Detecting and interdicting fraudulent activity on a network

Electrical computers and digital processing systems: multicomput – Computer network managing

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C709S224000, C709S229000, C726S026000

Reexamination Certificate

active

07856494

ABSTRACT:
Described are computer-based methods and apparatuses, including computer program products, for detecting and interdicting fraudulent activity on a network. An user utilizes a transmitting device to transmit user requests that are split between a plurality of data centers for processing. The user requests are captured at the data centers. The user requests are unified into an user session. The user session can be analyzed for fraud detection, marketing analysis, network intrusion detection, customer service analysis, and/or performance analysis. If fraudulent activity is detected, then the user can be interdicted to prevent further fraudulent activity.

REFERENCES:
patent: 6324647 (2001-11-01), Bowman-Amuah
patent: 6335927 (2002-01-01), Elliott et al.
patent: 6377672 (2002-04-01), Busuioc
patent: 6519571 (2003-02-01), Guheen et al.
patent: 6801606 (2004-10-01), Edwards
patent: 6920455 (2005-07-01), Weschler
patent: 7085683 (2006-08-01), Anderson et al.
patent: 7249104 (2007-07-01), Zuili
patent: 7464151 (2008-12-01), Drennen et al.
patent: 7644267 (2010-01-01), Ylikoski et al.
patent: 2002/0022474 (2002-02-01), Blom et al.
patent: 2002/0073232 (2002-06-01), Hong et al.
patent: 2002/0073337 (2002-06-01), Ioele et al.
patent: 2003/0097320 (2003-05-01), Gordon
patent: 2003/0097330 (2003-05-01), Hillmer et al.
patent: 2003/0100370 (2003-05-01), Gatto et al.
patent: 2003/0185361 (2003-10-01), Edwards
patent: 2003/0187841 (2003-10-01), Zhang et al.
patent: 2004/0015596 (2004-01-01), Sapuram et al.
patent: 2004/0064428 (2004-04-01), Larkin et al.
patent: 2004/0177138 (2004-09-01), Salle et al.
patent: 2004/0264481 (2004-12-01), Darling et al.
patent: 2004/0267920 (2004-12-01), Hydrie et al.
patent: 2004/0268357 (2004-12-01), Joy et al.
patent: 2004/0268358 (2004-12-01), Darling et al.
patent: 2005/0033843 (2005-02-01), Shahi et al.
patent: 2005/0055435 (2005-03-01), Gbadegesin et al.
patent: 2005/0160280 (2005-07-01), Caslin et al.
patent: 2005/0165656 (2005-07-01), Frederick et al.
patent: 2005/0185779 (2005-08-01), Toms
patent: 2005/0223109 (2005-10-01), Mamou et al.
patent: 2005/0246434 (2005-11-01), Bantz et al.
patent: 2005/0288954 (2005-12-01), McCarthy et al.
patent: 2006/0155756 (2006-07-01), Stanev et al.
patent: 2006/0236395 (2006-10-01), Barker et al.
patent: 2006/0288079 (2006-12-01), Deobald
patent: 2007/0036309 (2007-02-01), Zoldi et al.
patent: 2007/0083928 (2007-04-01), Mattsson et al.
patent: 2007/0101425 (2007-05-01), Mattsson
patent: 2007/0234409 (2007-10-01), Eisen
patent: 2007/0239604 (2007-10-01), O'Connell et al.
patent: 2008/0114858 (2008-05-01), Singh et al.
patent: 2008/0114883 (2008-05-01), Singh et al.
patent: 2008/0114885 (2008-05-01), Kulkarni et al.
patent: 2008/0114888 (2008-05-01), Bhatt et al.
patent: 2008/0115213 (2008-05-01), Bhatt et al.
patent: 2009/0099988 (2009-04-01), Stokes et al.
patent: 2010/0010871 (2010-01-01), Mengerink
patent: 02/45380 (2002-06-01), None
patent: 02/096028 (2002-11-01), None
Office Action of Oct. 22, 2008 received in U.S. Appl. No. 11/559,764.
U.S. Appl. No. 11/559,762, filed the same day as and shares specification with U.S. Appl. No. 11/559,775.
U.S. Appl. No. 11/559,764, filed the same day as and shares specification with U.S. Appl. No. 11/559,775.
U.S. Appl. No. 11/559,767, filed the same day as and shares specification with U.S. Appl. No. 11/559,775.
U.S. Appl. No. 11/559,771, filed the same day as and shares specification with U.S. Appl. No. 11/559,775.
U.S. Appl. No. 11/559,784, filed the same day as and shares specification with U.S. Appl. No. 11/559,775.
“RSA® Adaptive Authentication, The Logical Consumer Solution,” RSA Security, 2006, 4 pages.
“VeriSign® Identity Protection Fraud Detection Service,” VeriSign® Data Sheet, Apr. 5, 2006, 5 pages.
“Fraud Detection,” http://www.entrust.com/fraud-detection/index.htm, 2006, 2 pages.
“Enhanced Online Banking Security—Zero Touch Multi-Factor Authentication,” http://www.entrust.com/resources/download.cfm/22600/efraudwhitepaper.pdf, undated, 4 pages.
M. Grandcolas, et al., “Implications of FFIEC Guidance and Proposed Solutions—Balancing Risk Mitigation and Customer Experience,” Jun. 2006, 4 pages.
“Products—Product Overview,” http://www.cydelity.com/products.html, 2006, 2 pages.
“Cydelity Introduces Comprehensive Protection for Online Banking with eSentry—The Last Line of Defense Against Online Fraud,” http:/
ews.thomasnet.com/printready.html?prid=488599, ThomasNet® ProductNewsRoom, Jun. 28, 2006, 4 pages.
“Seamless Integration, Progressive Implementation,” Actimize Intelligence Server™, available from http://www.actimize.com, undated, 2 pages.
“Real-time Identity-based Monitor for Web Applications,” Covelight Systems, http://www.covelight.com/percept.php, 2006, 2 pages.
“Stream Processing Technology Overview,” AleriLabs, http://www.alerilabs.com/technology/overview.html, 2005, 3 pages.
“Risk Mitigation Management,” Unisys, http://www.unisys.com/financial/solutions/banking/risk—mitigation.htm, 2006, 2 pages.
“Are You Sensing Every Intrusion Before it Becomes an Invasion?” Cymtec Systems, http://www.cymtec.com/pages/intrusion/intrusion-detection.html, 2005, 3 pages.
“Actimize Releases Industry's Most Comprehensive Online Fraud Solution for Financial Services; Multi-Factor Authentication and Fraud Detection Technology Combine to Deliver End-To-End Online Fraud Prevention,” available at http://www.findarticles.com, Jan. 30, 2006, 2 pages.
International Search Report dated Mar. 12, 2009, 6 pages.
Office Action of Mar. 31, 2009 received in U.S. Appl. No. 11/559,784.
Office Action of Aug. 7, 2009 received in U.S. Appl. No. 11/559,764.
Office Action of Dec. 17, 2009 received in U.S. Appl. No. 11/559,784.
Office Action of Mar. 3, 2010 received in U.S. Appl. No. 11/559,762.
Office Action of Mar. 26, 2010 received in U.S. Appl. No. 11/559,764.
Office Action of Jul. 21, 2010 received in U.S. Appl. No. 11/559,771.
Office Action of Aug. 9, 2010 received in U.S. Appl. No. 11/559,767.
Saddique, M. and Amir, Muhammed,Literature review of mobile geo-location techniques, The AEESEAP International Conference 2005, Jun. 7-8, 2005.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Detecting and interdicting fraudulent activity on a network does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Detecting and interdicting fraudulent activity on a network, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Detecting and interdicting fraudulent activity on a network will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4229992

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.