Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Riskiq Inc patents


Recent patent applications related to Riskiq Inc. Riskiq Inc is listed as an Agent/Assignee. Note: Riskiq Inc may have other listings under different names/spellings. We're not affiliated with Riskiq Inc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "R" | Riskiq Inc-related inventors


Techniques for detecting malicious behavior using an accomplice model

The present disclosure generally relates to web page analysis, and more particularly to detecting malicious behavior using an accomplice model. In certain embodiments, the accomplice model may determine that a uri is associated with malicious behavior based upon the uri being associated with an attribute determined to be related to malicious behavior. ... Riskiq Inc

Techniques for classifying a web page based upon functions used to render the web page

The present disclosure generally relates to web page analysis, and more particularly to a classification system for web pages. The classification system may classify a web page as malicious based upon one or more signatures generated for the web page. ... Riskiq Inc

Host pair detection

The present disclosure relates to identifying and storing relationships between hosts that are used to present a web page to a user. In certain embodiments, a system for detecting host pairs is provided. ... Riskiq Inc

Techniques for determining threat intelligence for network infrastructure analysis

Embodiments of the present disclosure are directed to a network analytic system for tracking and analysis of network infrastructure for network-based digital assets. The network analytic system can detect and track a relationship between assets based on one or more attributes related or shared between any given assets. ... Riskiq Inc

Techniques for web framework detection

Techniques are disclosed for analyzing documents to detect web components and the web frameworks in the documents. In at least one embodiment, a network analysis system is provided to passively detect web frameworks of documents. ... Riskiq Inc

Using hash signatures of dom objects to identify website similarity

Embodiments are directed to using a hash signature of a rendered dom object of a website to find similar content and behavior on other websites. Embodiments break a dom into a large number of data portions (i.e., “shingles”), apply a hashing algorithm to the shingles, select a predetermined number of hashes from the hashed shingles according to a selection criteria to create a hash signature, and compare the hash signature to that of a reference page to determine similarity of website dom object content. ... Riskiq Inc

Techniques for infrastructure analysis of internet-based activity

Some embodiments are directed to techniques for infrastructure analysis of internet-based activity. Techniques are disclosed to enable analysts to spend more time focusing on analyzing and identifying threats to in a network infrastructure, and little time on data collection and data processing. ... Riskiq Inc

Identifying phishing websites using dom characteristics

Embodiments of the present invention are directed to identifying phishing websites by rendering and analyzing document object model (dom) objects associated with a website for features that indicate phishing behavior. Embodiments analyze the full scope and functionality associated with a website by executing functions embedded in a dom object before analyzing the website for phishing activity. ... Riskiq Inc

Identifying phishing websites using dom characteristics

Embodiments of the present invention are directed to identifying phishing websites by rendering and analyzing document object model (dom) objects associated with a website for features that indicate phishing behavior. Embodiments analyze the full scope and functionality associated with a website by executing functions embedded in a dom object before analyzing the website for phishing activity. ... Riskiq Inc

Using hash signatures of dom objects to identify website similarity

Embodiments are directed to using a hash signature of a rendered dom object of a website to find similar content and behavior on other websites. Embodiments break a dom into a large number of data portions (i.e., “shingles”), apply a hashing algorithm to the shingles, select a predetermined number of hashes from the hashed shingles according to a selection criteria to create a hash signature, and compare the hash signature to that of a reference page to determine similarity of website dom object content. ... Riskiq Inc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Riskiq Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Riskiq Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###