User fraud detection and prevention of access to a distributed network communication system
First Claim
1. A method, comprising:
- receiving a username and a password from a first computing device, wherein the username and the password are associated with a user account of a first network provider;
a second network provider, different from the first network provider, initiating a first network access of the first computing device associated with a first computing device identification;
storing a first set of identification data associated with initiating the first network access in response to initiating the first network access, wherein the first set of identification data comprises the first computing device identification, wherein the first computing device identification includes at least one of a first interne, protocol address, a first media access control identification, a first CPU identification, a first electronic serial number (ESN), a first mobile information number (MIN), a first mobile directory number (MDN), a first cookie identification, and a first certificate identification, wherein the first set of identification data further comprises the username and the password;
receiving the username and the password from a second computing device, wherein the second computing device is different from the first computing device;
the second network provider initiating a second network access of the second computing device associated with a second computing device identification, wherein the second computing device identification is different from the first computing device identification;
storing a second set of identification data associated with initiating the second network access in response to initiating the second network access, wherein the second set of identification data comprises the second computing device identification and the username and the password, wherein the second computing device identification includes at least one of a second interne protocol address, a second media access control identification, a second CPU identification, a second ESN, a second MIN, a second MDN, a second cookie identification, and a second certificate identification;
determining one or more fraud indicators in the first set of identification data and the second set of identification data indicating that the first computing device and the second computing device are different computing devices, wherein the one or more fraud indicators comprise a use of the username and the password with both the first computing device identification and the second computing device identification; and
revoking at least one of the first network access and the second network access in response to determining the one or more fraud indicators.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method are disclosed for user fraud protection and prevention of access to a distributed network communication system. A first set of identification data associated with a first network access are stored. A second set of identification data associated with a second network access are stored. The first and second sets of identification data comprise a first computing device identification and a second computing device identification, respectively. If one or more fraud indicators are determined in the two sets of identification data, then the first and/or second network access may be revoked. The fraud indicators may include, e.g., use of the same username with different computing device identifications, use of the same computing device identification at different geographical locations, violation of a threshold for computing device identifications, violation of a threshold for authentication failures, and violation of a threshold for rate of network propagation by a user account.
-
Citations
110 Claims
-
1. A method, comprising:
-
receiving a username and a password from a first computing device, wherein the username and the password are associated with a user account of a first network provider; a second network provider, different from the first network provider, initiating a first network access of the first computing device associated with a first computing device identification; storing a first set of identification data associated with initiating the first network access in response to initiating the first network access, wherein the first set of identification data comprises the first computing device identification, wherein the first computing device identification includes at least one of a first interne, protocol address, a first media access control identification, a first CPU identification, a first electronic serial number (ESN), a first mobile information number (MIN), a first mobile directory number (MDN), a first cookie identification, and a first certificate identification, wherein the first set of identification data further comprises the username and the password; receiving the username and the password from a second computing device, wherein the second computing device is different from the first computing device; the second network provider initiating a second network access of the second computing device associated with a second computing device identification, wherein the second computing device identification is different from the first computing device identification; storing a second set of identification data associated with initiating the second network access in response to initiating the second network access, wherein the second set of identification data comprises the second computing device identification and the username and the password, wherein the second computing device identification includes at least one of a second interne protocol address, a second media access control identification, a second CPU identification, a second ESN, a second MIN, a second MDN, a second cookie identification, and a second certificate identification; determining one or more fraud indicators in the first set of identification data and the second set of identification data indicating that the first computing device and the second computing device are different computing devices, wherein the one or more fraud indicators comprise a use of the username and the password with both the first computing device identification and the second computing device identification; and revoking at least one of the first network access and the second network access in response to determining the one or more fraud indicators. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 88)
-
-
19. A method, comprising:
-
receiving a username and a password from a first computing device, wherein the username and the password are associated with a user account of a first network provider; receiving a first set of identification data associated with the first computing device, wherein the first set of identification data comprises the username, the password, and a first computing device identification that identifies the first computing device, wherein the first computing device identification includes at least one of a first internet protocol address, a first media access control identification, a first CPU identification, a first electronic serial number (ESN), a first mobile information number (MIN), a first mobile directory number (MDN), a first cookie identification, and a first certificate identification; receiving the username and the password from a second computing device, wherein the second computing device is different from the first computing device; receiving a second set of identification data associated with the second computing device, wherein the second set of identification data comprises the username, the password, and a second computing device identification that identifies the second computing device accessing the network, wherein the second computing device identification includes at least one of a second internet protocol address, a second media access control identification, a second CPU identification, a second ESN, a second MIN, a second MDN, a second cookie identification, and a second certificate identification, wherein the second computing device is different from the first computing device, wherein the first computing device identification and the second computing device identification comprise different computing device identifications; determining, from the first set of identification data and the second set of identification data, a use of the username and the password with both the first computing device identification and the second computing device identification; and a second network provider, different from the first network provider, revoking at least one of a first network access of a network by the first computing device and a second network access of the network by the second computing device in response to determining, from the first set of identification data and the second set of identification data, the use of the username and the password with both the first computing device identification and the second computing device identification. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 89)
-
-
30. An article of manufacture, comprising:
-
a computer-readable storage medium; and program instructions stored on the computer-readable storage medium that when executed on a processing system, the processing system; receives a username and a password from a first computing device, wherein the username and the password are associated with a user account of a first network provider; stores a first set of identification data associated with a first network access provided by a second network provider, different from the first network provider, wherein the first set of identification data comprises a first computing device identification, wherein the first computing device identification includes at least one of a first internet protocol address, a first media access control identification, a first CPU identification, a first electronic serial number (ESN), a first mobile information number (MIN), a first mobile directory number (MDN), a first cookie identification, and a first certificate identification, wherein the first set of identification data further comprises the username and the password; receives the username and the password from a second computing device, wherein the second computing device is different from the first computing device; stores a second set of identification data associated with a second network access provided by the second network provider, wherein the second set of identification data comprises a second computing device identification, the username, and the password, wherein the second computing device identification includes at least one of a second internet protocol address, a second media access control identification, a second CPU identification, a second ESN, a second MIN, a second MDN, a second cookie identification, and a second certificate identification, wherein the first computing device identification and the second computing device identification comprise different computing device identifications; determines one or more fraud indicators in the first set of identification data and the second set of identification data indicating that the first computing device and the second computing device are different computing devices, wherein the one or more fraud indicators comprise a use of the username and the password with both the first computing device identification and the second computing device identification; and revokes at least one of the first network access and the second network access in response to determining the one or more fraud indicators. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 90)
-
-
48. An article of manufacture comprising a computer readable memory medium that includes program instructions, wherein the program instructions are computer-executable to implement:
-
receiving a username and a password from a first hardware device, wherein the username and the password are associated with a user account of a first network provider; receiving a first set of identification data associated with a first network access provided by a second network provider, different from the first network provider, wherein the first set of identification data comprises the username, the password, and a first computing device identification that identifies a first hardware device accessing the network, wherein the first computing device identification includes at least one of a first interne protocol address, a first media access control identification, a first CPU identification, a first electronic serial number (ESN), a first mobile information number (MIN), a first mobile directory number (MDN), a first cookie identification, and a first certificate identification, receiving the username and the password from a second hardware device, wherein the second hardware device is different from the first hardware device; receiving a second set of identification data associated with a second network access provided by the second network provider, wherein the second set of identification data comprises the username, the password, and a second computing device identification that identifies a second hardware device, wherein the second computing device identification includes at least one of a second interne protocol address, a second media access control identification, a second CPU identification, a second ESN, a second MIN, a second MDN, a second cookie identification, and a second certificate identification, wherein the first computing device identification and the second computing device identification comprise different computing device identifications; determining, from the first set of identification data and the second set of identification data, a use of the username and the password with both the first computing device identification and the second computing device identification; and revoking at least one of the first network access and the second network access in response to determining, from the first set of identification data and the second set of identification data, the use of the username and the password with both the first computing device identification and the second computing device identification. - View Dependent Claims (49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 91)
-
-
59. A system, comprising:
-
a CPU coupled to a network; a memory coupled to the CPU, wherein the memory stores program instructions which when executed by the CPU, the system receives a username and a password from a first computing device, wherein the username and the password are associated with a user account of a first network provider; receives a first set of identification data associated with a first network access provided by a second network provider, different from the first network provider, wherein the first set of identification data comprises a first computing device identification, wherein the first computing device identification includes at least one of a first internet protocol address, a first media access control identification, a first CPU identification, a first electronic serial number (ESN), a first mobile information number (MIN), a first mobile directory number (MDN), a first cookie identification, and a first certificate identification; receives the username and the password from a second computing device, wherein the second computing device is different from the first computing device; receives a second set of identification data associated with a second network access provided by the second network provider, wherein the second set of identification data comprises a second computing device identification and the username, wherein the second computing device identification includes at least one of a second interne protocol address, a second media access control identification, a second CPU identification, a second ESN, a second MIN, a second MDN, a second cookie identification, and a second certificate identification, wherein the first computing device identification and the second computing device identification comprise different computing device identifications; determines one or more fraud indicators in the first set of identification data and the second set of identification data that indicate the first computing device and the second computing device are different computing devices, wherein the one or more fraud indicators comprise a use of the username and the password with both the first computing device identification and the second computing device identification; and revokes at least one of the first network access and the second network access in response to determining the one or more fraud indicators. - View Dependent Claims (60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 92)
-
-
77. A system, comprising:
-
a CPU coupled to a network; a memory coupled to the CPU, wherein the memory stores program instructions which when executed by the CPU, the system receives a username and a password from a first computing device, wherein the username and the password are associated with a user account of a first network provider; stores a first set of identification data associated with a first network access in provided by a second network provider, different from the first network provider, wherein the first set of identification data comprises the username, the password, and a first computing device identification that identifies a first hardware device accessing the network, wherein the first computing device identification includes at least one of a first interne protocol address, a first media access control identification, a first CPU identification, a first electronic serial number (ESN), a first mobile information number (MIN), a first mobile directory number (MDN), a first cookie identification, and a first certificate identification; receives the username and the password from a second computing device, wherein the second computing device is different from the first computing device and the second user is different from the first user; stores a second set of identification data associated with a second network access provided by the second network provider, wherein the second set of identification data comprises the username, the password, and a second computing device identification that identifies a second hardware device accessing the network, wherein the second computing device identification includes at least one of a second internet protocol address, a second media access control identification, a second CPU identification, a second ESN, a second MIN, a second MDN, a second cookie identification, and a second certificate identification, wherein the first computing device identification and the second computing device identification comprise different computing device identifications; determines, from the first set of identification data and the second set of identification data, a use of the username and the password with both the first computing device identification and the second computing device identification; and revokes at least one of the first network access and the second network access in response to determining, from the first set of identification data and the second set of identification data, the use of the username and the password with both the first computing device identification and the second computing device identification. - View Dependent Claims (78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 93)
-
-
94. A method, comprising:
-
a first network provider receiving a username and a password from a first computing device associated with a first computing device identification, wherein the username and the password are associated with a user account of a second network provider, wherein the second network provider is different from the first network provider, wherein the first computing device identification includes at least one of a first internet protocol address, a first media access control identification, a first CPU identification, a first electronic serial number (ESN), a first mobile information number (MIN), a first mobile directory number (MDN), a first cookie identification, and a first certificate identification; the first network provider providing the username and the password to the second network provider for a first authorization of first network access; the first network provider receiving, from the second network provider, first authorization information indicating that the first network access is permitted; permitting, based the first authorization information indicating that the first network access is permitted and the first computing device identification, the first network access to the first computing device; the first network provider receiving the username and the password from a second computing device associated with a second computing device identification, wherein the second computing device identification is different from the first computing device identification, wherein the second computing device identification includes at least one of a second interne protocol address, a second media access control identification, a second CPU identification, a second ESN, a second MIN, a second MDN, a second cookie identification, and a second certificate identification; the first network provider providing the username and the password to the second network provider for a second authorization of second network access; the first network provider receiving, from the second network provider, second authorization information indicating that the second network access is permitted; and revoking, based the second authorization information indicating that the second network access is permitted and the first computing device identification, the first network access of the first computing device. - View Dependent Claims (95, 96, 97, 98, 99, 100)
-
-
101. A system, comprising:
-
a first network operated by a first network provider; an access controller coupled to the first network, wherein the access controller is configured to be coupled to a second network; a server configured to;
be coupled to at least one of the first network and the second network, receive multiple usernames and multiple corresponding passwords, and communicate with the access controller;wherein the server receives a username and a password from a first computing device associated with a first computing device identification and coupled to the first network, wherein the username and the password are associated with a user account of a second network provider, wherein the second network provider is different from the first network provider, and wherein the first computing device identification includes at least one of a first internet protocol address, a first media access control identification, a first CPU identification, a first electronic serial number (ESN), a first mobile information number (MIN), a first mobile directory number (MDN), a first cookie identification, and a first certificate identification; and communicates first access information to the access controller to permit the first computing device access of the second network; wherein the access controller communicates with the server to receive the first access information to permit the first computing device access of the second network; and permits, based on the username, the password, and the first computing device identification, the first computing device access to the second network; wherein the server further receives the username and the password from a second computing device associated with a second computing device identification and coupled to the first network, wherein the second computing device identification includes at least one of a second internet protocol address, a second media access control identification, a second CPU identification, a second ESN, a second MIN, a second MDN, a second cookie identification, and a second certificate identification, and wherein the second computing device identification is different from the first computing device identification; and communicates second access information to the access controller to permit the second computing device access of the second network; and wherein the access controller further communicates with the server to receive the second access information to permit the second computing device access of the second network; and revokes the access of the first computing device to the second network. - View Dependent Claims (102, 103, 104, 105, 106, 107, 108, 109, 110)
-
Specification