×

Apparatus, method and article to facilitate automatic detection and removal of fraudulent user information in a network environment

  • US 10,277,710 B2
  • Filed: 10/12/2017
  • Issued: 04/30/2019
  • Est. Priority Date: 12/04/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method of operation in at least a portion of a system to detect at least one of accounts or related profiles suspected of being fraudulent, the system which includes at least one processor and at least one nontransitory processor-readable medium that stores at least one of processor-executable instructions or processor-executable data, the at least one nontransitory processor-readable medium communicatively coupled to the at least one processor, the method of operation comprising:

  • for each of a plurality of profiles, computing by the at least one processor a representation of dissimilarity based at least in part on a respective attribute value of each of a plurality of attributes logically associated with the respective profile;

    performing a clustering of the profiles by the at least one processor, based on the representation of dissimilarity, the performance of the clustering resulting in a number of clusters, each cluster comprising one or more of the profiles;

    selecting clusters of the profiles from the resulting clusters of the profiles, where the selecting is based on whether the respective cluster includes a total number of profiles in the respective cluster that exceeds a threshold number of profiles;

    in a first pass, following the selecting clusters of the profiles which include a total number of profiles in the respective cluster that is above the threshold number of profiles,for each of at least some of the selected clusters, identifying by the at least one processor each of a number of attributes and attribute value combinations that occur frequently in the profiles of the respective selected cluster;

    in a second pass, following the first pass,for each of at least some of the selected clusters and for each attribute identified as occurring frequently in the first pass, identifying by the at least one processor one or more additional attribute values for the respective attribute that occur frequently in the profiles of the respective selected cluster; and

    for each of at least some of the selected clusters, preparing a respective query to identify the accounts or the related profiles suspected of being fraudulent based at least in part on the processor identified attribute and attribute value combinations and the processor identified one or more additional attribute values.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×