GEOGRAPHICAL INTRUSION RESPONSE PRIORITIZATION MAPPING SYSTEM
    1.
    发明申请
    GEOGRAPHICAL INTRUSION RESPONSE PRIORITIZATION MAPPING SYSTEM 审中-公开
    地理侵权责任重估映射系统

    公开(公告)号:US20120159626A1

    公开(公告)日:2012-06-21

    申请号:US13342146

    申请日:2012-01-02

    IPC分类号: G06F21/00 G06F11/00

    摘要: Systems and methods for geographically mapping an intrusion into a network having one or more network points include receiving intrusion information identifying a intrusion into a point of the network, correlating the intrusion information with location information for the identified network point, and network identification information for the identified network point, and generating a map displaying a geographical location of the intrusion.

    摘要翻译: 将侵入地理映射到具有一个或多个网络点的网络的系统和方法包括:接收入侵信息,识别侵入网络点的入侵信息,将入侵信息与所识别的网络点的位置信息相关联,以及网络识别信息 识别网络点,并生成显示入侵地理位置的地图。

    Method and systems for locating source of computer-originated attack based on GPS equipped computing device
    2.
    发明申请
    Method and systems for locating source of computer-originated attack based on GPS equipped computing device 审中-公开
    基于GPS配备的计算设备定位计算机发起攻击源的方法和系统

    公开(公告)号:US20080004805A1

    公开(公告)日:2008-01-03

    申请号:US11477852

    申请日:2006-06-30

    IPC分类号: G01C21/32

    摘要: Systems and methods for locating sources of, or vulnerabilities susceptible to, computer-originated attacks based on GPS devices. In one aspect, methods and systems include receiving threat data or vulnerability data, retrieving GPS data, correlating the threat data or the vulnerability data with the GPS data to create map data, and generating a map, based on the map data, displaying a geographical location of the source of, or the vulnerability susceptible to, a computer-originated attack based on a GPS device.

    摘要翻译: 用于定位基于GPS设备的计算机发起的攻击易受影响的源或系统的方法。 一方面,方法和系统包括接收威胁数据或漏洞数据,检索GPS数据,将威胁数据或漏洞数据与GPS数据相关联以创建地图数据,以及基于地图数据生成地图,显示地理 基于GPS设备的计算机发起的攻击的来源或脆弱性的位置。

    Geographical vulnerability mitgation response mapping system
    3.
    发明授权
    Geographical vulnerability mitgation response mapping system 有权
    地理脆弱性缓解响应映射系统

    公开(公告)号:US08990696B2

    公开(公告)日:2015-03-24

    申请号:US12975595

    申请日:2010-12-22

    摘要: Systems and methods for geographically mapping a vulnerability of a network having one or more network points include receiving vulnerability information identifying a vulnerability of a point of the network, correlating the vulnerability information with location information for the identified network point, and network identification information for the identified network point, and generating a map displaying a geographical location of the vulnerability.

    摘要翻译: 用于地理上映射具有一个或多个网络点的网络的漏洞的系统和方法包括接收识别网络点的脆弱性的漏洞信息,将所述漏洞信息与所识别的网络点的位置信息相关联,以及用于所述网络标识信息 识别网络点,并生成显示该漏洞的地理位置的地图。

    Geographical intrusion mapping system using telecommunication billing and inventory systems
    4.
    发明授权
    Geographical intrusion mapping system using telecommunication billing and inventory systems 有权
    使用电信计费和库存系统的地理入侵测绘系统

    公开(公告)号:US08631493B2

    公开(公告)日:2014-01-14

    申请号:US11482934

    申请日:2006-07-10

    IPC分类号: G06F11/00

    摘要: Systems and methods for geographically mapping a threat into a network having one or more network points include receiving threat information identifying a threat to a point of the network, correlating the threat information with location information for the identified network point, and network identification information for the identified network point, and generating a map displaying a geographical location of the threat.

    摘要翻译: 用于将威胁地理映射到具有一个或多个网络点的网络的系统和方法包括接收识别对网络点的威胁的威胁信息,将威胁信息与所识别的网络点的位置信息相关联,以及网络识别信息 识别网络点,并生成显示威胁的地理位置的地图。

    Geographical intrusion response prioritization mapping system
    5.
    发明授权
    Geographical intrusion response prioritization mapping system 有权
    地理入侵响应优先级映射系统

    公开(公告)号:US08091130B1

    公开(公告)日:2012-01-03

    申请号:US10916873

    申请日:2004-08-12

    IPC分类号: G06F11/00

    摘要: Systems and methods for geographically mapping an intrusion into a network having one or more network points include receiving intrusion information identifying a intrusion into a point of the network, correlating the intrusion information with location information for the identified network point, and network identification information for the identified network point, and generating a map displaying a geographical location of the intrusion.

    摘要翻译: 将侵入地理映射到具有一个或多个网络点的网络的系统和方法包括:接收入侵信息,识别侵入网络点的入侵信息,将入侵信息与所识别的网络点的位置信息相关联,以及网络识别信息 识别网络点,并生成显示入侵地理位置的地图。

    Geographical vulnerability mitigation response mapping system
    6.
    发明授权
    Geographical vulnerability mitigation response mapping system 有权
    地理脆弱性缓解响应映射系统

    公开(公告)号:US08082506B1

    公开(公告)日:2011-12-20

    申请号:US10916872

    申请日:2004-08-12

    摘要: Systems and methods for geographically mapping a vulnerability of a network having one or more network points include receiving vulnerability information identifying a vulnerability of a point of the network, correlating the vulnerability information with location information for the identified network point, and network identification information for the identified network point, and generating a map displaying a geographical location of the vulnerability.

    摘要翻译: 用于地理上映射具有一个或多个网络点的网络的漏洞的系统和方法包括接收识别网络点的脆弱性的漏洞信息,将所述漏洞信息与所识别的网络点的位置信息相关联,以及用于所述网络标识信息 识别网络点,并生成显示该漏洞的地理位置的地图。

    Multidimensional transaction fraud detection system and method
    7.
    发明授权
    Multidimensional transaction fraud detection system and method 有权
    多维交易欺诈检测系统及方法

    公开(公告)号:US07815106B1

    公开(公告)日:2010-10-19

    申请号:US11319608

    申请日:2005-12-29

    IPC分类号: G06K5/00

    摘要: A system and method for detecting transaction anomalies and information reflecting potential fraudulent activities is disclosed. Data is collected from transactions carried out in a number of business applications such as computer systems, telecommunication systems and security systems. This transaction data is normalized to generate transaction data having consistent format for analysis and/or comparison. User profiles are generated by sorting the normalized data by user and identifying particular user characteristics from the sorted data. Each user profile therefore reflects the behavior of the user as it relates to the business applications. The user profiles and/or predetermined rules are then used to detect anomalies in incoming transactions.

    摘要翻译: 公开了一种用于检测交易异常和反映潜在欺诈活动的信息的系统和方法。 从诸如计算机系统,电信系统和安全系统的许多业务应用中进行的交易收集数据。 该交易数据被归一化以产生具有用于分析和/或比较的一致格式的交易数据。 通过用户排序归一化数据并从排序数据识别特定用户特征来生成用户简档。 因此,每个用户配置文件反映了与业务应用相关的用户的行为。 然后,用户简档和/或预定规则用于检测传入事务中的异常。