Threshold based fraud management for cloud computing system
Unauthorized and fraudulent use of a cloud computing system may be reduced or mitigated using a multi-threshold based method to identify fraudulent subscribers of the cloud. The multi-threshold based method may assign a fraud threshold to each resource of the cloud. The fraud thresholds of the multi...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Gelbourt, Shachar Hilbuch, Amit Sebastian Gonzalez, Julian Federico Leong, Weng Keong Peter Anthony |
description | Unauthorized and fraudulent use of a cloud computing system may be reduced or mitigated using a multi-threshold based method to identify fraudulent subscribers of the cloud. The multi-threshold based method may assign a fraud threshold to each resource of the cloud. The fraud thresholds of the multi-threshold based method may be adjusted based on one or more characteristics associated with one or more of the plurality of resources in the cloud. The one or more characteristics may include a capacity percentage associated with the plurality of resources, fraud distribution among the plurality of resources, cost of operation associated with the plurality of resources, anticipated or actual subscriber growth rate associated with the plurality of resources and/or anticipated or actual subscriber fraud risk associated with the plurality of resources. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US11337072B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US11337072B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US11337072B23</originalsourceid><addsrcrecordid>eNrjZLAOyShKLc7Iz0lRSEosTk1RSCtKLE1RyE3MS0xPzU3NK1FIyy9SSM7JBwom5-cWlJZk5qUrFFcWl6Tm8jCwpiXmFKfyQmluBkU31xBnD93Ugvz41OKCxOTUvNSS-NBgQ0NjY3MDcyMnI2Ni1AAAz_Iv2g</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Threshold based fraud management for cloud computing system</title><source>esp@cenet</source><creator>Gelbourt, Shachar ; Hilbuch, Amit Sebastian ; Gonzalez, Julian Federico ; Leong, Weng Keong Peter Anthony</creator><creatorcontrib>Gelbourt, Shachar ; Hilbuch, Amit Sebastian ; Gonzalez, Julian Federico ; Leong, Weng Keong Peter Anthony</creatorcontrib><description>Unauthorized and fraudulent use of a cloud computing system may be reduced or mitigated using a multi-threshold based method to identify fraudulent subscribers of the cloud. The multi-threshold based method may assign a fraud threshold to each resource of the cloud. The fraud thresholds of the multi-threshold based method may be adjusted based on one or more characteristics associated with one or more of the plurality of resources in the cloud. The one or more characteristics may include a capacity percentage associated with the plurality of resources, fraud distribution among the plurality of resources, cost of operation associated with the plurality of resources, anticipated or actual subscriber growth rate associated with the plurality of resources and/or anticipated or actual subscriber fraud risk associated with the plurality of resources.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR ; TELEPHONIC COMMUNICATION ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION ; WIRELESS COMMUNICATIONS NETWORKS</subject><creationdate>2022</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20220517&DB=EPODOC&CC=US&NR=11337072B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76290</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20220517&DB=EPODOC&CC=US&NR=11337072B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Gelbourt, Shachar</creatorcontrib><creatorcontrib>Hilbuch, Amit Sebastian</creatorcontrib><creatorcontrib>Gonzalez, Julian Federico</creatorcontrib><creatorcontrib>Leong, Weng Keong Peter Anthony</creatorcontrib><title>Threshold based fraud management for cloud computing system</title><description>Unauthorized and fraudulent use of a cloud computing system may be reduced or mitigated using a multi-threshold based method to identify fraudulent subscribers of the cloud. The multi-threshold based method may assign a fraud threshold to each resource of the cloud. The fraud thresholds of the multi-threshold based method may be adjusted based on one or more characteristics associated with one or more of the plurality of resources in the cloud. The one or more characteristics may include a capacity percentage associated with the plurality of resources, fraud distribution among the plurality of resources, cost of operation associated with the plurality of resources, anticipated or actual subscriber growth rate associated with the plurality of resources and/or anticipated or actual subscriber fraud risk associated with the plurality of resources.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR</subject><subject>TELEPHONIC COMMUNICATION</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><subject>WIRELESS COMMUNICATIONS NETWORKS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2022</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZLAOyShKLc7Iz0lRSEosTk1RSCtKLE1RyE3MS0xPzU3NK1FIyy9SSM7JBwom5-cWlJZk5qUrFFcWl6Tm8jCwpiXmFKfyQmluBkU31xBnD93Ugvz41OKCxOTUvNSS-NBgQ0NjY3MDcyMnI2Ni1AAAz_Iv2g</recordid><startdate>20220517</startdate><enddate>20220517</enddate><creator>Gelbourt, Shachar</creator><creator>Hilbuch, Amit Sebastian</creator><creator>Gonzalez, Julian Federico</creator><creator>Leong, Weng Keong Peter Anthony</creator><scope>EVB</scope></search><sort><creationdate>20220517</creationdate><title>Threshold based fraud management for cloud computing system</title><author>Gelbourt, Shachar ; Hilbuch, Amit Sebastian ; Gonzalez, Julian Federico ; Leong, Weng Keong Peter Anthony</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US11337072B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2022</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR</topic><topic>TELEPHONIC COMMUNICATION</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><topic>WIRELESS COMMUNICATIONS NETWORKS</topic><toplevel>online_resources</toplevel><creatorcontrib>Gelbourt, Shachar</creatorcontrib><creatorcontrib>Hilbuch, Amit Sebastian</creatorcontrib><creatorcontrib>Gonzalez, Julian Federico</creatorcontrib><creatorcontrib>Leong, Weng Keong Peter Anthony</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Gelbourt, Shachar</au><au>Hilbuch, Amit Sebastian</au><au>Gonzalez, Julian Federico</au><au>Leong, Weng Keong Peter Anthony</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Threshold based fraud management for cloud computing system</title><date>2022-05-17</date><risdate>2022</risdate><abstract>Unauthorized and fraudulent use of a cloud computing system may be reduced or mitigated using a multi-threshold based method to identify fraudulent subscribers of the cloud. The multi-threshold based method may assign a fraud threshold to each resource of the cloud. The fraud thresholds of the multi-threshold based method may be adjusted based on one or more characteristics associated with one or more of the plurality of resources in the cloud. The one or more characteristics may include a capacity percentage associated with the plurality of resources, fraud distribution among the plurality of resources, cost of operation associated with the plurality of resources, anticipated or actual subscriber growth rate associated with the plurality of resources and/or anticipated or actual subscriber fraud risk associated with the plurality of resources.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US11337072B2 |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES ELECTRIC COMMUNICATION TECHNIQUE ELECTRIC DIGITAL DATA PROCESSING ELECTRICITY PHYSICS SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR TELEPHONIC COMMUNICATION TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION WIRELESS COMMUNICATIONS NETWORKS |
title | Threshold based fraud management for cloud computing system |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-03T07%3A24%3A38IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Gelbourt,%20Shachar&rft.date=2022-05-17&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS11337072B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |