ENHANCED FRAUD MONITORING SYSTEMS
First Claim
1. A method for providing enhanced fraud monitoring, the method comprising:
- receiving from a first entity direct information related to fraudulent online activity;
analyzing the direct information;
creating a set of normalized data related to the fraudulent online activity, wherein the set of normalized data is in a form readable by a plurality of entities; and
storing the set of normalized data.
1 Assignment
0 Petitions
Accused Products
Abstract
Various embodiments of the invention provide systems and methods for the enhanced detection and/or prevention of fraud. A set of embodiments provides, for example, a facility where companies (online businesses, banks, ISPs, etc.) provide a security provider with fraud feeds (such as, to name one example, a feed of email messages from third parties addressed to customers of those businesses), as well as systems and methods of implementing such a facility. In some embodiments, feeds (such as messages) may be analyzed to create normalized direct and/or derived data which then may be made available to such companies (perhaps for a fee). By defining and controlling access to the direct and derived data, a security provider may enable such companies to negotiate bilateral and other agreements between themselves as to who they will exchange data with, what data will be exchanged, and under what commercial and other terms such data will be exchanged.
-
Citations
50 Claims
-
1. A method for providing enhanced fraud monitoring, the method comprising:
-
receiving from a first entity direct information related to fraudulent online activity;
analyzing the direct information;
creating a set of normalized data related to the fraudulent online activity, wherein the set of normalized data is in a form readable by a plurality of entities; and
storing the set of normalized data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A machine-readable medium having stored thereon a series of instructions that, when executed by a processor, cause the processor to provide enhanced fraud monitoring by:
-
receiving from a first entity direct information related to fraudulent online activity;
analyzing the direct information;
creating a set of normalized data related to the fraudulent online activity, wherein the set of normalized data is in a form readable by a plurality of entities; and
storing the set of normalized data. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A system for providing enhanced fraud monitoring, the system comprising:
-
a communication network;
a first client communicatively coupled with the communication network and adapted to provide direct information related to fraudulent online activity; and
a server communicatively coupled with the communication network and adapted to receive from the first client direct information related to fraudulent online activity, analyze the direct information, create a set of normalized data related to the fraudulent online activity, wherein the set of normalized data is in a form readable by a plurality of clients, and store the set of normalized data. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43)
-
-
44. A system for providing enhanced fraud monitoring, the system comprising:
-
a communication network;
a first client communicatively coupled with the communication network and adapted to generate direct information related to fraudulent online activity, analyze the direct information, create a set of normalized data related to the fraudulent online activity, wherein the set of normalized data is in a form readable by a plurality of clients, and store the set of normalized data;
a second client communicatively coupled with the communication network and adapted to request to access stored the stored normalized data;
a server communicatively coupled with the communication network and adapted to receive from the second a request to access the stored normalized data and control access to the stored normalized data by the second client. - View Dependent Claims (45, 46, 47, 48, 49, 50)
-
Specification