Patents by Inventor David Helsper

David Helsper has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10691730
    Abstract: A method, computer program product and electronic device are provided for providing hyper-local geo-targeting based on validated, user-supplied geographic information, wherein the user's anonymity may be maintained. In particular, user-supplied geographic information may be collected in association with a truncated IP address. Once collected, the user-supplied information may be validated using geographic data previously derived from one or more complete IP addresses corresponding to the received truncated IP address. The derived geographic data may have been derived using a system that maps the routing infrastructure of the Internet in order to determine where endpoints on the Internet are located. The validated, user-supplied geographic information, which may be more specific than the derived geographic data, may then be used to provide more granular and accurate geo-targeting, all the while maintaining the privacy of the individual users.
    Type: Grant
    Filed: March 25, 2013
    Date of Patent: June 23, 2020
    Assignee: Digital Envoy, Inc.
    Inventors: Jeff Burdette, Joseph Hebenstreit, Richard Cabrera, Christopher Jason Lee, Robert Friedman, David Helsper
  • Patent number: 8443107
    Abstract: A method, computer program product and electronic device are provided for providing hyper-local geo-targeting based on validated, user-supplied geographic information, wherein the user's anonymity may be maintained. In particular, user-supplied geographic information may be collected in association with a truncated IP address. Once collected, the user-supplied information may be validated using geographic data previously derived from one or more complete IP addresses corresponding to the received truncated IP address. The derived geographic data may have been derived using a system that maps the routing infrastructure of the Internet in order to determine where endpoints on the Internet are located. The validated, user-supplied geographic information, which may be more specific than the derived geographic data, may then be used to provide more granular and accurate geo-targeting, all the while maintaining the privacy of the individual users.
    Type: Grant
    Filed: November 11, 2009
    Date of Patent: May 14, 2013
    Assignee: Digital Envoy, Inc.
    Inventors: Jeff Burdette, Joseph Hebenstreit, Richard Cabrera, Christopher Jason Lee, Robert Friedman, David Helsper
  • Patent number: 8032594
    Abstract: An application and system for inspecting an email message to determine if the email message is being used in a phishing ploy. When an email recipient receives an email message, the email message is sent to an EScam server for inspection. During its inspection, the EScam server considers various criteria, such as an originating country for an IP address associated with a sender of the email message, and assigns a score to the email message. Based on the score of the email message and threshold levels set within the EScam server, an email client determines whether the email message is part of a phishing ploy or a legitimate email message.
    Type: Grant
    Filed: November 10, 2004
    Date of Patent: October 4, 2011
    Assignee: Digital Envoy, Inc.
    Inventors: David Helsper, Jeff Burdette, Robert Friedman
  • Publication number: 20110113116
    Abstract: A method, computer program product and electronic device are provided for providing hyper-local geo-targeting based on validated, user-supplied geographic information, wherein the user's anonymity may be maintained. In particular, user-supplied geographic information may be collected in association with a truncated IP address. Once collected, the user-supplied information may be validated using geographic data previously derived from one or more complete IP addresses corresponding to the received truncated IP address. The derived geographic data may have been derived using a system that maps the routing infrastructure of the Internet in order to determine where endpoints on the Internet are located. The validated, user-supplied geographic information, which may be more specific than the derived geographic data, may then be used to provide more granular and accurate geo-targeting, all the while maintaining the privacy of the individual users.
    Type: Application
    Filed: November 11, 2009
    Publication date: May 12, 2011
    Inventors: JEFF BURDETTE, Joseph Hebenstreit, Richard Cabrera, Christopher Jason Lee, Robert Friedman, David Helsper
  • Patent number: 7708200
    Abstract: A fraudulent business transaction application (FBTA) is provided for monitoring application based fraud. When a consumer supplies account access information in order to carry out an Internet business transaction, the FBTA uses an online fraud mitigation engine to detect phishing intrusions and identity theft. Methods are also provided for calculating travel velocity and transaction frequency, which are useful for determining a fraudulent transaction.
    Type: Grant
    Filed: August 24, 2006
    Date of Patent: May 4, 2010
    Assignee: Digital Envoy, Inc.
    Inventors: David Helsper, Dennis Maicon
  • Patent number: 7673793
    Abstract: A fraudulent business transaction application (FBTA) is provided in embodiments of the present invention for monitoring fraudulent transactions. When a consumer supplies account access information in order to carry out an Internet business transaction, the FBTA uses an online fraud mitigation engine to detect phishing intrusions and identity theft. Embodiments are also provided for calculating travel velocity and transaction frequency, which are useful for determining a fraudulent transaction. Further embodiments are provided for authenticating a transaction using a cookie stored on a client device and a behavior profile stored on a server.
    Type: Grant
    Filed: August 24, 2006
    Date of Patent: March 9, 2010
    Assignee: Digital Envoy, Inc.
    Inventors: Todd Greene, David Helsper
  • Patent number: 7543740
    Abstract: A fraudulent business transaction application (FBTA) is provided in embodiments of the present invention for monitoring fraudulent transactions. When a consumer supplies account access information in order to carry out an Internet business transaction, the FBTA uses an online fraud mitigation engine to detect phishing intrusions and identity theft. Embodiments are also provided for calculating travel velocity and transaction frequency, which are useful for determining a fraudulent transaction. Further embodiments are provided for authenticating a transaction using a cookie stored on a client device and a behavior profile stored on a server.
    Type: Grant
    Filed: April 26, 2006
    Date of Patent: June 9, 2009
    Assignee: Digital Envoy, Inc.
    Inventors: Todd Greene, David Helsper
  • Patent number: 7497374
    Abstract: A fraudulent business transaction application (FBTA) is provided for monitoring application based fraud. When a consumer supplies account access information in order to carry out an Internet business transaction, the FBTA uses an online fraud mitigation engine to detect phishing trusions and identity theft. Methods are also provided for calculating travel velocity and transcation frequency, which are useful for determining a fraudulent transaction.
    Type: Grant
    Filed: August 23, 2005
    Date of Patent: March 3, 2009
    Assignee: Digital Envoy, Inc.
    Inventors: David Helsper, Dennis Maicon
  • Patent number: 7438226
    Abstract: A fraudulent business transaction application (FBTA) is provided for monitoring application based fraud. When a consumer supplies account access information in order to carry out on Internet business transaction, the FBTA uses an online fraud mitigation engine to detect phishing intrusions and identity theft. Methods are also provided for calculating travel velocity and transaction frequency, which are useful for determining a fraudulent transaction.
    Type: Grant
    Filed: August 24, 2006
    Date of Patent: October 21, 2008
    Assignee: Digital Envoy, Inc.
    Inventors: David Helsper, Dennis Maicon
  • Publication number: 20080010678
    Abstract: Systems, methods, and computer program products for providing fraud analysis to an application using a proxy and a fraud determination unit are provided. An Online Fraud Mitigation Engine is also provided in embodiments of the present invention for determining fraudulent transactions. Embodiments are also provided for calculating travel velocity and transaction frequency, which are useful for determining a fraudulent transaction. Further embodiments are provided for authenticating a transaction using an object stored on a client device and a behavior profile stored on a server.
    Type: Application
    Filed: June 5, 2007
    Publication date: January 10, 2008
    Inventors: Jeff Burdette, Richard Cabrera, David Helsper
  • Patent number: 7280988
    Abstract: A monitoring system including a baseline model that automatically captures and models normal system behavior, a correlation model that employs multivariate autoregression analysis to detect abnormal system behavior, and an alarm service that weights and scores a variety of alerts to determine an alarm status and implement appropriate response actions. The baseline model decomposes the input variables into a number of components representing relatively predictable behaviors so that the erratic component e(t) may be isolated for further processing. These components include a global trend component, a cyclical component, and a seasonal component. Modeling and continually updating these components separately permits a more accurate identification of the erratic component of the input variable, which typically reflects abnormal patterns when they occur.
    Type: Grant
    Filed: December 19, 2002
    Date of Patent: October 9, 2007
    Assignee: Netuitive, Inc.
    Inventors: David Helsper, Jean-Francois Huard, David Homoki, Amanda Rasmussen, Robert Jannarone
  • Publication number: 20070073630
    Abstract: A fraudulent business transaction application (FBTA) is provided in embodiments of the present invention for monitoring fraudulent transactions. When a consumer supplies account access information in order to carry out an Internet business transaction, the FBTA uses an online fraud mitigation engine to detect phishing intrusions and identity theft. Embodiments are also provided for calculating travel velocity and transaction frequency, which are useful for determining a fraudulent transaction. Further embodiments are provided for authenticating a transcation using a cookie stored on a client device and a behavior profile stored on a server.
    Type: Application
    Filed: August 24, 2006
    Publication date: March 29, 2007
    Inventors: Todd Greene, David Helsper
  • Publication number: 20070061273
    Abstract: A fraudulent business transaction application (FBTA) is provided in embodiments of the present invention for monitoring fraudulent transactions. When a consumer supplies account access information in order to carry out an Internet business transaction, the FBTA uses an online fraud mitigation engine to detect phishing intrusions and identity theft. Embodiments are also provided for calculating travel velocity and transaction frequency, which are useful for determining a fraudulent transaction. Further embodiments are provided for authenticating a transaction using a cookie stored on a client device and a behavior profile stored on a server.
    Type: Application
    Filed: August 24, 2006
    Publication date: March 15, 2007
    Inventors: Todd Greene, David Helsper
  • Publication number: 20070038568
    Abstract: A fraudulent business transaction application (FBTA) is provided in embodiments of the present invention for monitoring fraudulent transactions. When a consumer supplies account access information in order to carry out an Internet business transaction, the FBTA uses an online fraud mitigation engine to detect phishing intrusions and identity theft. Embodiments are also provided for calculating travel velocity and transaction frequency, which are useful for determining a fraudulent transaction. Further embodiments are provided for authenticating a transaction using a cookie stored on a client device and a behavior profile stored on a server.
    Type: Application
    Filed: April 26, 2006
    Publication date: February 15, 2007
    Inventors: Todd Greene, David Helsper
  • Publication number: 20060287902
    Abstract: A fraudulent business transaction application (FBTA) is provided for monitoring application based fraud. When a consumer supplies account access information in order to carry out on Internet business transaction, the FBTA uses an online fraud mitigation engine to detect phishing intrusions and identity theft. Methods are also provided for calculating travel velocity and transaction frequency, which are useful for determining a fraudulent transaction.
    Type: Application
    Filed: August 24, 2006
    Publication date: December 21, 2006
    Inventors: David Helsper, Dennis Maicon
  • Publication number: 20060282285
    Abstract: A fraudulent business transaction application (FBTA) is provided for monitoring application based fraud. When a consumer supplies account access information in order to carry out an Internet business transaction, the FBTA uses an online fraud mitigation engine to detect phishing intrusions and identity theft. Methods are also provided for calculating travel velocity and transaction frequency, which are useful for determining a fraudulent transaction.
    Type: Application
    Filed: August 24, 2006
    Publication date: December 14, 2006
    Inventors: David Helsper, Dennis Maicon
  • Publication number: 20060168066
    Abstract: A method, system, and computer program product are provided for implementing embodiments of an EScam Server, which are useful for determining phishing emails. Methods, systems, and program products are also provided to implement embodiments of a Trusted Host Miner, useful for determining servers associated with a Trusted URL, a Trusted Host Browser, useful for communicating to a user when links are Trusted URLs, and a Page Spider, useful for determining on-site links to documents which request a user's confidential information.
    Type: Application
    Filed: December 9, 2005
    Publication date: July 27, 2006
    Inventors: David Helsper, Jeffrey Burdette, Robert Friedman
  • Publication number: 20060149580
    Abstract: A fraudulent business transaction application (FBTA) is provided for monitoring application based fraud. When a consumer supplies account access information in order to carry out an Internet business transaction, the FBTA uses an online fraud mitigation engine to detect phishing trusions and identity theft. Methods are also provided for calculating travel velocity and transcation frequency, which are useful for determining a fraudulent transaction.
    Type: Application
    Filed: August 23, 2005
    Publication date: July 6, 2006
    Inventors: David Helsper, Dennis Maicon
  • Publication number: 20060101120
    Abstract: An application and system for inspecting an email message to determine if the email message is being used in a phishing ploy. When an email recipient receives an email message, the email message is sent to an EScam server for inspection. During its inspection, the EScam server considers various criteria, such as an originating country for an IP address associated with a sender of the email message, and assigns a score to the email message. Based on the score of the email message and threshold levels set within the EScam server, an email client determines whether the email message is part of a phishing ploy or a legitimate email message.
    Type: Application
    Filed: November 10, 2004
    Publication date: May 11, 2006
    Inventors: David Helsper, Jeff Burdette, Robert Friedman
  • Publication number: 20060064374
    Abstract: A fraudulent business transaction application (FBTA) for monitoring application based fraud. When a consumer supplies account access information in order to carry out an Internet business transaction, the FBTA uses an online fraud mitigation engine to detect phishing intrusions and identity theft. The FBTA uses the account access information, a rules based engine and a risk score database to determine the likelihood that the Internet business transaction is fraudulent and deserves further review by personnel.
    Type: Application
    Filed: September 17, 2004
    Publication date: March 23, 2006
    Inventors: David Helsper, Dennis Maicon