Rapid transaction processing
    1.
    发明授权
    Rapid transaction processing 有权
    快速交易处理

    公开(公告)号:US08478688B1

    公开(公告)日:2013-07-02

    申请号:US13329377

    申请日:2011-12-19

    IPC分类号: G06Q40/00

    CPC分类号: G06Q40/02

    摘要: An improved technique identifies risky transactions from a set of transactions and updates risk scores only for those transactions identified as risky. Along these lines, a transaction sorting engine sorts the set of transactions according to risk score. The transaction sorting engine identifies as risky those transactions having risk scores above a specified percentile; for instance, the transactions having risk scores above the 90th percentile would be identified as risky. Some time later, a risk score engine adjusts, based on new historical transaction data, Bayesian weights which it uses to compute risk scores. The transaction sorting engine sends to the risk score engine only those transactions it identified as risky. The risk score engine computes new risk scores for the risky transactions and makes the new risk scores available to the transaction sorting engine so that it can sort all of current transactions (e.g., received within the past week).

    摘要翻译: 一种改进的技术可以识别一组交易中的风险交易,并仅对那些被认定为有风险的交易更新风险分数。 按照这些方面,交易排序引擎根据风险分数对交易集进行排序。 交易排序引擎将风险评分高于指定百分位数的交易识别为风险; 例如,具有高于第90百分位数的风险分数的交易将被确定为具有风险。 一段时间后,风险分数引擎根据新的历史交易数据调整贝叶斯权重,用于计算风险分数。 交易排序引擎仅向风险评分引擎发送那些被认定为具有风险的交易。 风险分数引擎计算风险交易的新风险分数,并使新的风险分数可用于交易排序引擎,以便它可以对所有当前交易进行排序(例如,在过去一周内收到)。

    Methods and apparatus for risk evaluation of compromised credentials
    2.
    发明授权
    Methods and apparatus for risk evaluation of compromised credentials 有权
    损害凭证风险评估的方法和手段

    公开(公告)号:US09092782B1

    公开(公告)日:2015-07-28

    申请号:US13537506

    申请日:2012-06-29

    IPC分类号: G06F21/00 G06Q20/40

    摘要: Techniques are provided for evaluating compromised credential information. A method for evaluating compromised credentials comprises the steps of: collecting data regarding previously compromised credentials that were used to commit an unauthorized activity; applying one or more statistical learning methods to the collected data to identify one or more patterns; and evaluating a risk of credentials that have been compromised by one or more attackers using the identified patterns. According to a further aspect of the invention, a risk score is generated for one or more users and devices. The risk scores are optionally ordered based on an order of risk. The data can be collected, for example, from one or more of anti-fraud servers and information sources.

    摘要翻译: 提供技术来评估受损的凭证信息。 用于评估受损凭据的方法包括以下步骤:收集关于用于提交未授权活动的先前被破坏的凭证的数据; 将一个或多个统计学习方法应用于所收集的数据以识别一个或多个模式; 并评估已被一个或多个攻击者使用识别的模式损害的凭据风险。 根据本发明的另一方面,为一个或多个用户和设备生成风险评分。 风险分数可根据风险顺序进行排序。 可以例如从一个或多个反欺诈服务器和信息源收集数据。

    Using baseline profiles in adaptive authentication
    3.
    发明授权
    Using baseline profiles in adaptive authentication 有权
    在自适应认证中使用基线配置文件

    公开(公告)号:US08621586B1

    公开(公告)日:2013-12-31

    申请号:US13246937

    申请日:2011-09-28

    IPC分类号: G06F21/20

    摘要: An improved technique of processing an authentication request from an authentication requestor involves an adaptive authentication device comparing a behavioral history of fact values associated with a user over a current time window with a user's baseline profile that includes a behavioral history of the fact values. The adaptive authentication device accesses such a behavioral history over several previous time windows from a database whose entries include a user identifier, a time interval and user data which represents fact value behavioral history over the time interval. When the device receives an authentication request from an authentication requestor, the adaptive authentication device matches a username of the request with a user identifier of an entry of the database whose time period is the current time period. The adaptive authentication device then updates fact values representing the user's current behavioral history and compares the current behavioral history to the user's baseline profile.

    摘要翻译: 一种从认证请求者处理认证请求的改进技术涉及将当前时间窗口中与用户相关联的事实值的行为历史与包括事实值的行为历史的用户基线轮廓相比较的自适应认证装置。 自适应认证设备从数据库访问几个以前时间窗口的行为历史,其数据库的条目包括用户标识符,时间间隔和表示时间间隔内的事实值行为历史的用户数据。 当设备从认证请求者接收到认证请求时,自适应认证设备将请求的用户名与数据库的时间段为当前时间段的条目的用户标识匹配。 然后,自适应认证设备更新表示用户当前行为历史的事实值,并将当前行为历史与用户的基线简档进行比较。

    Method for routing in loaded telecommunication networks
    4.
    发明授权
    Method for routing in loaded telecommunication networks 有权
    在加载的电信网络中路由的方法

    公开(公告)号:US06816585B1

    公开(公告)日:2004-11-09

    申请号:US09889387

    申请日:2001-07-16

    IPC分类号: H04M700

    摘要: A method for routing of incoming prioritized telecommunication traffic in a telecommunication network by applying an algorithm of finding optimal path to an augmented graph built for said telecommunication network. The telecommunication network is represented as a network graph comprising nodes (A, B, C, D, E) and real links (AB, BC, CD, ED, AE) bridging the nodes, while the augmented graph is a graph built on the basis of the network graph by adding to it virtual links (ABC1, . . . , EDC3). The augmented graph comprises nodes and edges, wherein the edges of the augmented graph are weighed to reflect priority of the telecommunication traffic presently taking place there-through. For placing a new call according to the method, a pathfinder optimization algorithm is applied to the augmented graph to determine an optimal pathfinder solution, having the minimal total weight, for routing the new call in the augmented graph. When the optimal pathfinder solution is determined, links in the network graph corresponding to the solution can be allocated for real routing, and the augmented graph can be updated to reflect changes in the network.

    Method and apparatus for clustering data
    5.
    发明授权
    Method and apparatus for clustering data 失效
    用于聚类数据的方法和装置

    公开(公告)号:US6021383A

    公开(公告)日:2000-02-01

    申请号:US725960

    申请日:1996-10-07

    IPC分类号: G06F17/30 G06K9/62 G06F17/00

    CPC分类号: G06K9/622 G06F17/30705

    摘要: A method and apparatus for partitioning a data set for clustering, based on the physical properties of an inhomogeneous ferromagnet. No assumption is made regarding the underlying distribution of the data. A Potts spin is assigned to each data point and an interaction between neighboring points is introduced, whose strength is a decreasing function of the distance between the neighbors. This magnetic system exhibits three phases. At very low temperatures it is completely ordered; i.e. all spins are aligned. At very high temperatures the system does not exhibit any ordering and in an intermediate regime clusters of relatively strongly coupled spins become ordered, whereas different clusters remain uncorrelated. This intermediate phase is identified by a jump in the order parameters. The spin--spin correlation function is used to partition the spins and the corresponding data points into clusters.

    摘要翻译: 基于不均匀铁磁体的物理特性来分割用于聚类的数据集的方法和装置。 对数据的底层分布没有假设。 将Potts旋转分配给每个数据点,并引入相邻点之间的交互,其强度是邻居之间距离的递减函数。 该磁系统呈现三相。 在非常低的温度下,它是完全有序的; 即所有自旋都对齐。 在非常高的温度下,系统不显示任何排序,并且在中间状态下,相对强耦合的旋转簇被排序,而不同的簇保持不相关。 该中间阶段通过顺序参数的跳转来识别。 自旋相关函数用于将自旋和相应的数据点分割成簇。