Fraud risk advisor
First Claim
Patent Images
1. A method for calculating a travel velocity between a first access location and a second access location, comprising the steps of:
- a. determining the first access location based on a first IP address;
b. determining a first access time;
c. determining the second access location based on a second IP address;
d. determining a second access time; and
e. calculating the travel velocity between the first access location and the second access location as a function of the first access location and the first access time and the second access location and the second access time.
1 Assignment
0 Petitions
Accused Products
Abstract
A fraudulent business transaction application (FBTA) is provided for monitoring application based fraud. When a consumer supplies account access information in order to carry out an Internet business transaction, the FBTA uses an online fraud mitigation engine to detect phishing trusions and identity theft. Methods are also provided for calculating travel velocity and transcation frequency, which are useful for determining a fraudulent transaction.
-
Citations
8 Claims
-
1. A method for calculating a travel velocity between a first access location and a second access location, comprising the steps of:
-
a. determining the first access location based on a first IP address; b. determining a first access time; c. determining the second access location based on a second IP address; d. determining a second access time; and e. calculating the travel velocity between the first access location and the second access location as a function of the first access location and the first access time and the second access location and the second access time. - View Dependent Claims (2)
-
-
3. A method for calculating a user'"'"'s travel velocity between a first access location and a second access location, comprising the steps of:
-
a. determining for the user the first access location and a first access time; b. determining for the user the second access location based on the IP address of the user; c. determining for the user a second access time; and d. calculating the travel velocity of the user as a function of the first access location and the first access time and the second access location and the second access time. - View Dependent Claims (4, 5, 6, 7, 8)
-
Specification