会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • HOST PAIR DETECTION
    • 主机对检测
    • WO2018075695A1
    • 2018-04-26
    • PCT/US2017/057271
    • 2017-10-18
    • RISKIQ, INC.
    • HUNT, AdamEDGEWORTH, JonasKIERNAN, ChrisMANOUSOS, EliasPON, David
    • G06F17/30
    • H04L41/14G06F3/04842G06F16/951G06F16/9566G06F17/2247G06F17/272H04L63/1483
    • The present disclosure relates to identifying and storing relationships between hosts that are used to present a web page to a user. In certain embodiments, a system for detecting host pairs is provided. The system may receive a first request to identify one or more host pairs associated with a first host. In response to receiving the first request, the system may send a second request to the first host for a document. The document may be a web page file that is used to build a web page associated with the first host. The web page file may include instructions that, when parsed, build the web page. In response to the second request, the first host may send a response to the system. The system may then use the data included in the response to build the web page. While building the web page, a pairing may be stored when a different host is contacted.
    • 本公开涉及识别和存储用于向用户呈现网页的主机之间的关系。 在某些实施例中,提供了一种用于检测主机对的系统。 该系统可以接收识别与第一主机相关联的一个或多个主机对的第一请求。 响应于接收到第一请求,系统可以向第一主机发送针对文档的第二请求。 该文档可以是用于构建与第一主机相关联的网页的网页文件。 该网页文件可以包括在解析时构建网页的指令。 响应于第二请求,第一主机可以向系统发送响应。 系统然后可以使用包含在响应中的数据来构建网页。 在构建网页时,可以在联系不同主机时存储配对。
    • 3. 发明申请
    • TECHNIQUES FOR MONITORING VERSION NUMBERS OF WEB FRAMEWORKS
    • 监测Web框架版本号的技巧
    • WO2017189727A1
    • 2017-11-02
    • PCT/US2017/029643
    • 2017-04-26
    • RISKIQ, INC.
    • HUNT, AdamEDGEWORTH, JonasKIERNAN, ChrisPON, DavidMANOUSOS, Elias
    • G06F17/30G06F17/22
    • Techniques are disclosed for analyzing documents to detect web components and the web frameworks in the documents. In at least one embodiment, a network analysis system is provided to passively detect web frameworks of documents. The network analysis system can render a document using a document object model to identify objects in the document that are defined as web components. A hash function may be applied to each of the objects to generate a hash signature for the object. Files defining web frameworks can be downloaded from a repository system. Each file may corresponding to a web component. A hash function is applied content in each file to generate a hash signature. The hash signatures of each file may be compared to the hash signatures of the objects in the document to identify a web component for each object. A web framework can be identified based on the web components.
    • 公开了用于分析文档以检测文档中的web组件和web框架的技术。 在至少一个实施例中,提供网络分析系统来被动地检测文档的web框架。 网络分析系统可以使用文档对象模型来呈现文档以识别文档中定义为网页组件的对象。 散列函数可以应用于每个对象以生成对象的散列签名。 定义Web框架的文件可以从存储库系统下载。 每个文件可能对应一个Web组件。 散列函数应用于每个文件中的内容以生成散列签名。 可以将每个文件的散列签名与文档中对象的散列签名进行比较,以识别每个对象的web组件。 Web框架可以基于Web组件来识别。
    • 4. 发明申请
    • IDENTIFYING PHISHING WEBSITES USING DOM CHARACTERISTICS
    • 使用DOM特征识别固定网站
    • WO2017049042A1
    • 2017-03-23
    • PCT/US2016/052069
    • 2016-09-16
    • RISKIQ, INC.
    • HUNT, AdamPON, DavidKIERNAN, ChrisADAMS, BenEDGEWORTH, JonasMANOUSOS, Elias
    • H04L29/06
    • H04L63/1483G06F2221/2119
    • Embodiments of the present disclosure are directed to identifying phishing websites by rendering and analyzing document object model (DOM) objects associated with a website for features that indicate phishing behavior. Embodiments analyze the full scope and functionality associated with a website by executing functions embedded in a DOM object before analyzing the website for phishing activity. Accordingly, embodiments render and analyze a fully executed DOM object for phishing behavior. Embodiments may then perform steps to mediate a website that is classified as performing phishing. Thus, embodiments are configured to (1) collect website information from a variety of websites and web servers connected to the internet, (2) analyze the collected data to determine whether the website information is performing phishing, and (3) mediate websites and other actors that are determined to be performing phishing based on the results of the phishing analysis.
    • 本公开的实施例旨在通过呈现和分析与网站相关联的文档对象模型(DOM)对象来指示网络钓鱼行为的特征来识别钓鱼网站。 实施例通过在分析网站进行网络钓鱼活动之前执行嵌入在DOM对象中的功能来分析与网站相关的全部范围和功能。 因此,实施例渲染和分析用于网络钓鱼行为的完全执行的DOM对象。 然后,实施例可以执行步骤来调解被分类为执行网络钓鱼的网站。 因此,实施例被配置为(1)从连接到因特网的各种网站和web服务器收集网站信息,(2)分析收集的数据以确定网站信息是否正在执行网络钓鱼,以及(3)调停网站和其他 根据网络钓鱼分析的结果决定执行网络钓鱼的演员。
    • 6. 发明申请
    • TECHNIQUES FOR DETERMINING THREAT INTELLIGENCE FOR NETWORK INFRASTRUCTURE ANALYSIS
    • 确定威胁智能的网络基础设施分析技术
    • WO2018035163A1
    • 2018-02-22
    • PCT/US2017/047017
    • 2017-08-15
    • RISKIQ, INC.
    • HUNT, AdamEDGEWORTH, JonasKIERNAN, ChrisMANOUSOS, EliasPON, David
    • G06F21/51G06F21/56H04L29/06G06F17/30
    • H04L63/1483G06F21/51G06F21/562H04L41/22H04L43/14H04L63/08H04L63/1425
    • Embodiments of the present disclosure are directed to a network analytic system for tracking and analysis of network infrastructure for network-based digital assets. The network analytic system can detect and track a relationship between assets based on one or more attributes related or shared between any given assets. The network analytic system can analyze network-based digital assets to determine information about a website (e.g., information about electronic documents, such as web pages) that has be used to detect phishing and other abuse of the website. The network analytic system can analyze data about network-based assets to determine whether any are being used or connected to use of unauthorized or malicious activity or known network-based assets. Based on the relationship identified, the network analytic system can associate or link assets together. The network analytic system may provide an interface to view data sets generated by the network analytic system.
    • 本公开的实施例针对用于跟踪和分析用于基于网络的数字资产的网络基础设施的网络分析系统。 网络分析系统可以基于与任何给定资产相关或共享的一个或多个属性来检测和跟踪资产之间的关系。 网络分析系统可以分析基于网络的数字资产以确定关于网站的信息(例如,关于电子文档的信息,例如网页),其已经用于检测网站的网络钓鱼和其他滥用。 网络分析系统可以分析有关基于网络的资产的数据,以确定是否有人使用或连接到使用未授权或恶意活动或已知的基于网络的资产。 根据所确定的关系,网络分析系统可以将资产关联或链接在一起。 网络分析系统可以提供一个界面来查看由网络分析系统生成的数据集。