Patents by Inventor David Helsper
David Helsper has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10691730Abstract: A method, computer program product and electronic device are provided for providing hyper-local geo-targeting based on validated, user-supplied geographic information, wherein the user's anonymity may be maintained. In particular, user-supplied geographic information may be collected in association with a truncated IP address. Once collected, the user-supplied information may be validated using geographic data previously derived from one or more complete IP addresses corresponding to the received truncated IP address. The derived geographic data may have been derived using a system that maps the routing infrastructure of the Internet in order to determine where endpoints on the Internet are located. The validated, user-supplied geographic information, which may be more specific than the derived geographic data, may then be used to provide more granular and accurate geo-targeting, all the while maintaining the privacy of the individual users.Type: GrantFiled: March 25, 2013Date of Patent: June 23, 2020Assignee: Digital Envoy, Inc.Inventors: Jeff Burdette, Joseph Hebenstreit, Richard Cabrera, Christopher Jason Lee, Robert Friedman, David Helsper
-
Patent number: 8443107Abstract: A method, computer program product and electronic device are provided for providing hyper-local geo-targeting based on validated, user-supplied geographic information, wherein the user's anonymity may be maintained. In particular, user-supplied geographic information may be collected in association with a truncated IP address. Once collected, the user-supplied information may be validated using geographic data previously derived from one or more complete IP addresses corresponding to the received truncated IP address. The derived geographic data may have been derived using a system that maps the routing infrastructure of the Internet in order to determine where endpoints on the Internet are located. The validated, user-supplied geographic information, which may be more specific than the derived geographic data, may then be used to provide more granular and accurate geo-targeting, all the while maintaining the privacy of the individual users.Type: GrantFiled: November 11, 2009Date of Patent: May 14, 2013Assignee: Digital Envoy, Inc.Inventors: Jeff Burdette, Joseph Hebenstreit, Richard Cabrera, Christopher Jason Lee, Robert Friedman, David Helsper
-
Patent number: 8032594Abstract: An application and system for inspecting an email message to determine if the email message is being used in a phishing ploy. When an email recipient receives an email message, the email message is sent to an EScam server for inspection. During its inspection, the EScam server considers various criteria, such as an originating country for an IP address associated with a sender of the email message, and assigns a score to the email message. Based on the score of the email message and threshold levels set within the EScam server, an email client determines whether the email message is part of a phishing ploy or a legitimate email message.Type: GrantFiled: November 10, 2004Date of Patent: October 4, 2011Assignee: Digital Envoy, Inc.Inventors: David Helsper, Jeff Burdette, Robert Friedman
-
Publication number: 20110113116Abstract: A method, computer program product and electronic device are provided for providing hyper-local geo-targeting based on validated, user-supplied geographic information, wherein the user's anonymity may be maintained. In particular, user-supplied geographic information may be collected in association with a truncated IP address. Once collected, the user-supplied information may be validated using geographic data previously derived from one or more complete IP addresses corresponding to the received truncated IP address. The derived geographic data may have been derived using a system that maps the routing infrastructure of the Internet in order to determine where endpoints on the Internet are located. The validated, user-supplied geographic information, which may be more specific than the derived geographic data, may then be used to provide more granular and accurate geo-targeting, all the while maintaining the privacy of the individual users.Type: ApplicationFiled: November 11, 2009Publication date: May 12, 2011Inventors: JEFF BURDETTE, Joseph Hebenstreit, Richard Cabrera, Christopher Jason Lee, Robert Friedman, David Helsper
-
Patent number: 7708200Abstract: A fraudulent business transaction application (FBTA) is provided for monitoring application based fraud. When a consumer supplies account access information in order to carry out an Internet business transaction, the FBTA uses an online fraud mitigation engine to detect phishing intrusions and identity theft. Methods are also provided for calculating travel velocity and transaction frequency, which are useful for determining a fraudulent transaction.Type: GrantFiled: August 24, 2006Date of Patent: May 4, 2010Assignee: Digital Envoy, Inc.Inventors: David Helsper, Dennis Maicon
-
Patent number: 7673793Abstract: A fraudulent business transaction application (FBTA) is provided in embodiments of the present invention for monitoring fraudulent transactions. When a consumer supplies account access information in order to carry out an Internet business transaction, the FBTA uses an online fraud mitigation engine to detect phishing intrusions and identity theft. Embodiments are also provided for calculating travel velocity and transaction frequency, which are useful for determining a fraudulent transaction. Further embodiments are provided for authenticating a transaction using a cookie stored on a client device and a behavior profile stored on a server.Type: GrantFiled: August 24, 2006Date of Patent: March 9, 2010Assignee: Digital Envoy, Inc.Inventors: Todd Greene, David Helsper
-
Patent number: 7543740Abstract: A fraudulent business transaction application (FBTA) is provided in embodiments of the present invention for monitoring fraudulent transactions. When a consumer supplies account access information in order to carry out an Internet business transaction, the FBTA uses an online fraud mitigation engine to detect phishing intrusions and identity theft. Embodiments are also provided for calculating travel velocity and transaction frequency, which are useful for determining a fraudulent transaction. Further embodiments are provided for authenticating a transaction using a cookie stored on a client device and a behavior profile stored on a server.Type: GrantFiled: April 26, 2006Date of Patent: June 9, 2009Assignee: Digital Envoy, Inc.Inventors: Todd Greene, David Helsper
-
Patent number: 7497374Abstract: A fraudulent business transaction application (FBTA) is provided for monitoring application based fraud. When a consumer supplies account access information in order to carry out an Internet business transaction, the FBTA uses an online fraud mitigation engine to detect phishing trusions and identity theft. Methods are also provided for calculating travel velocity and transcation frequency, which are useful for determining a fraudulent transaction.Type: GrantFiled: August 23, 2005Date of Patent: March 3, 2009Assignee: Digital Envoy, Inc.Inventors: David Helsper, Dennis Maicon
-
Patent number: 7438226Abstract: A fraudulent business transaction application (FBTA) is provided for monitoring application based fraud. When a consumer supplies account access information in order to carry out on Internet business transaction, the FBTA uses an online fraud mitigation engine to detect phishing intrusions and identity theft. Methods are also provided for calculating travel velocity and transaction frequency, which are useful for determining a fraudulent transaction.Type: GrantFiled: August 24, 2006Date of Patent: October 21, 2008Assignee: Digital Envoy, Inc.Inventors: David Helsper, Dennis Maicon
-
Publication number: 20080010678Abstract: Systems, methods, and computer program products for providing fraud analysis to an application using a proxy and a fraud determination unit are provided. An Online Fraud Mitigation Engine is also provided in embodiments of the present invention for determining fraudulent transactions. Embodiments are also provided for calculating travel velocity and transaction frequency, which are useful for determining a fraudulent transaction. Further embodiments are provided for authenticating a transaction using an object stored on a client device and a behavior profile stored on a server.Type: ApplicationFiled: June 5, 2007Publication date: January 10, 2008Inventors: Jeff Burdette, Richard Cabrera, David Helsper
-
Patent number: 7280988Abstract: A monitoring system including a baseline model that automatically captures and models normal system behavior, a correlation model that employs multivariate autoregression analysis to detect abnormal system behavior, and an alarm service that weights and scores a variety of alerts to determine an alarm status and implement appropriate response actions. The baseline model decomposes the input variables into a number of components representing relatively predictable behaviors so that the erratic component e(t) may be isolated for further processing. These components include a global trend component, a cyclical component, and a seasonal component. Modeling and continually updating these components separately permits a more accurate identification of the erratic component of the input variable, which typically reflects abnormal patterns when they occur.Type: GrantFiled: December 19, 2002Date of Patent: October 9, 2007Assignee: Netuitive, Inc.Inventors: David Helsper, Jean-Francois Huard, David Homoki, Amanda Rasmussen, Robert Jannarone
-
Publication number: 20070073630Abstract: A fraudulent business transaction application (FBTA) is provided in embodiments of the present invention for monitoring fraudulent transactions. When a consumer supplies account access information in order to carry out an Internet business transaction, the FBTA uses an online fraud mitigation engine to detect phishing intrusions and identity theft. Embodiments are also provided for calculating travel velocity and transaction frequency, which are useful for determining a fraudulent transaction. Further embodiments are provided for authenticating a transcation using a cookie stored on a client device and a behavior profile stored on a server.Type: ApplicationFiled: August 24, 2006Publication date: March 29, 2007Inventors: Todd Greene, David Helsper
-
Publication number: 20070061273Abstract: A fraudulent business transaction application (FBTA) is provided in embodiments of the present invention for monitoring fraudulent transactions. When a consumer supplies account access information in order to carry out an Internet business transaction, the FBTA uses an online fraud mitigation engine to detect phishing intrusions and identity theft. Embodiments are also provided for calculating travel velocity and transaction frequency, which are useful for determining a fraudulent transaction. Further embodiments are provided for authenticating a transaction using a cookie stored on a client device and a behavior profile stored on a server.Type: ApplicationFiled: August 24, 2006Publication date: March 15, 2007Inventors: Todd Greene, David Helsper
-
Publication number: 20070038568Abstract: A fraudulent business transaction application (FBTA) is provided in embodiments of the present invention for monitoring fraudulent transactions. When a consumer supplies account access information in order to carry out an Internet business transaction, the FBTA uses an online fraud mitigation engine to detect phishing intrusions and identity theft. Embodiments are also provided for calculating travel velocity and transaction frequency, which are useful for determining a fraudulent transaction. Further embodiments are provided for authenticating a transaction using a cookie stored on a client device and a behavior profile stored on a server.Type: ApplicationFiled: April 26, 2006Publication date: February 15, 2007Inventors: Todd Greene, David Helsper
-
Publication number: 20060287902Abstract: A fraudulent business transaction application (FBTA) is provided for monitoring application based fraud. When a consumer supplies account access information in order to carry out on Internet business transaction, the FBTA uses an online fraud mitigation engine to detect phishing intrusions and identity theft. Methods are also provided for calculating travel velocity and transaction frequency, which are useful for determining a fraudulent transaction.Type: ApplicationFiled: August 24, 2006Publication date: December 21, 2006Inventors: David Helsper, Dennis Maicon
-
Publication number: 20060282285Abstract: A fraudulent business transaction application (FBTA) is provided for monitoring application based fraud. When a consumer supplies account access information in order to carry out an Internet business transaction, the FBTA uses an online fraud mitigation engine to detect phishing intrusions and identity theft. Methods are also provided for calculating travel velocity and transaction frequency, which are useful for determining a fraudulent transaction.Type: ApplicationFiled: August 24, 2006Publication date: December 14, 2006Inventors: David Helsper, Dennis Maicon
-
Publication number: 20060168066Abstract: A method, system, and computer program product are provided for implementing embodiments of an EScam Server, which are useful for determining phishing emails. Methods, systems, and program products are also provided to implement embodiments of a Trusted Host Miner, useful for determining servers associated with a Trusted URL, a Trusted Host Browser, useful for communicating to a user when links are Trusted URLs, and a Page Spider, useful for determining on-site links to documents which request a user's confidential information.Type: ApplicationFiled: December 9, 2005Publication date: July 27, 2006Inventors: David Helsper, Jeffrey Burdette, Robert Friedman
-
Publication number: 20060149580Abstract: A fraudulent business transaction application (FBTA) is provided for monitoring application based fraud. When a consumer supplies account access information in order to carry out an Internet business transaction, the FBTA uses an online fraud mitigation engine to detect phishing trusions and identity theft. Methods are also provided for calculating travel velocity and transcation frequency, which are useful for determining a fraudulent transaction.Type: ApplicationFiled: August 23, 2005Publication date: July 6, 2006Inventors: David Helsper, Dennis Maicon
-
Publication number: 20060101120Abstract: An application and system for inspecting an email message to determine if the email message is being used in a phishing ploy. When an email recipient receives an email message, the email message is sent to an EScam server for inspection. During its inspection, the EScam server considers various criteria, such as an originating country for an IP address associated with a sender of the email message, and assigns a score to the email message. Based on the score of the email message and threshold levels set within the EScam server, an email client determines whether the email message is part of a phishing ploy or a legitimate email message.Type: ApplicationFiled: November 10, 2004Publication date: May 11, 2006Inventors: David Helsper, Jeff Burdette, Robert Friedman
-
Publication number: 20060064374Abstract: A fraudulent business transaction application (FBTA) for monitoring application based fraud. When a consumer supplies account access information in order to carry out an Internet business transaction, the FBTA uses an online fraud mitigation engine to detect phishing intrusions and identity theft. The FBTA uses the account access information, a rules based engine and a risk score database to determine the likelihood that the Internet business transaction is fraudulent and deserves further review by personnel.Type: ApplicationFiled: September 17, 2004Publication date: March 23, 2006Inventors: David Helsper, Dennis Maicon