SYSTEMS AND METHODS OF SHARING INFORMATION THROUGH A TAG-BASED CONSORTIUM
1 Assignment
0 Petitions
Accused Products
Abstract
The invention provides one or more consortia of networks that identify and share information about users and/or user devices interacting with the consortia. User devices may be identified, at least in part, by tag-based computer information. Computers and other devices accessing the Web carry device tags with date and time information describing when they were issued by a security tag server. A server time stamp may be inserted into time based computer tags such as a cookies indicating when they were created. Such time stamp information can be encrypted and analyzed during future attempts to access a secure network such as a customer attempting to log into an online banking account. When the time stamp information from the tag is compared to other selected information about the user, device and/or account, including but not limited to last account log-in date/time or account creation date, the invention may be used to detect suspicious activity. The invention may be use for identity-based applications such as network security, the detection of fraudulent transactions, identity theft, reputation-based communities, and law enforcement.
29 Citations
40 Claims
-
1-20. -20. (canceled)
-
21. A system comprising:
-
a network interface configured to communicate with a plurality of network service devices comprising a first network service device associated with a first institution; a data store configured to store computer-executable instructions; and a processor in communication with the data store, the processor, when executing the computer-executable instructions, configured to, during an online transaction; access a first plurality of transaction tags associated with a plurality of customer computing devices and a first server computing device; determine, for each of the first plurality of transaction tags, a corresponding timestamp and a corresponding server computing device identification information associated with the first server computing device which generated the corresponding timestamp, wherein the corresponding timestamp is indicative of a time of creation of the each of the first plurality of transaction tags; automatically analyze the corresponding timestamps of each of the first plurality of transaction tags using a fraud detection protocol to determine a number of transaction tags within the first plurality of transaction tags which have corresponding timestamps that fall within a predetermined time interval, wherein the fraud detection protocol provides an indication of an increased risk of fraud associated with a threshold predetermined number of transaction tags with corresponding timestamps that fall within the predetermined time interval; associate an increased risk of fraud with the first plurality of transaction tags, based at least in part on the determination that the number of transaction tags within the first plurality of transaction tags is greater than the predetermined number of transaction tags; generate a risk data packet configured for transmission to at least the first network service, the risk data packet comprising encrypted identifying information associated with a subset of the first plurality of transaction tags with corresponding timestamps that fall within the predetermined time interval and an electronic indication of the increased risk of fraud associated with the first server computing device; and share the risk data packet with other network service devices. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A computer-implemented method comprising:
-
accessing computer-executable instructions from at least one computer-readable storage medium; and executing the computer-executable instructions, thereby causing computer hardware comprising at least one computer processor to perform operations comprising; receiving, from a first server computing device, a first plurality of transaction tags associated with a first plurality of electronic transactions involving a first network service device and a first plurality of customer computing devices, each of the first plurality of transaction tags associated with at least a first of the first plurality of customer computing devices and a first account associated with the first network service device, and the each of the first plurality of transaction tags comprising a corresponding timestamp and a corresponding server computing device identification information associated with the first server computing device; automatically analyzing the corresponding timestamps of each of the first plurality of transaction tags using a fraud detection protocol to determine a number of transaction tags within the first plurality of transaction tags which have corresponding timestamps that fall within a predetermined time interval, wherein the fraud detection protocol indicates of an increased risk of fraud associated with a threshold predetermined number of transaction tags with corresponding timestamps that fall within the predetermined time interval; determining, based at least in part on the fraud detection protocol, that the first plurality of transaction tags indicate an increased risk of fraud; and generating an encrypted data packet, the encrypted data packet comprising identifying information associated with a subset of the first plurality of transaction tags with corresponding timestamps that fall within the predetermined time interval and an electronic indication of the increased risk of fraud associated with the first server computing device. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39)
-
-
40. A non-transitory computer storage medium storing computer-executable instructions that, when executed by a processor, cause the processor to perform the following method:
-
receiving, from a first server computing device, a first plurality of transaction tags associated with a first plurality of electronic transactions involving a first network service device and a first plurality of customer computing devices, each of the first plurality of transaction tags associated with at least a first of the first plurality of customer computing devices and a first account associated with the first network service device, and the each of the first plurality of transaction tags comprising a corresponding timestamp and a corresponding server computing device identification information associated with the first server computing device; automatically analyzing the corresponding timestamps of each of the first plurality of transaction tags using a fraud detection protocol to determine a number of transaction tags within the first plurality of transaction tags which have corresponding timestamps that fall within a predetermined time interval, wherein the fraud detection protocol indicates of an increased risk of fraud associated with a threshold predetermined number of transaction tags with corresponding timestamps that fall within the predetermined time interval; determining, based at least in part on the fraud detection protocol, that the first plurality of transaction tags indicate an increased risk of fraud; and generating an encrypted data packet, the encrypted data packet comprising identifying information associated with a subset of the first plurality of transaction tags with corresponding timestamps that fall within the predetermined time interval and an electronic indication of the increased risk of fraud associated with the first server computing device.
-
Specification