Identifying fraudulent activities and the perpetrators thereof
First Claim
1. A system for identifying a perpetrator of a fraudulent activity, the system including:
- location logic to locate identifying information from a client communication;
analyzer logic to analyze the identifying information from the client communication; and
account identifier logic to identify multiple user accounts associated with a previous client communication in which the same identifying information was located.
2 Assignments
0 Petitions
Accused Products
Abstract
A system for identifying perpetrators of fraudulent activity includes location logic for locating, extracting, or capturing identifying information from a client communication received from a client device. For example, the location logic may locate, or extract, a variety of message headers from an HTTP client request. The system may also include analyzer logic to analyze the identifying information, for example, by comparing the identifying information with previously captured identifying information from a previously received client communication. Finally, the system may include account identifier logic to identify user accounts associated with the previous client communication in which the same identifying information was extracted.
-
Citations
23 Claims
-
1. A system for identifying a perpetrator of a fraudulent activity, the system including:
-
location logic to locate identifying information from a client communication;
analyzer logic to analyze the identifying information from the client communication; and
account identifier logic to identify multiple user accounts associated with a previous client communication in which the same identifying information was located. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer-implemented method for identifying a perpetrator of a fraudulent activity, the method including:
-
capturing identifying information associated with a client communication; and
analyzing the identifying information associated with the client communication to identify at least one user account associated with a previous client communication in which the same identifying information was captured. - View Dependent Claims (7, 8, 9, 10, 11, 22)
-
-
12. A system for identifying a perpetrator of a fraudulent activity, the system including:
-
HTTP header location logic to locate an HTTP header included in an HTTP request from a client device;
HTTP header analyzer logic to analyze the HTTP headers included in the HTTP request from the client device and to identify at least one user account associated with a previous client communication in which the same HTTP header was utilized. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A computer-implemented method for identifying a perpetrator of a fraudulent activity, the method including:
-
capturing an HTTP header included in an HTTP request from a client device; and
analyzing the HTTP header included in the HTTP request from the client device to identify at least one user account associated with a previous client communication in which the same HTTP header was utilized. - View Dependent Claims (18, 19, 20, 23)
-
-
21. A system for identifying a perpetrator of a fraudulent activity, the system including:
-
means for locating identifying information from a client communication;
means for analyzing the identifying information from the client communication; and
means for identifying at least one user account associated with a previous client communication in which the same identifying information was located.
-
Specification