DETECTING INAPPROPRIATE ACTIVITY BY ANALYSIS OF USER INTERACTIONS
First Claim
1. A method for a computing system of an electronic marketplace to automatically inhibit inappropriate interactions of users with the electronic marketplace, the method comprising:
- receiving information describing a sequence of multiple interactions of a user with the electronic marketplace, the sequence of multiple user interactions being related to one or more potential transactions of one or more items via the electronic marketplace;
automatically analyzing the received information describing the sequence of multiple interactions to determine whether the user is suspected of being engaged in fraudulent activity with respect to the electronic marketplace, the analyzing including applying multiple assessment tests to the received information describing the sequence of multiple interactions so as to assess multiple factors related to the sequence of multiple interactions; and
if it is determined that the user is suspected of being engaged in fraudulent activity based on the automatic analyzing, taking one or more actions to inhibit the fraudulent activity by the user.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques are described for detecting inappropriate activities based on interactions with Web sites and other electronic information services. In some situations, the techniques involve analyzing user interactions with an electronic information service in order to determine whether the user interactions are likely to reflect fraudulent activities by the user. In at least some situations, information about user interactions may be analyzed by applying one or more assessment tests that are each configured to assess one or more aspects of the interactions and to provide indications of whether those interaction aspects reflect inappropriate activities. If an analysis of one or more user interactions determines that a user is suspected of inappropriate activity, various actions may be taken to inhibit the inappropriate activity from continuing or recurring in the future.
-
Citations
45 Claims
-
1. A method for a computing system of an electronic marketplace to automatically inhibit inappropriate interactions of users with the electronic marketplace, the method comprising:
-
receiving information describing a sequence of multiple interactions of a user with the electronic marketplace, the sequence of multiple user interactions being related to one or more potential transactions of one or more items via the electronic marketplace; automatically analyzing the received information describing the sequence of multiple interactions to determine whether the user is suspected of being engaged in fraudulent activity with respect to the electronic marketplace, the analyzing including applying multiple assessment tests to the received information describing the sequence of multiple interactions so as to assess multiple factors related to the sequence of multiple interactions; and if it is determined that the user is suspected of being engaged in fraudulent activity based on the automatic analyzing, taking one or more actions to inhibit the fraudulent activity by the user. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer-implemented method for an electronic information service to inhibit inappropriate activities of users, the method comprising:
-
receiving information describing a sequence of multiple interactions of a user with the electronic information service, the user interactions including at least one of requests for information from the electronic information service and of supplying of information from the user to the electronic information service; analyzing the received information about the sequence of multiple interactions to determine whether the user is suspected of being engaged in inappropriate activity with respect to the electronic information service, the analyzing including applying one or more assessment tests to the received information describing the sequence of multiple interactions; and if it is determined that the user is suspected of being engaged in inappropriate activity, taking one or more actions to inhibit inappropriate activities by the user. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
-
38. A computer-readable medium whose contents enable a computing device to automatically inhibit inappropriate activities at an electronic information service, by performing a method comprising:
-
receiving information related to one or more interactions of a user with an electronic information service; automatically determining whether the user is suspected of being engaged in inappropriate activity based on the one or more interactions; and if it is determined that the user is suspected of being engaged in inappropriate activity, taking one or more actions to inhibit inappropriate activities by the user. - View Dependent Claims (39, 40, 41)
-
-
42. A computing device configured to automatically inhibit inappropriate activities at an electronic information service, comprising:
-
a memory; and an inappropriate activity detector system configured to, receive one or more indications of multiple interactions with an electronic information service; automatically determine whether the at least some of the multiple interactions are suspected of reflecting inappropriate activity with respect to the electronic information service; and if it is determined that at least some of the multiple interactions are suspected of reflecting inappropriate activity, take one or more actions to inhibit the inappropriate activity. - View Dependent Claims (43, 44, 45)
-
Specification