Scalable framework for monitoring machine-to-machine (M2M) devices

    公开(公告)号:US09806902B2

    公开(公告)日:2017-10-31

    申请号:US14220300

    申请日:2014-03-20

    CPC classification number: H04L12/2825

    Abstract: A device receives information associated with machine-to-machine (M2M) devices connected to a host server device via a network. The information associated with the M2M devices include one or more of device information associated with components of the M2M devices, application information generated by the M2M devices, or network information associated with interactions of the M2M devices, with the network, when the M2M devices provide the application information to the host server device via the network. The device performs an analysis of the information associated with the M2M devices via one or more analytics techniques, and generates analysis information based on the analysis of the information associated with the M2M devices. The device provides the analysis information for display by the host server device.

    Network threat detection and management system based on user behavior information

    公开(公告)号:US10931698B2

    公开(公告)日:2021-02-23

    申请号:US16531218

    申请日:2019-08-05

    Abstract: A device may receive behavior information that identifies a first user, of a first set of users, in association with a behavior. The behavior may relate to one or more requests, from a client device being used by the first user, to access a network resource. The device may determine, based on a model, whether the behavior is normal. The model may include a normal behavior pattern based on behavior information associated with the first set of users. The device may provide an instruction to allow the client device to proceed with the behavior or provide an instruction to disallow the client device from proceeding with the behavior based on determining whether the behavior is normal. The device may update the model based on the behavior information that identifies the first user and that identifies the behavior.

    NETWORK THREAT DETECTION AND MANAGEMENT SYSTEM BASED ON USER BEHAVIOR INFORMATION

    公开(公告)号:US20190356689A1

    公开(公告)日:2019-11-21

    申请号:US16531218

    申请日:2019-08-05

    Abstract: A device may receive behavior information that identifies a first user, of a first set of users, in association with a behavior. The behavior may relate to one or more requests, from a client device being used by the first user, to access a network resource. The device may determine, based on a model, whether the behavior is normal. The model may include a normal behavior pattern based on behavior information associated with the first set of users. The device may provide an instruction to allow the client device to proceed with the behavior or provide an instruction to disallow the client device from proceeding with the behavior based on determining whether the behavior is normal. The device may update the model based on the behavior information that identifies the first user and that identifies the behavior.

    Network threat detection and management system based on user behavior information

    公开(公告)号:US10412106B2

    公开(公告)日:2019-09-10

    申请号:US14635158

    申请日:2015-03-02

    Abstract: A device may receive behavior information that identifies a first user, of a first set of users, in association with a behavior. The behavior may relate to one or more requests, from a client device being used by the first user, to access a network resource. The device may determine, based on a model, whether the behavior is normal. The model may include a normal behavior pattern based on behavior information associated with the first set of users. The device may provide an instruction to allow the client device to proceed with the behavior or provide an instruction to disallow the client device from proceeding with the behavior based on determining whether the behavior is normal. The device may update the model based on the behavior information that identifies the first user and that identifies the behavior.

    Location fraud detection
    5.
    发明授权

    公开(公告)号:US09635504B2

    公开(公告)日:2017-04-25

    申请号:US14690084

    申请日:2015-04-17

    CPC classification number: H04W4/023 H04L63/107 H04W4/029 H04W4/70 H04W12/12

    Abstract: A method includes receiving, at a fraud management device, at least one BSID associated with communication data from at least one MTC device. The fraud management device determines a location associated with the at least one BSID. Relevant data elements are selected from the communication data. The fraud management device applies known domain rules to the communication data and identifies a connectivity pattern for the at least one MTC device based on the communication data. An anomaly detection model is applied to particular communication data associated with a particular MTC device based on the connectivity pattern, and at least one anomaly from the identified connection pattern is detected based on the anomaly detection model.

    NETWORK THREAT DETECTION AND MANAGEMENT SYSTEM BASED ON USER BEHAVIOR INFORMATION
    6.
    发明申请
    NETWORK THREAT DETECTION AND MANAGEMENT SYSTEM BASED ON USER BEHAVIOR INFORMATION 审中-公开
    基于用户行为信息的网络威胁检测与管理系统

    公开(公告)号:US20160261621A1

    公开(公告)日:2016-09-08

    申请号:US14635158

    申请日:2015-03-02

    CPC classification number: H04L63/1425 H04L63/1466 H04L67/22 H04L69/22

    Abstract: A device may receive behavior information that identifies a first user, of a first set of users, in association with a behavior. The behavior may relate to one or more requests, from a client device being used by the first user, to access a network resource. The device may determine, based on a model, whether the behavior is normal. The model may include a normal behavior pattern based on behavior information associated with the first set of users. The device may provide an instruction to allow the client device to proceed with the behavior or provide an instruction to disallow the client device from proceeding with the behavior based on determining whether the behavior is normal. The device may update the model based on the behavior information that identifies the first user and that identifies the behavior.

    Abstract translation: 设备可以接收与行为相关联地标识第一组用户的第一用户的行为信息。 该行为可以涉及来自第一用户正在使用的客户机设备访问网络资源的一个或多个请求。 设备可以基于模型来确定行为是否正常。 该模型可以包括基于与第一组用户相关联的行为信息的正常行为模式。 该设备可以提供允许客户端设备继续执行行为的指令,或者提供一种指令,以便根据确定该行为是否正常来禁止客户端设备进行该行为。 设备可以基于识别第一用户的行为信息来更新模型,并识别行为。

    LOCATION FRAUD DETECTION
    7.
    发明申请
    LOCATION FRAUD DETECTION 有权
    位置欺诈检测

    公开(公告)号:US20160309296A1

    公开(公告)日:2016-10-20

    申请号:US14690084

    申请日:2015-04-17

    CPC classification number: H04W4/023 H04L63/107 H04W4/029 H04W4/70 H04W12/12

    Abstract: A method includes receiving, at a fraud management device, at least one BSID associated with communication data from at least one MTC device. The fraud management device determines a location associated with the at least one BSID. Relevant data elements are selected from the communication data. The fraud management device applies known domain rules to the communication data and identifies a connectivity pattern for the at least one MTC device based on the communication data. An anomaly detection model is applied to particular communication data associated with a particular MTC device based on the connectivity pattern, and at least one anomaly from the identified connection pattern is detected based on the anomaly detection model.

    Abstract translation: 一种方法包括在欺诈管理装置处接收与来自至少一个MTC设备的通信数据相关联的至少一个BSID。 欺诈管理装置确定与至少一个BSID相关联的位置。 从通信数据中选择相关的数据元素。 欺诈管理装置将已知域规则应用于通信数据,并且基于通信数据识别至少一个MTC设备的连接模式。 基于连通性模式将异常检测模型应用于与特定MTC设备相关联的特定通信数据,并且基于异常检测模型来检测来自所识别的连接模式的至少一个异常。

Patent Agency Ranking