Online fraud solution
First Claim
1. In a relationship between a fraud protection provider and a customer, a system for combating online fraud, the system comprising:
- a monitoring center for monitoring suspicious online activity, the monitoring center comprising;
a first computer, the first computer comprising a processor and instructions executable by the first computer to allow an analysis of an investigation of a uniform resource locator;
a first telecommunication link configured to provide communication between a technician and the customer, such that the technician can notify the customer of a result of the investigation of a uniform resource locator and the customer can provide instructions for responding to a fraudulent attempt to collect personal information; and
a second telecommunication link configured to provide data communication between the monitoring center and at least one additional computer; and
a second computer in communication with the monitoring center via the second telecommunication link, the second computer including a second processor and instructions executable by the second processor to;
access a data source comprising data about a possible fraudulent activity;
acquire from the data source the data about the possible fraudulent activity;
evaluate the data to determine whether the possible fraudulent activity should be investigated; and
investigate a uniform resource locator associated with the data to determine whether a server referenced by the uniform resource locator is associated with a fraudulent attempt to collect personal information.
2 Assignments
0 Petitions
Accused Products
Abstract
Various embodiments of the invention provide solutions (including inter alia, systems, methods and software) for dealing with online fraud. Some embodiments function to access and/or obtain information from (and/or receive data from) a data source; the data might, for example, indicate a possible instance of online fraud. Certain embodiments, therefore, can be configured to analyze the data, e.g., to determine whether the data indicate a likely instance of online fraud. Such instances may be further investigated, and/or a response may be initiated. Data sources can include, without limitation, web pages, email messages, online chat sessions, domain zone files, newsgroups (and/or postings thereto), etc. Data obtained from the data sources can include, without limitation, suspect domain registrations, uniform resource locators, references to trademarks, advertisements, etc.
203 Citations
35 Claims
-
1. In a relationship between a fraud protection provider and a customer, a system for combating online fraud, the system comprising:
-
a monitoring center for monitoring suspicious online activity, the monitoring center comprising; a first computer, the first computer comprising a processor and instructions executable by the first computer to allow an analysis of an investigation of a uniform resource locator; a first telecommunication link configured to provide communication between a technician and the customer, such that the technician can notify the customer of a result of the investigation of a uniform resource locator and the customer can provide instructions for responding to a fraudulent attempt to collect personal information; and a second telecommunication link configured to provide data communication between the monitoring center and at least one additional computer; and a second computer in communication with the monitoring center via the second telecommunication link, the second computer including a second processor and instructions executable by the second processor to; access a data source comprising data about a possible fraudulent activity; acquire from the data source the data about the possible fraudulent activity; evaluate the data to determine whether the possible fraudulent activity should be investigated; and investigate a uniform resource locator associated with the data to determine whether a server referenced by the uniform resource locator is associated with a fraudulent attempt to collect personal information. - View Dependent Claims (2)
-
-
3. In a relationship between a fraud protection provider and a customer, a computer system for combating online fraud, the computer system comprising:
-
a processor; and a computer readable medium in communication with the processor, the computer readable medium comprising instructions executable by the processor to; access a data source comprising data about a possible fraudulent activity; acquire from the data source the data about the possible fraudulent activity; evaluate the data to determine whether the possible fraudulent activity should be investigated; investigate a uniform resource locator associated with the data to determine whether a server referenced by the uniform resource locator is associated with a fraudulent attempt to collect personal information; and initiate a response to the fraudulent attempt to collect personal information.
-
-
4. A computer system for investigating a suspicious uniform resource locator to determine whether a server referenced by the uniform resource locator may be involved in fraudulent activity, the computer system comprising:
-
a processor; and a computer readable medium in communication with the processor, the computer readable medium comprising instructions executable by the processor to; access a data source to obtain data about a possible fraudulent activity; ascertain from the data a uniform resource locator that might be involved with the possible fraudulent activity; ascertain an address associated with a server referenced by the uniform resource locator; obtain information about an address the uniform resource locator appears to reference; compare the ascertained address with the information about the address the uniform resource locator appears to reference; and based on the comparison of the ascertained address and the information about the address the uniform resource locator appears to reference, determine whether the uniform resource locator is fraudulent. - View Dependent Claims (5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method of combating online fraud, the method comprising:
-
accessing with a computer a data source comprising data about a possible fraudulent activity; acquiring from the data source the data about the possible fraudulent activity; evaluating the data to determine whether the possible fraudulent activity should be investigated; and investigating a uniform resource locator associated with the data to determine whether a server referenced by the uniform resource locator is associated with a fraudulent activity. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A method of investigating a suspicious uniform resource locator to determine whether a server referenced by the uniform resource locator may be involved in fraudulent activity, the method comprising:
-
accessing with a computer a data source to obtain data about a possible fraudulent activity; ascertaining from the data a uniform resource locator that might be involved with the possible fraudulent activity; ascertaining an address associated with a server referenced by the uniform resource locator; obtaining information about an address the uniform resource locator appears to reference; comparing the ascertained address with the information about the address the uniform resource locator appears to reference; and based on the comparison of the ascertained address and the information about the address the uniform resource locator appears to reference, determining whether the uniform resource locator is fraudulent.
-
-
32. A system for combating online fraud, the system comprising:
-
means for accessing a data source comprising data about a possible fraudulent activity; means for acquiring from the data source the data about the possible fraudulent activity; means for evaluating the data to determine whether the possible fraudulent activity should be investigated; and means for investigating a uniform resource locator associated with the data to determine whether a server referenced by the uniform resource locator is associated with a fraudulent attempt to collect personal information.
-
-
33. A system for investigating a suspicious uniform resource locator to determine whether a server referenced by the uniform resource locator may be involved in fraudulent activity, the system comprising:
-
means for accessing a data source to obtain data about a possible fraudulent activity; means for ascertaining from the data a uniform resource locator that might be involved with the possible fraudulent activity; means for ascertaining an address associated with a server referenced by the uniform resource locator; means for obtaining information about an address the uniform resource locator appears to reference; means for comparing the ascertained address with the information about the address the uniform resource locator appears to reference; and means for determining, based on the comparison of the ascertained address and the information about the address the uniform resource locator appears to reference, whether the uniform resource locator is fraudulent.
-
-
34. A software program embodied on a computer-readable medium, the software program comprising instructions executable by a computer to:
-
access a data source comprising data about a possible fraudulent activity; acquire from the data source the data about the possible fraudulent activity; evaluate the data to determine whether the possible fraudulent activity should be investigated; and investigate a uniform resource locator associated with the data to determine whether a server referenced by the uniform resource locator is associated with a fraudulent attempt to collect personal information.
-
-
35. A software program embodied on a computer-readable medium, the software program comprising instructions executable by a computer to:
-
access a data source to obtain data about a possible fraudulent activity; ascertain from the data a uniform resource locator that might be involved with the possible fraudulent activity; ascertain an address associated with a server referenced by the uniform resource locator; obtain information about an address the uniform resource locator appears to reference; compare the ascertained address with the information about the address the uniform resource locator appears to reference; and determine, based on the comparison of the ascertained address and the information about the address the uniform resource locator appears to reference, whether the uniform resource locator is fraudulent.
-
Specification