Processing

Please wait...

Settings

Settings

Goto Application

1. WO2020110099 - DETECTION OF REMOTE FRAUDULENT ACTIVITY IN A CLIENT-SERVER-SYSTEM

Publication Number WO/2020/110099
Publication Date 04.06.2020
International Application No. PCT/IB2020/050610
International Filing Date 27.01.2020
IPC
H04L 29/06 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02Communication control; Communication processing
06characterised by a protocol
H04W 12/00 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
CPC
H04L 2463/144
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
2463Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
144Detection or countermeasures against botnets
H04L 63/0428
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
04for providing a confidential data exchange among entities communicating through data packet networks
0428wherein the data content is protected, e.g. by encrypting or encapsulating the payload
H04L 63/08
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
08for supporting authentication of entities communicating through a packet data network
H04L 63/083
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
08for supporting authentication of entities communicating through a packet data network
083using passwords
H04L 63/0861
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
08for supporting authentication of entities communicating through a packet data network
0861using biometrical features, e.g. fingerprint, retina-scan
H04L 63/14
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
14for detecting or protecting against malicious traffic
Applicants
  • BEHAVIOSEC INC. [US]/[US]
  • DEUTSCHMANN, Ingo [DE]/[DE]
Inventors
  • DEUTSCHMANN, Ingo
  • BURSTROM, Per
  • LINDBLAD, Philip
  • JULITZ, David
Agents
  • KÖLLNER, Malte
Priority Data
16/200,74027.11.2018US
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) DETECTION OF REMOTE FRAUDULENT ACTIVITY IN A CLIENT-SERVER-SYSTEM
(FR) DÉTECTION D’ACTIVITÉ FRAUDULEUSE DISTANTE DANS UN SYSTÈME CLIENT-SERVEUR
Abstract
(EN)
Detecting unauthorized access to a device is detected in embodiments of the disclosed technology. After downloading a webpage, code is executed in a browser to scan network ports and determine which ports are open. Further webpage content sent from a web server is determined and/or modified in embodiments of the disclosed technology based on which ports are open. In some embodiments, when a particular port or ports are already in use it is determined that a malfeasant actor has access to the end user device and as such, sensitive data or secure data which is intended for a specific user is no longer sent to the end user device.
(FR)
La détection d’un accès non autorisé à un dispositif est détectée dans des modes de réalisation de la présente invention. Après le téléchargement d’une page Web, un code est exécuté dans un navigateur pour balayer des ports de réseau et pour déterminer les ports qui sont ouverts. Un autre contenu d’une page Web envoyé depuis un serveur Web est déterminé et/ou modifié dans des modes de réalisation de la présente invention sur la base des ports qui sont ouverts. Dans certains modes de réalisation, lorsqu’un port particulier ou des ports particuliers sont déjà utilisés, il est déterminé qu’un acteur malfaisant a accès au dispositif d’utilisateur final et, à ce titre, des données sensibles ou des données sécurisées, qui sont destinées à un utilisateur spécifique, ne sont plus envoyées au dispositif d’utilisateur final.
Also published as
Latest bibliographic data on file with the International Bureau