Online fraud solution
First Claim
1. A computer system for investigating suspicious information associated with a suspect server to determine whether the suspect server is associated with fraudulent activities, the computer system comprising:
- a master computer; and
at least one memory device coupled with the master computer, the at least one memory device having stored therein a sequence of instructions which, when executed by the master computer, cause the computer system to;
obtain, by the master computer, a data set associated with the suspect server;
analyze, by the master computer, the data set to detect potential fraudulent activity associated with a data set by identifying, within the data set, a request for specified personal information from a user;
detect potential fraudulent activity;
generate, in response to detecting potential fraudulent activity and by using a dilution engine, a plurality of responses to the request for specified personal information, each response including a set of safe data responsive to the request for specified personal information;
associate each of the plurality of responses with one of a plurality of IP addresses from at least one network block or one or more proxy servers;
transmit the plurality of responses to the suspect server;
monitor for the use of the set of safe data on a network; and
trace the use of the set of safe data to a potential perpetrator.
10 Assignments
0 Petitions
Accused Products
Abstract
Various embodiments of the invention provide solutions (including inter alia, systems, methods and software) for dealing with online fraud. Some embodiments function to access and/or obtain information from (and/or receive data from) a data source; the data might, for example, indicate a possible instance of online fraud. Certain embodiments, therefore, can be configured to analyze the data, e.g., to determine whether the data indicate a likely instance of online fraud. Such instances may be further investigated, and/or a response may be initiated. Data sources can include, without limitation, web pages, email messages, online chat sessions, domain zone files, newsgroups (and/or postings thereto), etc. Data obtained from the data sources can include, without limitation, suspect domain registrations, uniform resource locators, references to trademarks, advertisements, etc.
190 Citations
19 Claims
-
1. A computer system for investigating suspicious information associated with a suspect server to determine whether the suspect server is associated with fraudulent activities, the computer system comprising:
-
a master computer; and at least one memory device coupled with the master computer, the at least one memory device having stored therein a sequence of instructions which, when executed by the master computer, cause the computer system to; obtain, by the master computer, a data set associated with the suspect server; analyze, by the master computer, the data set to detect potential fraudulent activity associated with a data set by identifying, within the data set, a request for specified personal information from a user; detect potential fraudulent activity; generate, in response to detecting potential fraudulent activity and by using a dilution engine, a plurality of responses to the request for specified personal information, each response including a set of safe data responsive to the request for specified personal information; associate each of the plurality of responses with one of a plurality of IP addresses from at least one network block or one or more proxy servers; transmit the plurality of responses to the suspect server; monitor for the use of the set of safe data on a network; and trace the use of the set of safe data to a potential perpetrator. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of investigating suspicious information associated with a suspect server to determine whether the suspect server is associated with fraudulent activities, comprising:
-
obtaining, by a master computer, a data set associated with the suspect server; analyzing, by the master computer, the data set to detect potential fraudulent activity associated with the data set by identifying, within the data set, a request for specified personal information from a user; detecting potential fraudulent activity in response to identifying the request for specified personal information; generating, in response to detecting potential fraudulent activity and by using a dilution engine, a plurality of responses to the request for specified personal information, each response including a set of safe data responsive to the request for specified personal information; associating each of the plurality of responses with one of a plurality of IP addresses from at least one network block or one or more proxy servers; transmitting the plurality of responses to the suspect server; monitoring for the use, subsequent to said transmitting, of the set of safe data on a network; and tracing the use of the set of safe data to a potential perpetrator. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
-
Specification