×

Fraudulent activity shell

  • US 10,546,299 B1
  • Filed: 06/18/2015
  • Issued: 01/28/2020
  • Est. Priority Date: 06/18/2015
  • Status: Active Grant
First Claim
Patent Images

1. A system, comprising:

  • a processor that executes the following;

    A processor that executes the following;

    an application configured to receive a request for an action by a user, the application having a default mode having a normal environment that initiates action with external systems and a shell environment that mirrors the normal environment, but is not capable of initiating actions with external systems; and

    a trigger logic configured to;

    determine that the requested action satisfies a trigger condition; and

    trigger the application to override the default mode and enter a fraudulent activity mode in response to determining that the requested action satisfies the trigger condition, wherein the normal environment is configured to hold the action in the fraudulent activity mode such that the action cannot be executed, and wherein the shell environment is configured to stop mirroring the normal environment and to display the requested action to the user such that the requested action appears to the user to be executed;

    a risk analysis logic configured to calculate a fraudulent score for the action when the application is in the fraudulent activity mode, wherein the risk analysis logic is further configured to verify the action, and wherein upon verification the action is released and replayed in the normal environment.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×