Fraud analyst smart cookie
0 Assignments
0 Petitions
Accused Products
Abstract
A fraudulent business transaction application (FBTA) is provided in embodiments of the present invention for monitoring fraudulent transactions. When a consumer supplies account access information in order to carry out an Internet business transaction, the FBTA uses an online fraud mitigation engine to detect phishing intrusions and identity theft. Embodiments are also provided for calculating travel velocity and transaction frequency, which are useful for determining a fraudulent transaction. Further embodiments are provided for authenticating a transcation using a cookie stored on a client device and a behavior profile stored on a server.
-
Citations
25 Claims
-
1-15. -15. (canceled)
-
16. A method for authenticating a transaction performed by a user operating a client device which contains a cookie, the cookie including at least a first identifier associated with the client device, and wherein a behavior profile is associated with the user and stored on a server, the method comprising the steps of:
-
a. performing a first comparison between one or more factors derived from the transaction and one or more factors stored in the behavior profile;
b. performing a second comparison between the first device identifier and a second device identifier derived from the transaction;
c. performing a third comparison between an IP address derived from the transaction and a plurality of IP addresses stored in the cookie; and
d. authenticating the transaction based on the first comparison, the second comparison, and the third comparison. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23)
-
-
24. A computer program product encoded in a computer readable medium, the program product for authenticating a transaction performed by a user operating a client device which contains a cookie, the cookie including at least a first identifier associated with the client device, and wherein a behavior profile is associated with the user and stored on a server, the program product encoded to perform the steps of:
-
a. performing a first comparison between one or more factors derived from the transaction and one or more factors stored in the behavior profile;
b. performing a second comparison between the first device identifier and a second device identifier derived from the transaction;
c. performing a third comparison between an IP address derived from the transaction and a plurality of IP addresses stored in the cookie; and
d. authenticating the transaction based on the first comparison, the second comparison, and the third comparison.
-
-
25. A system for authenticating a transaction, the system comprising:
-
a. a client device operated by a user conducting a transaction with the client device, with one or more factors being derived from the transaction, an IP address being derived from the transaction, and wherein a second transaction identifier is derived from the transaction;
b. a cookie stored on the client device, wherein the cookie includes at least a first identifier associated with the client device, and wherein the cookie includes a plurality of IP addresses; and
c. a behavior profile stored on a server, the behavior profile including one or more factors associated with the user, wherein the transaction is authenticated by comparing the one or more factors derived from the transaction with the one or more factors in the behavior profile, comparing the first device identifier with the second device identifier, and comparing the IP address-derived from the transaction with the plurality of IP addresses stored in the cookie.
-
Specification