×

Using mock tokens to protect against malicious activity

  • US 9,516,059 B1
  • Filed: 06/28/2011
  • Issued: 12/06/2016
  • Est. Priority Date: 06/28/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method of fraud protection, the method comprising:

  • providing a first mock token to first suspected fraudster equipment in response to a first phishing attempt, the mock token appearing to be a legitimate user token that identifies a legitimate user, wherein no legitimate token is provided to the first suspected fraudster equipment in response to the first phishing attempt, and storing the first mock token in a first database entry associated with the legitimate user and the first suspected fraudster;

    providing a second mock token to a second suspected fraudster equipment in response to a second phishing attempt, the mock token appearing to be a legitimate user token that identifies a legitimate user, wherein no legitimate token is provided to the second suspected fraudster equipment in response to the second phishing attempt, and storing the second mock token in a second database entry associated with the legitimate user and the second suspected fraudster;

    subsequent to providing the first and second mock tokens, receiving, from suspected fraudster equipment, an authentication request which includes one of the first and second mock tokens stored in the database, thereby identifying the suspected fraudster equipment as a true fraudster; and

    in response to receiving the authentication request which uses the mock token from the true fraudster, performing a set of authentication server operations to protect against future activity by the true fraudster;

    wherein each legitimate token is derived from a secret seed uniquely associated with a corresponding legitimate user account;

    wherein providing the first mock token to the first suspected fraudster equipment in response to the first phishing attempt includes providing log-in information falsely appearing to allow access to a legitimate user account; and

    wherein the method further includes performing an authentication operation which detects an attempt to use of one of the first and second mock tokens to prove authorization to access the legitimate user account; and

    wherein performing the set of authentication server operations further includes performing a remedial operation in response to detected use of the mock token,wherein performing the remedial operation in response to detected use of one of the first and second mock tokens includes;

    outputting a message to a set of authentication servers, the message identifying the fraudster equipment as a source of malicious activity,wherein the set of authentication servers includes a plurality of authentication servers which each control access to protected resources.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×