Automatic learning multi-modal fraud prevention (LMFP) system
First Claim
1. A computerized method for generating a new signature of a user to prevent user impersonation, comprising a computer processor steps of,a. fetching a signal from a non-volatile memory of at least one portion of at least one previously generated user'"'"'s signature;
- b. generating at least one challenge sequence based on the signal to create a new signature;
c. presenting the generated challenge sequence to the user;
d. collecting the user'"'"'s challenge response to the generated challenge sequence, and further comprising an events correlation mechanism that checks for use abnormalities of a user and generates a trigger to re-generate a challenge question if an abnormality is detected, wherein the abnormality comprises one or more of;
conflicts in a user'"'"'s known location, current activity, time length of transaction, repetition of visiting a transaction, time lapse between repeated transaction, distribution of transaction locations, speed of movement within same transaction location area, and speed of movement between different transaction location areas;
e. computing a quality factor which represents a degree of correlation between any portion of the user'"'"'s challenge response and any portion of the generated challenge sequence;
f. generating a new signature based on any portion of user'"'"'s challenge response and any portion of the previously generated signature and any portion of collectable information from user'"'"'s device memory;
g. storing the new signature and at least one of, the quality factor, a trust factor or a transaction quality factor in a non-volatile memory or communicating it to a computer program; and
,h. wherein each challenge sequence and challenge response comprises any combination of one or more of textual, visual effects of display, picture, moving picture, video, audio, animation, advertisement format, computer code, and computer data objects.
0 Assignments
0 Petitions
Accused Products
Abstract
A computerized learning multi-modal fraud prevention system and method for generating a data signature of a user, such as one engaged in electronic commerce, to prevent fraudulent activities by machines and persons imitating the user. Steps comprise: fetching a signal of a user'"'"'s signature stored in memory; generating at least one challenge sequence based on the signal to create a second signature; presenting the generated challenge sequence to the user; collecting the user'"'"'s challenge response to the generated challenge sequence; computing a quality factor between the user'"'"'s challenge response and the generated challenge sequence; computing a transaction quality factor and content quality factor and reporting an impostor or re-challenging if the quality factor is below a threshold. Lastly, generating a new signature based on any portion of a user'"'"'s challenge response and/or any portion of the previously generated signature and/or any portion of collectable information from the user'"'"'s device memory.
10 Citations
19 Claims
-
1. A computerized method for generating a new signature of a user to prevent user impersonation, comprising a computer processor steps of,
a. fetching a signal from a non-volatile memory of at least one portion of at least one previously generated user'"'"'s signature; -
b. generating at least one challenge sequence based on the signal to create a new signature; c. presenting the generated challenge sequence to the user; d. collecting the user'"'"'s challenge response to the generated challenge sequence, and further comprising an events correlation mechanism that checks for use abnormalities of a user and generates a trigger to re-generate a challenge question if an abnormality is detected, wherein the abnormality comprises one or more of;
conflicts in a user'"'"'s known location, current activity, time length of transaction, repetition of visiting a transaction, time lapse between repeated transaction, distribution of transaction locations, speed of movement within same transaction location area, and speed of movement between different transaction location areas;e. computing a quality factor which represents a degree of correlation between any portion of the user'"'"'s challenge response and any portion of the generated challenge sequence; f. generating a new signature based on any portion of user'"'"'s challenge response and any portion of the previously generated signature and any portion of collectable information from user'"'"'s device memory; g. storing the new signature and at least one of, the quality factor, a trust factor or a transaction quality factor in a non-volatile memory or communicating it to a computer program; and
,h. wherein each challenge sequence and challenge response comprises any combination of one or more of textual, visual effects of display, picture, moving picture, video, audio, animation, advertisement format, computer code, and computer data objects. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A networked based computing system for detecting fraudulent machine or human impersonation of a user, comprising:
-
a) a system computer comprising at least one processor and at least one memory device operably connected to one another, and a plurality of computer-executable instructions stored on the memory device that when executed by the processor, cause the processor to; i. fetch a signal from a non-volatile memory of at least one portion of at least one previously generated user'"'"'s signature; ii. generate at least one challenge sequence based on the signal to create a new signature; iii. present the generated challenge sequence to the user; iv. collect the user'"'"'s challenge response to the generated challenge sequence, wherein the generated challenge sequence and the user'"'"'s challenge response comprises any combination of one or more of textual, visual effects of display, picture, moving picture, video, audio, animation, advertisement format, computer code, and computer data objects, v. check for use abnormalities of a user and generate a trigger to re-generate a challenge question if an abnormality is detected, wherein the abnormality comprises one or more of;
conflicts in a user'"'"'s known location, current activity, time length of transaction, repetition of visiting a transaction, time lapse between repeated transaction, distribution of transaction locations, speed of movement within same transaction location area, and speed of movement between different transaction location areas;vi. compute a quality factor which represents a degree of correlation between any portion of the user'"'"'s challenge response and any portion of the generated challenge sequence; vii. generate a new signature based on any portion of the user'"'"'s challenge response and any portion of the previously generated signature and any portion of collectable information from the user'"'"'s device memory; viii. store the new signature and at least one of, the quality factor, a trust factor, and a transaction quality factor in memory or communicating it to a computer program; and
,b) a connection between the system computer and one or more external applications. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A networked based computing system for detecting fraudulent machine or human impersonation of a user, comprising:
-
a) a system computer comprising at least one processor and at least one memory device operably connected to one another, and a plurality of computer-executable instructions stored on the memory device that when executed by the processor, cause the processor to; i. fetch signals from memory of at least one portion of any two or more of the following;
a previously generated user'"'"'s signature, a previously generated challenge sequence, a user'"'"'s identifying information, a user'"'"'s related information, a user'"'"'s device identifying information, a user'"'"'s device location, a user'"'"'s device parameters, a user'"'"'s challenge response, a quality factor, a trust factor, a transaction quality factor, a content quality factor, a whitelist, a blacklist, an advertisement, a content object, a user'"'"'s behavior information;ii. generate at least one new signature on, or adjacent to, every user interaction, or an external application interaction, or a predefined schedule or trigger event based on the signals; iii. store the new signature in memory or communicate it to a computer program; iv. generate at least one challenge sequence based on the signals; vi. present the generated challenge sequence to a user, in one of visual, audible or audiovisual format; vii. collect a user'"'"'s challenge response to the generated challenge sequence, and check for use abnormalities of a user and generate a trigger to re-generate a challenge question if an abnormality is detected, wherein the abnormality comprises one or more of;
conflicts in a user'"'"'s known location, current activity, time length of transaction, repetition of visiting a transaction, time lapse between repeated transaction, distribution of transaction locations, speed of movement within same transaction location area, and speed of movement between different transaction location areas;viii. compute on or adjacent to every user interaction, or an external application interaction or a predefined schedule or trigger event, any of a quality factor which represents a degree of correlation between any portion of the user'"'"'s challenge response and any portion of the generated challenge sequence, a trust factor which represents a degree of quasi-continuous authenticity certainty, a transaction quality factor which represents degree of acceptance or rejection of an online transaction, a content quality factor which represents the degree of a user'"'"'s interest in content presented to the user, a whitelist which represents legitimate users, and, a blacklist which represents impostors or non-legitimate users; ix. store in memory at least one of, the challenge sequence, the challenge response, the quality factor, the trust factor, the transaction quality factor, the content quality factor, the whitelist and the blacklist or communicate it to a computer program; and
,b) a connection between the system computer and one or more external applications. - View Dependent Claims (18, 19)
-
Specification