Method and apparatus to detect fraudulent activities within a network-based auction facility
First Claim
1. A method of detecting a fraudulent activity at a network-based transaction facility, the method comprising:
- generating a first identifier associated with a first user identity, the first identifier to be stored in a shill cookie on a client machine of the first user, the first identifier being generated responsive to at least a first of a plurality of triggering events with respect to the network-based transaction facility, the network-based transaction facility being coupled to the client machine via a network;
generating a second identifier associated with a second user identity, the second user identity to be stored in the shill cookie on the client machine, the second identifier being generated responsive to at least a second of the plurality of triggering events with respect to the network-based transaction facility;
receiving information stored on the shill cookie at the network-based transaction facility; and
detecting a potentially fraudulent activity by detecting a lack of correspondence between the first identifier and the second identifier.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatuses for detecting fraudulent activities made over a network-based transaction facility using a machine. In responsive to a first event with respect to the network-based transaction facility and initiated under a first user identity from the machine which is coupled to the network-based transaction facility via a network, the method causes a first identifier associated with the first user identity to be stored on the machine. In responsive to a second event with respect to the network-based transaction facility and initiated under a second user identity from the machine, the method causes a detecting of a potentially fraudulent activity by detecting a lack of correspondence between the first identifier stored on the machine and a second identifier associated with the second user identity.
197 Citations
26 Claims
-
1. A method of detecting a fraudulent activity at a network-based transaction facility, the method comprising:
-
generating a first identifier associated with a first user identity, the first identifier to be stored in a shill cookie on a client machine of the first user, the first identifier being generated responsive to at least a first of a plurality of triggering events with respect to the network-based transaction facility, the network-based transaction facility being coupled to the client machine via a network; generating a second identifier associated with a second user identity, the second user identity to be stored in the shill cookie on the client machine, the second identifier being generated responsive to at least a second of the plurality of triggering events with respect to the network-based transaction facility; receiving information stored on the shill cookie at the network-based transaction facility; and detecting a potentially fraudulent activity by detecting a lack of correspondence between the first identifier and the second identifier. - View Dependent Claims (2, 5, 6, 7, 8, 9, 10, 11, 12, 16, 17, 18, 19)
-
-
3. The method of claim I, wherein the at least one of the plurality of triggering events is a sales transaction event, the method further comprising prohibiting a completion of the sales transaction event responsive to the detection of the lack of correspondence between the first identifier and the second identifier.
-
4. The method of claim I, wherein the at least one of the plurality of triggering events is a sates transaction event, the sales transaction event including at least one of registering with the network-based transaction facility, communicating an offer to sell an offering via the network-based transaction facility, communicating and offering to purchase the offering via the network-based transaction facility, communicating a feedback regarding a transaction, or updating a profile maintained by the network-based transaction facility.
-
13. The method of claim I. further comprising:
-
generating a potential fraudulent activities table having a fraudulent activity field, a cookie identifier field, a user identifier field, and a frequency field; recording each of a plurality of potentially fraudulent activities and corresponding information into the potential fraudulent activities table; updating the potential fraudulent activities table at least on a periodic basis; and providing an updated report of the potential fraudulent activities table to an investigation team. - View Dependent Claims (14, 15)
-
-
20. A non-transitory computer readable storage medium comprising instructions, which when executed on a processor, cause the processor to perform a method of detecting suspicious transactions made over a network-based transaction facility using a client machine, the method comprising:
-
generating a first identifier associated with a first user identity, the first identifier to be stored in a shill cookie on a client machine of the first user, the first identifier being generated responsive to at least a first of a plurality of triggering events with respect to the network-based transaction facility, the network-based transaction facility being coupled to the client machine via a network; generating a second identifier associated with a second user identity, the second user identity to be stored in the shill cookie on the client machine, the second identifier being generated responsive to at least a second of the plurality of triggering events with respect to the network-based transaction facility; transmitting information stored on the shill cookie to the network-based transaction facility; and detecting a potentially fraudulent activity by detecting a lack of correspondence between the first identifier and the second identifier.
-
-
21. A system to detect a fraudulent activity at a e network-based transaction facility, the system comprising:
-
an identifier processor to generate and forward a shill cookie over a network to be stored on a client machine responsive to at least a first of a plurality of triggering events being produced at the client machine after the client machine accesses the network-based transaction facility via the network , the shill cookie to contain information related to a first identifier associated with a first user identity, the identifier processor further to generate a second identifier associated with a second user identity, the second user identity to be stored in the shill cookie on the client machine, the second identifier being generated responsive to at least a second of the plurality of triggering events with respect to the network-based transaction facility; and a detection processor to detect a potentially fraudulent activity by detecting a lack of correspondence between the first identifier and the second identifier. - View Dependent Claims (22, 23, 24, 25, 26)
-
Specification