`US006029154Cl
`c12) EX PARTE REEXAMINATION CERTIFICATE (6342nd)
`United States Patent
`US 6,029,154 Cl
`c1o) Number:
`Pettitt
`(45) Certificate Issued:
`Aug. 5, 2008
`
`111111
`
`(54) METHOD AND SYSTEM FOR DETECTING
`FRAUD IN A CREDIT CARD TRANSACTION
`OVER THE INTERNET
`
`(75)
`
`Inventor: John Philip Pettitt, Los Altos, CA (US)
`
`(73) Assignee: Cybersource Corporation, Mt. View,
`CA (US)
`
`Reexamination Request:
`No. 90/007,268, Oct. 26, 2004
`
`Reexamination Certificate for:
`6,029,154
`Patent No.:
`Feb. 22, 2000
`Issued:
`08/901,687
`Appl. No.:
`Jul. 28, 1997
`Filed:
`
`(51)
`
`Int. Cl.
`G06Q 40100
`G06Q 20100
`
`(2006.01)
`(2006.01)
`
`4,897,811 A
`4,949,257 A
`4,958,375 A
`5,175,682 A
`5,177,342 A
`5,206,488 A
`5,245,657 A
`5,291,550 A
`5,305,195 A
`5,311,594 A
`5,335,265 A
`5,336,870 A
`
`111990 Scofield
`8/1990 Orbach
`9/1990 Reilly
`12/1992 Higashiyama et a!.
`111993 Adams
`4/1993 Teicher
`9/1993 Sakurai
`3/1994 Levy eta!.
`4/1994 Murphy
`5/1994 Penzias
`8/1994 Cooper et al.
`8/1994 Hughes eta!.
`
`(Continued)
`
`FOREIGN PATENT DOCUMENTS
`
`EP
`EP
`EP
`wo
`wo
`wo
`wo
`
`0418144 A1
`1081665 A1
`0468229 A2
`wo 94/06103
`W0-96/31043
`W097/00483 A1
`WO 98/54667 A1
`
`3/1991
`3/1991
`7/1991
`3/1994
`10/1996
`111997
`12/1998
`
`(52) U.S. Cl. .............................. 705/44; 705/38; 705/39;
`705/79
`(58) Field of Classification Search ........................ None
`See application file for complete search history.
`
`(56)
`
`References Cited
`
`OTHER PUBLICATIONS
`
`Alfuraih, S., eta!. "Using Trusted Email to Prevent Credit
`Card Frauds in Multimedia Products", World Wide Web
`Internet and Web Information Systems, 5, 2002, pp.
`245-256.
`
`U.S. PATENT DOCUMENTS
`
`(Continued)
`
`3,657,702 A
`3,950,733 A
`4,044,243 A
`4,254,474 A
`RE30,579 E
`RE30,580 E
`4,326,259 A
`4,485,300 A
`4,510,382 A
`4,528,643 A
`4,734,858 A
`4,755,935 A
`4,760,604 A
`4,792,968 A
`4,845,739 A
`4,893,330 A
`
`4/1972 Stephenson, Jr.
`4/1976 Cooper et al.
`8/1977 Cooper et al.
`3/1981 Cooper et al.
`4/1981 Goldman et al.
`4/1981 Goldman et al.
`4/1982 Cooper et al.
`1111984 Peirce
`4/1985 Walter
`7/1985 Freeny, Jr.
`3/1988 Schlafly
`7/1988 Davis et al.
`7/1988 Cooper et al.
`12/1988 Katz
`7/1989 Katz
`111990 Franco
`
`Primary Examiner-Jeanne M Clark
`
`(57)
`
`ABSTRACT
`
`A method and system for detecting fraud in a credit card
`transaction between consumer and a merchant over the Inter(cid:173)
`net. The method and system comprises obtaining credit card
`information relating to the transaction from the consumer;
`and verifYing the credit card information based upon a vari(cid:173)
`ety of parameters. The variety of parameters are weighted so
`as to provide a merchant with a quantifiable indication of
`whether the credit card transaction is fraudulent. In so doing,
`an integrated verification system is provided which allows a
`merchant, or the like, to accurately and efficiently determine
`the validity of the transaction over the Internet.
`
`DETERMINE TRANSACTIONS
`PROCESSED UTILIZING
`INTERNET ADDRESS
`
`1-- 302
`
`CONSTRUCT MAP BASED
`UPON TRANSACTIONS
`
`1-- 304
`
`USED MAPPED TRANSACTIONS
`TO DETERMINE IF A NEW CREDIT
`CARD TRANSACTION IS VALID
`
`. / 306
`
`Ex. 1017 - 1/4
`
`
`
`US 6,029,154 Cl
`Page 2
`
`U.S. PATENT DOCUMENTS
`
`8/1994 Stringer eta!.
`5,341,429 A
`9/1994 Filepp eta!.
`5,347,632 A
`9/1994 Bullock eta!.
`5,351,186 A
`9/1994 Michener eta!.
`5,351,293 A
`9/1994 Sullivan
`5,351,296 A
`5,386,104 A
`111995 Sime
`3/1995 Levey
`5,398,300 A
`5/1995 Hershey eta!.
`5,414,833 A
`5/1995 Chasek
`5,420,405 A
`7/1995 Armbrust eta!.
`5,436,971 A
`1111995 Means eta!.
`5,471,627 A
`2/1996 Rangachar
`5,495,521 A
`3/1996 Langhans eta!.
`5,500,513 A
`4/1996 Atkinson
`5,511,122 A
`5/1996 Aiello eta!.
`5,515,307 A
`6/1996 Bickham eta!.
`5,530,438 A
`9/1996 Rosen
`5,557,518 A
`5,596,642 A
`111997 Davis et al.
`2/1997 Holloway
`5,604,802 A
`3/1997 Aiello eta!.
`5,608,801 A
`4/1997 Jones et al.
`5,623,547 A
`5/1997 Bowman
`5,627,886 A
`5/1997 Shear
`5,627,972 A
`5/1997 Micali
`5,629,982 A
`9/1997 Rosen
`5,671,280 A
`12/1997 Glier eta!.
`5,701,398 A
`12/1997 Rosen
`5,703,949 A
`111998 Blonder eta!.
`5,708,422 A
`111998 Chelliah eta!.
`5,710,887 A
`2/1998 Payne et al.
`5,715,314 A
`3/1998 Gifford
`5,724,424 A
`3/1998 Klingman
`5,729,594 A
`4/1998 Titan
`5,745,654 A
`8/1998 Fawcett eta!.
`5,790,645 A
`9/1998 Manasse
`5,802,497 A
`9/1998 Moller eta!.
`5,805,686 A
`9/1998 Sirbu eta!.
`5,809,144 A
`9/1998 Williams eta!.
`5,815,657 A
`10/1998 Gopinathan eta!.
`5,819,226 A
`10/1998 Ogram
`5,822,737 A
`12/1998 Muftic
`5,850,442 A
`2/1999 Boesch et al.
`5,870,473 A
`2/1999 Jankowitz eta!.
`5,875,236 A
`3/1999 Rosen
`5,878,139 A
`3/1999 Joao et al.
`5,878,337 A
`3/1999 Anderson eta!.
`5,884,289 A
`4/1999 Boesch et al.
`5,897,621 A
`5/1999 Wilfetal.
`5,899,980 A
`10/1999 Asfar eta!.
`5,970,129 A
`10/1999 Scroggie eta!.
`5,970,469 A
`1111999 Chan eta!.
`5,995,604 A
`112000 Black eta!.
`6,012,042 A
`7/2000 Anderson eta!.
`6,094,643 A
`9/2000 Basch eta!.
`6,119,103 A
`10/2000 Jonas et al.
`6,137,792 A
`12/2000 Baulier et al.
`6,163,604 A
`10/2001 Storch et al.
`6,307,853 B1
`12/2001 Gopinathan eta!.
`6,330,546 B1
`3/2002 Ginter et al.
`6,363,488 B1
`5/2002 Ginter et al.
`6,389,402 B1
`6,393,016 B2
`5/2002 Wegner eta!.
`8/2002 Lazarus eta!.
`6,430,539 B1
`10/2002 Tebeka eta!.
`6,473,423 B1
`2/2003 Justice eta!.
`6,516,056 B1
`12/2003 Basch eta!.
`6,658,393 B1
`10/2001 Otto et a!.
`200110029496 A1
`OTHER PUBLICATIONS
`Clearcommerce Corporation "An e*guide to Cyberfraud",
`1999, pp. 1-9.
`
`Cybercash, "About CyberCash, Inc.", 2000, http"//www.cy(cid:173)
`bercash.com/company, CyberCash Company Information, 1
`page.
`Cybersource,
`"CyberSource Advanced Fraud Screen
`Enhanced by Visa," Implementation Guide, Simple Order
`API, Version 1.10, SCMP API, Jul. 2004, 102 pages.
`Cybersource Corporation, "Fraud Control System," cyber(cid:173)
`source.com, Copyright date 1996, 1 page.
`Cybersource, "Frequently Asked Questions-What is the
`danger of using credit cards over the internet?," Cyber(cid:173)
`Source.com, Copyright date 1997, 1 page.
`Cybersource, "Merchant Internet Commerce Services,"
`CyberSource.com Copyright date 1997, 1 page.
`Cybersource, "Cybersource Enhances Internet Fraud Screen
`to Combat Credit Card Fraud," cybersource.com, Jun. 4,
`2001, http;/ /www.cybersource.com/press_room/view.xm(cid:173)
`l?page_id=579, 2 pages.
`Cybersource, "CyberSource Introduces Credit Card Autho(cid:173)
`rization Service Enchanced with a Powerful Fraud Screen(cid:173)
`ing Tool," cybersource.com, Jan. 30, 2001, http:www.cyber(cid:173)
`source.com.press_room.view.xml?page_id=237, 2 pages.
`Datacash, "Payment card fraud checking service fore--com(cid:173)
`merce," http://www.datacash.com/security/tradescreening.
`html, printed Apr. 23, 2002, 2 pages.
`Ghosh eta!., "Credit card fraud detection with a neutral-net(cid:173)
`work", System Sciences, 1994, vol. iii: Informational sys(cid:173)
`tems: Decisio Support and Knowledge-Based Systems, Pro(cid:173)
`ceedings of the Twenty-Seventh Hawaii International
`Conference, pp. 621-630, Jan. 7.
`Hanagandi eta!., "Density-based clustering and radial basis
`function modeling to generate credit card fraud scores",
`Computational Intelligence for Financial Engineering, 1996;
`Proceedings of the IEEE/IAFE 1996 Conference.
`McCrea et a!., "The Internal Report" prepared by CSIRO for
`the Australian Taxation Office as part of the ATO's Elec(cid:173)
`tronic Commerce Project, Jun. 1997, extracted from Google
`datatbase on Internet on Oct. 18, 2002.
`Moeller, Michael, "New CyberSource of Information", PC
`Week, Nov. 20, 1995.
`Richardson, "Neural networks compared to statistical tech(cid:173)
`niques", Computational Intelligence for Financial Engineer(cid:173)
`ing, 1997; Proceedings of the IEEE/IAFE 1997, Mar. 24-25,
`1997, New York City Conference.
`Schoter, Dr. Andreas, et a!., Digital Money Online A Review
`of Some Existing Technologies, Feb. 1997, pp. 1-60, inter://
`trader.
`Techmall, "Meridien Launches New e*Payments Research
`Service IdentifYing Web Opportunies And Risk For Retailers
`And Financial Firms," http://www8/techmall.com/techdocs/
`TS991202-l.html, printed Apr. 23, 2002, 2 pages.
`"Telia puts IP at core of strategy: This Swedish Telco to
`install IP backbone to support Internet access, video-on-de(cid:173)
`mand, etc.," Communications Week International, Oct. 2,
`1995.
`Savetz and Sears, "FAQs: How Do I Use the Internet as a
`Telephone,"
`<http://itel.mit.edu/itel/docs/MISC/voice_
`faq.html> (Copyright 1995).
`Sears, Andrew, "Innovation in Internet Telephony: The Inter(cid:173)
`net as the Competitor to the POTS Network," Feb. 28, 1996,
`available at http://itel.mit.edu>.
`
`Ex. 1017 - 2/4
`
`
`
`US 6,029,154 Cl
`Page 3
`
`Solomon, Richard Jay, "Anything you can do, I can do bet(cid:173)
`ter; I can do anything better than you ... ," MIT Research Pro(cid:173)
`gram on Cummunication Policy, available at http://itel.
`mit.edul>, which states "Presented at the Columbia Institute
`of Tele-information' s The Impact of Cybercommunications
`on Telecommunications, Mar. 8, 1996."
`Sears, Andrew, "The Effect of Internet Telephony on the
`Long Distance Voice Market", Jan. 14, 1995
`("last
`Revised"), at 3 available at <http://itel.mit.edu>.
`"IDT Releases Net2Phone Commercial Version Three
`Months Ahead of Schedule," Aug. 5, 1996, available at
`<http:/ /web.archive.org/web/19971 012121312/http:/
`www.net2phone.com>.
`MICOM, "V/IP Phone/fax IP Gateway: Voice Interface
`Cards and PC Software," Nov. 14, 1996 ("Last Updated"),
`available at <http:/ /web.archive.org/web/19961111 024432/
`http:/www.micom.cornl>.
`("email:
`"John Pettitt"
`from
`Mar. 3, 1996 email
`jpettitt@well.sf.ca.us (home); jpp@software.net (work)") ,
`available at <http:/ /www.xent.com.spring96/0252.html>.
`Oct. 4, 1995 email from John Pettitt (')pp@software.net"),
`available at http://www.cs.uwm.edu/-levine/comp-privacy/
`volume7 /V7%23028.
`David Gifford, eta!. Payment Switches for Open Networks,
`Proceedings of the 40th IEEE Computer Society Interna(cid:173)
`tional Conference (1995).
`ATACS™: How ATACS Works (Bedford Associates, Inc.,
`1996 (as of at least Jun. 28, 1996)).
`Tom Fawcett & Foster Provost, Adaptive Fraud Detection, 1
`Data Mining and Knowledge Discovery 1 (to appear) (1997
`(as of at least Jul. 11, 1997) ).
`SNET Network Fraud Control System (Jan. 1994).
`
`Tom Fawcett & Foster Provost, Adaptive Fraud Detection, 1
`Data Mining and Knowledge Discovery 291 (Sep. 1997).
`Tom Fawcett & Foster Provost, Combining Data Mining and
`Machine Learning for Effective User Profiling, Proceedings
`of the Second International Conference on Knowledge Dis(cid:173)
`covery and Data Mining, at 8-13 (KDD-96) (AAAI Press,
`1996).
`"Fraud Control System" (CyberSource Corp., Jan. 10,
`1997), www.cybersource.com/products/fcs.html as of Jan.
`10,
`1997,
`archived
`at
`http://web.archive.org/web/
`19970110062645/ cybersource.com/products/fcs.html.
`Rod Newing, Data Mining, 74 Management Accountin(cid:173)
`g-London 34 (Oct. 1996).
`CyberSource's New Internet Commerce Services Provide
`Software Publishers Tum-Key.
`Electronic Transaction and Distribution Services (Cyber(cid:173)
`Source, Apr. 30, 1996), www.cybersource.com.news/press/
`96043001.html as of Apr. 30, 1996, archived at http://we(cid:173)
`b.archive.org/web/1997011 0063129/cybersource.com/
`news/press/96043001.html.
`RobertA. Gein & Frank A. McGillivray, TheABCs of Credit
`Card Processing, Perspectives on Public Communication, at
`13-18 (American Public Communications Council Inc.,
`Dec. 1995).
`Sylvia Allen, Credit Card Fraudsters? SWAT Them!, On the
`Line, at 32 (Mar./ Apr. 1997).
`J. Lawrence Cunningham, Cutting Cell Fraud Frequency,
`Security Management (Oct. 1996).
`Stephen E. Lamm, et a!, Real-Time Geographic Visualiza(cid:173)
`tion of World Wide Web Traffic, 28 Computer Networks and
`ISDN Systems 1457, (Fifth International World Wide Web
`Conference) (May 1996).
`Will H. Scullin, et a!, Real-Time Visualization of World
`Wide Web Traffic (1995), at http:/ /citeseer.ist/psu.edu/
`scullin95realtime.html.
`
`Ex. 1017 - 3/4
`
`
`
`US 6,029,154 Cl
`
`1
`EX PARTE
`REEXAMINATION CERTIFICATE
`ISSUED UNDER 35 U.S. C. 307
`
`THE PATENT IS HEREBY AMENDED AS
`INDICATED BELOW.
`
`Matter enclosed in heavy brackets [ ] appeared in the
`patent, but has been deleted and is no longer a part of the
`patent; matter printed in italics indicates additions made
`to the patent.
`
`AS A RESULT OF REEXAMINATION, IT HAS BEEN
`DETERMINED THAT:
`
`Claims 1, 2 and 3 are determined to be patentable as
`amended.
`
`10
`
`15
`
`20
`
`1. A method for detecting fraud in a credit card transaction
`between a consumer and a merchant over the Internet com(cid:173)
`prising the steps of:
`receiving, from the consumer, credit card information
`relating to the transaction;
`creating and storing a consistency check mechanism, a 25
`history check mechanism, an automatic verification
`mechanism and an Internet identification mechanism,
`each of which may indicate whether the credit card
`transaction is fraudulent based on transaction
`information, in combination with information that iden- 30
`tifies the consumer, in which the transaction informa(cid:173)
`tion provides the merchant with a quantifiable indica(cid:173)
`tion of whether the credit card transaction is fraudulent;
`receiving from the merchant and storing a weight value
`associated with each of the mechanisms and storing the 35
`weight value in association with information that iden(cid:173)
`tifies the mechanisms, wherein each of the weight val(cid:173)
`ues signifies an importance to the merchant of the value
`to the credit card transaction of the associated mecha-
`nism;
`weighting each value of the plurality of parameters
`according to the weight values;
`determining whether the credit card information is
`fraudulent, based upon the values of the parameters and
`the weight values;
`communicating to the merchant, over the Internet, an indi(cid:173)
`cation whether the credit card information is fraudu(cid:173)
`lent;
`
`40
`
`45
`
`2
`wherein the steps of creating and storing further include:
`obtaining information about other transactions [utilizing]
`that have utilized an Internet address that is identified
`with the credit card transaction;
`constructing a map of credit card numbers based upon the
`other transactions; and
`utilizing the map of credit card numbers to determine if
`the credit card transaction is valid.
`2. A computer readable medium containing program
`instructions for detecting fraud in a credit card transaction
`between a consumer and a merchant over the Internet,
`wherein execution of the program instructions by one or
`more processors of a computer system causes the one or
`more processors to carry out the steps of:
`a) obtaining credit card information relating to the trans-
`actions from the consumer; and
`b) verifying the credit card information based upon values
`of plurality of parameters, in combination with infor(cid:173)
`mation that identifies the consumer, and that may pro(cid:173)
`vide an indication whether the credit card transaction is
`fraudulent,
`wherein each value among the plurality of parameters is
`weighted in the verifying step according to an
`importance, as determined by the merchant, of that
`value to the credit card transaction, so as to provide the
`merchant with a quantifiable indication of whether the
`credit card transaction is fraudulent,
`wherein execution of the program instructions by one or
`more processors of a computer system causes that one
`or more processors to carry out the further steps of;
`obtaining information about other transactions [utilizing]
`that have utilized an Internet address that is identified
`with the credit card transaction; constructing a map of
`credit card numbers based upon the other transactions;
`and utilizing the map of credit card numbers to deter-
`mine if the credit card transaction is valid.
`3. A method for verifying the validity of a credit card
`transaction over the Internet comprising the steps of:
`a) obtaining information about other transactions [utiliz(cid:173)
`ing] that have utilized an Internet address that is identi(cid:173)
`fied with the the credit card transaction;
`b) constructing a map of credit card numbers based upon
`the other transactions and;
`c) utilizing the map of credit card numbers to determine if
`the credit card transaction is valid.
`
`* * * * *
`
`Ex. 1017 - 4/4
`
`