Systems and methods for detecting online attacks
    1.
    发明授权
    Systems and methods for detecting online attacks 有权
    用于检测在线攻击的系统和方法

    公开(公告)号:US09183387B1

    公开(公告)日:2015-11-10

    申请号:US13911011

    申请日:2013-06-05

    Applicant: GOOGLE INC.

    Abstract: Detecting online attacks is described, including identifying one or more events associated with users on a social graph. For each type of event of the one or more events, generating at least one directed acyclic graph (DAG), where each node on the DAG represents a node on the social graph where an event of the type occurs and each edge on the DAG represents a propagation of the event from a first node of the edge to a second node of the edge.

    Abstract translation: 描述了检测在线攻击,包括在社交图上识别与用户相关联的一个或多个事件。 对于一个或多个事件的每种类型的事件,生成至少一个有向非循环图(DAG),其中DAG上的每个节点表示社会图上的节点,其中类型的事件发生,并且DAG上的每个边缘表示 事件从边缘的第一节点传播到边缘的第二节点。

    Secondary user authentication bypass based on a whitelisting deviation from a user pattern
    2.
    发明授权
    Secondary user authentication bypass based on a whitelisting deviation from a user pattern 有权
    基于与用户模式的白名单偏差的次要用户认证旁路

    公开(公告)号:US09396316B1

    公开(公告)日:2016-07-19

    申请号:US13796368

    申请日:2013-03-12

    Applicant: Google Inc.

    Inventor: Alon Altman

    CPC classification number: G06F21/316 H04L63/08 H04L63/101 H04L63/102

    Abstract: A system and method for bypassing secondary user authentication based at least in part on the detection of a whitelisting deviation from a user pattern are disclosed. In one implementation, the system includes a pattern determination module, a fraudulent login identifier module, a whitelisting deviation detection module and a user authentication generation module. The pattern determination module determines a user pattern. The fraudulent login identifier module identifies a potentially fraudulent login and triggers a secondary authentication challenge. The whitelisting deviation detection module compares user information to the user pattern and determines based on the comparison whether a whitelisting deviation from the user pattern has occurred. The user authentication generation module generates and sends a secondary user authentication challenge responsive to the identification of a potentially fraudulent login by the fraudulent login identification module unless bypassed responsive to the determination that a whitelisting deviation has occurred.

    Abstract translation: 公开了至少部分地基于从用户模式的白名单偏离的检测来绕过次级用户认证的系统和方法。 在一个实现中,系统包括模式确定模块,欺诈登录标识符模块,白名单偏移检测模块和用户认证生成模块。 模式确定模块确定用户模式。 欺诈性登录标识符模块识别潜在的欺诈性登录并触发辅助认证挑战。 白名单偏离检测模块将用户信息与用户模式进行比较,并且基于比较来确定是否发生了与用户模式的白名单偏差。 用户认证生成模块响应于欺骗性登录识别模块识别潜在的欺诈性登录而生成并发送次要用户认证挑战,除非响应于已经发生白名单偏离的确定而被旁路。

    Secondary user authentication bypass based on a whitelisting deviation from a user pattern

    公开(公告)号:US09760701B1

    公开(公告)日:2017-09-12

    申请号:US15195754

    申请日:2016-06-28

    Applicant: Google Inc.

    Inventor: Alon Altman

    CPC classification number: G06F21/316 H04L63/08 H04L63/101 H04L63/102

    Abstract: A system and method for bypassing secondary user authentication based at least in part on the detection of a whitelisting deviation from a user pattern are disclosed. In one implementation, the system includes a pattern determination module, a fraudulent login identifier module, a whitelisting deviation detection module and a user authentication generation module. The pattern determination module determines a user pattern. The fraudulent login identifier module identifies a potentially fraudulent login and triggers a secondary authentication challenge. The whitelisting deviation detection module compares user information to the user pattern and determines based on the comparison whether a whitelisting deviation from the user pattern has occurred. The user authentication generation module generates and sends a secondary user authentication challenge responsive to the identification of a potentially fraudulent login by the fraudulent login identification module unless bypassed responsive to the determination that a whitelisting deviation has occurred.

    Authentication based on peer attestation
    4.
    发明授权
    Authentication based on peer attestation 有权
    基于对等认证的认证

    公开(公告)号:US09203826B1

    公开(公告)日:2015-12-01

    申请号:US14191353

    申请日:2014-02-26

    Applicant: Google Inc.

    CPC classification number: H04L63/08

    Abstract: A system and method for recovering an account based at least in part on peer attestation are disclosed. In some implementations, the system includes a trusted contact identifier module, a user interaction module, a trusted contact interaction module and a message generation module. The trusted contact identifier module analyzes a contact database of a user and identifies a selection of trusted contacts that satisfied a pre-defined criteria. The user interaction module presents the selection of trusted contacts and receives from the user an input including at least one selected trusted contact and a personalized message composed by the user. The trusted contact interaction module transmits the personalized message and a hyperlink for verifying the identity of the user to the at least one selected trusted contact and receives a response therefrom. The message generation module sends a message to the user in response to receiving the response.

    Abstract translation: 公开了至少部分地基于对等体认证来恢复帐户的系统和方法。 在一些实现中,系统包括可信联系人标识符模块,用户交互模块,可信联系交互模块和消息生成模块。 可信联系人标识符模块分析用户的联系人数据库,并识别满足预定义标准的信任联系人的选择。 用户交互模块呈现可信联系人的选择,并从用户接收包括由用户组成的至少一个选定的可信联系人和个性化消息的输入。 可信联系交互模块将个性化消息和用于验证用户身份的超链接发送到至少一个所选择的可信联系人并从其接收响应。 响应于接收到响应,消息生成模块向用户发送消息。

Patent Agency Ranking