Fraud monitoring program

A monitoring program and data technology, applied in the field of fraud monitoring programs, can solve problems such as difficult discovery by individual users and enterprises

Inactive Publication Date: 2021-03-09
詹春婷
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since it is unlikely that a website visitor or online advertiser has all the information needed to identify fraudulent content or fraudulent clicks, these forms of fraud can be difficult to detect by individual users and businesses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fraud monitoring program
  • Fraud monitoring program
  • Fraud monitoring program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010] figure 1 A management network 100 is conceptually illustrated having a fraud monitor 102 to detect fraudulent advertisements in the management network 100 and to respond to fraudulent advertisements, consistent with one embodiment disclosed. The figure illustrates data traffic on managed network 100 at the application level.

[0011] Hosted network 100 is a network managed by an Internet Service Provider (ISP). An ISP manages the operation of a network, configures and monitors its physical components (such as routers, switches), instruments data traffic, and collects other types of telemetry data from physical components throughout the network. Managed network 100 may be part of a cellular network managed by a cellular service provider. In some embodiments, the managed network is a self-organizing network (SON), implementing a functional set for automatic configuration, optimization, diagnosis and repair of cellular networks.

[0012] As shown, hosting network 100 co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A fraud monitoring procedure in a management network is provided. A fraud monitoring program uses meter data, configuration data, and account information of the network to detect fraudulent activitiesin the network, such as fraudulent advertisements or other types of fraudulent data traffic, including fraudulent responses (such as fraudulent clicks) to advertisers. A fraud monitor receives configuration data and identification data of the network physical resources. The fraud monitor receives instrument data of data packet flow in the network. The fraud monitoring program receives account information of a network user. The fraud monitor analyzes the instrumentation data to detect the violation of a fraud detection policy that prevents malicious or fraudulent online advertising campaign based on the configuration data, the identification data, or the account information.

Description

technical field [0001] The present invention relates to a fraud monitoring program that uses the network's instrumentation data, configuration data and account information to detect fraudulent activity in a hosted network. Background technique [0002] Fraud conducted online or on the Internet is a serious problem that harms both individual users and businesses. Legitimate websites are often filled with deceptive advertisements designed to solicit clicks for the providers of malicious content. Fraudsters can also employ click farms to automatically enter "visited" websites to inflate click statistics to defraud website operators, advertisers, or online advertising exchanges. Since it is unlikely that a website visitor or online advertiser has all the information needed to identify fraudulent content or fraudulent clicks, these forms of fraud can be difficult to detect by individual users and businesses. Contents of the invention [0003] Some embodiments of the invention...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1408H04L63/1466H04L63/20
Inventor 詹春婷
Owner 詹春婷
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products