Method and system for identifying users and detecting fraud by use of the internet
First Claim
Patent Images
1. A method for identifying a computer comprising the steps of:
- obtaining selected information about the computer during an online connection including a local time according to a resident computer clock and at least one non-personal identification parameter;
measuring a local server time from a website server clock;
calculating a delta of time parameter based upon a difference in time between the local server time and the local time according to the resident computer clock; and
generating a computer identifier to identify the computer that is derived from the delta of time parameter in combination with at least one non-personal identification parameter related to the computer.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for detecting and preventing Internet fraud in online transactions by utilizing and analyzing a number of parameters to uniquely identify a computer user and potential fraudulent transaction through predictive modeling. The method and system uses a delta of time between the clock of the computer used by the actual fraudulent use and the potentially fraudulent user and the clock of the server computer in conjunction with personal information and/or non-personal information, preferably the Browser ID.
223 Citations
25 Claims
-
1. A method for identifying a computer comprising the steps of:
-
obtaining selected information about the computer during an online connection including a local time according to a resident computer clock and at least one non-personal identification parameter;
measuring a local server time from a website server clock;
calculating a delta of time parameter based upon a difference in time between the local server time and the local time according to the resident computer clock; and
generating a computer identifier to identify the computer that is derived from the delta of time parameter in combination with at least one non-personal identification parameter related to the computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for detecting fraud in an online transaction with a customer comprising the steps of:
-
creating a first computer identifier in the course of a first online transaction, and a second computer identifier in the course of a second online transaction, wherein each computer identifier includes a delta of time parameter defined by a time difference measured as between a first clock measurement and a second clock measurement;
selecting a matching parameter with a value that is based upon a comparison of the first computer identifier and the second computer identifier;
defining a matching value against which any differences between the first computer identifier and the second computer identifier are measured; and
assessing the risk of fraud based upon the value of the matching parameter relative to the matching value in connection with the second online transaction when the first online transaction is known to be associated with fraudulent activity. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer readable medium containing program instructions for creating a computer identifier in the course of an online transaction comprising the steps of:
-
receiving, from an online customer computer, at least one of either a personal or non-personal identification parameter;
capturing, from the clock of the customer computer, the computer local time;
capturing, from the clock of the website server computer, the server computer local time;
calculating and storing a delta of time parameter based upon the difference between the customer computer local time and the server computer local time, wherein calculating the delta of time parameter is performed at the time of the online transaction; and
identifying a customer based upon customer identification data comprising the delta of time parameter and the personal or non-personal identification parameter.
-
-
21. A fingerprinting method to identify a computer comprising the steps of:
-
creating a first computer identifier in the course of a first online transaction, and a second computer identifier in the course of a second online transaction, wherein each computer identifier includes a delta of time parameter defined by a time difference measured between a first clock measurement and a second clock measurement over a selected time interval;
comparing the first computer identifier and the second computer identifier;
generating a matching parameter having a value based upon any measured difference between the first computer identifier and the second computer identifier; and
identifying the computer with a selected level of certainty upon a comparison of the calculated value of the matching parameter with a defined matching value to indicate whether the computer was involved in both the first online transaction and the second online transaction. - View Dependent Claims (22, 23, 24, 25)
-
Specification