Authentication Proxy
First Claim
1. A method for providing transparent fraud analysis for an application, wherein the application is accessed by a user via a login request, the method comprising the steps of:
- a. coupling a fraud determination unit to a proxy;
b. configuring the proxy to intercept the login request and to forward the login request to the fraud determination unit; and
c. configuring the proxy to redirect the login request to the application if the fraud determination unit determines that the login request is not fraudulent.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, methods, and computer program products for providing fraud analysis to an application using a proxy and a fraud determination unit are provided. An Online Fraud Mitigation Engine is also provided in embodiments of the present invention for determining fraudulent transactions. Embodiments are also provided for calculating travel velocity and transaction frequency, which are useful for determining a fraudulent transaction. Further embodiments are provided for authenticating a transaction using an object stored on a client device and a behavior profile stored on a server.
174 Citations
38 Claims
-
1. A method for providing transparent fraud analysis for an application, wherein the application is accessed by a user via a login request, the method comprising the steps of:
-
a. coupling a fraud determination unit to a proxy;
b. configuring the proxy to intercept the login request and to forward the login request to the fraud determination unit; and
c. configuring the proxy to redirect the login request to the application if the fraud determination unit determines that the login request is not fraudulent. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A system for providing fraud analysis for an application, the system comprising:
-
a. a user that accesses the application via a login request;
b. a proxy configured to intercept the login request; and
c. a fraud determination unit comprising a processor programmed to perform the steps of;
i. receiving the login request from the proxy;
ii. determining whether the login request is fraudulent; and
iii. if the processor determines that the login request is not fraudulent, notifying the proxy that the login request is not fraudulent. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38)
-
Specification