QUESTIONNAIRE GENERATION
    2.
    发明申请
    QUESTIONNAIRE GENERATION 有权
    问题生成

    公开(公告)号:US20110106731A1

    公开(公告)日:2011-05-05

    申请号:US12608878

    申请日:2009-10-29

    IPC分类号: G06N5/02

    CPC分类号: G06N5/04

    摘要: A questionnaire generation process presents a first subset from a set of questions of the questionnaire and receives first answers from a user. The first answers are used to determine whether the first answers are sufficient to give definite values to conditions of first rules, wherein the first rules have conditions for providing output. When the first answers are not sufficient, the conditions of the first rules can be used to identify a second subset of the questions, wherein the second subset of questions has second answers such that a combination of the first and second answers is sufficient to give definite values to the respective conditions of the first rules, and the second subset of questions can be presented to the user.

    摘要翻译: 问卷生成过程从问卷的一组问题中呈现第一子集,并从用户接收第一答案。 第一个答案用于确定第一个答案是否足以给出第一个规则的条件的确定值,其中第一个规则具有提供输出的条件。 当第一答案不足时,第一规则的条件可用于识别问题的第二子集,其中问题的第二子集具有第二答案,使得第一和第二答案的组合足以给出明确的 可以向用户呈现第一规则的相应条件的值,以及问题的第二子集。

    Questionnaire generation
    3.
    发明授权
    Questionnaire generation 有权
    问卷生成

    公开(公告)号:US08655827B2

    公开(公告)日:2014-02-18

    申请号:US12608878

    申请日:2009-10-29

    IPC分类号: G06F17/00 G06N5/02

    CPC分类号: G06N5/04

    摘要: A questionnaire generation process presents a first subset from a set of questions of the questionnaire and receives first answers from a user. The first answers are used to determine whether the first answers are sufficient to give definite values to conditions of first rules, wherein the first rules have conditions for providing output. When the first answers are not sufficient, the conditions of the first rules can be used to identify a second subset of the questions, wherein the second subset of questions has second answers such that a combination of the first and second answers is sufficient to give definite values to the respective conditions of the first rules, and the second subset of questions can be presented to the user.

    摘要翻译: 问卷生成过程从问卷的一组问题中呈现第一子集,并从用户接收第一答案。 第一个答案用于确定第一个答案是否足以给出第一个规则的条件的确定值,其中第一个规则具有提供输出的条件。 当第一答案不足时,第一规则的条件可用于识别问题的第二子集,其中问题的第二子集具有第二答案,使得第一和第二答案的组合足以给出明确的 可以向用户呈现第一规则的相应条件的值,以及问题的第二子集。

    ESTABLISHING A SECURE CHANNEL WITH A HUMAN USER
    4.
    发明申请
    ESTABLISHING A SECURE CHANNEL WITH A HUMAN USER 审中-公开
    与人类用户建立安全通道

    公开(公告)号:US20120204246A1

    公开(公告)日:2012-08-09

    申请号:US13451369

    申请日:2012-04-19

    IPC分类号: G06F21/00

    摘要: A method of establishing a secure channel between a human user and a computer application is described. A secret unique identifier (“PIN”) is shared between a user and an application. When the user makes a request that involves utilizing the PIN for authentication purposes, the application renders a randomly selected identifier. The randomly selected identifier is in a format that is recognizable to a human but is not readily recognizable by an automated agent. The randomly selected identifier is then presented to the human user. The user identifies the relationship between the randomly selected identifier and the PIN. If the user's input reflects the fact that the user knows the PIN, then the user is authenticated.

    摘要翻译: 描述了在人类用户和计算机应用之间建立安全信道的方法。 秘密唯一标识符(“PIN”)在用户和应用程序之间共享。 当用户进行涉及利用PIN进行认证的请求时,应用程序呈现随机选择的标识符。 随机选择的标识符是人可识别的格式,但是不能被自动代理人容易地识别。 然后将随机选择的标识符呈现给人类用户。 用户识别随机选择的标识符和PIN之间的关系。 如果用户的输入反映了用户知道PIN的事实,则用户被认证。

    Secure Authentication Systems and Methods
    5.
    发明申请
    Secure Authentication Systems and Methods 有权
    安全认证系统和方法

    公开(公告)号:US20110214169A1

    公开(公告)日:2011-09-01

    申请号:US13081711

    申请日:2011-04-07

    IPC分类号: G06F21/00

    摘要: Systems and methods are provided for authentication by combining a Reverse Turing Test (RTT) with password-based user authentication protocols to provide improved resistance to brute force attacks. In accordance with one embodiment of the invention, a method is provided for user authentication, the method including receiving a username/password pair associated with a user; requesting one or more responses to a first Reverse Turing Test (RTT); and granting access to the user if a valid response to the first RTT is received and the username/password pair is valid.

    摘要翻译: 通过组合反向图灵测试(RTT)和基于密码的用户认证协议来提供系统和方法,以提供改进的暴力攻击抵抗能力。 根据本发明的一个实施例,提供了一种用于用户认证的方法,所述方法包括接收与用户相关联的用户名/密码对; 请求对第一次反向图灵测试(RTT)的一个或多个响应; 并且如果接收到对第一RTT的有效响应并且用户名/密码对有效,则授予对用户的访问。

    Pattern Consolidation To Identify Malicious Activity
    7.
    发明申请
    Pattern Consolidation To Identify Malicious Activity 审中-公开
    识别恶意活动的模式合并

    公开(公告)号:US20150215329A1

    公开(公告)日:2015-07-30

    申请号:US14418910

    申请日:2012-07-31

    IPC分类号: H04L29/06 H04L12/24

    摘要: A process includes analyzing events reported by computing devices on a network to recognize patterns of events that occurred on the network and sharing with a community, information concerning the patterns detected. The process may also use consolidated information on the patterns to select one or more of the patterns for analysis that identifies whether the selected patterns result from malicious activity. The consolidated information includes information on the patterns detected on the network and information concerning corresponding patterns of events that occurred elsewhere.

    摘要翻译: 一个过程包括分析由网络上的计算设备报告的事件,以识别网络上发生的事件模式并与社区共享,关于所检测到的模式的信息。 该过程还可以使用关于模式的合并信息来选择用于分析的一个或多个模式,其识别所选择的模式是否由恶意活动导致。 综合信息包括关于在网络上检测到的模式的信息,以及关于其他地方发生的事件的相应模式的信息。

    SECURE AUTHENTICATION SYSTEMS AND METHODS
    8.
    发明申请
    SECURE AUTHENTICATION SYSTEMS AND METHODS 有权
    安全认证系统和方法

    公开(公告)号:US20120266226A1

    公开(公告)日:2012-10-18

    申请号:US13532223

    申请日:2012-06-25

    IPC分类号: G06F21/00

    摘要: Systems and methods are provided for authentication by combining a Reverse Turing Test (RTT) with password-based user authentication protocols to provide improved resistance to brute force attacks. In accordance with one embodiment of the invention, a method is provided for user authentication, the method including receiving a username/password pair associated with a user; requesting one or more responses to a first Reverse Turing Test (RTT); and granting access to the user if a valid response to the first RTT is received and the username/password pair is valid.

    摘要翻译: 通过组合反向图灵测试(RTT)和基于密码的用户认证协议来提供系统和方法,以提供改进的暴力攻击抵抗能力。 根据本发明的一个实施例,提供了一种用于用户认证的方法,所述方法包括接收与用户相关联的用户名/密码对; 请求对第一次反向图灵测试(RTT)的一个或多个响应; 并且如果接收到对第一RTT的有效响应并且用户名/密码对有效,则授予对用户的访问。

    Secure authentication systems and methods
    9.
    发明授权
    Secure authentication systems and methods 有权
    安全认证系统和方法

    公开(公告)号:US07941836B2

    公开(公告)日:2011-05-10

    申请号:US11781196

    申请日:2007-07-20

    IPC分类号: H04L29/06

    摘要: Systems and methods are provided for authentication by combining a Reverse Turing Test (RTT) with password-based user authentication protocols to provide improved resistance to brute force attacks. In accordance with one embodiment of the invention, a method is provided for user authentication, the method including receiving a username/password pair associated with a user; requesting one or more responses to a first Reverse Turing Test (RTT); and granting access to the user if a valid response to the first RTT is received and the username/password pair is valid.

    摘要翻译: 通过组合反向图灵测试(RTT)和基于密码的用户认证协议来提供系统和方法,以提供改进的暴力攻击抵抗能力。 根据本发明的一个实施例,提供了一种用于用户认证的方法,所述方法包括接收与用户相关联的用户名/密码对; 请求对第一次反向图灵测试(RTT)的一个或多个响应; 并且如果接收到对第一RTT的有效响应并且用户名/密码对有效,则授予对用户的访问。

    SYSTEMS AND METHODS FOR CONDUCTING TRANSACTIONS AND COMMUNICATIONS USING A TRUSTED THIRD PARTY
    10.
    发明申请
    SYSTEMS AND METHODS FOR CONDUCTING TRANSACTIONS AND COMMUNICATIONS USING A TRUSTED THIRD PARTY 有权
    使用受托第三方进行交易和通信的系统和方法

    公开(公告)号:US20130013493A1

    公开(公告)日:2013-01-10

    申请号:US13478042

    申请日:2012-05-22

    IPC分类号: H04L9/00 G06Q20/22

    摘要: Systems and methods are provided for performing transactions and managing communications using a trusted third party. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a first hash of at least a portion of the encrypted data content, and sends the first hash to a third party configured to compare at least a portion of the first hash to at least a portion of a second hash. The receiver receives a file decryption key from the third party, and decrypts at least the portion of the received encrypted data content with the decryption key. In some cases, multiple hashes of the encrypted data content may be computed, each using a different portion of the encrypted data content.

    摘要翻译: 提供了系统和方法,用于执行交易和使用可信第三方管理通信。 在一个实施例中,发送者将文件的加密版本(诸如数字编码的音轨,电影,文档等)传送给希望接收它的人。 接收机计算加密数据内容的至少一部分的第一散列,并将第一散列发送到配置为将第一散列的至少一部分与至少一部分第二散列进行比较的第三方。 接收器从第三方接收文件解密密钥,并用解密密钥解密所接收的加密数据内容的至少一部分。 在一些情况下,可以计算加密数据内容的多个散列,每个哈希值使用加密数据内容的不同部分。