Method and apparatus to detect fraudulent activities within a network-based auction facility
First Claim
1. A method to detect fraudulent activities at a network-based transaction facility, the method comprising:
- causing a first identifier associated with a first user identity to be stored on a machine responsive to a first event with respect to the network-based transaction facility and initiated under the first user identity from the machine which is coupled to the network-based transaction facility via a network; and
detecting a potentially fraudulent activity by detecting a lack of correspondence between the first identifier stored on the machine and a second identifier associated with a second user identity responsive to a second event with respect to the network-based transaction facility and initiated under the second user identity from the machine.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatuses for detecting fraudulent activities made over a network-based transaction facility using a machine. In responsive to a first event with respect to the network-based transaction facility and initiated under a first user identity from the machine which is coupled to the network-based transaction facility via a network, the method causes a first identifier associated with the first user identity to be stored on the machine. In responsive to a second event with respect to the network-based transaction facility and initiated under a second user identity from the machine, the method causes a detecting of a potentially fraudulent activity by detecting a lack of correspondence between the first identifier stored on the machine and a second identifier associated with the second user identity.
157 Citations
40 Claims
-
1. A method to detect fraudulent activities at a network-based transaction facility, the method comprising:
-
causing a first identifier associated with a first user identity to be stored on a machine responsive to a first event with respect to the network-based transaction facility and initiated under the first user identity from the machine which is coupled to the network-based transaction facility via a network; and
detecting a potentially fraudulent activity by detecting a lack of correspondence between the first identifier stored on the machine and a second identifier associated with a second user identity responsive to a second event with respect to the network-based transaction facility and initiated under the second user identity from the machine. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A computer readable medium comprising instructions, which when executed on a processor, cause the processor to perform a method for detecting suspicious transactions made over a network-based transaction facility using a client machine, the method comprising:
-
causing a first identifier associated with a first user identity to be stored on a machine responsive to a first event with respect to the network-based transaction facility and initiated under the first user identity from the machine which is coupled to the network-based transaction facility via a network; and
detecting a potentially fraudulent activity by detecting a lack of correspondence between the first identifier stored on the machine and a second identifier associated with a second user identity responsive to a second event with respect to the network-based transaction facility and initiated under the second user identity from the machine.
-
-
32. A method for detecting suspicious transactions made with an Internet service facility from one computerized facility, the method comprising:
-
causing a first identifier associated with a first user identity to be stored on a machine, the causing being responsive to a first event with respect to the network-based transaction facility and initiated under the first user identity from the machine which is coupled to the network-based transaction facility via a network; and
detecting a potentially fraudulent activity by detecting a lack of correspondence between the first identifier stored on the machine and a second identifier associated with a second user identity, the detecting being responsive to a second event with respect to the network-based transaction facility and initiated under the second user identity from the machine.
-
-
33. A system to detect fraudulent activities at a network-based transaction facility, the system comprising:
-
an identifier process to cause a first identifier associated with a first user identity to be stored on a machine responsive to a first event with respect to the network-based transaction facility and initiated under the first user identity from the machine which is coupled to the network-based transaction facility via a network; and
a first detection process to detect a potentially fraudulent activity by detecting a lack of correspondence between the first identifier stored on the machine and a second identifier associated with a second user identity responsive to a second event with respect to the network-based transaction facility and initiated under the second user identity from the machine. - View Dependent Claims (34, 35, 36, 37, 38, 39)
-
-
40. A system to detect fraudulent activities at a network-based transaction facility, the system comprising:
-
a first means for causing a first identifier associated with a first user identity to be stored on a machine responsive to a first event with respect to the network-based transaction facility and initiated under the first user identity from the machine which is coupled to the network-based transaction facility via a network; and
a second means for detecting a potentially fraudulent activity by detecting a lack of correspondence between the first identifier stored on the machine and a second identifier associated with a second user identity responsive to a second event with respect to the network-based transaction facility and initiated under the second user identity from the machine.
-
Specification