Providing account usage fraud protection
First Claim
1. A method for predicting fraudulent identification usage, comprising:
- detecting a context for a use of an identification via a communication line at a fraud protection service;
analyzing said context for use of said identification in view of a plurality of entries for use of said identification; and
specifying a level of suspicion of fraudulent use of said identification according to said analysis of said context.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, system, and program providing identification usage fraud protection are provided. A context for a use of an identification via a communication line is detected at a fraud protection service. The context for use of the identification is analyzed in view of multiple previous uses of the identification. A level of suspicion of fraudulent use of the identification is specified according to the analysis of the context. Depending on the level of suspicion, further use of the identification may require additional authentication or may be barred. The identification may include a user name, an account number, a password, or other identifier that may be utilized to represent an individual in accessing products and services.
84 Citations
59 Claims
-
1. A method for predicting fraudulent identification usage, comprising:
-
detecting a context for a use of an identification via a communication line at a fraud protection service;
analyzing said context for use of said identification in view of a plurality of entries for use of said identification; and
specifying a level of suspicion of fraudulent use of said identification according to said analysis of said context. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 24)
-
-
19. A system for predicting fraudulent identification usage, comprising:
-
a fraud protection service server communicatively connected to a trusted telephone network;
means for detecting a context for a use of an identification via a communication line at said fraud protection service server;
means for analyzing said context for use of said identification in view of a plurality of entries for use of said identification; and
means for specifying a level of suspicion of fraudulent use of said identification according to said analysis of said context. - View Dependent Claims (20, 21, 22, 23, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. A computer program product for predicting fraudulent identification usage, comprising:
-
a recording medium;
means, recorded on said recording medium, for detecting a context for a use of an identification via a communication line;
means, recorded on said recording medium, for analyzing said context for use of said identification in view of a plurality of entries for use of said identification; and
means, recorded on said recording medium, for specifying a level of suspicion of fraudulent use of said identification according to said analysis of said context. - View Dependent Claims (38, 39, 40, 41, 42)
-
-
43. A method for protecting an identification, comprising:
-
detecting a context for a use of an identification via a communication line at a fraud protection service; and
responsive to assigning a particular level of suspicion of fraudulent use to said use of said identification, requiring additional authentication for said use of said identification.
-
-
44. A method for protecting an identification from fraudulent usage, comprising:
-
detecting a context for a use of an identification via a communication line at a fraud protection service; and
responsive to assigning a particular level of suspicion of fraudulent use to said use of said identification, processing a decoy usage of said identification.
-
-
45. A method for protecting credit card account usage, comprising:
-
detecting a location for a request for a charge to a credit card account via a communication line at a fraud protection service; and
comparing said location with a recent location detected for a individual associated with said credit card account; and
responsive to detecting infeasibility of presence by said individual at said location and said recent location within a measured lapsed period of time, only allowing said charge to said credit card if additional authentication by said individual is provided. - View Dependent Claims (46, 47, 48, 49, 50, 51)
-
-
52. A system for protecting credit card account usage, comprising:
-
a fraud protection service server communicatively connected to a network;
means for detecting a location for a request for a charge to a credit card account via a communication line at said fraud protection service server; and
means for comparing said location with a recent location detected for a individual associated with said credit card account; and
means responsive to detecting infeasibility of presence by said individual at said location and said recent location within a measured lapsed period of time, for only allowing said charge to said credit card if additional authentication by said individual is provided. - View Dependent Claims (53, 54, 55, 56, 57, 58)
-
-
59. A computer program product for protecting credit card account usage, comprising:
-
a recording medium;
means, recorded on said recording medium, for detecting a location for a request for a charge to a credit card account via a communication line; and
means, recorded on said recording medium, for comparing said location with a recent location detected for a individual associated with said credit card account; and
means, recorded on said recording medium, for only allowing said charge to said credit card if additional authentication by said individual is provided where said presence of said individual at said location is detected to be infeasible.
-
Specification