Unlock instant, AI-driven research and patent intelligence for your innovation.

Fraud Detection

a fraud detection and fraud technology, applied in the field of information security, can solve problems such as potential fraud and the current information security technology does not provide proactive detection of such potential fraud

Inactive Publication Date: 2012-06-07
EMIGH AARON T +1
View PDF11 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

"The invention is about detecting and preventing fraud in information security. It aims to provide techniques for identifying and reacting to potential fraud attempts, such as identity theft, in real-time. The invention involves a system for detecting and reacting to fraud, which includes a client, a network, and a server. The system can also distribute failed authentication information and process data in a privacy-preserving manner. The technical effects of the invention include improved detection and prevention of fraud, improved security of confidential information, and improved protection of privacy."

Problems solved by technology

The use of a credential incorrectly at one institution may signal potential fraud at a second institution at which the credential is valid.
Current information security technologies do not provide proactive detection of such potential fraud.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fraud Detection
  • Fraud Detection
  • Fraud Detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0009]The invention can be implemented in numerous ways, including as a process, an apparatus, a system, a composition of matter, a computer readable medium such as a computer readable storage medium or a computer network wherein program instructions are sent over optical or electronic communication links. In this specification, these implementations, or any other form that the invention may take, may be referred to as techniques. In general, the order of the steps of disclosed processes may be altered within the scope of the invention.

[0010]A detailed description of one or more embodiments of the invention is provided below along with accompanying figures that illustrate the principles of the invention. The invention is described in connection with such embodiments, but the invention is not limited to any embodiment. The scope of the invention is limited only by the claims and the invention encompasses numerous alternatives, modifications and equivalents. Numerous specific details ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In some embodiments, techniques for information security include receiving information related to an authentication credential, wherein the information is related to a failed authentication attempt; determining whether the authentication credential is related to a valid account; and performing a security measure related to the valid account, if it is determined that the authentication credential is related to the valid account.In some embodiments, techniques for information security include Determining that an authentication attempt has failed, applying a privacy-performing transformation such as a cryptographic hash or encryption to an authentication credential, and distributing the privacy-preserved credential.In some embodiments, techniques for information security include receiving and redistributing a privacy-preserved authentication credential.

Description

CROSS REFERENCE TO RELATED APPLICATIONS[0001]This Application is a Continuation of U.S. patent application No. 11 / 394,764, filed Mar. 31, 2006 which claims priority to U.S. Provisional Patent Application No. 60 / 667,333, filed Mar. 31, 2005; all of the aforementioned priority applications being hereby incorporated in their entirety for all purposes.FIELD OF THE INVENTION[0002]The present invention relates generally to the area of information security. More specifically, techniques for detecting fraud are disclosed.BACKGROUND OF THE INVENTION[0003]An increasing volume of confidential information, such as personal and financial information, is being stored electronically, in locations accessible through electronic networks such as the internet. This information has value to parties who can illicitly gain access to such information. In many cases, credentials used to access information at one institution may also be used to access information at another institution. The use of a credent...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L9/32G06F21/00H04L45/02
CPCH04L12/433H04L43/10H04L41/12H04L41/0803H04L67/1065H04L67/1068H04L67/10H04L67/1061H04L43/04H04L45/02
Inventor EMIGH, AARON T.ROSKIND, JAMES A.
Owner EMIGH AARON T