WO2007095242A2 - System and method for network-based fraud and authentication services - Google Patents
System and method for network-based fraud and authentication services Download PDFInfo
- Publication number
- WO2007095242A2 WO2007095242A2 PCT/US2007/003822 US2007003822W WO2007095242A2 WO 2007095242 A2 WO2007095242 A2 WO 2007095242A2 US 2007003822 W US2007003822 W US 2007003822W WO 2007095242 A2 WO2007095242 A2 WO 2007095242A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- fraud detection
- network
- user
- information
- credential
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2103—Challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Definitions
- FIG. 2 is a flow chart that depicts a process for providing authentication and fraud detection services in accordance with an embodiment of the present invention.
- FIG. 3 is a flow chart that depicts a two-phase fraud detection process in accordance with an embodiment of the present invention.
- FIG. 4 is a graph upon which a clustering algorithm may be applied in accordance with an embodiment of the present invention.
- FIG. 5 is a block diagram that depicts a bulk provisioning process in accordance with an embodiment of the present invention.
- FIG. 6 is a block diagram that depicts a computing device in accordance with an embodiment of the present invention. Detailed Description
- the present invention addresses the deficiencies of current solutions by providing to a network of enterprises both authentication and fraud detection services that are hosted by a third party service provider. These services minimize costs and maximize security by sharing intelligence and resources among the network of enterprises that utilize the hosted services.
- the service provider is able to share authentication credentials among the participating enterprises utilizing the hosted authentication services, and Is able to share fraud intelligence (e.g., fraud data and signatures) among the participating enterprises utilizing the hosted fraud detection services.
- fraud intelligence e.g., fraud data and signatures
- Information stored in a database (115) used by the authentication service (110) may be used by the fraud detection service (120).
- information stored in a database (125) used by the fraud detection service (120) may be used by the authentication service (110).
- the relying parties (160, 162, 164) that utilize the hosted authentication service (110) are considered part of a shared authentication network (140), and the relying parties (162, 164, 166) that utilize the hosted fraud detection service (120) are considered part of a fraud intelligence network (150).
- each party in the shared authentication network (140) accepts the same authentication credentials as other participating members of the network.
- This enables end users to utilize a single authentication credential, no matter the form (e.g., OATH- compliant), across any sites of the participating network members. This helps solve the "necklace" problem that occurs when an end user needs a separate credential to transact with different relying parties.
- a credential refers to any electronic device or document used for authentication purposes.
- the value provided by a credential for validation is referred to as a credential response (e.g., an OTP ("One-Time Password") value, a digital signature, or a response to a challenge-response query).
- a credential response e.g., an OTP ("One-Time Password") value, a digital signature, or a response to a challenge-response query.
- OTP token (sometimes just called a token) is a hardware device credential that generates a unique code on demand that is usually used, for example, as a second factor for authentication.
- Second factor authentication refers to authenticating something that the user has or something the user is (the second factor) rather than or in addition to something the user knows (the first factor).
- first and second factor authentication if an attacker steals only a first factor, the attacker would not be able to forge the second factor and would be unable to authenticate. If an attacker steals the second factor, the attacker would not know the first factor and would be unable to authenticate.
- an authentication service may require more than two factors. For example, a system might require a pass phrase, digital certificate, and thumbprint sensor, combining something the user knows, something the user has, and something the user is.
- the fraud detection service (120) is therefore able to better combat criminals on the internet who use many different mechanisms to capture personal information, such as phishing web sites, key loggers, false store fronts, and database theft. Often, criminals try to use the same information on multiple web sites, testing login information by trial and error, establishing multiple fraudulent accounts, or other malicious activities.
- the user (170) may provide the credential response to the relying party (164), who then checks the information with the authentication service (110) via a backend integration.
- the relying party (164) may redirect the user (170) to the
- the relying party (164) then monitors (step 230) transactions associated with the user (170), which may include a login, purchase, click-thru, or any other activity by the user (170) on the relying party's (164) site, and provides information associated with the transactions to the fraud detection service (120) to be evaluated (240) for suspicious activity.
- the fraud detection service (120) evaluates the transaction information for suspicious activity based at least in part on other transaction information provided to the fraud detection service (120) by the fraud intelligence network (150) sites.
- FIG. 3 is a flow chart that depicts a two-phase fraud detection process in accordance with an embodiment of the present invention.
- a user (170) provides (step 300) login credentials to a relying party (164) for validation (step 310). If the credentials are bad, the login is refused (step 320), and if the credentials are good, then the relying party (164) forwards (step 330) information associated with the user's login to a fraud detection service (120).
- the fraud detection service (120) checks (step 340) for suspicious activity, and if no suspicious activity is found, the transaction passes (step 350), the relying party (164) is informed of the decision, and the user (170) is allowed (step 360) to log in.
- the fraud detection service (120) proceeds (step 370) to use more sophisticated, complex, and invasive techniques to validate that the credential is legitimate. After this secondary check, the fraud detection service (120) decides if the transaction is fraudulent or legitimate.
- the primary fraud checks may be based on properties of the transaction, properties of the user account, and transaction history. No human intervention is required; these checks may be completely automated. More importantly, no extra steps are added to the process.
- the secondary fraud checks add additional steps to the process.
- the fraud detection service (120) may require a telephone, email, or SMS confirmation of the user's identity. Alternately, the system may ask additional challenge/response questions of the user (170). The purpose of these checks is to provide additional information to validate the user's identity. If the secondary checks succeed, the fraud check succeeds (step 350), and the user is allowed to log in (step 360).
- the scoring engine is designed to distinguish between good and bad authentication attempts. There are two types of login transactions: legitimate authentication attempts and fraudulent authentication attempts. In order to distinguish between the two, the engine attempts to learn whether a login does not fit a pattern of other legitimate attempts, and whether a login fits the pattern of other fraudulent attempts.
- the fraud detection service (120) also needs to capture deep enough information. This means producing a historical record of transactions, going back at least 90 days and preferably for a year, for example. Over time, summary information could be built (such as the average number of logins per month) that could be used to look for suspicious activity.
- the fraud detection service (120) analyze s a transaction b y a policy engine and, depending on the policy, is passed through an anomaly engine which answer with a status (anomaly or not) and a confidence factor (how much the engine is confident in its decision) that is processed back by the policy engine.
- the following provides an embodiment of the data flow process: • Data arrives into the system through a data adapter
- the policy engine receives back a result which is structured as a status (is anomaly?) and confidence factor
- the fraud detection service (120) may use its determinations for further increasing accuracy. For example, if a transaction is tagged as anomalous, even with a high anomaly score and confidence factor, the system can increase its accuracy by comparing the transaction against a cluster of known fraudulent transactions or known "not" fraudulent transactions.
- the fraud detection service (120) may utilize clustering algorithms in its anomaly engine to decide which of the user's actions correspond to natural behavior and which are exceptional, without any assistance.
- the clustering algorithm may be based on the ROCK hierarchical clustering algorithm (RObust Clustering using HnKs), which is an agglomerative hierarchical clustering algorithm based on the notion of neighbors and links as follows.
- ROCK hierarchical clustering algorithm RObust Clustering using HnKs
- Two data elements are considered as neighbors if our similarity upon a domain expert or similarity matrix exceeds a certain threshold. At first, all n data elements are mapped to n clusters respectively. Then, with each iteration, the engine merges between the two closest clusters such that both clusters fulfill the maximum value of Link(GC0, for any pair of clusters C 1 and C 1 .
- the metric represents the number of common neighbors between every element in the first cluster to every element in the second one.
- This measure is normalized by the number of potential neighbors in both clusters, so that a large cluster will not swallow every other cluster and end up with all the elements. Grouping the data elements using links injects global knowledge into the clustering process, forming an optimal division between the elements. Thus, the formed clusters aren't too large or too small, and the clusters contain elements that are relatively similar one to another.
- the engine utilizes enhancements to the ROCK algorithm that adapt it to the overall anomaly detection process. Namely, the enhancements significantly improve the clustering phase's execution time and transform the ROCK's ability of finding clusters to the ability of finding anomalies. Additional to these enhancements, the engine utilizes enhancements on the algorithmic level as follows.
- the ROCK also expects an argument that determines the number of clusters to generate.
- the enhanced algorithm produces the real amount of clusters, representing each of the user's behavioral patterns, as they actually appear within the data.
- the algorithm introduces the notion of clustering execution levels, which allow for different clustering configurations to be defined for various situations. If, for example, the anomaly detection process is started with a relatively sparse data set, then engine may want to activate the clustering phase with reduced similarity thresholds, since the number of common neighbors between pairs of data elements is bound to be small.
- the number of common neighbors is 2.
- the link matrix for this example is shown IN TABLE 3: TABLE 3
- k be the parameter that is used to specify to the system the number of clusters to reach "possibly” - remember that k is not an absolute limit, and the system can try to merge more clusters but it will not "insist” on merging once k is reached.
- a credential issuer such as the service provider (100) may provide bulk back-end generation of seeds and their secure transport (530) to a token manufacturer (510) upon request (520). Utilizing a bulk provisioning protocol enables the sending of pre-provisioned tokens — devices that are ready to be activated and used - to users.
- the bulk provisioning protocol may be described as follows:
- TMU generates a key pair and token ID for each token • the TMU generates a random key pair, which includes a public key, for each token ID
- TMU can enroll for a certificate for each token, with the required token IDs as parameters
- an administrative shared secret may be requested for each token ID as well
- TMU may use the Registration Authority key to negotiate the establishment of an authenticated SSL channel. This channel persists until the enrollment process for each token is completed.
- the bulk provisioning protocol flow may be described in an embodiment of the invention as follows:
- TMU connects to the issuer's provisioning service and enrolls an for OTP certificate and optionally an administrative certificate for each token ID presented
- the issuer (500) stores a copy of the shared secrets at its site; OTP shared secrets are used to calculate the OTP values that are used to authenticate users; an administrative shared secret is used when resetting a lost password
- Network links may include telephone lines, DSL, cable networks, Tl or T3 lines, wireless network connections, or any other arrangement that implements the transmission and reception of network signals.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Social Psychology (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Priority Applications (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2008554432A JP5231254B2 (ja) | 2006-02-10 | 2007-02-12 | ネットワークベースの不正および認証サービスのシステムと方法 |
| EP07750645A EP1987447A4 (en) | 2006-02-10 | 2007-02-12 | SYSTEM AND METHOD FOR NETWORK-BASED FRAUD AND AUTHENTICATION SERVICES |
| CA2641995A CA2641995C (en) | 2006-02-10 | 2007-02-12 | System and method for network-based fraud and authentication services |
| AU2007215180A AU2007215180B2 (en) | 2006-02-10 | 2007-02-12 | System and method for network-based fraud and authentication services |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US77186106P | 2006-02-10 | 2006-02-10 | |
| US60/771,861 | 2006-02-10 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2007095242A2 true WO2007095242A2 (en) | 2007-08-23 |
| WO2007095242A3 WO2007095242A3 (en) | 2008-02-28 |
Family
ID=38372092
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/US2007/003822 Ceased WO2007095242A2 (en) | 2006-02-10 | 2007-02-12 | System and method for network-based fraud and authentication services |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US7861286B2 (https=) |
| EP (1) | EP1987447A4 (https=) |
| JP (1) | JP5231254B2 (https=) |
| AU (1) | AU2007215180B2 (https=) |
| CA (1) | CA2641995C (https=) |
| WO (1) | WO2007095242A2 (https=) |
Cited By (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2010138324A1 (en) * | 2009-05-29 | 2010-12-02 | Google Inc. | Account-recovery technique |
| US8195664B2 (en) | 2009-10-22 | 2012-06-05 | Symantec Corporation | Method and system for clustering transactions in a fraud detection system |
| US8321360B2 (en) | 2009-10-22 | 2012-11-27 | Symantec Corporation | Method and system for weighting transactions in a fraud detection system |
| EP2750347A1 (en) * | 2012-12-27 | 2014-07-02 | Koninklijke KPN N.V. | Location dependent recovery system |
| EP2770690A1 (en) * | 2013-02-20 | 2014-08-27 | F-Secure Corporation | Protecting multi-factor authentication |
| WO2014165627A1 (en) * | 2013-04-03 | 2014-10-09 | Alibaba Group Holding Limited | Method and system for distinguishing humans from machines and for controlling access to network services |
| US10467687B2 (en) | 2009-11-25 | 2019-11-05 | Symantec Corporation | Method and system for performing fraud detection for users with infrequent activity |
Families Citing this family (65)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20080010678A1 (en) * | 2004-09-17 | 2008-01-10 | Jeff Burdette | Authentication Proxy |
| US20080162321A1 (en) * | 2006-11-07 | 2008-07-03 | Breeden Benjamin T | System and method for processing duplicative electronic check return files |
| US8272033B2 (en) * | 2006-12-21 | 2012-09-18 | International Business Machines Corporation | User authentication for detecting and controlling fraudulent login behavior |
| KR100925176B1 (ko) * | 2007-09-21 | 2009-11-05 | 한국전자통신연구원 | 지리 정보를 이용한 네트워크 상태 표시장치 및 방법 |
| US8412932B2 (en) * | 2008-02-28 | 2013-04-02 | Red Hat, Inc. | Collecting account access statistics from information provided by presence of client certificates |
| US20090287510A1 (en) * | 2008-04-28 | 2009-11-19 | Guggenheim Partners, Llc | Methods and products for providing incentive compatible mortgage loans |
| US8321934B1 (en) * | 2008-05-05 | 2012-11-27 | Symantec Corporation | Anti-phishing early warning system based on end user data submission statistics |
| US8689341B1 (en) | 2008-05-21 | 2014-04-01 | Symantec Corporation | Anti-phishing system based on end user data submission quarantine periods for new websites |
| US8613064B1 (en) * | 2008-09-30 | 2013-12-17 | Symantec Corporation | Method and apparatus for providing a secure authentication process |
| US8903434B2 (en) * | 2008-12-31 | 2014-12-02 | Sybase, Inc. | System and method for message-based conversations |
| US9209994B2 (en) * | 2008-12-31 | 2015-12-08 | Sybase, Inc. | System and method for enhanced application server |
| US9100222B2 (en) * | 2008-12-31 | 2015-08-04 | Sybase, Inc. | System and method for mobile user authentication |
| US8380989B2 (en) * | 2009-03-05 | 2013-02-19 | Sybase, Inc. | System and method for second factor authentication |
| DE102009021312A1 (de) * | 2009-05-14 | 2010-11-18 | Siemens Aktiengesellschaft | Verfahren zum Verhindern einer Kompromittierung eines Webdienstes |
| US9471920B2 (en) * | 2009-05-15 | 2016-10-18 | Idm Global, Inc. | Transaction assessment and/or authentication |
| US10346845B2 (en) | 2009-05-15 | 2019-07-09 | Idm Global, Inc. | Enhanced automated acceptance of payment transactions that have been flagged for human review by an anti-fraud system |
| DE102009060553A1 (de) * | 2009-08-24 | 2011-03-03 | Vitaphone Gmbh | Verfahren und System zur Speicherung und Auswertung von Daten, insbesondere Vitaldaten |
| US8365264B2 (en) * | 2009-10-12 | 2013-01-29 | Microsoft Corporation | Protecting password from attack |
| US8924733B2 (en) * | 2010-06-14 | 2014-12-30 | International Business Machines Corporation | Enabling access to removable hard disk drives |
| US9473530B2 (en) | 2010-12-30 | 2016-10-18 | Verisign, Inc. | Client-side active validation for mitigating DDOS attacks |
| US20120174196A1 (en) | 2010-12-30 | 2012-07-05 | Suresh Bhogavilli | Active validation for ddos and ssl ddos attacks |
| US20120246483A1 (en) * | 2011-03-25 | 2012-09-27 | Netanel Raisch | Authentication System With Time Attributes |
| US9363327B2 (en) | 2011-06-15 | 2016-06-07 | Juniper Networks, Inc. | Network integrated dynamic resource routing |
| US9571566B2 (en) | 2011-06-15 | 2017-02-14 | Juniper Networks, Inc. | Terminating connections and selecting target source devices for resource requests |
| US8504723B2 (en) * | 2011-06-15 | 2013-08-06 | Juniper Networks, Inc. | Routing proxy for resource requests and resources |
| US10237231B2 (en) | 2011-09-26 | 2019-03-19 | Verisign, Inc. | Multiple provisioning object operation |
| US10565666B2 (en) | 2011-09-26 | 2020-02-18 | Verisign, Inc. | Protect intellectual property (IP) rights across namespaces |
| US9525551B1 (en) * | 2011-09-29 | 2016-12-20 | EMC IP Holding Company LLC | Randomly skewing secret values as a countermeasure to compromise |
| GB2496107C (en) * | 2011-10-26 | 2022-07-27 | Cliquecloud Ltd | A method and apparatus for preventing unwanted code execution |
| US8850575B1 (en) * | 2011-12-30 | 2014-09-30 | Emc Corporation | Geolocation error tracking in transaction processing |
| SG11201405282RA (en) | 2012-04-01 | 2014-09-26 | Authentify Inc | Secure authentication in a multi-party system |
| US8612348B1 (en) * | 2012-05-23 | 2013-12-17 | Mp Platforms, Llc | Systems and methods for interfacing merchants with third-party service providers |
| EP2871819A1 (en) | 2013-11-12 | 2015-05-13 | Verisign, Inc. | Multiple provisioning object operation |
| US20150161611A1 (en) * | 2013-12-10 | 2015-06-11 | Sas Institute Inc. | Systems and Methods for Self-Similarity Measure |
| CN104244516B (zh) * | 2014-08-20 | 2017-01-18 | 深圳市芯飞凌半导体有限公司 | 高功率因数无频闪装置、led灯及方法 |
| US10671980B2 (en) | 2014-10-20 | 2020-06-02 | Mastercard International Incorporated | Systems and methods for detecting potentially compromised payment cards |
| US11068895B2 (en) * | 2015-02-17 | 2021-07-20 | Visa International Service Association | Token and cryptogram using transaction specific information |
| EP3258374B1 (en) * | 2015-05-07 | 2019-10-09 | CyberArk Software Ltd. | Systems and methods for detecting and reacting to malicious activity in computer networks |
| US20170076292A1 (en) * | 2015-09-14 | 2017-03-16 | BIS Global, Inc. | Enhanced fraud screening process for filtering of network statistics in order to detect, block, and deter fraudulent on-line activity |
| US9818116B2 (en) | 2015-11-11 | 2017-11-14 | Idm Global, Inc. | Systems and methods for detecting relations between unknown merchants and merchants with a known connection to fraud |
| US9852427B2 (en) | 2015-11-11 | 2017-12-26 | Idm Global, Inc. | Systems and methods for sanction screening |
| KR101765200B1 (ko) * | 2015-11-25 | 2017-08-04 | 서일대학교산학협력단 | 시스템 보안관리장치 및 그 방법 |
| US10861019B2 (en) | 2016-03-18 | 2020-12-08 | Visa International Service Association | Location verification during dynamic data transactions |
| US9888007B2 (en) | 2016-05-13 | 2018-02-06 | Idm Global, Inc. | Systems and methods to authenticate users and/or control access made by users on a computer network using identity services |
| US10187369B2 (en) | 2016-09-30 | 2019-01-22 | Idm Global, Inc. | Systems and methods to authenticate users and/or control access made by users on a computer network based on scanning elements for inspection according to changes made in a relation graph |
| US10250583B2 (en) | 2016-10-17 | 2019-04-02 | Idm Global, Inc. | Systems and methods to authenticate users and/or control access made by users on a computer network using a graph score |
| US10965668B2 (en) | 2017-04-27 | 2021-03-30 | Acuant, Inc. | Systems and methods to authenticate users and/or control access made by users based on enhanced digital identity verification |
| US10878067B2 (en) * | 2017-07-13 | 2020-12-29 | Nec Corporation Of America | Physical activity and IT alert correlation |
| US11392802B2 (en) | 2018-03-07 | 2022-07-19 | Private Identity Llc | Systems and methods for privacy-enabled biometric processing |
| US10721070B2 (en) | 2018-03-07 | 2020-07-21 | Private Identity Llc | Systems and methods for privacy-enabled biometric processing |
| US11789699B2 (en) | 2018-03-07 | 2023-10-17 | Private Identity Llc | Systems and methods for private authentication with helper networks |
| US11210375B2 (en) | 2018-03-07 | 2021-12-28 | Private Identity Llc | Systems and methods for biometric processing with liveness |
| US11138333B2 (en) | 2018-03-07 | 2021-10-05 | Private Identity Llc | Systems and methods for privacy-enabled biometric processing |
| US10938852B1 (en) * | 2020-08-14 | 2021-03-02 | Private Identity Llc | Systems and methods for private authentication with helper networks |
| US11394552B2 (en) | 2018-03-07 | 2022-07-19 | Private Identity Llc | Systems and methods for privacy-enabled biometric processing |
| US11489866B2 (en) * | 2018-03-07 | 2022-11-01 | Private Identity Llc | Systems and methods for private authentication with helper networks |
| US11265168B2 (en) | 2018-03-07 | 2022-03-01 | Private Identity Llc | Systems and methods for privacy-enabled biometric processing |
| US11502841B2 (en) | 2018-03-07 | 2022-11-15 | Private Identity Llc | Systems and methods for privacy-enabled biometric processing |
| US11170084B2 (en) | 2018-06-28 | 2021-11-09 | Private Identity Llc | Biometric authentication |
| CN110932858B (zh) * | 2018-09-19 | 2023-05-02 | 阿里巴巴集团控股有限公司 | 认证方法和系统 |
| US20200242506A1 (en) * | 2019-01-25 | 2020-07-30 | Optum Services (Ireland) Limited | Systems and methods for time-based abnormality identification within uniform dataset |
| US11218494B2 (en) * | 2019-07-26 | 2022-01-04 | Raise Marketplace, Llc | Predictive fraud analysis system for data transactions |
| US11271933B1 (en) | 2020-01-15 | 2022-03-08 | Worldpay Limited | Systems and methods for hosted authentication service |
| US20210397903A1 (en) * | 2020-06-18 | 2021-12-23 | Zoho Corporation Private Limited | Machine learning powered user and entity behavior analysis |
| US20220300903A1 (en) * | 2021-03-19 | 2022-09-22 | The Toronto-Dominion Bank | System and method for dynamically predicting fraud using machine learning |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050278192A1 (en) | 2003-02-21 | 2005-12-15 | Swisscom Mobile Ag | Method and system for detecting possible frauds in payment transactions |
| US20050278542A1 (en) | 2004-06-14 | 2005-12-15 | Greg Pierson | Network security and fraud detection system and method |
| US20060020812A1 (en) | 2004-04-27 | 2006-01-26 | Shira Steinberg | System and method of using human friendly representations of mathematical function results and transaction analysis to prevent fraud |
Family Cites Families (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5748742A (en) * | 1995-11-30 | 1998-05-05 | Amsc Subsidiary Corporation | Fraud detection and user validation system for mobile earth terminal communication device |
| JP2001016198A (ja) * | 1999-06-28 | 2001-01-19 | Matsushita Electric Ind Co Ltd | ネットワーク装置、アクセスサーバおよび認証サーバ |
| JP2003323407A (ja) * | 2002-04-30 | 2003-11-14 | Bank Of Tokyo-Mitsubishi Ltd | サーバ間で認証情報を共有するための認証システムと、この認証システムに用いる記憶装置及び認証要求装置 |
| JP2004334330A (ja) * | 2003-04-30 | 2004-11-25 | Sony Corp | 端末機器、提供サーバ、電子情報利用方法、電子情報提供方法、端末機器プログラム、提供サーバプログラム、仲介プログラム、及び記憶媒体 |
| JP2005044277A (ja) * | 2003-07-25 | 2005-02-17 | Fuji Xerox Co Ltd | 不正通信検出装置 |
| US8781975B2 (en) * | 2004-05-21 | 2014-07-15 | Emc Corporation | System and method of fraud reduction |
| US20060157553A1 (en) * | 2005-01-18 | 2006-07-20 | International Business Machines Corporation | Accommodating multiple users of a secure credit card |
| US7849501B2 (en) * | 2005-09-30 | 2010-12-07 | At&T Intellectual Property I, L.P. | Methods and systems for using data processing systems in order to authenticate parties |
-
2007
- 2007-02-12 AU AU2007215180A patent/AU2007215180B2/en not_active Ceased
- 2007-02-12 JP JP2008554432A patent/JP5231254B2/ja active Active
- 2007-02-12 WO PCT/US2007/003822 patent/WO2007095242A2/en not_active Ceased
- 2007-02-12 US US11/705,064 patent/US7861286B2/en active Active
- 2007-02-12 EP EP07750645A patent/EP1987447A4/en not_active Withdrawn
- 2007-02-12 CA CA2641995A patent/CA2641995C/en not_active Expired - Fee Related
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050278192A1 (en) | 2003-02-21 | 2005-12-15 | Swisscom Mobile Ag | Method and system for detecting possible frauds in payment transactions |
| US20060020812A1 (en) | 2004-04-27 | 2006-01-26 | Shira Steinberg | System and method of using human friendly representations of mathematical function results and transaction analysis to prevent fraud |
| US20050278542A1 (en) | 2004-06-14 | 2005-12-15 | Greg Pierson | Network security and fraud detection system and method |
Non-Patent Citations (1)
| Title |
|---|
| See also references of EP1987447A4 |
Cited By (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2010138324A1 (en) * | 2009-05-29 | 2010-12-02 | Google Inc. | Account-recovery technique |
| US8195664B2 (en) | 2009-10-22 | 2012-06-05 | Symantec Corporation | Method and system for clustering transactions in a fraud detection system |
| US8321360B2 (en) | 2009-10-22 | 2012-11-27 | Symantec Corporation | Method and system for weighting transactions in a fraud detection system |
| US8566322B1 (en) | 2009-10-22 | 2013-10-22 | Symantec Corporation | Method and system for clustering transactions in a fraud detection system |
| US10467687B2 (en) | 2009-11-25 | 2019-11-05 | Symantec Corporation | Method and system for performing fraud detection for users with infrequent activity |
| EP2750347A1 (en) * | 2012-12-27 | 2014-07-02 | Koninklijke KPN N.V. | Location dependent recovery system |
| EP2770690A1 (en) * | 2013-02-20 | 2014-08-27 | F-Secure Corporation | Protecting multi-factor authentication |
| WO2014165627A1 (en) * | 2013-04-03 | 2014-10-09 | Alibaba Group Holding Limited | Method and system for distinguishing humans from machines and for controlling access to network services |
| CN104104652A (zh) * | 2013-04-03 | 2014-10-15 | 阿里巴巴集团控股有限公司 | 一种人机识别方法、网络服务接入方法及相应的设备 |
| US9686269B2 (en) | 2013-04-03 | 2017-06-20 | Alibaba Group Holding Limited | Method and system for distinguishing humans from machines and for controlling access to network services |
| CN104104652B (zh) * | 2013-04-03 | 2017-08-18 | 阿里巴巴集团控股有限公司 | 一种人机识别方法、网络服务接入方法及相应的设备 |
| US10104061B2 (en) | 2013-04-03 | 2018-10-16 | Alibaba Group Holding Limited | Method and system for distinguishing humans from machines and for controlling access to network services |
Also Published As
| Publication number | Publication date |
|---|---|
| CA2641995A1 (en) | 2007-08-23 |
| JP5231254B2 (ja) | 2013-07-10 |
| EP1987447A2 (en) | 2008-11-05 |
| JP2009526328A (ja) | 2009-07-16 |
| EP1987447A4 (en) | 2013-01-09 |
| CA2641995C (en) | 2016-09-20 |
| AU2007215180B2 (en) | 2011-03-17 |
| US20070220595A1 (en) | 2007-09-20 |
| US7861286B2 (en) | 2010-12-28 |
| AU2007215180A1 (en) | 2007-08-23 |
| WO2007095242A3 (en) | 2008-02-28 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| AU2007215180B2 (en) | System and method for network-based fraud and authentication services | |
| Parmar et al. | A comprehensive study on passwordless authentication | |
| Council | Authentication in an internet banking environment | |
| US8695097B1 (en) | System and method for detection and prevention of computer fraud | |
| CN103646197B (zh) | 基于用户行为的用户可信度认证系统及方法 | |
| US10142302B2 (en) | Systems and methods for managing resetting of user online identities or accounts | |
| Hammood et al. | A review of user authentication model for online banking system based on mobile IMEI number | |
| CN101375546B (zh) | 用于欺骗监控、检测和分层用户鉴权的系统和方法 | |
| US9294288B2 (en) | Facilitating secure online transactions | |
| US8505085B2 (en) | Flexible authentication for online services with unreliable identity providers | |
| US20100217975A1 (en) | Method and system for secure online transactions with message-level validation | |
| US20080313707A1 (en) | Token-based system and method for secure authentication to a service provider | |
| CN110945549A (zh) | 用于对用于跨机构数字认证的用户拥有的凭证的通用存储和访问的方法和系统 | |
| JP2022541919A (ja) | バイオメトリックプロトコル標準に関するシステム及び方法 | |
| US12142073B2 (en) | Fingerprint-based device authentication | |
| Abed | The Techniques of authentication in the Context of Cloud Computing | |
| JP5186648B2 (ja) | 安全なオンライン取引を容易にするシステム及び方法 | |
| Najar | Securely eradicating cellular dependency for e-banking applications | |
| US20090025066A1 (en) | Systems and methods for first and second party authentication | |
| Singh et al. | Detection and prevention of phishing attack using dynamic watermarking | |
| Sarjiyus et al. | Improved online security framework for e-banking services in Nigeria: A real world perspective | |
| Elhag | Enhancing online banking transaction authentication by using tamper proof & cloud computing | |
| Ahmad et al. | User requirement model for federated identities threats | |
| Alaca | Strengthening Password-Based Web Authentication through Multiple Supplementary Mechanisms | |
| CN115361217B (zh) | 一种基于零信任的安全防护方法、网络及装置 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| WWE | Wipo information: entry into national phase |
Ref document number: 2008554432 Country of ref document: JP Ref document number: 2641995 Country of ref document: CA |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2007215180 Country of ref document: AU |
|
| ENP | Entry into the national phase |
Ref document number: 2007215180 Country of ref document: AU Date of ref document: 20070212 Kind code of ref document: A |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2007750645 Country of ref document: EP |