User fraud detection and prevention of access to a distributed network communication system
First Claim
1. A method for determining fraud in accessing a network, the method comprising:
- initiating a first network access with a network provider;
storing a first set of identification data associated with the first network access in response to the first network access, wherein the first set of identification data comprises a first computing device identification;
initiating a second network access with the network provider;
storing a second set of identification data associated with the second network access in response to the second network access, wherein the second set of identification data comprises a second computing device identification;
determining one or more fraud indicators in the first set of identification data and the second set of identification data; and
revoking the first network access and/or the second network access in response to the determining the one or more fraud indicators.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method are disclosed for user fraud protection and prevention of access to a distributed network communication system. A first set of identification data associated with a first network access are stored. A second set of identification data associated with a second network access are stored. The first and second sets of identification data comprise a first computing device identification and a second computing device identification, respectively. If one or more fraud indicators are determined in the two sets of identification data, then the first and/or second network access may be revoked. The fraud indicators may include, e.g., use of the same username with different computing device identifications, use of the same computing device identification at different geographical locations, violation of a threshold for computing device identifications, violation of a threshold for authentication failures, and violation of a threshold for rate of network propagation by a user account.
257 Citations
129 Claims
-
1. A method for determining fraud in accessing a network, the method comprising:
-
initiating a first network access with a network provider;
storing a first set of identification data associated with the first network access in response to the first network access, wherein the first set of identification data comprises a first computing device identification;
initiating a second network access with the network provider;
storing a second set of identification data associated with the second network access in response to the second network access, wherein the second set of identification data comprises a second computing device identification;
determining one or more fraud indicators in the first set of identification data and the second set of identification data; and
revoking the first network access and/or the second network access in response to the determining the one or more fraud indicators. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method for determining fraud in accessing a network, the method comprising:
-
initiating a first network access with a network provider;
storing a first set of identification data associated with the first network access in response to the first network access, wherein the first set of identification data comprises a first username and a first computing device identification;
initiating a second network access with the network provider;
storing a second set of identification data associated with the second network access in response to the second network access, wherein the second set of identification data comprises a second username and a second computing device identification, wherein the first username and the second username are associated with a same user account, and wherein the first computing device identification and the second computing device identification comprise different computing device identifications;
determining one or more fraud indicators in the first set of identification data and the second set of identification data, wherein the one or more fraud indicators comprise a use of the same user account with both the first computing device identification and the second computing device identification; and
revoking the first network access and/or the second network access in response to the determining the one or more fraud indicators. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. A method for determining fraud in accessing a network, the method comprising:
-
initiating a first network access with a network provider;
storing a first set of identification data associated with the first network access in response to the first network access, wherein the first set of identification data comprises a first geographical location and a computing device identification;
initiating a second network access with the network provider;
storing a second set of identification data associated with the second network access in response to the second network access, wherein the second set of identification data comprises a second geographical location and the computing device identification;
determining one or more fraud indicators in the first set of identification data and the second set of identification data, wherein the one or more fraud indicators comprise a use of the computing device identification at both the first geographical location and the second geographical location; and
revoking the first network access and/or the second network access in response to the determining the one or more fraud indicators. - View Dependent Claims (34, 35, 36, 37, 38, 39, 40, 41, 42, 43)
-
-
44. A carrier medium comprising program instructions for determining fraud in accessing a network, wherein the program instructions are computer-executable to implement:
-
storing a first set of identification data associated with a first network access with a network provider, wherein the first set of identification data comprises a first computing device identification;
storing a second set of identification data associated with a second network access with the network provider, wherein the second set of identification data comprises a second computing device identification;
determining one or more fraud indicators in the first set of identification data and the second set of identification data; and
revoking the first network access and/or the second network access in response to the determining the one or more fraud indicators. - View Dependent Claims (45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63)
-
-
64. A carrier medium comprising program instructions for determining fraud in accessing a network, wherein the program instructions are computer-executable to implement:
-
storing a first set of identification data associated with a first network access with a network provider, wherein the first set of identification data comprises a first username and a first computing device identification;
storing a second set of identification data associated with a second network access with the network provider, wherein the second set of identification data comprises a second username and a second computing device identification, wherein the first username and the second username are associated with a same user account, and wherein the first computing device identification and the second computing device identification comprise different computing device identifications;
determining one or more fraud indicators in the first set of identification data and the second set of identification data, wherein the one or more fraud indicators comprise a use of the same user account with both the first computing device identification and the second computing device identification; and
revoking the first network access and/or the second network access in response to the determining the one or more fraud indicators. - View Dependent Claims (65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75)
-
-
76. A carrier medium comprising program instructions for determining fraud in accessing a network, wherein the program instructions are computer-executable to implement:
-
storing a first set of identification data associated with a first network access with a network provider, wherein the first set of identification data comprises a first geographical location and a computing device identification;
storing a second set of identification data associated with a second network access with the network provider, wherein the second set of identification data comprises a second geographical location and the computing device identification;
determining one or more fraud indicators in the first set of identification data and the second set of identification data, wherein the one or more fraud indicators comprise a use of the computing device identification at both the first geographical location and the second geographical location; and
revoking the first network access and/or the second network access in response to the determining the one or more fraud indicators. - View Dependent Claims (77, 78, 79, 80, 81, 82, 83, 84, 85, 86)
-
-
87. A system for determining fraud in accessing a network, the system comprising:
-
a CPU coupled to a network;
a memory coupled to the CPU, wherein the memory stores program instructions which are executable by the CPU to;
store a first set of identification data associated with a first network access with a network provider, wherein the first set of identification data comprises a first computing device identification;
store a second set of identification data associated with a second network access with the network provider, wherein the second set of identification data comprises a second computing device identification;
determine one or more fraud indicators in the first set of identification data and the second set of identification data; and
revoke the first network access and/or the second network access in response to the determination of the one or more fraud indicators. - View Dependent Claims (88, 89, 90, 91, 92, 93, 94, 95, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106)
-
-
107. A system for determining fraud in accessing a network, the system comprising:
-
a CPU coupled to a network;
a memory coupled to the CPU, wherein the memory stores program instructions which are executable by the CPU to;
store a first set of identification data associated with a first network access in with a network provider, wherein the first set of identification data comprises a first username and a first computing device identification;
store a second set of identification data associated with a second network access with the network provider, wherein the second set of identification data comprises a second username and a second computing device identification, wherein the first username and the second username are associated with a same user account, and wherein the first computing device identification and the second computing device identification comprise different computing device identifications;
determine one or more fraud indicators in the first set of identification data and the second set of identification data, wherein the one or more fraud indicators comprise a use of the same user account with both the first computing device identification and the second computing device identification; and
revoke the first network access and/or the second network access in response to the determining the one or more fraud indicators. - View Dependent Claims (108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118)
-
-
119. A system for determining fraud in accessing a network, the system comprising:
-
a CPU coupled to a network;
a memory coupled to the CPU, wherein the memory stores program instructions which are executable by the CPU to;
store a first set of identification data associated with a first network access with a network provider, wherein the first set of identification data comprises a first geographical location and a computing device identification;
store a second set of identification data associated with a second network access with the network provider, wherein the second set of identification data comprises a second geographical location and the computing device identification;
determine one or more fraud indicators in the first set of identification data and the second set of identification data, wherein the one or more fraud indicators comprise a use of the computing device identification at both the first geographical location and the second geographical location; and
revoke the first network access and/or the second network access in response to the determining the one or more fraud indicators. - View Dependent Claims (120, 121, 122, 123, 124, 125, 126, 127, 128, 129)
-
Specification