Fraud risk advisor
First Claim
Patent Images
1. A method for calculating a travel velocity between a first access location and a second access location, comprising the steps of:
- a. determining the first access location based on a first IP address;
b. determining a first access time;
c. determining the second access location based on a second IP address;
d. determining a second access time; and
e. calculating the travel velocity between the first access location and the second access location as a function of the first access location and the first access time and the second access location and the second access time.
1 Assignment
0 Petitions
Accused Products
Abstract
A fraudulent business transaction application (FBTA) is provided for monitoring application based fraud. When a consumer supplies account access information in order to carry out an Internet business transaction, the FBTA uses an online fraud mitigation engine to detect phishing trusions and identity theft. Methods are also provided for calculating travel velocity and transcation frequency, which are useful for determining a fraudulent transaction.
-
Citations
47 Claims
-
1. A method for calculating a travel velocity between a first access location and a second access location, comprising the steps of:
-
a. determining the first access location based on a first IP address;
b. determining a first access time;
c. determining the second access location based on a second IP address;
d. determining a second access time; and
e. calculating the travel velocity between the first access location and the second access location as a function of the first access location and the first access time and the second access location and the second access time. - View Dependent Claims (2)
-
-
3. A method for calculating a user'"'"'s travel velocity between a first access location and a second access location, comprising the steps of:
-
a. determining for the user the first access location and a first access time;
b. determining for the user the second access location based on the IP address of the user;
c. determining for the user a second access time; and
d. calculating the travel velocity of the user as a function of the first access location and the first access time and the second access location and the second access time. - View Dependent Claims (4, 5, 6, 7, 8)
-
-
9. A method for determining if an online transaction is fraudulent, comprising the steps of:
-
a. computing one or more factors based on the IP address of the user, wherein at least one factor is the travel velocity of the user between a first access location and a second access location; and
b. determining whether the transaction is fraudulent based on the one or more factors. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
-
43. A method for determining if one or more online transactions are fraudulent, comprising the steps of:
-
a. computing a transaction frequency with which the one or more transactions are attempted or executed from an IP address within a predetermined period of time;
b. determining the host type associated with the IP address; and
c. executing a function to determine if the one or more transactions are fraudulent, the function having as its input at least the transaction frequency and the host type. - View Dependent Claims (44, 45, 46, 47)
-
Specification