Website verification platform

ABSTRACT

A device may provide a verification indicator to a device associated with a website. The verification indicator may be associated with verifying access to the website. The device may detect that the verification indicator has been associated with code associated with the website based on processing the code. The device may provide a script to the device. The script may be included in the code. The script may be associated with monitoring operations of the website. The device may receive data related to the operations. The device may analyze the data using a model. The model may be associated with making a prediction related to at least one of: a value to be received via the website, or traffic associated with the website. The device may perform one or more actions related to the website based on a result of the analyzing.

RELATED APPLICATION

This application is a continuation of U.S. patent application Ser. No.16/406,474, filed May 8, 2019 (now U.S. Pat. No. 10,581,866), which isincorporated herein by reference.

BACKGROUND

An owner of a website is a person who is responsible for maintaining thewebsite. For example, the owner is responsible for ensuring that webservers, software, and/or the like are operating correctly, fordesigning the website, for generating and revising web pages of thewebsite, and/or the like. The owner and/or other individuals associatedwith the owner may access the website, or an administrator account,using a set of credentials.

SUMMARY

According to some implementations, a method may include providing, by adevice, a verification indicator to another device associated with awebsite, wherein the verification indicator is associated with verifyingaccess to the web site by an individual associated with the otherdevice; processing, by the device and after providing the verificationindicator to the other device, code associated with the website;detecting, by the device and to verify access to the website, that theverification indicator has been associated with the code based onprocessing the code; providing, by the device and based on detecting theverification indicator, a script to the other device, wherein the scriptis to be included in the code associated with the website, wherein thescript is associated with monitoring operations of the website;receiving, by the device and after providing the script to the otherdevice, data related to the operations of the website; analyzing, by thedevice, the data related to the operations of the website using a modelafter receiving the data related to the operations of the website; andperforming, by the device, one or more actions related to the websitebased on a result of the analyzing.

According to some implementations, a device may include one or morememories; and one or more processors, communicatively coupled to the oneor more memories, configured to: generate, to verify access to a websiteby an individual associated with the website, a verification indicator;provide, after generating the verification indicator, the verificationindicator to another device associated with the website; access, afterproviding the verification indicator to the other device, the websiteusing a uniform resource identifier (URI) or a set of credentialsassociated with the website; process, after accessing the website, codeassociated with the website; detect, based on processing the code, thatthe verification indicator has been associated with the code; provide,based on detecting the verification indicator, a script to the otherdevice, wherein the script is to be included in the code associated withthe website, wherein the script is associated with monitoring operationsof the website; receive, after providing the script to the other device,data related to the operations of the website; analyze the data relatedto the operations of the website using a model after receiving the datarelated to the operations of the website; and perform one or moreactions related to the website based on a result of the analyzing.

According to some implementations, a non-transitory computer-readablemedium may store one or more instructions. The one or more instructions,when executed by one or more processors of a device, may cause the oneor more processors to: provide a verification indicator to a deviceassociated with a website, wherein the verification indicator isassociated with verifying access to the website by an individualassociated with the device; detect, after providing the verificationindicator and to verify access to the website, that the verificationindicator has been associated with code associated with the websitebased on processing the code; provide, based on detecting theverification indicator, a script to the device, wherein the script is tobe included in the code associated with the website, wherein the scriptis associated with monitoring operations of the website; receive, afterproviding the script to the device, data related to the operations ofthe website; analyze, after receiving the data, the data related to theoperations of the website using a model, wherein the model is associatedwith making a prediction related to at least one of: a value to bereceived via the website, or traffic associated with the website; andperform one or more actions related to the website based on a result ofthe analyzing.

BRIEF DESCRIPTION OF THE DRAWINGS

FIGS. 1A-2B are diagrams of one or more example implementationsdescribed herein.

FIG. 3 is a diagram of an example environment in which systems and/ormethods described herein may be implemented.

FIG. 4 is a diagram of example components of one or more devices of FIG.3.

FIGS. 5-7 are flow charts of one or more example processes related to awebsite verification platform.

DETAILED DESCRIPTION

The following detailed description of example implementations refers tothe accompanying drawings. The same reference numbers in differentdrawings may identify the same or similar elements.

Various metrics are used to assess operations of a website. For example,an amount of visitor traffic to the website during a time period is usedto assess a popularity of the website. An owner of the website may wantto automatically provide data related to the various metrics to anorganization for analysis. However, prior to receiving the data and/orcommunicating with an individual purporting to be the owner of thewebsite, the organization needs to verify that the individual is theowner of the website. Currently, verifying ownership of a website isdone via lookup of ownership records, which are often inaccurate, and/orprovisioning of a set of credentials to the organization, which makesthe set of credentials susceptible to theft by a malicious actor. Thisconsumes computing resources of devices of the organization viainaccurate verification of ownership of a website, via slow verificationof ownership of the website, and/or via insecure verification of thewebsite.

Some implementations described herein provide a website verificationplatform that is capable of automatically and securely verifyingownership of a website. For example, the website verification platformmay provide a verification indicator to an individual and theverification platform may verify ownership of the website based oninclusion of the verification indicator in code associated with thewebsite, based on inclusion of the verification indicator in a file thatstores the code, and/or the like. This conserves computing resourcesthat would otherwise be consumed using a less efficient or less accurateprocess for verifying ownership of the website (e.g., performing alookup of the ownership). In addition, this reduces or eliminates a needfor a set of credentials to be provided to an organization forverification of ownership of a website, thereby improving a security ofverifying ownership of the website relative to other processes forverifying ownership. In addition, the website verification platform maybe capable of receiving data related to various metrics related tooperations of the website even though an organization associated withthe website verification platform is not the owner of the website, andperforming various analyses not previously possible. For example, thewebsite verification platform may perform analyses related to makingunderwriting, line of credit, or service offering determinations for thewebsite (e.g., using one or more machine learning models). This expandsa set of analyses and/or services that can be provided to an owner of awebsite.

FIGS. 1A-1D are diagrams of one or more example implementations 100described herein. As shown in FIGS. 1A-1D, example implementation(s) 100include a user device, a server device, and a website verificationplatform. The website verification platform may be associated with anorganization, such as an organization that verifies ownership ofwebsites on behalf of other organizations, an organization that providesservices to a website and/or an owner of a website after verification ofownership of the website, and/or the like.

As shown in FIG. 1A, and by reference number 105, the server device mayhost a website (e.g., a collection of related web pages that includemultimedia content). The server device may be owned by a party that isdifferent than an owner of the website. The server device may storefolders of various files related to publishing the website on theInternet. For example, the folders may store file folders with codedocuments, images, videos, text files, and/or the like that are used togenerate the various web pages of the website and/or to populate thevarious web pages with multimedia content.

As shown by reference number 110, the user device may provide, to thewebsite verification platform, a request for verification of thewebsite. For example, the user device may provide the request based oninput from a user of the user device (e.g., based on the user using aninput component of the user device to interact with a user interfaceprovided for display via the user device). The request may include asubmission of a webform, an email, a text message, and/or the like. Therequest may include information that identifies the user device thatsent the request, information that identifies the user of the userdevice, a uniform resource identifier (URI) for the website to beverified (e.g., a uniform resource locator (URL)), a timestamp for therequest, a set of credentials for accessing the website, and/or thelike.

As shown by reference number 115, the website verification platform maygenerate a verification indicator to be used to verify access to and/orownership of the website by the individual submitting the request forverification of the website. For example, the website verificationplatform may generate the verification indicator after receiving therequest.

The verification indicator may include a unique identifier to beincluded in commented code associated with the website (e.g., a uniqueset of characters to be included in a commented section of code of thewebsite), new code that causes a particular web page associated with thewebsite to be generated when executed or parsed (e.g., the new code,when included in existing code or a particular folder associated withthe website, may cause a new web page to be generated for the website),a text file to be stored in association with the code on the serverdevice that hosts the website, and/or the like. The verificationindicator may be used to verify ownership of and/or access to a websiteby an individual. For example, an individual who is not an owner of thewebsite, or who is not someone with authorized access to the website(e.g., with access to an administrator account associated with thewebsite), might not be capable of including the verification indicatorin code associated with the website or a file folder associated with thewebsite (e.g., based on lacking credentials for accessing the website,based on lacking knowledge of the appropriate location to include theverification indicator, and/or the like).

Additionally, or alternatively, the verification indicator may be uniqueto a request, to a website, to an individual that submitted the request,to a device that submitted the request, and/or the like. In this way,and as described elsewhere herein, the website verification platform maybe capable of identifying a particular request, website, individual,device, and/or the like for which access was verified based on theverification indicator ultimately included in code and/or a file folderassociated with the website. This improves a security of verifyingaccess to and/or ownership of the website, reduces or eliminates a riskof a person-in-the-middle attack that could occur during otherverification methods, and/or the like.

The website verification platform may determine, prior to generating theverification indicator, a particular type of verification indicator touse as the verification indicator. For example, the website verificationplatform may determine whether to generate a unique identifier, newcode, a text file, and/or the like as the verification indicator priorto generating the verification indicator. For example, the websiteverification platform may determine a particular type of verificationindicator to use based on a security level associated with an accountassociated with the website. Continuing with the previous example, ahigh security level may be associated with generating a uniqueidentifier to be included in the code of the website, whereas a mediumor low security level may be associated with generating new code (e.g.,a non-unique code snippet) to be included in a file folder associatedwith the website.

Additionally, or alternatively, and as another example, the websiteverification platform may determine a particular type of verificationindicator to use based on the code of the website. Continuing with theprevious example, a website may be coded using one or more programminglanguages, such as hypertext markup language (HTML), JavaScript, and/orthe like, and the website verification platform may determine togenerate the verification indicator such that the verification indicatorconforms with the particular programming language in which theverification indicator is to be included (e.g., may determine togenerate a commented snippet of HTML code if the verification indicatoris to be included in HTML code, may generate new snippet of JavaScriptcode if the website is coded using JavaScript, and/or the like).

When generating the verification indicator, the website verificationplatform may use information included in the request. For example, thewebsite verification platform may generate a unique identifier to beincluded in code of the website by generating a unique identifier frominformation that identifies the website, the individual associated withthe request, the user device that provided the request to the websiteverification platform, a timestamp of the request, and/or the like.Continuing with the previous example, the website verification platformmay combine this information into a single identifier using a hashfunction, by combining characters from different strings of informationinto a single string of information, and/or the like. Additionally, oralternatively, and as another example, the website verification platformmay use the URI of the website to determine a new URI for a new web pageto be generated in the case when generation of a new web page is to beused to verify access to and/or ownership of the website. Continuingwith the previous example, if a URI for a homepage of the website is“https://www.site.com/home,” then the website verification platform maydetermine a URI for a new page to be generated from the URI for thehomepage (e.g., may determine that the new page is to have a URI withthe same domain name as the homepage but a different page name, such as“https://www.site.com/accessproof”). In this case, inclusion of new codethat causes generation of the “accessproof” web page in existing codefor the website by an individual may cause the website verificationplatform to verify that the individual is an owner of and/or has accessto the website.

Additionally, or alternatively, the website verification platform mayuse pre-stored information to generate the verification indicator. Forexample, the website verification platform may store code snippets fordifferent programming languages (e.g., a code snippet that is acommented section of code, a code snippet that causes a new web page tobe generated, and/or the like), and may use this information whengenerating the verification indicator. Continuing with the previousexample, the website verification platform may select a code snippetdepending on the programming language in which the website is coded, andmay configure the code snippet for the particular website for whichaccess is to be verified (e.g., by including a unique identifier in acommented code snippet, by including a domain name for the websiteand/or a new web page in the code snippet, and/or the like). Usingpre-stored information facilitates quicker generation of a verificationindicator relative to not using pre-stored information and conservescomputing resources that would otherwise be consumed generating averification indicator without using pre-stored information.

As shown by reference number 120, the website verification platform mayprovide the verification indicator to the user device. For example, thewebsite verification platform may provide the verification indicator tothe user device after generating the verification indicator. The websiteverification platform may provide the verification indicator to the userdevice in a message (e.g., a text message, an email, and/or the like),may provide a link to download the verification indicator to the userdevice, may populate a user interface with the verification indicator(e.g., with a unique identifier, with a code snippet, and/or the like),and/or the like.

The website verification platform may provide a set of instructions withthe verification indicator to the user device. For example, the set ofinstructions may include information that identifies a particular webpage for which the verification indicator is to be included in code, aparticular file folder in which the verification indicator is to beincluded (e.g., an “Index” file folder), and/or the like. Continuingwith the previous example, the set of instructions may includeinformation instructing the user of the user device to include theverification indicator in code of a homepage of the website (e.g., whenthe verification indicator is a unique identifier), to include adocument with code for a new web page in a particular file folder withother documents for other web pages of the website (e.g., when theverification indicator is new code that causes a new web page to begenerated), and/or the like.

Turning to FIG. 1B, and as shown by reference number 125, the userdevice may provide the verification indicator to the server device. Forexample, the user device may provide the verification indicator to theserver device after receiving the verification indicator from thewebsite verification platform. Continuing with the previous example, theuser of the user device may access code and/or file folders on theserver device via a user interface, and may upload and save theverification indicator to a file folder (e.g., when the verificationindicator includes new code), may access a particular code document andmay include the verification indicator in the code document (e.g., whenthe verification indicator includes a unique identifier), and/or thelike.

As a specific example, reference number 130 shows a representation ofcode associated with a particular web page of the website. Referencenumber 135 shows that the user of the user device has included acommented code snippet in the code (identified by the delimiters “<!--”and “-->”) and that the commented code snippet includes a uniqueidentifier as a verification indicator (shown as “001KL347811”). In thisway, and as described elsewhere herein, when the website verificationplatform processes the code of the website, the website verificationplatform may detect the presence of the verification indicator based onthe delimiters in the code, may detect the particular verificationindicator, and/or the like.

As shown by reference number 140, the user device may provide, to thewebsite verification platform, an indication that the verificationindicator has been provided to the server device. For example, the userdevice may provide the indication after the user device has provided theverification indicator to the server device, after a user of the userdevice has included the verification indicator in code associated withthe website, after the user of the user device has included theverification indicator in a particular file folder associated with thewebsite, and/or the like. Continuing with the previous example, the userdevice may provide a message (e.g., a text message, an email, and/or thelike), a form submission, and/or the like to the website verificationplatform to indicate that the verification indicator has been providedto the server device.

As shown by reference number 145, the website verification platform mayaccess the website by communicating with the server device. For example,the website verification platform may access the website after receivingthe indication that the verification indicator has been provided to theserver device.

In some implementations, the website verification platform may accessthe website using a URI associated with the website (e.g., that wasincluded in the request for verification, that was generated inassociation with generating the verification indicator, and/or thelike). For example, the website verification platform may follow a URLto a particular web page of the website to access the website. In thiscase, the website verification platform may process code, text, images,and/or the like of the website to detect the verification indicator. Forexample, the website verification platform may scrape or crawl the code,the text, the images, and/or the like of the website to detect theverification indicator in the code, the text, the images, and/or thelike. Continuing with the previous example, the website verificationplatform may process the code to identify a particular unique identifierincluded in the code, the text, the images, and/or the like, may processthe code to detect if the code causes a particular web page to begenerated (e.g., based on parsing and/or executing the code), and/or thelike. This reduces or eliminates a need for a user of the user device toprovide a set of credentials to the website verification platform,thereby reducing or eliminating a risk of theft of the set ofcredentials during provisioning of the set of credentials to the websiteverification platform.

In some implementations, the website verification platform may accessthe website using a set of credentials associated with the website(e.g., that were provided to the website verification platform with therequest for verification). For example, the website verificationplatform may provide the set of credentials to the server device to loginto an administrator account associated with the server device, toaccess program code associated with the website, and/or the like. Inthis case, the website verification platform may process a set of files(or code-related documents stored in the set of files) associated withthe website after accessing the website. For example, the websiteverification platform may process the set of files to detect inclusionof the verification indicator in the set of files. Continuing with theprevious example, the website verification platform may process the setof files to detect a particular file included in the set of files, todetect if the set of files (or code stored in the set of files) cause aparticular web page to be generated (e.g., by executing and/or parsingthe code), and/or the like. This provides a multi-factor verification ofaccess to and/or ownership of the website, which improves a securityand/or accuracy of verifying access to and/or ownership of the website.For example, in this case, not only does an individual need to have aset of credentials for accessing the website, but the individual alsoneeds to have placed the verification indicator in the proper location(e.g., a malicious actor who does not administer the website may nothave the skills and/or knowledge of the website to place theverification indicator in the proper location).

When processing the code, the website verification platform may executethe code, may parse the code (e.g., by identifying delimiters in thecode, using a text processing technique, and/or the like), and/or thelike. For example, the website verification platform may cause a webpage to be generated, may identify particular delimiters in the code(depending on a syntax of the programming language used for the code),and/or the like. When processing the set of files, the websiteverification platform may parse file names of the set of files, fileextensions, information included in the set of files (e.g., code, textdocumentation for the code, and/or the like), and/or the like using atext processing technique. For example, the website verificationplatform may identify particular files or types of files included in theset of files based on terms, or sets of characters, included in the filenames, file extensions, information, and/or the like associated with theset of files.

In some implementations, the web site verification platform may detectthe verification indicator based on a particular delimiter included inthe code. For example, the website verification platform may detect theverification indicator based on a set of delimiters that identifies thepresence of the verification indicator, such as a set of delimitersassociated with a particular code snippet, with a unique identifier,and/or the like. Additionally, or alternatively, the websiteverification platform may detect the verification indicator based on aparticular tag indicator included in the code. For example, and based onthe syntax of the programming language used for the website, particularstarting and ending tag indicators may be included in the code toindicate a presence of a verification indicator and the websiteverification platform may detect the verification indicator between theparticular starting and ending tag indicators, based on the presence ofthe particular starting and ending tag indicators, and/or the like.Additionally, or alternatively, the website verification platform maydetect the verification indicator based on generation of a particularweb page associated with the website. For example, and based onexecuting and/or parsing the code and/or the set of files, the websiteverification platform may detect that the code and/or the set of fileswould cause a particular web page to be generated, such as a new webpage associated with new code included in the code and/or the set offiles (e.g., the web page https://www.site.com/accessproof describedabove).

Referring to the specific example described above in connection withreference numbers 130 and 135, the website verification platform mayprocess the code shown by reference number 130 in the manner describedabove. In this case, the website verification platform may detect thatthe code includes commented code (by detecting the “<!--” and “-->”delimiters). In addition, the website verification platform may detectthat the commented code includes a unique identifier as the verificationindicator (shown as “001KL347811”).

The website verification platform may determine, after detecting theverification indicator and/or based on the verification indicator, tocommunicate with a particular device. For example, the websiteverification platform may determine that the device that provided therequest for which the verification indicator included in the code and/orthe set of files is associated with an individual for which ownership ofand/or access to the website is verified. In some implementations, andsimilar to that described elsewhere herein, the verification indicatormay indicate the device that provided the request for which theverification indicator was generated, and the website verificationplatform may determine to communicate with the device based on theverification indicator detected. For example, and as described above,the verification indicator may be unique to a request for verification,and as a result, may indicate a particular device, individual, and/orthe like associated with the request. In this case, the websiteverification platform may determine to communicate with the other devicebased on the particular verification indicator detected (e.g., based ona unique identifier for the device, the individual, and/or the like usedto form the verification indicator).

Referring to the specific example described above in connection withreference numbers 130 and 135, the website verification platform maydetermine to communicate with the user device based on the uniqueidentifier (shown as “001KL347811”) being included in the code. Forexample, the unique identifier may identify the user device as thedevice that requested the verification, and the website verificationplatform may determine to communicate with the user device, even ifother devices made requests for verification for the same website. Thisimproves a security of communications post-verification by reducing oreliminating communication with devices that may be associated withfraudulent or malicious requests for verification.

In the case where the website verification platform detects multipleverification indicators, the website verification platform may requestadditional information from device(s) associated with the multipleverification indicators to verify access to the website, such as byrequesting a set of credentials associated with the website from thedevice(s). For example, the website verification platform may send amessage to the device(s), may cause a user interface to be provided fordisplay via the device(s), and/or the like to request input of the setof credentials. In the case where the website verification platformfails to detect the verification indicator, the website verificationplatform may determine to not perform further operations related toverifying access to the website, may send a message to the deviceassociated with a request for verification indicating that the websiteverification platform failed to detect a verification indicator, and/orthe like.

Turning to FIG. 1C, and as shown by reference number 150, the websiteverification platform may provide, to the user device, a script. Forexample, the website verification platform may provide the script afteraccessing the website, after detecting the verification indicator, afterdetermining to communicate with the user device, and/or the like. Insome implementations, the script is to be included in the codeassociated with the website. For example, the script may include a codesnippet that is to be included in the code associated with the website.In some implementations, the script may be associated with monitoringoperations of the website, with gathering data related to the operationsof the website and providing the data to a device, and/or the like. Forexample, when the script is executed by the server device, the scriptmay cause the server device to gather data related to the operations ofthe website, to provide the data to another device (e.g., the websiteverification platform or another server device), and/or the like. Thewebsite verification platform may provide a set of instructions inassociation with providing the script. For example, the set ofinstructions may identify a location in the code in which to include thescript.

As shown by reference number 155, the user device may provide the scriptto the server device. For example, the user device may provide thescript to the server device after receiving the script from the websiteverification platform, in a manner similar to that described above withregard to providing the verification indicator, and/or the like.Reference number 160 shows a representation of code associated with thewebsite. As shown by reference number 165, the script may be included inthe code associated with the website based on the user device providingthe script to the server device. For example, a user of the user devicemay include the script in code for a particular web page of the websitevia an administrator account.

As shown by reference number 170, the server device may provide, to thewebsite verification platform, data related to operations of thewebsite. For example, execution of the script may cause the serverdevice to provide data related to the operations of the website to thewebsite verification platform after the server device receives thescript from the user device. The server device may provide the data inreal-time or near real-time (e.g., as the data is generated), in batch,based on receiving a request for the data from the website verificationplatform, and/or the like. The data may be related to various metrics,such as a quantity of visitors to the website, a quantity oftransactions completed via the website, a dollar value of thetransactions, a click through rate of advertisements displayed on thewebsite, a quantity of different items and/or services sold through thewebsite, and/or the like. The data may include thousands, millions, ormore data elements for hundreds, thousands, or more metrics. In thisway, the data that the website verification platform receives may be toolarge for conventional computing resources to process.

Turning to FIG. 1D, and as shown by reference number 175, the websiteverification platform may analyze the data using a model to make aprediction. For example, the website verification platform may processthe data after receiving the data from the server device. The model maybe associated with making a prediction related to operations of thewebsite (e.g., output from the model may include a prediction related tooperations of the website). For example, the model may be associatedwith making a prediction related to a value to be received via thewebsite (e.g., a revenue, a profit, and/or the like of the website),traffic associated with the website (e.g., future traffic of thewebsite, a conversion rate of traffic to the website, and/or the like),a value of the website (e.g., a value of the website if the website wereto be sold, a value relative to other similar websites), and/or thelike.

To analyze the data, the website verification platform may input thedata into the model. For example, the website verification platform mayinput the data into the model after removing outliers from the data,after selecting a portion of the data from a particular time period,and/or the like. The model may process the data to identify a trend, apattern, and/or the like in the data (e.g., a trend, pattern, and/or thelike over time, during a time period, and/or the like). The model mayoutput information that identifies a prediction related to operations ofthe website based on processing the data. For example, the model mayoutput a prediction related to a value to be received via the website,traffic associated with the website, a value of the website, and/or thelike based on having been trained on trends, patterns, and/or the likeof data of other websites, based on performing a comparison of trends,patterns, and/or the like of the website and another web site, and/orthe like.

Additionally, or alternatively, the model may output a score thatidentifies a confidence level associated with the prediction (e.g., thatidentifies a degree to which the data matches historical data of one ormore other websites, that identifies a likelihood of an accuracy of theprediction, and/or the like). The website verification platform mayaggregate scores for a set of predictions related to a website. Forexample, the website verification platform may average the scores, maydetermine a weighted score, and/or the like. In some implementations,the website verification platform may use one or more scores associatedwith the website to analyze risks associated with the website. Forexample, a low confidence score associated with a prediction mayindicate a high degree of risk associated with the prediction and/orwith the website, and vice versa. Continuing with the previous example,if the model outputs a predicted value of the website but with a lowscore, the website verification platform may determine that the websiteis associated with a high degree of risk with respect to the predictedvalue of the website, and vice versa.

As described in more detail below, the website verification platform mayuse output from the model to perform various actions and/or to makevarious determinations related to the website. For example, the websiteverification platform may use a prediction and/or a corresponding scoreto make a determination regarding a risk associated with the website.Continuing with the previous example, if the prediction and/or the scorerelates to a value to be received via the website, the websiteverification platform may make a determination related to risksassociated with the value (e.g., the website verification platform maydetermine a high risk based on a prediction and/or a score failing tosatisfy a threshold, based on the prediction and/or the score indicatinga low confidence of a threshold amount of value to be received via thewebsite, and/or the like). Based on making a determination related tothe risks, the website verification platform may make determinationsrelated to underwriting a loan for the owner of the website, offering aline of credit to the owner of the website, and/or the like. Forexample, if the website verification platform makes a determination of alow risk associated with a prediction of a threshold value to bereceived, the website verification platform may determine to approve theweb site for underwriting of a loan, to approve the website for a lineof credit, and/or the like, or vice versa.

A model described herein may be a machine learning model. The websiteverification platform may generate a machine learning model via trainingof the machine learning model, may receive a trained machine learningmodel (e.g., that another device has trained), and/or the like. Forexample, the website verification platform may train the machinelearning model to output a score that indicates a confidence levelassociated with a prediction, a degree to which the data matcheshistorical data on which the machine learning model was trained, and/orthe like.

The website verification platform may train the machine learning modelon a training set of data. For example, the training set of data mayinclude historical data related to historical operations of otherwebsites, and data that identifies results of various analyses of thehistorical data, outcomes for the operations of the other websites,and/or the like. Additionally, or alternatively, when the websiteverification platform inputs the historical data into the machinelearning model, the website verification platform may input a firstportion of the historical data as a training set of data (e.g., to traina machine learning model), a second portion of the historical data as avalidation set of data (e.g., to evaluate an effectiveness of thetraining of the machine learning model and/or to identify neededmodifications to the training of the machine learning model), and athird portion of the historical data as a test set of data (e.g., toevaluate a finalized machine learning model after training andadjustments to the training using the first portion of the historicaldata and the second portion of the historical data). The websiteverification platform may perform multiple iterations of training of themachine learning model, depending on an outcome of testing of themachine learning model (e.g., by submitting different portions of thehistorical data as the training set of data, the validation set of data,and the test set of data).

When training the machine learning model, the website verificationplatform may utilize a random forest classifier technique to train themachine learning model. For example, the website verification platformmay utilize a random forest classifier technique to construct multipledecision trees during training and may output a classification ofhistorical data. Additionally, or alternatively, when training themachine learning model, the website verification platform may utilizeone or more gradient boosting techniques to generate the machinelearning model. For example, the website verification platform mayutilize an xgboost classifier technique, a gradient boosting tree,and/or the like to generate a prediction model from a set of weakprediction models.

When training the machine learning model, the website verificationplatform may utilize logistic regression to train the machine learningmodel. For example, the website verification platform may utilize abinary classification of the historical data (e.g., whether thehistorical data is indicative of a particular accurate prediction) totrain the machine learning model. Additionally, or alternatively, whentraining the machine learning model, the website verification platformmay utilize a naïve Bayes classifier to train the machine learningmodel. For example, the website verification platform may utilize binaryrecursive partitioning to divide the historical data into various binarycategories (e.g., starting with whether the historical data isindicative of a particular accurate prediction). Based on usingrecursive partitioning, the website verification platform may reduceutilization of computing resources relative to manual, linear sortingand analysis of data points, thereby enabling use of thousands,millions, or billions of data points to train a machine learning model,which may result in a more accurate machine learning model than usingfewer data points.

Additionally, or alternatively, when training the machine learningmodel, the website verification platform may utilize a support vectormachine (SVM) classifier. For example, the website verification platformmay utilize a linear model to implement non-linear class boundaries,such as via a max margin hyperplane. Additionally, or alternatively,when utilizing the SVM classifier, the website verification platform mayutilize a binary classifier to perform a multi-class classification. Useof an SVM classifier may reduce or eliminate overfitting, may increase arobustness of the machine learning model to noise, and/or the like.

In some implementations, the web site verification platform may trainthe machine learning model using a supervised training procedure thatincludes receiving input to the machine learning model from a subjectmatter expert. In some implementations, the website verificationplatform may use one or more other model training techniques, such as aneural network technique, a latent semantic indexing technique, and/orthe like. For example, the website verification platform may perform amulti-layer artificial neural network processing technique (e.g., usinga two-layer feedforward neural network architecture, a three-layerfeedforward neural network architecture, and/or the like) to performpattern recognition with regard to patterns of historical data for otherwebsites, and/or the like. In this case, use of the artificial neuralnetwork processing technique may improve an accuracy of a supervisedlearning model generated by the website verification platform by beingmore robust to noisy, imprecise, or incomplete data, and by enabling thewebsite verification platform to detect patterns and/or trendsundetectable to human analysts or systems using less complex techniques.

As an example, the website verification platform may use a supervisedmulti-label classification technique to train the machine learningmodel. For example, as a first step, the website verification platformmay map historical data associated with other websites to a set ofpreviously generated models after labeling the historical data. In thiscase, the classification of historical data and/or other websites may becharacterized as having been accurately or inaccurately predicted,and/or the like (e.g., by a technician, thereby reducing processingrelative to the website verification platform being required to analyzeeach website).

As a second step, the website verification platform may determineclassifier chains, whereby labels of target variables may be correlated(e.g., in this example, labels may be a result of a historicalprediction and correlation may refer to historical predictions common tothe different labels, and/or the like). In this case, the websiteverification platform may use an output of a first label as an input fora second label (as well as one or more input features, which may beother historical data relating to the other websites), and may determinea likelihood that a particular website is to be associated with at leastone classification based on a similarity to other websites that areassociated with similar data. In this way, the website verificationplatform transforms classification from a multilabel-classificationproblem to multiple single-classification problems, thereby reducingprocessing utilization.

As a third step, the website verification platform may determine aHamming Loss Metric relating to an accuracy of a label in performing aclassification by using the validation set of the historical data (e.g.,an accuracy with which a weighting is applied to each website andwhether each website is associated with a particular classification,results in a correct classification, and/or the like, thereby accountingfor variations among historical data for different websites).

As a fourth step, the website verification platform may finalize themachine learning model based on labels that satisfy a threshold accuracyassociated with the Hamming Loss Metric, and may use the machinelearning model for subsequent determination of other models.

As another example, the website verification platform may determine,using a linear regression technique, that a threshold percentage ofvalues of data elements, in a set of values of data elements, do notindicate a particular or threshold likelihood for a prediction, and maydetermine that those values of data elements are to receive relativelylow association scores. In contrast, the website verification platformmay determine that another threshold percentage of values of dataelements indicates a particular or threshold likelihood for theprediction, and may assign a relatively high association score to thosevalues of data elements. Based on the characteristics of the dataelements indicating a likelihood of prediction, or not, the websiteverification platform may generate the model and may use the model foranalyzing new data elements related to a new website that the websiteverification platform receives.

Accordingly, the website verification platform may use artificialintelligence techniques, machine learning techniques, deep learningtechniques, and/or the like to determine a likelihood of an accurateprediction for a website, as described herein.

In some implementations, the web site verification platform may generatea model and may use the model to perform various processing describedherein. For example, based on historical data relating to hundreds,thousands, millions or more websites, the website verification platformmay determine a likelihood of an accurate prediction for a website. Inthis case, the model may be an item-based collaborative filtering model,a single value decomposition model, a hybrid recommendation model,and/or another type of model that enables various determinationsdescribed herein based on data, metadata, indicators, and/or the like.

As shown by reference number 180, the website verification platform mayperform one or more actions. For example, the website verificationplatform may perform the one or more actions after analyzing the datausing the model. Continuing with the previous example, the websiteverification platform may perform the one or more actions based on aresult of analyzing the data using the model (e.g., based on aprediction output by the model, based on a score associated with aprediction, and/or the like).

In some implementations, the web site verification platform maydetermine a set of services to be offered to the individual associatedwith the website (e.g., that owns and/or has access to the website). Forexample, the set of services may include marketing services, line ofcredit services, loan services, and/or the like based on a set ofpredictions and/or scores related to the website. In this case, thewebsite verification platform may generate a report that includesinformation identifying the set of services and may provide the reportto the user device for display.

Additionally, or alternatively, the website verification platform maycause an individual associated with the website (e.g., an owner of thewebsite) and/or the website to be approved or denied for a line ofcredit, to be approved or denied for loan underwriting, and/or the likebased on a set of predictions and/or scores associated with the website.For example, if a set of predictions and/or corresponding scoresindicate a threshold amount of risk associated with the website, thewebsite verification platform may cause the individual and/or thewebsite to be approved or denied for the line of credit, for the loanunderwriting, and/or the like. As a specific example, the set ofpredictions may indicate a low predicted value of the website, or thecorresponding scores may indicate a low confidence level associated withthe predicted value of the website. In this case, the websiteverification platform may cause the individual and/or the website to bedenied for the line of credit, for the loan underwriting, and/or thelike, or vice versa. In some implementations, the website verificationplatform may configure information in a data structure that indicatesthat the individual and/or the website has been approved or denied forthe line of credit, for the loan underwriting, and/or the like. Forexample, the data structure may be stored by the individual and/or thewebsite verification platform or by another device. In someimplementations, the web site verification platform may send a messageto the user device to indicate whether the individual and/or the websitehas been approved or denied.

Additionally, or alternatively, the website verification platform maygenerate a report that includes information identifying the result ofthe analyzing. For example, the website verification platform maygenerate a report that includes information identifying variouspredictions and/or corresponding scores output by the model. In someimplementations, the website verification platform may provide thereport for display via the user device after generating the report.

Additionally, or alternatively, the website verification platform maytrigger an alarm. For example, the website verification platform maytrigger an alarm in an account, on a device, and/or the like thatindicates a set of predictions for a website and/or corresponding scoresfor the set of predictions, a particular result of analyzing the data,and/or the like. Additionally, or alternatively, the websiteverification platform may populate an interface associated with anaccount that indicates a set of predictions, corresponding scores forthe set of predictions, approval or denial results, and/or the like forthe website. For example, the account may be associated with anapplication for a line of credit, for loan underwriting, and/or thelike.

Additionally, or alternatively, the website verification platform mayflag a website for manual review. For example, the website verificationplatform may flag the website based on the website being approved, beingdenied, having a score within a threshold of being approved or denied,and/or the like. Continuing with the previous example, the websiteverification platform may flag the website by configuring information ina data structure that identifies the website, by configuring anindicator to be provided for display in an account of an individual toperform the manual review, and/or the like.

Additionally, or alternatively, the website verification platform maycause a value to be transferred to an account associated with thewebsite. For example, the web site verification platform may cause anamount of money to be transferred from another account to the account bysending a set of instructions to various devices associated with theaccounts. In some implementations, the website verification platform mayrequest approval of the transfer from an individual by sending a messageto a device associated with the individual, by configuring a userinterface with the request, and/or the like.

In this way, the website verification platform provides a tool that canbe used to more quickly, more accurately, and more securely verifyownership of and/or access to a website's data and/or code relative toother ways of verifying ownership and/or access. This conservesprocessing resources that would otherwise be consumed as a result of aninaccurate verification (e.g., resulting in a need to re-verify), due tomalicious actors that may obtain sensitive information during theverification process, and/or the like. In addition, in this way, thewebsite verification platform provides a tool that can be used toanalyze website analytics as part of operations for determining loanunderwriting risks, line of credit risks, and/or the like (e.g., inreal-time or near real-time). This facilitates analyses, generation ofpredictions, and/or the like for a website in a manner not previouslypossible.

As indicated above, FIGS. 1A-1D are provided as one or more examples.Other examples may differ from what is described with regard to FIGS.1A-1D.

FIGS. 2A and 2B are diagrams of one or more example implementations 200described herein. As shown in FIGS. 2A and 2B, implementation(s) 200include a user device, a server device, and a website verificationplatform, similar to that described elsewhere herein.

As shown by reference number 205, the user device may provide a requestfor verification and a set of credentials in a manner similar to thatdescribed elsewhere herein. For example, the request may be associatedwith verifying access to and/or ownership of a website and the set ofcredentials may be associated with accessing the website. As shown byreference number 210, the website verification platform may access thewebsite using the set of credentials in a manner similar to thatdescribed elsewhere herein. For example, the website verificationplatform may follow a URL to a web page associated with accessing codeand/or files associated with the website (e.g., to a web page associatedwith an administrator account of the website), and may provide the setof credentials to the server device to access the code and/or the files(e.g., by inputting the set of credentials into a user interface, bysending the set of credentials to the server device in a message, and/orthe like).

As shown by reference number 215, after accessing the website, thewebsite verification platform may provide a script to the server devicein a manner similar to that described elsewhere herein. For example, thewebsite verification platform may identify a particular document of codein which to include the script based on a name of the particulardocument (e.g., a name that was provided to the website verificationplatform from a user of the user device, a name that includes aparticular term or phrase, such as “index” or “homepage,” and/or thelike), may identify a particular location within the document of code toinclude the script (e.g., may identify a beginning of the code in thedocument, may identify a particular tag indicator in the code, and/orthe like as the location), and may include the script in the document ofcode. In this way, the website verification platform may configure codeassociated with the website with a script.

Turning to FIG. 2B, and as shown by reference number 220, the serverdevice may provide, to the website verification platform, data relatedto operations of the website in a manner similar to that describedelsewhere herein. For example, the server device may provide the databased on the script being included in the code of the website. As shownby reference number 225, the website verification platform may analyzethe data using a model to make a prediction in a manner similar to thatdescribed elsewhere herein. For example, the website verificationplatform may analyze the data after receiving the data. As shown byreference number 230, the website verification platform may perform oneor more actions in a manner similar to that described elsewhere herein.For example, the website verification platform may perform the one ormore actions after analyzing the data.

As indicated above, FIGS. 2A and 2B are provided as one or moreexamples. Other examples may differ from what is described with regardto FIGS. 2A and 2B.

FIG. 3 is a diagram of an example environment 300 in which systemsand/or methods described herein may be implemented. As shown in FIG. 3,environment 300 may include a user device 310, a server device 320, awebsite verification platform 330 hosted within a cloud computingenvironment 332 that includes a set of computing resources 334, and anetwork 340. Devices of environment 300 may interconnect via wiredconnections, wireless connections, or a combination of wired andwireless connections.

User device 310 includes one or more devices capable of receiving,generating, storing, processing, and/or providing data described herein.For example, user device 310 may include a mobile phone (e.g., a smartphone, a radiotelephone, etc.), a laptop computer, a tablet computer, ahandheld computer, a gaming device, a wearable communication device(e.g., a smart wristwatch, a pair of smart eyeglasses, and/or the like),a desktop computer, a set-top box, or a similar type of device. In someimplementations, user device 310 may provide, to website verificationplatform 330, a request for verification of access to a website and/orownership of the website, as described elsewhere herein.

Server device 320 includes one or more devices capable of receiving,generating storing, processing, and/or providing data described herein.For example, server device 320 may include a server (e.g., in a datacenter or a cloud computing environment), a data center (e.g., amulti-server micro datacenter), a workstation computer, a virtualmachine (VM) provided in a cloud computing environment, or a similartype of device. In some implementations, server device 320 may include acommunication interface that allows server device 320 to receiveinformation from and/or transmit information to other devices inenvironment 300. In some implementations, server device 320 may be aphysical device implemented within a housing, such as a chassis. In someimplementations, server device 320 may be a virtual device implementedby one or more computer devices of a cloud computing environment or adata center. In some implementations, server device 320 may receive,from user device 310, a script to be included in code associated with awebsite, as described elsewhere herein. Additionally, or alternatively,server device 320 may provide, to website verification platform 330,data related to operations of the website, as described elsewhereherein.

Site verification platform 330 includes one or more devices capable ofreceiving, generating, storing, processing, and/or providing datadescribed herein. For example, website verification platform 330 mayinclude a cloud server or a group of cloud servers. In someimplementations, website verification platform 330 may be designed to bemodular such that certain software components can be swapped in or outdepending on a particular need. As such, website verification platform330 may be easily and/or quickly reconfigured for different uses.

In some implementations, as shown in FIG. 3, website verificationplatform 330 may be hosted in cloud computing environment 332. Notably,while implementations described herein describe website verificationplatform 330 as being hosted in cloud computing environment 332, in someimplementations, website verification platform 330 may benon-cloud-based (i.e., may be implemented outside of a cloud computingenvironment) or may be partially cloud-based.

Cloud computing environment 332 includes an environment that hostswebsite verification platform 330. Cloud computing environment 332 mayprovide computation, software, data access, storage, and/or otherservices that do not require end-user knowledge of a physical locationand configuration of a system and/or a device that hosts websiteverification platform 330. As shown, cloud computing environment 332 mayinclude a group of computing resources 334 (referred to collectively as“computing resources 334” and individually as “computing resource 334”).

Computing resource 334 includes one or more personal computers,workstation computers, server devices, or another type of computationand/or communication device. In some implementations, computing resource334 may host website verification platform 330. The cloud resources mayinclude compute instances executing in computing resource 334, storagedevices provided in computing resource 334, data transfer devicesprovided by computing resource 334, etc. In some implementations,computing resource 334 may communicate with other computing resources334 via wired connections, wireless connections, or a combination ofwired and wireless connections.

As further shown in FIG. 3, computing resource 334 may include a groupof cloud resources, such as one or more applications (“APPs”) 334-1, oneor more virtual machines (“VMs”) 334-2, one or more virtualized storages(“VSs”) 334-3, or one or more hypervisors (“HYPs”) 334-4.

Application 334-1 includes one or more software applications that may beprovided to or accessed by one or more devices of environment 300.Application 334-1 may eliminate a need to install and execute thesoftware applications on devices of environment 300. For example,application 334-1 may include software associated with websiteverification platform 330 and/or any other software capable of beingprovided via cloud computing environment 332. In some implementations,one application 334-1 may send/receive information to/from one or moreother applications 334-1, via virtual machine 334-2. In someimplementations, application 334-1 may include a software applicationassociated with one or more databases and/or operating systems. Forexample, application 334-1 may include an enterprise application, afunctional application, an analytics application, and/or the like.

Virtual machine 334-2 includes a software implementation of a machine(e.g., a computer) that executes programs like a physical machine.Virtual machine 334-2 may be either a system virtual machine or aprocess virtual machine, depending upon use and degree of correspondenceto any real machine by virtual machine 334-2. A system virtual machinemay provide a complete system platform that supports execution of acomplete operating system (“OS”). A process virtual machine may executea single program, and may support a single process. In someimplementations, virtual machine 334-2 may execute on behalf of a user(e.g., a user of user device 310), and may manage infrastructure ofcloud computing environment 332, such as data management,synchronization, or long-duration data transfers.

Virtualized storage 334-3 includes one or more storage systems and/orone or more devices that use virtualization techniques within thestorage systems or devices of computing resource 334. In someimplementations, within the context of a storage system, types ofvirtualizations may include block virtualization and filevirtualization. Block virtualization may refer to abstraction (orseparation) of logical storage from physical storage so that the storagesystem may be accessed without regard to physical storage orheterogeneous structure. The separation may permit administrators of thestorage system flexibility in how the administrators manage storage forend users. File virtualization may eliminate dependencies between dataaccessed at a file level and a location where files are physicallystored. This may enable optimization of storage use, serverconsolidation, and/or performance of non-disruptive file migrations.

Hypervisor 334-4 provides hardware virtualization techniques that allowmultiple operating systems (e.g., “guest operating systems”) to executeconcurrently on a host computer, such as computing resource 334.Hypervisor 334-4 may present a virtual operating platform to the guestoperating systems, and may manage the execution of the guest operatingsystems. Multiple instances of a variety of operating systems may sharevirtualized hardware resources.

Network 340 includes one or more wired and/or wireless networks. Forexample, network 340 may include a cellular network (e.g., a long-termevolution (LTE) network, a code division multiple access (CDMA) network,a 3G network, a 4G network, a 5G network, another type of nextgeneration network, etc.), a public land mobile network (PLMN), a localarea network (LAN), a wide area network (WAN), a metropolitan areanetwork (MAN), a telephone network (e.g., the Public Switched TelephoneNetwork (PSTN)), a private network, an ad hoc network, an intranet, theInternet, a fiber optic-based network, a cloud computing network, or thelike, and/or a combination of these or other types of networks.

The number and arrangement of devices and networks shown in FIG. 3 areprovided as one or more examples. In practice, there may be additionaldevices and/or networks, fewer devices and/or networks, differentdevices and/or networks, or differently arranged devices and/or networksthan those shown in FIG. 3. Furthermore, two or more devices shown inFIG. 3 may be implemented within a single device, or a single deviceshown in FIG. 3 may be implemented as multiple, distributed devices.Additionally, or alternatively, a set of devices (e.g., one or moredevices) of environment 300 may perform one or more functions describedas being performed by another set of devices of environment 300.

FIG. 4 is a diagram of example components of a device 400. Device 400may correspond to user device 310, server device 320, websiteverification platform 330, and/or computing resource 334. In someimplementations, user device 310, server device 320, websiteverification platform 330, and/or computing resource 334 may include oneor more devices 400 and/or one or more components of device 400. Asshown in FIG. 4, device 400 may include a bus 410, a processor 420, amemory 430, a storage component 440, an input component 450, an outputcomponent 460, and a communication interface 470.

Bus 410 includes a component that permits communication among multiplecomponents of device 400. Processor 420 is implemented in hardware,firmware, and/or a combination of hardware and software. Processor 420is a central processing unit (CPU), a graphics processing unit (GPU), anaccelerated processing unit (APU), a microprocessor, a microcontroller,a digital signal processor (DSP), a field-programmable gate array(FPGA), an application-specific integrated circuit (ASIC), or anothertype of processing component. In some implementations, processor 420includes one or more processors capable of being programmed to perform afunction. Memory 430 includes a random access memory (RAM), a read onlymemory (ROM), and/or another type of dynamic or static storage device(e.g., a flash memory, a magnetic memory, and/or an optical memory) thatstores information and/or instructions for use by processor 420.

Storage component 440 stores information and/or software related to theoperation and use of device 400. For example, storage component 440 mayinclude a hard disk (e.g., a magnetic disk, an optical disk, and/or amagneto-optic disk), a solid state drive (SSD), a compact disc (CD), adigital versatile disc (DVD), a floppy disk, a cartridge, a magnetictape, and/or another type of non-transitory computer-readable medium,along with a corresponding drive.

Input component 450 includes a component that permits device 400 toreceive information, such as via user input (e.g., a touch screendisplay, a keyboard, a keypad, a mouse, a button, a switch, and/or amicrophone). Additionally, or alternatively, input component 450 mayinclude a component for determining location (e.g., a global positioningsystem (GPS) component) and/or a sensor (e.g., an accelerometer, agyroscope, an actuator, another type of positional or environmentalsensor, and/or the like). Output component 460 includes a component thatprovides output information from device 400 (via, e.g., a display, aspeaker, a haptic feedback component, an audio or visual indicator,and/or the like).

Communication interface 470 includes a transceiver-like component (e.g.,a transceiver, a separate receiver, a separate transmitter, and/or thelike) that enables device 400 to communicate with other devices, such asvia a wired connection, a wireless connection, or a combination of wiredand wireless connections. Communication interface 470 may permit device400 to receive information from another device and/or provideinformation to another device. For example, communication interface 470may include an Ethernet interface, an optical interface, a coaxialinterface, an infrared interface, a radio frequency (RF) interface, auniversal serial bus (USB) interface, a Wi-Fi interface, a cellularnetwork interface, and/or the like.

Device 400 may perform one or more processes described herein. Device400 may perform these processes based on processor 420 executingsoftware instructions stored by a non-transitory computer-readablemedium, such as memory 430 and/or storage component 440. As used herein,the term “computer-readable medium” refers to a non-transitory memorydevice. A memory device includes memory space within a single physicalstorage device or memory space spread across multiple physical storagedevices.

Software instructions may be read into memory 430 and/or storagecomponent 440 from another computer-readable medium or from anotherdevice via communication interface 470. When executed, softwareinstructions stored in memory 430 and/or storage component 440 may causeprocessor 420 to perform one or more processes described herein.Additionally, or alternatively, hardware circuitry may be used in placeof or in combination with software instructions to perform one or moreprocesses described herein. Thus, implementations described herein arenot limited to any specific combination of hardware circuitry andsoftware.

The number and arrangement of components shown in FIG. 4 are provided asan example. In practice, device 400 may include additional components,fewer components, different components, or differently arrangedcomponents than those shown in FIG. 4. Additionally, or alternatively, aset of components (e.g., one or more components) of device 400 mayperform one or more functions described as being performed by anotherset of components of device 400.

FIG. 5 is a flow chart of an example process 500 related to a websiteverification platform. In some implementations, one or more processblocks of FIG. 5 may be performed by a website verification platform(e.g., website verification platform 330). In some implementations, oneor more process blocks of FIG. 5 may be performed by another device or agroup of devices separate from or including the website verificationplatform, such as a user device (e.g., user device 310), a server device(e.g., server device 320), a computing resource (e.g., computingresource 334), and/or the like.

As shown in FIG. 5, process 500 may include providing a verificationindicator to another device associated with a website, wherein theverification indicator is associated with verifying access to thewebsite by an individual associated with the other device (block 510).For example, the website verification platform (e.g., using computingresource 334, processor 420, output component 460, communicationinterface 470, and/or the like) may provide a verification indicator toanother device associated with a website, as described above. In someimplementations, the verification indicator is associated with verifyingaccess to the website by an individual associated with the other device.

As further shown in FIG. 5, process 500 may include processing, afterproviding the verification indicator to the other device, codeassociated with the website (block 520). For example, the websiteverification platform (e.g., using computing resource 334, processor420, and/or the like) may process, and after providing the verificationindicator to the other device, code associated with the website, asdescribed above.

As further shown in FIG. 5, process 500 may include detecting, to verifyaccess to the website, that the verification indicator has beenassociated with the code based on processing the code (block 530). Forexample, the website verification platform (e.g., using computingresource 334, processor 420, and/or the like) may detect, by the deviceand to verify access to the website, that the verification indicator hasbeen associated with the code based on processing the code, as describedabove.

As further shown in FIG. 5, process 500 may include providing, based ondetecting the verification indicator, a script to the other device,wherein the script is to be included in the code associated with thewebsite, wherein the script is associated with monitoring operations ofthe website (block 540). For example, the website verification platform(e.g., using computing resource 334, processor 420, output component460, communication interface 470, and/or the like) may provide, based ondetecting the verification indicator, a script to the other device, asdescribed above. In some implementations, the script is to be includedin the code associated with the website. In some implementations, thescript is associated with monitoring operations of the website.

As further shown in FIG. 5, process 500 may include receiving, afterproviding the script to the other device, data related to the operationsof the website (block 550). For example, the website verificationplatform (e.g., using computing resource 334, processor 420, memory 430,storage component 440, input component 450, communication interface 470,and/or the like) may receive, after providing the script to the otherdevice, data related to the operations of the website, as describedabove.

As further shown in FIG. 5, process 500 may include analyzing the datarelated to the operations of the website using a model after receivingthe data related to the operations of the website (block 560). Forexample, the website verification platform (e.g., using computingresource 334, processor 420, and/or the like) may analyze the datarelated to the operations of the website using a model after receivingthe data related to the operations of the website, as described above.

As further shown in FIG. 5, process 500 may include performing one ormore actions related to the website based on a result of the analyzing(block 570). For example, the website verification platform (e.g., usingcomputing resource 334, processor 420, memory 430, storage component440, output component 460, communication interface 470, and/or the like)may perform one or more actions related to the website based on a resultof the analyzing, as described above.

Process 500 may include additional implementations, such as any singleimplementation or any combination of implementations described belowand/or in connection with one or more other processes describedelsewhere herein.

In some implementations, the web site verification platform maydetermine, prior to providing the verification indicator, a particulartype of verification indicator to use as the verification indicatorbased on at least one of the code, or a security level associated withan account associated with the website. In some implementations, thewebsite verification platform may generate, after determining theparticular type of verification indicator to use, the verificationindicator based on the code or the security level associated with theaccount.

In some implementations, the verification indicator includes at leastone of a unique identifier included in commented code, other code thatcauses a particular page, associated with the website, to be generatedwhen executed or parsed, or a text file stored in association with thecode on a server device that hosts the website. In some implementations,the website verification platform may receive, from the other device andafter providing the verification indicator to the other device, anindication that the verification indicator has been associated with thecode, and may process, after receiving the indication from the otherdevice and to verify access to the website, the code or a set of filesto detect the at least one of the unique identifier, the other code, orthe text file.

In some implementations, the website verification platform may access,after providing the verification indicator, the website using a uniformresource identifier (URI) for the website or a set of credentialsassociated with the website, and may process the code after accessingthe website using the URI or the set of credentials. In someimplementations, the website verification platform may determine, afterdetecting the verification indicator and based on the verificationindicator, to communicate with the other device, wherein theverification indicator was generated based on a unique identifier forthe other device, and may provide the script to the other device afterdetermining to communicate with the other device.

Although FIG. 5 shows example blocks of process 500, in someimplementations, process 500 may include additional blocks, fewerblocks, different blocks, or differently arranged blocks than thosedepicted in FIG. 5. Additionally, or alternatively, two or more of theblocks of process 500 may be performed in parallel.

FIG. 6 is a flow chart of an example process 600 related to a websiteverification platform. In some implementations, one or more processblocks of FIG. 6 may be performed by a website verification platform(e.g., website verification platform 330). In some implementations, oneor more process blocks of FIG. 6 may be performed by another device or agroup of devices separate from or including the website verificationplatform, such as a user device (e.g., user device 310), a server device(e.g., server device 320), a computing resource (e.g., computingresource 334), and/or the like.

As shown in FIG. 6, process 600 may include generating, to verify accessto a website by an individual associated with the website, averification indicator (block 610). For example, the websiteverification platform (e.g., using computing resource 334, processor420, memory 430, storage component 440, and/or the like) may generate,to verify access to a website by an individual associated with thewebsite, a verification indicator, as described above.

As further shown in FIG. 6, process 600 may include providing, aftergenerating the verification indicator, the verification indicator toanother device associated with the website (block 620). For example, thewebsite verification platform (e.g., using computing resource 334,processor 420, output component 460, communication interface 470, and/orthe like) may provide, after generating the verification indicator, theverification indicator to another device associated with the website, asdescribed above.

As further shown in FIG. 6, process 600 may include accessing, afterproviding the verification indicator to the other device, the websiteusing a uniform resource identifier (URI) or a set of credentialsassociated with the website (block 630). For example, the websiteverification platform (e.g., using computing resource 334, processor420, communication interface 470, and/or the like) may access, afterproviding the verification indicator to the other device, the websiteusing a uniform resource identifier (URI) or a set of credentialsassociated with the website, as described above.

As further shown in FIG. 6, process 600 may include processing, afteraccessing the website, code associated with the website (block 640). Forexample, the web site verification platform (e.g., using computingresource 334, processor 420, and/or the like) may process, afteraccessing the website, code associated with the website, as describedabove.

As further shown in FIG. 6, process 600 may include detecting, based onprocessing the code, that the verification indicator has been associatedwith the code (block 650). For example, the website verificationplatform (e.g., using computing resource 334, processor 420, and/or thelike) may detect, based on processing the code, that the verificationindicator has been associated with the code, as described above.

As further shown in FIG. 6, process 600 may include providing, based ondetecting the verification indicator, a script to the other device,wherein the script is to be included in the code associated with thewebsite, wherein the script is associated with monitoring operations ofthe website (block 660). For example, the website verification platform(e.g., using computing resource 334, processor 420, output component460, communication interface 470, and/or the like) may provide, based ondetecting the verification indicator, a script to the other device, asdescribed above. In some implementations, the script is to be includedin the code associated with the website. In some implementations, thescript is associated with monitoring operations of the website.

As further shown in FIG. 6, process 600 may include receiving, afterproviding the script to the other device, data related to the operationsof the website (block 670). For example, the website verificationplatform (e.g., using computing resource 334, processor 420, memory 430,storage component 440, input component 450, communication interface 470,and/or the like) may receive, after providing the script to the otherdevice, data related to the operations of the website, as describedabove.

As further shown in FIG. 6, process 600 may include analyzing the datarelated to the operations of the website using a model after receivingthe data related to the operations of the website (block 680). Forexample, the website verification platform (e.g., using computingresource 334, processor 420, and/or the like) may analyze the datarelated to the operations of the website using a model after receivingthe data related to the operations of the website, as described above.

As further shown in FIG. 6, process 600 may include performing one ormore actions related to the website based on a result of the analyzing(block 690). For example, the website verification platform (e.g., usingcomputing resource 334, processor 420, memory 430, storage component440, output component 460, communication interface 470, and/or the like)may perform one or more actions related to the website based on a resultof the analyzing, as described above.

Process 600 may include additional implementations, such as any singleimplementation or any combination of implementations described belowand/or in connection with one or more other processes describedelsewhere herein.

In some implementations, the website verification platform may receive,from the other device and after providing the verification indicator tothe other device, an indication that the verification indicator has beenassociated with the code, and may process, to verify access to thewebsite by the individual, the code after receiving the indication fromthe other device. In some implementations, the web site verificationplatform may determine, after detecting the verification indicator andbased on the verification indicator, to communicate with the otherdevice, wherein the verification indicator was generated based on aunique identifier for the other device, and may provide the script tothe other device after determining to communicate with the other device.

In some implementations, the model is associated with making aprediction related to operations of the website, and the prediction isrelated to at least one of: a value to be received via the website, ortraffic associated with the website. In some implementations, thewebsite verification platform may determine, based on the result of theanalyzing, a set of services to be offered to the individual associatedwith the website, may generate, after determining the set of services, areport that includes information identifying the set of services, andmay provide, after generating the report, the report to the other devicefor display.

In some implementations, the web site verification platform may generatea report that includes information identifying the result of theanalyzing, and may provide the report for display via the other deviceafter generating the report. In some implementations, the websiteverification platform may execute the code, or may parse the code.

Although FIG. 6 shows example blocks of process 600, in someimplementations, process 600 may include additional blocks, fewerblocks, different blocks, or differently arranged blocks than thosedepicted in FIG. 6. Additionally, or alternatively, two or more of theblocks of process 600 may be performed in parallel.

FIG. 7 is a flow chart of an example process 700 related to a websiteverification platform. In some implementations, one or more processblocks of FIG. 7 may be performed by a website verification platform(e.g., website verification platform 330). In some implementations, oneor more process blocks of FIG. 7 may be performed by another device or agroup of devices separate from or including the website verificationplatform, such as a user device (e.g., user device 310), a server device(e.g., server device 320), a computing resource (e.g., computingresource 334), and/or the like.

As shown in FIG. 7, process 700 may include providing a verificationindicator to a device associated with a website, wherein theverification indicator is associated with verifying access to thewebsite by an individual associated with the device (block 710). Forexample, the website verification platform (e.g., using computingresource 334, processor 420, output component 460, communicationinterface 470, and/or the like) may provide a verification indicator toa device associated with a website, as described above. In someimplementations, the verification indicator is associated with verifyingaccess to the website by an individual associated with the device.

As further shown in FIG. 7, process 700 may include detecting, afterproviding the verification indicator and to verify access to thewebsite, that the verification indicator has been associated with codeassociated with the website based on processing the code (block 720).For example, the website verification platform (e.g., using computingresource 334, processor 420, communication interface 470, and/or thelike) may detect, after providing the verification indicator and toverify access to the website, that the verification indicator has beenassociated with code associated with the website based on processing thecode, as described above.

As further shown in FIG. 7, process 700 may include providing, based ondetecting the verification indicator, a script to the device wherein thescript is to be included in the code associated with the website,wherein the script is associated with monitoring operations of thewebsite (block 730). For example, the website verification platform(e.g., using computing resource 334, processor 420, output component460, communication interface 470, and/or the like) may provide, based ondetecting the verification indicator, a script to the device wherein thescript is to be included in the code associated with the website, asdescribed above. In some implementations, the script is to be includedin the code associated with the website. In some implementations, thescript is associated with monitoring operations of the website.

As further shown in FIG. 7, process 700 may include receiving, afterproviding the script to the device, data related to the operations ofthe website (block 740). For example, the website verification platform(e.g., using computing resource 334, processor 420, memory 430, storagecomponent 440, input component 450, communication interface 470, and/orthe like) may receive, after providing the script to the device, datarelated to the operations of the website, as described above.

As further shown in FIG. 7, process 700 may include analyzing, afterreceiving the data, the data related to the operations of the websiteusing a model, wherein the model is associated with making a predictionrelated to at least one of a value to be received via the website, ortraffic associated with the website (block 750). For example, thewebsite verification platform (e.g., using computing resource 334,processor 420, and/or the like) may analyze, after receiving the data,the data related to the operations of the website using a model, asdescribed above. In some implementations, the model is associated withmaking a prediction related to at least one of: a value to be receivedvia the website, or and traffic associated with the website.

As further shown in FIG. 7, process 700 may include performing one ormore actions related to the website based on a result of the analyzing(block 760). For example, the website verification platform (e.g., usingcomputing resource 334, processor 420, memory 430, storage component440, output component 460, communication interface 470, and/or the like)may perform one or more actions related to the website based on a resultof the analyzing, as described above.

Process 700 may include additional implementations, such as any singleimplementation or any combination of implementations described belowand/or in connection with one or more other processes describedelsewhere herein.

In some implementations, the website verification platform may receive arequest for verification from the device prior to providing theverification indicator, may determine, after receiving the request forverification, a particular type of verification indicator to generatebased on at least one of: the code, or a security level associated withan account associated with the individual, and may generate, afterdetermining the particular type of verification indicator to use, theverification indicator based on the code or the security levelassociated with the account associated with the individual. In someimplementations, the website verification platform may access, afterproviding the verification indicator, the website using a uniformresource identifier (URI) or a set of credentials associated with thewebsite, wherein the URI or the set of credentials are received from thedevice in association with the request for verification, and may processthe code after accessing the website using the URI or the set ofcredentials.

In some implementations, the website verification platform maydetermine, after detecting the verification indicator and based on theverification indicator, to communicate with the device, wherein theverification indicator was generated based on a unique identifier forthe device, and may provide the script to the device after determiningto communicate with the device. In some implementations, the websiteverification platform may cause, based on the result of the analyzing,the website to be approved or denied for a line of credit by configuringinformation in a data structure that indicates that the website has beenapproved or denied for the line of credit. In some implementations, thewebsite verification platform may detect the verification indicatorbased on at least one of: a particular delimiter included in the code, aparticular tag indicator included in the code, or generation of aparticular page associated with the website based on executing orparsing the code.

Although FIG. 7 shows example blocks of process 700, in someimplementations, process 700 may include additional blocks, fewerblocks, different blocks, or differently arranged blocks than thosedepicted in FIG. 7. Additionally, or alternatively, two or more of theblocks of process 700 may be performed in parallel.

The foregoing disclosure provides illustration and description, but isnot intended to be exhaustive or to limit the implementations to theprecise form disclosed. Modifications and variations may be made inlight of the above disclosure or may be acquired from practice of theimplementations.

As used herein, the term “component” is intended to be broadly construedas hardware, firmware, or a combination of hardware and software.

Some implementations are described herein in connection with thresholds.As used herein, satisfying a threshold may, depending on the context,refer to a value being greater than the threshold, more than thethreshold, higher than the threshold, greater than or equal to thethreshold, less than the threshold, fewer than the threshold, lower thanthe threshold, less than or equal to the threshold, equal to thethreshold, or the like.

It will be apparent that systems and/or methods described herein may beimplemented in different forms of hardware, firmware, or a combinationof hardware and software. The actual specialized control hardware orsoftware code used to implement these systems and/or methods is notlimiting of the implementations. Thus, the operation and behavior of thesystems and/or methods are described herein without reference tospecific software code—it being understood that software and hardwarecan be designed to implement the systems and/or methods based on thedescription herein.

Even though particular combinations of features are recited in theclaims and/or disclosed in the specification, these combinations are notintended to limit the disclosure of various implementations. In fact,many of these features may be combined in ways not specifically recitedin the claims and/or disclosed in the specification. Although eachdependent claim listed below may directly depend on only one claim, thedisclosure of various implementations includes each dependent claim incombination with every other claim in the claim set.

No element, act, or instruction used herein should be construed ascritical or essential unless explicitly described as such. Also, as usedherein, the articles “a” and “an” are intended to include one or moreitems, and may be used interchangeably with “one or more.” Furthermore,as used herein, the term “set” is intended to include one or more items(e.g., related items, unrelated items, a combination of related andunrelated items, etc.), and may be used interchangeably with “one ormore.” Where only one item is intended, the phrase “only one” or similarlanguage is used. Also, as used herein, the terms “has,” “have,”“having,” or the like are intended to be open-ended terms. Further, thephrase “based on” is intended to mean “based, at least in part, on”unless explicitly stated otherwise.

What is claimed is:
 1. A method, comprising: providing, by a device, averification indicator with instruction information to another deviceassociated with a website hosted by a server device, wherein theinstruction information indicates a location associated with the websitefor including the verification indicator via the server device, whereinthe verification indicator includes at least one of: a unique identifierincluded in commented code of the website, other code of the websitethat causes a particular page, associated with the website, to begenerated when executed or parsed, or a text file stored on the serverdevice that hosts the website; processing, by the device and after theproviding the verification indicator to the other device, website codeassociated with the website; detecting, by the device, that theverification indicator has been associated with the website code basedon the processing the website code; analyzing, by the device, based onthe detecting that the verification indicator has been associated withthe website, and based on using a model, data related to operations ofthe website to generate a prediction associated with the operations ofthe website; generating, by the device, and based on using the model, ascore that identifies a confidence level associated with the prediction,wherein the confidence level indicates a degree of risk associated withthe website; and performing, by the device and based on the generatingthe score, one or more actions related to the website.
 2. The method ofclaim 1, wherein the other device provides access to one or more websitefiles stored on the server device.
 3. The method of claim 1, furthercomprising: accessing the website code, via the other device, using aset of credentials associated with the website; and wherein providingthe verification indicator comprises: providing the verificationindicator, via the other device, based on accessing the website code. 4.The method of claim 1, further comprising: generating the verificationindicator by hashing data associated with a request to generate theverification indicator.
 5. The method of claim 1, further comprising:identifying a pre-stored code snippet, from a plurality of pre-storedcode snippets written in multiple programming languages, based on aprogramming language associated with the website code; and generatingthe verification indicator using the pre-stored code snippet.
 6. Themethod of claim 1, further comprising: determining, prior to theproviding the verification indicator, a particular verificationindicator type based on at least one of: the website code, or a securitylevel associated with an account associated with the website.
 7. Themethod of claim 6, further comprising: generating, after the determiningthe particular verification indicator type, the verification indicatorbased on the website code or the security level associated with theaccount.
 8. A device, comprising: one or more memories; and one or moreprocessors communicatively coupled to the one or more memories,configured to: provide a verification indicator with instructioninformation to another device associated with a website hosted by aserver device, wherein the instruction information indicates a locationassociated with the website for including the verification indicator viathe server device, wherein the verification indicator includes at leastone of: a unique identifier included in commented code of the website,other code of the website that causes a particular page, associated withthe website, to be generated when executed or parsed, or a text filestored on the server device that hosts the website; process, after theproviding the verification indicator to the other device, website codeassociated with the website; detect that the verification indicator hasbeen associated with the website code based on the processing thewebsite code; analyze, based on the detecting that the verificationindicator has been associated with the website, and based on using amodel, data related to operations of the website to generate aprediction associated with the operations of the website; generate,based on using the model, a score that identifies a confidence levelassociated with the prediction, wherein the confidence level indicates adegree of risk associated with the website; and perform, based on thegenerating the score, one or more actions related to the website.
 9. Thedevice of claim 8, wherein the other device provides access to one ormore website files stored on the server device.
 10. The device of claim8, wherein the one or more processors are further configured to: accessthe website code, via the other device, using a set of credentialsassociated with the website; and wherein the one or more processors,when providing the verification indicator, are configured to: providethe verification indicator, via the other device, based on accessing thewebsite code.
 11. The device of claim 8, wherein the one or moreprocessors are further configured to: generate the verificationindicator by hashing data associated with a request to generate theverification indicator.
 12. The device of claim 8, wherein the one ormore processors are further configured to: identify a pre-stored codesnippet, from a plurality of pre-stored code snippets written inmultiple programming languages, based on a programming languageassociated with the website code; and generate the verificationindicator using the pre-stored code snippet.
 13. The device of claim 8,wherein the one or more processors are further configured to: determine,prior to the providing the verification indicator, a particularverification indicator type based on at least one of: the website code,or a security level associated with an account associated with thewebsite.
 14. The device of claim 13, wherein the one or more processorsare further configured to: generate, after the determining theparticular verification indicator type, the verification indicator basedon the website code or the security level associated with the account.15. A non-transitory computer-readable medium storing instructions, theinstructions comprising: one or more instructions that, when executed byone or more processors, cause the one or more processors to: provide averification indicator with instruction information to another deviceassociated with a website hosted by a server device, wherein theinstruction information indicates a location associated with the websitefor including the verification indicator via the server device, whereinthe verification indicator includes at least one of: a unique identifierincluded in commented code of the website, other code of the websitethat causes a particular page, associated with the website, to begenerated when executed or parsed, or a text file stored on the serverdevice that hosts the website; process, after the providing theverification indicator to the other device, website code associated withthe website; detect that the verification indicator has been associatedwith the website code based on the processing the website code; analyze,based on the detecting that the verification indicator has beenassociated with the website, and based on using a model, data related tooperations of the website to generate a prediction associated with theoperations of the website; generate, based on using the model, a scorethat identifies a confidence level associated with the prediction,wherein the confidence level indicates a degree of risk associated withthe website; and perform, based on the generating the score, one or moreactions related to the website.
 16. The non-transitory computer-readablemedium of claim 15, wherein the other device provides access to one ormore website files stored on the server device.
 17. The non-transitorycomputer-readable medium of claim 15, wherein the one or moreinstructions, when executed by the one or more processors, further causethe one or more processors to: access the website code, via the otherdevice, using a set of credentials associated with the website; andwherein the one or more instructions, that cause the one or moreprocessors to provide the verification indicator, cause the one or moreprocessors to: provide the verification indicator, via the other device,based on accessing the website code.
 18. The non-transitorycomputer-readable medium of claim 15, wherein the one or moreinstructions, when executed by the one or more processors, further causethe one or more processors to: generate the verification indicator byhashing data associated with a request to generate the verificationindicator.
 19. The non-transitory computer-readable medium of claim 15,wherein the one or more instructions, when executed by the one or moreprocessors, further cause the one or more processors to: identify apre-stored code snippet, from a plurality of pre-stored code snippetswritten in multiple programming languages, based on a programminglanguage associated with the website code; and generate the verificationindicator using the pre-stored code snippet.
 20. The non-transitorycomputer-readable medium of claim 15, wherein the one or moreinstructions, when executed by the one or more processors, further causethe one or more processors to: determine, prior to the providing theverification indicator, a particular verification indicator type basedon at least one of: the website code, or a security level associatedwith an account associated with the website.