IBM announces new technique to combat fraud in online stores

IBM has announced a new proprietary technique in the area of ​​security and business analytics to help online businesses fight fraud

IBM has announced a new patented technique in the area of ​​the fullfilment of security requirements and business analytics to help online businesses to fight fraud. This technique works by analyzing the behavior of customers and determining the veracity of their identity when they access a web page or an application using any type of device, whether it be a computer, a smartphone or a tablet.

This IBM invention is very useful for website managers, for cloud service providers and also for mobile application developers because it is more efficient when it comes to ddetect and manage security threats, using analytics to combat fraud.

When people access a bank's site or are doing buy online, subconsciously establish the characteristics of the way they interact with the site, such as the following:

  • clicking in certain areas more often than others
  • use the up and down buttons on the keyboard to navigate
  • rely solely on the mouse
  • touch or slide the screen of a tablet or smartphone in a different way.

In a similar way to how individuals recognize changes in the behavior of a family member or friend on the phone, even when the audio is confusing, because of the words they use, the way they answer the phone, their gestures, etc., the invention of IBM helps companies analyze and identify sudden changes in user behavior on the Internet.

If this new invention detects a change in behavior, a measure of secondary authentication, as a security question. This helps businesses and website operators avoid fraud inadvertently hampering legitimate customer activities.

"Our invention improves the efficiency of authentication and security systems with insights derived from real-time data analysis"said Keith Walker, IBM Master Inventor and co-inventor of the patent. “For example, if a person suddenly changes the way they interact with an online bank or store, for example due to a broken hand or a tablet instead of a desktop computer, I want these websites to can detect the change and then ask for additional identity confirmation before accepting a transaction. Our experience in developing and testing a prototype, which perfectly confirmed identities, shows that such a change would most likely be due to fraud, and we all want these sites to be able to provide greater protection by simultaneously processing our transactions quickly. «.

As trade takes place more and more through Internet and more specifically through the cloud, a new generation of criminals is using the digital channels, such as mobile devices, social networks and cloud platforms, to probe for weaknesses and vulnerabilities in systems, including the ability to steal the login information and password of the e-commerce sites that we use every day. Despite using strong passwords and authentication systems, troublesome fraudulent charges are still a reality in today's digital world.

In March, IBM announced new software and services to help organizations use big data and its analytics to address the $ 3,5 trillion lost each year to fraud and other financial crime. IBM's anti-fraud technique includes an integrated offering to help clients aggregate and analyze diverse data sets to prevent, detect and investigate suspicious activity, also using software used to fight malware often used by thieves. cybernetics to compromise usernames and passwords.

IBM invests around $ 6 trillion annually in R&D and is constantly exploring new approaches to security and analytics that will provide a competitive advantage to the company and its customers. In the area of ​​fraud, IBM has around 290 patents.
To learn more about IBM's Smarter Fraud Initiative, visit www.ibm.com/smartercounterfraud. You can also follow the conversation on Twitter at #counterfraud


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.