17835999. METHOD TO DETECT AND OBSTRUCT FRAUDULENT TRANSACTIONS simplified abstract (INTERNATIONAL BUSINESS MACHINES CORPORATION)

From WikiPatents
Jump to navigation Jump to search

METHOD TO DETECT AND OBSTRUCT FRAUDULENT TRANSACTIONS

Organization Name

INTERNATIONAL BUSINESS MACHINES CORPORATION

Inventor(s)

Doga Tav of Fredericton (CA)

Cesar Augusto Rodriguez Bravo of Alajuela (CR)

METHOD TO DETECT AND OBSTRUCT FRAUDULENT TRANSACTIONS - A simplified explanation of the abstract

This abstract first appeared for US patent application 17835999 titled 'METHOD TO DETECT AND OBSTRUCT FRAUDULENT TRANSACTIONS

Simplified Explanation

The abstract describes a computer-implemented method for detecting and obstructing skimmer devices in a network environment. Skimmer devices are unauthorized wireless devices that can intercept and steal sensitive information.

  • The method involves monitoring wireless communications within the network environment.
  • It identifies information associated with wireless communications transmitted by an unknown wireless device.
  • Based on this information, it selects an obstruction rule.
  • It then executes an obstruction action corresponding to the selected rule.

Potential Applications

This technology can be applied in various industries and settings where wireless communication security is crucial:

  • Financial institutions: Preventing skimmer devices from stealing credit card information at ATMs or point-of-sale terminals.
  • Retail stores: Protecting customer data from being compromised by skimmers placed on payment terminals.
  • Government agencies: Safeguarding sensitive information transmitted over wireless networks.
  • Healthcare facilities: Preventing unauthorized access to patient data transmitted wirelessly.
  • Public Wi-Fi networks: Detecting and obstructing skimmers that may be intercepting user data.

Problems Solved

The technology addresses the following problems:

  • Skimmer detection: It identifies unknown wireless devices that may be skimmer devices.
  • Data theft prevention: By obstructing skimmer devices, it prevents the interception and theft of sensitive information.
  • Network security: It enhances the security of wireless networks by detecting and obstructing unauthorized devices.

Benefits

The use of this technology offers several benefits:

  • Enhanced security: It provides an additional layer of security to protect against skimmer devices.
  • Real-time detection: It monitors wireless communications in real-time, allowing for immediate detection of potential threats.
  • Customizable rules: The obstruction rules can be tailored to specific network environments, increasing effectiveness.
  • Automated actions: The method automatically executes obstruction actions, minimizing the need for manual intervention.
  • Cost-effective: By preventing data theft, it helps avoid financial losses and potential legal consequences.


Original Abstract Submitted

A computer-implemented method for detecting and obstructing skimmer devices is disclosed. The computer-implemented method includes monitoring wireless communications within a network environment. The computer-implemented method further includes identifying information associated with one or more wireless communications within the network environment transmitted by an unknown wireless device. The computer-implemented method further includes selecting an obstruction rule based, at least in part, on the information associated with the one or more wireless communications transmitted by the unknown wireless device. The computer-implemented method further includes executing an obstruction action corresponding to the selected obstruction rule.