Patent application number | Description | Published |
20090037213 | METHOD AND SYSTEM FOR IDENTIFYING USERS AND DETECTING FRAUD BY USE OF THE INTERNET - A method and system for detecting and preventing Internet fraud in online transactions by utilizing and analyzing a number of parameters to uniquely identify a computer user and potential fraudulent transaction through predictive modeling. The method and system uses a delta of time between the clock of the computer used by the actual fraudulent use and the potentially fraudulent user and the clock of the server computer in conjunction with personal information and/or non-personal information, preferably the Browser ID. | 02-05-2009 |
20090083184 | Methods and Apparatus for Detecting Fraud with Time Based Computer Tags - Systems and methods for creating and analyzing computer tag information for the prevention or detection of potential fraud. Computers and other devices accessing the Web carry device tags with date and time information describing when they were issued by a security tag server. A server time stamp may be inserted into time based computer tags such as a cookies indicating when they were created. Such time stamp information can be encrypted and analyzed during future attempts to access a secure network such as a customer attempting to log into an online banking account. When the time stamp information from the tag is compared to other selected information about the user, device and/or account, including but not limited to last account log-in date/time or account creation date, the invention may be used to detect suspicious activity. | 03-26-2009 |
20100004965 | SYSTEMS AND METHODS OF SHARING INFORMATION THROUGH A TAGLESS DEVICE CONSORTIUM - The invention provides one or more consortia of networks that identify and share information about users and/or user devices interacting with the consortia. User devices may be identified, at least in part, by a delta of time parameter between a user device used and a reference time. Other parameters may be analyzed to identify a computer user and/or device and noteworthy transactions. The invention may be used for identity-based applications such as network security, the detection of fraudulent transactions, identity theft, ratings-based communities and law enforcement. | 01-07-2010 |
20110082768 | Method and System for Identifying Users and Detecting Fraud by Use of the Internet - A method and system for detecting and preventing Internet fraud in online transactions by utilizing and analyzing a number of parameters to uniquely identify a computer user and potential fraudulent transaction through predictive modeling. The method and system uses a delta of time between the clock of the computer used by the actual fraudulent use and the potentially fraudulent user and the clock of the server computer in conjunction with personal information and/or non-personal information, preferably the Browser ID. | 04-07-2011 |
20110113388 | SYSTEMS AND METHODS FOR SECURITY MANAGEMENT BASED ON CURSOR EVENTS - Systems and methods for security management based on cursor events. Click coordinates on a webpage of user's activity are logged in order to detect multiple or repeated transactions that bare the same exact coordinates. Such multiple or repeated activity may be helpful in detecting scripted attacks or bot net activity in a variety of environments and transactions. Further, the invention may also capture the coordinates of the location of submit buttons, and similar buttons, on a webpage to analyze whether a click action or other pointer action occurred within the button's parameters. | 05-12-2011 |
20110210887 | 2D WEB TRILATERATION - The invention provides systems and methods of locating a network device based on the time latency between a request by a user device and the receipt of the request by a plurality of satellite servers provided at different locations. Preferably three or more satellites may be employed. The request may be for an item, which may have a known file size, and which may or may not exist. Triangulation techniques may be utilized to determine the location of the device relative to the satellite servers. | 09-01-2011 |
20120096557 | VARIABLE RISK ENGINE - The invention provides systems and methods for risk assessment using a variable risk engine. A method for risk assessment may comprise setting an amount of real-time risk analysis for an online transaction, performing the amount of real-time risk analysis based on the set amount, and performing an amount of time-delayed risk analysis. In some embodiments, the amount of real-time risk analysis may depend on a predetermined period of time for completion of the real-time risk analysis. In other embodiments, the amount of real-time risk analysis may depend on selected tests to be completed during the real-time risk analysis. | 04-19-2012 |
20120174223 | SYSTEMS AND METHODS FOR DETECTION OF SESSION TAMPERING AND FRAUD PREVENTION - The invention provides methods and apparatus for detecting when an online session is compromised. A plurality of device fingerprints may be collected from a user computer that is associated with a designated Session ID. A server may include pages that are delivered to a user for viewing in a browser at which time device fingerprints and Session ID information are collected. By collecting device fingerprints and session information at several locations among the pages delivered by the server throughout an online session, and not only one time or at log-in, a comparison between the fingerprints in association with a Session ID can identify the likelihood of session tampering and man-in-the middle attacks. | 07-05-2012 |
20130273879 | METHODS AND SYSTEMS FOR PERSISTENT CROSS-APPLICATION MOBILE DEVICE IDENTIFICATION - Systems and methods are provided for persistent cross-application mobile device identification. A mobile device may have a plurality of sandboxes in memory containing applications. The mobile device may have a shared storage which may accessible by applications from different sandboxes. A storage location identifier may be used to access information in shared storage. A universal device identifier may be stored in the shared storage to identify the mobile device and may be accessible by multiple applications and updates to applications. The universal device identifier may be used to track the mobile device for advertising, fraud detection, reputation tracking, or other purposes. | 10-17-2013 |
20140361926 | 2D WEB TRILATERATION - The invention provides systems and methods of locating a network device based on the time latency between a request by a user device and the receipt of the request by a plurality of satellite servers provided at different locations. Preferably three or more satellites may be employed. The request may be for an item, which may have a known file size, and which may or may not exist. Triangulation techniques may be utilized to determine the location of the device relative to the satellite servers. | 12-11-2014 |