US20100174660A1 - Methods and computer-readable media for facilitating forensic investigations of online transactions - Google Patents

Methods and computer-readable media for facilitating forensic investigations of online transactions Download PDF

Info

Publication number
US20100174660A1
US20100174660A1 US12/602,236 US60223607A US2010174660A1 US 20100174660 A1 US20100174660 A1 US 20100174660A1 US 60223607 A US60223607 A US 60223607A US 2010174660 A1 US2010174660 A1 US 2010174660A1
Authority
US
United States
Prior art keywords
transaction
identifier
user equipment
end user
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/602,236
Inventor
David William Clark
Stéphane Maxime François Fortier
Jean Bouchard
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BCE Inc
Original Assignee
BCE Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BCE Inc filed Critical BCE Inc
Assigned to BCE INC. reassignment BCE INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BOUCHARD, JEAN, CLARK, DAVID WILLIAM, FORTIER, STEPHANE MAXIME FRANCOIS
Publication of US20100174660A1 publication Critical patent/US20100174660A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/403Solvency checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud

Definitions

  • the present invention relates generally to online transactions and, more particularly, to methods and computer-readable media for maintaining records of online transactions so as to facilitate forensic investigations of such transactions.
  • the present invention seeks to provide a method, which comprises receiving a first identifier associated with an online transaction and a second identifier used by end user equipment involved in the online transaction; obtaining evidentiary information pertaining to the end user equipment based on the second identifier; storing in a database a record that associates the first identifier with the evidentiary information; and retrieving one of (i) the evidentiary information in said record and (ii) the first identifier in response to a request identifying the other of (i) the evidentiary information in said record and (ii) the first identifier.
  • the present invention seeks to provide a computer-readable medium comprising computer-readable program code which, when interpreted by a transaction management entity, causes the transaction management entity to execute a method.
  • the computer-readable program code comprises first computer-readable program code for causing the transaction management entity to be attentive to receipt of a first identifier associated with an online transaction and a second identifier used by end user equipment involved in the online transaction; second computer-readable program code for causing the transaction management entity to obtain evidentiary information pertaining to the end user equipment based on the second identifier; third computer-readable program code for causing the transaction management entity to store in a database a record that associates the first identifier with the evidentiary information; and fourth computer-readable program code for causing the transaction management entity to retrieve one of (i) the evidentiary information in said record and (ii) the first identifier in response to a request identifying the other of (i) the evidentiary information in said record and (ii) the first identifier.
  • the present invention seeks to provide a system comprising: a transaction record database comprising a plurality of records, each of said records relating a respective first identifier associated with an online transaction to respective evidentiary information pertaining to end user equipment involved in the online transaction; and a transaction management entity configured to respond to a request identifying one of (i) a given first identifier associated with a given online transaction and (ii) evidentiary information related by one of said records to a given first identifier by retrieving the other of (i) the given first identifier and (ii) the evidentiary information related thereto.
  • the present invention seeks to provide a method of investigating an online transaction associated with a transaction identifier.
  • the method comprises providing the transaction identifier to a transaction management entity; obtaining from the transaction management entity evidentiary information pertaining to the end user equipment involved in the online transaction associated with the transaction identifier; and comparing the evidentiary information to information associated with a transaction object used to effect the online transaction.
  • the present invention seeks to provide a method of identifying a suspect potentially responsible for effecting an online transaction associated with a transaction identifier.
  • the method comprises providing the transaction identifier to a transaction management entity; obtaining from the transaction management entity evidentiary information pertaining to the end user equipment involved in the online transaction associated with the transaction identifier; and identifying as a suspect a party associated with the evidentiary information.
  • the present invention seeks to provide a network entity for participating in an online transaction taking place over a network.
  • the network entity comprises a memory and a processing unit.
  • the processing unit is configured to obtain a transaction identifier associated with an online transaction and a logical identifier associated with end user equipment involved in the online transaction; store in said memory a record that relates said transaction identifier to said logical identifier; and transmit said transaction identifier and said logical identifier over the network to an entity responsible for storing a relationship between the transaction identifier and evidentiary information pertaining to end user equipment involved in said online transaction.
  • FIG. 1 shows an architecture allowing a user of end user equipment connected to a packet-switched network to access and interact with merchant sites of that network, for example, to make online transactions, in accordance with an embodiment of the present invention.
  • FIG. 2A shows possible contents of a database that stores information associated with various logical identifiers assigned to various end user equipment used to access the packet-switched network shown in FIG. 1 .
  • FIG. 2B shows possible contents of a transaction record database that stores records for various transactions that have been attempted or effected by various subscribers.
  • FIG. 3 shows an example of message flow in the architecture of FIG. 1 , in the context of attempting a transaction.
  • FIG. 4 shows an example of message flow following FIG. 3 once the transaction has been approved or denied, including an example flow of a message sent to a transaction management entity for further processing.
  • FIG. 5 shows an example of message flow during a forensic investigation of a transaction of interest.
  • FIGS. 6-8 are block diagrams and flow diagrams illustrating the example creation of an association between logical identifiers assigned to end user equipment and respective service point locations for that end user equipment, such association being useful in the population of the database of FIG. 2A .
  • FIG. 1 depicts a packet-switched network 14 to which are connected a plurality of merchant sites implemented by a plurality of servers 30 1 . . . 30 N .
  • Computing devices that gain access to the packet-switched network 14 can interact with the merchant sites in order to effect online transactions.
  • the packet-switched network 14 is the Internet and the merchant sites are web sites.
  • Access to the packet-switched network 14 is controlled or managed by a service provider that has a number of subscribers.
  • the service provider may be an Access Service Provider (ASP), a Regional Access Network Provider (RANP) or an Internet Service Provider (ISP).
  • ASP Access Service Provider
  • RTP Regional Access Network Provider
  • ISP Internet Service Provider
  • Individual subscribers are given permission to access the packet-switched network 14 when using certain authorized end user equipment and/or when providing certain authorized login credentials.
  • FIG. 1 shows one example of end user equipment 12 that may be used to access the packet-switched network 14 by a user 10 .
  • the end user equipment 12 comprises a computing device 16 and a network interface unit 18 .
  • the computing device 16 may be implemented as a personal computer (PC), such as a desktop computer, a laptop computer or a tablet PC.
  • the computing device 16 is provided with at least one input device such as a keyboard, a mouse, a touchscreen, a stylus, a microphone, etc., as well as a display and possibly one or more other output devices (e.g., speakers) that enable interaction with the user 10 .
  • input device such as a keyboard, a mouse, a touchscreen, a stylus, a microphone, etc.
  • output devices e.g., speakers
  • the computing device 16 is operative to run a software application implementing a network browser (e.g., a web browser) with which the user 10 can interact via the display (and possibly the one or more other output devices) and the at least one input device in order to access and interact with merchant sites of the packet-switched network 14 .
  • a network browser e.g., a web browser
  • a communication link 20 is provided between the end user equipment 12 and the packet-switched network 14 .
  • the network interface unit 18 interfaces with the communication link 20 and enables the computing device 16 to exchange data with the packet-switched network 14 (and, ultimately, with the merchant sites).
  • the network interface unit 18 may be implemented as a modem such as a broadband modem (e.g., a digital subscriber line (DSL) modem or a cable modem) or a narrowband modem (e.g., a dial-up modem).
  • the network interface 18 may be implemented as an optical network termination (ONT)-based Ethernet connection.
  • the network interface unit 18 may be integrated into the computing device 16 (e.g., it may be a card internal to the computing device 16 ).
  • the communication link 20 may traverse one or more network elements and comprise one or more physical links and one or more logical links.
  • the communication link 20 may comprise a physical link 17 between the network interface unit 18 and a network element 21 .
  • the physical link 17 may comprise a copper twisted pair, a coax cable, an Ethernet link, a fiber optic link (e.g., fiber to the premises (FTTP)), a fixed wireless link, a satellite link, or a combination thereof.
  • the network element 21 may be a DSL access multiplexer (DSLAM), a cable modem termination system (CMTS), or another type of network element.
  • DSL access multiplexer DSL access multiplexer
  • CMTS cable modem termination system
  • the communication link 20 may also comprise a dedicated logical link 19 between the network element 21 and another network element 23 that provides access to the packet-switched network 14 .
  • the network element 23 may be a network access server (NAS), a router, etc. It will be appreciated that the communication link 20 may take on other forms in other embodiments.
  • the end user equipment 12 may be assigned a logical identifier.
  • the logical identifier may be assigned to the computing device 16 or to the network interface unit 18 .
  • the logical identifier which can be an Internet Protocol (IP) address (e.g., in compliance with IPv4 or IPv6) or a proprietary address, label or tag, can be assigned in a static or dynamic fashion.
  • IP Internet Protocol
  • the static case e.g., a static IP address
  • the logical identifier does not change over time.
  • the logical identifier may change over time (e.g., a dynamic IP address).
  • Assignment of the logical identifier to the end user equipment 12 can be effected under control of the service provider and may be the responsibility of a designated network element that is part of the communication link 20 , such as the network element 23 (particularly in embodiments where the network element 23 is a network access server).
  • the designated network element may assign the logical identifier to the end user equipment 12 when the end user equipment 12 is activated (e.g., when the network interface unit 18 and/or the computing device 16 is/are powered-up) or otherwise regains network connectivity and/or at certain time intervals which may range from an hour or less to several months or more.
  • the network element assigning the dynamic IP address to the end user equipment 12 may do so in accordance with the Dynamic Host Configuration Protocol (DHCP) using a pool of IP addresses accessible to that network element.
  • DHCP Dynamic Host Configuration Protocol
  • assignment of the logical identifier to the end user equipment 12 may be effected in different ways in different embodiments.
  • the service provider maintains a database 36 that stores information associated with the various logical identifiers assigned to various end user equipment used to access the packet-switched network 14 .
  • the database 36 can be linked to various components of the infrastructure of FIG. 6 in different ways.
  • the database 36 may be integrated with the network element 23 .
  • the database 36 may be connected to the network element 23 either directly or via a service provider network 86 , for example.
  • the database 36 may be distributed amongst a plurality of network elements and/or physical locations.
  • the database 36 may be managed, maintained and/or updated by an entity that may be the same entity as, or a different entity from, the service provider responsible for providing the end user equipment 12 with access to the packet-switched network 14 .
  • the database 36 stores a plurality of records 40 1 . . . 40 M for respective logical identifiers assigned to various end user equipment being used to access the packet-switched data network 14 .
  • the record for a particular logical identifier contains “evidentiary information” pertaining to the end user equipment to which the particular logical identifier was assigned.
  • Evidentiary information can be viewed as information that can serve as evidence towards establishing who has attempted/effected an online transaction and/or where that online transaction was attempted/effected from.
  • the value of evidentiary information can be high when investigating online transactions, particularly days or weeks after they have taken place.
  • Such analysis may be commissioned by, inter alia, financial institutions (such as banks, credit card companies, etc.), as well as government bodies (such as law enforcement agencies, taxation departments, etc.).
  • the evidentiary information that can be contained in a given one of the records 40 1 . . . 40 M is not particularly limited and may take on various forms, some of which are best illustrated by way of example.
  • a first example of evidentiary information that can be contained in the record for a given logical identifier includes information (such as name, age, gender, etc.) regarding a particular subscriber whose credentials were supplied via the end user equipment to which the given logical identifier was assigned, when access to the packet-switched network 14 was sought.
  • a second example of evidentiary information that can be contained in the record for a given logical identifier includes location information indicative of where the end user equipment to which the given logical identifier was assigned was located, when access to the packet-switched network 14 was sought.
  • location information may specify a “service point” at which the end user equipment was determined to be located.
  • the “service point” refers to a point where a network access service is provided to a subscriber by the service provider.
  • the service point may be a house or other building, or an area thereof.
  • the location of the service point which is hereinafter referred to as the “service point location”, may be expressed as a geo location (latitude, longitude, elevation, and the datum which identifies the coordinate system used, such as, without limitation, the World Geodetic System 1984 (WGS841) datum).
  • the service point location may be expressed as a civic location (a set of elements that describe detailed street address information). Still other possibilities exist and are within the scope of the invention.
  • the servers 30 1 . . . 30 N and the merchant sites that they implement are operated, managed or otherwise associated with various entities, including, for example, companies, governmental organizations, non-profit organizations, and individuals.
  • Each of the servers 30 1 . . . 30 N comprises suitable hardware, firmware, software, control logic, or a combination thereof for implementing a plurality of functional components, including an interface and a processing unit.
  • each of the servers 30 1 . . . 30 N is adapted to receive messages from, and send messages to, communication equipment (such as the end user equipment 12 ) connected to the packet-switched network 14 , as well as to receive data from, or send data to, other elements (e.g., computers or databases) communicatively coupled to that server but not necessarily connected to the packet-switched network 14 .
  • communication equipment such as the end user equipment 12
  • other elements e.g., computers or databases
  • each of the servers 30 1 . . . 30 N is adapted to effect various processing operations to implement that server's functionality. For example, when the user 10 uses the end user equipment 12 to interact with a given merchant site implemented by a given one of the servers 30 1 . . . 30 N , this will typically involve the network browser implemented by the computing device 16 interacting with the given one of the servers 30 1 . . .
  • the user 10 in order to allow the user 10 to view, hear or otherwise be exposed to content (e.g., web pages) of the given merchant site via the display and/or one or more other output devices of the computing device 16 , and to input information (e.g., by entering text, selecting an option, etc.) and/or one or more commands (e.g., by clicking on a graphical button or a hyperlink) via the at least one input device of the computing device 16 .
  • content e.g., web pages
  • input information e.g., by entering text, selecting an option, etc.
  • one or more commands e.g., by clicking on a graphical button or a hyperlink
  • each of the servers 30 1 . . . 30 N includes or has access to a corresponding memory 90 .
  • the memory 90 corresponding to a given one of the servers 30 1 . . . 30 N stores an association between, on the one hand, logical identifiers used by various end user equipment to effect transactions with the given one of the servers 30 1 . . . 30 N and, on the other hand, “transaction identifiers” for those transactions.
  • the contents of the memory 90 corresponding to a given server are kept up to date as new transactions are effected with the given server.
  • a “transaction identifier” for a particular transaction may be generated by an entity involved in validating or otherwise processing the particular transaction.
  • entity includes a payment gateway 60 .
  • the payment gateway 60 is a network element that is connected to a financial network 68 and that is used by one or more of the servers 30 1 . . . 30 N to process online transactions attempted to be made via the merchant sites implemented by those one or more servers.
  • the financial network 68 interconnects a plurality of servers or other computers associated with banks and/or other financial institutions. Examples of servers that could be interconnected via the financial network 68 include a transaction validation server 51 that could be associated with, for example, a card issuing bank and a server 70 that could be associated with, for example, an acquiring bank. It should be appreciated that in certain embodiments, the financial network 68 may be part of the packet-switched network 14 , may comprise individual point-to-point links or may be dispensed with altogether.
  • the transaction validation server 51 may be connected to the various servers 30 1 . . . 30 N (or computers associated with those servers) via respective communication paths established over the packet-switched network 14 and the financial network 68 and which may traverse one or more network elements such as gateways and other servers.
  • the transaction validation server 51 is operated, managed or otherwise associated with an entity responsible for validating online transactions. In a specific non-limiting embodiment, this entity may be a card issuing bank that issues credit cards or debit cards.
  • the transaction validation server 51 comprises suitable hardware, firmware, software, control logic, or a combination thereof for implementing a plurality of functional components, including an interface and a processing unit.
  • the interface of the transaction validation server 51 is adapted to receive messages from and send messages to other servers and/or other computers, and to exchange data with other elements (e.g., databases).
  • the processing unit of the transaction validation server 51 is adapted to effect various processing operations to implement that server's functionality.
  • the transaction validation server 51 includes or has access to a database 53 , which stores information used by the transaction validation server 51 to validate online transactions attempted to be effected by various users. Accordingly, the database 53 stores a plurality of records, each of which is associated with a respective “transaction object” and contains “transaction object information” pertaining to the respective transaction object, as well as ancillary information that may be required to process an online transaction attempted to be made using the respective transaction object.
  • a “transaction object” refers to any physical or virtual object designed to be used in an attempt to make a transaction.
  • a transaction object may constitute a payment card (e.g., a credit card, a debit card, etc.), an account (e.g., a bank account, an online wallet account, login credentials for accessing secure content or a VPN, etc.), an electronic check, a set of one or more digital cash (electronic money) certificates, or any other physical or virtual object designed to be used in an attempt to make a transaction.
  • the transaction object information can therefore take on various forms.
  • the transaction object information may include payment card information regarding a payment card in situations where, for instance, the user 10 desires to purchase or otherwise obtain a product/service/content offered on a network site, pay a bill for a previously obtained product/service/content via the network site, or make a donation to a charity or other institution through the network site using the payment card.
  • payment card information may be, for instance, credit card information regarding a credit card (e.g., a number, expiry date, and/or holder's name) or debit card information regarding a debit card (e.g., a number and/or holder's name).
  • the payment card may comprise one or more card elements adapted to convey part or all of the payment card information, such as one or more sets of characters (e.g., printed and/or embossed characters), a magnetic stripe, and/or a chip (e.g., an EMV chip).
  • a card element adapted to convey part or all of the payment card information, such as one or more sets of characters (e.g., printed and/or embossed characters), a magnetic stripe, and/or a chip (e.g., an EMV chip).
  • the transaction object information may include electronic check information regarding an electronic check (e.g., a check number and/or a checking account number) in situations where, for instance, the user 10 desires to effect a payment via a network site using the electronic check.
  • an entity e.g., a bank or other financial institution, or the service provider
  • a computer-readable medium e.g., as part of a database
  • the transaction object information may include digital cash information regarding a set of one or more digital cash certificates (e.g., digital cash certificate identifiers) in situations where, for instance, the user 10 desires to effect a payment via a network site using the set of one or more digital cash certificates.
  • an entity e.g., a bank or other financial institution
  • an entity e.g., a bank or other financial institution
  • an entity e.g., a bank or other financial institution
  • an entity e.g., a bank or other financial institution
  • a computer-readable medium e.g., as part of a database
  • the transaction object information may include account information regarding an account (e.g., an account number and/or holder's name and/or login credentials) in situations where, for instance, the user 10 desires to effect a transfer of funds to or from the account via a network site, or where the user 10 desires to access secure online content or a VPN via the network site.
  • an entity e.g., a bank or other financial institution, a corporate extranet server
  • a computer-readable medium e.g., as part of a database
  • the ancillary information contained in a particular record of the database 53 also depends on the nature of the transaction object associated with the particular record and can thus take on many forms.
  • the ancillary information contained in the particular record may include a credit limit, a balance due, a billing address (i.e., an address where credit card bills are to be sent), a shipping address, a list of recent transactions, a list of one or more authorized transaction points (which could include the billing address and/or the shipping address), a list of one or more unauthorized transaction points, a spatio-temporal history of previous online transactions attempted using that credit card, a list of eligible card holders' names and/or possibly other information regarding the credit card.
  • the service provider maintains a transaction management entity 80 including or having access to a transaction record database 82 .
  • the transaction management entity 80 provides entities such as merchant sites, banks and credit card companies with a centralized point to which information regarding effected transactions can be sent.
  • the transaction management entity 82 may be reachable via the packet-switched network 14 and the service provider network 86 , or via a direct connection to one or more of the above entities.
  • the contents of the transaction record database 82 are thus continuously updated based on information about transactions taking place in the packet-switched network 14 , as received from a variety of sources.
  • the transaction record database 82 stores a plurality of records 84 1 . . . 84 T for various transactions that have been attempted/effected by various subscribers.
  • the manner in which the transaction record database 82 is populated will be described later on in greater detail.
  • a new record in the transaction record database 82 is created upon receipt of a transaction identifier and a logical identifier from an entity (such as a merchant site, bank or credit card company) having recorded an attempt to effect a transaction.
  • the transaction identifier can be used to index the new record, while the logical identifier can be used to look up one or more elements of evidentiary information by consulting the database 36 .
  • the one or more elements of evidentiary information returned from the database 36 are stored in the record that has just been created in the transaction record database 82 for the transaction in question.
  • the transaction record database 82 may be populated, consider the situation where the user 10 decides to effect an online transaction with the merchant site implemented by the server 30 n .
  • the user 10 may decide to: purchase or otherwise obtain a product and/or a service and/or content offered on the merchant site; pay a bill for a previously obtained product/service/content via the merchant site; transfer funds from one account to another via the merchant site; buy or sell securities (e.g., stocks, bonds, etc.) via the merchant site; make a donation to a charity or other institution through the merchant site; etc.
  • securities e.g., stocks, bonds, etc.
  • the user 10 has used the end user equipment 12 to successfully gain access to the packet-switched network 14 , and that the end user equipment 12 has been assigned a logical identifier, say 211.104.103.102.
  • Successful access to the packet-switched network 14 may have been gained by the user 10 having provided the credentials of a legitimate subscriber, say, subscriber “ABC”, via the end user equipment 12 .
  • the database 36 stores a record 40 X for logical identifier 211.104.103.102, which contains evidentiary information, such as the identity of subscriber “ABC” (or other personal information pertaining to subscriber “ABC”).
  • the service provider determines a service point location (say, “15 Main Street”) associated with the end user equipment 12 and stores this information in the record 40 X .
  • a service point location say, “15 Main Street”
  • the service point location associated with the end user equipment 12 can be determined is described in greater detail later on.
  • the user 10 provides transaction object information via the end user equipment 12 .
  • This can be done in various ways.
  • the user 10 may use one or more of the at least one input device of the computing device 16 to enter the transaction object information and cause this information to be sent by the end user equipment 12 to the server 30 n (or another computer associated with the server 30 n ) over the packet-switched network 14 .
  • the transaction object information may have been previously stored in the computing device 16 , in which case the user 10 may use one or more of the at least one input device of the computing device 16 to cause the end user equipment 12 to send the previously stored transaction object information to the server 30 n (or another computer associated with the server 30 n ) over the packet-switched network 14 .
  • the transaction object is a particular credit card
  • the transaction object information is credit card information regarding the particular credit card
  • the transaction validation server 51 is a server associated with a card issuing bank that issued the particular credit card.
  • each of the records in the database 53 is associated with a credit card and includes credit card information regarding that credit card.
  • One of these records may be associated with the particular credit card and thus may include credit card information regarding the particular credit card.
  • the online transaction attempted to be effected by the user 10 may be subjected to various conventional security measures intended to protect information traveling to and from the end user equipment 12 over the packet-switched network 14 .
  • the credit card information provided by the user 10 via the end user equipment 12 may be encrypted (e.g., using the Secure Socket Layer (SSL) protocol) prior to being sent over the packet-switched network 14 .
  • SSL Secure Socket Layer
  • card security code (CSC) verification may be employed whereby the user 10 is asked to enter the credit card's CSC
  • AVS address verification systems
  • Various other security measures may be employed in different cases.
  • the computing device 16 of the end user equipment 12 transmits to the server 30 n a message 102 .
  • the message 102 conveys: (i) order information indicative of the selected product/service/content; (ii) purchase amount information indicative of an amount to be paid to purchase the selected product/service/content; and (iii) the credit card information regarding the particular credit card.
  • the order information, the purchase amount information and possibly even the credit card information may already be known to the server 30 n due to prior interaction between the computing device 16 and the server 30 n .
  • the message 102 may simply convey an indication or confirmation of a desire of the user 10 to purchase the selected product/service/content.
  • the message 102 may also convey the logical identifier assigned to the end user equipment 12 , in this case 211.104.103.102.
  • the logical identifier assigned to the end user equipment 12 may not be conveyed by the message 102 but may already be known to the server 30 n due to prior interaction between the computing device 16 and the server 30 n .
  • the message 102 is received at the server 30 n , which proceeds to send a message 104 to a payment gateway 60 .
  • the payment gateway 60 is used by the server 30 n to process online transactions attempted to be made via the merchant site implemented by the server 30 n .
  • the manner in which the payment gateway 60 can be reached may be known in advance to the server 30 n .
  • the financial network 68 interconnects the payment gateway 60 to the transaction validation server 51 (which is associated with the card issuing bank that issued the particular credit card) and the server 70 (which is associated with the acquiring bank used by the merchant that operates, manages or is otherwise associated with the server 30 n ).
  • the message 104 sent to the payment gateway 60 may be identical to the message 102 , i.e., it may be a relayed version of the message 102 when the message 102 contains sufficient information.
  • the message 104 may be generated by the server 30 n based on the message 102 and possibly other information known to the server 30 n (e.g., the order information, the purchase amount information and/or the credit card information).
  • the message 104 conveys: (i) the purchase amount information indicative of an amount to be paid to purchase the selected product/service/content; and (ii) the credit card information regarding the particular credit card.
  • the message 104 is received at the payment gateway 60 which, in accordance with a specific non-limiting embodiment of the present invention, proceeds to generate a unique transaction identifier for the particular transaction being attempted.
  • the transaction identifier be A 7 GH 6 X .
  • the payment gateway 60 proceeds to send a message 106 over the financial network 68 to the server 70 (which, it is recalled, is associated with the acquiring bank used by the merchant associated with the server 30 n ).
  • the message 106 which can be viewed as a request for transaction authorization, is intended to elicit from the financial network 68 a response as to whether the transaction identified by the transaction identifier A 7 GH 6 X is approved or denied.
  • the payment gateway 60 generates the message 106 based on the message 104 such that the message 106 conveys: (i) the purchase amount information indicative of an amount to be paid to purchase the selected product/service/content; and (ii) the credit card information regarding the particular credit card.
  • the transaction identifier A 7 GH 6 X may also be provided to facilitate processing.
  • the server 70 receives the message 106 and processes it to gain knowledge that an attempt is being made to effect a transaction having the transaction identifier A 7 GH 6 X and involving the merchant associated with the server 30 n . Based on the credit card information conveyed by the message 106 , the server 70 proceeds to send a message 108 to the transaction validation server 51 over the financial network 68 .
  • the message 108 may be identical to the message 106 , i.e., it may be a relayed version of the message 106 . Alternatively, the message 108 may be generated by the server 70 based on the message 106 and possibly other information known to the server 70 .
  • the message 108 conveys: (i) the purchase amount information indicative of an amount to be paid to purchase the selected product/service/content; and (ii) the credit card information regarding the particular credit card.
  • the transaction identifier A 7 GH 6 X may also be provided to facilitate processing.
  • the message 108 is received at the transaction validation server 51 , which is associated with the card issuing bank that issued the particular credit card that has been used by the user 10 to attempt to purchase the selected product/service/content.
  • the transaction validation server 51 proceeds to process the message 108 to determine whether the transaction identified by the transaction identifier A 7 GH 6 X is to be approved or denied. To this end, the transaction validation server 51 consults the database 53 to identify a particular one of the records therein for the credit card information conveyed by the message 108 .
  • the transaction validation server 51 may perform various processing operations to determine whether the transaction identified by the transaction identifier A 7 GH 6 X is to be approved or denied. For example, based on the ancillary information (e.g., a credit limit, a balance due, etc.) included in the particular one of the records in the database 53 and the purchase amount information conveyed by the message 108 , the transaction validation server 51 may determine whether the transaction identified by the transaction identifier A 7 GH 6 X is to be approved or denied. It will be appreciated that approval or denial of the transaction identified by the transaction identifier A 7 GH 6 X may be determined by the transaction validation server 51 based on other factors in addition to or instead of those mentioned above.
  • ancillary information e.g., a credit limit, a balance due, etc.
  • the transaction validation server 51 upon determining whether the transaction identified by the transaction identifier A 7 GH 6 X is approved or denied, the transaction validation server 51 returns a message 114 to the server 70 over the financial network 68 .
  • the message 114 indicates whether the transaction identified by the transaction identifier A 7 GH 6 X was approved or denied.
  • the message 114 may indicate (e.g., by a code) a reason for this denial, such as insufficient funds, an unavailable bank link, etc.
  • the transaction validation server 51 may also take further action, such as freezing a credit account corresponding to the particular credit card, informing security/law enforcement authorities, etc.
  • the transaction validation server 51 may update, in the database 53 , the record associated with the particular credit card to take into account approval of this transaction.
  • ancillary information e.g., a balance due, an available credit, etc.
  • the record in question may be updated to reflect the fact that the transaction identified by the transaction identifier A 7 GH 6 X was approved.
  • the server 70 receives the message 114 , and processes it to determine whether the transaction identified by the transaction identifier A 7 GH 6 X was approved or denied. If approved, the transaction identified by the transaction identifier A 7 GH 6 X is eventually settled via a settlement process involving the acquiring bank and the card issuing bank. This settlement process is well known and thus not described herein. Meanwhile, the server 70 proceeds to return a message 116 to the payment gateway 60 .
  • the message 116 may be identical to the message 114 , i.e., it may be a relayed version of the message 114 . Alternatively, the message 116 may be generated by the server 70 based on the message 114 .
  • the message 116 indicates whether the transaction identified by the transaction identifier A 7 GH 6 X was approved or denied and, if denied, may indicate a reason therefor.
  • the message 116 is received at the payment gateway 60 , which proceeds to send a message 118 to the server 30 n .
  • the message 118 indicates whether the transaction identified by the transaction identifier A 7 GH 6 X was approved or denied and, if denied, may indicate a reason therefor.
  • the information conveyed by the message 118 issued by the payment gateway includes the transaction identifier A 7 GH 6 X.
  • the server 30 n receives the message 118 , including the transaction identifier A 7 GH 6 X .
  • the server 30 n processes the message 118 to ascertain whether the transaction identified by the transaction identifier A 7 GH 6 X was approved or denied. Approval or denial (and a reason for denial, if applicable) may be recorded by the server 30 n , for future reference.
  • the server 30 n proceeds to send a message 120 to the computing device 16 of the end user equipment 12 in order to communicate approval or denial of the online transaction to the user 10 .
  • the computing device 16 Upon receiving the message 120 , the computing device 16 processes the message 120 so as to communicate approval or denial of the online transaction to the user 10 . For example, this may be achieved by displaying a “transaction approved” or “transaction denied” message (or any conceivable variant thereof) on the display of the computing device 16 .
  • the server 30 n stores the transaction identifier received with the message 118 (in this case A 7 GH 6 X ) in association with the logical identifier assigned to the end user equipment 12 used to effect the transaction in question (in this case 211.104.103.102). This can be done by creating a record in the memory 90 .
  • the stored association between the transaction identifier A 7 GH 6 X and the logical identifier 211.104.103.102 may prove valuable when it comes to launching a possible investigation into potential fraudulence of illegality of the transaction identified by the transaction identifier A 7 GH 6 X.
  • the server 30 n generates a message 121 that is sent to the transaction management entity 80 .
  • the message 121 can be sent to the transaction management entity 80 over the packet-switched network 14 or over a dedicated link, for example.
  • the message 121 contains the aforementioned information that was stored in the memory 90 of the server 30 n , namely (i) the transaction identifier A 7 GH 6 X for the transaction in question and (ii) the logical identifier 211.104.103.102 assigned to the end user equipment 12 that was used to effect the transaction in question.
  • the association between the transaction identifier A 7 GH 6 X and the logical identifier 211.104.103.102 need no longer be maintained in the memory 90 of the server 30 n .
  • the transaction management entity 80 is attentive to receipt of the message 121 , upon receipt of which the transaction management entity 80 extracts therefrom the transaction identifier A 7 GH 6 X and the logical identifier 211.104.103.102.
  • the transaction management entity 80 queries the database 36 on the basis of the received logical identifier 211.104.103.102 to obtain evidentiary information contained in the record associated with the logical identifier 211.104.103.102.
  • the evidentiary information may take on various forms, such as a subscriber identity or other personal information and/or a service point location, to name a few non-limiting possibilities.
  • record 40 X in the database 36 which is associated with the logical identifier 211.104.103.102, stores the identity of subscriber “ABC” and the service point location “15 Main Street”.
  • the transaction management entity 80 then creates a new record 84 j in the transaction record database 82 , which relates the transaction identifier A 7 GH 6 X received from the server 30 n to the evidentiary information (the identity of subscriber “ABC” and the service point location “15 Main Street”) received from the database 36 .
  • the records 84 1 . . . 84 T in the transaction record database 82 thus relate timely obtained evidentiary information to transaction identifiers.
  • the evidentiary information can then be provided at some later time to an interested party in response to an eventual request from the latter specifying a particular one of these transaction identifiers.
  • the investigation proceeds with an interested party 500 (such as a merchant, a bank, a credit card company, a law enforcement agency, a governmental body, etc.) identifying the particular transaction identifier associated with the transaction of interest.
  • the interested party 500 may send a message 502 to the transaction management entity 80 specifying the particular transaction identifier.
  • the message 502 may reach the transaction management entity 80 via the packet-switched network 14 and the service provider network 86 .
  • the message 502 may reach the transaction management entity 80 via a direct link from the interested party 500 .
  • the transaction management entity 80 consults the transaction record database 82 in an attempt to match the particular transaction identifier with the transaction identifier stored in one of the records 84 1 . . . 84 T . If a match is not found, then the service provider has not stored a record of this transaction having taken place, and the interested party may wish to query other service providers who may have provided a conduit for the transaction of interest.
  • the corresponding evidentiary information (or a portion thereof) is retrieved from the transaction record database 82 and provided to the interested party in the form of a message 504 .
  • the level of detail provided in the message 504 could vary depending on the relationship between the interested party and the service provider. Thus, it is within the scope of the present invention to allow a law enforcement agency to be privy to a greater amount of detail concerning the evidentiary information than a credit card company.
  • the evidentiary information may reveal to the interested party certain details about the culprit. For example, when the evidentiary information provided in the message 504 comprises a service point location, then the interested party may conclude where the fraudulent transaction of interest was made from. In another example, when the evidentiary information provided in the message 504 comprises the identity of a particular subscriber, then the interested party may conclude who is guilty of having effected the transaction of interest.
  • Other example scenarios are of course possible, and each may lead to specific actions that may be taken by the interested party to identify and then pursue and/or prosecute the culprit, as will be appreciated by those skilled in the art.
  • the evidentiary information may reveal to the interested party that the transaction of interest has a likelihood of having been illegal or fraudulent.
  • the evidentiary information provided in the message 504 comprises a service point location, and if the particular credit card is authorized to be at any of a limited set of locations which do not include the service point location provided in the message 504 , the interested party may conclude that the transaction of interest was fraudulent.
  • the evidentiary information provided in the message 504 comprises the identity of a particular subscriber, and if the particular subscriber is found to be or is registered as being of a certain age, the interested party may conclude that the transaction of interest was illegal.
  • Other example scenarios are of course possible, and each may lead to specific actions that may be taken by the interested party to further investigate the issue of fraud, as will be appreciated by those skilled in the art.
  • the message 502 may contain target evidentiary information, such as a specific user or a specific location.
  • the transaction management entity 80 consults the transaction record database 82 in an attempt to match the target evidentiary information with the evidentiary information stored in one or more of the records 84 1 . . . 84 T . Assuming that a matching record is identified, the corresponding transaction identifier(s) is(are) retrieved from the transaction record database 82 and provided to the interested party in the form of the message 504 .
  • this application of an embodiment of the present invention allows the interested party to access transaction identifiers pertaining to all the transactions having been effected by that suspect (or from a specific location associated with that suspect). These transaction identifiers can be related to the actual transactions and analyzed for fraudulent activity in order to help establish the innocence or guilt of the suspect.
  • the transaction management entity 80 receives a request containing “evidentiary information of interest”. Then, at the time when a transaction (such as the aforesaid transaction identified by the transaction identifier A 7 GH 6 X ) is effected, the transaction management entity 80 checks the evidentiary information against the target evidentiary information and, if there is a match, the interested party can be alerted by sending the corresponding transaction identifier. The interested party then relates the transaction identifier to the transaction and establishes legitimacy/legality of the transaction.
  • the transaction identifier A 7 GH 6 X was generated by the payment gateway 60 upon receipt of the message 104 , and was relayed to the server 30 n as part of the message 118 .
  • the transaction identifier A 7 GH 6 X may have been generated by the payment gateway 60 later on in the transaction validation, such as upon receipt of the message 116 from the server 70 .
  • the transaction identifier A 7 GH 6 X could have been generated by other network entities involved in processing of the transaction and at various instances, such as:
  • the payment gateway 60 , the server 70 , the transaction validation server 51 and the server 30 n have been described as separate entities, this has been done for convenience and illustration only. It should therefore be understood that in certain embodiments, any one or more of the payment gateway 60 , the server 70 , the transaction validation server 51 and the server 30 n may be integrated into a single network entity or component.
  • the relationship between the transaction identifier A 7 GH 6 X and the logical identifier 211.104.103.102 was maintained by the server 30 n in its memory 90 and then was sent to the transaction management entity 80 .
  • this relationship may be maintained by other entities of interest prior to being sent to the transaction management entity 80 , such as:
  • the transaction management entity 80 may transmit the retrieved evidentiary information along with the corresponding transaction identifier A 7 GH 6 X to the law enforcement agency's Internet server for storage thereon.
  • the evidentiary information that can be contained in the record for a given logical identifier may include location information indicative of where the end user equipment to which the given logical identifier was assigned was located when access to the packet-switched network 14 was sought.
  • An example process by which the database 36 may be populated with such location information will now be described with reference to FIG. 6 .
  • this example description will illustrate one possible manner by which an association between the logical identifier assigned to the end user equipment 12 and the location of a service point where the end user equipment 12 is located (e.g., “15 Main Street”), may be stored in the database 36 as part of one of the records 40 1 . . . 40 M .
  • the network element 21 of the communication link 20 connecting the end user equipment 12 to the packet-switched network 14 is an access multiplexer.
  • the access multiplexer 21 may be a DSLAM.
  • the access multiplexer 21 is connected to the network element 23 , which, in this embodiment, is a network access server (NAS).
  • the NAS 23 which may also sometimes be referred to as a broadband remote access server (BRAS), a remote access server (RAS) or a broadband access server (BAS), provides access to the packet-switched network 14 . Communication between the access multiplexer 21 and the NAS 23 can take place over the dedicated logical link 19 between these elements.
  • BRAS broadband remote access server
  • RAS remote access server
  • BAS broadband access server
  • the dedicated logical link 19 which may traverse an intervening access data network (not shown), can be implemented in various ways.
  • the dedicated logical link 19 may be implemented as an asynchronous transfer mode (ATM) permanent virtual circuit (PVC).
  • ATM asynchronous transfer mode
  • PVC permanent virtual circuit
  • VLAN virtual local area network
  • the access multiplexer 21 allows data arriving from the NAS 23 along given ATM PVCs, VLANs or other dedicated logical links to be sent over corresponding physical links via corresponding one of its ports, and vice versa.
  • the access multiplexer 21 can be said to implement a mapping 134 between, on the one hand, dedicated logical links and, on the other, ports of the access multiplexer 21 .
  • the mapping 134 implemented by the access multiplexer 21 relates the dedicated logical link 19 to the port 104 of the access multiplexer 21 .
  • the mapping 134 can be maintained by the access multiplexer 21 .
  • the mapping 134 can be maintained by an operation support system (OSS) 122 .
  • the OSS 122 represents a collection of systems that perform management, inventory, engineering, planning, repair and other functions for a service provider.
  • the OSS 122 may be connected to the NAS 23 via the service provider network 86 .
  • One of the functions of the OSS 122 may include management of network elements, assets and equipment.
  • the OSS 122 maintains a mapping 124 between, on the one hand, ports of various access multiplexers or other network elements under control of the service provider and, on the other, service point locations of end user equipment (such as the end user equipment 12 ) connected to those ports.
  • the mapping 124 maintained by the OSS 122 relates a port 104 of the network element 21 to a service point location, i.e., the location of a service point where the end user equipment 12 is located.
  • this service point location may be expressed as a civic address, a geo location, or any other information identifying where the service point is located. In this specific example, it is assumed that the service point location is “15 Main Street”.
  • the infrastructure shown in FIG. 6 further comprises an authorization element 142 , which can be connected to the NAS 23 via the service provider network 86 .
  • the authorization element 142 may be a server (e.g., an Authentication, Authorization, and Accounting (AAA) server) responsive to queries from the NAS 23 .
  • AAA Authentication, Authorization, and Accounting
  • the authorization element 142 and the NAS 23 may communicate using the Remote Authentication Dial In User Service (RADIUS) protocol, a description of which is available at www.ietf.org/rfc/rfc2865.txt.
  • the authorization element 142 may be a functional element integrated with the NAS 23 .
  • the NAS 23 is operative to maintain a pool 127 of pre-allocated logical identifiers that can be used by various end user equipment, including the end user equipment 12 .
  • the pool 127 of logical identifiers may be built up as a cooperative effort between the NAS 23 and the OSS 122 , while in other embodiments, it may not be necessary for the OSS 122 to be involved in creating the pool 127 of logical identifiers.
  • the pool 127 of logical identifiers may be maintained by the authorization element 142 , and may be made accessible to the authorization element 142 without needing to pass through the NAS 23 .
  • the access multiplexer 21 can be omitted. This may be true in embodiments where the end user equipment 12 implements a wireless access point.
  • the connection between the wireless access point and the NAS 23 may be provided by a dedicated point-to-point link.
  • the dedicated logical link 19 instead of the dedicated logical link 19 , there may be a shared link leading to the end user equipment 12 .
  • FIG. 7 illustrates an example of a possible event flow upon activation of the end user equipment 12 , which may occur, for instance, as the network interface unit 18 and/or the computing device 16 of the end user equipment 12 is/are powered up. Thereafter:
  • the NAS 23 assigns the logical identifier 193 to the dedicated logical link 19 .
  • the fact that the NAS 23 assigns the logical identifier 193 to the dedicated logical link 19 allows the NAS 23 to construct and maintain a mapping 144 between, on the one hand, various dedicated logical links (such as the dedicated logical link 19 and others) and, on the other, logical identifiers corresponding to those dedicated logical links.
  • the logical identifier 193 and the identity of the dedicated logical link 193 to which it is assigned are sent back by the NAS 23 to the authorization element 142 , and it is the authorization element 142 that maintains the aforementioned mapping 144 between dedicated logical links and logical identifiers corresponding to those dedicated logical links.
  • mappings 124 , 134 maintained in the OSS 122 and/or the access multiplexer 21 and the previously described mapping 144 maintained in the NAS 23 or the authorization element 142 the following describes how one can create an association between logical identifiers and service point locations.
  • the OSS 122 can create an intermediate mapping 166 between, on the one hand, dedicated logical links and, on the other hand, service point locations of end user equipment having logical connections with the NAS 23 which traverse those dedicated logical links.
  • the intermediate mapping 166 would associate the dedicated logical link 19 to the service point location of the end user equipment 12 .
  • the OSS 122 transmits the intermediate mapping 166 to the database 36 (or a server associated therewith).
  • the intermediate mapping 166 received from the OSS 122 may be combined with the aforementioned mapping 144 (received from the NAS 23 or the authorization element 142 ), thus creating a final mapping 176 between, on the one hand, logical identifiers (such as IP addresses) and, on the other, service point locations of end user equipment having logical connections with the NAS 23 which traverse respective dedicated logical links to which those logical identifiers have been assigned.
  • the final mapping 176 would specify that the logical identifier 193 corresponds to the service point location of the end user equipment 12 . This is precisely the type of association that is useful to store in the database 36 .
  • the database 36 may be updated accordingly.
  • the database 36 can be populated with logical identifiers (such as IP addresses) and service point locations associated with those logical identifiers. More generally, the database 36 can be populated with records for various logical identifiers, each record containing location information. The location information that can be contained in the record for a given logical identifier may be indicative of where the end user equipment to which the given logical identifier was assigned was located when access to the packet-switched network 14 was sought.
  • logical identifiers such as IP addresses
  • service point locations associated with those logical identifiers More generally, the database 36 can be populated with records for various logical identifiers, each record containing location information. The location information that can be contained in the record for a given logical identifier may be indicative of where the end user equipment to which the given logical identifier was assigned was located when access to the packet-switched network 14 was sought.
  • the computing device 16 effecting an online transaction with a merchant site over the packet-switched network 14
  • the computing device 16 it is also within the scope of the invention for the computing device 16 to be implemented as a communication device which is one party to a call and which effects an online transaction with another party reachable over the packet-switched network 14 .
  • the communication device could be embodied as a VoIP phone, a Plain Old Telephone Service (POTS) phone equipped with an analog terminal adapter (ATA), or a soft phone (i.e., a computer equipped with telephony software).
  • POTS Plain Old Telephone Service
  • ATA analog terminal adapter
  • soft phone i.e., a computer equipped with telephony software
  • one party to the call can be a purveyor of goods or services.
  • any one or more of the above described messages 102 , 104 , 106 , 108 , 114 , 116 , 118 , 120 , 121 may be encrypted prior to being transmitted.
  • This encryption may be effected using the SSL protocol or some other suitable encryption technique, without limitation.
  • certain functionality of a given component described herein may be implemented as pre-programmed hardware or firmware elements (e.g., application specific integrated circuits (ASICs), electrically erasable programmable read-only memories (EEPROMs), etc.) or other related elements.
  • the given component may comprise a processor having access to a code memory which stores program instructions for operation of the processor to implement functionality of that given component.
  • the program instructions may be stored on a medium which is fixed, tangible, and readable directly by the given component (e.g., removable diskette, CD-ROM, ROM, fixed disk, USB key, etc.).
  • the program instructions may be stored remotely but transmittable to the given component via a modem or other interface device connected to a network over a transmission medium.
  • the transmission medium may be either a tangible medium (e.g., optical or analog communications lines) or a medium implemented using wireless techniques (e.g., RF, microwave, infrared or other wireless transmission schemes).

Abstract

A method, comprising: receiving a first identifier associated with an online transaction and a second identifier used by end user equipment involved in the online transaction; obtaining evidentiary information pertaining to the end user equipment based on the second identifier; storing in a database a record that associates the first identifier with the evidentiary information; and retrieving one of (i) the evidentiary information in said record and (ii) the first identifier in response to a request identifying the other of (i) the evidentiary information in said record and (ii) the first identifier. Where the online transaction is effected over a network after the end user equipment has gained access thereto, the evidentiary information may include information pertaining to a subscriber whose credentials were used by the end user equipment to gain access to the network. The information pertaining to the subscriber may include personal information about the subscriber. Alternatively, the evidentiary information may include location information.

Description

    FIELD OF THE INVENTION
  • The present invention relates generally to online transactions and, more particularly, to methods and computer-readable media for maintaining records of online transactions so as to facilitate forensic investigations of such transactions.
  • BACKGROUND
  • While most transactions conducted online are genuine, there is a certain amount of fraud involving online transactions, and the ensuing financial loss suffered by merchants continues to increase annually. Also, the distributed nature of the Internet tends to facilitate the availability of products or services whose procurement may in actual fact be illegal due to the purchaser's age, location or other attribute. While investigations into possible fraud or illegality of a conventional transaction are straightforward, the same cannot be said about online transactions where scarce data, if any, about the true individual who made the transaction remains traceable after the fact.
  • Against this background, there is a need in the industry for solutions for maintaining records of online transactions that will facilitate forensic investigations of those transactions.
  • SUMMARY OF THE INVENTION
  • According to a first broad aspect, the present invention seeks to provide a method, which comprises receiving a first identifier associated with an online transaction and a second identifier used by end user equipment involved in the online transaction; obtaining evidentiary information pertaining to the end user equipment based on the second identifier; storing in a database a record that associates the first identifier with the evidentiary information; and retrieving one of (i) the evidentiary information in said record and (ii) the first identifier in response to a request identifying the other of (i) the evidentiary information in said record and (ii) the first identifier.
  • According to a second broad aspect, the present invention seeks to provide a computer-readable medium comprising computer-readable program code which, when interpreted by a transaction management entity, causes the transaction management entity to execute a method. The computer-readable program code comprises first computer-readable program code for causing the transaction management entity to be attentive to receipt of a first identifier associated with an online transaction and a second identifier used by end user equipment involved in the online transaction; second computer-readable program code for causing the transaction management entity to obtain evidentiary information pertaining to the end user equipment based on the second identifier; third computer-readable program code for causing the transaction management entity to store in a database a record that associates the first identifier with the evidentiary information; and fourth computer-readable program code for causing the transaction management entity to retrieve one of (i) the evidentiary information in said record and (ii) the first identifier in response to a request identifying the other of (i) the evidentiary information in said record and (ii) the first identifier.
  • According to a third broad aspect, the present invention seeks to provide a system comprising: a transaction record database comprising a plurality of records, each of said records relating a respective first identifier associated with an online transaction to respective evidentiary information pertaining to end user equipment involved in the online transaction; and a transaction management entity configured to respond to a request identifying one of (i) a given first identifier associated with a given online transaction and (ii) evidentiary information related by one of said records to a given first identifier by retrieving the other of (i) the given first identifier and (ii) the evidentiary information related thereto.
  • According to a fourth broad aspect, the present invention seeks to provide a method of investigating an online transaction associated with a transaction identifier. The method comprises providing the transaction identifier to a transaction management entity; obtaining from the transaction management entity evidentiary information pertaining to the end user equipment involved in the online transaction associated with the transaction identifier; and comparing the evidentiary information to information associated with a transaction object used to effect the online transaction.
  • According to a fifth broad aspect, the present invention seeks to provide a method of identifying a suspect potentially responsible for effecting an online transaction associated with a transaction identifier. The method comprises providing the transaction identifier to a transaction management entity; obtaining from the transaction management entity evidentiary information pertaining to the end user equipment involved in the online transaction associated with the transaction identifier; and identifying as a suspect a party associated with the evidentiary information.
  • According to a sixth broad aspect, the present invention seeks to provide a network entity for participating in an online transaction taking place over a network. The network entity comprises a memory and a processing unit. The processing unit is configured to obtain a transaction identifier associated with an online transaction and a logical identifier associated with end user equipment involved in the online transaction; store in said memory a record that relates said transaction identifier to said logical identifier; and transmit said transaction identifier and said logical identifier over the network to an entity responsible for storing a relationship between the transaction identifier and evidentiary information pertaining to end user equipment involved in said online transaction.
  • These and other aspects of the invention will become apparent to those of ordinary skill in the art upon review of the following description of certain embodiments of the invention in conjunction with the accompanying drawings.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • A detailed description of embodiments of the present invention is provided herein below, by way of example only, with reference to the accompanying drawings, in which:
  • FIG. 1 shows an architecture allowing a user of end user equipment connected to a packet-switched network to access and interact with merchant sites of that network, for example, to make online transactions, in accordance with an embodiment of the present invention.
  • FIG. 2A shows possible contents of a database that stores information associated with various logical identifiers assigned to various end user equipment used to access the packet-switched network shown in FIG. 1.
  • FIG. 2B shows possible contents of a transaction record database that stores records for various transactions that have been attempted or effected by various subscribers.
  • FIG. 3 shows an example of message flow in the architecture of FIG. 1, in the context of attempting a transaction.
  • FIG. 4 shows an example of message flow following FIG. 3 once the transaction has been approved or denied, including an example flow of a message sent to a transaction management entity for further processing.
  • FIG. 5 shows an example of message flow during a forensic investigation of a transaction of interest.
  • FIGS. 6-8 are block diagrams and flow diagrams illustrating the example creation of an association between logical identifiers assigned to end user equipment and respective service point locations for that end user equipment, such association being useful in the population of the database of FIG. 2A.
  • It is to be expressly understood that the description and drawings are only for the purpose of illustration of certain embodiments of the invention and are an aid for understanding. They are not intended to be a definition of the limits of the invention.
  • DETAILED DESCRIPTION OF NON-LIMITING EMBODIMENTS
  • FIG. 1 depicts a packet-switched network 14 to which are connected a plurality of merchant sites implemented by a plurality of servers 30 1 . . . 30 N. Computing devices that gain access to the packet-switched network 14 can interact with the merchant sites in order to effect online transactions. In a non-limiting embodiment, the packet-switched network 14 is the Internet and the merchant sites are web sites.
  • Access to the packet-switched network 14 is controlled or managed by a service provider that has a number of subscribers. In various non-limiting embodiments, the service provider may be an Access Service Provider (ASP), a Regional Access Network Provider (RANP) or an Internet Service Provider (ISP). Individual subscribers are given permission to access the packet-switched network 14 when using certain authorized end user equipment and/or when providing certain authorized login credentials.
  • FIG. 1 shows one example of end user equipment 12 that may be used to access the packet-switched network 14 by a user 10. Specifically, the end user equipment 12 comprises a computing device 16 and a network interface unit 18. The computing device 16 may be implemented as a personal computer (PC), such as a desktop computer, a laptop computer or a tablet PC. The computing device 16 is provided with at least one input device such as a keyboard, a mouse, a touchscreen, a stylus, a microphone, etc., as well as a display and possibly one or more other output devices (e.g., speakers) that enable interaction with the user 10. The computing device 16 is operative to run a software application implementing a network browser (e.g., a web browser) with which the user 10 can interact via the display (and possibly the one or more other output devices) and the at least one input device in order to access and interact with merchant sites of the packet-switched network 14.
  • A communication link 20 is provided between the end user equipment 12 and the packet-switched network 14. The network interface unit 18 interfaces with the communication link 20 and enables the computing device 16 to exchange data with the packet-switched network 14 (and, ultimately, with the merchant sites). For example, depending on the nature of the communication link 20, the network interface unit 18 may be implemented as a modem such as a broadband modem (e.g., a digital subscriber line (DSL) modem or a cable modem) or a narrowband modem (e.g., a dial-up modem). In other embodiments, such as in the case of Fiber to the premises (FTTP), the network interface 18 may be implemented as an optical network termination (ONT)-based Ethernet connection. Although it is shown as being a separate component in FIG. 1, the network interface unit 18 may be integrated into the computing device 16 (e.g., it may be a card internal to the computing device 16).
  • The communication link 20 may traverse one or more network elements and comprise one or more physical links and one or more logical links. For example, the communication link 20 may comprise a physical link 17 between the network interface unit 18 and a network element 21. The physical link 17 may comprise a copper twisted pair, a coax cable, an Ethernet link, a fiber optic link (e.g., fiber to the premises (FTTP)), a fixed wireless link, a satellite link, or a combination thereof. Depending on the nature of the physical link 17, the network element 21 may be a DSL access multiplexer (DSLAM), a cable modem termination system (CMTS), or another type of network element. The communication link 20 may also comprise a dedicated logical link 19 between the network element 21 and another network element 23 that provides access to the packet-switched network 14. For instance, the network element 23 may be a network access server (NAS), a router, etc. It will be appreciated that the communication link 20 may take on other forms in other embodiments.
  • For the purposes of exchanging data with the packet-switched network 14, the end user equipment 12 may be assigned a logical identifier. In two non-limiting example embodiments, the logical identifier may be assigned to the computing device 16 or to the network interface unit 18. The logical identifier, which can be an Internet Protocol (IP) address (e.g., in compliance with IPv4 or IPv6) or a proprietary address, label or tag, can be assigned in a static or dynamic fashion. In the static case (e.g., a static IP address), the logical identifier does not change over time. In the dynamic case (e.g., a dynamic IP address), the logical identifier may change over time (e.g., a dynamic IP address).
  • Assignment of the logical identifier to the end user equipment 12 can be effected under control of the service provider and may be the responsibility of a designated network element that is part of the communication link 20, such as the network element 23 (particularly in embodiments where the network element 23 is a network access server). The designated network element may assign the logical identifier to the end user equipment 12 when the end user equipment 12 is activated (e.g., when the network interface unit 18 and/or the computing device 16 is/are powered-up) or otherwise regains network connectivity and/or at certain time intervals which may range from an hour or less to several months or more. For instance, in embodiments where the logical identifier is a dynamic IP address, the network element assigning the dynamic IP address to the end user equipment 12 may do so in accordance with the Dynamic Host Configuration Protocol (DHCP) using a pool of IP addresses accessible to that network element. It will be recognized that assignment of the logical identifier to the end user equipment 12 may be effected in different ways in different embodiments.
  • The service provider maintains a database 36 that stores information associated with the various logical identifiers assigned to various end user equipment used to access the packet-switched network 14. The database 36 can be linked to various components of the infrastructure of FIG. 6 in different ways. For example, in one embodiment, the database 36 may be integrated with the network element 23. In another embodiment, the database 36 may be connected to the network element 23 either directly or via a service provider network 86, for example. In still other embodiments, the database 36 may be distributed amongst a plurality of network elements and/or physical locations. Also, it should be appreciated that the database 36 may be managed, maintained and/or updated by an entity that may be the same entity as, or a different entity from, the service provider responsible for providing the end user equipment 12 with access to the packet-switched network 14.
  • With additional reference to FIG. 2A, there is shown an example of possible contents of the database 36. An example process by which the database 36 may be populated and maintained is described later on. For the time being, it is sufficient to consider that the database 36 stores a plurality of records 40 1 . . . 40 M for respective logical identifiers assigned to various end user equipment being used to access the packet-switched data network 14. The record for a particular logical identifier contains “evidentiary information” pertaining to the end user equipment to which the particular logical identifier was assigned.
  • Evidentiary information can be viewed as information that can serve as evidence towards establishing who has attempted/effected an online transaction and/or where that online transaction was attempted/effected from. The value of evidentiary information can be high when investigating online transactions, particularly days or weeks after they have taken place. Such analysis may be commissioned by, inter alia, financial institutions (such as banks, credit card companies, etc.), as well as government bodies (such as law enforcement agencies, taxation departments, etc.).
  • The evidentiary information that can be contained in a given one of the records 40 1 . . . 40 M is not particularly limited and may take on various forms, some of which are best illustrated by way of example.
  • Accordingly, a first example of evidentiary information that can be contained in the record for a given logical identifier includes information (such as name, age, gender, etc.) regarding a particular subscriber whose credentials were supplied via the end user equipment to which the given logical identifier was assigned, when access to the packet-switched network 14 was sought.
  • A second example of evidentiary information that can be contained in the record for a given logical identifier includes location information indicative of where the end user equipment to which the given logical identifier was assigned was located, when access to the packet-switched network 14 was sought. Such location information may specify a “service point” at which the end user equipment was determined to be located. The “service point” refers to a point where a network access service is provided to a subscriber by the service provider. By way of a specific non-limiting example, the service point may be a house or other building, or an area thereof. The location of the service point, which is hereinafter referred to as the “service point location”, may be expressed as a geo location (latitude, longitude, elevation, and the datum which identifies the coordinate system used, such as, without limitation, the World Geodetic System 1984 (WGS841) datum). Alternatively or in addition, the service point location may be expressed as a civic location (a set of elements that describe detailed street address information). Still other possibilities exist and are within the scope of the invention.
  • Returning to FIG. 1, the servers 30 1 . . . 30 N and the merchant sites that they implement are operated, managed or otherwise associated with various entities, including, for example, companies, governmental organizations, non-profit organizations, and individuals. Each of the servers 30 1 . . . 30 N comprises suitable hardware, firmware, software, control logic, or a combination thereof for implementing a plurality of functional components, including an interface and a processing unit.
  • The interface of each of the servers 30 1 . . . 30 N is adapted to receive messages from, and send messages to, communication equipment (such as the end user equipment 12) connected to the packet-switched network 14, as well as to receive data from, or send data to, other elements (e.g., computers or databases) communicatively coupled to that server but not necessarily connected to the packet-switched network 14.
  • The processing unit of each of the servers 30 1 . . . 30 N is adapted to effect various processing operations to implement that server's functionality. For example, when the user 10 uses the end user equipment 12 to interact with a given merchant site implemented by a given one of the servers 30 1 . . . 30 N, this will typically involve the network browser implemented by the computing device 16 interacting with the given one of the servers 30 1 . . . 30 N in order to allow the user 10 to view, hear or otherwise be exposed to content (e.g., web pages) of the given merchant site via the display and/or one or more other output devices of the computing device 16, and to input information (e.g., by entering text, selecting an option, etc.) and/or one or more commands (e.g., by clicking on a graphical button or a hyperlink) via the at least one input device of the computing device 16.
  • In accordance with an embodiment of the present invention, each of the servers 30 1 . . . 30 N includes or has access to a corresponding memory 90. The memory 90 corresponding to a given one of the servers 30 1 . . . 30 N stores an association between, on the one hand, logical identifiers used by various end user equipment to effect transactions with the given one of the servers 30 1 . . . 30 N and, on the other hand, “transaction identifiers” for those transactions. The contents of the memory 90 corresponding to a given server are kept up to date as new transactions are effected with the given server.
  • A “transaction identifier” for a particular transaction may be generated by an entity involved in validating or otherwise processing the particular transaction. One example of such an entity includes a payment gateway 60.
  • The payment gateway 60 is a network element that is connected to a financial network 68 and that is used by one or more of the servers 30 1 . . . 30 N to process online transactions attempted to be made via the merchant sites implemented by those one or more servers. The financial network 68 interconnects a plurality of servers or other computers associated with banks and/or other financial institutions. Examples of servers that could be interconnected via the financial network 68 include a transaction validation server 51 that could be associated with, for example, a card issuing bank and a server 70 that could be associated with, for example, an acquiring bank. It should be appreciated that in certain embodiments, the financial network 68 may be part of the packet-switched network 14, may comprise individual point-to-point links or may be dispensed with altogether.
  • The transaction validation server 51 may be connected to the various servers 30 1 . . . 30 N (or computers associated with those servers) via respective communication paths established over the packet-switched network 14 and the financial network 68 and which may traverse one or more network elements such as gateways and other servers. The transaction validation server 51 is operated, managed or otherwise associated with an entity responsible for validating online transactions. In a specific non-limiting embodiment, this entity may be a card issuing bank that issues credit cards or debit cards.
  • The transaction validation server 51 comprises suitable hardware, firmware, software, control logic, or a combination thereof for implementing a plurality of functional components, including an interface and a processing unit. The interface of the transaction validation server 51 is adapted to receive messages from and send messages to other servers and/or other computers, and to exchange data with other elements (e.g., databases). The processing unit of the transaction validation server 51 is adapted to effect various processing operations to implement that server's functionality.
  • The transaction validation server 51 includes or has access to a database 53, which stores information used by the transaction validation server 51 to validate online transactions attempted to be effected by various users. Accordingly, the database 53 stores a plurality of records, each of which is associated with a respective “transaction object” and contains “transaction object information” pertaining to the respective transaction object, as well as ancillary information that may be required to process an online transaction attempted to be made using the respective transaction object.
  • A “transaction object” refers to any physical or virtual object designed to be used in an attempt to make a transaction. For example, a transaction object may constitute a payment card (e.g., a credit card, a debit card, etc.), an account (e.g., a bank account, an online wallet account, login credentials for accessing secure content or a VPN, etc.), an electronic check, a set of one or more digital cash (electronic money) certificates, or any other physical or virtual object designed to be used in an attempt to make a transaction. The transaction object information can therefore take on various forms.
  • For example, the transaction object information may include payment card information regarding a payment card in situations where, for instance, the user 10 desires to purchase or otherwise obtain a product/service/content offered on a network site, pay a bill for a previously obtained product/service/content via the network site, or make a donation to a charity or other institution through the network site using the payment card. Such payment card information may be, for instance, credit card information regarding a credit card (e.g., a number, expiry date, and/or holder's name) or debit card information regarding a debit card (e.g., a number and/or holder's name). The payment card may comprise one or more card elements adapted to convey part or all of the payment card information, such as one or more sets of characters (e.g., printed and/or embossed characters), a magnetic stripe, and/or a chip (e.g., an EMV chip).
  • In another example, the transaction object information may include electronic check information regarding an electronic check (e.g., a check number and/or a checking account number) in situations where, for instance, the user 10 desires to effect a payment via a network site using the electronic check. In order to process the payment attempted to be effected by the user 10 using the electronic check, an entity (e.g., a bank or other financial institution, or the service provider) that allows the user 10 to use the electronic check may store on a computer-readable medium (e.g., as part of a database) information regarding the electronic check, including the electronic check information provided by the user 10.
  • In yet another example, the transaction object information may include digital cash information regarding a set of one or more digital cash certificates (e.g., digital cash certificate identifiers) in situations where, for instance, the user 10 desires to effect a payment via a network site using the set of one or more digital cash certificates. In order to process the payment attempted to be effected by the user 10 using the set of one or more digital cash certificates, an entity (e.g., a bank or other financial institution) that allows the user 10 to use the set of one or more digital cash certificates may store on a computer-readable medium (e.g., as part of a database) information regarding the set of one or more digital cash certificates, including the digital cash information provided by the user 10.
  • In a further example, the transaction object information may include account information regarding an account (e.g., an account number and/or holder's name and/or login credentials) in situations where, for instance, the user 10 desires to effect a transfer of funds to or from the account via a network site, or where the user 10 desires to access secure online content or a VPN via the network site. In order to process the attempted transfer or access, an entity (e.g., a bank or other financial institution, a corporate extranet server) that allows the user 10 to use the account may store on a computer-readable medium (e.g., as part of a database) information regarding the account, including the account information provided by the user 10.
  • The ancillary information contained in a particular record of the database 53 also depends on the nature of the transaction object associated with the particular record and can thus take on many forms. For example, where the transaction object associated with the particular record is a credit card, the ancillary information contained in the particular record may include a credit limit, a balance due, a billing address (i.e., an address where credit card bills are to be sent), a shipping address, a list of recent transactions, a list of one or more authorized transaction points (which could include the billing address and/or the shipping address), a list of one or more unauthorized transaction points, a spatio-temporal history of previous online transactions attempted using that credit card, a list of eligible card holders' names and/or possibly other information regarding the credit card.
  • In accordance with an embodiment of the present invention, the service provider maintains a transaction management entity 80 including or having access to a transaction record database 82. The transaction management entity 80 provides entities such as merchant sites, banks and credit card companies with a centralized point to which information regarding effected transactions can be sent. To this end, the transaction management entity 82 may be reachable via the packet-switched network 14 and the service provider network 86, or via a direct connection to one or more of the above entities. The contents of the transaction record database 82 are thus continuously updated based on information about transactions taking place in the packet-switched network 14, as received from a variety of sources.
  • With additional reference to FIG. 2B, there is shown an example of possible contents of the transaction record database 82. The transaction record database 82 stores a plurality of records 84 1 . . . 84 T for various transactions that have been attempted/effected by various subscribers. The manner in which the transaction record database 82 is populated will be described later on in greater detail. Generally speaking, it can be said that a new record in the transaction record database 82 is created upon receipt of a transaction identifier and a logical identifier from an entity (such as a merchant site, bank or credit card company) having recorded an attempt to effect a transaction. The transaction identifier can be used to index the new record, while the logical identifier can be used to look up one or more elements of evidentiary information by consulting the database 36. The one or more elements of evidentiary information returned from the database 36 are stored in the record that has just been created in the transaction record database 82 for the transaction in question.
  • To illustrate more specifically how the transaction record database 82 may be populated, consider the situation where the user 10 decides to effect an online transaction with the merchant site implemented by the server 30 n. For example, the user 10 may decide to: purchase or otherwise obtain a product and/or a service and/or content offered on the merchant site; pay a bill for a previously obtained product/service/content via the merchant site; transfer funds from one account to another via the merchant site; buy or sell securities (e.g., stocks, bonds, etc.) via the merchant site; make a donation to a charity or other institution through the merchant site; etc. It will be appreciated that various other situations may arise in which online transactions may be desired or may need to be effected.
  • For the purposes of the present example, it is assumed that the user 10 has used the end user equipment 12 to successfully gain access to the packet-switched network 14, and that the end user equipment 12 has been assigned a logical identifier, say 211.104.103.102. Successful access to the packet-switched network 14 may have been gained by the user 10 having provided the credentials of a legitimate subscriber, say, subscriber “ABC”, via the end user equipment 12. Thus, with reference to FIG. 2A, the database 36 stores a record 40 X for logical identifier 211.104.103.102, which contains evidentiary information, such as the identity of subscriber “ABC” (or other personal information pertaining to subscriber “ABC”). Alternatively or in addition, the service provider determines a service point location (say, “15 Main Street”) associated with the end user equipment 12 and stores this information in the record 40 X. One way in which the service point location associated with the end user equipment 12 can be determined is described in greater detail later on.
  • In the course of attempting to effect an online transaction while interacting with the merchant site implemented by the server 30 n, the user 10 provides transaction object information via the end user equipment 12. This can be done in various ways. For example, the user 10 may use one or more of the at least one input device of the computing device 16 to enter the transaction object information and cause this information to be sent by the end user equipment 12 to the server 30 n (or another computer associated with the server 30 n) over the packet-switched network 14. Alternatively, the transaction object information may have been previously stored in the computing device 16, in which case the user 10 may use one or more of the at least one input device of the computing device 16 to cause the end user equipment 12 to send the previously stored transaction object information to the server 30 n (or another computer associated with the server 30 n) over the packet-switched network 14.
  • For purposes of this example, the transaction object is a particular credit card, the transaction object information is credit card information regarding the particular credit card and the transaction validation server 51 is a server associated with a card issuing bank that issued the particular credit card. Also, for purposes of this example, each of the records in the database 53 is associated with a credit card and includes credit card information regarding that credit card. One of these records may be associated with the particular credit card and thus may include credit card information regarding the particular credit card.
  • The online transaction attempted to be effected by the user 10 may be subjected to various conventional security measures intended to protect information traveling to and from the end user equipment 12 over the packet-switched network 14. For example, the credit card information provided by the user 10 via the end user equipment 12 may be encrypted (e.g., using the Secure Socket Layer (SSL) protocol) prior to being sent over the packet-switched network 14. In other examples, card security code (CSC) verification may be employed whereby the user 10 is asked to enter the credit card's CSC, and/or address verification systems (AVS) may be employed whereby an address entered by the user 10 is compared to a billing address known to the credit card's issuing bank. Various other security measures may be employed in different cases.
  • With reference now to FIG. 3, the computing device 16 of the end user equipment 12 transmits to the server 30 n a message 102. In this example, the message 102 conveys: (i) order information indicative of the selected product/service/content; (ii) purchase amount information indicative of an amount to be paid to purchase the selected product/service/content; and (iii) the credit card information regarding the particular credit card. Alternatively, the order information, the purchase amount information and possibly even the credit card information may already be known to the server 30 n due to prior interaction between the computing device 16 and the server 30 n. In such a case, the message 102 may simply convey an indication or confirmation of a desire of the user 10 to purchase the selected product/service/content.
  • Additionally, the message 102 may also convey the logical identifier assigned to the end user equipment 12, in this case 211.104.103.102. Alternatively, the logical identifier assigned to the end user equipment 12 may not be conveyed by the message 102 but may already be known to the server 30 n due to prior interaction between the computing device 16 and the server 30 n.
  • The message 102 is received at the server 30 n, which proceeds to send a message 104 to a payment gateway 60. In this example, the payment gateway 60 is used by the server 30 n to process online transactions attempted to be made via the merchant site implemented by the server 30 n. Thus, the manner in which the payment gateway 60 can be reached may be known in advance to the server 30 n. It is recalled that the financial network 68 interconnects the payment gateway 60 to the transaction validation server 51 (which is associated with the card issuing bank that issued the particular credit card) and the server 70 (which is associated with the acquiring bank used by the merchant that operates, manages or is otherwise associated with the server 30 n).
  • The message 104 sent to the payment gateway 60 may be identical to the message 102, i.e., it may be a relayed version of the message 102 when the message 102 contains sufficient information. Alternatively, the message 104 may be generated by the server 30 n based on the message 102 and possibly other information known to the server 30 n (e.g., the order information, the purchase amount information and/or the credit card information). Ultimately, in this example, the message 104 conveys: (i) the purchase amount information indicative of an amount to be paid to purchase the selected product/service/content; and (ii) the credit card information regarding the particular credit card.
  • The message 104 is received at the payment gateway 60 which, in accordance with a specific non-limiting embodiment of the present invention, proceeds to generate a unique transaction identifier for the particular transaction being attempted. By way of specific non-limiting example, let the transaction identifier be A7GH6X. Also, having determined that the message 104 originates from the server 30 n, the payment gateway 60 proceeds to send a message 106 over the financial network 68 to the server 70 (which, it is recalled, is associated with the acquiring bank used by the merchant associated with the server 30 n). The message 106, which can be viewed as a request for transaction authorization, is intended to elicit from the financial network 68 a response as to whether the transaction identified by the transaction identifier A7GH6X is approved or denied. In this example, the payment gateway 60 generates the message 106 based on the message 104 such that the message 106 conveys: (i) the purchase amount information indicative of an amount to be paid to purchase the selected product/service/content; and (ii) the credit card information regarding the particular credit card. The transaction identifier A7GH6X may also be provided to facilitate processing.
  • The server 70 receives the message 106 and processes it to gain knowledge that an attempt is being made to effect a transaction having the transaction identifier A7GH6X and involving the merchant associated with the server 30 n. Based on the credit card information conveyed by the message 106, the server 70 proceeds to send a message 108 to the transaction validation server 51 over the financial network 68. The message 108 may be identical to the message 106, i.e., it may be a relayed version of the message 106. Alternatively, the message 108 may be generated by the server 70 based on the message 106 and possibly other information known to the server 70. In this example, the message 108 conveys: (i) the purchase amount information indicative of an amount to be paid to purchase the selected product/service/content; and (ii) the credit card information regarding the particular credit card. The transaction identifier A7GH6X may also be provided to facilitate processing.
  • The message 108 is received at the transaction validation server 51, which is associated with the card issuing bank that issued the particular credit card that has been used by the user 10 to attempt to purchase the selected product/service/content. The transaction validation server 51 proceeds to process the message 108 to determine whether the transaction identified by the transaction identifier A7GH6X is to be approved or denied. To this end, the transaction validation server 51 consults the database 53 to identify a particular one of the records therein for the credit card information conveyed by the message 108.
  • The transaction validation server 51 may perform various processing operations to determine whether the transaction identified by the transaction identifier A7GH6X is to be approved or denied. For example, based on the ancillary information (e.g., a credit limit, a balance due, etc.) included in the particular one of the records in the database 53 and the purchase amount information conveyed by the message 108, the transaction validation server 51 may determine whether the transaction identified by the transaction identifier A7GH6X is to be approved or denied. It will be appreciated that approval or denial of the transaction identified by the transaction identifier A7GH6X may be determined by the transaction validation server 51 based on other factors in addition to or instead of those mentioned above.
  • With reference now to FIG. 4, upon determining whether the transaction identified by the transaction identifier A7GH6X is approved or denied, the transaction validation server 51 returns a message 114 to the server 70 over the financial network 68. The message 114 indicates whether the transaction identified by the transaction identifier A7GH6X was approved or denied.
  • If the transaction identified by the transaction identifier A7GH6X was denied, the message 114 may indicate (e.g., by a code) a reason for this denial, such as insufficient funds, an unavailable bank link, etc. Depending on the circumstances, the transaction validation server 51 may also take further action, such as freezing a credit account corresponding to the particular credit card, informing security/law enforcement authorities, etc.
  • On the other hand, if the transaction identified by the transaction identifier A7GH6X was approved, the transaction validation server 51 may update, in the database 53, the record associated with the particular credit card to take into account approval of this transaction. For example, one or more elements of ancillary information (e.g., a balance due, an available credit, etc.) included in the record in question may be updated to reflect the fact that the transaction identified by the transaction identifier A7GH6X was approved.
  • The server 70 receives the message 114, and processes it to determine whether the transaction identified by the transaction identifier A7GH6X was approved or denied. If approved, the transaction identified by the transaction identifier A7GH6X is eventually settled via a settlement process involving the acquiring bank and the card issuing bank. This settlement process is well known and thus not described herein. Meanwhile, the server 70 proceeds to return a message 116 to the payment gateway 60. The message 116 may be identical to the message 114, i.e., it may be a relayed version of the message 114. Alternatively, the message 116 may be generated by the server 70 based on the message 114. The message 116 indicates whether the transaction identified by the transaction identifier A7GH6X was approved or denied and, if denied, may indicate a reason therefor.
  • The message 116 is received at the payment gateway 60, which proceeds to send a message 118 to the server 30 n. The message 118 indicates whether the transaction identified by the transaction identifier A7GH6X was approved or denied and, if denied, may indicate a reason therefor. The information conveyed by the message 118 issued by the payment gateway includes the transaction identifier A7GH6X.
  • The server 30 n receives the message 118, including the transaction identifier A7GH6X. The server 30 n processes the message 118 to ascertain whether the transaction identified by the transaction identifier A7GH6X was approved or denied. Approval or denial (and a reason for denial, if applicable) may be recorded by the server 30 n, for future reference. The server 30 n proceeds to send a message 120 to the computing device 16 of the end user equipment 12 in order to communicate approval or denial of the online transaction to the user 10.
  • Upon receiving the message 120, the computing device 16 processes the message 120 so as to communicate approval or denial of the online transaction to the user 10. For example, this may be achieved by displaying a “transaction approved” or “transaction denied” message (or any conceivable variant thereof) on the display of the computing device 16.
  • In addition, the server 30 n stores the transaction identifier received with the message 118 (in this case A7GH6X) in association with the logical identifier assigned to the end user equipment 12 used to effect the transaction in question (in this case 211.104.103.102). This can be done by creating a record in the memory 90. The stored association between the transaction identifier A7GH6X and the logical identifier 211.104.103.102 may prove valuable when it comes to launching a possible investigation into potential fraudulence of illegality of the transaction identified by the transaction identifier A7GH6X.
  • In addition, the server 30 n generates a message 121 that is sent to the transaction management entity 80. The message 121 can be sent to the transaction management entity 80 over the packet-switched network 14 or over a dedicated link, for example. The message 121 contains the aforementioned information that was stored in the memory 90 of the server 30 n, namely (i) the transaction identifier A7GH6X for the transaction in question and (ii) the logical identifier 211.104.103.102 assigned to the end user equipment 12 that was used to effect the transaction in question. As an option, once the message 121 is sent to the transaction management entity 80, the association between the transaction identifier A7GH6X and the logical identifier 211.104.103.102 need no longer be maintained in the memory 90 of the server 30 n.
  • The transaction management entity 80 is attentive to receipt of the message 121, upon receipt of which the transaction management entity 80 extracts therefrom the transaction identifier A7GH6X and the logical identifier 211.104.103.102. The transaction management entity 80 then queries the database 36 on the basis of the received logical identifier 211.104.103.102 to obtain evidentiary information contained in the record associated with the logical identifier 211.104.103.102.
  • It is recalled that the evidentiary information may take on various forms, such as a subscriber identity or other personal information and/or a service point location, to name a few non-limiting possibilities. In the non-limiting example being considered here, record 40 X in the database 36, which is associated with the logical identifier 211.104.103.102, stores the identity of subscriber “ABC” and the service point location “15 Main Street”. The transaction management entity 80 then creates a new record 84 j in the transaction record database 82, which relates the transaction identifier A7GH6X received from the server 30 n to the evidentiary information (the identity of subscriber “ABC” and the service point location “15 Main Street”) received from the database 36.
  • The records 84 1 . . . 84 T in the transaction record database 82 (including the record 84 j) thus relate timely obtained evidentiary information to transaction identifiers. The evidentiary information can then be provided at some later time to an interested party in response to an eventual request from the latter specifying a particular one of these transaction identifiers.
  • Several applications of the transaction record database 82 are now described. Firstly, consider the scenario where, at the time when a transaction (such as the aforesaid transaction identified by the transaction identifier A7GH6X) is effected, the service provider does not necessarily have an indication of whether this transaction is fraudulent or illegal. However, at some later time, let it be assumed that an interested party adopts a more suspicious view, based on its own research, customer complaints, a fraud detection mechanism, etc. The interested party may then undertake a forensic investigation regarding a “transaction of interest” associated with a particular transaction identifier.
  • With reference now to FIG. 5, the investigation proceeds with an interested party 500 (such as a merchant, a bank, a credit card company, a law enforcement agency, a governmental body, etc.) identifying the particular transaction identifier associated with the transaction of interest. To this end, the interested party 500 may send a message 502 to the transaction management entity 80 specifying the particular transaction identifier. The message 502 may reach the transaction management entity 80 via the packet-switched network 14 and the service provider network 86. Alternatively, the message 502 may reach the transaction management entity 80 via a direct link from the interested party 500. The transaction management entity 80 consults the transaction record database 82 in an attempt to match the particular transaction identifier with the transaction identifier stored in one of the records 84 1 . . . 84 T. If a match is not found, then the service provider has not stored a record of this transaction having taken place, and the interested party may wish to query other service providers who may have provided a conduit for the transaction of interest.
  • Assuming however that a matching record is identified, the corresponding evidentiary information (or a portion thereof) is retrieved from the transaction record database 82 and provided to the interested party in the form of a message 504. The level of detail provided in the message 504 could vary depending on the relationship between the interested party and the service provider. Thus, it is within the scope of the present invention to allow a law enforcement agency to be privy to a greater amount of detail concerning the evidentiary information than a credit card company.
  • In one embodiment, where the transaction of interest is known to be fraudulent (e.g., a fraudulent purchase, login, etc.), the evidentiary information may reveal to the interested party certain details about the culprit. For example, when the evidentiary information provided in the message 504 comprises a service point location, then the interested party may conclude where the fraudulent transaction of interest was made from. In another example, when the evidentiary information provided in the message 504 comprises the identity of a particular subscriber, then the interested party may conclude who is guilty of having effected the transaction of interest. Other example scenarios are of course possible, and each may lead to specific actions that may be taken by the interested party to identify and then pursue and/or prosecute the culprit, as will be appreciated by those skilled in the art.
  • In another embodiment, the evidentiary information may reveal to the interested party that the transaction of interest has a likelihood of having been illegal or fraudulent. For example, when the evidentiary information provided in the message 504 comprises a service point location, and if the particular credit card is authorized to be at any of a limited set of locations which do not include the service point location provided in the message 504, the interested party may conclude that the transaction of interest was fraudulent. In another example, when the evidentiary information provided in the message 504 comprises the identity of a particular subscriber, and if the particular subscriber is found to be or is registered as being of a certain age, the interested party may conclude that the transaction of interest was illegal. Other example scenarios are of course possible, and each may lead to specific actions that may be taken by the interested party to further investigate the issue of fraud, as will be appreciated by those skilled in the art.
  • In a second scenario for using the transaction record database 82, rather than contain the particular transaction identifier, the message 502 may contain target evidentiary information, such as a specific user or a specific location. Upon receipt of the message 502, the transaction management entity 80 consults the transaction record database 82 in an attempt to match the target evidentiary information with the evidentiary information stored in one or more of the records 84 1 . . . 84 T. Assuming that a matching record is identified, the corresponding transaction identifier(s) is(are) retrieved from the transaction record database 82 and provided to the interested party in the form of the message 504. In the case where a particular suspect has been identified, for example, this application of an embodiment of the present invention allows the interested party to access transaction identifiers pertaining to all the transactions having been effected by that suspect (or from a specific location associated with that suspect). These transaction identifiers can be related to the actual transactions and analyzed for fraudulent activity in order to help establish the innocence or guilt of the suspect.
  • In a third scenario for using the transaction record database 82, consider the case where an interested party wishes to be notified when online transactions are attempted by a specific user or from a specific location (e.g., from a prison with Internet access). In one embodiment, in a provisioning phase, the transaction management entity 80 receives a request containing “evidentiary information of interest”. Then, at the time when a transaction (such as the aforesaid transaction identified by the transaction identifier A7GH6X) is effected, the transaction management entity 80 checks the evidentiary information against the target evidentiary information and, if there is a match, the interested party can be alerted by sending the corresponding transaction identifier. The interested party then relates the transaction identifier to the transaction and establishes legitimacy/legality of the transaction.
  • In the scenarios considered above, the transaction identifier A7GH6X was generated by the payment gateway 60 upon receipt of the message 104, and was relayed to the server 30 n as part of the message 118. However, it should be appreciated that in various alternative embodiments, the transaction identifier A7GH6X may have been generated by the payment gateway 60 later on in the transaction validation, such as upon receipt of the message 116 from the server 70. Also, the transaction identifier A7GH6X could have been generated by other network entities involved in processing of the transaction and at various instances, such as:
      • by the server 70 upon receipt of message 106 from the payment gateway 60;
      • by the transaction validation server 51 upon receipt of the message 108 from the server 70;
      • by the server 70 upon receipt of the message 114 from the transaction validation server 51;
      • by the server 30 n upon originally receiving the message 102 from the computing device 16; or
      • by a shipping agent that produces a waybill.
  • Still other possibilities are within the scope of the present invention.
  • It should also be appreciated that although the payment gateway 60, the server 70, the transaction validation server 51 and the server 30 n have been described as separate entities, this has been done for convenience and illustration only. It should therefore be understood that in certain embodiments, any one or more of the payment gateway 60, the server 70, the transaction validation server 51 and the server 30 n may be integrated into a single network entity or component.
  • In the scenarios considered above, the relationship between the transaction identifier A7GH6X and the logical identifier 211.104.103.102 was maintained by the server 30 n in its memory 90 and then was sent to the transaction management entity 80. However, it should be appreciated that in various alternative embodiments, this relationship may be maintained by other entities of interest prior to being sent to the transaction management entity 80, such as:
      • by the payment gateway 60 (in which case the message 104 sent from the server 30 n to the payment gateway 60 can be modified to inform the payment gateway of the logical identifier 211.104.103.102);
      • by the server 70 (in which case both the message 104, as well as the message 106 sent from the payment gateway 60 to the server 70, can be modified to inform the server 70 of the logical identifier 211.104.103.102); or
      • by the transaction server 51 (in which case the messages 104 and 106, as well as the message 108, can be modified to inform the transaction server of the logical identifier 211.104.103.102).
  • Still other possibilities are within the scope of the present invention.
  • In the scenarios considered above, the transaction identifier A7GH6X and the logical identifier 211.104.103.102 were sent to the transaction management entity 80, which then obtained evidentiary information from the database 36 based on the received logical identifier 211.104.103.102. The resultant relationship between the transaction identifier A7GH6X and the retrieved evidentiary information was then stored in the record 84 j of the transaction record database 82. However, it should be appreciated that in various alternative embodiments, this relationship may be maintained by other entities of interest, such as by a third party (e.g., a law enforcement agency's Internet server) reachable via the packet-switched network 14. For example, the transaction management entity 80 may transmit the retrieved evidentiary information along with the corresponding transaction identifier A7GH6X to the law enforcement agency's Internet server for storage thereon.
  • As has been mentioned above, the evidentiary information that can be contained in the record for a given logical identifier may include location information indicative of where the end user equipment to which the given logical identifier was assigned was located when access to the packet-switched network 14 was sought. An example process by which the database 36 may be populated with such location information will now be described with reference to FIG. 6. Specifically, this example description will illustrate one possible manner by which an association between the logical identifier assigned to the end user equipment 12 and the location of a service point where the end user equipment 12 is located (e.g., “15 Main Street”), may be stored in the database 36 as part of one of the records 40 1 . . . 40 M.
  • In this example, the network element 21 of the communication link 20 connecting the end user equipment 12 to the packet-switched network 14 is an access multiplexer. In one embodiment, the access multiplexer 21 may be a DSLAM. The access multiplexer 21 is connected to the network element 23, which, in this embodiment, is a network access server (NAS). The NAS 23, which may also sometimes be referred to as a broadband remote access server (BRAS), a remote access server (RAS) or a broadband access server (BAS), provides access to the packet-switched network 14. Communication between the access multiplexer 21 and the NAS 23 can take place over the dedicated logical link 19 between these elements. The dedicated logical link 19, which may traverse an intervening access data network (not shown), can be implemented in various ways. For example, in one embodiment, the dedicated logical link 19 may be implemented as an asynchronous transfer mode (ATM) permanent virtual circuit (PVC). In another embodiment, the dedicated logical link 19 may be implemented as a virtual local area network (VLAN). It will be appreciated that various other implementations of the dedicated logical link 19 are possible.
  • The access multiplexer 21 allows data arriving from the NAS 23 along given ATM PVCs, VLANs or other dedicated logical links to be sent over corresponding physical links via corresponding one of its ports, and vice versa. Thus, the access multiplexer 21 can be said to implement a mapping 134 between, on the one hand, dedicated logical links and, on the other, ports of the access multiplexer 21. In this example, the mapping 134 implemented by the access multiplexer 21 relates the dedicated logical link 19 to the port 104 of the access multiplexer 21. In one example embodiment, the mapping 134 can be maintained by the access multiplexer 21.
  • In another example embodiment, the mapping 134 can be maintained by an operation support system (OSS) 122. The OSS 122 represents a collection of systems that perform management, inventory, engineering, planning, repair and other functions for a service provider. The OSS 122 may be connected to the NAS 23 via the service provider network 86. One of the functions of the OSS 122 may include management of network elements, assets and equipment. Thus, the OSS 122 maintains a mapping 124 between, on the one hand, ports of various access multiplexers or other network elements under control of the service provider and, on the other, service point locations of end user equipment (such as the end user equipment 12) connected to those ports. In this case, the mapping 124 maintained by the OSS 122 relates a port 104 of the network element 21 to a service point location, i.e., the location of a service point where the end user equipment 12 is located. As mentioned previously, this service point location may be expressed as a civic address, a geo location, or any other information identifying where the service point is located. In this specific example, it is assumed that the service point location is “15 Main Street”.
  • The infrastructure shown in FIG. 6 further comprises an authorization element 142, which can be connected to the NAS 23 via the service provider network 86. The nature of the connection between the NAS 23 and the authorization element 142 is immaterial. For example, in one embodiment, the authorization element 142 may be a server (e.g., an Authentication, Authorization, and Accounting (AAA) server) responsive to queries from the NAS 23. In such an embodiment, the authorization element 142 and the NAS 23 may communicate using the Remote Authentication Dial In User Service (RADIUS) protocol, a description of which is available at www.ietf.org/rfc/rfc2865.txt. In another embodiment, the authorization element 142 may be a functional element integrated with the NAS 23.
  • In this example, the NAS 23 is operative to maintain a pool 127 of pre-allocated logical identifiers that can be used by various end user equipment, including the end user equipment 12. In some embodiments, the pool 127 of logical identifiers may be built up as a cooperative effort between the NAS 23 and the OSS 122, while in other embodiments, it may not be necessary for the OSS 122 to be involved in creating the pool 127 of logical identifiers. In still other embodiments, the pool 127 of logical identifiers may be maintained by the authorization element 142, and may be made accessible to the authorization element 142 without needing to pass through the NAS 23.
  • It will be appreciated that numerous modifications and variations of the infrastructure of FIG. 6 are possible. For example, in some embodiments, the access multiplexer 21 can be omitted. This may be true in embodiments where the end user equipment 12 implements a wireless access point. For instance, in such embodiments, the connection between the wireless access point and the NAS 23 may be provided by a dedicated point-to-point link. As another example, in some embodiments, instead of the dedicated logical link 19, there may be a shared link leading to the end user equipment 12.
  • Reference is now made to FIG. 7, which illustrates an example of a possible event flow upon activation of the end user equipment 12, which may occur, for instance, as the network interface unit 18 and/or the computing device 16 of the end user equipment 12 is/are powered up. Thereafter:
      • a) the end user equipment 12 establishes physical layer connectivity with the access multiplexer 21 over the physical link 17;
      • b) this is followed by establishment of Ethernet connectivity between the end user equipment 12 and the access multiplexer 21;
      • c) the end user equipment 12 verifies its ability to communicate using Point-to-Point Protocol over Ethernet (PPPoE). For a more detailed explanation of PPPoE, one may refer to Internet Request For Comments (RFC) 2516, available from the Internet Engineering Task Force (http://www.ietf.org), hereby incorporated by reference herein;
      • d) next, assuming that the end user equipment 12 has the ability to communicate using PPPoE, the end user equipment 12 verifies whether it should make a so-called “access request” automatically or in response to user input (which can be obtained via a software application). For purposes of this example, let it be assumed that conditions have been met such that the end user equipment 12 should make an access request;
      • e) the end user equipment 12 begins entry into PPPoE communication by broadcasting an “initiation” packet over the dedicated logical link 19;
      • f) the NAS 23 responds to receipt of the initiation packet by sending an “offer” packet to the end user equipment 12. At this stage, it can be said that a logical connection 182 has been defined between a first endpoint (the end user equipment 12) and a second endpoint (the NAS 23);
      • g) following receipt of the offer packet, the end user equipment 12 sends an access request 184 to the NAS 23 with the ultimate goal of accessing the packet-switched network 14. The access request 184 may comprise credentials that can be hard coded or programmably installed on the end user equipment 12. Alternatively, the credentials may be entered by the user 10 of the end user equipment 12.
      • h) upon receipt of the access request 184 containing the credentials along the dedicated logical link 19, the NAS 23 executes an authorization procedure as follows. The NAS 23 communicates the credentials to the authorization element 142, e.g., via a RADIUS Access-Request message 188. In response to receipt of the credentials from the NAS 23, the authorization element 142 determines whether the credentials allow access to the packet-switched network 14. For example, this can be determined by consulting a database (not shown) of credentials for various subscribers. If the credentials allow access to the packet-switched network 14, the authorization element 142 returns an acceptance message (e.g., a RADIUS Access-Accept message). On the other hand, if the credentials do not allow access to the packet-switched network 14, the authorization element 142 returns a refusal message (e.g., a RADIUS Access-Reject message). For purposes of this example, assume that the credentials allow access to the packet-switched network 14, resulting in issuance of an acceptance message 190. In this example, two alternatives are possible
        • alternative 1 (where the pool 127 of logical identifiers is maintained by the authorization element 142): the authorization element 142 obtains a logical identifier 193 from the pool 127 of logical identifiers that is maintained by the authorization element 142. The logical identifier 193 is sent to the NAS 23, which assigns the logical identifier 193 to the dedicated logical link 19;
        • alternative 2 (where the pool 127 of logical identifiers is maintained by the NAS 23): responsive to receipt of the acceptance message 190 from the authorization element 142, the NAS 23 obtains a logical identifier 193 from the pool 127 of logical identifiers that is maintained by the NAS 23. The logical identifier 193 so obtained is assigned by the NAS 23 to the dedicated logical link 19.
      • i) the NAS 23 sends a “confirmation” packet back to the end user equipment 12, thus completing establishment of a PPPoE session between the endpoints of the logical connection 182;
      • j) additional hand-shaking may be performed between the end user equipment 12 and the NAS 23 in order to establish a Point-to-Point Protocol (PPP) session between the endpoints of the logical connection 182;
      • k) following this, further hand-shaking may be undertaken between the end user equipment 12 and the NAS 23 in order to establish an Internet Protocol Control Protocol (IPCP) session between the endpoints of the logical connection 182.
      • l) during the IPCP session, the NAS 23 releases the logical identifier 193 towards the end user equipment 12 that issued the access request 184, in order to allow the end user equipment 12 to identify itself using the logical identifier 193 in future communications over the dedicated logical link 19. Since the dedicated logical link 19 to which has been assigned the logical identifier 193 leads to the end user equipment 12 and since the end user equipment 12 will identify itself using the logical identifier 193 in future communications, it can be said that the logical identifier 193 is in actuality assigned to the end user equipment 12.
  • It can thus be appreciated that once the logical identifier 193 has been obtained from the pool 127 of logical identifiers (either by the NAS 23 or by the authorization element 142), the NAS 23 assigns the logical identifier 193 to the dedicated logical link 19.
  • In an embodiment where the database 36 is integrated with or connected directly to the NAS 23, the fact that the NAS 23 assigns the logical identifier 193 to the dedicated logical link 19 allows the NAS 23 to construct and maintain a mapping 144 between, on the one hand, various dedicated logical links (such as the dedicated logical link 19 and others) and, on the other, logical identifiers corresponding to those dedicated logical links.
  • In an embodiment where database 36 is integrated with or connected directly to the authorization element 142, the logical identifier 193 and the identity of the dedicated logical link 193 to which it is assigned are sent back by the NAS 23 to the authorization element 142, and it is the authorization element 142 that maintains the aforementioned mapping 144 between dedicated logical links and logical identifiers corresponding to those dedicated logical links.
  • Of course, those skilled in the art will be able to think of other ways of causing the end user equipment 12 to send the access request 184 over the logical connection 182 between the end user equipment 12 and the NAS 23, as well as other ways of assigning a logical identifier to the dedicated logical link 19. It should further be mentioned that, in some cases, the establishment of the aforementioned PPPoE, PPP and/or IPCP sessions may not be required. This is particularly the case where the dedicated logical link 19 is a VLAN.
  • In view of the preceding description, and in particular given the previously described mappings 124, 134 maintained in the OSS 122 and/or the access multiplexer 21 and the previously described mapping 144 maintained in the NAS 23 or the authorization element 142, the following describes how one can create an association between logical identifiers and service point locations.
  • Specifically, with reference to FIG. 8, by combining the mapping 124 with the mapping 134, the OSS 122 can create an intermediate mapping 166 between, on the one hand, dedicated logical links and, on the other hand, service point locations of end user equipment having logical connections with the NAS 23 which traverse those dedicated logical links. In this example, the intermediate mapping 166 would associate the dedicated logical link 19 to the service point location of the end user equipment 12. In one embodiment, the OSS 122 transmits the intermediate mapping 166 to the database 36 (or a server associated therewith).
  • At the database 36 (or a server associated therewith), the intermediate mapping 166 received from the OSS 122 may be combined with the aforementioned mapping 144 (received from the NAS 23 or the authorization element 142), thus creating a final mapping 176 between, on the one hand, logical identifiers (such as IP addresses) and, on the other, service point locations of end user equipment having logical connections with the NAS 23 which traverse respective dedicated logical links to which those logical identifiers have been assigned. In this example, the final mapping 176 would specify that the logical identifier 193 corresponds to the service point location of the end user equipment 12. This is precisely the type of association that is useful to store in the database 36.
  • It will also be appreciated that in embodiments where logical identifiers are dynamically assigned to various end user equipment 12 (e.g., in a dynamic IP address system), the database 36 may be updated accordingly.
  • From the above, it should be apparent that the database 36 can be populated with logical identifiers (such as IP addresses) and service point locations associated with those logical identifiers. More generally, the database 36 can be populated with records for various logical identifiers, each record containing location information. The location information that can be contained in the record for a given logical identifier may be indicative of where the end user equipment to which the given logical identifier was assigned was located when access to the packet-switched network 14 was sought.
  • While the above-described example illustrates one possible technique for populating a portion of the database 36, it will be appreciated that different techniques may be employed in different embodiments.
  • Although the above-described example relates to an online transaction involving an online purchase using a credit card, it will be recognized that principles described herein apply to other types of online transactions, including, for example, those involving online purchases or payments using other payment objects (e.g., digital cash, electronic checks), online fund transfers involving accounts (e.g., bank accounts, online wallet accounts), attempts to access secure online content; and attempts to access a virtual private network, to name a few non-limiting possibilities.
  • It should further be appreciated that although the above references to online transactions have involved the computing device 16 effecting an online transaction with a merchant site over the packet-switched network 14, it is also within the scope of the invention for the computing device 16 to be implemented as a communication device which is one party to a call and which effects an online transaction with another party reachable over the packet-switched network 14. Specifically, the communication device could be embodied as a VoIP phone, a Plain Old Telephone Service (POTS) phone equipped with an analog terminal adapter (ATA), or a soft phone (i.e., a computer equipped with telephony software). For its part, one party to the call can be a purveyor of goods or services.
  • It should further be appreciated that any one or more of the above described messages 102, 104, 106, 108, 114, 116, 118, 120, 121 may be encrypted prior to being transmitted. This encryption may be effected using the SSL protocol or some other suitable encryption technique, without limitation.
  • Those skilled in the art will also appreciate that, in some embodiments, certain functionality of a given component described herein (e.g., the transaction validation server 51, the server 70, the payment gateway 60, the transaction management server 80, the servers 30 1 . . . 30 N) may be implemented as pre-programmed hardware or firmware elements (e.g., application specific integrated circuits (ASICs), electrically erasable programmable read-only memories (EEPROMs), etc.) or other related elements. In other embodiments, the given component may comprise a processor having access to a code memory which stores program instructions for operation of the processor to implement functionality of that given component. The program instructions may be stored on a medium which is fixed, tangible, and readable directly by the given component (e.g., removable diskette, CD-ROM, ROM, fixed disk, USB key, etc.). Alternatively, the program instructions may be stored remotely but transmittable to the given component via a modem or other interface device connected to a network over a transmission medium. The transmission medium may be either a tangible medium (e.g., optical or analog communications lines) or a medium implemented using wireless techniques (e.g., RF, microwave, infrared or other wireless transmission schemes).
  • Although various embodiments of the present invention have been described and illustrated, it will be apparent to those skilled in the art that numerous modifications and variations can be made without departing from the scope of the invention, which is defined in the appended claims.

Claims (36)

1. A method, comprising:
receiving a first identifier associated with an online transaction and a second identifier used by end user equipment involved in the online transaction;
obtaining evidentiary information pertaining to the end user equipment based on the second identifier;
storing in a database a record that associates the first identifier with the evidentiary information; and
retrieving one of (i) the evidentiary information in said record and (ii) the first identifier in response to a request identifying the other of (i) the evidentiary information in said record and (ii) the first identifier.
2. The method defined in claim 1, wherein the request identifies the first identifier.
3. The method defined in claim 2, wherein the request is received after said receiving the first identifier.
4. The method defined in claim 3, wherein the request is issued by a party conducting a forensic investigation of the online transaction.
5. The method defined in claim 1, wherein the request identifies the evidentiary information.
6. The method defined in claim 5, wherein the request is received after said receiving the first identifier.
7. The method defined in claim 5, wherein the request is received prior to said receiving the first identifier.
8. The method defined in claim 7, wherein the request is issued by a party monitoring online transactions effected by a user associated with the first identifier.
9. The method defined in claim 1, wherein the second identifier is a logical identifier assigned to the end user equipment.
10. The method defined in claim 9, wherein the second identifier is an Internet Protocol address.
11. The method defined in claim 9, wherein the online transaction is effected over a network, the method further comprising assigning the logical identifier to the end user equipment in response to the end user equipment requesting access to the network.
12. The method defined in claim 9, wherein obtaining the evidentiary information comprises consulting a second database comprising a plurality of records each relating a respective logical identifier to one or more of a respective service point location and personal information about a respective subscriber.
13. The method defined in claim 12, wherein the online transaction is effected over a network, the method further comprising assigning new logical identifiers to various new end user equipment requesting access to the network and updating the second database with (i) the new logical identifiers so assigned and (ii) for each of the new logical identifiers, one or more of a respective location of the corresponding new end user equipment and personal information about a respective subscriber whose credentials were used by the corresponding new end user equipment to gain access to the network.
14. The method defined in claim 1, wherein the online transaction is effected over a network after the end user equipment has gained access thereto and wherein the evidentiary information includes information pertaining to a subscriber whose credentials were used by the end user equipment to gain access to the network.
15. The method defined in claim 14, wherein the information pertaining to the subscriber includes personal information about the subscriber.
16. The method defined in claim 1, wherein the online transaction is effected over a network after the end user equipment has gained access thereto and wherein the evidentiary information includes location information.
17. The method defined in claim 16, wherein the location information comprises a location of the end user equipment when access to the network was gained.
18. The method defined in claim 1, wherein the first identifier is a unique transaction identifier generated by an entity that is a member of a financial network.
19. The method defined in claim 1, wherein said first identifier and said second identifier are received from an entity that is a member of a financial network.
20. The method defined in claim 1, wherein said first identifier and said second identifier are received from a merchant site with which the end user equipment interacts to effect the online transaction.
21. The method defined in claim 1, wherein the online transaction involves at least one of an attempt to make a payment and an attempt to effect a fund transfer.
22. The method defined in claim 1, wherein the online transaction involves at least one of an attempt to access secure online content and an attempt to access a virtual private network.
23. A computer-readable medium comprising computer-readable program code which, when interpreted by a transaction management entity, causes the transaction management entity to execute a method, the computer-readable program code comprising:
first computer-readable program code for causing the transaction management entity to be attentive to receipt of a first identifier associated with an online transaction and a second identifier used by end user equipment involved in the online transaction;
second computer-readable program code for causing the transaction management entity to obtain evidentiary information pertaining to the end user equipment based on the second identifier;
third computer-readable program code for causing the transaction management entity to store in a database a record that associates the first identifier with the evidentiary information; and
fourth computer-readable program code for causing the transaction management entity to retrieve one of (i) the evidentiary information in said record and (ii) the first identifier in response to a request identifying the other of (i) the evidentiary information in said record and (ii) the first identifier.
24. A system comprising:
a transaction record database comprising a plurality of records, each of said records relating a respective first identifier associated with an online transaction to respective evidentiary information pertaining to end user equipment involved in the online transaction; and
a transaction management entity configured to respond to a request identifying one of (i) a given first identifier associated with a given online transaction and (ii) evidentiary information related by one of said records to a given first identifier by retrieving the other of (i) the given first identifier and (ii) the evidentiary information related thereto.
25. The system defined in claim 24, the transaction management entity being further configured to populate the transaction record database with a record for the given first identifier further to receipt of the given first identifier and a respective second identifier used by end user equipment involved in the given online transaction.
26. The system defined in claim 25, wherein to populate the transaction record database with the record for the given first identifier, the transaction management entity is configured to obtain said evidentiary information by consulting a second database on a basis of the second identifier, the second database comprising a plurality of records each relating a respective identifier to respective evidentiary information.
27. The system defined in claim 26, wherein the given online transaction is effected over a network after the end user equipment has gained access thereto and wherein the evidentiary information includes information pertaining to a subscriber whose credentials were used by the end user equipment involved in the given online transaction to gain access to the network.
28. The method defined in claim 26, wherein the given online transaction is effected over a network after the end user equipment has gained access thereto and wherein the evidentiary information includes location information indicative of a location of the end user equipment involved in the given online transaction when access to the network was gained.
29. A method of investigating an online transaction associated with a transaction identifier, comprising:
providing the transaction identifier to a transaction management entity;
obtaining from the transaction management entity evidentiary information pertaining to the end user equipment involved in the online transaction associated with the transaction identifier; and
comparing the evidentiary information to information associated with a transaction object used to effect the online transaction.
30. The method defined in claim 29, further comprising:
concluding that the online transaction was fraudulent or illegal when the comparing yields that the evidentiary information does not match the information associated with the transaction object used to effect the online transaction.
31. The method defined in claim 30, wherein the online transaction is effected over a network after the end user equipment involved in the online transaction has gained access thereto and wherein the evidentiary information includes information pertaining to a subscriber whose credentials were used by the end user equipment involved in the online transaction to gain access to the network.
32. The method defined in claim 30, wherein the online transaction is effected over a network after the end user equipment involved in the online transaction has gained access thereto and wherein the evidentiary information includes location information indicative of a location of the end user equipment involved in the online transaction when access to the network was gained.
33. A method of identifying a suspect potentially responsible for effecting an online transaction associated with a transaction identifier, comprising:
providing the transaction identifier to a transaction management entity;
obtaining from the transaction management entity evidentiary information pertaining to the end user equipment involved in the online transaction associated with the transaction identifier; and
identifying as a suspect a party associated with the evidentiary information.
34. A network entity for participating in an online transaction taking place over a network, comprising:
a memory; and
a processing unit configured to:
obtain a transaction identifier associated with an online transaction and a logical identifier associated with end user equipment involved in the online transaction;
store in said memory a record that relates said transaction identifier to said logical identifier; and
transmit said transaction identifier and said logical identifier over the network to an entity responsible for storing a relationship between the transaction identifier and evidentiary information pertaining to end user equipment involved in said online transaction.
35. The network entity defined in claim 34, wherein the evidentiary information includes information pertaining to a subscriber whose credentials were used by the end user equipment involved in the online transaction to gain access to the network.
36. The method defined in claim 34, wherein the evidentiary information includes location information indicative of a location of the end user equipment involved in the online transaction when access to the network was gained.
US12/602,236 2007-12-05 2007-12-05 Methods and computer-readable media for facilitating forensic investigations of online transactions Abandoned US20100174660A1 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CA2007/002189 WO2009070860A1 (en) 2007-12-05 2007-12-05 Methods and computer-readable media for facilitating forensic investigations of online transactions

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
PCT/CA2007/002189 A-371-Of-International WO2009070860A1 (en) 2007-12-05 2007-12-05 Methods and computer-readable media for facilitating forensic investigations of online transactions

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/990,225 Continuation US11798003B2 (en) 2007-12-05 2018-05-25 Methods and computer-readable media for facilitating forensic investigations of online transactions

Publications (1)

Publication Number Publication Date
US20100174660A1 true US20100174660A1 (en) 2010-07-08

Family

ID=40717213

Family Applications (2)

Application Number Title Priority Date Filing Date
US12/602,236 Abandoned US20100174660A1 (en) 2007-12-05 2007-12-05 Methods and computer-readable media for facilitating forensic investigations of online transactions
US15/990,225 Active 2029-04-21 US11798003B2 (en) 2007-12-05 2018-05-25 Methods and computer-readable media for facilitating forensic investigations of online transactions

Family Applications After (1)

Application Number Title Priority Date Filing Date
US15/990,225 Active 2029-04-21 US11798003B2 (en) 2007-12-05 2018-05-25 Methods and computer-readable media for facilitating forensic investigations of online transactions

Country Status (4)

Country Link
US (2) US20100174660A1 (en)
EP (1) EP2232421A4 (en)
CA (1) CA2689072C (en)
WO (1) WO2009070860A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090089357A1 (en) * 2007-06-04 2009-04-02 Bce Inc. Methods and systems for presenting online content elements based on information known to a service provider
US20090172033A1 (en) * 2007-12-28 2009-07-02 Bce Inc. Methods, systems and computer-readable media for facilitating forensic investigations of online activities
US8667102B1 (en) * 2008-12-02 2014-03-04 ioBridge, Inc. Module-based device interaction system
US20140244497A1 (en) * 2012-05-08 2014-08-28 Vantiv, Llc Systems and Methods for Performing Funds Freeze and/or Funds Seizure with Respect to Prepaid Payment Cards
US20150348209A1 (en) * 2014-06-02 2015-12-03 Mastercard International Incorporated Method and system for linking forensic data with purchase behavior
US9497261B1 (en) * 2008-12-02 2016-11-15 ioBridge, Inc. System, method, and computer-readable medium for wireless interaction with a device via a module-based device interaction system
US9681357B1 (en) * 2008-12-02 2017-06-13 ioBridge, Inc. System, method, and computer-readable medium for interaction with a device via a module-based device interaction system enabled for wireless communication
US10756918B2 (en) 2008-12-02 2020-08-25 ioBridge, Inc. Activating a device via a module-based device interaction system

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106304374B (en) * 2015-05-26 2019-11-12 华为技术有限公司 A kind of machine communication dispatching method, base station and user equipment

Citations (86)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5903721A (en) * 1997-03-13 1999-05-11 cha|Technologies Services, Inc. Method and system for secure online transaction processing
US5903878A (en) * 1997-08-20 1999-05-11 Talati; Kirit K. Method and apparatus for electronic commerce
US6029150A (en) * 1996-10-04 2000-02-22 Certco, Llc Payment and transactions in electronic commerce system
US6041353A (en) * 1997-04-22 2000-03-21 Hitachi, Ltd. Method for searching for network connection path
US6169890B1 (en) * 1992-11-11 2001-01-02 Sonera Smarttrust Oy Mobile telephone system and method for carrying out financial transactions using a mobile telephone system
US20010053999A1 (en) * 2000-06-09 2001-12-20 Sony Corp./Sony Electronics, Inc. System and method for providing customized advertisements over a network
US6339761B1 (en) * 1999-05-13 2002-01-15 Hugh V. Cottingham Internet service provider advertising system
US20020010747A1 (en) * 2000-07-21 2002-01-24 Ableclick Corp. Method for acquiring on-line information regarding customer preferences and a target advertising method using e-mail based on customer preferences
US20020019831A1 (en) * 2000-01-19 2002-02-14 Wyly Wade Methods, systems, and presentations for delivery over the internet
US20020035622A1 (en) * 2000-06-07 2002-03-21 Barber Timothy P. Online machine data collection and archiving process
US20020069176A1 (en) * 2000-12-06 2002-06-06 Daniel Newman System for obtaining fee-based data and services
US20020077837A1 (en) * 1999-12-16 2002-06-20 Scott Krueger Secure networked transaction system
US20020107981A1 (en) * 2001-02-06 2002-08-08 International Business Machines Corporation Internet domain names with regional associations
US20020143655A1 (en) * 2001-04-02 2002-10-03 Stephen Elston Remote ordering system for mobile commerce
US20020161701A1 (en) * 2001-04-30 2002-10-31 Todd Warmack Debit or credit card transaction clearing house system
US6484148B1 (en) * 2000-02-19 2002-11-19 John E. Boyd Electronic advertising device and method of using the same
US6487538B1 (en) * 1998-11-16 2002-11-26 Sun Microsystems, Inc. Method and apparatus for local advertising
US20030023489A1 (en) * 2001-06-14 2003-01-30 Mcguire Myles P. Method and system for providing network based target advertising
US20030041240A1 (en) * 2001-08-22 2003-02-27 Jim Roskind Single universal authentication system for internet services
US20030088475A1 (en) * 2001-10-12 2003-05-08 Goodman Victor B. Remote transaction and tracking protocol for internet commerce
US20030105710A1 (en) * 2000-07-11 2003-06-05 Ellen Barbara Method and system for on-line payments
US20030140120A1 (en) * 1999-12-01 2003-07-24 Hartman Alex James Method and apparatus for network access
US20030172036A1 (en) * 2002-03-05 2003-09-11 Idan Feigenbaum Online financial transaction veracity assurance mechanism
US20030187949A1 (en) * 2002-03-28 2003-10-02 Bhatt Jaydutt B. Determining geographic location of internet users
US20040006489A1 (en) * 2002-07-03 2004-01-08 Bynon Douglas B. Benefits services payment and credit system
US6700965B1 (en) * 2002-05-03 2004-03-02 At&T Corp. Identifier-triggered personalized customer relations management service
US20040102197A1 (en) * 1999-09-30 2004-05-27 Dietz Timothy Alan Dynamic web page construction based on determination of client device location
US20040117298A1 (en) * 2002-12-17 2004-06-17 First Data Corporation Method and system for initiating a chargeback
US20040205004A1 (en) * 2000-02-22 2004-10-14 Paramvir Bahl Methods and systems for providing variable rates of service for accessing networks, methods and systems for accessing the internet
US20040250236A1 (en) * 2003-04-30 2004-12-09 O'malley Austin Establishing and maintaining a relationship between a three-dimensional model and related data
US6836765B1 (en) * 2000-08-30 2004-12-28 Lester Sussman System and method for secure and address verifiable electronic commerce transactions
US20050021853A1 (en) * 1999-05-03 2005-01-27 Parekh Sanjay M. Systems and methods for determining, collecting, and using geographic locations of Internet users
US20050039036A1 (en) * 2003-08-13 2005-02-17 Ori Eisen Method and system for determining presence of probable error or fraud in a data set by linking common data values or elements
US6859791B1 (en) * 1998-08-13 2005-02-22 International Business Machines Corporation Method for determining internet users geographic region
US20050066339A1 (en) * 2003-03-19 2005-03-24 Thoen Gregory S. System and method for seamlessly providing video content to client systems over a network
US6895387B1 (en) * 1999-10-29 2005-05-17 Networks Associates Technology, Inc. Dynamic marketing based on client computer configurations
US20050108177A1 (en) * 1999-07-30 2005-05-19 Sancho Enrique D. System and method for secure network purchasing
US20050144073A1 (en) * 2002-06-05 2005-06-30 Lawrence Morrisroe Method and system for serving advertisements
US20050165684A1 (en) * 2004-01-28 2005-07-28 Saflink Corporation Electronic transaction verification system
US20050177562A1 (en) * 2004-02-09 2005-08-11 Limelight Networks, Inc. Universal search engine
US20050190901A1 (en) * 2003-11-07 2005-09-01 Oborn Patrick K. System and method to determine and deliver quotes for distance-sensitive communication links from multiple service providers
US6957393B2 (en) * 2001-03-19 2005-10-18 Accenture Llp Mobile valet
US20050260973A1 (en) * 2004-05-24 2005-11-24 Van De Groenendaal Joannes G Wireless manager and method for managing wireless devices
US20060020508A1 (en) * 2004-07-23 2006-01-26 Gorti Sreenivasa R Proxy-based profile management to deliver personalized services
US20060059044A1 (en) * 2004-09-14 2006-03-16 Chan Wesley T Method and system to provide advertisements based on wireless access points
US20060080147A1 (en) * 2004-10-08 2006-04-13 Mark Greenstein Method of purchasing a product to avoid adverse selection
US20060085357A1 (en) * 2004-10-19 2006-04-20 First Data Corporation Methods and systems for performing credit transactions with a wireless device
US20060085263A1 (en) * 1997-06-25 2006-04-20 Paul Greer User demographic profile driven advertising targeting
US20060111991A1 (en) * 2002-07-08 2006-05-25 Murray Wilshinsky Confindential information sharing system
US20060116924A1 (en) * 1996-08-20 2006-06-01 Angles Paul D System and method for delivering customized advertisements within interactive communication systems
US20060190287A1 (en) * 2004-10-15 2006-08-24 Rearden Commerce, Inc. Fraudulent address database
US7111789B2 (en) * 2001-08-31 2006-09-26 Arcot Systems, Inc. Enhancements to multi-party authentication and other protocols
US20060235795A1 (en) * 2005-04-19 2006-10-19 Microsoft Corporation Secure network commercial transactions
US20060271953A1 (en) * 2005-01-05 2006-11-30 Ronald Jacoby System and method for delivering personalized advertisements
US20070050481A1 (en) * 1999-12-30 2007-03-01 Rod Rigole Systems and methods for online selection of service providers and management of service accounts
US20070067297A1 (en) * 2004-04-30 2007-03-22 Kublickis Peter J System and methods for a micropayment-enabled marketplace with permission-based, self-service, precision-targeted delivery of advertising, entertainment and informational content and relationship marketing to anonymous internet users
US20070106660A1 (en) * 2005-11-09 2007-05-10 Bbnt Solutions Llc Method and apparatus for using confidence scores of enhanced metadata in search-driven media applications
US20070220604A1 (en) * 2005-05-31 2007-09-20 Long Kurt J System and Method of Fraud and Misuse Detection
US20070238448A1 (en) * 2002-10-18 2007-10-11 Gallagher Michael D Method and system of providing landline equivalent location information over an integrated communication system
US20070239546A1 (en) * 2006-04-10 2007-10-11 Scott Blum Computer implemented interactive advertising system and method
US7292996B2 (en) * 2000-10-06 2007-11-06 Openwave Systems Inc. Method and apparatus for performing a credit based transaction between a user of a wireless communications device and a provider of a product or service
US20080004966A1 (en) * 2006-06-30 2008-01-03 Singleton Shaun W System and method for control and monitor of sales transactions
US20080040275A1 (en) * 2006-04-25 2008-02-14 Uc Group Limited Systems and methods for identifying potentially fraudulent financial transactions and compulsive spending behavior
US7359869B1 (en) * 2000-07-14 2008-04-15 Stamps.Com, Inc. Method and system for facilitating secure electronic transactions with multiple merchants
US20080095173A1 (en) * 2006-10-19 2008-04-24 Embarq Holdings Company, Llc System and method for monitoring the connection of an end-user to a remote network
US20080164308A1 (en) * 2007-01-10 2008-07-10 Aaron Jeffrey A Credit card transaction servers, methods and computer program products employing wireless teminal location and registered purchasing locations
US7411905B1 (en) * 2003-09-05 2008-08-12 Sprint Communications Company L.P. Segmented IP backbone network access
US20080255944A1 (en) * 2007-03-29 2008-10-16 Shah Nitin J Campaign Management Platform for Network-Based Online Advertising and Directed Media Transmission System
US20090172033A1 (en) * 2007-12-28 2009-07-02 Bce Inc. Methods, systems and computer-readable media for facilitating forensic investigations of online activities
US7630939B1 (en) * 2001-03-26 2009-12-08 Usa Technologies, Inc. System and method for locally authorizing cashless transactions at point of sale
US7665658B2 (en) * 2005-06-07 2010-02-23 First Data Corporation Dynamic aggregation of payment transactions
US20100205652A1 (en) * 2007-06-04 2010-08-12 Jean Bouchard Methods and Systems for Handling Online Request Based on Information Known to a Service Provider
US7778935B2 (en) * 2006-03-09 2010-08-17 Colella Brian A System for secure payment and authentication
US7818229B2 (en) * 2004-10-19 2010-10-19 Apollo Enterprise Solutions, Inc. Method for future payment transactions
US7815106B1 (en) * 2005-12-29 2010-10-19 Verizon Corporate Services Group Inc. Multidimensional transaction fraud detection system and method
US7827101B2 (en) * 2003-01-10 2010-11-02 First Data Corporation Payment system clearing for transactions
US7827108B2 (en) * 2008-11-21 2010-11-02 Visa U.S.A. Inc. System and method of validating a relationship between a user and a user account at a financial institution
US7941370B2 (en) * 2006-04-25 2011-05-10 Uc Group Limited Systems and methods for funding payback requests for financial transactions
US7983961B1 (en) * 2005-10-27 2011-07-19 Alvin Chang Methods and apparatus for marketing profiling while preserving user privacy
US20110208663A1 (en) * 2004-03-19 2011-08-25 Kennis Peter H Extraction of transaction data for compliance monitoring
US8032536B2 (en) * 2002-12-19 2011-10-04 Base Base Corporation System and method for applying network protocols to telephony
US8041717B2 (en) * 2005-09-14 2011-10-18 Jumptap, Inc. Mobile advertisement syndication
US8045956B2 (en) * 2007-01-05 2011-10-25 Macronix International Co., Ltd. System and method of managing contactless payment transactions using a mobile communication device as a stored value device
US8321278B2 (en) * 2003-09-30 2012-11-27 Google Inc. Targeted advertisements based on user profiles and page profile
US8364583B1 (en) * 2000-08-14 2013-01-29 West Corporation Method and apparatus for processing a cardholder's inquiry or dispute about a credit/charge card
US8566237B2 (en) * 2002-11-01 2013-10-22 Western Union Financial Services, Inc. Internet payment system and method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030018895A1 (en) * 2001-02-02 2003-01-23 Morrison Gregg B. Processes and systems for enabling secure and controlled distribution and use of information

Patent Citations (88)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6169890B1 (en) * 1992-11-11 2001-01-02 Sonera Smarttrust Oy Mobile telephone system and method for carrying out financial transactions using a mobile telephone system
US20060116924A1 (en) * 1996-08-20 2006-06-01 Angles Paul D System and method for delivering customized advertisements within interactive communication systems
US6029150A (en) * 1996-10-04 2000-02-22 Certco, Llc Payment and transactions in electronic commerce system
US5903721A (en) * 1997-03-13 1999-05-11 cha|Technologies Services, Inc. Method and system for secure online transaction processing
US6041353A (en) * 1997-04-22 2000-03-21 Hitachi, Ltd. Method for searching for network connection path
US20060085263A1 (en) * 1997-06-25 2006-04-20 Paul Greer User demographic profile driven advertising targeting
US5903878A (en) * 1997-08-20 1999-05-11 Talati; Kirit K. Method and apparatus for electronic commerce
US6859791B1 (en) * 1998-08-13 2005-02-22 International Business Machines Corporation Method for determining internet users geographic region
US6487538B1 (en) * 1998-11-16 2002-11-26 Sun Microsystems, Inc. Method and apparatus for local advertising
US20060123105A1 (en) * 1999-05-03 2006-06-08 Parekh Sanjay M Systems and methods for determining, collecting, and using geographic locations of internet users
US20050021853A1 (en) * 1999-05-03 2005-01-27 Parekh Sanjay M. Systems and methods for determining, collecting, and using geographic locations of Internet users
US6339761B1 (en) * 1999-05-13 2002-01-15 Hugh V. Cottingham Internet service provider advertising system
US20050108177A1 (en) * 1999-07-30 2005-05-19 Sancho Enrique D. System and method for secure network purchasing
US20040102197A1 (en) * 1999-09-30 2004-05-27 Dietz Timothy Alan Dynamic web page construction based on determination of client device location
US6895387B1 (en) * 1999-10-29 2005-05-17 Networks Associates Technology, Inc. Dynamic marketing based on client computer configurations
US20030140120A1 (en) * 1999-12-01 2003-07-24 Hartman Alex James Method and apparatus for network access
US20020077837A1 (en) * 1999-12-16 2002-06-20 Scott Krueger Secure networked transaction system
US20070050481A1 (en) * 1999-12-30 2007-03-01 Rod Rigole Systems and methods for online selection of service providers and management of service accounts
US20020019831A1 (en) * 2000-01-19 2002-02-14 Wyly Wade Methods, systems, and presentations for delivery over the internet
US6484148B1 (en) * 2000-02-19 2002-11-19 John E. Boyd Electronic advertising device and method of using the same
US20040205004A1 (en) * 2000-02-22 2004-10-14 Paramvir Bahl Methods and systems for providing variable rates of service for accessing networks, methods and systems for accessing the internet
US20020035622A1 (en) * 2000-06-07 2002-03-21 Barber Timothy P. Online machine data collection and archiving process
US20010053999A1 (en) * 2000-06-09 2001-12-20 Sony Corp./Sony Electronics, Inc. System and method for providing customized advertisements over a network
US20030105710A1 (en) * 2000-07-11 2003-06-05 Ellen Barbara Method and system for on-line payments
US7359869B1 (en) * 2000-07-14 2008-04-15 Stamps.Com, Inc. Method and system for facilitating secure electronic transactions with multiple merchants
US20020010747A1 (en) * 2000-07-21 2002-01-24 Ableclick Corp. Method for acquiring on-line information regarding customer preferences and a target advertising method using e-mail based on customer preferences
US8364583B1 (en) * 2000-08-14 2013-01-29 West Corporation Method and apparatus for processing a cardholder's inquiry or dispute about a credit/charge card
US6836765B1 (en) * 2000-08-30 2004-12-28 Lester Sussman System and method for secure and address verifiable electronic commerce transactions
US7292996B2 (en) * 2000-10-06 2007-11-06 Openwave Systems Inc. Method and apparatus for performing a credit based transaction between a user of a wireless communications device and a provider of a product or service
US20020069176A1 (en) * 2000-12-06 2002-06-06 Daniel Newman System for obtaining fee-based data and services
US20020107981A1 (en) * 2001-02-06 2002-08-08 International Business Machines Corporation Internet domain names with regional associations
US6957393B2 (en) * 2001-03-19 2005-10-18 Accenture Llp Mobile valet
US7630939B1 (en) * 2001-03-26 2009-12-08 Usa Technologies, Inc. System and method for locally authorizing cashless transactions at point of sale
US20020143655A1 (en) * 2001-04-02 2002-10-03 Stephen Elston Remote ordering system for mobile commerce
US20020161701A1 (en) * 2001-04-30 2002-10-31 Todd Warmack Debit or credit card transaction clearing house system
US20030023489A1 (en) * 2001-06-14 2003-01-30 Mcguire Myles P. Method and system for providing network based target advertising
US20030041240A1 (en) * 2001-08-22 2003-02-27 Jim Roskind Single universal authentication system for internet services
US7111789B2 (en) * 2001-08-31 2006-09-26 Arcot Systems, Inc. Enhancements to multi-party authentication and other protocols
US20030088475A1 (en) * 2001-10-12 2003-05-08 Goodman Victor B. Remote transaction and tracking protocol for internet commerce
US20030172036A1 (en) * 2002-03-05 2003-09-11 Idan Feigenbaum Online financial transaction veracity assurance mechanism
US20030187949A1 (en) * 2002-03-28 2003-10-02 Bhatt Jaydutt B. Determining geographic location of internet users
US6700965B1 (en) * 2002-05-03 2004-03-02 At&T Corp. Identifier-triggered personalized customer relations management service
US20050144073A1 (en) * 2002-06-05 2005-06-30 Lawrence Morrisroe Method and system for serving advertisements
US20040006489A1 (en) * 2002-07-03 2004-01-08 Bynon Douglas B. Benefits services payment and credit system
US20060111991A1 (en) * 2002-07-08 2006-05-25 Murray Wilshinsky Confindential information sharing system
US20070238448A1 (en) * 2002-10-18 2007-10-11 Gallagher Michael D Method and system of providing landline equivalent location information over an integrated communication system
US8566237B2 (en) * 2002-11-01 2013-10-22 Western Union Financial Services, Inc. Internet payment system and method
US20040117298A1 (en) * 2002-12-17 2004-06-17 First Data Corporation Method and system for initiating a chargeback
US8032536B2 (en) * 2002-12-19 2011-10-04 Base Base Corporation System and method for applying network protocols to telephony
US7827101B2 (en) * 2003-01-10 2010-11-02 First Data Corporation Payment system clearing for transactions
US20050066339A1 (en) * 2003-03-19 2005-03-24 Thoen Gregory S. System and method for seamlessly providing video content to client systems over a network
US20040250236A1 (en) * 2003-04-30 2004-12-09 O'malley Austin Establishing and maintaining a relationship between a three-dimensional model and related data
US20050039036A1 (en) * 2003-08-13 2005-02-17 Ori Eisen Method and system for determining presence of probable error or fraud in a data set by linking common data values or elements
US7411905B1 (en) * 2003-09-05 2008-08-12 Sprint Communications Company L.P. Segmented IP backbone network access
US8321278B2 (en) * 2003-09-30 2012-11-27 Google Inc. Targeted advertisements based on user profiles and page profile
US20050190901A1 (en) * 2003-11-07 2005-09-01 Oborn Patrick K. System and method to determine and deliver quotes for distance-sensitive communication links from multiple service providers
US20050165684A1 (en) * 2004-01-28 2005-07-28 Saflink Corporation Electronic transaction verification system
US20050177562A1 (en) * 2004-02-09 2005-08-11 Limelight Networks, Inc. Universal search engine
US20110208663A1 (en) * 2004-03-19 2011-08-25 Kennis Peter H Extraction of transaction data for compliance monitoring
US20070067297A1 (en) * 2004-04-30 2007-03-22 Kublickis Peter J System and methods for a micropayment-enabled marketplace with permission-based, self-service, precision-targeted delivery of advertising, entertainment and informational content and relationship marketing to anonymous internet users
US20050260973A1 (en) * 2004-05-24 2005-11-24 Van De Groenendaal Joannes G Wireless manager and method for managing wireless devices
US20060020508A1 (en) * 2004-07-23 2006-01-26 Gorti Sreenivasa R Proxy-based profile management to deliver personalized services
US20060059044A1 (en) * 2004-09-14 2006-03-16 Chan Wesley T Method and system to provide advertisements based on wireless access points
US20060080147A1 (en) * 2004-10-08 2006-04-13 Mark Greenstein Method of purchasing a product to avoid adverse selection
US20060190287A1 (en) * 2004-10-15 2006-08-24 Rearden Commerce, Inc. Fraudulent address database
US8510189B2 (en) * 2004-10-19 2013-08-13 Apollo Enterprise Solutions, Inc. Method for future payment transactions
US20060085357A1 (en) * 2004-10-19 2006-04-20 First Data Corporation Methods and systems for performing credit transactions with a wireless device
US7818229B2 (en) * 2004-10-19 2010-10-19 Apollo Enterprise Solutions, Inc. Method for future payment transactions
US20060271953A1 (en) * 2005-01-05 2006-11-30 Ronald Jacoby System and method for delivering personalized advertisements
US20060235795A1 (en) * 2005-04-19 2006-10-19 Microsoft Corporation Secure network commercial transactions
US20070220604A1 (en) * 2005-05-31 2007-09-20 Long Kurt J System and Method of Fraud and Misuse Detection
US7665658B2 (en) * 2005-06-07 2010-02-23 First Data Corporation Dynamic aggregation of payment transactions
US8041717B2 (en) * 2005-09-14 2011-10-18 Jumptap, Inc. Mobile advertisement syndication
US7983961B1 (en) * 2005-10-27 2011-07-19 Alvin Chang Methods and apparatus for marketing profiling while preserving user privacy
US20070106660A1 (en) * 2005-11-09 2007-05-10 Bbnt Solutions Llc Method and apparatus for using confidence scores of enhanced metadata in search-driven media applications
US7815106B1 (en) * 2005-12-29 2010-10-19 Verizon Corporate Services Group Inc. Multidimensional transaction fraud detection system and method
US7778935B2 (en) * 2006-03-09 2010-08-17 Colella Brian A System for secure payment and authentication
US20070239546A1 (en) * 2006-04-10 2007-10-11 Scott Blum Computer implemented interactive advertising system and method
US20080040275A1 (en) * 2006-04-25 2008-02-14 Uc Group Limited Systems and methods for identifying potentially fraudulent financial transactions and compulsive spending behavior
US7941370B2 (en) * 2006-04-25 2011-05-10 Uc Group Limited Systems and methods for funding payback requests for financial transactions
US20080004966A1 (en) * 2006-06-30 2008-01-03 Singleton Shaun W System and method for control and monitor of sales transactions
US20080095173A1 (en) * 2006-10-19 2008-04-24 Embarq Holdings Company, Llc System and method for monitoring the connection of an end-user to a remote network
US8045956B2 (en) * 2007-01-05 2011-10-25 Macronix International Co., Ltd. System and method of managing contactless payment transactions using a mobile communication device as a stored value device
US20080164308A1 (en) * 2007-01-10 2008-07-10 Aaron Jeffrey A Credit card transaction servers, methods and computer program products employing wireless teminal location and registered purchasing locations
US20080255944A1 (en) * 2007-03-29 2008-10-16 Shah Nitin J Campaign Management Platform for Network-Based Online Advertising and Directed Media Transmission System
US20100205652A1 (en) * 2007-06-04 2010-08-12 Jean Bouchard Methods and Systems for Handling Online Request Based on Information Known to a Service Provider
US20090172033A1 (en) * 2007-12-28 2009-07-02 Bce Inc. Methods, systems and computer-readable media for facilitating forensic investigations of online activities
US7827108B2 (en) * 2008-11-21 2010-11-02 Visa U.S.A. Inc. System and method of validating a relationship between a user and a user account at a financial institution

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10078660B2 (en) 2007-06-04 2018-09-18 Bce Inc. Methods and systems for presenting online content elements based on information known to a service provider
US20090089356A1 (en) * 2007-06-04 2009-04-02 Bce Inc. Methods and systems for presenting online content elements based on information known to a service provider
US20090089357A1 (en) * 2007-06-04 2009-04-02 Bce Inc. Methods and systems for presenting online content elements based on information known to a service provider
US10482081B2 (en) 2007-06-04 2019-11-19 Bce Inc. Methods and systems for validating online transactions using location information
US20100174649A1 (en) * 2007-06-04 2010-07-08 Bce Inc. Methods and systems for validating online transactions using location information
US20100205652A1 (en) * 2007-06-04 2010-08-12 Jean Bouchard Methods and Systems for Handling Online Request Based on Information Known to a Service Provider
US20100223164A1 (en) * 2007-06-04 2010-09-02 Fortier Stephane Maxime Francois Methods and Computer-Readable Media for Enabling Secure Online Transactions With Simplified User Experience
US20100235279A1 (en) * 2007-06-04 2010-09-16 Bce Inc. Online transaction validation using a location object
US10691758B2 (en) 2007-06-04 2020-06-23 Bce Inc. Methods and systems for presenting online content elements based on information known to a service provider
US10180958B2 (en) 2007-06-04 2019-01-15 Bce Inc. Methods and computer-readable media for enabling secure online transactions with simplified user experience
US9600518B2 (en) 2007-06-04 2017-03-21 Bce Inc. Methods and systems for presenting online content elements based on information caused to be stored on a communication apparatus by a service provider
US9430517B2 (en) 2007-06-04 2016-08-30 Bce Inc. Methods and systems for presenting online content elements based on information known to a service provider
US20090109877A1 (en) * 2007-06-04 2009-04-30 Murray Sean Maclean Methods and Systems for Presenting Online Content Elements Based on Information Known to a Service Provider
US20090172033A1 (en) * 2007-12-28 2009-07-02 Bce Inc. Methods, systems and computer-readable media for facilitating forensic investigations of online activities
US10756918B2 (en) 2008-12-02 2020-08-25 ioBridge, Inc. Activating a device via a module-based device interaction system
US9497272B1 (en) * 2008-12-02 2016-11-15 ioBridge, Inc. Module-based device interaction system
US9681357B1 (en) * 2008-12-02 2017-06-13 ioBridge, Inc. System, method, and computer-readable medium for interaction with a device via a module-based device interaction system enabled for wireless communication
US8667102B1 (en) * 2008-12-02 2014-03-04 ioBridge, Inc. Module-based device interaction system
US9497261B1 (en) * 2008-12-02 2016-11-15 ioBridge, Inc. System, method, and computer-readable medium for wireless interaction with a device via a module-based device interaction system
US11836716B2 (en) 2012-05-08 2023-12-05 Worldpay, Llc Systems and methods for performing funds freeze and/or funds seizure with respect to prepaid payment cards
US20180374085A1 (en) * 2012-05-08 2018-12-27 Worldpay, Llc Systems and methods for performing funds freeze and/or funds seizure with respect to prepaid payment cards
US10089622B2 (en) * 2012-05-08 2018-10-02 Worldpay, Llc Systems and methods for performing funds freeze and/or funds seizure with respect to prepaid payment cards
US9710810B2 (en) * 2012-05-08 2017-07-18 Vantiv, Llc Systems and methods for performing funds freeze and/or funds seizure with respect to prepaid payment cards
US11397945B2 (en) 2012-05-08 2022-07-26 Worldpay, Llc Systems and methods for performing funds freeze and/or funds seizure with respect to prepaid payment cards
US20140244497A1 (en) * 2012-05-08 2014-08-28 Vantiv, Llc Systems and Methods for Performing Funds Freeze and/or Funds Seizure with Respect to Prepaid Payment Cards
US10074141B2 (en) * 2014-06-02 2018-09-11 Mastercard International Incorporated Method and system for linking forensic data with purchase behavior
US20150348209A1 (en) * 2014-06-02 2015-12-03 Mastercard International Incorporated Method and system for linking forensic data with purchase behavior

Also Published As

Publication number Publication date
US11798003B2 (en) 2023-10-24
US20180276675A1 (en) 2018-09-27
WO2009070860A1 (en) 2009-06-11
CA2689072A1 (en) 2009-06-11
EP2232421A1 (en) 2010-09-29
EP2232421A4 (en) 2011-11-09
CA2689072C (en) 2018-01-09

Similar Documents

Publication Publication Date Title
US11244018B2 (en) Methods and systems for validating online transactions using location
US11798003B2 (en) Methods and computer-readable media for facilitating forensic investigations of online transactions
US20090172033A1 (en) Methods, systems and computer-readable media for facilitating forensic investigations of online activities
US20090012899A1 (en) Systems and methods for generating and managing a linked deposit-only account identifier
JP2017505960A (en) Remittance system and method
WO2013130513A1 (en) Method and system for authenticating an entity using transaction processing
KR20100036498A (en) Method for providing integrated property using internet banking service and recording medium
CA2633227A1 (en) Methods, systems and computer-readable media for facilitating forensic investigations of online activities
KR100854349B1 (en) Method for Processing a Secured Loan and Program Recording Medium
KR101494409B1 (en) Method for Processing Loan by Using Estimated Payment Amount on Account
KR100854355B1 (en) System and Method for Operating Mobile Account for Religious Body and Program Recording Medium
KR20090083887A (en) System for managing lottery present by using non-faced channel
KR20090036480A (en) System and method for providing information of loan approval customer and program recording medium
KR20090029252A (en) System for supporting loan with edi(electronic data interchange) service
KR20080087056A (en) Devices for providing business banking service and program recording medium

Legal Events

Date Code Title Description
AS Assignment

Owner name: BCE INC., CANADA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CLARK, DAVID WILLIAM;FORTIER, STEPHANE MAXIME FRANCOIS;BOUCHARD, JEAN;REEL/FRAME:023579/0050

Effective date: 20080625

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION