throbber
(12) INTERNATIONAL APPLICATION PUBLISHED UNDER THE PATENT COOPERATION TREATY (PCT)
`
`(19) World Intellectual Property Organization
`International Bureau
`
`(43) International Puhlication Date
`2007 (04.01.2007)
`4 January
`
`peT
`
`(51) International
`Patent ClassiJication:
`G06Q 99/00 (2006.01)
`
`(21) International Application Numbcr:
`PCT fUS2005/035532
`
`(22) International
`
`Filing Date:
`29 September 2005 (29.09.2005)
`
`(25) Filing Language:
`
`(26) Publication Language:
`
`(30) Priority Data:
`60/694,768
`
`English
`
`English
`
`27 June 2005 (27.06.2005)
`
`US
`
`(63) Related by continuation
`(CON) or continuation-in-part
`(CIP)
`to earlier application:
`US
`Filed on
`
`101791,439 (CIP)
`2 March 2004 (02.03.2004)
`
`(for all designaied States except US): THE 41st
`(71) Applicant
`[USfUS); 14301 North 87th Street,
`PARAl\-IETER,INC
`Suite 211, Scottsdale, AZ 85260 (US).
`
`(72)
`(75)
`
`and
`Inventor;
`tfor [JS only]: EISEN,Ori
`[OiUS);
`Inventor/Applicant
`6214 East IIillery Drive, Scottsdale, AZ 85254-2568 (US).
`
`11111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111
`
`(10) International Publication Number
`WO 2007/001394 A2
`
`(74) Agents:
`et al.; Wilson Sonsini
`ENG, U_, 1'_, Peter
`Goodrich & Rosati, 650 Page Mill Road, Palo Alto, CA
`94304-1050 (US).
`(81) Designated States (unless otherwise indicated, Jor every
`kind oJnatianal protection. available): AE, AG, AL, AM,
`AT, AU, AZ, BA, BB, BG, BR, BW, BY, BZ, CA, CIl, CN,
`CO, CR, CU, CZ, OE, DK, DM, DZ, EC, EE, EG, ES, 1"1,
`GB, GD, GE, GH, GM, HR, HU, ID, IL, IN, IS, JP, KE, KG,
`KM, KP, KR, KZ, LC, LK, LR, LS, LT, LU, LV, LY, MA,
`MD, MG, MK, MN, MW, MX, MZ, NA, NG, NI, NO, NZ,
`OM, PG, PH, PL, PT, RO, RU, SC, SD, SE, SG, SK, SL,
`SM, SY, TI, TM, TN, TR, TT, TZ, UA, UG, US (patent),
`UZ, VC, VN, YU, ZA, ZM, zw.
`(84) Designated States (unless otherwise indicated, Jor every
`kind o] regional protection available): ARIPO (BW GIl,
`GM, KE, LS, MW, MZ, NA, SO, SL, SZ, TZ, UG, ZM,
`ZW), Eurasian (AM, AZ, BY, KG, KZ, MD, RU, TI, TM),
`European (AT, BE, BG, CH, CY, CZ, DE, DK, EE, ES, PI,
`FR, GB, GR, HU, IE, IS, n; tr, LU, LV, MC, NL, PL, PT,
`RO, SE, SI, SK, TR), OAPI (BF, BJ, CF, CG, CI, CM, GA,
`GN, GQ, GW, ML, MR, NIl, SN, TD, TG).
`
`Published:
`search report and to be republished
`international
`without
`-
`upon receipt o] that report
`refer to the "Guid(cid:173)
`For two-letter codes and other abbreviations,
`ance Notes on Codes and Abhreviations" appearing at the beg in(cid:173)
`ning oJ each regular issue oJ the peT Gazette.
`
`==-
`--
`-iiiiiiiiii-iiiiiiiiii
`~-
`==-
`-==
`
`iiiiiiiiii
`
`iiiiiiiiii
`!!!!!!!!
`
`!!!!!!!!-
`----==
`M<
`
`~0
`
`~~~
`
`\
`----------------------------------------------------------------
`~t::: (54) Title: METHOD AND SYSTEM FOR TDENTIFYING USERS AND DETECTING FRAlTD BY USE OF THE INTERNET
`o method and system uses adelta of time between the cloek of the computer used by the actual fraudulent use and the potentially
`
`~~
`
`(57) Abstract: A method and system for detecting and preventing Internet fraud in online transactions by utilizing and analyzing
`Manumber
`of pararneters to uniquely identify a cornputer user and putential Iraudulent
`transaction thruugh predictive modeling. The
`
`:;,
`~
`
`fraudulent user and the clock of the server computer
`preferahly the Browser TD.
`
`in conjunction with personal
`
`information and/or non-personal
`
`information,
`
`APPLE EXHIBIT 1005
`Page 1 of 39
`
`

`

`WO 2007/001394
`
`PCTIUS2005/035532
`
`USERS AND DETECTING
`METHOD AND SYSTEM FOR IDENTIFYING
`BY USE OF THE INTERNET
`
`FRAUD
`
`CROSS-REFERENCE
`application ofU.S. Patent Application Serial No. 10/791,439 filed
`This application is a continuation-in-part
`[0001]
`on March 2, 2004, and this application also claims the benefit of priority to D.S. Provisional Patent Application
`Serial No. 60/694,768 filed June 27, 2005, which are incorporated herein by reference in their entirety.
`
`BACKGROUND
`OF THE INVENTION
`The invention relates to Internet purchasing or e-tail transactions and specifically to detecting fraud in such
`[0002]
`transactions when ordering products, services, or downloading information over the Internet.
`Internet
`[0003]
`There is a continuing need to develop techniques, devices, and programs to detect and prevent
`fraud. The invention provides a method and a system for detecting and preventing Internet
`fraud by utilizing and
`analyzing a number ofparameters
`to uniquely identify a customer and a potential
`fraudulent
`Internet-based
`trans action.
`
`DESCRIPTION
`OF THE PRIOR ART
`[0004] Many methods and systems have been developed over the years to prevent or detect Internet fraud. Today,
`to gain consumer confidence and prevent revenue loss, a website operator or merchant desires an accurate and
`trustworthy way of detecting possible Internet
`fraud. Merely asking for the user name, address, phone number, and
`e-mail address will not suffice to detect and determine a probable fraudulent
`trans action because such information
`can be altered, manipulated,
`fraudulently obtained, or sirnply false.
`[0005]
`Typically, an Internet user who accesses a website for obtaining a service, product, or information, not only
`enters personal
`information as mentioned above, but is also requested to provide a credit card account nurnber,
`expiration date, and billing address. An online criminal seeking to obtain goods, services, or access to information
`(text and/or visuals over the Internet) commonly uses someone else's credit card information to obtain the services
`or products during the trans action. To prevent such occurrences, websites, via credit card companies and banks,
`often check to see ifthe address on the order corresponds or matches the address for the credit card owner.
`Although billing and shipping addresses can differ, such as when someone purchases a gift for another,
`it is a factor
`to consider
`in the verification process. Additionally, merchants utilize phone number matehing between that ofthe
`Internet order and the credit card company database. Another commonly used technique for order verification is e(cid:173)
`mail address verification where the website operator sends a message to the user e-mail address asking the customer
`to confirm the order prior to executing the same. Yet, online thieves frequently use email addresses from large
`portal sites that offer free e-mail accounts, These e-mail addresses are easily disposable and rnake it harder for the
`website operator
`to identify the fraudulent customer before executing the trans action.
`[0006] More sopbisticated websites now capture a variety of parameters
`from the user known as Common
`Gateway Interface parameters
`(CGI parameters). These parameters commonly inc1ude non-personal
`information
`such as a user Internet Protocol Address (IP Address). Every computer connected to the Internet
`is assigned a
`unique number known as its Internet Protocol
`(IP) Address. Much like a phone number in ahorne or office, an IP
`address can be used to identify the specific user or at least the particular computer used for an Internet
`transaction.
`In addition, since these numbers are usually assigned in country-based blocks, an IP address can often be used to
`identify the country from which a computer
`is connected to the Internet. Yet, IP addresses can change regularly if a
`
`-1-
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`APPLE EXHIBIT 1005
`Page 2 of 39
`
`

`

`WO 2007/001394
`
`PCTlUS2005/035532
`
`to
`
`user t!:öIl'necfsto t'h!;:'1l'it'etlret'vla'a"tlTal"urn~Ofinection or reboots their computer. Online thieves also have ways of
`IP address to make it nearly impossible
`for the website operator
`scrambling their IP addresses or adopting another
`identify the true user. Thus, websites typically use an IP address plus a further non-personal
`identifier
`such as a
`Browser
`ID (or user agent), a cookie, andlor a registration ID to try to identify a unique user and to prevent
`fraud in
`a second trans action.
`the website operator with a wealth of information ab out the user such as the
`ID provides
`[0007] A Browser
`the user
`software being used to browse or surf the Internet. Additionally,
`the Browser
`ID includes information about
`its Internet browser and the language. Thus,
`its current version,
`the Browser
`ID has
`computer operating system,
`valuable information
`for identifying a unique user. The Browser
`ID may also have more detailed information
`such
`as the type of content
`the user can receive;
`for example,
`this lets the website operator know if the user can run
`applications
`in FLASH-animation,
`open a PDF-file, or access a Microsoft Excel document. Yet, Browser
`IDs from
`different computers
`can be similar, as there are so many Internet users and thus many have similar computers with
`the same capabilities,
`programs, web browsers, operating systems, and other information. A cookie refers to a piece
`ofinformation
`sent from the web server to the user web browser which is saved on the resident browser
`software.
`Cookies rnight contain specific information such as login or registration information,
`online 'shopping cart'
`information,
`user preferences,
`etc. But cookies can easily be deleted by the computer user, by the browser, or turned
`off completely so that the server cannot save information on the browser
`software. Thus, cookies alone cannot serve
`as a unique identifier
`to thwart an Internet
`thief.
`[0008] Accordingly, what is needed is a method and system that overcomes the problems associated with a typical
`verification and fraud prevention system for Internet transactions particularly in the purchasing of services, products,
`or information by uniquely identifying each consumer. Then, when that consumer seeks a second fraudulent
`purchase, the website operator will detect the same and block the order or, at least, obtain more information to
`ensure the order is legitimate. The system should be easily implemented within the existing environment and should
`be adaptable and compatible with existing technology,
`
`SUMMARY OF THE INVENTION
`In accordance with the invention, a method and system is provided for detecting potentially fraudulent
`[0009]
`transactions over the Internet. The method and system comprises obtaining information relating to the transaction
`from the consumer and combining this information with a unit corresponding to the change oftime, adelta oftime
`parameter, to create a unique computer identifier. If a future transaction involves an identical computer identifier, as
`described below, which was previously engaged in a fraudulent transaction, the website operator can choose to
`cancel the transaction, pursue legal action, seek further verification, or the like. By using information relating to the
`first transaction, such as the IP address andlor Browser ID, and combining it with the delta oftime parameter, as
`detailed herein, the website host can more accurately preventively track fraudulent users online by comparing
`computer identifiers to each other. In so doing, an integrated fraud prevention system is provided which allows the
`website host, merchant, or the like, to accurately and efficiently deterrnine the validity or fraudulent quality of a
`transaction sought to be transacted over the Internet.
`[0010] Accordingly, the invention provides a method and system for improving fraud detection in connection with
`Internet transactions. Various embodiments ofthe invention utilize existing tecbnological capabilities to prevent
`online thieves from making second fraudulent transactions.
`[0011] Another aspect ofthe invention provides methods and systems for detecting and preventing Internet fraud
`comrnitted as a result of "scams" or deceptive practices developed to acquire personal, confidential and/or financial
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`-2-
`
`APPLE EXHIBIT 1005
`Page 3 of 39
`
`

`

`WO 2007/001394
`
`PCTlUS2005/035532
`
`i.n:fOrhia'trtlll~' Theh~o'fic~pts"'MtM;;hl1erifi6rl'&~scribedabove may be characterized as "fingerprinting" techniques
`and methods to identify and/or prevent fraud involving information obtained through Internet scams. These unlawful
`practices will1ikely continue as new techniques are developed in addition to schemes already known to those in
`field today such as phishing, pharrning, spoofing, session cloning and other deceptive practices. It shall be
`understood that the clock based or delta of time parameters provided herein can be used within the scope of the
`invention either alone or together with other known or future developed fraud parameters in the fight against online
`fraud and Internet scams. The various methods and systemsprovided in accordance with the invention offer
`improved and enhanced fraud detection and/or prevention solutions for e-commerce and Internet based transactions.
`These solutions provide a degree of invisibility to users and fraudsters alike and do not require any or all of the
`following: user interaction (less likelihood for mistakes or carelessness), opt-in (no adoption issues and full coverage
`of anti-fraud measures can be provided), change in customer behavior (no confusion as to what actions need be
`taken or avoided), downloads or cookies (no cornpatibilityissues with user computers or browsers). Moreover,
`these Internet based solutions generate low false-positives and false negatives so as to minimize loss ofbusiness for
`mistakenly turning down legitimate transactions and successfully rejecting transactions that are fraudulent. The
`invention can incorporate a type oflink analysis on user information from compromised accounts to identify a
`fraudster and/or the computer used to conduct fraudulent transactions online.
`[0012] The features and advantages to various aspects ofthe invention are readily apparent from the following
`detailed description ofthe best mode for carrying out the invention when taken in connection with the
`accompanying chart and other portions of the specification and figures herein.
`
`INCORPORATION BY REFERENCE
`[0013] All publications and patent applications mentioned in this specification are herein incorporated by reference
`to the same extent as if each individual publication or patent application was specifically and individually indicated
`to be incorporated by reference.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`[0014] FIG. 1 is achart that illustrates the versatility and accuracy ofthe invention in weeding out possible
`fraudulent online transactions.
`[0015] FIG. 2 describes a connection between a customer computer and a merchant website server whereby each
`device maintains respective times according to a resident clock.
`[0016] FIG. 3 is an index of different Time Zones around the world.
`[0017] FIG.4 is a flowchart describing an embodiment ofthe invention thatprovides a customer computer
`identifier.
`[0018] FIG. 5 describes components of a customer computer identifier provided in accordance with the invention.
`[0019] FIG. 6 illustrates a comparison of computer identifiers that provides a matehing parameter for consideration
`by an online merchant.
`[0020] FIG. 7 shows various components and parameters that may comprise a user computer identifier in
`accordance with an embodiment of the invention.
`[0021] FIG. 8 depicts the comparison between multiple computer identifiers to provide a matehing parameter that
`can be compared against a preselected matehing value.
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`-3-
`
`APPLE EXHIBIT 1005
`Page 4 of 39
`
`

`

`WO 2007/001394
`
`PCTlUS2005/035532
`
`'DElifmE'EiJij)ESCRIPTION OF THE INVENTION
`
`[0022] The present invention relates to a method and system for detecting potentially fraudulent transactions over
`the Intemet. Various modifications to the preferred embodiment will be readily apparent to those skilled in the art
`and the general principles herein may be applied to other embodiments. The present invention is not intended to be
`limited to the embodiment shown but is to be accorded the widest scope consistent with the principles and features
`described herein. It is to be understood that the website, its host, or operator does not have to be a merchant of
`goods.
`[0023] The present invention provides a ftaud prevention system for online transactions by uniquely identifying a
`customer based on a number of parameters at least one of which is adelta of time parameter and another of which is
`another Internet related parameter, preferably the Browser ID of a computer.
`[0024] Referring to the ehart shown in FIG. 1, what is shown is aseries oftypical transactions on the Internet
`between a merchant and several customers. Each customer establishes a connection between his computer and the
`merchant's website. Upon making this connection, the merchant's website receives some non-personal identification
`information from the customer. This non-personal information typically includes Common Gateway Interface
`(CGI) parameters such as the eustomer's Internet Protocol (IP) Address and the eomputer's Browser ID. While
`"hackers" ean change, disguise, andlor emulate the IP address to mask a ftaudulent transaction, most do not now
`have the capability nor the idea to do the same for the Browser ID. While some "hackers" can change the Browser
`ID, it is not a trivial tool and if one needs to change it all the time it is not allowing those thieves to easily steal,
`henee, they are likely to go to a site that does not check Browser IDs. In a typical embodiment, when the customer
`decides to purehase services, goods, or information from the website, the customer must input additional and more
`personal information. This personal identification information may commonly include the customer's name,
`address, billing and shipping information, phone number, andlor e-mail address. A key feature ofthe present
`invention is that the website server also captures the local time ofthe customer's computer, typically through a
`program such as Javaseript, as weIl as the local time of'the server's computer. The server then calculates the time
`difference (or delta oftime) between the customer's computer clock and the server's computer clock. This can be
`recorded in any desired format such as hours, minutes, seconds, or the like, but corresponds to adelta of time
`parameter. The delta of time parameter, the non-personal information, including but not limited to the preferred
`usage ofthe Browser ID, andlor the personal information are stored by the merchant and used to uniquely identify
`the customer.
`[0025] As shown in FIG. 2, a conneetion may be established between a customer computer 12 and a merchant
`website server 14. Upon making the online connection, various information is transmitted by the customer
`computer 12 that may operate as a unique user and/or computer identifier. This information may include personal
`information specific to the customer, non-personal information corresponding to the eustomer computer, and the
`local time according to the customer computer. The merchant website can receive non-personal customer
`information including CGI parameters such as the customers IP address and computer Browser ID. The customer
`can further input personal information when making a purehase from the website including a customer name,
`address, bi1ling and shipping information, phone number, and/or e-mail address(es). Inaccordance with this
`embodiment ofthe invention, the relative customer computer local time according to its resident clock may be
`captured, typically through a program such as Javascript or any other time indicator employed by
`telecommunications and networking systems such as timestamps within transmitted data packets (e.g., TCP
`timestamps in packets within a data stream wherein each packet includes a header portion containing a 32-bit
`
`-4-
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`APPLE EXHIBIT 1005
`Page 5 of 39
`
`

`

`WO 2007/001394
`
`PCTIUS2005/035532
`
`timeMiä:&pge:derätM"1)Y"~'ofi~in:1t'dtlg'cöh1IMeraccording to local resident time). The local time of a customer
`computer or client may be captured during any selected moment of action such as when the customer visits or is
`logging into a merchant site, at the time of a purchase or at times during an exchange of information that can be
`reflected in timestamp to data packets transmitted across a selected network or the Internet. At the same time, the
`merchant web server also maintains and measures a relative website server local time according to a resident c1ock.
`The time difference or delta of time as between the customer computer clock and the servers computer clock can be
`therefore calculated. This approach in determining when to measure a time of action or event may be characterized
`as opportunistic in that measurements are taken at selected moments in time. The delta of time can be measured,
`calculated and recorded by the merchant web server or any other computer operating with or connected to the
`merchant online system. The delta of time may be measured in any desired format or increments of time such as
`hours, minutes, seconds, milliseconds (microseconds) or the like. Over different periods oftime, the delta oftime
`parameters are generally persistent with relatively high degree of accuracy. Accordingly, the measured time
`difference between these computer clocks provides a fraud parameter in accordance with this aspect ofthe invention
`that may link or associate a particular customer computer with transactions that may involve fraud.
`[0026] The delta oftime (Time Diff) parameter provided in accordance with this aspect ofthe invention may
`function alone or combined with other parameters to provide what may be characterized as a "pe fingerprint." Such
`devices include personal computers or any other type of computing devices or computers including those from
`Apple Computer, Inc. (hereinafter collectively PC). Each PC connected to the Internet may be configured slightly
`different and may possess identifiable characteristics distinguishing it from other devices which can be exploited by
`the invention. A more accurate PC fingerprint may be generally developed by considering a greater number of
`available computer related parameters. The Time Diff parameter may serve as part of a PC fingerprint for
`identifying a device which serves as a distinctive mark or characteristic about a particular user device. In addition to
`a Time Diff parameter, the flow of information exchanged during an Internet session may be captured and provide
`significant information about the user device on the other end. This type of information exchange considered by the
`invention is preferably invisible and transparent to users, and does not rely on user action or modification of online
`behavior. The Time Diffparameter may thus link incidents involving fraud, hacking, phishing etc. by automatically
`correlating information such as login data, computer data and customer data. For examp1e,by analyzing data sent
`from the user device, information about the device and browser used by an individual may be obtained such as a
`Browser ID, the Browserldevice IP address and the particular Browser language. By formulating a more accurate
`PC fingerprint, there is less like1ihoodofmistakenly associating a user with a fraudulent transaction (false positive)
`during e-commerce transactions, or failing to detect a fraudster. Other applications of the invention inc1udenational
`security and law enforcement whereby a computer can be uniquely identified in a manner simi1arto way thieves can
`be identified by a physical fingerprint. Accordingly, a PC fingerprint provided by the invention enables the ability
`to link and connect different online accounts and activity to a same device.
`[0027] The Time Diffparameter provided in accordance with the invention may be captured or measured during
`various selected moments of action during an Internet session such as the login step or procedure. Today it is
`estimated that medium to large e-commerce merchants and financial institutions receive over 5,000 orders per day
`for digital and shipped goods, and over 100,000 logins per day. Many Intemet Service Providers (ISPs) also
`manage accounts and user logins on an enormous scale also. This aspect ofthe invention can be applied to broader
`applications online to authenticate a user or uniquely identify a computer on the Internet in addition to e-commerce
`transactions and fighting fraud or identify theft. For example, the invention may be applied where a merchant or
`financial institution (FI) server resides in California, USA and a valid customer (Customer) who also normally
`
`o
`
`-5-
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`APPLE EXHIBIT 1005
`Page 6 of 39
`
`

`

`WO 2007/001394
`
`PCT/US2005/035532
`
`resid'~sikdlitorwa~;USI}X;:;;ljI{s1ril1::b~:ühcfMtoodthat the following examples below describe login procedures
`which could be modified according to the invention for any other selected moment of action during an Internet
`session such as logout procedures, when a user clicks a "submit" button within a user interface, or transmission of
`any other :informationbetween users onl:ine.
`[0028] During a "valid" login procedure, the Customer may initiate a login procedure from a web browser on a
`computer that registers a time according to its clock as follows: Time = 11:00 am 1Time Zone: GMT -8 and an IP
`address from the California region. Meanwhile, from the perspective of the FI, the recorded time at the FI server
`according to its respective clock may be: Time = 11:01 am 1Time Zone: GMT -8 and an IP address from the
`California region. It shall be understood that the invention may incorporate IP address locator tools which
`determine an identifier for an online device and its location based on geographie regions within a country or around
`the world. Upon analysis of this information from the Customer that may be reflected on a conceptual or actual
`Score Card, which can be ca1culatedand stored in memory within the server of the Flor any its other network
`computers, the FI can determine whether there is a match indicating a valid user login. Accordingly, the exchange
`of information in the above described example may be reflected as a match on or as a Score Card that measures the
`validity of the customer: Time Diff = Match 1 Time Zone = Match I IP = Match.
`[0029] During a "suspect" log:inprocedure, a Customer may initiate a log:inprocedure from a web browser on a
`computer that registers a time according to its clock as follows: Time = 10:02 pm 1Time Zone: GMT +3 and an IP
`address from a region in Russia. Meanwhile, from the perspective of an FI, the recorded time at the FI server
`according to its respective clock may be: Time = 11:01 am 1Time Zone: GMT -8 and an IP address again from its
`California region. Upon analysis ofthis information from the Customer in accordance with the invention, the Time
`Diff and Time Zone measurements as between the Customer and the FI are different from prior valid logins and
`therefore not a match. Furthermore, the IP address received by the Fr indicating a device outside ofthe California
`region would not be a match and further suggest an invalid login attempt by a fraudster or other unauthorized
`individual. The Score Card for this login example measuring the validity of the customer can thus show: Time Diff
`=No Match 1Time Zone = No Match / IP = No Match. The FI would be thus alerted that the alleged Customer
`attempting to login was likely invalid.
`[0030] During a "valid" login procedure from a Customer traveling with a computer and browser in London, the
`Customer may initiate a login procedure at a registered time according to its clock as folIows: Time = 11:00 pm /
`Time Zone: GMT -8 and an IP address from a region around London. Meanwhile, from the perspective of an FI, the
`recorded time at the FI server according to its respective clock rnay be: Time = 11:01 am/ Time Zone: GMT -8 and
`an IP address again from its California region. Upon analysis ofthis information from the Customer, the Time Diff
`and Time Zone measurements as between the Customer and the FI are the same as prior valid logins and therefore a
`match. While the IP address received by the FI indicating a device outside ofthe California region would not be a
`match and suggest an invalid login attempt, the comparison of the Time Diff and the Time Zone measurements
`would be a match. Because the Time Diffparameter provided in accordance with the invention can be used in
`combination with other fraud parameters for authentication and identification, a Score Card for this login example
`measuring the validity of the customer could still show a match nevertheless: Time Diff= Match 1Time Zone =
`Match 1IP = No Match.
`[0031] The Time Diffparameter provides fraud detection tools for online merchants, fmancial institutions and
`other parties conducting commerce on the Web. These tools can be applied to combat weIl recognized problems
`such as reducing the number offalse positives which reduce possible revenue from mistakenly identified valid users.
`Inaddition, Time Diffbased tools provide an effective solution to identifying and preventing fraud during the course
`
`-6-
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`3S
`
`40
`
`APPLE EXHIBIT 1005
`Page 7 of 39
`
`

`

`WO 2007/001394
`PCTIUS2005/035532
`ofin~ei:r\'ä'tidhäiailc'i)o~er~e'äs'fran~act'J.öffs"w'lf&rethere are significantly increased risks offraudulent activity.
`Accordingly, the Time Diff parameters herein allow the creation of a more accurate and relevant geo-location or PC
`fingerprint for many different types of online transactions around the world.
`[0032]
`1t shall be understood that the Time Diffparameters provided in accordance in this aspeet ofthe invention
`may be defined as the difference in the registered computer times as measured in any unit of time (e.g., hours,
`rninutes, seeonds, rnilliseconds, microseconds) between any seleeted computers either alone, or in combination with
`the Time Zone herein or any other temporal characteristics. Furthermore, as with other embodiments described
`herein, the eoncepts ofthe invention can be preferably applied to e-commeree transactions to deter or identify fraud
`but is not lirnited thereto and are equally applicable to any other online application to uniquely identify and link a
`computer device on the Internet according to a Time Diffparameter. While consideration ofTime Diffparameters
`alone may not be completely effeetive as with any solution against fraud, phishing ete., the PC fingerprinting
`methods and techniques provided herein enables effective link analysis between computer devices and eompromised
`accounts or any other transaction having or associated with a fraudulent past or history. By following and learning
`from historical incidents of security breaches and fraud, the invention ean quickly pinpoint repeat offenders and
`build a stronger defense against different criminal behavior or sehemes now known and those that will be developed
`in the future.
`[0033] Another embodiment ofthe invention provides adelta oftime (Delta Time) parameter that ean be
`calculated based on the local time as indicated through the browser of a dient computer (Browser Time) and the
`local time as determined at a server (Server Time) - also applicable in FIG. 2. The Delta Time may operate as a
`fmgerprint for a particular client computer or computer and assists in uniquely identifying it from other computers
`on the Internet or selected network. Bach Iocal time for any dient or server connected to the Internet or other
`network system ean be measured according to the clock for that particular device. The measured Delta Time
`parameter for any seleeted moment of action in accordance with the invention may be perceived as having two
`temporal components: an actual time and a time zone. For example, the measured local time at a dient site may
`include a Browser Time ofFebruary 1, 2005 14:00:00 PM, and a Browser Time Zone of GMT -8. The measured
`local time at a server site may inc1udea Server Time ofFebruary 1,200517:01:13 PM, and a Server Time Zone of
`GMT -5. The Delta Time as between the Browser Time and the Server Time, and the Browser Time Zone in
`comparison to the Server Time Zone, can be therefore calculated in accordance with the invention.
`[0034] A preferable embodiment ofthe invention provides a Delta Time or time differential which takes into
`consideration daylight saving time (DST) in selected time zones and countries around the world such as those
`identified in FIG. 3. In addition to collecting respective loeal times and time zones from clients or customer
`computers and website servers at a current selected date or moment of action, a website server or any other network
`computer can also capture information relating to particular time and time zones for selected (future or even past)
`dates. A selected Delta Time during DST (DST Delta Time) can be determined for a particular customer or client
`computer when the registered time for such other date is different than the current selected date. For example, the
`Delta Time value for such other date(s) can be +/- one hour

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket