throbber
1111111111111111111111111111111111111111111111111111111111111
`US006029154Cl
`c12) EX PARTE REEXAMINATION CERTIFICATE (6342nd)
`United States Patent
`US 6,029,154 Cl
`c1o) Number:
`Pettitt
`(45) Certificate Issued:
`Aug. 5, 2008
`
`111111
`
`(54) METHOD AND SYSTEM FOR DETECTING
`FRAUD IN A CREDIT CARD TRANSACTION
`OVER THE INTERNET
`
`(75)
`
`Inventor: John Philip Pettitt, Los Altos, CA (US)
`
`(73) Assignee: Cybersource Corporation, Mt. View,
`CA (US)
`
`Reexamination Request:
`No. 90/007,268, Oct. 26, 2004
`
`Reexamination Certificate for:
`6,029,154
`Patent No.:
`Feb. 22, 2000
`Issued:
`08/901,687
`Appl. No.:
`Jul. 28, 1997
`Filed:
`
`(51)
`
`Int. Cl.
`G06Q 40100
`G06Q 20100
`
`(2006.01)
`(2006.01)
`
`4,897,811 A
`4,949,257 A
`4,958,375 A
`5,175,682 A
`5,177,342 A
`5,206,488 A
`5,245,657 A
`5,291,550 A
`5,305,195 A
`5,311,594 A
`5,335,265 A
`5,336,870 A
`
`111990 Scofield
`8/1990 Orbach
`9/1990 Reilly
`12/1992 Higashiyama et a!.
`111993 Adams
`4/1993 Teicher
`9/1993 Sakurai
`3/1994 Levy eta!.
`4/1994 Murphy
`5/1994 Penzias
`8/1994 Cooper et al.
`8/1994 Hughes eta!.
`
`(Continued)
`
`FOREIGN PATENT DOCUMENTS
`
`EP
`EP
`EP
`wo
`wo
`wo
`wo
`
`0418144 A1
`1081665 A1
`0468229 A2
`wo 94/06103
`W0-96/31043
`W097/00483 A1
`WO 98/54667 A1
`
`3/1991
`3/1991
`7/1991
`3/1994
`10/1996
`111997
`12/1998
`
`(52) U.S. Cl. .............................. 705/44; 705/38; 705/39;
`705/79
`(58) Field of Classification Search ........................ None
`See application file for complete search history.
`
`(56)
`
`References Cited
`
`OTHER PUBLICATIONS
`
`Alfuraih, S., eta!. "Using Trusted Email to Prevent Credit
`Card Frauds in Multimedia Products", World Wide Web
`Internet and Web Information Systems, 5, 2002, pp.
`245-256.
`
`U.S. PATENT DOCUMENTS
`
`(Continued)
`
`3,657,702 A
`3,950,733 A
`4,044,243 A
`4,254,474 A
`RE30,579 E
`RE30,580 E
`4,326,259 A
`4,485,300 A
`4,510,382 A
`4,528,643 A
`4,734,858 A
`4,755,935 A
`4,760,604 A
`4,792,968 A
`4,845,739 A
`4,893,330 A
`
`4/1972 Stephenson, Jr.
`4/1976 Cooper et al.
`8/1977 Cooper et al.
`3/1981 Cooper et al.
`4/1981 Goldman et al.
`4/1981 Goldman et al.
`4/1982 Cooper et al.
`1111984 Peirce
`4/1985 Walter
`7/1985 Freeny, Jr.
`3/1988 Schlafly
`7/1988 Davis et al.
`7/1988 Cooper et al.
`12/1988 Katz
`7/1989 Katz
`111990 Franco
`
`Primary Examiner-Jeanne M Clark
`
`(57)
`
`ABSTRACT
`
`A method and system for detecting fraud in a credit card
`transaction between consumer and a merchant over the Inter(cid:173)
`net. The method and system comprises obtaining credit card
`information relating to the transaction from the consumer;
`and verifYing the credit card information based upon a vari(cid:173)
`ety of parameters. The variety of parameters are weighted so
`as to provide a merchant with a quantifiable indication of
`whether the credit card transaction is fraudulent. In so doing,
`an integrated verification system is provided which allows a
`merchant, or the like, to accurately and efficiently determine
`the validity of the transaction over the Internet.
`
`DETERMINE TRANSACTIONS
`PROCESSED UTILIZING
`INTERNET ADDRESS
`
`1-- 302
`
`CONSTRUCT MAP BASED
`UPON TRANSACTIONS
`
`1-- 304
`
`USED MAPPED TRANSACTIONS
`TO DETERMINE IF A NEW CREDIT
`CARD TRANSACTION IS VALID
`
`. / 306
`
`Ex. 1017 - 1/4
`
`

`

`US 6,029,154 Cl
`Page 2
`
`U.S. PATENT DOCUMENTS
`
`8/1994 Stringer eta!.
`5,341,429 A
`9/1994 Filepp eta!.
`5,347,632 A
`9/1994 Bullock eta!.
`5,351,186 A
`9/1994 Michener eta!.
`5,351,293 A
`9/1994 Sullivan
`5,351,296 A
`5,386,104 A
`111995 Sime
`3/1995 Levey
`5,398,300 A
`5/1995 Hershey eta!.
`5,414,833 A
`5/1995 Chasek
`5,420,405 A
`7/1995 Armbrust eta!.
`5,436,971 A
`1111995 Means eta!.
`5,471,627 A
`2/1996 Rangachar
`5,495,521 A
`3/1996 Langhans eta!.
`5,500,513 A
`4/1996 Atkinson
`5,511,122 A
`5/1996 Aiello eta!.
`5,515,307 A
`6/1996 Bickham eta!.
`5,530,438 A
`9/1996 Rosen
`5,557,518 A
`5,596,642 A
`111997 Davis et al.
`2/1997 Holloway
`5,604,802 A
`3/1997 Aiello eta!.
`5,608,801 A
`4/1997 Jones et al.
`5,623,547 A
`5/1997 Bowman
`5,627,886 A
`5/1997 Shear
`5,627,972 A
`5/1997 Micali
`5,629,982 A
`9/1997 Rosen
`5,671,280 A
`12/1997 Glier eta!.
`5,701,398 A
`12/1997 Rosen
`5,703,949 A
`111998 Blonder eta!.
`5,708,422 A
`111998 Chelliah eta!.
`5,710,887 A
`2/1998 Payne et al.
`5,715,314 A
`3/1998 Gifford
`5,724,424 A
`3/1998 Klingman
`5,729,594 A
`4/1998 Titan
`5,745,654 A
`8/1998 Fawcett eta!.
`5,790,645 A
`9/1998 Manasse
`5,802,497 A
`9/1998 Moller eta!.
`5,805,686 A
`9/1998 Sirbu eta!.
`5,809,144 A
`9/1998 Williams eta!.
`5,815,657 A
`10/1998 Gopinathan eta!.
`5,819,226 A
`10/1998 Ogram
`5,822,737 A
`12/1998 Muftic
`5,850,442 A
`2/1999 Boesch et al.
`5,870,473 A
`2/1999 Jankowitz eta!.
`5,875,236 A
`3/1999 Rosen
`5,878,139 A
`3/1999 Joao et al.
`5,878,337 A
`3/1999 Anderson eta!.
`5,884,289 A
`4/1999 Boesch et al.
`5,897,621 A
`5/1999 Wilfetal.
`5,899,980 A
`10/1999 Asfar eta!.
`5,970,129 A
`10/1999 Scroggie eta!.
`5,970,469 A
`1111999 Chan eta!.
`5,995,604 A
`112000 Black eta!.
`6,012,042 A
`7/2000 Anderson eta!.
`6,094,643 A
`9/2000 Basch eta!.
`6,119,103 A
`10/2000 Jonas et al.
`6,137,792 A
`12/2000 Baulier et al.
`6,163,604 A
`10/2001 Storch et al.
`6,307,853 B1
`12/2001 Gopinathan eta!.
`6,330,546 B1
`3/2002 Ginter et al.
`6,363,488 B1
`5/2002 Ginter et al.
`6,389,402 B1
`6,393,016 B2
`5/2002 Wegner eta!.
`8/2002 Lazarus eta!.
`6,430,539 B1
`10/2002 Tebeka eta!.
`6,473,423 B1
`2/2003 Justice eta!.
`6,516,056 B1
`12/2003 Basch eta!.
`6,658,393 B1
`10/2001 Otto et a!.
`200110029496 A1
`OTHER PUBLICATIONS
`Clearcommerce Corporation "An e*guide to Cyberfraud",
`1999, pp. 1-9.
`
`Cybercash, "About CyberCash, Inc.", 2000, http"//www.cy(cid:173)
`bercash.com/company, CyberCash Company Information, 1
`page.
`Cybersource,
`"CyberSource Advanced Fraud Screen
`Enhanced by Visa," Implementation Guide, Simple Order
`API, Version 1.10, SCMP API, Jul. 2004, 102 pages.
`Cybersource Corporation, "Fraud Control System," cyber(cid:173)
`source.com, Copyright date 1996, 1 page.
`Cybersource, "Frequently Asked Questions-What is the
`danger of using credit cards over the internet?," Cyber(cid:173)
`Source.com, Copyright date 1997, 1 page.
`Cybersource, "Merchant Internet Commerce Services,"
`CyberSource.com Copyright date 1997, 1 page.
`Cybersource, "Cybersource Enhances Internet Fraud Screen
`to Combat Credit Card Fraud," cybersource.com, Jun. 4,
`2001, http;/ /www.cybersource.com/press_room/view.xm(cid:173)
`l?page_id=579, 2 pages.
`Cybersource, "CyberSource Introduces Credit Card Autho(cid:173)
`rization Service Enchanced with a Powerful Fraud Screen(cid:173)
`ing Tool," cybersource.com, Jan. 30, 2001, http:www.cyber(cid:173)
`source.com.press_room.view.xml?page_id=237, 2 pages.
`Datacash, "Payment card fraud checking service fore--com(cid:173)
`merce," http://www.datacash.com/security/tradescreening.
`html, printed Apr. 23, 2002, 2 pages.
`Ghosh eta!., "Credit card fraud detection with a neutral-net(cid:173)
`work", System Sciences, 1994, vol. iii: Informational sys(cid:173)
`tems: Decisio Support and Knowledge-Based Systems, Pro(cid:173)
`ceedings of the Twenty-Seventh Hawaii International
`Conference, pp. 621-630, Jan. 7.
`Hanagandi eta!., "Density-based clustering and radial basis
`function modeling to generate credit card fraud scores",
`Computational Intelligence for Financial Engineering, 1996;
`Proceedings of the IEEE/IAFE 1996 Conference.
`McCrea et a!., "The Internal Report" prepared by CSIRO for
`the Australian Taxation Office as part of the ATO's Elec(cid:173)
`tronic Commerce Project, Jun. 1997, extracted from Google
`datatbase on Internet on Oct. 18, 2002.
`Moeller, Michael, "New CyberSource of Information", PC
`Week, Nov. 20, 1995.
`Richardson, "Neural networks compared to statistical tech(cid:173)
`niques", Computational Intelligence for Financial Engineer(cid:173)
`ing, 1997; Proceedings of the IEEE/IAFE 1997, Mar. 24-25,
`1997, New York City Conference.
`Schoter, Dr. Andreas, et a!., Digital Money Online A Review
`of Some Existing Technologies, Feb. 1997, pp. 1-60, inter://
`trader.
`Techmall, "Meridien Launches New e*Payments Research
`Service IdentifYing Web Opportunies And Risk For Retailers
`And Financial Firms," http://www8/techmall.com/techdocs/
`TS991202-l.html, printed Apr. 23, 2002, 2 pages.
`"Telia puts IP at core of strategy: This Swedish Telco to
`install IP backbone to support Internet access, video-on-de(cid:173)
`mand, etc.," Communications Week International, Oct. 2,
`1995.
`Savetz and Sears, "FAQs: How Do I Use the Internet as a
`Telephone,"
`<http://itel.mit.edu/itel/docs/MISC/voice_
`faq.html> (Copyright 1995).
`Sears, Andrew, "Innovation in Internet Telephony: The Inter(cid:173)
`net as the Competitor to the POTS Network," Feb. 28, 1996,
`available at http://itel.mit.edu>.
`
`Ex. 1017 - 2/4
`
`

`

`US 6,029,154 Cl
`Page 3
`
`Solomon, Richard Jay, "Anything you can do, I can do bet(cid:173)
`ter; I can do anything better than you ... ," MIT Research Pro(cid:173)
`gram on Cummunication Policy, available at http://itel.
`mit.edul>, which states "Presented at the Columbia Institute
`of Tele-information' s The Impact of Cybercommunications
`on Telecommunications, Mar. 8, 1996."
`Sears, Andrew, "The Effect of Internet Telephony on the
`Long Distance Voice Market", Jan. 14, 1995
`("last
`Revised"), at 3 available at <http://itel.mit.edu>.
`"IDT Releases Net2Phone Commercial Version Three
`Months Ahead of Schedule," Aug. 5, 1996, available at
`<http:/ /web.archive.org/web/19971 012121312/http:/
`www.net2phone.com>.
`MICOM, "V/IP Phone/fax IP Gateway: Voice Interface
`Cards and PC Software," Nov. 14, 1996 ("Last Updated"),
`available at <http:/ /web.archive.org/web/19961111 024432/
`http:/www.micom.cornl>.
`("email:
`"John Pettitt"
`from
`Mar. 3, 1996 email
`jpettitt@well.sf.ca.us (home); jpp@software.net (work)") ,
`available at <http:/ /www.xent.com.spring96/0252.html>.
`Oct. 4, 1995 email from John Pettitt (')pp@software.net"),
`available at http://www.cs.uwm.edu/-levine/comp-privacy/
`volume7 /V7%23028.
`David Gifford, eta!. Payment Switches for Open Networks,
`Proceedings of the 40th IEEE Computer Society Interna(cid:173)
`tional Conference (1995).
`ATACS™: How ATACS Works (Bedford Associates, Inc.,
`1996 (as of at least Jun. 28, 1996)).
`Tom Fawcett & Foster Provost, Adaptive Fraud Detection, 1
`Data Mining and Knowledge Discovery 1 (to appear) (1997
`(as of at least Jul. 11, 1997) ).
`SNET Network Fraud Control System (Jan. 1994).
`
`Tom Fawcett & Foster Provost, Adaptive Fraud Detection, 1
`Data Mining and Knowledge Discovery 291 (Sep. 1997).
`Tom Fawcett & Foster Provost, Combining Data Mining and
`Machine Learning for Effective User Profiling, Proceedings
`of the Second International Conference on Knowledge Dis(cid:173)
`covery and Data Mining, at 8-13 (KDD-96) (AAAI Press,
`1996).
`"Fraud Control System" (CyberSource Corp., Jan. 10,
`1997), www.cybersource.com/products/fcs.html as of Jan.
`10,
`1997,
`archived
`at
`http://web.archive.org/web/
`19970110062645/ cybersource.com/products/fcs.html.
`Rod Newing, Data Mining, 74 Management Accountin(cid:173)
`g-London 34 (Oct. 1996).
`CyberSource's New Internet Commerce Services Provide
`Software Publishers Tum-Key.
`Electronic Transaction and Distribution Services (Cyber(cid:173)
`Source, Apr. 30, 1996), www.cybersource.com.news/press/
`96043001.html as of Apr. 30, 1996, archived at http://we(cid:173)
`b.archive.org/web/1997011 0063129/cybersource.com/
`news/press/96043001.html.
`RobertA. Gein & Frank A. McGillivray, TheABCs of Credit
`Card Processing, Perspectives on Public Communication, at
`13-18 (American Public Communications Council Inc.,
`Dec. 1995).
`Sylvia Allen, Credit Card Fraudsters? SWAT Them!, On the
`Line, at 32 (Mar./ Apr. 1997).
`J. Lawrence Cunningham, Cutting Cell Fraud Frequency,
`Security Management (Oct. 1996).
`Stephen E. Lamm, et a!, Real-Time Geographic Visualiza(cid:173)
`tion of World Wide Web Traffic, 28 Computer Networks and
`ISDN Systems 1457, (Fifth International World Wide Web
`Conference) (May 1996).
`Will H. Scullin, et a!, Real-Time Visualization of World
`Wide Web Traffic (1995), at http:/ /citeseer.ist/psu.edu/
`scullin95realtime.html.
`
`Ex. 1017 - 3/4
`
`

`

`US 6,029,154 Cl
`
`1
`EX PARTE
`REEXAMINATION CERTIFICATE
`ISSUED UNDER 35 U.S. C. 307
`
`THE PATENT IS HEREBY AMENDED AS
`INDICATED BELOW.
`
`Matter enclosed in heavy brackets [ ] appeared in the
`patent, but has been deleted and is no longer a part of the
`patent; matter printed in italics indicates additions made
`to the patent.
`
`AS A RESULT OF REEXAMINATION, IT HAS BEEN
`DETERMINED THAT:
`
`Claims 1, 2 and 3 are determined to be patentable as
`amended.
`
`10
`
`15
`
`20
`
`1. A method for detecting fraud in a credit card transaction
`between a consumer and a merchant over the Internet com(cid:173)
`prising the steps of:
`receiving, from the consumer, credit card information
`relating to the transaction;
`creating and storing a consistency check mechanism, a 25
`history check mechanism, an automatic verification
`mechanism and an Internet identification mechanism,
`each of which may indicate whether the credit card
`transaction is fraudulent based on transaction
`information, in combination with information that iden- 30
`tifies the consumer, in which the transaction informa(cid:173)
`tion provides the merchant with a quantifiable indica(cid:173)
`tion of whether the credit card transaction is fraudulent;
`receiving from the merchant and storing a weight value
`associated with each of the mechanisms and storing the 35
`weight value in association with information that iden(cid:173)
`tifies the mechanisms, wherein each of the weight val(cid:173)
`ues signifies an importance to the merchant of the value
`to the credit card transaction of the associated mecha-
`nism;
`weighting each value of the plurality of parameters
`according to the weight values;
`determining whether the credit card information is
`fraudulent, based upon the values of the parameters and
`the weight values;
`communicating to the merchant, over the Internet, an indi(cid:173)
`cation whether the credit card information is fraudu(cid:173)
`lent;
`
`40
`
`45
`
`2
`wherein the steps of creating and storing further include:
`obtaining information about other transactions [utilizing]
`that have utilized an Internet address that is identified
`with the credit card transaction;
`constructing a map of credit card numbers based upon the
`other transactions; and
`utilizing the map of credit card numbers to determine if
`the credit card transaction is valid.
`2. A computer readable medium containing program
`instructions for detecting fraud in a credit card transaction
`between a consumer and a merchant over the Internet,
`wherein execution of the program instructions by one or
`more processors of a computer system causes the one or
`more processors to carry out the steps of:
`a) obtaining credit card information relating to the trans-
`actions from the consumer; and
`b) verifying the credit card information based upon values
`of plurality of parameters, in combination with infor(cid:173)
`mation that identifies the consumer, and that may pro(cid:173)
`vide an indication whether the credit card transaction is
`fraudulent,
`wherein each value among the plurality of parameters is
`weighted in the verifying step according to an
`importance, as determined by the merchant, of that
`value to the credit card transaction, so as to provide the
`merchant with a quantifiable indication of whether the
`credit card transaction is fraudulent,
`wherein execution of the program instructions by one or
`more processors of a computer system causes that one
`or more processors to carry out the further steps of;
`obtaining information about other transactions [utilizing]
`that have utilized an Internet address that is identified
`with the credit card transaction; constructing a map of
`credit card numbers based upon the other transactions;
`and utilizing the map of credit card numbers to deter-
`mine if the credit card transaction is valid.
`3. A method for verifying the validity of a credit card
`transaction over the Internet comprising the steps of:
`a) obtaining information about other transactions [utiliz(cid:173)
`ing] that have utilized an Internet address that is identi(cid:173)
`fied with the the credit card transaction;
`b) constructing a map of credit card numbers based upon
`the other transactions and;
`c) utilizing the map of credit card numbers to determine if
`the credit card transaction is valid.
`
`* * * * *
`
`Ex. 1017 - 4/4
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket