CA2411034A1 - Online machine data collection and archiving process - Google Patents

Online machine data collection and archiving process Download PDF

Info

Publication number
CA2411034A1
CA2411034A1 CA002411034A CA2411034A CA2411034A1 CA 2411034 A1 CA2411034 A1 CA 2411034A1 CA 002411034 A CA002411034 A CA 002411034A CA 2411034 A CA2411034 A CA 2411034A CA 2411034 A1 CA2411034 A1 CA 2411034A1
Authority
CA
Canada
Prior art keywords
customer
transaction
web site
script
string
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA002411034A
Other languages
French (fr)
Other versions
CA2411034C (en
Inventor
Timothy P. Barber
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kount Inc
Original Assignee
Telecheck Services, Inc.
Timothy P. Barber
Keynetics Inc.
Kount Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=22780938&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=CA2411034(A1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Telecheck Services, Inc., Timothy P. Barber, Keynetics Inc., Kount Inc. filed Critical Telecheck Services, Inc.
Priority to CA2960857A priority Critical patent/CA2960857C/en
Publication of CA2411034A1 publication Critical patent/CA2411034A1/en
Application granted granted Critical
Publication of CA2411034C publication Critical patent/CA2411034C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/085Payment architectures involving remote charge determination or related payment systems
    • G06Q20/0855Payment architectures involving remote charge determination or related payment systems involving a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3674Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/385Payment protocols; Details thereof using an alias or single-use codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements
    • G06Q30/0255Targeted advertisements based on user history
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements
    • G06Q30/0269Targeted advertisements based on user profile or attribute
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0609Buyer or seller confidence or verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/12Accounting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • H04L67/303Terminal profiles
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising

Abstract

An online machine data collection and archiving process (15) generates a machine data profile (18) of a customer computer (5) accessing a transaction form of a merchant web site (3) and links the machine data profile (18) and a transaction record (6) with customer identifying information using a unique transaction identification string. The process preferably captures parameters typically communicated as part of web accesses, such as an IP address, an HTTP
header, and cookie information. The process additionally causes the customer computer (5) to process self-identification routines by processing coding within the merchant transaction form, the self-identification routines yielding further profile parameters. The process further includes a routine for bypassing an intervening proxy to the merchant web site (3) to reveal the true IP address of the customer computer (5).

Description

2
3 Cross-Reference to Provisional. Application
4 This application claims benefits from provisional application, Serial No.
60/209,936 filed June 7, 2000 and entitled METHOD FOR COLLECTINGMACHI13E
6 DATA FROM CUSTOMERS ON A COMPUTER NETWORK.

8 Back~roand of the Invention 9 The present invention relates to identity detection techniques and, more particularly, to a process for collecting and utilizing machine-identifying data of computers 11 and other online appliances used in online interactions and transactions and associating the 12 collected machine data with such online interactions.
13 The Internet, or global computer network, represents a new medium for marketing 2 4 similar to the way mail ordering and telephone ordering did in the past. A
downside of Internet marketing is that it also presents new opportunities for unscrupulous parsons to 2 6 take advantage of the mechanisms of Internet transactions by fraudulent and deceptive 17 practices. Merchants and f nancial institutions bear the initial costs of fraud. However, 18 consumers ultimately pay the costs in the form of prices and credit rates which must take 19 into account losses from fraud. Internet purchases typically involve the use of web page 2 o forms which are filled in by the customer with identity, address, purchase, shipping, and 1 payment information and submitted' to the online merchant for processing.
Internet 2 purchases are most often paid for by way of credit cards. While a merchant's software 3 may be able to verify the existence and status of a credit card account number and an 4 authorization for a specific amount, the merchant is often not able to match a credit card number with a specific purchaser or shipping address. Thus, absent any overt indication 6 otherwise, a merchant generally assumes that anyone using a credit card is auth4rized to 7 do so and that a customer is who he identifies himself to be.
8 An important step in combating fraud is accurate identification of the computers 9 through which customers make transactions and associating such identities with transactions which arouse suspicions or which ultimately turn out to be fraudulent. Basic 11 machine identity is essential to the manner in which the Internet operates.
We speak in 12 terms of "going" to a web site. In reality, "going" to a web site involves sending a request 13 for a web page file in a directory or folder on a computer located at a specific Internet 14 protocol, or IP; address. In order for the web page file to be returned to the requesting computer for processing into a displayed "web page", the request must include return 16 "directions" in the form of the basic identity of the requesting computer, including its IP
17 address. Some web sites are implemented with software which enables responses to web 18 page requests to be tailored to specifics of the requesting machine's configuration, specific 19 web browser, and the like. For this reason, current versions of browsers usually 2 0 communicate configuration information in addition to a return 1P address and return path.

1 The IP address of a page requesting computer can give an indication of the specific 2 country where the computer is located. ~ Further, identification of a page-requesting 3 computer can also recognize a returning user using the same computer as during a 4 previous access. For example, placing an HTTP (hypertext transfer protocol}
"cookie" on a page-requesting computer can make it possible to identify the computer on a later 6 access.
7 Because direct interaction with a customer's computer is essential in detecting 8 fraud, it has been assumed that any viable fraud detection software must be integrated with 9 a merchant's software. As a result, most existing fraud detection solutions require merchants to either abandon or extensively modify their existing web-based transaction 11 processing software. An additional problem with focusing fraud detection at single 12 merchants is that perpetrators of fraud often hit many merchants in an attempt to avoid or 13 delay detection. Thus, an ideal system for fraud detection in online marketing would' only 14 minimally affect the merchant's existing software and would route fraud detection efforts through a central, third-party entity serving a large multitude of merchants.

17 Summary of the Invention 18 The present invention provides a process for collecting data associated with a 19 customer's computer during access of a merchant, financial, other host web site, and 2 0 associating a transaction identification number with the data and with a transaction form of 21 the merchant. Generally, the present invention captures machine identifying data from a 1 computer or other digital appliance accessing a host web site, sends the captured data to a 2 machine data archive along with a unique transaction identification string for storage in the 3 archive and writes the same transaction identification string into a transaction form 4 through which transactions with the host web site are conducted. The machine data is, thus, associated with the customer identification data within the transaction form by way 6 of the transaction identification string and can be used on-the-fly or at a later time for a 7 variety of purposes including, but not limited to, fraud detection. Although the term 8 "archive" is used, the machine data collected need not be stored permanently.
9 The machine data collection process of the present invention is intended to be employed in a variety of applications including, but not limited to: online purchases and 11 orders; online banking, bill: payment, and funds transfers; online registrations, such as for 12 memberships, product warranties, applications for credit, renewal of subscriptions and-13 licenses; online technical support; and the like. The term "transaction" is used in the 14 present invention to describe an interaction effected between a digital appliance and a host system. However, the term "transaction" is not intended to be restricted to only 16 commercial interactions involving purchases. The term "transaction" is intended to apply 17 to an interaction of a remote digital appliance with a host system using a relatively 18 anonymous type of access process over a digital medium iri which some form of self 19 identification of the accessing appliance is inherent in the access process and in which the 2 0 true identity of the accessing party, the true source address of the appliance on the 1 medium, and/or the true machine characteristics of the accessing appliance is/are essential 2 or desirable to the interaction.
3 The host entity which operates the host system accessed is intended to encompass 4 a commercial, financial, educational, governmental, associational, or other type of entity.
The term "merchant" will be used herein to refer to such a host entity without intent to 6 limit the present invention to commercial transactions. The medium of access is intended 7 to be interpreted as including a global computer network such as the Internet or world 8 wide web, as well as other types of networks which may be less than global but which are 9 publicly and/or anonymously accessible. The term "Internet" will be used herein to refer to the medium through which accesses to the host entity are made. The terms "customer 11 computer" or "machine" are used herein to refer to a device for effecting remote access to 12 a host system over a digital' medium and are meant to encompass not only conventional 13 types of personal computers, but also additional types of"digital appliances" with online 14 access capabilities, such as: cell phones, personal digital assistant devices, electronic game systems, television sets with online access capabilities, web appliances for vehicles, and 16 any other type of device with online access capabilities whether connected to a wired 17 communications network directly or by a radiant technology.
18 The machine data collection process of the present invention contemplates a two 19 party process embodiment in which a "merchant" processes and/or stores machine data 2 0 profiles of customer computers in-house, as well as a three party process embodiment in
5 1 which machine data profiles of customer computers are processed and/or stored for the 2 merchant by a third-party machine data collection and archive service.
3 In a two party embodiment of the data collection process of the present invention;
4 the customer machine data is captured by a merchant or host system which also generates a unique transaction identification (ID) string and assigns or associates the transaction ID
6 with a machine data profile of the customer machine data profile. In the two party
7 process, the merchant system captures customer computer data which is inherently passef
8 from the customer computer to the merchant's web site, such as an IP address of the
9 customer computer and an HTTP header. Additionally, according to the present invention, the merchant web page code may have routines or calls for external routines 11 which, when processed by the customer computer, cause the customer computer to 12 further identify itself by collecting and returning certain machine and software 13 configuration. characteristics, which can be used to ifentify the particular customer 14 computer. The two party process may include the generation and setting of an HTTP
I 5 cookie in the customer browser for recognition upon a later access with the merchant web 16 site.
17 Although the two-party embodiment of the machine data collection process of the 18 present invention has utility for some applications, the three party embodiment is preferred 19 for applications in which analysis of a maximum number of customer computer profiles is 2 0 desirable, such as certain types of marketing processes and fraud detection and control 21 processes. In a three embodiment of the present invention, the customer machine data of 1 computers accessing the second party or merchant web site is communicated to and stored 2 within a third party system, referred to herein as a machine data archive service. In the 3 three party process, the transaction m could be generated by the merchant system, but is 4 preferably generated by the .archive service. The use of the term "archive"
is not meant to . indicate that the customer machine data profiles are stored permanently within the third 6 party system. Permanent storage of such profiles may not be practical, as far as yielding 7 beneficial results to the purposes for which the profiles are collected.
Thus, the term 8 "archive" is meant to indicate a central storage facility, such as a database, with a selected 9 retention period, with purging of most profiles after a certain length of time.
In the three party process a routine or line of code is added into the hypertext 11 markup language (HTML) code which defines the merchant's web page, particularly an 12 order or transaction form page. The added routine issues a request for a machine data 13 collection (MDC) script to the third-party web site when the form page code is processed 14 by the customer's browser. When the script request is received by the machine data archiving service (MDAS), the archive service generates a unique transaction 16 identification (TA/ID) and checks for its own cookie. If no MDAS cookie is present, the 17 archive service sends a cookie to the requesting computer along with a machine data 18 collection (MDC) script having the transaction m embedded therein. The MDC
script is 19 executed by the customer's browser, causing collection of certain data from the 2 0 customer's computer which is sent back to the archive service along with the transaction 21 m and stored in a machine data profile in the machine data archive. The transaction ll7 is 1 written into the transaction form, and when the transaction form is submitted to the 2 merchant web site, the transaction ID string becomes a part of the transaction data record, 3 along with customer identification, location, and financial information.
4 The machine data initially collected and stored~in each profile preferably includes the transaction ID, the apparent IP address of the customer's computer, a conventional 6 HTTP header which identifies the customer's browser versions and certain configuration 7 aspects of the browser, and the archive service's cookie. The combination of such 8 information, minus the transaction ID, will be relatively rare but may not be unique.
9 Additionally, customers intent on conducting fraudulent transactions often hide their IP
address behind HTTP proxies. In order to further narrow the machine profile, in a 11 preferred embodiment of the present invention, the lViDC script performs additional 12 machine profiling operations: generation. of a machine "fingerprint" and a proxy 13 "piercing" operation.
14 In the fingerprint generation operation, the MDC script assembles an attribute string formed by various attributes or configuration settings of the browser which can be 16 queried by the script. The MDC script then performs a conversion process on the 17 attribute string to generate a fingerprint string having content which is a function of the 18 original content of the attribute string. The conversion process is preferably a "hashing"
19 function which is, in erect, an irreversible encryption algorithm. The generation of a 2 0 conventional checksum is one example of a type of hashing function. For-example, if the 21 attribute string is formed by alphanumeric characters, the conversion process is performed 1 on the string of codes representing the characters. The particular conversion process or 2 hashing function used may be one of many types of conventional conversion algorithms or 3 hashing functions, which are typically used for data integrity tests. The resulting string 4 from the MDC conversion process is a so-called fingerprint, which is returned to the archive service along with the transaction ID for storage in the machine profile. A time 6 value, queried from the customer computer time-of day clock, is returned with the 7 fingerprint string and stored in conjunction therewith.
8 An HTTP proxy is one of several types of proxies through which a browser may 9 be setup to operate. Setting up an HTTP proxy causes HTTP requests to be relayed by a primary gateway, through which the computer actually interfaces to the Internet, to a 11 remote secondary gateway, or proxy, with an IP address different from the primary 12 gateway IP address. Such redirection hides the true IP address of a computer. The proxy 13 piercing operation of the MDC script queries the customer computer for any LAN (local 14 area network) address which may be assigned to the computer and reads the system time of day clock. Then attempts are made to send the LAN address, if any, the time value, 16 and the transaction ID to the archive service using a protocol which will not be redirected 17 through the HTTP proxy, for example a lower level protocol such as TCPlIP
or UDP
18 protocols. If the attempt is successful, the message containing the time value, the 19 transaction ID, and LAN address arnve at the archive service web site with the true return 2 0 IP address of the customer computer, whether an HTTP proxy intervenes or not. The 21 LAN address and IP address so derived are stored in the machine profile. It should be 1 noted that the use of an FiTTP proxy is not, of itself, an indication of fraud. However, the 2 acquisition of an additional IP address is one more parameter with which to identify a 3 particular computer.
4 When, and if, the customer submits the transaction form to the merchant, the transaction m string is communicated to the merchant; along with other customer 6 information such as name, address, credit card number and the like plus transaction 7 information. The complete transaction record is stored on the merchant's system and is 8 associated with a specific machine identity profile within the archive service by way of the 9 transaction m string. Thereafter, the stored machine identity profiles and transaction records of large numbers of transactions can be analyzed by various fraud detection 11 techniques to detect patterns of fraud and fraud' attempts and, preferably, identify and 12 locate the sources of such activity.
13 The machine data profiles stored in the archive service need not be combined with 14 the customer identification information for non-suspicious transactions, to thereby preserve the privacy of non-suspicious customers within the machine data archive.
16 However, the processes of the present invention do not require that the customer 17 identification information be kept separated from any associated machine data profiles, and 18 there may be reasons to combine the associated records.
10 1 Brief Description of the Drawings 2 Fig. 1 is a simplified block diagram illustrating a plurality of customer and 3 merchant computers interfaced' to the Internet along with a machine data archiving service 4 computer for practicing the machine data collection process of the present invention.
Fig. 2 is a simplified block diagram illustrating connection of a customer computer 6 to the Internet, with optional components shown in phantom lines.
7 Fig. 3 is a flow diagram illustrating principal steps of the machine data collection 8 and archiving process according to the present invention.
9 Fig. 4 is a flow diagram illustrating more detailed steps of the machine data collection and archiving process according to the present invention.
11 Fig. 5 is a flow diagram illustrating a still further detailed steps in the machine data
12 collection and archiving process of the present invention.
13 Various objects and advantages of this invention will become apparent from the
14 following description taken in relation to the accompanying drawings wherein are set forth, by way of illustration and example, certain embodiments of this invention.
16 The drawings constitute a part of this specification, include exemplary 17 embodiments of the present invention, and illustrate various objects and features thereof.

1 Detailed Description of the Invention 2 As required, detailed embodiments of the present invention are disclosed herein;
3 however, it is to be understood that the disclosed embodiments are merely exemplary of 4 the invention, which may be embodied in various forms. Therefore, specific structural and functional details disclosed herein are not to be interpreted as limiting, but merely as a 6 basis for the claims and as a representative basis for teaching one skilled in the art to 7 variously employ the present invention in virtually any appropriately detailed structure.
8 Referring to the drawings in more detail:
9 The reference numeral 1 (Fig. 3) generally designates a process for online collection of machine identifying or profiling data of computers 11 involved in commercial transactions and for archiving such data to facilitate analysis for 12 fraud detection purposes. The process collects machine identifying or profiling data of 13 computers involved in commercial transactions and archives such data in a third-party 14 machine data archive service in association with a transaction identification string or Il7 which is also written into a transaction form of a merchant with whom the customer is 16 conducting a transaction.
17 Fig. 1 illustrates a plurality of host entities or merchants with corresponding 18 merchant computers 2, on which are operated merchant web sites 3 which are accessible 19 over a global computer network, such as the Internet 4, by a plurality of customer 2 0 computers 5. The merchant computers 2 execute various programs which enable the sale 21 of products or services by way of the Internet 4. The merchant web sites 3 typically make 1 use of form type web pages with which the customers 5 interact by filling in various data 2 fields, for example, name, address, shipping address, telephone number, credit card type 3 and number and expiration date, and description and quantities of products to be ordered.
4 The merchant transaction forms are usually written in hypertext markup language (HTML) and may include requests for code written in other languages, such as Java and 6 the like. When a customer 5 accesses a merchant's transaction form, a transaction form 7 file is communicated to the customer's computer with various data fields displayed as fill-8 in boxes or the like. The customer fills in the appropriate fields and selects a submit 9 "button" which activates a routine to transfer the collected information back to the merchant web site 3 for processing. The returned "form" is a data record 6 which is 11 stored in a merchant transaction database 7 for retrieval and processing in due course to 12 cause the ordered items to be gathered, packaged and prepared' for shipment, along with;
13 financial processing to debit the customer's credit account. The financial processing may 14 include a validity check of the credit account and an authorization check for the amount of purchase with the credit card issuer. Additionally, inventory management processes are 16 executed based on the items withdrawn from stock for shipment.
17 In a three party embodiment of the present invention, the process 1 makes use of 18 an entity referred to herein as a machine data archiving service, MDAS or archive service;
19 which operates an archive service computer system 15, including an archive service web 2 0 site 16. The archive service system 15 maintains a machine data archive service database 21 or archive 17 in which the machine data collection profiles.18 from customer computers 5 1 of the merchants 2 are stored. The archive service web site 16 is interfaced to the Internet 2 4. The archive service 15 is preferably independent of the merchants and may be operated 3 by a merchants' association, a financial institution or association thereof, or may be an 4 independent contractor. Alternatively, it is conceivable that a merchant with a high volume of online sales could operate its own in-house machine data profile collection and;
6 archiving service 15, for fraud detection or possibly for marketing purposes.
7 Referring to Fig. 2, a customer computer system 5 includes a customer computer 8 20 interfaced to the Internet 4 by way of a primary gateway 22, as of an Internet service 9 provider (ISP). The computer 20 might be one of many on a local area network or LAN
24 which includes a router or switch which routes data from the Internet 4 to the 11 computers on the network. The computer 20 may communicate through the Internet 4 by 12 way of a I3TTP (hypertext transfer protocol) proxy 26, which disguises the Internet 13 protocol (IP) address of the actual gateway 22. The computer 20 accesses web sites on 14 the Internet 4 using a customer web browser 28 which processes HTML
language and various other standard web oriented languages to display or otherwise render the content 16 of web pages and interact therewith. The browser 28 is normally enabled to accept I 7 "cookies" 30 which are stored in a cookie file. Cookies 30 are data strings which are 18 issued by Web sites and give an indication of a previous visit to a particular web site and 1 ~ may indicate a particular configuration or set of preferences of the customer's setup of the 2 0 computer 20. Typically, the customer computer 20 has a time of day clock/calendar 32.

1 The customer computer 20 may have a fixed IP address, depending on the manner 2 in which it is interfacedAto the Internet. ll~iore commonly, the customer computer 20 will 3 have a temporary or dynamically assigned IP address which is determined by the primary 4 router 22. The primary router 22 has an 1P address, as do a router of a LAN
24 or an HTTP proxy 26 if either is present in the customer's computer system 5.
6 Fig. 3 illustrates the principal actions or steps of a general or basic process 34 of 7 the process 1 for collecting machine identifying data from customer computers 5. At step 8 35, at least one machine identifying profile parameter is captured upon access of a 9 customer computer 5 or other online access device with a host or merchant web site 3. A
unique transaction identifier or TA/lD is generated at 36 and associated at 37 with the 11 captured profile parameter. The transaction >D is also associated at step 38 with a 12 transaction record generated as a result of the interaction or transaction conducted 13 between the customer computer 5 and a merchant web site 3. Although not specifically 14 shown in Fig. 3, the process 34 may capture machine profile data that is passed from the customer computer 5 to the merchant computer 3 as an inherent step of the customer 16 computer 5 accessing the merchant computer 3. Alternatively, the process 34 may pass 17 routines to the customer computer 5 to cause it to "self identify" itself by querying certain 18 configuration parameters and passing such information to a: machine profile stored either 19 within the merchant's system 2 or in a third party archive 17. The process 34, thus, 2 0 encompasses a two-party embodiment or a three party embodiment of the machine data 21 collection and archiving process 1 of the present invention.

1 Refernng particularly to Fig. 4, a more particular three party embodiment of the 2 machine data collection and archiving process 1 begins at step 40 with the coding of a 3 machine data collection (MDC) script request into the web page code for a transaction 4 form of a merchant web site 3. When a customer S accesses the merchant transaction form at step 42, the customer browser 28 processes the transaction page code, including 6 the MDC script request, which causes the MDC script request to be communicated to the 7 archive service web site 16 at step 44. The script request arrives at the archive service 1 S
8 with a set of customer machine parameters which principally provide a return path for the 9 MDC script from the archive service 15 to the customer S. The customer machine parameter set preferably includes "user agent" information, which is the version of the 11 customer browser 28.
12 At step 46, the archive service 15 generates a unique transaction m string and 13 associates it with the customer machine parameter set in the MDAS archive 17. At step 14 48, the archive service returns the MDC script, with the transaction m embedded within it, to the customer browser 28. At step 50, the customer browser 28 processes the MDC
16 script which, at a minimum, writes the transaction D? string into the merchant's transaction 17 form. Assuming that the customer 5 completes the transaction and submits the transaction 18 form to the merchant 2 at step 52, the transaction B7 string is stored with the transaction 19 data record 6 in the merchant transaction database 7. The transaction ID, thus, indirectly 2 0 associates the machine data parameter set 18 stored in the MDAS archive 17 at step 54 21 with the customer identity information stored with the transaction data record 6 in the 1 merchant's transaction database 7. Thereafter, qualified parties may access the MDAS
2 archive 17 for information related to a transaction B7.
3 The MDAS archive 17 need not contain any information which specifically 4 identifies a particular customer, only the machine parameter profiles 18 with associated transaction m strings. The MDAS archive records 18 can be analyzed in conjunction with 6 the merchant transaction records for patterns of fraud or for other purposes. The great 7 majority of MDAS archive records can be purged from the archive 17 after a selected 8 period of time. Any records which are associated with any transaction irregularities or 9 suspicions of actual fraud may be retained longer.
Fig. S illustrates the principal steps of a preferred embodiment 60 of the machine 11 data collection and archiving process 1 of the present invention. The process 60 begins 12 with the addition at 62 of a machine data collection (MDC) script to the transaction (TA) 13 form page code of a merchant web site 3. The transaction form page code is processed at 14 64 by a customer browser 28 when the merchant web page is accessed to thereby request the MDC script at 66 from the Machine data archive service (MDAS) web site 16.
When 16 the browser 28 accesses the MDAS web site 16, requesting the MDC script, the MDAS
17 web site checks far the presence of an MDAS cookie at step 68. If no MDAS
cookie is 18 detected, an MDAS cookie is generated at 70 and a uniquevtransaction identification 19 (TA/m) string is generated at 72. The MDC script, transaction m, and cookie, if not 2 0 previously set, are returned at 74 to the customer browser 28, the transaction m being 21 embedded within the MDC script.

1 When the MDC script is received by the browser 28, it is executed at 76. The 2 cookie is stored in the cookie file 30, or.possib~y in the memory of the customer computer 3 20. Execution of a preferred MDC script causes several actions to be performed. The 4 MDC script writes the transaction m into the transaction form at step 78.
The script can do this by either setting an existing variable of an appropriate name to the transaction m 6 string or by writing an appropriate variable into the transaction form page and setting its 7 value to the transaction 1D string. Additionally, the preferred MDC script generates a 8 "fingerprint" of the customer computer 20 at step 80 and attempts to perform a proxy 9 piercing operation at step 82.
In generating the machine fingerprint at 80, the 1V~7C script queries the browser 28 11 for a number of attributes and settings and concatenates the results into an attribute string 12 at 84. The 11~C script then performs a hashing algorithm on the. attribute string at 80 to 13 generate a fingerprint string which has a high degree of uniqueness.
Hashing functions are 14 irreversible encryption processes in which the result is dependent on the original content of the data on which the hashing algorithm is operated. Hashing functions are commonly 16 used for data integrity checking. As previously stated, a common checksum is the result 17 of a type of hashing function. The particular hashing function employed preferably 18 maximizes the uniqueness of the resulting fingerprint.
19 At step 86, the customer computer clock 32 is queried for a current time value. At 2 0 step 88, the fingerprint, the transaction ll~, and the time value are communicated to the 1 MDAS web site 16 along with an HTTP header with cookie and "apparent" IP
address, all 2 of which are stored as a machine data profile 18 within the MDAS archive 17.
3 At step 90, the MDC script adds a proxy piercer request to the transaction form 4 which, when executed by the browser 28 at step 92, sends a request for a proxy piercer applet or code to the MDAS web site 16. When the proxy piercer applet/code is executed 6 by the browser 28 at 94, a time value from the clock 32 is again queried at 96 and any 7 existing local area network (LAN) address is queried at 98. At step 100, the proxy piercer 8 applet/code sends the time value, the LAN address (if any), and the transaction ID to the 9 MDAS web site 16 by a protocol which bypasses any existing HTTP proxy 26.
The protocol used is one which is at a lower level than HTTP, such as UDP (user datagram 11 protocol) or, preferably, TCPlIP (transmission control protocol/internet protocol).
12 Bypassing the HTTP proxy 26 causes the data sent in step 100 to arnve at the 13 MDAS web site 16 with the IP address of the primary gateway 22, which may be different 14 from any apparent IP address previously recorded if an HTTP proxy 26 intervenes. If the proxy piercer procedure 82 is successful, the primary gateway 1P address is stored at step 16 102 within the machine data profile 18 identified by the transaction ID. It should be noted 17 that some types of proxies, such as some types of firewalls, may block all non-HTTP
18 protocol packets, so that the proxy piercer procedure 82 might not be successful in all 19 cases.

1 If the customer completes the transaction with the merchant web site 3, the 2 transaction form is submitted at step 104, which causes the transaction record 6, including 3 the transaction >D, to be stored at step 106 in the merchant database 7 for processing.
4 Following are examples of code for an MDC script, as from steps 40 or 62.
Assuming the machine data archiving service or MDAS web site 16 has the fictional URL
6 (uniform resource locator) example-url.net and a specific merchant has a merchant 7 identifier h~llvIM, a line of HTML code is added at step 40 to the transaction form of 8 merchant N.111~iM between the <form> and </form> HTMI, tags which has the form:

<script src=https://www.example-url.netls/?MlVfiVlS</script>

12 When the customer browses 28 processes the transaction form at step 42, it 13 requests a script file from the source URL: https://www.example-url.net/s/?MIVtM.
14 At step 44, the customer web browses 28 requests the MDC script by way of the HTTP protocol. The HTTP request includes the merchant JID MMM, the user agent 16 (browses version), the IP address of the customer's HTTP proxy, and any HTTP cookies 17 previously sent to the customer by www.example-url.net. Upon receiving this 18 information, the archive service 16 records this information in a machine data record 19 which also includes the transaction 1D.
2 0 Upon receiving the file request, the archive service 16 generates a unique 21 transaction m (represented below as ZZZ) at step 46 to be associated with the transaction 1 and the machine parameter set. An exemplary transaction m is a string of 24 letters and 2 digits. The first eight digits form a time.stamp.which is a hexadecimal representation of 3 the seconds elapsed since midnight January 1, 1970 T1TC (coordinated universal time).
4 In the preferred embodiment of the process 1, the MDC script is written in an ECMAScript compliant language, such as JavaScript, JScript, or VBScript. A
JavaScript 6 version of the MDC script is as follows (linebreaks and indentations added for clarity):

8 document.write("<input name--transactionid type=hidden value=ZZZ>;

drew Date;

12 t=3600*d.getHours~+60*d.get112mutes0+d.getSeconds~;

14 document.write("<img height=1 width=1 src=https://www.example-url.net/t/?i ZZZ&t="+t+">");

17 document.write("<applet height=1 width=1 18 codebase=https://www. example-url.net/
19 code=a/?ZZZ>
2 0 <param name--i value=ZZZ></applet>");

1 The exemplary MDC script includes the unique transaction 1D value in several 2 places. When the script executes on the customer computer 20, it writes HT1VII, code into 3 the merchant's order form. Specifically:
4 1). The script adds a hidden variable called "transactionid" to the merchant's transaction form and assigns it the value of the transaction ID (ZZZ). When the 6 transaction form is submitted, the merchant receives the transaction D7. and can associate 7 it with the transaction data record.
8 2) The script computes the seconds elapsed since midnight on the clock 32 9 and writes a request for a 1 pixel by 1 pixel image. Included in the request is the transaction ID and the time value. When the request executes, this data is sent back to the 11 archive service 16 and recorded with .the transaction ID in the MDAS
archive 17.
12 3) The script adds a request for a program located at the archive, service web.
13 site 16 which, in this example, is a Java applet. The applet downloads to the customer 14 computer 20 from the archive service 16 and executes, appearing as a 1 pixel by 1 pixel image on the transaction form. The transaction ID is passed to the program as a 16 parameter specified in the script. The program performs three tasks:
17 a) it calculates TTT, the seconds elapsed since midnight on the system clock 18 32;
19 b) it calculates AAA, the address of the customer 20 on its own local area 2 0 network 24; and 1 c) it sends this data back to the archive service 16 via TCP/IP, by requesting 2 the following URL:
3 http://www.example-url.net/d/?i ZZZ&t=TTT&a=AAA
4 The archive service 16 receives the message which includes the parameters TTT, AAA, and ZZZ. The message also includes the IP address of the sender. This address is 6 the customer's actual IP address, which in some cases is different from the HTTP proxy IP
7 address. The archive service 16 records this information in the MDAS archive 17 and 8 associates it with the transaction m ZZZ.
9 The machine data collection and archiving process 1 of the present invention has been described with a particular application in fraud detection. However, it is foreseen 11 that the techniques of the present invention have a wider application, as for marketing or 12 computer support purposes; or other functions. While the process 1 has been described 13 with reference to the Internet 4 or world wide web, it is also conceivable that the process 1 14 could be employed on computer networks of less than global expanse, such as a large intranet, a national or regional network, or the like.
16 Therefore, it is to be understood that while certain forms of the present invention 17 have been illustrated and described herein, the present invention is not intended to be 18 limited to the specific forms, arrangement of parts, sequence of steps, or particular 19 applications described and shown.

Claims (26)

1. A process for collecting machine identifying information associated with a digital online access device used for substantially anonymously accessing a host computer system over a digital network, said host computer system generating an interaction record of an access therewith by said access device, and said process comprising the steps of:
(a) capturing a machine identifying profile parameter upon said access device accessing said host computer system;
(b) generating a unique interaction identification string upon said access device accessing said host computer system;
(c) associating said interaction identification string with said profile parameter;
and (d) associating said interaction identification string with said interaction record generated upon said access device accessing said host computer system.
2. A process as set forth in Claim 1 wherein said capturing step includes the step of (a) capturing a digital address of said access device on said digital network.
3. A process as set forth in Claim 1 wherein said capturing step includes the step of (a) capturing a configuration setting of said access device.
4. A process as set forth in Claim 1 and including the steps of:
(a) communicating a self-identification routine to said access device upon said access device accessing said host computer system;
(b) said access device executing said self-identification routine;
(c) said self identification routine querying a configuration setting of said access device to derive said profile parameter; and (d) said self identification routine communicating said profile parameter to a remote location for association with said interaction identification string.
5. A process as set forth in Claim 1 and including the steps of:
(a) said host system operating a host web site including an interaction page generated by interaction page code processed by said access device upon accessing said host web site; and (b) coding, within said interaction page code, a self-identification routine which causes said access device to communicate said profile parameter when said access device processes said interaction page code.
6. A process as set forth in Claim 3 and including the step of:
(a) coding said self-identification routine in such a manner that said profile parameter and said interaction identification string are communicated to a third party web site at which said profile parameter and said interaction identification string are stored.
7. A process for identifying a customer computer involved in an online transaction between a customer using a customer browser operating on said customer computer and a merchant operating a merchant web site, said method comprising the steps of:
(a) capturing a customer computer profile parameter upon said customer computer accessing said merchant web site;
(b) generating a transaction identification string and associating said string with said parameter;
(c) storing said parameter and said string in a machine data archive;
(d) upon said customer completing a transaction through said merchant web site, storing said transaction identification string with a transaction record formed during said transaction to thereby associate said parameter with said transaction record through said string.
8. A process as set forth in Claim 7 wherein said capturing step includes the step of (a) capturing an IP address of said customer computer.
9. A process as set forth in Claim 7 wherein said capturing step includes the step of (a) capturing a configuration setting of said customer computer.
10. A process as set forth in Claim 7 and including the step of (a) communicating said profile parameter and said transaction identification string to a third party web site for storage.
11. A process as set forth in Claim 7 and including the step of (a) causing said customer computer to communicate said profile parameter and said transaction identification string to a third party web site for storage.
12. A process as set forth in Claim 7 and including the steps of (a) communicating a self identification routine to said customer computer upon said customer computer accessing said merchant web site;
(b) said customer computer executing said self identification routine;
(c) said self-identification routine querying a configuration setting of said customer computer to derive said profile parameter; and (d) said self-identification routine communicating said profile parameter to a remote location for association with said interaction identification string.
13. A process as set forth in Claim 12 and including the step of:
(a) coding said self-identification routine in such a manner that said profile parameter and said interaction identification string are communicated to a third party web site at which said profile parameter and said interaction identification string are stored.
14. A process as set forth in Claim 12 wherein said querying step includes the steps of:
(a) querying said customer browser for a plurality of configuration settings;
(b) forming an attribute string from said plurality of configuration settings;
and (c) processing said attribute string to form said profile parameter of said customer computer.
15. A process as set forth in Claim 12 wherein said customer computer potentially accesses said merchant web site by way of a proxy, and said communicating step includes the steps of:
(a) communicating said profile parameter and said transaction identification string to said remote web site using a protocol which bypasses said proxy.
16. A process for identifying a customer computer involved in an online transaction through a merchant web site between a customer using a customer browser operating on said customer computer and a merchant who operates said web site, said method comprising the steps of:
(a) coding a script request within a transaction form of said merchant web site;
(b) processing said script request by said customer browser upon accessing said merchant web site to thereby communicate to an archiver web site of a machine data archiving service an electronic request for a machine data collection script;
(c) said archiver web site returning said script to said customer browser along with a unique transaction identification string;
(d) said customer browser processing said script to thereby cause said script to query said customer computer for a profile parameter of said customer computer;
(e) said script causing said customer browser to communicate said profile parameter and said transaction identification string to said archiver web site;
(f) said archiver web site storing said profile parameter and said transaction identification string in a machine data profile;
(g) said script causing said customer browser to write said transaction identification string into said transaction form; and (h) upon said customer adding customer identification information to said transaction form and electronically submitting said transaction form to said merchant web site to thereby comprise a transaction record, said transaction identification string associating said transaction record with said machine data profile.
17. A process as set forth in Claim 16 and including the steps of (a) said script causing said computer browser to communicate said profile parameter and said transaction identification string along with a conventional hypertext transfer protocol (HTTP) header; and (b) said archiver service additionally storing said HTTP header in association with said machine data profile.
18. A process as set forth in Claim 16 and including the step of:
(a) said script querying said customer browser for a configuration setting thereof.
19. A process as set forth in Claim 1f and including the steps of (a) said script querying said customer browser for a plurality of configuration settings;
(b) said script forming an attribute string from said plurality of configuration settings; and (c) said script processing said attribute string to form said profile parameter of said customer computer.
20. A process as set forth in Claim 19 wherein said script processing step includes the step of:
(a) said script performing a hashing function on said attribute string to form said profile parameter.
21. A process as set forth in Claim 16 wherein said customer computer potentially accesses said merchant web site by way of a proxy, and including the step of (a) said script communicating said profile parameter and said transaction identification string to said archiver service web site using a,protocol which bypasses said proxy.
22. A process as set forth in Claim 16 and including the step of (a) said script communicating said profile parameter to said archiver service web site using a protocol other than HTTP.
23. A process as set forth in Claim 16 wherein said customer computer includes a digital clock, and including the steps of:

(a) said script causing said customer browser to query said clock for a time value; aid (b) said script causing said customer browser to send said time value to said archiver service web site along with said profile parameter.
24. A process for identifying a customer computer involved in an online transaction through a merchant web site between a customer using a customer browser operating on said customer computer and a merchant who operates said web site;
said method comprising the steps of:
(a) coding a script request within a transaction form of said merchant web site;
(b) processing said script request by said customer browser upon accessing said merchant web site to thereby communicate to an archiver web site of a machine data archiving service an electronic request for a machine data collection script;
(c) said archiver web site returning said script to said customer browser along with a unique transaction identification string;
(d) said customer browser processing said script to thereby cause said script to:
(1) query said customer browser for a plurality of configuration settings;
(2) form an attribute string from said plurality of configuration settings;

(3) perform a hashing function on said attribute string to form said profile parameter; and (4) query an internal digital clock of said customer computer for a current time value;
(e) said script causing said customer browser to communicate said profile parameter, said time value, and said transaction identification string to said archiver web site along with a conventional HTTP header;
(f) said archiver web site storing said profile parameter, said time value, and said transaction identification string in a machine data profile;
(g) said script causing said customer browser to write said transaction identification string into said transaction form; and (h) upon said customer adding customer identification information to said transaction form and electronically submitting said transaction form to said merchant web site to thereby comprise a transaction record, said transaction identification string associating said transaction record with said machine data profile.
25. A process as set forth in Claim 24 wherein said customer computer potentially accesses said merchant web site by way of a proxy, and including the steps of (a) said script querying said customer computer for a second profile parameter;
and (b) said script communicating said second profile parameter and said transaction identification string to said archiver service web site using a protocol which bypasses said proxy.
26. A process as set forth in Claim 25 and including the step of (a) said script communicating said second profile parameter to said archiver service web site using a protocol other than HTTP.
CA2411034A 2000-06-07 2001-06-05 Online machine data collection and archiving process Expired - Lifetime CA2411034C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CA2960857A CA2960857C (en) 2000-06-07 2001-06-05 Online machine data collection and archiving process

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US20993600P 2000-06-07 2000-06-07
US60/209,936 2000-06-07
PCT/US2001/018076 WO2001097134A1 (en) 2000-06-07 2001-06-05 Online machine data collection and archiving process

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CA2960857A Division CA2960857C (en) 2000-06-07 2001-06-05 Online machine data collection and archiving process

Publications (2)

Publication Number Publication Date
CA2411034A1 true CA2411034A1 (en) 2001-12-20
CA2411034C CA2411034C (en) 2017-05-02

Family

ID=22780938

Family Applications (2)

Application Number Title Priority Date Filing Date
CA2960857A Expired - Lifetime CA2960857C (en) 2000-06-07 2001-06-05 Online machine data collection and archiving process
CA2411034A Expired - Lifetime CA2411034C (en) 2000-06-07 2001-06-05 Online machine data collection and archiving process

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CA2960857A Expired - Lifetime CA2960857C (en) 2000-06-07 2001-06-05 Online machine data collection and archiving process

Country Status (5)

Country Link
US (8) US7330871B2 (en)
EP (1) EP1305753A4 (en)
AU (1) AU2001275217A1 (en)
CA (2) CA2960857C (en)
WO (1) WO2001097134A1 (en)

Families Citing this family (157)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8538801B2 (en) 1999-02-19 2013-09-17 Exxonmobile Research & Engineering Company System and method for processing financial transactions
AU2001275217A1 (en) * 2000-06-07 2001-12-24 Telecheck Services, Inc. Online machine data collection and archiving process
US7131571B2 (en) 2002-03-26 2006-11-07 First Data Corporation Alternative payment devices using electronic check processing as a payment mechanism
US7925576B2 (en) 2002-03-26 2011-04-12 First Data Corporation Systems for processing transponder-based transactions
US7139808B2 (en) * 2002-04-30 2006-11-21 Intel Corporation Method and apparatus for bandwidth-efficient and storage-efficient backups
US20030208603A1 (en) * 2002-05-02 2003-11-06 Eyal Manor System and method for initiating communication
US20110202565A1 (en) * 2002-12-31 2011-08-18 American Express Travel Related Services Company, Inc. Method and system for implementing and managing an enterprise identity management for distributed security in a computer system
US7143095B2 (en) * 2002-12-31 2006-11-28 American Express Travel Related Services Company, Inc. Method and system for implementing and managing an enterprise identity management for distributed security
US20040186912A1 (en) * 2003-03-20 2004-09-23 International Business Machines Corporation Method and system for transparently supporting digital signatures associated with web transactions
US7246740B2 (en) 2003-04-03 2007-07-24 First Data Corporation Suspicious persons database
US9412123B2 (en) 2003-07-01 2016-08-09 The 41St Parameter, Inc. Keystroke analysis
US7108174B2 (en) 2003-09-30 2006-09-19 First Data Corporation Systems and methods for detecting corporate financial transactions
US7731087B2 (en) 2003-09-30 2010-06-08 First Data Corporation Systems and methods for generating transaction receipts
US7631801B2 (en) 2003-09-30 2009-12-15 First Data Corporation Systems and methods for processing cash concentration disbursement transactions
US8462817B2 (en) 2003-10-15 2013-06-11 Qualcomm Incorporated Method, apparatus, and system for multiplexing protocol data units
US7070092B2 (en) 2003-10-27 2006-07-04 First Data Corporation Systems and methods for managing throughput of point of sale devices
US7118030B2 (en) 2003-10-27 2006-10-10 First Data Corporation Systems and methods for interfacing location-base devices
US7520420B2 (en) 2003-10-27 2009-04-21 First Data Corporation Systems and methods for generating receipts
US7287689B2 (en) 2003-12-09 2007-10-30 First Data Corporation Systems and methods for assessing the risk of a financial transaction using authenticating marks
US7783563B2 (en) 2003-12-09 2010-08-24 First Data Corporation Systems and methods for identifying payor location based on transaction data
US7398925B2 (en) 2003-12-09 2008-07-15 First Data Corporation Systems and methods for assessing the risk of a financial transaction using biometric information
US7743981B2 (en) 2003-12-23 2010-06-29 First Data Corporation GPS database to manage risk for financial transactions
US7100820B2 (en) 2003-12-23 2006-09-05 First Data Corporation Systems and methods for prioritizing reconcilement information searches
US7945494B2 (en) 2003-12-23 2011-05-17 First Data Corporation Device with GPS to manage risk for financial transactions
US6948656B2 (en) 2003-12-23 2005-09-27 First Data Corporation System with GPS to manage risk of financial transactions
US7853521B2 (en) 2003-12-23 2010-12-14 The Western Union Company Global positioning system to manage risk for POS terminal
US7640205B2 (en) 2003-12-23 2009-12-29 First Data Corporation Systems and methods for accessing reconcilement information
US20060010072A1 (en) * 2004-03-02 2006-01-12 Ori Eisen Method and system for identifying users and detecting fraud by use of the Internet
US7853533B2 (en) * 2004-03-02 2010-12-14 The 41St Parameter, Inc. Method and system for identifying users and detecting fraud by use of the internet
US10999298B2 (en) 2004-03-02 2021-05-04 The 41St Parameter, Inc. Method and system for identifying users and detecting fraud by use of the internet
US20050209955A1 (en) * 2004-03-16 2005-09-22 Underwood Timothy J Apparatus and method for document processing
US9203648B2 (en) * 2004-05-02 2015-12-01 Thomson Reuters Global Resources Online fraud solution
US7272728B2 (en) * 2004-06-14 2007-09-18 Iovation, Inc. Network security and fraud detection system and method
US20060248021A1 (en) * 2004-11-22 2006-11-02 Intelius Verification system using public records
WO2006110605A2 (en) * 2005-04-08 2006-10-19 American Express Travel Related Services Company, Inc. System and method for merchant acquisition data capture
WO2008147353A1 (en) * 2007-05-29 2008-12-04 Heffez Guy S Method and system for authenticating internet user indentity
US9727867B2 (en) 2005-04-26 2017-08-08 Guy Hefetz Method for detecting misuse of identity in electronic transactions
US9033225B2 (en) 2005-04-26 2015-05-19 Guy Hefetz Method and system for authenticating internet users
US10521786B2 (en) * 2005-04-26 2019-12-31 Spriv Llc Method of reducing fraud in on-line transactions
US11308477B2 (en) * 2005-04-26 2022-04-19 Spriv Llc Method of reducing fraud in on-line transactions
US10645072B2 (en) 2005-04-26 2020-05-05 Spriv Llc Method and system for validating transactions
US11818287B2 (en) 2017-10-19 2023-11-14 Spriv Llc Method and system for monitoring and validating electronic transactions
US8938671B2 (en) 2005-12-16 2015-01-20 The 41St Parameter, Inc. Methods and apparatus for securely displaying digital images
US11301585B2 (en) 2005-12-16 2022-04-12 The 41St Parameter, Inc. Methods and apparatus for securely displaying digital images
US7513418B2 (en) 2005-12-20 2009-04-07 First Data Corporation Systems and methods for performing a simplified risk assessment
US7392942B2 (en) 2005-12-20 2008-07-01 First Data Corporation Systems and methods for electronic transaction risk processing
US7937299B1 (en) 2005-12-29 2011-05-03 First Data Corporation Systems and methods for preauthorizing check transactions
US7661587B1 (en) 2005-12-29 2010-02-16 First Data Corporation Systems and methods for determining false MICR
US20070162524A1 (en) * 2006-01-11 2007-07-12 Yahoo! Inc. Network document management
US8151327B2 (en) 2006-03-31 2012-04-03 The 41St Parameter, Inc. Systems and methods for detection of session tampering and fraud prevention
US7818264B2 (en) * 2006-06-19 2010-10-19 Visa U.S.A. Inc. Track data encryption
US20080065446A1 (en) * 2006-08-25 2008-03-13 Microsoft Corporation Web collaboration in multiple languages
US8204982B2 (en) 2006-09-14 2012-06-19 Quova, Inc. System and method of middlebox detection and characterization
US20080126157A1 (en) * 2006-09-29 2008-05-29 Armand Rousso Systems, methods and apparatuses for importation and exportation transaction logistics facilitation
US8751815B2 (en) * 2006-10-25 2014-06-10 Iovation Inc. Creating and verifying globally unique device-specific identifiers
US8307099B1 (en) 2006-11-13 2012-11-06 Amazon Technologies, Inc. Identifying use of software applications
US8234252B2 (en) * 2006-12-01 2012-07-31 Chicago Mercantile Exchange Inc. Automated tracking and reporting of trader positions
US8161284B1 (en) * 2006-12-28 2012-04-17 Perftech, Inc. System, method and computer readable medium for message authentication to subscribers of an internet service provider
US20090089113A1 (en) * 2007-09-28 2009-04-02 Armand Rousso Systems, methods and apparatuses for importation and exportation procurement, logistics, and payment transaction facilitation
WO2008131435A1 (en) * 2007-04-23 2008-10-30 B2X Corporation Apparatuses, methods and systems for a trade business card
US11354667B2 (en) 2007-05-29 2022-06-07 Spriv Llc Method for internet user authentication
US10482081B2 (en) * 2007-06-04 2019-11-19 Bce Inc. Methods and systems for validating online transactions using location information
US8121942B2 (en) * 2007-06-25 2012-02-21 Visa U.S.A. Inc. Systems and methods for secure and transparent cardless transactions
US7739169B2 (en) * 2007-06-25 2010-06-15 Visa U.S.A. Inc. Restricting access to compromised account information
US9292850B2 (en) * 2007-09-10 2016-03-22 Visa U.S.A. Inc. Host capture
FI121906B (en) * 2007-09-17 2011-05-31 Goeran Mikael Bergholm Procedures, computer programs, transaction server and computer systems for processing transactions
US7958142B2 (en) * 2007-09-20 2011-06-07 Microsoft Corporation User profile aggregation
US8005786B2 (en) * 2007-09-20 2011-08-23 Microsoft Corporation Role-based user tracking in service usage
US9060012B2 (en) * 2007-09-26 2015-06-16 The 41St Parameter, Inc. Methods and apparatus for detecting fraud with time based computer tags
CA2689072C (en) * 2007-12-05 2018-01-09 Bce Inc. Methods and computer-readable media for facilitating forensic investigations of online transactions
US20090172033A1 (en) * 2007-12-28 2009-07-02 Bce Inc. Methods, systems and computer-readable media for facilitating forensic investigations of online activities
US9269059B2 (en) * 2008-03-25 2016-02-23 Qualcomm Incorporated Apparatus and methods for transport optimization for widget content delivery
US8312033B1 (en) 2008-06-26 2012-11-13 Experian Marketing Solutions, Inc. Systems and methods for providing an integrated identifier
US9390384B2 (en) * 2008-07-01 2016-07-12 The 41 St Parameter, Inc. Systems and methods of sharing information through a tagless device consortium
US8244799B1 (en) 2008-07-21 2012-08-14 Aol Inc. Client application fingerprinting based on analysis of client requests
US8090650B2 (en) * 2008-07-24 2012-01-03 At&T Intellectual Property I, L.P. Secure payment service and system for interactive voice response (IVR) systems
US7620580B1 (en) * 2008-07-31 2009-11-17 Branch Banking & Trust Company Method for online account opening
BRPI0921124A2 (en) 2008-11-06 2016-09-13 Visa Int Service Ass system for authenticating a consumer, computer implemented method, computer readable medium, and server computer.
US9112850B1 (en) 2009-03-25 2015-08-18 The 41St Parameter, Inc. Systems and methods of sharing information through a tag-based consortium
US20110078196A1 (en) * 2009-09-29 2011-03-31 Microsoft Corporation Rationed computer usage
US8381266B2 (en) * 2009-10-27 2013-02-19 Computer Associates Think, Inc. Method and system for machine identification
US20110153411A1 (en) * 2009-12-23 2011-06-23 Kenshoo Ltd. Method and system for identification of an online purchase without notification of making the purchase
US9356845B1 (en) * 2010-03-05 2016-05-31 Forbes Media Llc System and method for audience segment profiling and targeting
US9652802B1 (en) 2010-03-24 2017-05-16 Consumerinfo.Com, Inc. Indirect monitoring and reporting of a user's credit data
US11792314B2 (en) 2010-03-28 2023-10-17 Spriv Llc Methods for acquiring an internet user's consent to be located and for authenticating the location information
US8676684B2 (en) 2010-04-12 2014-03-18 Iovation Inc. System and method for evaluating risk in fraud prevention
RU2446459C1 (en) 2010-07-23 2012-03-27 Закрытое акционерное общество "Лаборатория Касперского" System and method for checking web resources for presence of malicious components
US10043180B2 (en) 2010-09-30 2018-08-07 The Western Union Company System and method for secure transactions at a mobile device
US9361597B2 (en) 2010-10-19 2016-06-07 The 41St Parameter, Inc. Variable risk engine
GB2485241A (en) * 2010-11-05 2012-05-09 Bluecava Inc Incremental browser-based fingerprinting of a computing device
US9147042B1 (en) 2010-11-22 2015-09-29 Experian Information Solutions, Inc. Systems and methods for data verification
US8555384B1 (en) * 2010-12-10 2013-10-08 Amazon Technologies, Inc. System and method for gathering data for detecting fraudulent transactions
US8817984B2 (en) 2011-02-03 2014-08-26 mSignia, Inc. Cryptographic security functions based on anticipated changes in dynamic minutiae
US11063920B2 (en) 2011-02-03 2021-07-13 mSignia, Inc. Cryptographic security functions based on anticipated changes in dynamic minutiae
US9235728B2 (en) 2011-02-18 2016-01-12 Csidentity Corporation System and methods for identifying compromised personally identifiable information on the internet
US9607336B1 (en) 2011-06-16 2017-03-28 Consumerinfo.Com, Inc. Providing credit inquiry alerts
EP2740058A4 (en) * 2011-08-03 2015-04-22 Amazon Tech Inc Gathering transaction data associated with locally stored data files
WO2013055952A2 (en) * 2011-10-11 2013-04-18 Huster Phyllis A An electronic commerce system
WO2013062713A1 (en) * 2011-10-28 2013-05-02 Visa International Service Association System and method for identity chaining
US11030562B1 (en) 2011-10-31 2021-06-08 Consumerinfo.Com, Inc. Pre-data breach monitoring
US10754913B2 (en) 2011-11-15 2020-08-25 Tapad, Inc. System and method for analyzing user device information
US10402844B1 (en) 2011-11-16 2019-09-03 Click Sales Inc. Post sale referral tracking
US9972023B1 (en) 2011-11-16 2018-05-15 Click Sales Inc. Cross device tracking of e-commerce sales
US9934310B2 (en) 2012-01-18 2018-04-03 International Business Machines Corporation Determining repeat website users via browser uniqueness tracking
US9633201B1 (en) 2012-03-01 2017-04-25 The 41St Parameter, Inc. Methods and systems for fraud containment
US9501777B1 (en) * 2012-03-06 2016-11-22 Boingo Wireless, Inc. Systems and methods for MAC address tracking for a mobile device
US9521551B2 (en) 2012-03-22 2016-12-13 The 41St Parameter, Inc. Methods and systems for persistent cross-application mobile device identification
US20140122223A1 (en) * 2012-07-13 2014-05-01 Trueffect, Inc. Enhanced adserving metric determination
EP2880619A1 (en) 2012-08-02 2015-06-10 The 41st Parameter, Inc. Systems and methods for accessing records via derivative locators
WO2014078569A1 (en) 2012-11-14 2014-05-22 The 41St Parameter, Inc. Systems and methods of global identification
US8812387B1 (en) 2013-03-14 2014-08-19 Csidentity Corporation System and method for identifying related credit inquiries
US9280658B2 (en) * 2013-03-15 2016-03-08 Stephen Coggeshall System and method for systematic detection of fraud rings
US10664936B2 (en) 2013-03-15 2020-05-26 Csidentity Corporation Authentication systems and methods for on-demand products
US9633322B1 (en) 2013-03-15 2017-04-25 Consumerinfo.Com, Inc. Adjustment of knowledge-based authentication
US9721147B1 (en) 2013-05-23 2017-08-01 Consumerinfo.Com, Inc. Digital identity
US9705895B1 (en) * 2013-07-05 2017-07-11 Dcs7, Llc System and methods for classifying internet devices as hostile or benign
US9807092B1 (en) 2013-07-05 2017-10-31 Dcs7, Llc Systems and methods for classification of internet devices as hostile or benign
RU2016109340A (en) * 2013-08-21 2017-09-28 Общество с ограниченной ответственностью "Мэйл.Ру" METHOD AND SYSTEM FOR DETECTING A PROXY SERVER AND A COMPUTER MEDIA WITH A SET OF COMMANDS FOR PERFORMING A METHOD USING A SYSTEM
US10902327B1 (en) 2013-08-30 2021-01-26 The 41St Parameter, Inc. System and method for device identification and uniqueness
US9491249B2 (en) * 2013-10-25 2016-11-08 Dorin ROSENSHINE Integrating offsite activities related to chat and text messaging with online data records
US10733618B2 (en) * 2014-01-28 2020-08-04 Mastercard International Incorporated Systems and methods for determining and analyzing characteristics of devices used in payment transactions
US9510204B2 (en) 2014-02-28 2016-11-29 Life360, Inc. Apparatus and method of determining fraudulent use of a mobile device based on behavioral abnormality
US10373240B1 (en) 2014-04-25 2019-08-06 Csidentity Corporation Systems, methods and computer-program products for eligibility verification
US20150317653A1 (en) * 2014-04-30 2015-11-05 International Business Machines Corporation Omni-channel demand modeling and price optimization
US10091312B1 (en) 2014-10-14 2018-10-02 The 41St Parameter, Inc. Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
US10134058B2 (en) * 2014-10-27 2018-11-20 Amobee, Inc. Methods and apparatus for identifying unique users for on-line advertising
US10339527B1 (en) 2014-10-31 2019-07-02 Experian Information Solutions, Inc. System and architecture for electronic fraud detection
US10163130B2 (en) 2014-11-24 2018-12-25 Amobee, Inc. Methods and apparatus for identifying a cookie-less user
US9954962B2 (en) 2015-02-06 2018-04-24 Bank Of America Corporation Serving anonymous cookies associated with purchasing analytics
MD956Z (en) * 2015-02-17 2016-04-30 Общество С Ограниченной Собственностью "Siguranta Tranzactii" Method for offence prevention at the request of providing services by means of the Internet network
US9887591B2 (en) 2015-05-13 2018-02-06 International Business Machines Corporation Electric ring with external power source
US11151468B1 (en) 2015-07-02 2021-10-19 Experian Information Solutions, Inc. Behavior analysis using distributed representations of event data
US9973521B2 (en) 2015-12-28 2018-05-15 International Business Machines Corporation System and method for field extraction of data contained within a log stream
US20170374076A1 (en) * 2016-06-28 2017-12-28 Viewpost Ip Holdings, Llc Systems and methods for detecting fraudulent system activity
US10558975B2 (en) 2016-08-17 2020-02-11 Mastercard International Incorporated Systems and methods for use in facilitating transactions
US10263971B2 (en) * 2016-08-31 2019-04-16 Bank Of America Corporation Preventing unauthorized access to secured information systems by injecting device data collectors
US10984420B2 (en) 2017-03-15 2021-04-20 Sujay Abhay Phadke Transaction device
US10430792B2 (en) 2017-03-15 2019-10-01 Sujay Abhay Phadke Transaction device
US10692062B2 (en) * 2017-04-28 2020-06-23 Ncr Corporation Auto lookup for a self-service terminal (SST) network
WO2019006272A1 (en) 2017-06-30 2019-01-03 Equifax Inc. Detecting synthetic online entities facilitated by primary entities
US10699028B1 (en) 2017-09-28 2020-06-30 Csidentity Corporation Identity security architecture systems and methods
US10931534B2 (en) * 2017-10-31 2021-02-23 Cisco Technology, Inc. Auto discovery of network proxies
US10896472B1 (en) 2017-11-14 2021-01-19 Csidentity Corporation Security and identity verification system and architecture
US20190294820A1 (en) * 2018-03-20 2019-09-26 Entit Software Llc Converting plaintext values to pseudonyms using a hash function
US10911234B2 (en) 2018-06-22 2021-02-02 Experian Information Solutions, Inc. System and method for a token gateway environment
KR20200034020A (en) 2018-09-12 2020-03-31 삼성전자주식회사 Electronic apparatus and control method thereof
US11164206B2 (en) * 2018-11-16 2021-11-02 Comenity Llc Automatically aggregating, evaluating, and providing a contextually relevant offer
EP3935598A4 (en) * 2019-03-05 2022-11-30 Stash Financial, Inc. Stock rewards in consumer transactions
US11190603B2 (en) 2019-03-15 2021-11-30 International Business Machines Corporation Intelligent sampling of data generated from usage of interactive digital properties
US11170353B2 (en) 2019-05-01 2021-11-09 Mastercard International Incorporated Systems and methods for automatic bill enrollment
US11095735B2 (en) 2019-08-06 2021-08-17 Tealium Inc. Configuration of event data communication in computer networks
US11941065B1 (en) 2019-09-13 2024-03-26 Experian Information Solutions, Inc. Single identifier platform for storing entity data
US11146656B2 (en) 2019-12-20 2021-10-12 Tealium Inc. Feature activation control and data prefetching with network-connected mobile devices
US11593085B1 (en) 2020-02-03 2023-02-28 Rapid7, Inc. Delta data collection technique for machine assessment
US11954218B2 (en) 2020-02-10 2024-04-09 Visa International Service Association Real-time access rules using aggregation of periodic historical outcomes
US11886413B1 (en) 2020-07-22 2024-01-30 Rapid7, Inc. Time-sliced approximate data structure for storing group statistics
KR20240017337A (en) * 2021-03-07 2024-02-07 블루스택 시스템즈 인코포레이티드 Conversion event tracking and attribution methods, systems and computer program products

Family Cites Families (43)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5175682A (en) * 1990-12-14 1992-12-29 Verifone, Inc. Check system and method including prioritizing checks for transmission to banks for processing
AU5538494A (en) * 1992-10-30 1994-05-24 Microbilt Corporation Multi-reader transaction terminal
US5563946A (en) * 1994-04-25 1996-10-08 International Business Machines Corporation Method and apparatus for enabling trial period use of software products: method and apparatus for passing encrypted files between data processing systems
US5679938A (en) * 1994-12-02 1997-10-21 Telecheck International, Inc. Methods and systems for interactive check authorizations
US5703950A (en) * 1995-06-30 1997-12-30 Intermec Corporation Method and apparatus for controlling country specific frequency allocation
US6117011A (en) * 1995-07-27 2000-09-12 Lvov; Denis Ernestovich Electronic game system, method of managing and regulating said system
US5845267A (en) * 1996-09-06 1998-12-01 At&T Corp System and method for billing for transactions conducted over the internet from within an intranet
US5872844A (en) * 1996-11-18 1999-02-16 Microsoft Corporation System and method for detecting fraudulent expenditure of transferable electronic assets
US5848412A (en) * 1996-11-19 1998-12-08 Ncr Corporation User controlled browser identification disclosing mechanism
US5903721A (en) * 1997-03-13 1999-05-11 cha|Technologies Services, Inc. Method and system for secure online transaction processing
US5930777A (en) * 1997-04-15 1999-07-27 Barber; Timothy P. Method of charging for pay-per-access information over a network
US6134597A (en) * 1997-05-28 2000-10-17 International Business Machines Corporation CRC hash compressed server object identifier
US5991758A (en) * 1997-06-06 1999-11-23 Madison Information Technologies, Inc. System and method for indexing information about entities from different information sources
US6097834A (en) * 1997-06-13 2000-08-01 Paystation America Inc. Financial transaction processing systems and methods
US5899980A (en) * 1997-08-11 1999-05-04 Trivnet Ltd. Retail method over a wide area network
US6000832A (en) * 1997-09-24 1999-12-14 Microsoft Corporation Electronic online commerce card with customer generated transaction proxy number for online transactions
US7555460B1 (en) * 2000-06-05 2009-06-30 Diversinet Corp. Payment system and method using tokens
US6263447B1 (en) * 1998-05-21 2001-07-17 Equifax Inc. System and method for authentication of network users
US6254000B1 (en) * 1998-11-13 2001-07-03 First Data Corporation System and method for providing a card transaction authorization fraud warning
US6418472B1 (en) * 1999-01-19 2002-07-09 Intel Corporation System and method for using internet based caller ID for controlling access to an object stored in a computer
US6444616B1 (en) * 1999-02-02 2002-09-03 Bayer Aktiengesellschaft Substituted p-trifluoromethylphenyluracils
US6697948B1 (en) * 1999-05-05 2004-02-24 Michael O. Rabin Methods and apparatus for protecting information
CN1347537A (en) 1999-07-30 2002-05-01 恩里克·戴维·桑乔 System and method for secure network purchasing
US7885899B1 (en) 2000-02-08 2011-02-08 Ipass Inc. System and method for secure network purchasing
US7366702B2 (en) * 1999-07-30 2008-04-29 Ipass Inc. System and method for secure network purchasing
US6853987B1 (en) * 1999-10-27 2005-02-08 Zixit Corporation Centralized authorization and fraud-prevention system for network-based transactions
US6535916B1 (en) * 1999-10-28 2003-03-18 International Business Machines Corporation Systems, methods and computer program products for linking transactions by multiple web site servers to web site visitors
WO2001037180A1 (en) 1999-11-19 2001-05-25 Ecognito, Inc. System, method, and computer program product for maintaining consumer privacy and security in electronic commerce transactions
WO2001045008A1 (en) * 1999-12-16 2001-06-21 Debit.Net, Inc. Secure networked transaction system
US7366695B1 (en) * 2000-02-29 2008-04-29 First Data Corporation Electronic purchase method and funds transfer system
US20020152305A1 (en) * 2000-03-03 2002-10-17 Jackson Gregory J. Systems and methods for resource utilization analysis in information management environments
EP1132797A3 (en) * 2000-03-08 2005-11-23 Aurora Wireless Technologies, Ltd. Method for securing user identification in on-line transaction systems
DK1136961T3 (en) * 2000-03-24 2004-06-28 Mobipay International S A Real-time remote payments and transactions using a mobile phone
US7263506B2 (en) * 2000-04-06 2007-08-28 Fair Isaac Corporation Identification and management of fraudulent credit/debit card purchases at merchant ecommerce sites
US20020013765A1 (en) * 2000-05-23 2002-01-31 Gil Shwartz Intrinsic authorization for electronic transactions
EP1290533A2 (en) * 2000-05-25 2003-03-12 Echarge Corporation Secure transaction protocol
AU2001275217A1 (en) * 2000-06-07 2001-12-24 Telecheck Services, Inc. Online machine data collection and archiving process
US7359869B1 (en) * 2000-07-14 2008-04-15 Stamps.Com, Inc. Method and system for facilitating secure electronic transactions with multiple merchants
US7720959B2 (en) * 2000-10-17 2010-05-18 Avaya Inc. Method and apparatus for characterizing the quality of a network path
US7499889B2 (en) * 2000-10-23 2009-03-03 Cyota Inc. Transaction system
US20020091646A1 (en) * 2000-11-03 2002-07-11 Lake Lawrence L. Method and system for verifying the identity of on-line credit card purchasers through a proxy transaction
US8032317B2 (en) * 2008-05-15 2011-10-04 The Nielsen Company (Us), Llc System and methods for metering and analyzing energy consumption of events within a portable device
US8938721B2 (en) * 2010-07-21 2015-01-20 Microsoft Corporation Measuring actual end user performance and availability of web applications

Also Published As

Publication number Publication date
US10037529B2 (en) 2018-07-31
US7937467B2 (en) 2011-05-03
US20020035622A1 (en) 2002-03-21
US20150193769A1 (en) 2015-07-09
US20110218877A1 (en) 2011-09-08
AU2001275217A1 (en) 2001-12-24
CA2960857A1 (en) 2001-12-20
US8539070B2 (en) 2013-09-17
US8799458B2 (en) 2014-08-05
US20110218860A1 (en) 2011-09-08
WO2001097134A1 (en) 2001-12-20
EP1305753A1 (en) 2003-05-02
US7330871B2 (en) 2008-02-12
US20180300719A1 (en) 2018-10-18
US20110218856A1 (en) 2011-09-08
US8150968B2 (en) 2012-04-03
US20080133420A1 (en) 2008-06-05
US10679216B2 (en) 2020-06-09
CA2960857C (en) 2019-07-09
CA2411034C (en) 2017-05-02
US20100036749A1 (en) 2010-02-11
EP1305753A4 (en) 2010-07-14

Similar Documents

Publication Publication Date Title
US10679216B2 (en) Online machine data collection and archiving process
US11373156B2 (en) Method, system, and computer readable storage medium for alternative email-based website checkouts
US6601047B2 (en) Image-based digital evidence system and associated method
JP5638046B2 (en) Method and system for authorizing purchases made on a computer network
JP5439322B2 (en) Method and apparatus for conducting electronic transactions
US20120253978A1 (en) Methods and apparatus for conducting electronic transactions
US8392266B2 (en) System and method for certifying information relating to transactions between a seller and a purchaser
EP1120732A2 (en) Method and system for tracking screen activities in online transactions
US20160180334A1 (en) Email address token integration
KR20090000792A (en) System and method for confirming real name in non-facing and program recording medium
EP2323093A1 (en) System and method for certifying information relating to transactions between a seller and a purchaser
KR101223477B1 (en) Method for Providing Loan Service with Blog(or Web-Site) Manager and Recording Medium
CA2390714A1 (en) Method and apparatus for facilitating electronic commerce via an itemized statement
Coman E-Commerce–a New World-Wide Commerce
KR20090093275A (en) System and Method for Providing Interface with Financial Card Combined Student Card Issue and Recording Medium
KR20100125490A (en) Method for managing blog(or web-site) account and recording medium
KR20100061943A (en) Method for providing user-interface and recording medium

Legal Events

Date Code Title Description
EEER Examination request
MKEX Expiry

Effective date: 20210607