G06F16/9566

SYSTEM AND METHOD FOR URL FETCHING RETRY MECHANISM
20230004618 · 2023-01-05 ·

A method for overcoming intermittent, temporary, or other fetching failures by using multiple attempts for retrieving a content from a web server to a client device is disclosed. The URL fetching may use direct or non-direct fetching schemes, or a combination thereof. The non-direct fetching method may use intermediate devices, such as proxy server, Data-Center proxy server, tunnel devices, or any combination thereof. Upon sensing a failure of a fetching action, the action is repeated using the same or different parameters or attributes, such as by using different intermediate devices, selected based on different parameters or attributes, such as different countries. The repetitions are limited to a pre-defined maximum number or attempts. The fetching attempts may be performed by the client device, by an intermediate device in a non-direct fetching scheme, or a combination thereof. Various fetching schemes may be used sequentially until the content is retrieved.

AUTOMATIC LOGIN LINK FOR TARGETED USERS WITHOUT PREVIOUS ACCOUNT CREATION
20230005016 · 2023-01-05 ·

An auto-login system and process enable maintaining user accounts on a server without a user having to register or create a user name, password, or other authentication method. An account may be created without user knowledge. The server may transmit a content item to a target user, along with a link. A server identifies the target user from use of the auto-login link and collects interaction or “engagement” data while the user is logged in, to assess user interest in products, for example, a mutual fund investment product, which may be characterized by tags and/or categories. The system may quantify a product salience metric for a given product relative to a target user's interest profile to focus marketing efforts and support engagement with interested target users, especially securities funds and financial advisors.

System and Method for Ethical Collection of Data
20230004616 · 2023-01-05 ·

A computerized system automatically ensures that data from a data partner has been ethnically sourced. The system reviews websites associated with URLs provided by the data provider, and privacy policy data is extracted and captured. A keyword set is used to analyze the privacy terms of websites associated with the URLs. URLs associated with websites that ethically collect data are stored in a URL database, or the URLs are given a flag or score, such that these URLs need not be checked each time a new data partner identifies these URLs as the source of its data. The system may periodically re-check the URLs to ensure that no changes have been made to the corresponding website's data collection practices.

Method for determining duplication of security vulnerability and analysis apparatus using same

A method for determining duplication of a vulnerability may include a vulnerability extraction step of extracting vulnerability uniform resource locator (URL) addresses including the vulnerability from an analysis target server; a hash generation step of generating the URL hash value corresponding to the extracted vulnerability from the vulnerability URL address; and a duplication determination step of determining, when the URL hash value is present in the first comparison table, that the vulnerability is duplicated and excluding the corresponding vulnerability from vulnerability information.

Secure self-contained mechanism for managing interactions between distributed computing components

Methods, computer readable media, and devices for securely managing interactions between distributed components are provided. One method may include generating a first interaction identifier based on a first component identifier and data to be shared with a second component, storing the first interaction identifier in an interaction data store of the first component, sending a request to the second component including the first component identifier, the first interaction identifier, and the data to be shared with the second component, creating a graph node in an interaction relationship data store based on the first interaction identifier, receiving a response from the second component including a second component identifier, a second interaction identifier, and response data, and adding a relationship edge in the interaction relationship data store connecting the graph node based on the first interaction identifier with a graph node based on the second interaction identifier.

Systems and methods for improved web searching

Systems and methods are provided for improved web searching. In one implementation, suggested search queries am provided based on previous search queries and click data. A weighted bi-partite graph or index may be used to identify related search queries based on overlapping clicked URLs. According to a method, query-click log data of a search engine is processed to generate sets of suggested search queries, data corresponding to each suggested search query, and a set of clicked URLs related to each suggested search query. Additionally, or independently, methods may be provided for contextually correcting spelling errors within sets of suggested search queries using a contextual algorithm, and/or identifying and discarding sets of suggested search queries and URLs that lead to restricted material, such as restricted content and related URLs.

Systems and methods for screenshot linking

A system for analyzing screenshots can include a computing device including a processor coupled to a memory and a display screen configured to display content. The system can include an application stored on the memory and executable by the processor. The application can include a screenshot receiver configured to access, from storage to which a screenshot of the content displayed on the display screen captured using a screenshot function of the computing device is stored, the screenshot including an image and a predetermined marker. The application can include a marker detector configured to detect the predetermined marker included in the screenshot. The application can include a link identifier configured to identify, using the predetermined marker, a link to a resource mapped to the image included in the screenshot, the resource accessible by the computing device via the link.

WEBSITE ANALYZING METHOD
20230237267 · 2023-07-27 ·

The present invention includes steps of loading a website project; counting a word count of keywords of the website project for obtaining a word sum of the website project; respectively counting a first anchor word count for each of the anchor types to obtain a first anchor word sum for each of the anchor types; respectively dividing each of the first anchor word sums of each of the anchor types by the word sum to obtain multiple first internal anchor type percentages of the multiple anchor types; loading multiple first default anchor type percentages; for each of the anchor types, when the first internal anchor type percentage is greater than or equal to the first default anchor type percentage, marking the first internal anchor type percentage, and displaying results to prevent over-modifying the keywords corresponding to the marked anchor type, thus keeping the website project from being blacklisted.

Method and system for identifying electronic devices of genuine customers of organizations

A computer-implemented method for identifying, among user electronic devices, customer electronic devices associated with genuine customers of organizations, the method being executed by a server, the method comprising: receiving, from a first user electronic device by the server, a first uniform resource locator (URL) of a first user browsing history; generating a first embedding corresponding to the first URL; comparing the first embedding with a template embedding of a plurality of template embeddings, the plurality of template embeddings having been retrieved from a genuity database; and in response to a difference between the first embedding and the template embedding being lower than an embedding difference threshold, adding the first embedding to the genuity database.

SYSTEMS AND METHODS FOR PRIVACY PRESERVING FRAUD DETECTION DURING ELECTRONIC TRANSACTIONS
20230026121 · 2023-01-26 ·

A method and apparatus for performing privacy preserving fraud detection in network based transactions are described. The method may include receiving a fraud detection message during a transaction between a user system and a merchant system, the message having a set of cryptographically transformed universal resource locator (URL) components generated from a URL of a web page of the merchant system on which the transaction is to occur. The method may also include generating one or more secure and anonymous fraud detection features, each fraud detection feature comprising a select subset of the cryptographically transformed URL components. The method may also include performing fraud detection for the web page using the one or more secure and anonymous fraud detection features to determine a likelihood that fraud is occurring in the transaction.