Network security and fraud detection system and method
First Claim
Patent Images
1. A computer implemented network security and fraud detection and prevention method for a system with one or more network service providers that provides a service and a network device that connects to at least one of the network service providers over a communications network to use the provided service, the method comprising:
- gathering information about the network device to generate a device identifier that identifies the network device;
storing the device identifier in the database;
associating the device identifier with and one or more reputation factors to generate a reputation of the network device; and
sharing the reputation of the network device between the one or more network service providers to detect fraud using the network device across the network service providers.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method to detect and prevent fraud in a system is provided. The system may uniquely identify physical devices connecting to a network, register unique devices, track end-user logins, associate end-user accounts with specific devices, and share information with multiple network service providers is described.
316 Citations
32 Claims
-
1. A computer implemented network security and fraud detection and prevention method for a system with one or more network service providers that provides a service and a network device that connects to at least one of the network service providers over a communications network to use the provided service, the method comprising:
-
gathering information about the network device to generate a device identifier that identifies the network device;
storing the device identifier in the database;
associating the device identifier with and one or more reputation factors to generate a reputation of the network device; and
sharing the reputation of the network device between the one or more network service providers to detect fraud using the network device across the network service providers. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A network security and fraud detection and prevention system, comprising:
-
one or more network service providers that provides a service;
a network device that connects to at least one of the network service providers over a communications network to use the provided service; and
at least one network service provider further comprising a fraud detector comprising a client wherein the client gathers information about the network device to generate a device identifier that identifies the network device, a database, and a module that receives the device identifier, stores the device identifier in the database and associates the device identifier with one or more reputation factors to generate a reputation of the network device and wherein the reputation of the network device is shared between the one or more network service providers to detect fraud using the network device across the network service providers. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A computer based user account authentication system, comprising:
-
one or more network service providers that provides a service;
a first network device that connects to at least one of the network service providers over a communications network to use the provided service; and
at least one network service provider having a fraud detector unit that further comprises;
a client wherein the client gathers information about the network device to generate a device identifier that identifies the network device;
a database;
a module that receives the device identifier, stores the device identifier in the database and associates the device identifier with end-user account information provided by the network service provider; and
a user account module that compares the device identifier for the first network device with a list of one or more network devices approved to access the user account stored in the database and determines if the first network device accesses the user account based on the list of approved network devices. - View Dependent Claims (27, 28, 29)
-
-
30. A user account authentication method comprising:
-
determining a unique identifier for a first network device that is requesting access to a user account;
comparing the unique identifier for the first network device with a list of one or more network devices approved to access the user account;
notifying a holder of the user account if the first network device is not approved to access the user account; and
denying access to the user account if the first network device is not approved. - View Dependent Claims (31, 32)
-
Specification