Enhanced responses to online fraud
First Claim
1. A method of combating online fraud, the method comprising:
- determining that a web server is engaged in a fraudulent activity to deceive a consumer, the determining comprising parsing a web page hosted by the web server to identify an online form comprising at least one field, the at least one field comprising a request for personal information from the web server;
analyzing the at least one field;
generating a plurality of hypertext transfer protocol (“
HTTP”
) requests, each HTTP request comprising a set of data, the set of data comprising at least one data element corresponding to the at least one field, wherein the at least one data element corresponding to the at least one field in each HTTP request comprises a set of safe data associated with one or more fictitious identities and appearing to comprise a valid response to the at least one field; and
transmitting each of the plurality of HTTP requests for reception by the web server, wherein each of the plurality of HTTP requests appears to originate from a one of a plurality of Internet Protocol (“
IP”
) blocks, and wherein the plurality of HTTP requests are not sufficient to impair any functions of the web server other than the web server'"'"'s ability to respond to HTTP requests.
8 Assignments
0 Petitions
Accused Products
Abstract
Solutions (including inter alia, systems, methods and software) for dealing with online fraud. Certain of these solutions provide enhanced responses to an identified instance of online fraud. Such enhanced responses can incorporate one or more of a variety of strategies for defeating an attempt by a server to filter and/or otherwise avoid responses to its fraudulent activity. Merely by way of example, responses may be disguised (e.g., by transmitting the responses from a variety of computers, by transmitting responses that appear to originate from a computer different than the actual source of the responses, etc.). In some cases, a response strategy may be implemented that forces the server (and/or an operator thereof) to choose between accepting the responses and blocking potential responses from the targets of the fraudulent scheme.
-
Citations
43 Claims
-
1. A method of combating online fraud, the method comprising:
-
determining that a web server is engaged in a fraudulent activity to deceive a consumer, the determining comprising parsing a web page hosted by the web server to identify an online form comprising at least one field, the at least one field comprising a request for personal information from the web server; analyzing the at least one field; generating a plurality of hypertext transfer protocol (“
HTTP”
) requests, each HTTP request comprising a set of data, the set of data comprising at least one data element corresponding to the at least one field, wherein the at least one data element corresponding to the at least one field in each HTTP request comprises a set of safe data associated with one or more fictitious identities and appearing to comprise a valid response to the at least one field; andtransmitting each of the plurality of HTTP requests for reception by the web server, wherein each of the plurality of HTTP requests appears to originate from a one of a plurality of Internet Protocol (“
IP”
) blocks, and wherein the plurality of HTTP requests are not sufficient to impair any functions of the web server other than the web server'"'"'s ability to respond to HTTP requests. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer system for combating online fraud, the system comprising a processor and a computer readable medium having instructions executable by the processor to:
-
determine that a web server is engaged in a fraudulent activity to deceive a consumer; parse a web page hosted by the server to identify an online form comprising at least one field, the at least one field comprising a request for personal information from the web server; analyze the at least one field; generate a plurality of hypertext transfer protocol (“
HTTP”
) requests, each request comprising a set of data, the set of data comprising at least one data element corresponding to the at least one field, wherein the at least one data element corresponding to the at least one field in each HTTP request comprises a set of safe data associated with one or more fictitious identities and appearing to comprise a valid response to the at least one field; andtransmit each of the plurality of HTTP requests for reception by the web server, wherein each of the plurality of HTTP requests appears to originate from a one of a plurality of Internet Protocol (“
IP”
) blocks, and wherein the plurality of HTTP requests are not sufficient to impair any functions of the web server other than the web server'"'"'s ability to respond to HTTP requests. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A computer program embodied on a non-transitory computer readable medium, the computer program comprising instructions executable by a computer to:
-
parse a web page to identify an online form comprising at least one field, the at least one field comprising a request for personal information from the web server;
analyze the at least one field;generate using an algorithm, a plurality of hypertext transfer protocol (“
HTTP”
) requests, each request comprising a set of data, the set of data comprising at least one data element corresponding to the at least one field, wherein the at least one data element corresponding to the at least one field in each HTTP request comprises a set of safe data associated with one or more fictitious identities and appearing to comprise a valid response to the at least one field; andtransmit each of the plurality of HTTP requests to a web server, wherein each of the plurality of HTTP requests appears to originate from a one of a plurality of Internet Protocol (“
IP”
) blocks, and wherein the plurality of HTTP requests are not sufficient to impair any Junctions of the web server other than the web server'"'"'s ability to respond to HTTP requests. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43)
-
Specification