Fraud risk advisor
First Claim
Patent Images
1. A method of determining a fraudulent business transaction comprising:
- receiving an IP address associated with an Internet user;
computing a plurality of factors based on the IP address associated with a business transaction conducted by the Internet user; and
determining based on the IP address and the computation whether the business transaction is suspicious.
1 Assignment
0 Petitions
Accused Products
Abstract
A fraudulent business transaction application (FBTA) for monitoring application based fraud. When a consumer supplies account access information in order to carry out an Internet business transaction, the FBTA uses an online fraud mitigation engine to detect phishing intrusions and identity theft. The FBTA uses the account access information, a rules based engine and a risk score database to determine the likelihood that the Internet business transaction is fraudulent and deserves further review by personnel.
-
Citations
51 Claims
-
1. A method of determining a fraudulent business transaction comprising:
-
receiving an IP address associated with an Internet user;
computing a plurality of factors based on the IP address associated with a business transaction conducted by the Internet user; and
determining based on the IP address and the computation whether the business transaction is suspicious. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A computer based medium, comprising:
- an application being executable by a computer, wherein the computer executes the steps of;
receiving an IP address associated with an Internet user;
computing a plurality of factors based on the IP address associated with a business transaction conducted by the Internet user; and
determining based on the IP address and the computation whether the business transaction is suspicious. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
- an application being executable by a computer, wherein the computer executes the steps of;
-
37. An apparatus for detecting a fraudulent business transaction comprising:
-
a computer system including a processor for executing computer code; and
an application for execution on the computer system, wherein the computer system, when executing the application receives an IP address associated with an Internet user, computes a plurality of factors based on the IP address associated with a business transaction conducted by the Internet user and determines based on the IP address and the computation whether the business transaction is suspicious. - View Dependent Claims (38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50)
-
-
51. An apparatus for detecting a fraudulent business transaction comprising:
-
means for receiving an IP address associated with an Internet user;
means for computing a plurality of factors based on the IP address associated with a business transaction conducted by the Internet user; and
means for determining based on the IP address and the computation whether the business transaction is suspicious.
-
Specification