SYSTEMS AND METHODS OF SHARING INFORMATION THROUGH A TAGLESS DEVICE CONSORTIUM
First Claim
Patent Images
1. A fraud detection consortium, comprising:
- one or more online companies that provide a service;
an authentication repository that connects to the one or more online companies over a communications network; and
a user computer that connects to an online company over a communications network to use the provided service;
wherein the online company receives information about the user computer, andwherein the authentication repository;
gathers information about the user computer from the one or more online companies,normalizes the information gathered from the one or more online companies,stores a computer identifier derived from a delta of time parameter based upon the difference between a user computer clock time and an online company server time, andshares the computer identifier with the one or more online companies as part of the consortium to detect fraud using the user computer across the online companies.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention provides one or more consortia of networks that identify and share information about users and/or user devices interacting with the consortia. User devices may be identified, at least in part, by a delta of time parameter between a user device used and a reference time. Other parameters may be analyzed to identify a computer user and/or device and noteworthy transactions. The invention may be used for identity-based applications such as network security, the detection of fraudulent transactions, identity theft, ratings-based communities and law enforcement.
-
Citations
39 Claims
-
1. A fraud detection consortium, comprising:
-
one or more online companies that provide a service; an authentication repository that connects to the one or more online companies over a communications network; and a user computer that connects to an online company over a communications network to use the provided service; wherein the online company receives information about the user computer, and wherein the authentication repository; gathers information about the user computer from the one or more online companies, normalizes the information gathered from the one or more online companies, stores a computer identifier derived from a delta of time parameter based upon the difference between a user computer clock time and an online company server time, and shares the computer identifier with the one or more online companies as part of the consortium to detect fraud using the user computer across the online companies. - View Dependent Claims (2, 7)
-
-
3. The consortium of claim 0 wherein the computer identifier is also derived in combination with non-personal or personal identification information.
-
4. The consortium of claim 0 wherein the information gathered by the authentication repository is gathered in a tagless manner.
-
5. The consortium of claim 0 wherein the personal information includes at least one of the following:
- user name, address, billing information, shipping information, telephone number and email address.
-
6. The consortium of claim 0 wherein the non-personal information includes at least one of the following:
- IP address and Browser ID.
-
8. A fraud detection system, comprising:
-
one or more online businesses that provide a service; and a user device that connects to an online business over a communications network to use the provided service, wherein the online business gathers information about the user device and generates a delta time parameter based upon the difference between a user device clock time and an online business server time; and wherein the delta time parameter is configured into a standardized format for the fraud detection system and shared between the one or more online businesses to detect fraud using the user device across the online businesses. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method for detecting fraud comprising:
-
obtaining selected information about a client during the client'"'"'s connection to an online financial institution, wherein the selected information includes a local time according to a clock of the client; obtaining a reference time; generating a computer identifier derived from a delta of time parameter based upon the difference between the local time according to a clock of the client and the reference time; standardizing the computer identifier format to a consortium format; and sharing the computer identifier and selected information with one or more online financial institutions to detect fraud using the client across the online financial institutions. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A method for detecting fraud in a consortium comprising:
-
creating a first computer identifier in the course of a first online transaction, and a second computer identifier in the course of a second online transaction, wherein each computer identifier includes a delta time parameter based upon the difference between a time according to a user device clock and a time according to an online institution server clock; normalizing the delta time parameters to a consortium format and normalizing the computer identifier to a consortium format; sharing the first computer identifier and the second computer identifier with one or more online institutions of the consortium; generating a matching parameter based on a comparison of the first computer identifier and the second computer identifier; and assessing risk of fraud based upon the matching parameter. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. Fraud detection consortia, comprising:
-
one or more online hosts that provide a service; and a client computer that connects to at least one of the online hosts over a communications network, wherein an online host gathers information about the client computer, wherein a computer identifier is generated, derived from a delta of time parameter based upon the difference between a local client computer time and a reference time, wherein the delta of time parameter is formatted in a consortia time format, and wherein the computer identifier is shared between the one or more online hosts as part of the consortia to detect fraud using the client computer across the online hosts. - View Dependent Claims (32, 33, 34, 35)
-
-
36. A method for detecting fraud comprising:
-
providing one or more online businesses that provide a service creating a first delta time parameter in the course of a first online transaction with an online business, and a second delta time parameter in the course of a second online transaction with an online business, wherein each delta time parameter is based upon the difference between a user computer time and a reference time; normalizing the first delta time parameter and the second delta time parameter into a shared format; sharing the first delta time parameter and the second delta time parameter with the one or more online businesses; generating a matching parameter based on a comparison of the first delta time parameter and the second delta time parameter; and assessing risk of fraud based upon the matching parameter. - View Dependent Claims (37, 38, 39)
-
Specification