throbber
(19) United States
`(12) Patent Application Publication (10) Pub. No.: US 2006/0282660 A1
`(43) Pub. Date:
`Dec. 14, 2006
`Varghese et al.
`
`US 20060282660Al
`
`(54)
`
`(76)
`
`SYSTEM AND METHOD FOR FRAUD
`MONITORING, DETECTION, AND TIERED
`USER AUTHENTICATION
`
`Inventors: Thomas Emmanual Varghese, San
`Mateo, CA (US); Jon Bryan Fisher,
`Tiburon, CA (US); Steven Lucas
`Harris, Foster City, CA (US); Don
`Bosco Durai, Fremont, CA (US)
`
`Correspondence Address:
`WINSTON & STRAWN LLP
`1700 K STREET, N.W.
`WASHINGTON, DC 20006 (US)
`
`(21)
`
`(22)
`
`Appl. No.:
`
`11/412,997
`
`Filed:
`
`Apr. 28, 2006
`
`Related US. Application Data
`
`(60)
`
`Provisional application No. 60/676,141, ?led on Apr.
`29, 2005.
`
`Publication Classi?cation
`
`(51) Int. Cl.
`(2006.01)
`H04L 9/00
`(52) Us. or. ............................................................ ..713/155
`
`(57)
`
`ABSTRACT
`
`The present invention provides systems and methods for
`authenticating access requests from user devices by present
`ing one of a plurality of graphical user interfaces selected
`depending on a perceived risk of fraud associated With the
`devices. User devices are identi?ed With ?ngerprinting
`information, and their associated risks of fraud are deter
`mined from past experience With the device or With similar
`devices and from third party information. In preferred
`embodiments, di?ferent graphical user interfaces are pre
`sented based on both fraud risk and, in the case of a knoWn
`user, usability. In preferred embodiments, this invention is
`implemented as a number of communicating modules that
`identify user devices, assess their risk of fraud, present
`selected user interfaces, and maintain databases of fraud
`experiences. This invention also includes systems providing
`these authentication services.
`
`Receive user request for
`web page at web sewer
`
`402
`
`Capture identity
`information (D)
`from user device
`
`404 /_
`
`V
`
`Compare
`device's identity /
`infonnation with
`stored lD's
`
`O6
`
`’
`
`410
`
`Create device history for ID
`
`Add iD to device
`history
`
`1
`
`Create New ID for device
`
`414
`/
`
`l
`
`Send New ID to user device
`and store thereon
`
`/416
`
`418
`
`IA1005
`
`Page 1 of 50
`
`

`

`Patent Application Publication Dec. 14, 2006 Sheet 1 0f 20
`
`US 2006/0282660 A1
`
`no swwm
`
`9 non:
`
`
`
`, .Eozinun
`
`‘
`
`
`
`1%? QEWQ \ 6K
`
`IA1005
`
`Page 2 of 50
`
`

`

`Patent Application Publication Dec. 14, 2006 Sheet 2 0f 20
`
`US 2006/0282660 A1
`
`QM“
`
`
`
`u - a?u in?ufmn?g
`
`
`
`334%....5i?. %@_
`
`
`
`
`
`. swam-A V‘: macs-a Emu...
`
`\EGAEEZEEQ in
`EEEEEHEEEE w E
`
`
`
`LQW MSQQ
`
`MMQMQ
`
`IA1005
`
`Page 3 of 50
`
`

`

`Patent Application Publication Dec. 14, 2006 Sheet 3 0f 20
`
`US 2006/0282660 A1
`
`400
`
`Receive user request for
`web page at web server
`
`402
`
`Capture identity
`
`information (it?) from user device
`
`404
`
`V
`Compare
`device's identity
`information with
`stored ID's
`
`/i0s
`
`410
`
`/
`
`Existing
`ID‘?
`
`Create device history for ID
`
`Add ID to device
`history
`
`414
`Create New ID fer device /
`
`l
`
`Send New ID to user device
`and store thereon
`
`416
`/
`
`'
`
`41s
`
`F/e, 4r
`
`IA1005
`
`Page 4 of 50
`
`

`

`Patent Application Publication Dec. 14, 2006 Sheet 4 0f 20
`
`US 2006/0282660 A1
`
`Usal enters Iogn
`Id and nsawmd
`
`(mm mm!
`(m or ?ash)
`
`FIG. 4B
`
`IA1005
`
`Page 5 of 50
`
`

`

`Patent Application Publication Dec. 14, 2006 Sheet 5 0f 20
`
`US 2006/0282660 A1
`
`59%
`
`Continued from ?gure 4
`(Got Device ID)
`
`)02
`‘
`-
`Send Identity information to rules ,
`engine
`
`‘
`Perform action in
`accordance with rules ‘
`‘engine determination
`
`04 -
`‘
`
`Is a Pre-
`determined
`'
`user interface to be provided to device
`according
`to rule?
`
`Yes_> '
`'
`
`508\
`Invoke Authenticator for
`generating user interface
`
`Provide predetermined user
`interface to device
`
`Are other forms of authentication
`veri?cation to be performed?
`
`~
`51
`Yes—-->
`
`Perform actlon in
`accordance with
`authenthication/
`veri?cation Qrocess
`
`Valid user?
`
`Yes
`y
`C Continue with login process
`
`5 O
`
`518
`
`. = ' ed USQI’ I
`error message
`I a ;
`
`IA1005
`
`Page 6 of 50
`
`

`

`Patent Application Publication Dec. 14, 2006 Sheet 6 0f 20
`
`US 2006/0282660 A1
`
`v _ _ _
`_ _ _
`
`_ _ _ _ _ _ .
`
`Qua
`
`\
`
`_
`
`_ _
`
`_
`
`
`
`
`
`Ii hglhlnéim xéi 3m
`
`_ gévmmw Em @€<Q.
`
`
`
`If". ‘ill-lull J
`
`Ill‘lIlI-llllllrl‘Fl-lllilli'l
`
`IA1005
`
`Page 7 of 50
`
`

`

`Patent Application Publication Dec. 14, 2006 Sheet 7 0f 20
`
`US 2006/0282660 A1
`
`
`
`6 QB mguteégw .
`
`*I I l I I l
`
`\/ OR.
`
`IA1005
`
`Page 8 of 50
`
`

`

`Patent Application Publication Dec. 14, 2006 Sheet 8 0f 20
`
`US 2006/0282660 A1
`
`IA1005
`
`Page 9 of 50
`
`

`

`Patent Application Publication Dec. 14, 2006 Sheet 9 0f 20
`
`US 2006/0282660 A1
`
`IA1005
`
`Page 10 of 50
`
`

`

`Patent Application Publication Dec. 14, 2006 Sheet 10 0f 20
`
`US 2006/0282660 A1
`
`IA1005
`
`Page 11 of 50
`
`

`

`Patent Application Publication Dec. 14, 2006 Sheet 11 0f 20
`
`US 2006/0282660 A1
`
`IA1005
`
`Page 12 of 50
`
`

`

`Patent Application Publication Dec. 14, 2006 Sheet 12 0f 20
`
`US 2006/0282660 Al
`
`_ _
`
`_
`
`_
`
`_ _
`
`_ _ _ _ _
`
`_ , omrm“
`
`as:
`
`_ y _ _
`
`_ _ _ _
`
`_
`
`IA1005
`
`Page 13 of 50
`
`

`

`Patent Application Publication Dec. 14, 2006 Sheet 13 0f 20
`
`US 2006/0282660 A1
`
`1302
`
`SERVICE PROVIDER
`
`AUTHSEE'ECEIQT'ON
`
`SERVER
`
`. . .
`
`.
`
`.
`
`.
`
`. . . .
`
`. . . .
`
`.
`
`.
`
`.
`
`1306
`
`Server app_
`
`DCR services
`
`
`
`I s v u s o n s I u n s I e I I I Local device-
`
`
`I based auth.
`I services
`
`
`
`' I Device-based auth. I l
`I services
`‘
`
`. . .
`
`.
`
`. .
`
`. . . . - . . . .
`
`. '
`
`.
`
`. .
`
`.
`
`. . . .
`
`. .
`
`.
`
`. . .
`
`. . . .
`
`DCR
`
`m
`
`Firewall
`...._..
`baslc
`auth
`
`1304
`
`PROVIDER
`SERVER
`
`Server app. A
`Server app. B
`Server app. C
`Server app. D
`
`. .
`
`.
`
`.
`
`.
`
`. . .
`
`.
`
`.
`
`serv
`
`Post
`
`. .
`
`.
`
`.
`
`.
`
`.
`
`.
`
`auth.
`services
`
`1305
`
`FIG. 13A
`
`SerYe' app’
`receives user
`request
`
`1320
`
`User request
`data
`
`.
`-
`Fingerprint
`process
`M C ;
`
`-
`
`h. services
`
`g (:3
`7
`Device ID info.
`g 53',
`FAAS
`m m
`Rules
`engine
`
`.
`
`.
`
`‘
`
`. . . . .
`
`.
`
`User/xaction
`valid/not
`valid
`
`1308
`
`~
`
`Authenticator
`m
`
`,
`User I
`GUI
`
`-
`
`‘3*
`
`3
`Device ID;
`andIrisk
`;
`
`FDM
`1200
`
`DCR
`111g
`
`serverapp'
`continues
`
`1322
`
`FIG. 13B
`
`IA1005
`
`Page 14 of 50
`
`

`

`Patent Application Publication Dec. 14, 2006 Sheet 14 0f 20
`
`US 2006/0282660 A1
`
`Firewall
`receives user
`input
`
`User input
`data
`
`-
`
`- -
`
`- -
`
`~
`
`- - ~ .
`
`- -
`
`I
`
`. . . .
`
`. . . - - -
`
`- .
`
`-
`
`Basic auth. services
`
`Rules engine
`701
`
`Rules
`(OCR/3"’ party)
`
`User input
`valid/not
`valid
`
`1323
`
`Firewall
`proceeds
`
`FIG. 13C
`
`Policy Set #1
`Securlty Policy
`
`- Model .1 -_--s‘w
`- Model .2
`S’W
`- Model I3 --—--~S‘W
`
`Business Pol Icy
`
`- Model l4-—-——-S'W
`- Model l5-----£‘W
`
`RCQUESI
`(User. Location.
`
`Risk Scoring Englne
`
`Policy
`_ 3rd Party Data
`
`-Model “ED-.8’ W
`
`Total Score
`
`est Mode
`
`FIG. 16C
`
`IA1005
`
`Page 15 of 50
`
`

`

`Patent Application Publication Dec. 14,2006 Sheet 15 of 20
`
`US 2006/0282660 A1
`
`5aeeetepestSeomnbtenenoa!
`
`
`vlSls
`Sd1D/auesjuieyy
`
`
`(1219“quisdaojoAr)soprowoig
`
`JOJeaJUaYyINYesoueUg
`jewy=SuxO)
`SWSWATDd
`BegJl9}40}S]H
`
`Moysiy4957)
`
`quyadsoBuy4MOUIOM
`
`qUpAdsaBuyj4UOYeI04
`ceRAMSRAE
`
`yujsdsoButgeojaog’
`
`
`
`SUO)NIOSPNed}BTW
`
`
`
`
`
`SNIE}S[BAS]YO}EG
`
`
`
`SNyeysSNUIAMUY
`
`yWemadt
`
`uojyesBoquyAyegpigeedAyied,€
`osswe3SSNOYsIeEMBECFfquowsBouewosegouablijaqu!di
`oougiiduio99oan
`
`
`
`”YudsIBUUOIENDBunsi|Yoe|g/ONUAA
`
`
`
`$2),Ajeuepneiy
`
`SI0OL
`
`
`
`UOPeQUEYINYAsepuodas/AIeLUIJd
`
`
`
`Aioysiy89/499syndlpi
`
`2b,mnt
`
`
`
`menetteettmayPLeea,dott
`
`4Buyioos9sopAjeuyouy-1eoumeen
`
`
`
`
`
`
`
`OVSMOIPUOM.uojyuBbaoa,wadedSO{SUaI0}AJOMPON,
`
`
`
`Auoysiyv0}72207ow,U0119907-095)‘
`
`Page 16 of 50
`
`1A1005
`
`IA1005
`
`Page 16 of 50
`
`
`
`
`
`
`
`
`
`
`
`

`

`Patent Application Publication Dec. 14,2006 Sheet 16 of 20
`
`US 2006/0282660 A1
`
`VSbSls
`
`
`
`Spjoysoitpyspqezjwuoysns-
`
`
`
`aujBugBuyioos
`
`
`
`a1098481)payyByaay-
`
`
`
`guoposojqezjwojsn3-
`
`
`
`GYO/OVIGUZJWOEND-
`
`ASIBYSUGAR
`
`
`
`$3]9110dgMOIPUOAA
`
`
`
`uospeduwossojaeyag-
`
`ejeqAuedpic
`
`ByEpHSM°
`
`
`
`peseqenjeaAvy-
`
`
`
`$3]d};OgAyinsas
`
`
`
`yosedwossojaeyog-
`
`Se]YOld-
`
`S|apow-
`
`8SAallodj
`
`
`
`
`
`ssaulsngSUOPIBSURHUOISsas-Uy-S3|9||Og
`
`
`
`peseqonjeaAvy-
`
`SONbsy
`
`
`
`
`
`(uepoesueay9@9)A9Q‘UONes0}43957)
`
`Page 17 of 50
`
`1A1005
`
`IA1005
`
`Page 17 of 50
`
`
`
`
`
`

`

`Patent Application Publication
`
`Dec. 14, 2006 Sheet 17 0f 20
`
`US 2006/0282660 A1
`
`User from a
`different country
`within a specifed
`time
`
`User using multiple
`Location in short
`time frame
`
`Block users from
`restricted device list
`
`Consecutive
`failures for a device
`
`Multiple-uéers from
`a device
`
`User using multiple
`devioe$ in shod
`time frame
`
`_ Obnsecutive
`fallu was for an user
`
`Consecutive
`failures-for an EP
`
`Device from a
`di?‘erentcity within
`a speci?ed time
`
`Block logins from
`vrestricted IP list
`
`Block user from
`restricted Location
`List
`
`FIG. 15B
`
`IA1005
`
`Page 18 of 50
`
`

`

`Patent Application Publication Dec. 14, 2006 Sheet 18 0f 20
`
`US 2006/0282660 A1
`
`Pre-Authentication _
`
`Models
`
`Model A
`
`Model B
`
`Groups
`
`Device Group A
`
`Location Group A
`
`User Group A
`
`work?ow Group A
`
`Session #1
`User A
`Device c
`
`Location J
`Work?ow 0
`
`User Group #1
`User A
`User a
`
`User C
`
`FIG . 1 6A
`
`Business Model A
`Action 3
`Alert 7
`
`Rule 257
`
`A '
`2
`Rule 989 < “(:22
`
`Work?ow Group #1
`\ Work?ow D
`Work?ow Model A
`work?owv
`Work?ow C \ Action 6
`Rule 256 < Men 8
`
`Device Group #6
`Device A
`Device X
`Dew“ c
`
`Action 5
`“"‘e 9‘4 <A|en 1
`
`Security Model A
`
`Location Group #2
`Location A
`Location 0 \ Action 3
`Location J
`“"‘e "3 <Alert 5
`
`Rule 445 <2|¢$>2 1
`
`FIG. 16B
`
`IA1005
`
`Page 19 of 50
`
`

`

`Patent Application Publication Dec. 14, 2006 Sheet 19 0f 20
`
`US 2006/0282660 A1
`
`alum In w lulu-Han ia?"
`
`u
`
`h
`if
`
`n
`
`n
`
`i u
`
`a
`
`n
`
`I!
`
`u
`
`I
`
`u
`
`FIG. 17A
`
`aim-awn}: indium-Mm
`
`FIG. 17B
`
`IA1005
`
`Page 20 of 50
`
`

`

`Patent Application Publication Dec. 14,2006 Sheet 20 of 20
`
`US 2006/0282660 Al
`
`
`
`
`BaerRitty Pld i. ued dabees Liesee tH Oe eedad By ae
`ARTO847.6255 NAN ENa OG
`
`SQ eeere
`Aes a
`
`
`z
`7
`weate a>”
`2
`cnetete +
`"own
`
`
`
`i,
`wun
` weeny
`
`
`an es SHASgyMeOR Crom Dall >
`
`
`
`nen” .; ry
`
`
`
`:
`Se
`Pomwpeeere
`taohenes Ay
`Ceteny
`*
`au
`
`
`2,
`an
`2
`gt
`ran
`ow
`Manse ms. Shire
`3h®
`WARS we
`
`faea ee toe
`ew,
`ke
`OLE Y Re
`a
`awe
`Tt
`Pi
`*
`
`
`BeveA daeLehaha ~ ate teat Hae
`
`
`
`sepenn
`~
`Zs
`TRAP TO Ebia
`‘
`SRE
`
`nen ee
`ete Act et ae ARa 6 Sen mens anne
`:
`en
`ah
`5
`=
`TetaRim ATED
`tae
`od
`eonae
`\
`
`
`
`.
`Ware otes
`Lie
`a
`>
`oF
`ie
`=~
`=
`Onna:
`
`
`
`
`
`
`me
`ads,
`oe
`yareenys + Edd
`a

`hahiiend
`
`
`
`
`
`
`
`FIG. 17C
`
`oe
`hea
`Dastdcard Quenes Ade Custamer Core Pulp
`
`Customer Garg
`> Core Gutails
`
`
`Pa
`
`!
`tage
`
`tteae part
`Saweettys
`rh
`
`eve
`erat 3 Rardo
`
`
`
`FIG. 17D
`
`Page 21 of 50
`
`1A1005
`
`IA1005
`
`Page 21 of 50
`
`€
`

`

`US 2006/0282660 Al
`
`Dec. 14, 2006
`
`SYSTEM AND METHOD FOR FRAUD
`MONITORING, DETECTION, AND TIERED USER
`AUTHENTICATION
`
`CROSS REFERENCE TO RELATED
`APPLICATION
`
`[0001] This application claims the benefit of U.S. provi-
`sional application Ser. No. 60/676,141 filed Apr. 29, 2005
`and which is incorporated herein by reference in its entirety
`for all purposes.
`
`FIELD OF INVENTION
`
`[0002] The invention relates generally to systems and
`methods for providing protection against identity theft over
`a computer network.
`
`BACKGROUND OF INVENTION
`
`[0003] The growth in the volume of online transactions
`conducted by businesses and individuals over the Internet
`has been staggering. Sensitive private identity information is
`typically used for authenticating a user for conducting online
`transactions. The increased use of identity information for
`Internet transactions has been accompanied by an increased
`danger of interception and theft of that information. Identity
`theft occurs when someone uses the password, username,
`Social Security number, credit card number, or other iden-
`tifying personal information of another without consent to
`commit fraud. According to a September 2003 Federal Trade
`Commission (FTC) survey, 27.3 million Americans have
`been victims of identity theft in the last five years, including
`9.9 million people in the year 2002 alone. Identity theft
`losses to businesses and financialinstitutions in 2002 totaled
`nearly $48 billion and consumervictims reported $5 billion
`in out-of-pocket expenses, according to the FTC survey.
`
`[0004] To enter into a transaction with an E-commerce
`server, a user typically needs to provide sensitive and
`confidential data including authentication data, data describ-
`ing the transaction, and the like. This data is commonly
`entered by using a keyboard and/or a mouse connected to a
`device local to the user that is running a web browserthatis
`linked to the Internet (or other computer network). FIG. 1 is
`a diagram illustrating an exemplary system 10 used for
`entering user authentication and transaction data. In this
`example, the authentication information to be entered by a
`user comprises a user ID and password. In known systems,
`the user ID and password are composed of a string of
`characters entered via a keyboard 12 while executing a web
`browser on a computing device 14. A typical user entry
`interface 18 provided by the browserto the user on a display
`16 is shown.
`
`[0005] After entry, a user’s sensitive information is typi-
`cally transmitted to a remote server preferably in an
`encrypted form over secure connections. For example, the
`widely-used TCP/IP communication protocol includes secu-
`rity protocols built on the secure socket layer (SSL) protocol
`to allow secure data transfer using encrypted data streams.
`SSL offers encryption, source authentication, and data integ-
`rity as a means for protecting information exchanged over
`insecure, public networks. Accordingly, many E-commerce
`servers and applications use SSL, or similar security proto-
`cols, to exchange data between remote servers and local user
`systems.
`If the entered authentication information is
`
`approved by the server, the user is permitted to send and
`receive data from the server’s website.
`
`[0006] The source of messages received at a web serveris
`often determined from the IP address of the device from
`
`which the message is sent and/or from a cookie included
`with data from the user. A cookie generally refers to a packet
`of information, often sensitive information, sent by a web
`server to a browserresident on the user’s computer system
`for saving to a file and for transmitting back to the server
`wheneverthe user’s browser makes additional requests from
`the server. The IP address is generally included in a message
`header, and the cookie is usually one that has been previ-
`ously sent by the server, often at login. The server compares
`the user login data with the message IP address and the
`returned cookie to determinethe identity of the user sending
`the message and whetherthe useris currently logged into the
`server. The IP address of the user is also confirmed.
`
`[0007] Despite these knownprecautions, a user’s sensitive
`information remains vulnerable because it
`is in a raw
`
`unsecured form between its entry by the user and its encryp-
`tion prior to remote transmission. Also, sensitive data sent
`from the server is vulnerable during the period after its
`decryption and until its display. This unsecured information
`can be surreptitiously captured in a number of ways. For
`example, cookie hijackers copy sensitive information from
`cookies. Further, keyboard loggers and mouseclick loggers
`are hidden software that intercept and copy mouseclicks and
`depressed keys after user entry but before processing by a
`browser or other software. Logger software can readily
`intercept the user’s secure information. Keyboard loggers
`and mouseclick loggers might also take the form of hard-
`ware connected between the keyboard and mouse cable and
`the computeror the hardware inside the keyboard and mouse
`device.
`
`[0008] Even graphical user interfaces that represent on-
`screen keypads and keyboards with selectable graphics for
`user entry (instead or in addition to providing fields for text
`entry) are vulnerable to mouse click loggers, screen capture
`loggers, and other schemes. FIGS. 1, 2, and 3 illustrates
`prior art examples of such interfaces. Each alphanumeric
`character in the graphical
`interface is represented by a
`unique graphical image,e.g., the pixels forming the number
`“1”. Screen capture loggers utilize optical character recog-
`nition (OCR) technology to decipher characters selected by
`mouse clicks and the corresponding alphanumeric graphics
`in order to ascertain the actual alphanumeric text characters
`of a user’s ID and password. Sophisticated screen capture
`loggers might also utilize checksum andsize characteristics
`of the graphic images in order to ascertain which the data
`item corresponding to a graphic image selected by a user’s
`mouse click during data entry. In these ways, the screen
`capture loggers may acquire the personal information even
`whenthe graphical user interface has rearranged the order of
`alphanumeric characters on the keypad or keyboard.
`
`Sensitive information can also be intercepted by
`[0009]
`espionage software,
`including snoopware, spyware, non-
`viral malware, hackersutilities, surveillance utilities, Trojan
`horses, etc. Espionage software aids in the unauthorized
`acquisition of information about a person or organization
`withouttheir knowledgeor consent.It typically installs itself
`on a user’s computer without consent and then monitors or
`controls the use of the device. Every user keystroke, all chat
`
`Page 22 of 50
`
`1A1005
`
`IA1005
`
`Page 22 of 50
`
`

`

`US 2006/0282660 Al
`
`Dec. 14, 2006
`
`conversations, all websites visited, every user interaction
`with a browser, every application executed, every document
`printed, all
`text and images, might be captured by the
`espionage software. Espionage software typically is capable
`of locally saving or transmitting the captured data to third
`parties over the Internet, most often without the user’s
`knowledge or consent.
`
`[0010] Another fraudulent acquirer of sensitive personal
`information is an “over-the shoulder” spy who surrepti-
`tiously reads a user’s display to acquire the information.
`
`[0011] Known anti-virus and anti-spyware software prod-
`ucts attempt to enable a user to protect against such mali-
`cious software. However, use of outdated anti-virus and
`anti-spyware files provides minimal protection, at best, of
`computer data against outside threats. Consequently, a draw-
`back of these products is that the information used by the
`anti-virus and anti-spyware program must be constantly
`updatedto reflect newly discovered schemesin order to keep
`the protection current. In addition to keeping the virus
`information current,
`the system must be periodically
`scanned for potential infections.
`
`[0012] Further, certain geographic locations are known to
`contain an inordinate number of identity thieves.
`It
`is
`therefore advantageous to know where an attempt to access
`a server originates from. IP addresses are one readily avail-
`able source of location information. But IP addresses have
`
`drawbacks in that, for many users, the IP address is not
`constant. Known network protocols and facilities can lead to
`variable IP addresses. For example, proxy servers are used
`to provide a gateway between a local area network of an
`organization and the Internet. The local network is protected
`by firewall software installed on the proxy server. Proxy
`servers dynamically assign new IP addressesto a user device
`each time a new messageis sent therefrom.As a result, there
`is no constant IP address assigned to an individual user
`device for users connected to the Internet via a proxy server.
`
`[0013] Another source of IP address variability is the
`commonly used dynamic host configuration protocol
`(DHCPprotocol) which assigns IP addresses dynamically
`and automatically to the devices on a TCP/IP network. A
`DHCPserver assigns an IP address to a device from a list of
`available addresses when the device connects to the net-
`
`work. The device retains this IP address only for the duration
`of the current session. Some DHCP server systems can
`dynamically change the user’s IP address during the session.
`The use of a proxy or DHCPserver meansthat the IP address
`alone maynot be enoughto identity a particular user device.
`[0014]
`Security systems and methods that protect against
`the above-identified risks should also meet the usability
`concerns of an average user. A service provider wants to
`encourage online use in a secure manner. But a cumbersome
`and prolonged userinterface or a less user friendly interface
`might discourage or even intimidate and frustrate users, or
`cause usererrors, or the like. Also a security system should
`institute precautions to prevent execution of a fraudulent
`transaction once it has been found that the user’s informa-
`tion and/or system is at risk of being compromised. A
`security system should also alert the service provider based
`on a particular device attempting to access the provider’s
`system irrespective of the user.
`[0015] Also, a security system and method should enable
`a service provider to strike a proper balance between secu-
`
`rity and usability of the system. In other words, a system and
`method is needed to enable a service provider to provide an
`easy to use and lower security interface when no security
`risk is identified, and a higher security interface when oneis
`identified. Additionally, desirable security systems and
`methods should depend as little as possible upon human
`action to maintain their state of security. For example, it not
`advantageousto require users to keep and maintain tokens or
`digital certificates or the like. A token can be lost, damaged,
`stolen and thelike.
`
`the
`security systems protecting against
`[0016] But
`described threats and having the described properties are not
`generally known in the art. What is needed but currently
`lacking in the art is a security system and method with the
`following features and aspects:
`
`[0017]
`
`is a device-based fraud monitoring system;
`
`provides robust fraud monitoring and detection
`[0018]
`along with robust fraud analysis and risk assessment so
`that online service providers have real time information
`needed to determine how and whetherto allow a device
`
`to access the provider’s system;
`
`provides selectable levels of secure user authen-
`[0019]
`tication as a function of usability and/or security con-
`cerns;
`
`ascertains the security risk that a user’s infor-
`[0020]
`mation and/or system have been compromised and if
`so, provides a more secure login interface to guard
`against fraudulentactivity;
`
`arepository of information for identifying legiti-
`[0021]
`mate and fraudulent users based on more reliable and
`robust fingerprinting of the user device that can be
`integrated with other repositories of security tracking
`information;
`
`is a purely software based solution to identity
`[0022]
`theft that does not require hardware devices to be
`issued and maintained;
`
`[0023]
`
`is convenient for online users.
`
`SUMMARY OF THE INVENTION
`
`[0024] The systems and methods of the present invention
`fill gaps in the prior art by providing improved authentica-
`tion services.
`
`[0025] An advantage of the systems and methods accord-
`ing to the present invention is that they provide information
`and selectable user interfaces for enabling a service provider
`to take action to authorize, deny, or put on hold online
`transactions in real time as a function ofthe risk presented
`by both the user and the device attempting to conduct a
`transaction.
`
`[0026] Another advantage of the present inventionis that
`it enables a service provider to identify possible in-process
`fraudulent authentication transactions, based on both user
`and device historical data analysis. Transactions can be
`approved, declined, or put on hold for verification based an
`a set of predeterminedrules.
`
`[0027] Another advantage of the present inventionis that
`it provides both user and device based robust fraud moni-
`toring and detection along with robust fraud analysis and
`
`Page 23 of 50
`
`1A1005
`
`IA1005
`
`Page 23 of 50
`
`

`

`US 2006/0282660 Al
`
`Dec. 14, 2006
`
`risk assessment to give a service provider real time infor-
`mation needed to determine how and whether to allow a
`
`device to access the provider’s system.
`
`[0028] Another advantage of the present invention is the
`enabling of a selection of levels of secure user graphical
`authentication as a function of predetermined usability and/
`or security concerns.
`
`[0029] Another advantage of the present invention is that
`there is no dependence on tokens, cards and other similar
`hardware devices, digital certificates, anti-virus software, or
`personal firewall solutions for protecting end users against
`online identity theft.
`
`[0030] Another advantage of the present invention is the
`acquisition and developmentof a blacklist and/or whitelist
`that is device based rather than only user based.
`
`[0031] Broadly stated, according to an embodiment, the
`present invention fingerprints a user’s device by obtaining
`device identifying information that can be used to assess the
`fraud risk posed by a user at that user device. According to
`another embodiment, the present invention performs fraud
`analysis and alerting of the risk associated with the device
`being used to access a service provider’s server. According
`to another embodiment, this invention includes a database of
`user devices andtheir historical known fraud risks available
`in a central repository. According to another embodiment,
`this
`invention presents user authentication interfaces
`selected from a plurality of user authentication interfaces
`that provide a plurality of levels of security and usability.
`
`[0032] Accordingly, the present invention provides sys-
`tems and methods for providing levels of fraud monitoring,
`detection, and a tiered user authentication comprising a
`fingerprinting module for identifying a user device that has
`requested connection to a server; an authenticator module
`for enabling selection from of a plurality of login graphical
`user interfaces as a function of predetermined selection
`criteria for presentation on the user device, wherein the
`selection criteria is in the form ofrules regarding usability
`and security; a fraud analyzer and alert module for analyzing
`and assessing the risk associated with the user device as a
`function of historical tracking of use of the user device; and
`a device central repository for identifying legitimate and
`fraudulent users based on the fingerprinting module and
`other repositories of tracking information. This invention
`provides variously architected systems that implement the
`methods of this invention to provide authentication services
`to one or more service providers.
`
`[0033] Anexample ofthe present invention’s usability and
`security features is provided by users who have forgotten
`their login id or password. Such a user typically accesses a
`system from a limited numberof user devices, and the fact
`that authentication attempts of this type were made from
`such a device is recognized by the present invention and can
`be used to present a helpful interface to the user. If the device
`is unknownto the system, this can signal that a hacker is
`trying to break into the system and can be usedto present an
`authentication interface of heightened security. Additionally,
`such users typically enter his user/password information that
`is almost but not entirely accurate. This can be recognized by
`the present invention and used to further guide user authen-
`tication. In preferred embodiments, these options are repre-
`sented by rules processed by a rules engine.
`
`[0034] A further example of this invention’s usability and
`security features is provided bythe ability to distinguish user
`behaviors. If an access originates from a user device that has
`not previously accessed a service provider(e.g., as detected
`by the absence of a device token stored on the user device),
`system rules can required that this access pass a higher level
`of authentication or challenge. However, the user may be a
`savvy user who routinely removes application tokens from
`their user device (almost 15% of Internet users). Further, on
`the basis of previous accesses, this user may be associated
`with a behavior pattern indicating routine access from
`not-readily-identifiable devices. Then,this user is preferably
`not challenged or subject to a higher level of scrutiny. In
`contrast, systems with authentication systems that do not
`adjust the authentication process on the basis past user
`behavior would always challenge such a user. Accordingly,
`the present invention provides a better user experience for
`all the users, whether they are savvy or not.
`
`In further detail, the systems and methods of the
`[0035]
`present invention verify each user’s computer and location
`(“something you have”) along with behavioral usage pat-
`terns on a site to confirm identity (“something you are”).
`These verifications are added on top of existing enterprise
`requirements for login/password credentials (“something
`you know’). This offers the enterprise several strong addi-
`tional layers of anti-fraud protection.
`
`invention includes secure cookies,
`[0036] The present
`flash objects and other technologies to recognize and to
`fingerprint the from which device a user access an applica-
`tion, whether it is a computer, laptop, mobile device or any
`other. These user devices thus become additional authenti-
`cation factors without requiring any change in user behavior.
`Information concerning these user devices is fingerprinted
`and stored into a device token or device id for one-time use.
`The id or token is stored on the user device and saved in a
`
`database for later comparison with tokens retrieved from
`subsequent user device accesses. The token is invalidated if
`a user attempts to reuseit.
`
`[0037] The present invention also includes user device
`tokens or device ids that have a unique number which is
`randomly generated by the methods of this invention. Such
`device tokensare then assignedto the particular user device,
`stored on the particular user device as persistent data (e.g.,
`a cookie), and also stored so as to be accessible to the
`authentication services of this invention. The particular user
`device can be thereby identified upon a subsequent access by
`retrieving the device token from the user device and com-
`paring the unique number with the stored information.If the
`data matches, this particular device is identified. Then a new
`unique identifier numberis created and is stored on the user
`device and by the methods of this invention for use in a
`further access.
`
`[0038] The present invention enables application service
`providers score risk for each online login and transaction
`and to increase authentication security in real time, at login
`and in session, for transactions that may be high risk or
`potential fraud. It evaluates the pre, post and in-session
`characteristics of each transaction to ensure fraud detection
`
`integrity. The methods then provide a
`and transactional
`service provider with scores, actions, and alerts. For
`example, if a transaction has a high risk score and is thus
`potentially fraudulent, one preferred action is to hold the
`
`Page 24 of 50
`
`1A1005
`
`IA1005
`
`Page 24 of 50
`
`

`

`US 2006/0282660 Al
`
`Dec. 14, 2006
`
`transaction and to then seek secondary authentication or
`secondary challenge. The useris, e.g., asked to call service
`provider personnel
`to confirm the validity of the held
`transaction. Another action is to reject
`the transaction.
`Different actions may be appropriate to different transaction
`types. In the case of banking service providers, viewing
`account balances is acceptable but wire transfers are not
`acceptable; or in the case of ecommerce/ASP service pro-
`viders, download of sensitive documents may restricted
`based on the risk score. These actions are preferably invoked
`by rules evaluated during transaction evaluation.
`
`[0039] The systems and methods of the present invention
`include the following features: device,
`location and user
`behavior (“workflow”) fingerprinting; user profiling through
`capture and recording of user workflows; real-time risk
`scoring; real-time, rules-based fraud alerts and response;
`alerts; automatic internal flagging of suspicious activity;
`configurable, out-of-band end-user optional
`secondary
`authentication (via e-mail, SMS, voice print other); 3rd party
`integration via open APIs; support for shared authentication
`and fraud services infrastructure; case managementtools for
`reviewing individual client
`logs; customer care tool for
`servicing inbound customer care; a dashboard for real time
`fraud and activity monitoring; reporting for risk manage-
`ment and trending analysis; and administration for system
`and rules configuration and maintenance. The methods and
`systems include the following components and features:
`rules engine; risk scoring/forensics; real-time response; pro-
`p

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket