Secured electronic communication system
First Claim
1. A computer-implemented method comprising:
- under control of a server computing device configured with specific computer-executable instructions,obtaining a plurality of electronic messages exchanged between an inquirer and a responder, wherein the plurality of electronic messages includes an inquiry regarding a rental property associated with the responder;
determining, based at least in part on the identity data and a comparison between content of the plurality of electronic messages and content of electronic messages previously sent by the traveler, a degree of risk that the inquirer is fraudulently impersonating a traveler identified by identity data within the plurality of electronic messages; and
transmitting data representing the degree of risk to the responder.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are described for detecting that a potential renter of a property is being fraudulently impersonated by a third party during electronic communications with an owner or lessor of the property. Data representing an exchange of electronic messages between an inquirer and a responder are obtained, and may be anonymized to prevent the parties from learning one another'"'"'s identity prior to completing the transaction. The data may be compared to historical inquiries sent by the inquirer, historical inquiries received by the recipient, or other content of the electronic messages to determine a degree of risk that the inquirer'"'"'s account has been compromised or is otherwise being fraudulently represented. The degree of risk may be communicated to the recipient, and may be acted upon by, e.g., blocking messages from an inquirer whose degree of risk exceeds a threshold.
10 Citations
20 Claims
-
1. A computer-implemented method comprising:
under control of a server computing device configured with specific computer-executable instructions, obtaining a plurality of electronic messages exchanged between an inquirer and a responder, wherein the plurality of electronic messages includes an inquiry regarding a rental property associated with the responder; determining, based at least in part on the identity data and a comparison between content of the plurality of electronic messages and content of electronic messages previously sent by the traveler, a degree of risk that the inquirer is fraudulently impersonating a traveler identified by identity data within the plurality of electronic messages; and transmitting data representing the degree of risk to the responder. - View Dependent Claims (2, 3, 4, 5, 6)
-
7. A system comprising:
-
a data store configured to store computer-executable instructions; and a processor in communication with the data store, wherein the computer-executable instructions, when executed by the processor, configure the processor to at least; obtain a plurality of electronic messages sent from an inquirer to a responder; determine, based at least in part on the identity data and a comparison between content of the plurality of electronic messages and content of electronic messages previously sent by the traveler, a degree of risk that the inquirer is fraudulently impersonating a traveler identified by identity data within the plurality of electronic messages; and transmit data representing the degree of risk to the responder. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable medium containing computer-executable instructions that, when executed by a processor, configure the processor to perform operations including:
-
obtaining a plurality of electronic messages sent from an inquirer to a responder; determining, based at least in part on the identity data and a comparison between content of the plurality of electronic messages and content of electronic messages previously sent by a traveler identified by identity data within the plurality of electronic messages, a degree of risk that the inquirer is fraudulently impersonating the traveler; and transmitting data representing the degree of risk to the responder. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification