Method and system for tracking fraudulent activity
A method and system for tracking potentially fraudulent activities associated with one or more web sites is disclosed. In an example embodiment, the system includes a server communicatively coupled to a database. The database stores first data identifying a first spoof site, and a first identifier f...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Edberg, Jeremy B Pham, Quang D Henley, Mathew Gene Brown, Andrew Millard |
description | A method and system for tracking potentially fraudulent activities associated with one or more web sites is disclosed. In an example embodiment, the system includes a server communicatively coupled to a database. The database stores first data identifying a first spoof site, and a first identifier for a first document from the first spoof site. The identifier is based on a first content of the first document. The server receives second data identifying candidate site, retrieves a second document from the candidate site, and generates a second identifier for the second document based on a second content of the second document. The server also compares the second identifier to the first identifier. In response to determining, based on the comparing of the second identifier the first identifier, that a source of the first document is the same as a source of the second document, the server identifies the candidate site as a second spoof site. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US10432657B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US10432657B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US10432657B23</originalsourceid><addsrcrecordid>eNrjZDDyTS3JyE9RSMxLUSiuLC5JzVVIyy9SKClKTM7OzEtXSCtKLE0pzUnNK1FITC7JLMssqeRhYE1LzClO5YXS3AyKbq4hzh66qQX58anFBYnJqXmpJfGhwYYGJsZGZqbmTkbGxKgBAORMLH8</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Method and system for tracking fraudulent activity</title><source>esp@cenet</source><creator>Edberg, Jeremy B ; Pham, Quang D ; Henley, Mathew Gene ; Brown, Andrew Millard</creator><creatorcontrib>Edberg, Jeremy B ; Pham, Quang D ; Henley, Mathew Gene ; Brown, Andrew Millard</creatorcontrib><description>A method and system for tracking potentially fraudulent activities associated with one or more web sites is disclosed. In an example embodiment, the system includes a server communicatively coupled to a database. The database stores first data identifying a first spoof site, and a first identifier for a first document from the first spoof site. The identifier is based on a first content of the first document. The server receives second data identifying candidate site, retrieves a second document from the candidate site, and generates a second identifier for the second document based on a second content of the second document. The server also compares the second identifier to the first identifier. In response to determining, based on the comparing of the second identifier the first identifier, that a source of the first document is the same as a source of the second document, the server identifies the candidate site as a second spoof site.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2019</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20191001&DB=EPODOC&CC=US&NR=10432657B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76289</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20191001&DB=EPODOC&CC=US&NR=10432657B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Edberg, Jeremy B</creatorcontrib><creatorcontrib>Pham, Quang D</creatorcontrib><creatorcontrib>Henley, Mathew Gene</creatorcontrib><creatorcontrib>Brown, Andrew Millard</creatorcontrib><title>Method and system for tracking fraudulent activity</title><description>A method and system for tracking potentially fraudulent activities associated with one or more web sites is disclosed. In an example embodiment, the system includes a server communicatively coupled to a database. The database stores first data identifying a first spoof site, and a first identifier for a first document from the first spoof site. The identifier is based on a first content of the first document. The server receives second data identifying candidate site, retrieves a second document from the candidate site, and generates a second identifier for the second document based on a second content of the second document. The server also compares the second identifier to the first identifier. In response to determining, based on the comparing of the second identifier the first identifier, that a source of the first document is the same as a source of the second document, the server identifies the candidate site as a second spoof site.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2019</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZDDyTS3JyE9RSMxLUSiuLC5JzVVIyy9SKClKTM7OzEtXSCtKLE0pzUnNK1FITC7JLMssqeRhYE1LzClO5YXS3AyKbq4hzh66qQX58anFBYnJqXmpJfGhwYYGJsZGZqbmTkbGxKgBAORMLH8</recordid><startdate>20191001</startdate><enddate>20191001</enddate><creator>Edberg, Jeremy B</creator><creator>Pham, Quang D</creator><creator>Henley, Mathew Gene</creator><creator>Brown, Andrew Millard</creator><scope>EVB</scope></search><sort><creationdate>20191001</creationdate><title>Method and system for tracking fraudulent activity</title><author>Edberg, Jeremy B ; Pham, Quang D ; Henley, Mathew Gene ; Brown, Andrew Millard</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US10432657B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2019</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Edberg, Jeremy B</creatorcontrib><creatorcontrib>Pham, Quang D</creatorcontrib><creatorcontrib>Henley, Mathew Gene</creatorcontrib><creatorcontrib>Brown, Andrew Millard</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Edberg, Jeremy B</au><au>Pham, Quang D</au><au>Henley, Mathew Gene</au><au>Brown, Andrew Millard</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Method and system for tracking fraudulent activity</title><date>2019-10-01</date><risdate>2019</risdate><abstract>A method and system for tracking potentially fraudulent activities associated with one or more web sites is disclosed. In an example embodiment, the system includes a server communicatively coupled to a database. The database stores first data identifying a first spoof site, and a first identifier for a first document from the first spoof site. The identifier is based on a first content of the first document. The server receives second data identifying candidate site, retrieves a second document from the candidate site, and generates a second identifier for the second document based on a second content of the second document. The server also compares the second identifier to the first identifier. In response to determining, based on the comparing of the second identifier the first identifier, that a source of the first document is the same as a source of the second document, the server identifies the candidate site as a second spoof site.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US10432657B2 |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES ELECTRIC COMMUNICATION TECHNIQUE ELECTRIC DIGITAL DATA PROCESSING ELECTRICITY PHYSICS SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | Method and system for tracking fraudulent activity |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-09T19%3A07%3A20IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Edberg,%20Jeremy%20B&rft.date=2019-10-01&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS10432657B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |