Identifying fraudulent activities and the perpetrators thereof
First Claim
1. A system for identifying a perpetrator of a fraudulent activity, the system comprising:
- location logic to locate identifying information from a client communication;
analyzer logic to analyze the identifying information from the client communication; and
account identifier logic to identify multiple user accounts associated with a previous client communication in which the same identifying information was located.
2 Assignments
0 Petitions
Accused Products
Abstract
A system for identifying perpetrators of fraudulent activity includes location logic for locating, extracting, or capturing identifying information from a client communication received from a client device. For example, the location logic may locate, or extract, a variety of message headers from an HTTP client request. The system may also include analyzer logic to analyze the identifying information, for example, by comparing the identifying information with previously captured identifying information from a previously received client communication. Finally, the system may include account identifier logic to identify user accounts associated with the previous client communication in which the same identifying information was extracted.
197 Citations
18 Claims
-
1. A system for identifying a perpetrator of a fraudulent activity, the system comprising:
-
location logic to locate identifying information from a client communication; analyzer logic to analyze the identifying information from the client communication; and account identifier logic to identify multiple user accounts associated with a previous client communication in which the same identifying information was located. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer-implemented method for identifying a perpetrator of a fraudulent activity, the method comprising:
-
capturing identifying information associated with a client communication; and analyzing the identifying information associated with the client communication to identify at least one user account associated with a previous client communication in which the same identifying information was captured. - View Dependent Claims (7, 8, 9, 10, 11)
-
-
12. A computer-implemented method for identifying a perpetrator of a fraudulent activity, the method comprising:
-
capturing an HTTP header included in an HTTP request from a client device; and analyzing the HTTP header included in the HTTP request from the client device to identify at least one user account associated with a previous client communication in which the same HTTP header was utilized. - View Dependent Claims (13, 14, 15)
-
-
16. A system for identifying a perpetrator of a fraudulent activity, the system including:
-
means for locating identifying information from a client communication; means for analyzing the identifying information from the client communication; and means for identifying at least one user account associated with a previous client communication in which the same identifying information was located.
-
-
17. A machine-readable medium including a set of instructions that, when executed by a machine, cause the machine to:
-
capture identifying information associated with a client communication; and analyze the identifying information associated with the client communication to identify at least one user account associated with a previous client communication in which the same identifying information was captured.
-
-
18. A machine-readable medium including a set of instructions that, when executed by a machine, cause the machine to:
-
capture an HTTP header included in an HTTP request from a client device; and analyze the HTTP header included in the HTTP request from the client device to identify at least one user account associated with a previous client communication in which the same HTTP header was utilized.
-
Specification