FRAUD DETECTION SYSTEM, METHOD, AND DEVICE
First Claim
1. A method of authenticating a transaction, the method comprising:
- responsive to receiving a request for authenticating a transaction involving a first device and including a first device information defining a first device characteristic of the first device;
obtaining a second device information defining a second device characteristic of a second device associated with the transaction;
determining a level of correlation between the first device information and the second device information; and
authenticating the transaction based on the level of correlation between the first device information and the second device information, wherein the transaction is authenticated when the level of correlation between the first device information and the second device information is above a pre-determined threshold.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for authentication for a user device associated with a user, said system comprising: a processing system to generate a first user interface running on a screen of said user device, said first user interface comprising one or more components, wherein said one or more components comprises a first icon, which when activated, directs a user to a second user interface to select a secret pattern, a second icon, which when activated, generates a current randomly populated keyboard, further wherein said processing system provides a current Personal Identification Number (PIN) to said user by correlating said secret pattern with the current randomly populated keyboard, and a regular keyboard for said user to enter a PIN for authentication.
25 Citations
20 Claims
-
1. A method of authenticating a transaction, the method comprising:
-
responsive to receiving a request for authenticating a transaction involving a first device and including a first device information defining a first device characteristic of the first device; obtaining a second device information defining a second device characteristic of a second device associated with the transaction; determining a level of correlation between the first device information and the second device information; and authenticating the transaction based on the level of correlation between the first device information and the second device information, wherein the transaction is authenticated when the level of correlation between the first device information and the second device information is above a pre-determined threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of authenticating a transaction, the method comprising:
-
responsive to receiving a request for authenticating a transaction involving a first device and including a first device information defining a first device characteristic of the first device; obtaining a second information defining a second characteristic of the transaction, the second information independent of the first device; determining a level of correlation between the first device information and the second device information; and authenticating the transaction based on the level of correlation between the first device information and the second information, wherein the transaction is authenticated when the level of correlation between the first device information and the second information is above a pre-determined threshold. - View Dependent Claims (9, 10, 11)
-
-
12. A method of fraudulence verification of a transaction being conducted over a communications network, the transaction having associated transaction information, the method comprising:
-
comparing the transaction information with database information stored in a database to determine whether a transaction is potentially fraudulent, the database information comprising crowdsourcing data, the crowdsourcing data comprising a plurality of users'"'"' feedback, the plurality of users'"'"' not involved with the transaction; sending a request to a second device associated with the transaction requesting confirmation information on whether the transaction is fraudulent; and
,responsive to receiving a response with the confirmation information, authenticating the transaction using the confirmation information. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification