SYSTEM AND METHOD OF DETECTING FRAUDULENT USER TRANSACTIONS
First Claim
1. A method for detecting fraudulent activity in user transactions, the method comprising:
- collecting user behavior data during user'"'"'s interaction via an input device with one or more groups of elements of a graphical interface of an application on a computing device;
calculating, by a processor, an anomalous user behavior coefficient for each group of elements of the graphical interface based on the collected user behavior data;
calculating, by the processor, a combination of the anomalous user behavior coefficients;
detecting, by the processor, a fraudulent activity when the combination of anomalous user behavior coefficients exceeds a predetermined threshold value; and
in response to detecting a fraudulent activity, blocking, by the processor, the interaction of the user with the application.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are system and method for detecting fraudulent activity in user transactions. An exemplary method comprising: collecting user behavior data during user'"'"'s interaction via an input device with one or more groups of elements of a graphical interface of an application on a computing device; calculating, by a processor, an anomalous user behavior coefficient for each group of elements of the graphical interface based on the collected user behavior data; detecting, by the processor, a fraudulent activity when a combination of anomalous user behavior coefficients exceeds a predetermined threshold value; and in response to detecting a fraudulent activity, blocking, by the processor, the interaction of the user with the application.
-
Citations
21 Claims
-
1. A method for detecting fraudulent activity in user transactions, the method comprising:
-
collecting user behavior data during user'"'"'s interaction via an input device with one or more groups of elements of a graphical interface of an application on a computing device; calculating, by a processor, an anomalous user behavior coefficient for each group of elements of the graphical interface based on the collected user behavior data; calculating, by the processor, a combination of the anomalous user behavior coefficients; detecting, by the processor, a fraudulent activity when the combination of anomalous user behavior coefficients exceeds a predetermined threshold value; and in response to detecting a fraudulent activity, blocking, by the processor, the interaction of the user with the application. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for detecting fraudulent activity in user transactions, the system comprising:
a hardware processor configured to; collect user behavior data during user'"'"'s interaction via an input device with one or more groups of elements of a graphical interface of an application on a computing device; calculate an anomalous user behavior coefficient for each group of elements of the graphical interface based on the collected user behavior data; calculate a combination of the anomalous user behavior coefficients; detect a fraudulent activity when the combination of anomalous user behavior coefficients exceeds a predetermined threshold value; and in response to detecting a fraudulent activity, block the interaction of the user with the application. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
15. A non-transitory computer readable medium storing computer executable instructions for detecting fraudulent activity in user transactions, including instructions for:
-
collecting user behavior data during user'"'"'s interaction via an input device with one or more groups of elements of a graphical interface of an application on a computing device; calculating, by a processor, an anomalous user behavior coefficient for each group of elements of the graphical interface based on the collected user behavior data; calculating, by the processor, a combination of the anomalous user behavior coefficients; detecting, by the processor, a fraudulent activity when the combination of anomalous user behavior coefficients exceeds a predetermined threshold value; and in response to detecting a fraudulent activity, blocking, by the processor, the interaction of the user with the application. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification