$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Variable risk engine 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-011/00
  • G06F-012/14
  • G06F-012/16
  • G08B-023/00
  • G06Q-020/40
  • G06Q-010/06
출원번호 US-0151346 (2016-05-10)
등록번호 US-9754256 (2017-09-05)
발명자 / 주소
  • Britton, David
  • Eisen, Ori
  • Yalov, Raz
출원인 / 주소
  • The 41st Parameter, Inc.
대리인 / 주소
    Knobbe, Martens, Olson & Bear, LLP
인용정보 피인용 횟수 : 7  인용 특허 : 125

초록

The invention provides systems and methods for risk assessment using a variable risk engine. A method for risk assessment may comprise setting an amount of real-time risk analysis for an online transaction, performing the amount of real-time risk analysis based on the set amount, and performing an a

대표청구항

1. A computerized method for performing variable risk assessment for an online transaction, the computerized method comprising: accessing electronic information associated with an online transaction while the online transaction is in progress;identifying one or more characteristics of the online tra

이 특허에 인용된 특허 (125)

  1. Eisen, Ori; Pandich, Steve; Yalov, Raz, 2D web trilateration.
  2. Kroll Mark William, ATM signature security system.
  3. Pritchard,James B.; Calcote,Clyde R., Apparatus and method for protecting a computer system.
  4. Cho Sung-Zoon,KRX ; Han Dae-Hee,KRX, Apparatus for authenticating an individual based on a typing pattern by using a neural network system.
  5. Baulier Gerald Donald ; Cahill Michael H. ; Ferrara Virginia Kay ; Lambert Diane, Automated fraud management in transaction-based networks.
  6. Heaven,John; Steinman,Shane; Staples,David; Hunt,Cliff, Biometric rights management system.
  7. Hirao Kouichirou,JPX ; Yamada Keiji,JPX ; Hongu Takahiro,JPX ; Mochizuki Takashi,JPX ; Arai Mitsutoshi,JPX, Character recognition apparatus and method for recognizing characters.
  8. Zwicky, Richard Kazimierz, Click fraud detection.
  9. Jeppesen John C. (82209 Edison Ventura CA 93001), Computerized court reporting system.
  10. Osbourn, Gordon C.; Bouchard, Ann M., Computing environment logbook.
  11. Baird,Roger T.; Baird,Jeffrey C.; Blair,Timothy P., Controlling the distribution of information.
  12. Pauley, Jr., Wayne A.; Todd, Stephen; Baldwin, Rhonda; Dietrich, David, Data analytics lifecycle automation.
  13. Sheynblat, Leonid; Oliva, Elio J.; Rose, Gregory G., Device and process for unique internet access identification.
  14. Williams, Charles, Device with GPS to manage risk for financial transactions.
  15. Fields, Helen, Dynamic aggregation of payment transactions.
  16. Ronning,Joel A.; Wical,Kelly J., Electronic commerce system and method for detecting fraud.
  17. Greene, Todd; Helsper, David, Fraud analyst smart cookie.
  18. Greene, Todd; Helsper, David, Fraud analyst smart cookie.
  19. Miltonberger, Tom, Fraud detection and analysis.
  20. Helsper, David; Maicon, Dennis, Fraud risk advisor.
  21. Helsper,David; Maicon,Dennis, Fraud risk advisor.
  22. Rowland,Craig; Sandford,Adam; Balakrishnan,Shobana; McCasey,Mark, Generating globally unique device identification.
  23. Wong, Bernard; Goel, Samir; Jain, Ravi, Geographically localizing mobile communciation devices.
  24. Hsieh Jiang (Waukesha WI), Image reconstruction apparatus and method for helical scanning.
  25. Brian T. Berkowitz ; Sreenivas Simhadri ; Peter A. Christofferson ; Gunnar Mein, In-memory database system.
  26. Owaki Hidetaka,JPX ; Nagashima Takeshi,JPX ; Kageyama Yukitoshi,JPX, Information processing apparatus with security checking function.
  27. Lappington John P. ; Marshall Susan K. ; Yamamoto Wayne Y. ; Wilson Cameron A. ; Berkobin Eric C. ; Simons Richard S., Interactive television security through transaction time stamping.
  28. Mark W. Kroll, Keyboard signature security system.
  29. Schweig,Marc E., Keyboard, mouse, and video (KVM) session capture system that stores and can playback portions of live KVM session via forensic capture module.
  30. Eisen, Ori, Keystroke analysis.
  31. Torres,Jose, Knowledge management system.
  32. Roese, John J.; Graham, Richard W.; Frattura, David; Durand, Roger P.; Gorsky, John-Paul; Harrington, David, Locating devices in a data network.
  33. Griegel, David; Yang, Linyu; Li, Danfeng; Zhang, Bo; Milana, Joseph; Zhang, Zuohua; Gancarz, Gregory, Method and apparatus for a merchant profile builder.
  34. Kermani, Bahram Gaffarzadeh, Method and apparatus for achieving secure password access.
  35. Mullen, Paul; Stratton, Gregory C., Method and apparatus for acquisition and analysis of non-imaging data collected during ultrasound exam.
  36. Stephens,Spencer; Cookson,Christopher; Dages,Chuck, Method and apparatus for approximating location of node attached to a network.
  37. Gasparini,Louis A; Gotlieb,Charles E, Method and apparatus for authentication of users and web sites.
  38. Mizushima Hiroshi (Yokohama JPX), Method and apparatus for changing screen image data based on cursor movement relative to a preset mark on the screen.
  39. Gossett, Phil; Ratner, Edward, Method and apparatus for digital image segmentation using an iterative method.
  40. Stolfo Salvatore J., Method and apparatus for imaging, image processing and data compression.
  41. Hawkes, Michael, Method and apparatus for internet web site accreditation.
  42. Dockter Michael Jon ; Farber Joel Frank ; Lynn Ronald William ; Richardt Randal James, Method and apparatus for multi-level security evaluation.
  43. Ennis ; Jr. James D. (Gaithersburg MD) Hasselkus John E. (Germantown MD) Nisbet Thomas R. (Ellicott City MD) Troutman Robert (Gaithersburg MD), Method and apparatus for non-intrusive measurement of round trip delay in communications networks.
  44. Aucsmith David, Method and apparatus for producing computer platform fingerprints.
  45. Keene,Catherine M.; Lin,Raymond; Sadhureddly,Rao, Method and apparatus for providing controlled access to software objects and associated documents.
  46. Brown Marcus E. (Tuscaloosa AL) Rogers Samuel J. (Breckenridge TX), Method and apparatus for verification of a computer user\s identification, based on keystroke characteristics.
  47. Young James R. (Palo Alto CA) Hammon Robert W. (San Jose CA), Method and apparatus for verifying an individual\s identity.
  48. Walker Jay S. ; Schneier Bruce ; Jindal Sanjay K. ; Tedesco Daniel E., Method and device for generating a single-use financial account number.
  49. Kowalchyk, Eric F.; Mo, See Yew; Lu, Jimmy M.; Buddhavarapu, Satish; Power, Michael J.; Mako, Janos Z., Method and system for assessing merchant risk during payment transaction.
  50. Yellin, Eric; Moon, Susan; Etuk, Ntiedo, Method and system for associating consumers with purchase transactions.
  51. Dharmarajan,Baskaran, Method and system for authorizing a client computer to access a server computer.
  52. Sarkar, Shantanu; Fry, Steven G.; Chan, Johnny C., Method and system for determining a relative position of a device on a network.
  53. Teppler, Steven W., Method and system for determining and maintaining trust in digital data files with certifiable time.
  54. Eisen,Ori, Method and system for determining presence of probable error or fraud in a data set by linking common data values or elements.
  55. Dawson, Thomas Patrick, Method and system for dynamically allocating a frame buffer for efficient anti-aliasing.
  56. Lamm David, Method and system for electronically presenting and paying bills.
  57. Eisen, Ori, Method and system for identifying users and detecting fraud by use of the internet.
  58. Eisen, Ori, Method and system for identifying users and detecting fraud by use of the internet.
  59. Barrett,Michael Richard; Armes,David; Bishop,Fred; Shelby,James; Glazer,Elliott; Steitz,Philip W.; Gibbons,Stephen P., Method and system for implementing and managing an enterprise identity management for distributed security.
  60. Osbourn, Gordon Cecil; Bouchard, Ann Marie, Method and system for rendering and interacting with an adaptable computing environment.
  61. Dujari,Rajeev; Wang,Biao; Hawkins,John M.; Rouskov,Yordan; Erdogan,Samim, Method and system of integrating third party authentication into internet browser code.
  62. Southard,David A.; Bell,Lowell F.; Aucoin,Michael A.; Gouin,Fr챕d챕ric; Cannaday, Jr.,Theodore H., Method for digital transmission and display of weather imagery.
  63. Huffman, Stephen Mark; Reifer, Michael Henry, Method for geolocating logical network addresses.
  64. Bobich, Thomas; Brachet, Carl-Manuel; Gray, Robert; Hinman, John, Method for minimizing financial risk for wireless services.
  65. Linden, John; Teeter, Tobias, Method for performing real-time click fraud detection, prevention and reporting for online advertising.
  66. Korb,Joseph; Odom,Jesse; Rein,David, Method of and system for transferring data over a wireless communications network.
  67. Boulware, Van W., Method of conducting anti-fraud electronic bank security transactions having price-date-time variables and calculating apparatus thereof.
  68. Curry Stephen M. ; Loomis Donald W. ; Fox Christopher W., Method, apparatus, system and firmware for secure transactions.
  69. Eisen, Ori, Methods and apparatus for detecting fraud with time based computer tags.
  70. Eisen, Ori; Yalov, Raz, Methods and apparatus for securely displaying digital images.
  71. Eisen, Ori; Yalov, Raz, Methods and apparatus for securely displaying digital images.
  72. Shraim,Ihab; Shull,Mark, Methods and systems for analyzing data related to possible online fraud.
  73. White, Conor Robert; Peirce, Michael; Cramer, Jason Scott; Steiner, Chet Bradford; Diebes, Suzanna, Methods and systems for authenticating users.
  74. Eisen, Ori; Yalov, Raz, Methods and systems for persistent cross-application mobile device identification.
  75. Zhu, Bin; Feng, Min; Yin, Xu; Yang, Yang; Zhang, Yao; Shao, Jun, Mobile device assisted secure computer network communication.
  76. Pierson, Greg; DeHaan, Jason, Network security and fraud detection system and method.
  77. Pierson,Greg; DeHaan,Jason, Network security and fraud detection system and method.
  78. Rajasekaran, Sanguthevar; Varadarajan, Rammohan, One-time credit card number generator and single round-trip authentication.
  79. Barber,Timothy P., Online machine data collection and archiving process.
  80. Ponte, Jay Michael, Page aggregation for web sites.
  81. Teppler, Steven W., Personal computer system and methods for proving dates in digital data files.
  82. Smith David B., Personal identification number security system incorporating a time dimension.
  83. Anderson, Glen J., Pressure password input device and method.
  84. Borthwick, Andrew E., Probabilistic record linkage model derived from training data.
  85. Barber, Timothy P., Proxy piercing for identifying address of and marketing to a user device involved in an online transaction.
  86. Jalili Reza, Secure data entry and visual authentication system and method.
  87. Law,Simon; Hapuarachchi,Pasan; Tse,Daniel Man; Law,Jimmy, Secure wireless authorization system.
  88. Tan Jeanette C. (21600 Cleardale St. Santa Clarita CA) Iggulden Jerry R. (21600 Cleardale St. Santa Clarita CA 91321) Streck Donald A. (832 Country Dr. Ojai CA 93023), Security facsimile systems.
  89. Arkady G. Zilberman, Security method and apparatus employing authentication by keystroke dynamics.
  90. Chang Sheueling ; Marks Stuart, Security system and method for financial institution server and client web browser.
  91. Taylor Geoffrey L. (211 Oak Street Winnipeg ; Manitoba CAX R3M 3P7), Security system method and article for photocopiers and telefax machines.
  92. Barker, John C.; McGraw, Montomgery C.; Sturgeon, Derrill L., Selective document scanning method and apparatus.
  93. Barker,John C.; McGraw,Montomgery C.; Sturgeon,Derrill L., Selective document scanning method and apparatus.
  94. Handley, John C.; Buckley, Robert R., Selective encryption of mixed raster content layers.
  95. Wood, David L.; Norton, Derk; Weschler, Paul; Ferris, Chris; Wilson, Yvonne, Single sign-on framework with trust-level mapping to authentication requirements.
  96. Padmanabhan, Venkata N.; Subramanian, Lakshminarayanan, System and method for determining the geographic location of internet hosts.
  97. Padmanabhan,Venkata N.; Subramanian,Lakshminarayanan, System and method for determining the geographic location of internet hosts.
  98. Silverman, Robert M., System and method for determining the location of remote devices.
  99. Ciaramitaro,Barbara L.; Gruskin,Michael A.; Wolfe,Edward C., System and method for electronically managing privileged and non-privileged documents.
  100. Varghese, Thomas Emmanual; Fisher, Jon Bryan; Harris, Steven Lucas; Durai, Don Bosco, System and method for fraud monitoring, detection, and tiered user authentication.
  101. Boesch Brian ; Farrell Patrick ; Light Elliott ; Eisenberg R. Scott, System and method for merchant invoked electronic commerce.
  102. Fritz,Adam T.; Wang,Yiqing, System and method for preventing automated programs in a network.
  103. Donner, Irah H., System and method for reallocating and/or upgrading and/or selling tickets, other event admittance means, goods and/or services.
  104. Avni, Yossi; Suchard, Eytan, System for and method of web signature recognition system based on object map.
  105. Tedesco,Daniel E.; Jorasch,James A.; Gelman,Geoffrey M.; Walker,Jay S.; Tulley,Stephen C.; O'Neil,Vincent M.; Alderucci,Dean P., System for image analysis in a network that is structured with multiple layers and differentially weighted neurons.
  106. Guan, Devin; Li, Xiang; Cotta, Randy; Bafna, Rahul; Venkatesan, Obuli, System to group internet devices based upon device usage.
  107. Smith, Ben; Lester, Chad; Karrels, Edward Lyle, Systems and methods for detecting click spam.
  108. Eisen, Ori, Systems and methods for detection of session tampering and fraud prevention.
  109. Eisen, Ori, Systems and methods for detection of session tampering and fraud prevention.
  110. Eisen, Ori, Systems and methods for detection of session tampering and fraud prevention.
  111. D'Entremont William ; Mesher Mark ; O'Dea Michael ; Waite Myron, Systems and methods for recording data.
  112. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  113. Eisen, Ori; Pandich, Stephen George, Systems and methods for security management based on cursor events.
  114. Abraham,Magid; Brown,Michael; Heyman,Steve, Systems and methods for user identification, user demographic reporting and collecting usage data usage biometrics.
  115. Eisen, Ori, Systems and methods of sharing information through a tag-based consortium.
  116. Eisen, Ori, Systems and methods of sharing information through a tagless device consortium.
  117. Narin,Attila; Kegley,Keith A.; Sobeski,David A., Tracking usage behavior in computer systems.
  118. Seul,Michael; Danegy,Robert James, Transfusion registry network providing real-time interaction between users and providers of genetically characterized blood products.
  119. Rosen Sholom S., Trusted agents for open electronic commerce where the transfer of electronic merchandise or electronic money is provisional until the transaction is finalized.
  120. Mills, Andrew Jesse; Sims, Shaun, Uniquely identifying a mobile electronic device.
  121. Guo, Hui; Srinivasan, Venkatachary; Rajam, Surendra Sadanand; Jiang, Zhaowei Charlie; Zhou, Min, Universal device identifier for globally identifying and binding disparate device identifiers to the same mobile device.
  122. Shinzaki, Takashi, User verification system, and portable electronic device with user verification function utilizing biometric information.
  123. Britton, David; Eisen, Ori; Yalov, Raz, Variable risk engine.
  124. Pogue Michael Alan ; Werner Laura Allison ; Pfeiffer Ralf I. ; Gupta Pratima ; Zhang Yong ; Clark James Andrew, Web site client information tracker.
  125. Ellerman,E. Castedo; Fubini,Ross B.; Kunins,Jeff C.; Luong,Daphne H.; Partovi,Ali; Partovi,Hadi; Porter,Brandon W., Web-to-phone account linking using a linking code for account identification.

이 특허를 인용한 특허 (7)

  1. Burger, Michael, Adjustment of knowledge-based authentication.
  2. Burger, Michael; Dean, Michael John; Kapczynski, Mark Joseph; Yu, Nelson, Authentication alerts.
  3. Khanwalkar, Manoj; Camacho, Adler; Van Lare, Stephen; Winkler, Omer; Tuttle, Luke David; Patel, Surag I., Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups.
  4. Eisen, Ori; Yalov, Raz, Methods and systems for persistent cross-application mobile device identification.
  5. Eisen, Ori, Systems and methods for detection of session tampering and fraud prevention.
  6. Eisen, Ori, Systems and methods of global identification.
  7. Eisen, Ori, Systems and methods of sharing information through a tag-based consortium.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로