H04L51/212

METHODS AND APPARATUS FOR TARGETING COMMUNICATIONS USING SOCIAL NETWORK METRICS
20180013708 · 2018-01-11 ·

A method for a computer system includes receiving a first user communication, determining a first group of users, determining a target number of users, determining whether the first group of users includes the target number of users, and if not, providing the communication to the first group of users, determining a hierarchal mapping of groups of users in response to user memberships, determining a second group of users from the hierarchal mapping, determining a plurality of social network relationship factors for the second group of users with respect to the first user, and providing the communication to at least a subset of users in the second group of users in response to the first plurality of social network relationship factors.

ONLINE FRAUD SOLUTION
20180012184 · 2018-01-11 ·

Various embodiments of the invention provide solutions (including inter alia, systems, methods and software) for dealing with online fraud. Some embodiments function to access and/or obtain information from (and/or receive data from) a data source; the data might, for example, indicate a possible instance of online fraud. Certain embodiments, therefore, can be configured to analyze the data, e.g., to determine whether the data indicate a likely instance of online fraud. Such instances may be further investigated, and/or a response may be initiated. Data sources can include, without limitation, web pages, email messages, online chat sessions, domain zone files, newsgroup (and/or posting thereto), etc. Data obtained from the data sources can include, without limitation, suspect domain registrations, uniform resources locators, references to trademarks, advertisements, etc.

IDENTIFICATION OF SOURCES OF MEDIA TRAFFIC THROUGH A NETWORK

A method for identifying one or more unauthorised routes used for the termination of application-to-person (A2P) short message service (SMS) messages to a mobile telecommunications network, and a system for use in performing the method. An application service is stimulated to generate an A2P SMS message, and to send it to a collection point. The message is processed to obtain an identifier identifying a source of the message, and it is determined whether the identifier corresponds to an authorised source of A2P traffic to the network.

METHOD AND SYSTEM FOR SENDER-CONTROLLED MESSAGING AND CONTENT SHARING
20180013707 · 2018-01-11 · ·

An access-control device that controls access to encrypted messages. During operation, the access-control device can receive an access key for a corrupted message, and can receive a cover message digest associated with the corrupted message. The access-control device stores the access key in association with the cover message digest, and stores the cover message digest in a block chain. A respective block of the block chain includes at least one cover message digest, and a hash value of a previous block of the block chain.

COMPUTER DATA SYSTEM DATA SOURCE REFRESHING USING AN UPDATE PROPAGATION GRAPH

Described are methods, systems and computer readable media for data source refreshing.

Intelligent adversary simulator
11709944 · 2023-07-25 · ·

An intelligent-adversary simulator can construct a graph of a virtualized instance of a network including devices connecting to the virtualized instance of the network as well as connections and pathways through the virtualized instance of the network. Running a simulated cyber-attack scenario on the virtualized instance of the network in order to identify one or more critical devices connecting to the virtualized instance of the network from a security standpoint, and then put this information into a generated report to help prioritize which devices should have a priority. During a simulation, the intelligent-adversary simulator calculates paths of least resistance for a cyber threat in the cyber-attack scenario to compromise a source device through to other components until reaching an end goal of the cyber-attack scenario in the virtualized network, all based on historic knowledge of connectivity and behaviour patterns of users and devices within the actual network under analysis.

SYSTEM AND METHOD FOR CENSORING OF COMMENTS MADE ON SOCIAL MEDIA
20180013706 · 2018-01-11 · ·

The present disclosure includes systems and methods for censoring comments made on social media. A censorship list associated with a subject user may be maintained, wherein the censorship list comprises a plurality of censored comments associated with the subject user. A commenting user may publish a comment on the wall of the subject user. The subject user may be notified on the comment, and provided an option as to whether to censor the comment. The comment may be added to the censorship list if the subject user censors the comment.

Registered encrypted electronic message and redacted reply system
11711347 · 2023-07-25 ·

A method and system for processing an email having redacted content, and/or where the message content has been encrypted and recorded as encrypted, is provided.

Data integrity

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, that protect analytics for resources of a publisher from traffic directed to such resources by malicious entities. An analytics server receives a first message that includes an encrypted token and analytics data for a publisher-provided resource. The token includes a portion of the analytics data and a trust score indicating a likelihood that activity on the resource is attributed to a human (rather than an automated process). The analytics server decrypts the token. The analytics server determines a trustworthiness measure for the analytics data included in the first message based on the trust score (in the decrypted token) and a comparison of the analytics data in the first message and the portion of the analytics data (in the decrypted token). Based on the measure of trustworthiness, the analytics server performs analytics operations using the analytics data.

System and Method for Determining Trust for SIP Messages

A method for performing initial registration is provided. The method includes receiving a server timeout message, the server timeout message including at least a field set to a value equal to a value received during a first registration. The method further includes initiating restoration procedures by performing an initial registration.