ABUSIVE TRAFFIC DETECTION
First Claim
1. A method of detecting abusive traffic on a web service, the method comprising:
- gathering consumption records associated with consumption of digital content via the web service, the one or more consumption records comprising a content owner, a content user, and a date of the consumption;
aggregating a set of consumption data, the aggregated set of consumption data including a list of one or more consumption records;
identifying one or more suspicious content owners, wherein the one or more suspicious content owners provide digital content accessible via the web service;
identifying one or more suspicious content users, wherein the one or more suspicious content users are consumers of digital content via the web service;
generating a notification including the at least one of the one or more suspicious content owners or the at least one of the one or more suspicious content users; and
holding payment to the suspicious content owner based on the abusive traffic.
1 Assignment
0 Petitions
Accused Products
Abstract
Aspects of an abuse detection system for a web service include an abuse detection engine executing on a server. The abuse detection engine includes a pre-processing module for aggregating a data set for processing and analysis; a suspiciousness test module for identifying suspicious content owners and suspicious users; a graphing module for finding connections between suspicious content owners and suspicious users; an analysis module for determining which groups are constituted of fraudulent or abusive accounts; and a notification generation and output module for generating a list of abusive entities and a notification for output to at least one of: the abusive entity, a digital content distribution company associated with the abusive entity, and a legal department or other entity for further investigation or action. Additionally, royalties for content consumptions associated with abusive accounts may be held. Aspects of an abusive traffic detection method enable multi-account and multi-content owner fraud detection.
-
Citations
20 Claims
-
1. A method of detecting abusive traffic on a web service, the method comprising:
-
gathering consumption records associated with consumption of digital content via the web service, the one or more consumption records comprising a content owner, a content user, and a date of the consumption; aggregating a set of consumption data, the aggregated set of consumption data including a list of one or more consumption records; identifying one or more suspicious content owners, wherein the one or more suspicious content owners provide digital content accessible via the web service; identifying one or more suspicious content users, wherein the one or more suspicious content users are consumers of digital content via the web service; generating a notification including the at least one of the one or more suspicious content owners or the at least one of the one or more suspicious content users; and holding payment to the suspicious content owner based on the abusive traffic. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computing device for detecting abusive traffic on a web service, the computing device comprising:
-
a processor, a memory, and an output device for presenting a visual output to a user, the visual output comprising a user interface of an application, the computing device operable to; gathering consumption records associated with consumption of digital content via the web service, the one or more consumption records comprising a content owner, a content user, and a date of the consumption; aggregating a set of consumption data, the aggregated set of consumption data including a list of one or more consumption records; identifying one or more suspicious content owners, wherein the one or more suspicious content owners provide digital content accessible via the web service; identifying one or more suspicious content users, wherein the one or more suspicious content users are consumers of digital content via the web service; generating a notification including the at least one of the one or more suspicious content owners or the at least one of the one or more suspicious content users; and holding payment to the suspicious content owner based on the abusive traffic. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer readable storage medium containing computer executable instructions which, when executed by a computer, perform a method for detecting abusive traffic on a web service, the method comprising:
-
gathering consumption records associated with consumption of digital content via the web service, the one or more consumption records comprising a content owner, a content user, and a date of the consumption; filtering consumption records of consumption that occurred by mistake; aggregating a set of consumption data, the aggregated set of consumption data including a list of one or more consumption records; identifying one or more suspicious content owners, wherein the one or more suspicious content owners provide digital content accessible via the web service; identifying one or more suspicious content users, wherein the one or more suspicious content users are consumers of digital content via the web service; generating a notification including the at least one of the one or more suspicious content owners or the at least one of the one or more suspicious content users; and holding payment to the suspicious content owner based on the abusive traffic. - View Dependent Claims (16, 17, 19, 20)
-
Specification