Patents by Inventor Philip Lindblad
Philip Lindblad has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250086675Abstract: System and methods are provided for mitigating click farm fraud by receiving network data and sensor data from a plurality of computing devices, extracting one or more features from the sensor data and the network data for each of the devices. The features represent one or more of a local physical environment and communication channel environment associated with a device of the plurality of computing devices. The method includes determining one or more subsets of the plurality of computing devices based on environmental and network characteristics of the one or more features, identifying, based on the one or more subsets and detected influencer activities, co-located computing devices, and responsive to determining that a count of the co-located computing devices is greater than a predetermined count, sending a session terminating command to one or more servers in communication with the co-located computing devices to mitigate click farm fraudulent activities.Type: ApplicationFiled: September 7, 2023Publication date: March 13, 2025Inventors: Tony Libell, Per Burström, Philip Lindblad, Lancelot Pregniard
-
Patent number: 12197722Abstract: Systems and methods are provided for detecting when a user uses one or both hands to interact with a device having a physical or virtual keyboard. In one implementation, one-handed typing is determined by analyzing intragroup and intergroup keyflight timing distributions between different groups of clustered keys, each cluster having distinctly different proximal properties. A statistical measure made between the intragroup and intergroup keyflight timing distributions may be performed to determine one-handed or two-handed typing input, which may be used to enhance a user experience by adapting a viewing or input element to an appropriate hand setting. In another implementation, the detection may be used as input to determine a likelihood of suspected coaching fraud for online banking applications. In yet another implementation, the detection of one-handed typing is used as an input to bot detection algorithms to reduce false positives from other modalities.Type: GrantFiled: September 25, 2023Date of Patent: January 14, 2025Assignee: LEXISNEXIS RISK SOLUTIONS FL INC.Inventors: Julian Breitling, Philip Lindblad, Per Burström
-
Publication number: 20240281507Abstract: Systems and methods are provided for improving behavioral biometrics scoring accuracy. A method includes receiving streamed behavioral biometrics data and associated contextual data, determining a first trust score by evaluating the streamed behavioral biometric data, and if the first trust score is below a first predetermined value, separating the streamed behavioral biometrics data into contextualized bins corresponding to the contextual data to produce binned data. The contextualized bins can include a target identifier such as a data field; or a data type field, an area of a browser window, a task, and/or a physical activity. Responsive to a first threshold amount of accrued binned data, the method can include evaluating the binned data to determine a second trust score that is context-aware and sending an alert to the enterprise server responsive to the second trust score being below a second predetermined value.Type: ApplicationFiled: February 21, 2023Publication date: August 22, 2024Inventors: Per Burström, Philip Lindblad, Tony Libell, Julian Breitling, Mikael Åhlén
-
Publication number: 20240265075Abstract: Systems and methods are provided for automatically generating unique identifiers for text fields and determining the type of information of a specific text field in an online user journey. The method identifies a data type identifier for each text field by training on historical sessions from many user interactions to group text fields, even with randomly generated IDs, and based on the metadata associated with the text fields. The method can predict the data type for new data and can enable the automatic selection and application of a correct keystroke dynamics algorithm for authentication and fraud detection.Type: ApplicationFiled: October 23, 2023Publication date: August 8, 2024Inventors: Julian Breitling, Philip Lindblad, Per Burström, Tony Libell
-
Publication number: 20240256643Abstract: Systems and methods are provided for behavioral biometrics retraining on credential input provided by a user for authentication. A method includes receiving a successful login indication that a user has been authenticated for access on the enterprise server based on the credential input. The method includes receiving metadata and user behaviometric data corresponding to the credential input. The method includes computing, with a behavioral scoring module, a metadata similarity score by comparing the received metadata to metadata previously stored in a user profile, resetting at least a portion of previously stored user profile data based on receiving the successful login indication and the metadata similarity score being less than a threshold value, and training user profile data using the received user behaviometric data based on receiving the successful login indication and the metadata similarity score being less than a threshold value.Type: ApplicationFiled: January 26, 2023Publication date: August 1, 2024Inventors: Per Burström, Matthias Baumhof, Ingo Deutschmann, Philip Lindblad, Tony Libell
-
Publication number: 20240256120Abstract: Systems and methods are provided for detecting when a user uses one or both hands to interact with a device having a physical or virtual keyboard. In one implementation, one-handed typing is determined by analyzing intragroup and intergroup keyflight timing distributions between different groups of clustered keys, each cluster having distinctly different proximal properties. A statistical measure made between the intragroup and intergroup keyflight timing distributions may be performed to determine one-handed or two-handed typing input, which may be used to enhance a user experience by adapting a viewing or input element to an appropriate hand setting. In another implementation, the detection may be used as input to determine a likelihood of suspected coaching fraud for online banking applications. In yet another implementation, the detection of one-handed typing is used as an input to bot detection algorithms to reduce false positives from other modalities.Type: ApplicationFiled: September 25, 2023Publication date: August 1, 2024Inventors: Julian Breitling, Philip Lindblad, Per Burström
-
Publication number: 20240259394Abstract: The systems and methods are provided that can enable the detection of certain modes of online interactions carried out by a user's computing device, for example, when an online app or webpage of an enterprise is accessed by the user's computing device. Certain exemplary implementations may utilize collector code that resides in the app or webpage opened by users accessing the enterprise service to measure and collect timing data to detect whether the user's computing device or associated browsing session is subjected to modes of manipulation such as the user browser's privacy mode being engaged, malware interacting with the browsing session, and/or some type of aggregator interacting with the browsing session. Such modes of manipulation can impact the utility and accuracy of certain forms of behavioral biometric algorithms, particularly those that utilize users' typing, timing, keystroke dwell, etc.Type: ApplicationFiled: January 26, 2023Publication date: August 1, 2024Inventors: Per Burström, Philip Lindblad, Mikael Åhlén
-
Patent number: 10728279Abstract: Detecting unauthorized access to a device is detected in embodiments of the disclosed technology. After downloading a webpage, code is executed in a browser to scan network ports and determine which ports are open. Further webpage content sent from a web server is determined and/or modified in embodiments of the disclosed technology based on which ports are open. In some embodiments, when a particular port or ports are already in use it is determined that a malfeasant actor has access to the end user device and as such, sensitive data or secure data which is intended for a specific user is no longer sent to the end user device.Type: GrantFiled: March 13, 2020Date of Patent: July 28, 2020Assignee: BEHAVIOSEC INCInventors: Ingo Deutschmann, Per Burstrom, Philip Lindblad, David Julitz
-
Publication number: 20200213333Abstract: Detecting unauthorized access to a device is detected in embodiments of the disclosed technology. After downloading a webpage, code is executed in a browser to scan network ports and determine which ports are open. Further webpage content sent from a web server is determined and/or modified in embodiments of the disclosed technology based on which ports are open. In some embodiments, when a particular port or ports are already in use it is determined that a malfeasant actor has access to the end user device and as such, sensitive data or secure data which is intended for a specific user is no longer sent to the end user device.Type: ApplicationFiled: March 13, 2020Publication date: July 2, 2020Inventors: Ingo Deutschmann, Per Burstrom, Philip Lindblad, David Julitz
-
Patent number: 10657234Abstract: A computer-implemented method, program-code, web-client device and computer system to realize and guard over a secure input routine based on their behavior.Type: GrantFiled: December 4, 2017Date of Patent: May 19, 2020Assignee: BEHAVIOMETRICS ABInventors: Ingo Deutschmann, Tony Libell, Johanna Skarpman Munter Sundholm, Peder Nordström, Philip Lindblad
-
Patent number: 10630718Abstract: Detecting unauthorized access to a device is detected in embodiments of the disclosed technology. After downloading a webpage, code is executed in a browser to scan network ports and determine which ports are open. Further webpage content sent from a web server is determined and/or modified in embodiments of the disclosed technology based on which ports are open. In some embodiments, when a particular port or ports are already in use it is determined that a malfeasant actor has access to the end user device and as such, sensitive data or secure data which is intended for a specific user is no longer sent to the end user device.Type: GrantFiled: November 27, 2018Date of Patent: April 21, 2020Assignee: BEHAVIOSEC INCInventors: Ingo Deutschmann, Per Burstrom, Philip Lindblad, David Julitz
-
Publication number: 20190147451Abstract: Two user-authenticated sessions are compared between two different servers or users of two different financial institutions. Based on comparisons of sanitized key press timings, position or motion-related inputs, and other inputs it is determined that the sessions were/are with a same user. When this user is identified as a fraudulent actor or malfeasant with one server or banking institution, this data is shared, without sharing confidential information, with the other server or financial institution so that despite a lack of identifying the user himself/herself, the second server or financial institution can modify data sent to this user to prevent fraud and unauthorized access to data of another.Type: ApplicationFiled: January 14, 2019Publication date: May 16, 2019Inventors: Ingo Deutschmann, Per Burstrom, Philip Lindblad, David Julitz
-
Publication number: 20190124092Abstract: Detecting unauthorized access to a device is detected in embodiments of the disclosed technology. After downloading a webpage, code is executed in a browser to scan network ports and determine which ports are open. Further webpage content sent from a web server is determined and/or modified in embodiments of the disclosed technology based on which ports are open. In some embodiments, when a particular port or ports are already in use it is determined that a malfeasant actor has access to the end user device and as such, sensitive data or secure data which is intended for a specific user is no longer sent to the end user device.Type: ApplicationFiled: November 27, 2018Publication date: April 25, 2019Inventors: Ingo Deutschmann, Per Burstrom, Philip Lindblad, David Julitz
-
Publication number: 20190065712Abstract: A computer-implemented method, program-code, web-client device and computer system to realize and guard over a secure input routine based on their behavior.Type: ApplicationFiled: December 4, 2017Publication date: February 28, 2019Applicant: Behaviometrics ABInventors: Ingo Deutschmann, Tony Libell, Johanna Skarpman Munter Sundholm, Peder Nordström, Philip Lindblad
-
Publication number: 20160349052Abstract: Estimation of gyroscopic data on a mobile device is determined based on receiving a plurality of magnetometer-angle vectors from a magnetometer and receiving a plurality of accelerometer-angle vectors from an accelerometer. A plurality of matrices transform a coordinate system of the mobile device to an Earth coordinate system based on the magnetometer-angle vectors and the accelerometer-angle vectors. A plurality of estimated gyroscope vectors are then determined based on the plurality of matrices. A computer-implemented method), a program-code, and program-product, and devices for producing same are further disclosed herein.Type: ApplicationFiled: July 15, 2016Publication date: December 1, 2016Inventors: Ingo Deutschmann, Philip Lindblad