Authenticating users in the presence of small transaction volumes

    公开(公告)号:US11042880B1

    公开(公告)日:2021-06-22

    申请号:US14573213

    申请日:2014-12-17

    申请人: EMC Corporation

    IPC分类号: G06Q20/40

    摘要: A method involves performing a mathematical estimation operation identifying a risk score threshold. The operation identifies the risk score threshold as a point on a curve rather than a value of a particular risk score. Such a curve approximates the distribution of risk score values output over a time interval and represents a function embodied by a plot of risk score percentile vs. risk score value. The risk engine, rather than selecting a particular risk score, selects a curve from a family of curves that is known to accurately represent such risk score distributions. For example, the risk engine may choose the curve that provides the best fit to the previous week's risk scores over the family of curves. The risk engine identifies the risk score threshold by finding a risk score value such that the function evaluated at that risk score value produces a specified risk score percentile.

    Smart television data sharing to provide security
    2.
    发明授权
    Smart television data sharing to provide security 有权
    智能电视数据共享提供安全保障

    公开(公告)号:US09098699B1

    公开(公告)日:2015-08-04

    申请号:US14036635

    申请日:2013-09-25

    申请人: EMC Corporation

    摘要: A technique shares smart television data among subscribing organizations to provide security. The technique involves collecting, by an electronic server apparatus, data elements from multiple smart television devices. The technique further involves performing, by the electronic server apparatus, a set of risk analysis operations to generate risk scores corresponding to the multiple smart television devices. Each risk score (e.g., a numerical value) indicates an amount of risk (e.g., a probability) that a respective smart television device is malicious. The technique further involves providing, by the electronic server apparatus, an ordered list of the multiple smart television devices, the ordered list ranking the multiple television devices based on the risk scores. Information from the ordered list is well suited for use by an anti-fraud service in which subscriber organizations are informed of the information and use the information to identify and stop fraudulent activity in the future.

    摘要翻译: 一种技术在订阅组织之间共享智能电视数据以提供安全性。 该技术涉及由电子服务器装置收集来自多个智能电视装置的数据元素。 该技术还包括由电子服务器设备执行一组风险分析操作,以产生与多个智能电视设备相对应的风险评分。 每个风险分数(例如,数值)表示相应的智能电视设备是恶意的风险量(例如概率)。 该技术还包括通过电子服务器设备提供多个智能电视设备的有序列表,该排序列表基于风险分数对多个电视设备进行排名。 来自有序列表的信息非常适合于反欺诈服务使用,其中向用户组织通知信息,并使用该信息来识别和停止未来的欺诈活动。

    User authentication
    4.
    发明授权

    公开(公告)号:US10142308B1

    公开(公告)日:2018-11-27

    申请号:US14319175

    申请日:2014-06-30

    申请人: EMC Corporation

    IPC分类号: H04L29/06

    摘要: There is disclosed a technique for use in authentication. In one embodiment, the technique comprises receiving behavioral information associated with a user. The technique also comprises performing an analysis based on the behavioral information. The technique further comprises determining whether to authenticate the user based on the analysis.

    Maintaining a risk model using feedback directed to other risk models

    公开(公告)号:US10902428B1

    公开(公告)日:2021-01-26

    申请号:US14970903

    申请日:2015-12-16

    申请人: EMC Corporation

    IPC分类号: G06Q20/40 G06Q20/10 G06Q20/20

    摘要: Techniques of risk-based authentication involve adjusting a risk engine used by a recipient entity based on feedback acquired from multiple entities. Along these lines, both a recipient risk engine and one or more donor risk engines perform risk-based authentication for which respective feedback is generated. The feedback indicates whether certain transaction requests predicted to be fraudulent are confirmed to be fraudulent. The recipient risk engine is then adjusted based on the feedback created for itself, the feedback created for any of the donor risk engines, or some combination thereof.

    Open data collection for threat intelligence posture assessment

    公开(公告)号:US10013694B1

    公开(公告)日:2018-07-03

    申请号:US14144007

    申请日:2013-12-30

    申请人: EMC Corporation

    IPC分类号: G06Q20/40 G06Q50/00

    CPC分类号: G06Q20/4016 G06Q50/01

    摘要: An improved technique involves inputting data in postings from social media or news websites into a risk engine. A posting extraction device continually observes postings aggregated in social media and news websites, such as Twitter, Facebook, CNN, and the like. The posting extraction device parses postings that contain specified keywords such as “credit card,” “account number,” and the like. The posting extraction device also parses these postings for metadata such as user identifiers, times, and locations. The posting extraction device then stores the parsed information in a transaction database that is accessed by an adaptive authentication engine for risk score assignment.

    Risk scoring for internet protocol networks
    8.
    发明授权
    Risk scoring for internet protocol networks 有权
    互联网协议网络的风险评分

    公开(公告)号:US09438626B1

    公开(公告)日:2016-09-06

    申请号:US13920500

    申请日:2013-06-18

    申请人: EMC Corporation

    IPC分类号: H04L29/06 G06F21/55

    摘要: Methods, apparatus and articles of manufacture for risk scoring for internet protocol networks are provided herein. A method includes identifying a network to which a first network element belongs, wherein said first network element comprises corresponding risk-related information, determining each of one or more network elements previously identified as belonging to the network, and calculating a risk score assigned to the network, wherein said calculating comprises aggregating (i) the risk-related information corresponding to the first network element and (ii) risk-related information corresponding to each of the one or more network elements previously identified as belonging to the network.

    摘要翻译: 本文提供了互联网协议网络风险评分的方法,装置和制造。 一种方法包括识别第一网络元件所属的网络,其中所述第一网络元件包括对应的风险相关信息,确定先前识别为属于网络的一个或多个网络元素中的每一个,以及计算分配给该网络的风险分数 网络,其中所述计算包括聚合(i)对应于第一网络元件的风险相关信息和(ii)与先前识别为属于网络的一个或多个网络元素中的每一个对应的风险相关信息。

    Automatic selection of malicious activity detection rules using crowd-sourcing techniques

    公开(公告)号:US10148673B1

    公开(公告)日:2018-12-04

    申请号:US14870218

    申请日:2015-09-30

    申请人: EMC Corporation

    IPC分类号: H04L29/06

    摘要: Techniques of operating intrusion detection systems provide a recommendation of an intrusion detection rule to an administrator of an intrusion detection system based on the experience of another administrator that has used the rule in another intrusion detection system. For example, suppose that electronic circuitry receives a numerical rating from a first intrusion detection system that indicates whether an intrusion detection rule was effective in identifying malicious activity when used in the first intrusion detection system. Based on the received rating and attributes of the first intrusion detection system, the electronic circuitry generates a predicted numerical rating that indicates whether the intrusion detection rule is likely to be effective in identifying malicious communications when used in a second intrusion detection system. If the predicted numerical rating is sufficiently high, then the electronic circuitry transmits a message to the second intrusion detection system recommending the intrusion detection rule for use in the second intrusion detection system.