System method and apparatus for preventing fraudulent transactions
First Claim
Patent Images
1. An authentication program for securing a user station identity for a transaction over a computer network, the program comprising:
- a user station connected to a computer network;
a fingerprint of the user station;
an authentication database that compares the fingerprint of the user station to other fingerprints which have been associated with fraudulent transactions; and
a provider station that receives the comparison.
5 Assignments
0 Petitions
Accused Products
Abstract
The present invention is directed to an improved security system, method and apparatus for reducing recurring fraudulent activity from a particular location. The present invention uses a non-intrusive process that registers and uniquely identifies each location using a digital fingerprint. When fraudulent use is encountered, the associated location is flagged in a database and the associated location is prevented from completing the transaction.
-
Citations
17 Claims
-
1. An authentication program for securing a user station identity for a transaction over a computer network, the program comprising:
-
a user station connected to a computer network;
a fingerprint of the user station;
an authentication database that compares the fingerprint of the user station to other fingerprints which have been associated with fraudulent transactions; and
a provider station that receives the comparison. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method of preventing fraudulent transactions over a computer network comprising:
-
establishing a connection by a user station with the computer network;
initiating a transaction with a provider station over the network;
generating a digital fingerprint of the user station;
comparing the fingerprint of the user station with a database of fingerprints used in fraudulent transactions; and
sending the comparison to the provider station. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A method for conducting secure transactions over a computer network comprising:
-
recording a fingerprint by an authentication agent from a user station;
encrypting the fingerprint;
sending the encrypted fingerprint to an authentication server;
decrypting the fingerprint;
initiating a secured communication link between the user station and a vendor server; and
conducting a transaction over the link. - View Dependent Claims (13, 14, 15)
-
-
16. A system for conducting secure transactions over a computer network, the system comprising:
-
a server adapted to communicate with a user station;
a fingerprint of the user station, whereby the server reads the fingerprints; and
,a database maintained by the server for detecting fraudulent transactions associated with the fingerprint.
-
-
17. A system for conducting secure transactions over a computer network, the system comprising:
-
a vendor server adopted to communicate with an authentication server and a user station;
a fingerprint from the user station obtained by the vendor server, whereby the vendor server transmits the fingerprint to the authentication server; and
,a report from the authentication server about fraudulent conduct associated with the fingerprint.
-
Specification