-
1.
公开(公告)号:US20230325841A1
公开(公告)日:2023-10-12
申请号:US17660750
申请日:2022-04-26
申请人: GEN DIGITAL INC.
发明人: Iskander Sanchez Rola , Kevin Alejandro Roundy , Platon Kotzias , Emory Shing-Kuo Shyong , Goutham Kumar Nekkalapu , Magesh Varadharajan
CPC分类号: G06Q20/4016 , G06Q30/0185
摘要: The disclosed computer-implemented method for detecting websites that perpetrate at least one of scams or frauds may include correlating online interaction data with financial transaction data. The online interaction data may include information on suspicious websites obtained through an online interaction analysis, and the financial transaction data may include sources of suspicious financial activity obtained through a transaction trend analysis. The method may additionally include detecting at least one of online scams or frauds based on the correlation. The detection may include detecting that an online interaction is suspicious based on correlation thereof to a suspicious financial transaction, and/or detecting that a financial transaction is suspicious based on correlation thereof to a suspicious online interaction. The method may also include performing a security action in response to the detection. Various other methods, systems, and computer-readable media are also disclosed.
-
公开(公告)号:US20230376964A1
公开(公告)日:2023-11-23
申请号:US17805629
申请日:2022-06-06
申请人: GEN DIGITAL INC.
发明人: Kevin Alejandro Roundy , Iskander Sanchez Rola , Goutham Kumar Nekkalapu , Emory Shing-Kuo Shyong , Platon Kotzias , Magesh Varadharajan
CPC分类号: G06Q20/4016 , G06Q20/16
摘要: The disclosed computer-implemented method for detecting unauthorized online transactions may include correlating, by at least one processor, one or more reported financial activities to one or more online financial activities tracked in network telemetry on one or more authorized devices. The method may additionally include identifying, by the at least one processor based on the correlation, at least one of the reported financial activities that was initiated by an unauthorized device. The method may also include performing, by the at least one processor, a security action in response to the identification. Various other methods, systems, and computer-readable media are also disclosed.
-