Fraudulent activity shell
First Claim
Patent Images
1. A system, comprising:
- a processor that executes the following;
A processor that executes the following;
an application configured to receive a request for an action by a user, the application having a default mode having a normal environment that initiates action with external systems and a shell environment that mirrors the normal environment, but is not capable of initiating actions with external systems; and
a trigger logic configured to;
determine that the requested action satisfies a trigger condition; and
trigger the application to override the default mode and enter a fraudulent activity mode in response to determining that the requested action satisfies the trigger condition, wherein the normal environment is configured to hold the action in the fraudulent activity mode such that the action cannot be executed, and wherein the shell environment is configured to stop mirroring the normal environment and to display the requested action to the user such that the requested action appears to the user to be executed;
a risk analysis logic configured to calculate a fraudulent score for the action when the application is in the fraudulent activity mode, wherein the risk analysis logic is further configured to verify the action, and wherein upon verification the action is released and replayed in the normal environment.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, methods, and other embodiments associated with a fraudulent activity shell. According to one embodiment, a system includes an application having a normal environment and a shell environment. The system also includes a trigger logic that determines whether an action satisfies a trigger condition. In response to determining that the action satisfies the trigger condition, the trigger logic triggers the application to enter a fraudulent activity mode from a default mode. In the fraudulent activity mode, the normal environment is configured to hold the action. The shell environment is configured to display the action as executed in the fraudulent activity mode.
25 Citations
16 Claims
-
1. A system, comprising:
- a processor that executes the following;
A processor that executes the following; an application configured to receive a request for an action by a user, the application having a default mode having a normal environment that initiates action with external systems and a shell environment that mirrors the normal environment, but is not capable of initiating actions with external systems; and a trigger logic configured to; determine that the requested action satisfies a trigger condition; and trigger the application to override the default mode and enter a fraudulent activity mode in response to determining that the requested action satisfies the trigger condition, wherein the normal environment is configured to hold the action in the fraudulent activity mode such that the action cannot be executed, and wherein the shell environment is configured to stop mirroring the normal environment and to display the requested action to the user such that the requested action appears to the user to be executed; a risk analysis logic configured to calculate a fraudulent score for the action when the application is in the fraudulent activity mode, wherein the risk analysis logic is further configured to verify the action, and wherein upon verification the action is released and replayed in the normal environment. - View Dependent Claims (2, 3, 4, 5, 6, 7)
- a processor that executes the following;
-
8. A method, comprising:
-
receiving, via a processor, a request for an action by a user at an application, the application having a default mode having a normal environment that initiates action with external systems and a shell environment that mirrors the normal environment, but is not capable of initiating actions with external systems; determining, via a processor, that the requested action satisfies a trigger condition; triggering, via a processor, the application to override the default mode and enter a fraudulent activity mode in response to determining that the requested action satisfies the trigger condition; holding, via a processor, the requested action in the normal environment based, at least in part, on the fraudulent activity mode; stopping, via a processor, the mirroring of the normal environment in the shell environment; displaying to the user, via a processor, the requested action such that the requested action appears to the user to be executed; and calculating, via a processor, a fraudulent score for the action when the application is in the fraudulent activity mode, and verifying, via a processor the action based, at least in part, on the fraudulent score. - View Dependent Claims (9, 10, 11)
-
-
12. A non-transitory computer-readable medium storing computer-executable instructions that when executed by a computer cause the computer to perform a method, the method comprising:
-
receiving a request for an action from a user at an application, the application having a default mode having a normal environment that initiates action with external systems and a shell environment that mirrors the normal environment, but is not capable of initiating actions with external systems; determining that the requested action satisfies a trigger condition; triggering the application to override the default mode and enter a fraudulent activity mode in response to determining that the requested action satisfies the trigger condition; holding the requested action in the normal environment based, at least in part, on the fraudulent activity mode, stopping the mirroring of the normal environment by the shell environment and displaying to the user the requested action such that the requested action appears to the user to be executed; and calculating a fraudulent score for the action when the application is in the fraudulent activity mode, and verifying the action based at least in part on the fraudulent score. - View Dependent Claims (13, 14, 15, 16)
-
Specification