Systems and methods of sharing information through a tag-based consortium
First Claim
1. A fraud detection consortium, comprising:
- a plurality of online company servers for online companies that provide a service;
an authentication repository that connects to the plurality of online company servers over a communications network; and
a user computer that connects to an online company server of the plurality of online company servers over a communications network to use the provided service;
wherein the online company server receives information about the user computer and transmits the information about the user computer to the authentication repository, andwherein the authentication repository, with aid of one or more processors;
checks for tag-based information about the user computer collected from the plurality of online company servers,receives the tag-based information including a tag-generation time stamp from the user computer, wherein the tag-generation time stamp is indicative of the time that the tag-based information was generated,shares the tag-based information including the tag-generation time stamp with the plurality of online companies,analyzes the time that the tag-based information was generated as part of a fraud detection analysis,initiates a fraud detection protocol that provides an indication of an increased likelihood of fraud when the tag-generation time stamp is created within less than a predetermined time interval of initiation of said fraud detection protocol,conducts further fraud analysis when the indication of the increased likelihood of fraud is provided utilizing the authentication repository, to measure an amount of tag-based information received within a particular time period, and created within less than the predetermined time interval, andconveys information about the further fraud analysis to the plurality of online companies.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention provides one or more consortia of networks that identify and share information about users and/or user devices. User devices may be identified by tag-based computer information. A time stamp may be inserted into time based computer tags such as a cookies indicating when they were created. Such time stamp information can be encrypted and analyzed during future attempts to access a secure network such as a customer attempting to log into an online banking account. When the time stamp information from the tag is compared to other selected information about the user, device and/or account, including but not limited to last account log-in date/time or account creation date, the invention may be used to detect suspicious activity. The invention may be use for identity-based applications such as network security, the detection of fraudulent transactions, identity theft, reputation-based communities, and law enforcement.
170 Citations
30 Claims
-
1. A fraud detection consortium, comprising:
-
a plurality of online company servers for online companies that provide a service; an authentication repository that connects to the plurality of online company servers over a communications network; and a user computer that connects to an online company server of the plurality of online company servers over a communications network to use the provided service; wherein the online company server receives information about the user computer and transmits the information about the user computer to the authentication repository, and wherein the authentication repository, with aid of one or more processors; checks for tag-based information about the user computer collected from the plurality of online company servers, receives the tag-based information including a tag-generation time stamp from the user computer, wherein the tag-generation time stamp is indicative of the time that the tag-based information was generated, shares the tag-based information including the tag-generation time stamp with the plurality of online companies, analyzes the time that the tag-based information was generated as part of a fraud detection analysis, initiates a fraud detection protocol that provides an indication of an increased likelihood of fraud when the tag-generation time stamp is created within less than a predetermined time interval of initiation of said fraud detection protocol, conducts further fraud analysis when the indication of the increased likelihood of fraud is provided utilizing the authentication repository, to measure an amount of tag-based information received within a particular time period, and created within less than the predetermined time interval, and conveys information about the further fraud analysis to the plurality of online companies. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 28, 29, 30)
-
-
9. A network security system for an online organization comprising:
-
a computer network having a series of one or more web servers accessible by customer network devices, wherein the customer network devices include; a first time stamped computer tag communicated to a first web server over a communications network while accessing a user account, wherein a first time stamp of the first time stamped computer tag is indicative of a time the first time stamped computer tag was created; and a second time stamped computer tag communicated to a second web server over a communications network while accessing a user account, wherein a second time stamp of the second time stamped computer tag is indicative of a time the second time stamped computer was created; and a fraud detection system containing a fraud detection server for analyzing the first time stamped computer tag and the second time stamped computer tag received from the network devices to determine when they were created as part of a fraud risk analysis associated with user accounts, wherein the fraud detection system initiates a fraud detection protocol that provides an indication of an increased likelihood of fraud when the first time stamped computer tag or the second time stamped computer tag is created within less than a predetermined time interval of initiation of said fraud risk protocol, wherein the fraud detection system conducts further fraud analysis when the indication of the increased likelihood of fraud is provided to measure a number of time stamped computer tags received within a particular time period and created within less than the predetermined time interval, and wherein the fraud detection system conveys information about the further fraud analysis to the first web server and the second web server. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A method for detecting fraud in a consortia comprising:
-
creating a first computer tag in the course of a first online transaction, and a second computer tag in the course of a second online transaction, wherein each computer tag includes time stamp information indicative of the time at the creation of each computer tag; sharing the first computer tag and the second computer tag with one or more institutions of the consortium; generating, with aid of one or more processors, a matching parameter based on a comparison of information provided by the first computer tag and the second computer tag not including the time stamp information; initiating a fraud detection protocol that provides an indication of an increased likelihood of fraud when the first computer tag or the second computer tag is created within less than a predetermined time interval of initiation of said fraud detection protocol; conducting further fraud analysis when the indication of the increased likelihood of fraud is provided to measure a number of computer tags received within a particular time period and created within less than the predetermined time interval; and conveying, to the one or more institutions, information about the further fraud analysis. - View Dependent Claims (17, 18, 19, 20, 21)
-
-
22. A method for detecting fraud in a consortia comprising:
-
creating a first computer tag in the course of a first online transaction with a first device, and a second computer tag in the course of a second online transaction with a second device, wherein the first computer tag includes a first time stamp indicative of the time of creation of the first computer tag and the second computer tag includes a second time stamp indicative of the time of creation of the second computer tag; sharing the first computer tag and the second computer tag with one or more institutions of the consortium; initiating a fraud detection protocol that provides an indication of an increased likelihood of fraud when the first computer tag or the second computer tag is created within less than a predetermined time interval of initiation of said fraud detection protocol; conducting further fraud analysis when the indication of the increased likelihood of fraud is provided to measure a number of computer tags received within a particular time period and created within less than the predetermined time interval; and conveying information about the further fraud analysis the one or more institutions of the consortium. - View Dependent Claims (23, 24, 25, 26, 27)
-
Specification