one
SYSTEM FOR MANAGING FRAUDULENT COMPUTING OPERATIONS OF USERS PERFORMED IN COMPUTING NETWORKS AND METHODS OF USE THEREOF

Last updated:

Abstract:

A method includes displaying on a graphic user interface (GUI) of a computing device of a user, a log of computing operations performed by the user at computing terminals of entity servers respectively managed by entities. The user uses a unique authorization identifier provided by the authorizing entity to authorize the computing operations at the computing terminals of the entity servers. The user provides a fraud indication through the GUI that at least one computing operation in the log is fraudulent. Memory jogging visual units are displayed on the GUI to the user that cause the user to recall performing the at least one computing operation identified as being fraudulent. An entry of the at least one computing operation in an operation database is marked as a valid operation authorized by the user when receiving a recognition indication and potentially fraudulent when no recognition indication by the user.

Status:
Application
Type:

Utility

Filling date:

11 Aug 2020

Issue date:

17 Feb 2022