告)号:US10013694B1

    公开(公告)日:2018-07-03

    申请号:US14144007

    申请日:2013-12-30

    CPC classification number: G06Q20/4016 G06Q50/01

    Abstract: An improved technique involves inputting data in postings from social media or news websites into a risk engine. A posting extraction device continually observes postings aggregated in social media and news websites, such as Twitter, Facebook, CNN, and the like. The posting extraction device parses postings that contain specified keywords such as “credit card,” “account number,” and the like. The posting extraction device also parses these postings for metadata such as user identifiers, times, and locations. The posting extraction device then stores the parsed information in a transaction database that is accessed by an adaptive authentication engine for risk score assignment.

    Risk scoring for internet protocol networks
    8.
    发明授权
    Risk scoring for internet protocol networks 有权
    互联网协议网络的风险评分

    公开(公告)号:US09438626B1

    公开(公告)日:2016-09-06

    申请号:US13920500

    申请日:2013-06-18

    Abstract: Methods, apparatus and articles of manufacture for risk scoring for internet protocol networks are provided herein. A method includes identifying a network to which a first network element belongs, wherein said first network element comprises corresponding risk-related information, determining each of one or more network elements previously identified as belonging to the network, and calculating a risk score assigned to the network, wherein said calculating comprises aggregating (i) the risk-related information corresponding to the first network element and (ii) risk-related information corresponding to each of the one or more network elements previously identified as belonging to the network.

    Abstract translation: 本文提供了互联网协议网络风险评分的方法,装置和制造。 一种方法包括识别第一网络元件所属的网络,其中所述第一网络元件包括对应的风险相关信息,确定先前识别为属于网络的一个或多个网络元素中的每一个,以及计算分配给该网络的风险分数 网络,其中所述计算包括聚合(i)对应于第一网络元件的风险相关信息和(ii)与先前识别为属于网络的一个或多个网络元素中的每一个对应的风险相关信息。

    Visualization of fraud patterns
    9.
    发明授权
    Visualization of fraud patterns 有权
    欺诈模式的可视化

    公开(公告)号:US09330416B1

    公开(公告)日:2016-05-03

    申请号:US14144019

    申请日:2013-12-30

    Abstract: An improved technique involves identifying other transactions for investigation from entries in a database that involve a particular actor involved in a known fraudulent transaction. From a transaction log listing transactions, a server generates a database of transaction entries which identify transactions from the transaction log, each transaction entry (i) describing an activity and (ii) identifying a set of actors involved in that activity. Based on a known fraudulent transaction involving a particular actor, the server finds a set of transaction entries from the database which involve the particular actor. From the found set of transaction entries, the server identifies other transactions for investigation.

    Abstract translation: 一种改进的技术涉及从涉及参与已知欺诈交易的特定行为者的数据库中的条目识别用于调查的其他交易。 从事务日志列出事务,服务器生成事务条目数据库,其识别事务日志中的事务,每个事务条目(i)描述活动,以及(ii)识别该活动中涉及的一组角色。 基于涉及特定行为者的已知欺诈交易,服务器从涉及特定行为者的数据库中查找一组交易条目。 从找到的一组交易条目,服务器识别其他交易进行调查。

    Automatic selection of malicious activity detection rules using crowd-sourcing techniques

    公开(公告)号:US10148673B1

    公开(公告)日:2018-12-04

    申请号:US14870218

    申请日:2015-09-30

    Abstract: Techniques of operating intrusion detection systems provide a recommendation of an intrusion detection rule to an administrator of an intrusion detection system based on the experience of another administrator that has used the rule in another intrusion detection system. For example, suppose that electronic circuitry receives a numerical rating from a first intrusion detection system that indicates whether an intrusion detection rule was effective in identifying malicious activity when used in the first intrusion detection system. Based on the received rating and attributes of the first intrusion detection system, the electronic circuitry generates a predicted numerical rating that indicates whether the intrusion detection rule is likely to be effective in identifying malicious communications when used in a second intrusion detection system. If the predicted numerical rating is sufficiently high, then the electronic circuitry transmits a message to the second intrusion detection system recommending the intrusion detection rule for use in the second intrusion detection system.

Patent Agency Ranking