会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Detecting fraudulent activity by analysis of information requests
    • 通过分析信息请求来检测欺诈活动
    • US08763116B1
    • 2014-06-24
    • US13163526
    • 2011-06-17
    • Richendra KhannaSean C. Harding
    • Richendra KhannaSean C. Harding
    • H04L29/06
    • H04L63/1483G06F21/552G06F21/60H04L63/101H04L63/1416
    • Techniques are described for use in inhibiting attempts to fraudulently obtain access to confidential information about users. In some situations, the techniques involve automatically analyzing at least some requests for information that are received by a Web site or other electronic information service, such as to determine whether they likely reflect fraudulent activities by the request senders or other parties that initiate the requests. For example, if a request is being made to a Web site based on a user's interaction with a third-party information source (e.g., another unaffiliated Web site) that is not authorized to initiate the request, the third-party information source may be a fraudulent phishing site or engaging in other types of fraudulent activity. If fraudulent activity is suspected based on analysis of one or more information requests, one or more actions may be taken to inhibit the fraudulent activity.
    • 描述技术用于抑制尝试欺诈地获得关于用户的机密信息的访问。 在某些情况下,这些技术涉及自动分析至少一些由网站或其他电子信息服务接收到的信息请求,以便确定它们是否可能反映请求发送者或发起请求的其他方的欺诈活动。 例如,如果基于用户与未被授权发起请求的第三方信息源(例如,另一个无关联的网站)的交互来对网站进行请求,则第三方信息源可以是 欺诈性网络钓鱼网站或从事其他类型的欺诈活动。 如果基于一个或多个信息请求的分析来怀疑欺诈活动,则可以采取一种或多种动作来抑制欺诈活动。
    • 2. 发明授权
    • Detecting fraudulent activity by analysis of information requests
    • 通过分析信息请求来检测欺诈活动
    • US07984500B1
    • 2011-07-19
    • US11539076
    • 2006-10-05
    • Richendra KhannaSean C. Harding
    • Richendra KhannaSean C. Harding
    • G06F12/14
    • H04L63/1483G06F21/552G06F21/60H04L63/101H04L63/1416
    • Techniques are described for use in inhibiting attempts to fraudulently obtain access to confidential information about users. In some situations, the techniques involve automatically analyzing at least some requests for information that are received by a Web site or other electronic information service, such as to determine whether they likely reflect fraudulent activities by the request senders or other parties that initiate the requests. For example, if a request is being made to a Web site based on a user's interaction with a third-party information source (e.g., another unaffiliated Web site) that is not authorized to initiate the request, the third-party information source may be a fraudulent phishing site or engaging in other types of fraudulent activity. If fraudulent activity is suspected based on analysis of one or more information requests, one or more actions may be taken to inhibit the fraudulent activity.
    • 描述技术用于抑制尝试欺诈地获得关于用户的机密信息的访问。 在某些情况下,这些技术涉及自动分析至少一些由网站或其他电子信息服务接收到的信息请求,以便确定它们是否可能反映请求发送者或发起请求的其他方的欺诈活动。 例如,如果基于用户与未被授权发起请求的第三方信息源(例如,另一个无关联的网站)的交互来对网站进行请求,则第三方信息源可以是 欺诈性网络钓鱼网站或从事其他类型的欺诈活动。 如果基于一个或多个信息请求的分析来怀疑欺诈活动,则可以采取一种或多种动作来抑制欺诈活动。