Detecting Fraudulent Activity on a Network Using Stored Information
First Claim
1. A method of detecting fraudulent activity on a network, the method comprising:
- receiving user requests from a plurality of data centers;
combining the user requests to form a user session, wherein the user requests were separated for processing among the plurality of data centers;
storing elements associated with the user session in a memory module; and
performing an analysis of the user session using the elements stored in the memory module.
3 Assignments
0 Petitions
Accused Products
Abstract
Described are computer-based methods and apparatuses, including computer program products, for detecting fraudulent activity on a network using stored information. An user utilizes a transmitting device to transmit user requests that are split between a plurality of data centers for processing. The user requests are captured at the data centers. The user requests are unified into an user session. The user session can be analyzed for fraud detection, marketing analysis, network intrusion detection, customer service analysis, and/or performance analysis. If fraudulent activity is detected, then the user can be interdicted to prevent further fraudulent activity.
99 Citations
17 Claims
-
1. A method of detecting fraudulent activity on a network, the method comprising:
-
receiving user requests from a plurality of data centers; combining the user requests to form a user session, wherein the user requests were separated for processing among the plurality of data centers; storing elements associated with the user session in a memory module; and performing an analysis of the user session using the elements stored in the memory module. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product, tangibly embodied in an information carrier, the computer program product including instructions being operable to cause a data processing apparatus to:
-
receive user requests from a plurality of data centers; combine the user requests to form a user session, wherein the user requests were separated for processing among the plurality of data centers; and store elements associated with the user session in a memory module; and perform an analysis of the user session using the elements stored in the memory module.
-
-
9. A system for detecting fraudulent activity on a network, the system comprising:
-
a unification engine configured and adapted to receive user requests from a plurality of data centers and process the user requests to unify user sessions; a database system configured and adapted to store elements associated with the user session in a memory module; and a fraud detection system configured and adapted to determine whether the user session is fraudulent using the elements stored in the memory module. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A system for detecting fraudulent activity on a network, the system comprising:
-
a means for unifying user sessions to receive user requests from a plurality of data centers and process the user requests to unify user sessions; a means for storing elements associated with the user session in a memory module; and a means for fraud detection to determine whether the user session is fraudulent. - View Dependent Claims (17)
-
Specification