Data transfer for network interaction fraudulence detection
First Claim
Patent Images
1. A system for transferring metadata, comprising:
- a processor; and
a memory coupled with the processor, wherein the memory is configured to provide the processor with instructions which when executed cause the processor to;
process information about a first network interaction to generate metadata describing the network interaction;
determine based on the metadata whether the metadata is to be transferred to an aggregator, wherein determining whether the metadata is to be transferred includes determining whether a confidence level is below a threshold;
in the event that the metadata is to be transferred, determine one or more aggregators to which the metadata is to be transferred;
transfer the metadata to the one or more aggregators, wherein one of the one or more aggregators uses the metadata for determining fraudulence or legitimacy of a second network interaction.
12 Assignments
0 Petitions
Accused Products
Abstract
Transferring metadata is disclosed. Information about a network interaction is processed to generate metadata describing the network interaction. Based on the metadata it is determined whether the metadata is to be transferred to an aggregator. In the event that the metadata is to be transferred, one or more aggregators are determined to which the metadata is to be transferred. The metadata is transferred to the one or more aggregators.
213 Citations
18 Claims
-
1. A system for transferring metadata, comprising:
-
a processor; and a memory coupled with the processor, wherein the memory is configured to provide the processor with instructions which when executed cause the processor to; process information about a first network interaction to generate metadata describing the network interaction; determine based on the metadata whether the metadata is to be transferred to an aggregator, wherein determining whether the metadata is to be transferred includes determining whether a confidence level is below a threshold; in the event that the metadata is to be transferred, determine one or more aggregators to which the metadata is to be transferred; transfer the metadata to the one or more aggregators, wherein one of the one or more aggregators uses the metadata for determining fraudulence or legitimacy of a second network interaction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for transferring metadata, comprising:
-
processing information about a first network interaction to generate metadata describing the network interaction; determining based on the metadata whether the metadata is to be transferred to an aggregator, wherein determining whether the metadata is to be transferred includes determining whether a confidence level is below a threshold; in the event that the metadata is to be transferred, determining one or more aggregators to which the metadata is to be transferred; transferring the metadata to the one or more aggregators, wherein one of the one or more aggregators uses the metadata for determining fraudulence or legitimacy of a second network interaction.
-
-
18. A computer program product for transferring metadata, the computer program product being embodied in a non-transitory tangible computer readable storage medium and comprising computer instructions for:
-
processing information about a first network interaction to generate metadata describing the network interaction; determining based on the metadata whether the metadata is to be transferred to an aggregator, wherein determining whether the metadata is to be transferred includes determining whether a confidence level is below a threshold; in the event that the metadata is to be transferred, determining one or more aggregators to which the metadata is to be transferred; transferring the metadata to the one or more aggregators, wherein one of the one or more aggregators uses the metadata for determining fraudulence or legitimacy of a second network interaction.
-
Specification