Systems and methods of sharing information through a tag-based consortium
First Claim
1. A system comprising:
- a network interface configured to communicate with a plurality of network service devices comprising a first network service device associated with a first institution;
a data store configured to store computer-executable instructions; and
a processor in communication with the data store, the processor, when executing the computer-executable instructions, configured to, during an online transaction;
access a first plurality of transaction tags associated with a plurality of customer computing devices, the first plurality of transaction tags generated by a first server computing device;
determine, for each of the first plurality of transaction tags, a corresponding tag-generation timestamp indicative of a time of creation of the each of the first plurality of transaction tags;
automatically analyze the tag-generation timestamps of each of the first plurality of transaction tags by initiating a fraud detection protocol to determine a subset of transaction tags within the first plurality of transaction tags that have corresponding tag-generation timestamps that fall within a predetermined time interval of the initiation of the fraud detection protocol, wherein the fraud detection protocol provides an indication of an increased risk of fraud associated with a threshold predetermined number of transaction tags with corresponding tag-generation timestamps that fall within the predetermined time interval of the initiation of the fraud detection protocol;
determine that a number of transaction tags in the subset of transaction tags is greater than the threshold predetermined number;
associate an increased risk of fraud with the subset of transaction tags, based at least in part on the determination that the number of transaction tags within the first plurality of transaction tags is greater than the threshold predetermined number;
generate a risk data packet configured for transmission to at least the first network service, the risk data packet comprising encrypted identifying information associated with the subset of the first plurality of transaction tags with corresponding tag-generation timestamps that fall within the predetermined time interval of the initiation of the fraud detection protocol and an electronic indication of the increased risk of fraud associated with the subset of transaction tags and the first server computing device; and
share the risk data packet with other network service devices.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention provides one or more consortia of networks that identify and share information about users and/or user devices interacting with the consortia. User devices may be identified, at least in part, by tag-based computer information. Computers and other devices accessing the Web carry device tags with date and time information describing when they were issued by a security tag server. A server time stamp may be inserted into time based computer tags such as a cookies indicating when they were created. Such time stamp information can be encrypted and analyzed during future attempts to access a secure network such as a customer attempting to log into an online banking account. When the time stamp information from the tag is compared to other selected information about the user, device and/or account, including but not limited to last account log-in date/time or account creation date, the invention may be used to detect suspicious activity. The invention may be use for identity-based applications such as network security, the detection of fraudulent transactions, identity theft, reputation-based communities, and law enforcement.
746 Citations
20 Claims
-
1. A system comprising:
-
a network interface configured to communicate with a plurality of network service devices comprising a first network service device associated with a first institution; a data store configured to store computer-executable instructions; and a processor in communication with the data store, the processor, when executing the computer-executable instructions, configured to, during an online transaction; access a first plurality of transaction tags associated with a plurality of customer computing devices, the first plurality of transaction tags generated by a first server computing device; determine, for each of the first plurality of transaction tags, a corresponding tag-generation timestamp indicative of a time of creation of the each of the first plurality of transaction tags; automatically analyze the tag-generation timestamps of each of the first plurality of transaction tags by initiating a fraud detection protocol to determine a subset of transaction tags within the first plurality of transaction tags that have corresponding tag-generation timestamps that fall within a predetermined time interval of the initiation of the fraud detection protocol, wherein the fraud detection protocol provides an indication of an increased risk of fraud associated with a threshold predetermined number of transaction tags with corresponding tag-generation timestamps that fall within the predetermined time interval of the initiation of the fraud detection protocol; determine that a number of transaction tags in the subset of transaction tags is greater than the threshold predetermined number; associate an increased risk of fraud with the subset of transaction tags, based at least in part on the determination that the number of transaction tags within the first plurality of transaction tags is greater than the threshold predetermined number; generate a risk data packet configured for transmission to at least the first network service, the risk data packet comprising encrypted identifying information associated with the subset of the first plurality of transaction tags with corresponding tag-generation timestamps that fall within the predetermined time interval of the initiation of the fraud detection protocol and an electronic indication of the increased risk of fraud associated with the subset of transaction tags and the first server computing device; and share the risk data packet with other network service devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-implemented method comprising:
-
accessing computer-executable instructions from at least one computer-readable storage medium; and executing the computer-executable instructions, thereby causing computer hardware comprising at least one computer processor to perform operations comprising; accessing, from a first server computing device, a first plurality of transaction tags associated with a plurality of customer computing devices, the first plurality of transaction tags generated by a first server computing device; determining, for each of the first plurality of transaction tags, a corresponding tag-generation timestamp indicative of a time of creation for the each of the first plurality of transaction tags; automatically analyzing the tag-generation timestamps of each of the first plurality of transaction tags by initiating a fraud detection protocol to determine a subset of transaction tags within the first plurality of transaction tags that have corresponding tag-generation timestamps that fall within a predetermined time interval of the initiation of the fraud detection protocol, wherein the fraud detection protocol indicates of an increased risk of fraud associated with a threshold predetermined number of transaction tags with corresponding tag-generation timestamps that fall within the predetermined time interval of the initiation of the fraud detection protocol; determining that a number of transaction in the subset of transaction tags is greater than the threshold predetermined number; associating an increased risk of fraud with the subset of transaction tags, based at least in part on the determination that the number of transaction tags within the first plurality of transaction tags is greater than the threshold predetermined number; generating a risk data packet configured for transmission to at least the first network device, the risk data packet comprising encrypted identifying information associated with the subset of the first plurality of transaction tags with corresponding tag-generation timestamps that fall within the predetermined time interval of the initiation of the fraud detection protocol and an electronic indication of the increased risk of fraud associated with the subset of transaction tags and the first server computing device; and sharing the risk data packet with other network service devices. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A non-transitory computer storage medium storing computer-executable instructions that, when executed by a processor, cause the processor to perform the following method:
-
accessing, from a first server computing device, a first plurality of transaction tags associated with a plurality of customer computing devices, the first plurality of transaction tag generated by a first server computing device; determining, for each of the first plurality of transaction tags, a corresponding tag-generation timestamp indicative of a time of creation for the each of the first plurality of transaction tags; automatically analyzing the tag-generation timestamps of each of the first plurality of transaction tags by initiating a fraud detection protocol to determine a subset of transaction tags within the first plurality of transaction tags that have corresponding tag-generation timestamps that fall within a predetermined time interval of the initiation of the fraud detection protocol, wherein the fraud detection protocol indicates of an increased risk of fraud associated with a threshold predetermined number of transaction tags with corresponding tag-generation timestamps that fall within the predetermined time interval of the initiation of the fraud detection protocol; determining that a number of transaction in the subset of transaction tags is greater than the threshold predetermined number; associating an increased risk of fraud with the subset of transaction tags, based at least in part on the determination that the number of transaction tags within the first plurality of transaction tags is greater than the threshold predetermined number; generating a risk data packet configured for transmission to at least the first network device, the risk data packet comprising encrypted identifying information associated with the subset of the first plurality of transaction tags with corresponding tag-generation timestamps that fall within the predetermined time interval of the initiation of the fraud detection protocol and an electronic indication of the increased risk of fraud associated with the subset of transaction tags and the first server computing device; and sharing the risk data packet with other network service devices.
-
Specification