Systems and methods for assessing security risk
First Claim
1. A system for assessing security risk associated with an electronic transaction, the system comprising at least one processor programmed to:
- analyze current user information indicative of at least one user behavior observed in connection with the electronic transaction;
determine at least one user identifier associated with the electronic transaction;
analyze history information associated with the at least one user identifier, the history information being indicative of at least one previously observed behavior associated with the at least one user identifier;
analyze at least one risk factor associated with the electronic transaction; and
provide a risk assessment for the electronic transaction at least in part by combining the current user information, the history information associated with the at least one user identifier, and the at least one risk factor associated with the electronic transaction;
wherein the at least one user identifier comprises at least one network address;
wherein the at least one processor is further programmed to;
obtain a first risk value based on the current user information;
obtain a second risk value based on the history information associated with the at least one network address; and
obtain a third risk value based on the least one risk factor associated with the electronic transaction; and
use a plurality of weights to combine the first, second, and third risk values to thereby obtain an overall risk value indicative of a level of risk associated with the electronic transaction, wherein the plurality of weights comprises first, second, and third weights applied respectively to the first, second, and third risk values.
6 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for providing identification tests. In some embodiments, a system and a method are provided for generating and serving to a user an animated challenge graphic comprising a challenge character set whose appearance may change over time. In some embodiments, marketing content may be incorporated into a challenge message for use in an identification test. The marketing content may be accompanied by randomly selected content to increase a level of security of the identification test, hi some embodiments, a challenge message for use in an identification test may be provided based on information regarding a transaction for which the identification test is administered. For example, the transaction information may include a user identifier such as an IP address. In some embodiments, identification test results may be tracked and analyzed to identify a pattern of behavior associated with a user identifier. A score indicative of a level of trustworthiness may be computed for the user identifier.
54 Citations
16 Claims
-
1. A system for assessing security risk associated with an electronic transaction, the system comprising at least one processor programmed to:
-
analyze current user information indicative of at least one user behavior observed in connection with the electronic transaction; determine at least one user identifier associated with the electronic transaction; analyze history information associated with the at least one user identifier, the history information being indicative of at least one previously observed behavior associated with the at least one user identifier; analyze at least one risk factor associated with the electronic transaction; and provide a risk assessment for the electronic transaction at least in part by combining the current user information, the history information associated with the at least one user identifier, and the at least one risk factor associated with the electronic transaction; wherein the at least one user identifier comprises at least one network address; wherein the at least one processor is further programmed to; obtain a first risk value based on the current user information; obtain a second risk value based on the history information associated with the at least one network address; and obtain a third risk value based on the least one risk factor associated with the electronic transaction; and use a plurality of weights to combine the first, second, and third risk values to thereby obtain an overall risk value indicative of a level of risk associated with the electronic transaction, wherein the plurality of weights comprises first, second, and third weights applied respectively to the first, second, and third risk values. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for assessing security risk associated with an electronic transaction, the method comprising acts of:
-
analyzing current user information indicative of at least one user behavior observed in connection with the electronic transaction; determining at least one user identifier associated with the electronic transaction; analyzing history information associated with the at least one user identifier, the history information being indicative of at least one previously observed behavior associated with the at least one user identifier; analyzing at least one risk factor associated with the electronic transaction; and providing a risk assessment for the electronic transaction at least in part by combining the current user information, the history information associated with the at least one user identifier, and the at least one risk factor associated with the electronic transaction; wherein the at least one user identifier comprises at least one network address; further comprising acts of; obtaining a first risk value based on the current user information; obtaining a second risk value based on the history information associated with the at least one network address; and obtaining a third risk value based on the least one risk factor associated with the electronic transaction; and using a plurality of weights to combine the first, second, and third risk values to thereby obtain an overall risk value indicative of a level of risk associated with the electronic transaction, wherein the plurality of weights comprises first, second, and third weights applied respectively to the first, second, and third risk values. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
Specification