会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • ONLINE FRAUD SOLUTION
    • 在线欺诈解决方案
    • WO2005109225A2
    • 2005-11-17
    • PCT/US2005/015355
    • 2005-05-02
    • EMARKMONITOR, INC.SHRAIM, IhabHEPWORTH, James
    • SHRAIM, IhabHEPWORTH, James
    • G06F15/16
    • H04L51/12G06Q10/107
    • Various embodiments of the invention provide solutions, including systems, methods and software, for dealing with unethical uses of electronic mail, and in particular, with attempts to use email messages to facilitate online fraud. Some embodiments function to gather a set of at least one incoming email message, analyze that incoming message, categorize the message as a categorize the incoming email message as a fraudulent email message. Other embodiments can investigate the uniform resource locator included with the incoming email message to determine information about a server hosting the web site referenced by the uniform resource locator and pursue a response to a fraudulent attempt to collect personal information. In some cases, responses may be administrative and/or technical in nature.
    • 本发明的各种实施例提供了解决方案,包括用于处理电子邮件的不道德使用的系统,方法和软件,特别是尝试使用电子邮件消息来促进在线欺诈。 一些实施例用于收集一组至少一个传入电子邮件消息,分析该传入消息,将消息分类为将传入电子邮件分类为欺诈性电子邮件消息。 其他实施例可以调查包括在传入电子邮件消息中的统一资源定位符,以确定关于由统一资源定位符引用的托管网站的服务器的信息,并追踪对欺骗性尝试收集个人信息的响应。 在某些情况下,答复可能是行政和/或技术性质。
    • 2. 发明申请
    • B2C AUTHENTICATION SYSTEM AND METHODS
    • B2C认证系统和方法
    • WO2007058732A2
    • 2007-05-24
    • PCT/US2006/040867
    • 2006-10-17
    • MARKMONITOR INC.SHULL, MarkSHRAIM, Ihab
    • SHULL, MarkSHRAIM, Ihab
    • G06F7/04
    • H04L63/08G06F21/31G06F2221/2119H04L63/1416H04L63/1441H04L63/1483H04L63/1491
    • Embodiments of the invention provide systems and methods for providing authentication of a web site. According to one embodiment, preventing online fraud can comprise receiving a registration request associated with a web site. The registration request can include information identifying the web site. Registration information identifying the web site can be recorded in a registration data store the registration information. A determination can be made as to whether the information identifying the web site is valid. A request to authenticate the web site can be received from a verifier. The web site can be authenticated based on the registration information and results of authenticating the web site can be reported to the verifier in response to the request.
    • 本发明的实施例提供了用于提供网站的认证的系统和方法。 根据一个实施例,防止在线欺诈可以包括接收与网站相关联的注册请求。 注册请求可以包括标识网站的信息。 识别网站的注册信息可以在注册数据存储器中记录注册信息。 可以确定识别网站的信息是否有效。 可以从验证者接收到对网站进行身份验证的请求。 该网站可以根据注册信息进行身份验证,并且可以根据请求向验证者报告认证网站的结果。
    • 3. 发明申请
    • IMPLEMENTING TRUST POLICIES
    • 实施信托政策
    • WO2006094228A2
    • 2006-09-08
    • PCT/US2006/007728
    • 2006-03-02
    • MARKMONITOR, INC.SHULL, MarkBOHLMAN, WilliamSHRAIM, IhabBURA, Christopher, J.
    • SHULL, MarkBOHLMAN, WilliamSHRAIM, IhabBURA, Christopher, J.
    • H04L63/08G06F21/55G06F21/577H04L63/104H04L63/14H04L63/1408
    • Embodiments of the present invention provide methods, systems, and software for implementing trust policies. Such policies may be implemented in a variety of ways, including at one or more border devices, client computers, etc. m accordance with various embodiments, a communication between a client computer (and/or application) and an online entity may be monitored and/or otherwise detected. The online entity may be identified, and/or one or more trust scores associated with the online entity may be obtained. Based on the trust scores, as well, perhaps as the nature of the communication, an action (such as allowing the communication, blocking the communication, quarantining the communication, warning a user, administrator, etc.) may be taken. In some cases, a trust policy may be consulted to determine what action should be taken with respect to a given communication.
    • 本发明的实施例提供了用于实施信任策略的方法,系统和软件。 根据各种实施例,这样的策略可以以各种方式来实现,包括在一个或多个边界设备,客户端计算机等上,可以监视客户端计算机(和/或应用)与在线实体之间的通信, /或以其他方式检测。 可以识别在线实体,和/或可以获得与在线实体相关联的一个或多个信任评分。 基于信任分数,也许作为通信的性质,可以采取行动(例如允许通信,阻止通信,隔离通信,警告用户,管理员等)。 在某些情况下,可以咨询信托政策,以确定应该对某一通信采取什么行动。
    • 4. 发明申请
    • B2C AUTHENTICATION
    • B2C认证
    • WO2007047695A2
    • 2007-04-26
    • PCT/US2006/040595
    • 2006-10-17
    • MARKMONITOR INC.SHULL, MarkSHRAIM, Ihab
    • SHULL, MarkSHRAIM, Ihab
    • G06F7/58
    • H04L63/08H04L63/168
    • Embodiments of the invention provide systems and methods for providing authentication of a web site. According to one embodiment, authenticating a web site can comprise receiving a request from a verifier to authenticate the web site. For example, the web site can be authenticated based on pre-stored registration information for the web site. Additionally or alternatively, authenticating the web site can be based on reputation information related to the web site. A secure link can be established with the verifier and results of authenticating the web site can be reported to the verifier via the secure link. Establishing a secure link with the verifier can comprise connecting with a secure reporting feature of a client application of the verifier.
    • 本发明的实施例提供了用于提供网站的认证的系统和方法。 根据一个实施例,认证网站可以包括从验证者接收对该网站的认证的请求。 例如,可以基于网站的预先存储的注册信息来认证网站。 另外或替代地,认证网站可以基于与网站相关的信誉信息。 可以使用验证者建立安全链接,并且可以通过安全链接向验证者报告认证网站的结果。 与验证者建立安全链接可以包括与验证者的客户端应用程序的安全报告功能连接。
    • 7. 发明申请
    • METHODS AND SYSTEMS FOR ANALYZING DATA RELATED TO POSSIBLE ONLINE FRAUD
    • WO2006058217A3
    • 2006-06-01
    • PCT/US2005/042753
    • 2005-11-23
    • MARKMONITOR INC.SHRAIM, IhabSHULL, Mark
    • SHRAIM, IhabSHULL, Mark
    • G06F11/00
    • Various embodiments of the invention provide methods, systems and software for analyzing data. In particular embodiments, for example, a set of data about a web site may be analyzed to determine whether the web site is likely to be illegitimate (e.g., to be involved in a fraudulent scheme, such as a phishing scheme, the sale of gray market goods, etc.). In an exemplary embodiment, a set of data may be divided into a plurality of components (each of which, in some cases, may be considered a separate data set). Merely by way of example, a set of data may comprise data gathered from a plurality of data sources, and/or each component may comprise data gathered from one of the plurality of data sources. As another example, a set of data may comprise a document with a plurality of sections, and each component may comprise one of the plurality of sections. Those skilled in the art will appreciate that the analysis of a particular component may comprise certain tests and/or evaluations, and that the analysis of another component may comprise different tests and/or evaluations. In other cases, the analysis of each component may comprise similar tests and/or evaluations. The variety of tests and/or evaluations generally will be implementation specific.
    • 9. 发明申请
    • ENHANCED FRAUD MONITORING SYSTEMS
    • 加强法务监督系统
    • WO2007005868A2
    • 2007-01-11
    • PCT/US2006/026039
    • 2006-06-30
    • MARKMONITOR, INC.SHULL, MarkSHRAIM, Ihab
    • SHULL, MarkSHRAIM, Ihab
    • G06F12/14
    • G06Q40/02G06F21/552G06F21/577G06F21/6218G06F2221/2101G06F2221/2115G06Q10/107G06Q40/08H04L63/10H04L63/1408H04L63/1483H04L63/1491
    • Various embodiments of the invention provide systems and methods for the enhanced detection and/or prevention of fraud. A set of embodiments provides, for example, a facility where companies (online businesses, banks, ISPs, etc.) provide a security provider with fraud feeds (such as, to name one example, a feed of email messages from third parties addressed to customers of those businesses), as well as systems and methods of implementing such a facility. In some embodiments, feeds (such as messages) may be analyzed to create normalized direct and/or derived data which then may be made available to such companies (perhaps for a fee). By defining and controlling access to the direct and derived data, a security provider may enable such companies to negotiate bilateral and other agreements between themselves as to who they will exchange data with, what data will be exchanged, and under what commercial and other terms such data will be exchanged.
    • 本发明的各种实施例提供用于增强检测和/或防止欺诈的系统和方法。 一组实施例提供了例如公司(在线企业,银行,ISP等)向安全提供商提供欺诈馈送的设施(例如,举例来说,来自第三方的电子邮件消息来源为 这些企业的客户),以及实施这种设施的系统和方法。 在一些实施例中,馈送(例如消息)可以被分析以产生归一化的直接和/或导出数据,然后可以向这些公司提供(可能是费用)。 通过定义和控制对直接和派生数据的访问,安全提供者可以使这样的公司能够就它们之间的双方和其他协议进行谈判,以便他们将与谁交换数据,将要交换哪些数据,以及在什么商业和其他术语下 数据将被交换。