+

WO2008030670A1 - Détection et jugement de la fraude au clic - Google Patents

Détection et jugement de la fraude au clic Download PDF

Info

Publication number
WO2008030670A1
WO2008030670A1 PCT/US2007/074651 US2007074651W WO2008030670A1 WO 2008030670 A1 WO2008030670 A1 WO 2008030670A1 US 2007074651 W US2007074651 W US 2007074651W WO 2008030670 A1 WO2008030670 A1 WO 2008030670A1
Authority
WO
WIPO (PCT)
Prior art keywords
click
sample set
representations
fraud
advertiser
Prior art date
Application number
PCT/US2007/074651
Other languages
English (en)
Inventor
Gideon A. Yuval
Original Assignee
Microsoft Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corporation filed Critical Microsoft Corporation
Publication of WO2008030670A1 publication Critical patent/WO2008030670A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising

Definitions

  • click fraud occurs when a person, automated script or computer program imitates a valid user of a website and clicks on an advertisement to generate an improper advertising fee or charge.
  • Click fraud can be prompted by various financial considerations. Competitors of the advertiser can click on the advertiser's ads, forcing the advertiser to pay excessive fees.
  • friends of the website operator or advertising network may improperly click on advertisements intending to assist the website operator or advertising network by generating fees. Competitors of a website operator or advertising network may click on advertisements to make it look as though the website operator or advertising network has been improperly generating clicks, effectively framing the operator or network.
  • Click fraud can also be motivated purely by malicious intent, comparable to vandalism. Individuals can perpetrate click fraud based upon personal or political vendettas in addition to financial gain.
  • the provided subject matter concerns facilitating detection and adjudication of click fraud for a pay per click online system.
  • An inherent problem in identifying and resolving click fraud is the minimal financial value of each individual instance of fraud. For example, a single incident of click fraud may cost an advertiser fifty-cents. A simple cost benefit analysis makes it clear that it is not cost effective for advertisers to pay to investigate and dispute each case of click fraud. Advertising systems may be in a better position to monitor click fraud. However, advertisers may be reluctant to disclose trade secrets regarding their customers or customer transactions necessary to fully analyze and detect illegitimate clicks.
  • the systems and methods described herein can be utilized to generate a random, unbiased sample of clicks that can be evaluated and used to estimate the occurrence of click fraud over the entire set of clicks.
  • Each detected case of click fraud within the sample is representative of a predetermined number of undetected fraudulent clicks. For example, if one click in a thousand is sampled, each detected instance of click fraud is representative of one thousand instances of click fraud. Therefore, each instance of click fraud within the sample set has an increased value based upon the number of clicks it represents. The increased value of each instance of click fraud in the sample makes it economically viable for advertisers to analyze the sample set and adjudicate detected click fraud. Consequently, it is important that the sample set be both random and unbiased.
  • the advertiser can create a representation of each click for use in generation of the sample set.
  • the representation can be generated utilizing a hash function and the history of the click, including information from the advertising system as well as information gathered subsequent to the selection of the advertisement (e.g., information regarding a transaction or customer actions).
  • the representation e.g., the hash value generated from the click history
  • the hash value can be used at a later time to validate the click history, ensuring that the click history remains unchanged from the time the click representation is generated.
  • the advertising system can generate the sample set using cryptographic methods to ensure the randomness of the sample and lack of bias in favor of either the advertiser or the advertising system.
  • the click representation can be encoded (e.g. , using public key cryptography).
  • the sample set can be selected from the encoded click representations, referred to herein as click identifiers, based upon predetermine criteria (e.g., bit patterns or ranges of values).
  • predetermine criteria e.g., bit patterns or ranges of values.
  • the advertiser can verify that the click identifier was correctly encoded and that the sample set was properly selected based upon the predetermined criteria.
  • the advertiser need only analyze the sample set for fraudulent clicks to estimate the occurrence of click fraud.
  • Fig. 1 is a block diagram of a click fraud detection system for pay per click online advertising in accordance with an aspect of the subject matter disclosed herein.
  • Fig. 2 is a more detailed block diagram of a click fraud detection system including a hash value generator component in accordance with an aspect of the subject matter disclosed herein.
  • Fig. 3 is a more detailed block diagram of a click fraud system including a sample selector component in accordance with an aspect of the subject matter disclosed herein.
  • Fig. 4 is a block diagram of a click fraud detection system including components for adjudication of click fraud in accordance with an aspect of the subject matter disclosed herein.
  • Fig. 5 is a block diagram of a click fraud detection system including user interfaces in accordance with an aspect of the subject matter disclosed herein.
  • Fig. 6 illustrates a methodology for monitoring and detecting click fraud in accordance with an aspect of the subject matter disclosed herein.
  • Fig. 7 illustrates a methodology for generating a sample set for use in detection of click fraud in accordance with an aspect of the subject matter disclosed herein.
  • Fig. 8 illustrates a methodology for adjudication of click fraud claims in accordance with an aspect of the subject matter disclosed herein.
  • Fig. 9 is a schematic block diagram illustrating a suitable operating environment.
  • Fig. 10 is a schematic block diagram of a sample-computing environment.
  • a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer.
  • an application running on computer and the computer can be a component.
  • One or more components may reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers.
  • the disclosed subject matter may be implemented as a system, method, apparatus, or article of manufacture using standard programming and/or engineering techniques to produce software, firmware, hardware, or any combination thereof to control a computer or processor based device to implement aspects detailed herein.
  • article of manufacture (or alternatively, “computer program product”) as used herein is intended to encompass a computer program accessible from any computer-readable device, carrier, or media.
  • computer readable media can include but are not limited to magnetic storage devices (e.g. , hard disk, floppy disk, magnetic strips%), optical disks (e.g., compact disk (CD), digital versatile disk (DVD)...), smart cards, and flash memory devices (e.g., card, stick).
  • a carrier wave can be employed to carry computer-readable electronic data such as those used in transmitting and receiving electronic mail or in accessing a network such as the Internet or a local area network (LAN).
  • LAN local area network
  • an advertising system can include a website operator, an advertising network or any other entity with which the advertiser contracts for display of online advertisements. Costs can quickly escalate into the hundreds or thousands of dollars for analysis and adjudication for a transaction that may have an actual cost of fifty-cents. [0025] It may be more feasible for advertising systems to monitor clicks for possible fraud.
  • a system for facilitating detection and adjudication of click fraud between an advertiser 100 and an advertising system 102 in a pay per click system is illustrated.
  • the system can facilitate creation of an unbiased, random sample set of clicks.
  • the advertiser 100 and advertising system 102 can utilize the sample set to estimate the number of illegitimate clicks and negotiate reimbursement of the advertiser 100 for any instances of click fraud.
  • a click representation component 104 can generate a representation of a click for use in selecting a sample set.
  • the click representation can be generated based upon any information associated with a click.
  • Click information can include information gathered by the advertiser 100 as well as the advertising system 102.
  • the advertising system 102 can provide click information for each click to any advertisers 100 via the advertiser interface 106. Although a single advertiser 100 is illustrated for brevity, the advertiser interface 106 can provide click information to any number of advertisers 100.
  • Click information specific to the advertiser 100 can be received via an advertising system interface 108 and maintained in a click data store 110. Click information can also be independently maintained by the advertising system 102 in a click information data store 112. Generation of the click representation is discussed in greater detail below with respect to Figure 2.
  • One or more click representations can be provided to the advertising system 102 via the advertising system interface 108 and received by the advertiser interface 106.
  • a sample generator component 114 can utilize the received click representations to generate an unbiased, random sample set of clicks.
  • the sample generator component 114 can utilize cryptographic techniques to encode the click representations and produce a set of click identifiers from which the sample set is selected.
  • the sample generator component 114 can then select a subset of the click identifiers as the sample set based upon a predetermined parameter or parameters. Parameters can be chosen to control the size of the sample set and can be agreed upon by the advertising system 102 and the advertiser 100 prior to creation of the sample set.
  • Click identifier generation and sample set selection are discussed in detail below with respect to Figure 3.
  • the process of selecting the sample set is effectively split between the advertiser 100 and the advertising system 102.
  • the advertiser 100 can control the click representation for each click, while the advertising system is responsible for generating the sample set as a function of the click representations. This division helps ensure that an unbiased sample is utilized for click fraud evaluation.
  • sample set information can be stored in the click information data store 112 of the advertising system 102. Click representations can also be maintained in the click information data store 112 for reference in case of disputes regarding selection of the sample set or the fraudulent nature of a particular click.
  • sample set information can be provided to the appropriate advertiser 100 through the advertiser interface 106.
  • the advertiser 100 can utilize a sample set verification component 116 to verify that the sample set was correctly determined by the advertising system 102. The sample set can be verified based upon the click representations provided to the advertising system 102 and the predetermined parameter(s). The sample set information can be maintained in the click data store 110 for further evaluation and determination of click fraud.
  • the click representation component 104 can include a click history generator component 200 that can gather data associated with a click and assemble the gathered data into a click history.
  • the click data can include information obtained from the advertising system 102, such as information regarding the recent actions of the user prior to selection of the advertisement, time at which the selection occurred, information regarding the user or user's account and the like. This click information can be provided through the advertising system interface 106 and maintained in the click data store 110. The information obtained from the advertising system 102 can be combined with advertiser click information collected by the advertiser 100 subsequent to the selection of the advertisement.
  • the advertiser click information can include any actions taken by the user after selection of the advertisement, such as purchases by the user, interactions between advertiser representatives and the user and the like.
  • Information obtained from the advertising system 102 and the advertiser click information can be combined and organized in a standardized format that can be utilized in identification of illegitimate clicks.
  • the click history can be analyzed and used to evaluate the likelihood that a click is fraudulent. For example, repeated selection of an advertisement by a user clearly lacking the wherewithal or desire to purchase the advertised product can signal that the user is receiving a financial benefit for selecting the advertisement.
  • the click histories can contain a great deal of information regarding the business practices of the advertiser 100 as well as an abundance of information regarding customers of the advertiser 100. Although such information can be useful in detecting click fraud, an advertiser may not wish to turn over the information to the advertising system 102.
  • a hash value generator component 202 can utilize a one-way hash function to create a hash value from a click history.
  • the hash value can be used as the click representation and provided to the advertising system 102.
  • Hash functions e.g., Secure Hash Algorithm (SHA), Message Digest 5 (MD5)
  • SHA Secure Hash Algorithm
  • MD5 Message Digest 5
  • SHA Secure Hash Algorithm
  • MD5 Message Digest 5
  • a one-way hash function works in one direction, such that it is easy to compute a hash value from the input string, but difficult to generate input string based solely upon the hash.
  • the output hash value is not dependent upon the input click history in a discernable way.
  • the click representation can be used to authenticate the click history.
  • the hash value generator component 202 can generate click representations based upon hash values of click histories. Consequently, a click representation can be supplied to the advertising system 102 and yet, the advertising system 102 will be unable recreate the click history, including any confidential customer information, based solely upon the click representation. However, in the event that a click is adjudicated based upon the click history, the advertising system 102 can verify that the click history has remained unchanged since creation of the click representation.
  • the click history can be authenticated by hashing the click history and comparing the click representation provided by the advertiser 100 to the newly hashed value.
  • Communications between the advertiser 100 and the advertising system 102 can be performed using numerous methods.
  • communications between the advertiser interface 106 and the advertising system interface 106 can be periodic or asynchronous.
  • click representations can be transmitted as they are generated, in batches or groups and/or in response to a request from the advertising system 102.
  • Click representations can be transmitted via networks, such as the Internet, by computer-readable media (e.g., CDs, DVDs) or any other suitable method of communication.
  • the sample generator component 114 of the advertising system 102 can include a click identifier component 300 that generates a click identifier based upon the click representations obtained from the advertiser 100.
  • the click identifier component 300 can utilize cryptographic techniques to encode click representations to create click identifiers. Clicks can be selected for inclusion in the sample set based upon this seemingly random click identifier value.
  • the click identifier component 300 creates a bit pattern or value that the advertiser 100 is incapable of predicting. Consequently, the advertiser 100 will not be able to modify or adjust a specific click representation to ensure its inclusion in the sample set.
  • the click identifier is computed based upon a click representation that remains outside of the control of the advertising system 102, ensuring that the advertising system cannot bias generation of click identifiers to control selection of clicks included in the sample set.
  • the advertiser 102 will be able to verify that the click identifier has been correctly generated by the click identifier component 300, but will not have the capability to generate the click identifier itself.
  • the click identifier component 300 can encode the click representation using a private key. To predict the click identifier from solely from the click representation, the advertiser 100 would have to break the encryption system, an extremely difficult and economically impractical task.
  • the advertiser 100 can be provided with a public key that allows it to decrypt the click identifier and verify that the click representation was correctly encoded during generation of the click identifier.
  • Public key encryption systems such as the RSA encryption algorithm, Digital Signature Algorithm (DSA), ElGamal cryptosystem, elliptical curve cryptography, Diffie-Hellman and the like can be used by the click identifier component 300 to generate the click identifier.
  • a sample selector component 302 can select a subset of the click identifiers for inclusion in the sample set of clicks.
  • the sample selector component 302 can compare the click identifiers to a predetermined pattern to identify clicks for inclusion in the sample set. For example, clicks can be selected for inclusion in the sample set if the middle eight bits of the click identifier are equal to zero.
  • the length of the bit pattern used to select click identifiers will affect the likelihood that a particular click identifier will be selected.
  • click identifiers For example, if selection of click identifiers is based solely upon the last bit of the click identifier (e.g., a click identifier is selected for the sample set if the final bit is equal to zero), a click identifier will have a one in two chance of being selected, since the final bit will be one of two values, zero or one. Similarly, if selection of click identifiers is based upon the last two bits (e.g., a click identifier is selected for the sample if the final two bits are both equal to one), a click identifier will have a one in four chance of being selected since there are four possible values for the final two bits.
  • the likelihood that a click identifier will be selected for the sample set can be computed as l/2 k , where k is equal to the bit pattern length.
  • Sample set size can be adjusted by modifying the length of the bit pattern to be matched.
  • the advertiser 100 and advertising system 102 can agree upon a bit pattern prior to creation of the sample set.
  • the click identifier can be viewed as a numerical value rather than a bit pattern.
  • the value of the click identifier can be compared to range of numerical values to determine the sample set. For example, click identifiers with a numerical value less than 1000 or between 30,000 and 50,000 can be included in the sample set.
  • the size of the range of values selected for inclusion in the sample set can be specified to control the size of the sample set.
  • Sample set information including click identifiers and/or the click representations associated with the click identifiers can be maintained in the click information data store 112.
  • sample set information, including click identifiers can be supplied to the advertiser 100.
  • the provided sample set information allows the advertiser 100 to verify encoding of the click representations and selection of the sample set from the click identifiers.
  • a system for facilitating click fraud detection including click analysis is illustrated.
  • the advertiser 100 can include a click history analysis component 400 that selects one or more clicks from the sample set for analysis to detect fraudulent clicks.
  • the click history analysis component 400 can retrieve the click history for the selected click from the click data store 110.
  • the click history analysis component 400 can be implemented as an artificial intelligence (AI) and/or machine learning and reasoning (MLR) component that employs a probabilistic and/or statistical-based analysis to prognose or infer that a click is fraudulent in nature.
  • AI and MLR mechanisms can be employed to review click histories and detect irregularities indicative of illegitimate clicks.
  • the advertiser 100 can notify the advertising system 102 of its claim for click fraud. Notification can occur via the advertising system interface 108 and the advertiser interface 106, via a letter or any other suitable means for notification.
  • the advertiser 100 can provide any necessary information including, but not limited to, the click history, the click representation and the click identifier for the alleged fraudulent click.
  • the advertising system 102 can analyze the click to make an independent evaluation as to the fraudulent nature of the click.
  • a fraud analysis component 402 can evaluate the provided click information to determine whether to reimburse the advertiser 100 or dispute the claim of click fraud.
  • the fraud analysis component 402 can include a click history verification component 404 can confirms that the click representation that was provided to the advertising system 102 and used in generation of the sample set was correctly derived from the click history maintained by the advertiser 100. As discussed in detail above, the click representation can be computed from the click history using a one-way hash function. Consequently, the click representation can be used to authenticate the click history.
  • the fraud analysis component 402 can also include a click fraud analysis component
  • the click fraud analysis component 406 can be implemented as an artificial intelligence (AI) and/or machine learning and reasoning (MLR) component that employs a probabilistic and/or statistical-based analysis to prognose or infer that a click is fraudulent in nature.
  • AI artificial intelligence
  • MLR machine learning and reasoning
  • the advertiser 100 can include an advertiser user interface 500 that allows operators or users to monitor the click fraud detection process and/or notifies operators of potential click fraud.
  • the advertiser user interface 500 can render click histories, particularly for the sample set, and allow operators to view click information. Operators can analyze the click histories to determine those clicks that are likely fraudulent.
  • the click history analysis component 400 can suggest clicks to the operator for further analysis via the advertiser user interface 500.
  • the advertiser 100 can notify the advertising system 102 of possible fraudulent clicks as described above.
  • the advertising system 102 can include an advertising system user interface 504 that allows operators to monitor and control generation of samples for one or more advertisers 100.
  • the advertising system user interface 504 can notify the operator if a claim of click fraud has been received from an advertiser 100 and provide the operator with the relevant information.
  • the operator can be provided with the click history, confirmation that the click was included within the sample set, verification of the click history based upon the click representation and an analysis of the click history.
  • the operator can further analyze the click history to determine the appropriate action by the advertising system (e.g., refund of advertising fees, rejection of the claim).
  • the advertising system 102 can generate a response to the click fraud claim authorizing reimbursement or rejecting the claim and notify the advertiser 100.
  • various portions of the disclosed systems above and methods below may include or consist of artificial intelligence or knowledge or rule based components, sub-components, processes, means, methodologies, or mechanisms (e.g., support vector machines, neural networks, expert systems, Bayesian belief networks, fuzzy logic, data fusion engines, classifiers).
  • the click history analysis component 400 and the click fraud analysis component 406 can utilize artificial intelligence of rule-based components to determine if a click is fraudulent.
  • Such components can automate certain mechanisms or processes performed thereby to make portions of the systems and methods more adaptive as well as efficient and intelligent.
  • FIGs. 6-8 While for purposes of simplicity of explanation, the methodologies that can be implemented in accordance with the disclosed subject matter were shown and described as a series of blocks, it is to be understood and appreciated that the claimed subject matter is not limited by the order of the blocks, as some blocks may occur in different orders and/or concurrently with other blocks from what is depicted and described herein. Moreover, not all illustrated blocks may be required to implement the methodologies described hereinafter.
  • Fig. 6 a methodology for monitoring clicks to facilitate detection of click fraud is illustrated.
  • click information is gathered and compiled into a click history.
  • the click history can include information collected by the advertising system regarding the click as well as information collected by the advertiser subsequent to the selection of the advertisement.
  • the click history can be maintained in a standardized format for use in fraud detection.
  • a click representation based upon the click history can be generated at 604.
  • the click representation can be generated by an advertiser using a one-way hash function, thereby ensuring that the click history can be matched to the click representation, if necessary.
  • the click representation can be supplied to an advertising system at 606. By providing the click representation rather than the click history, advertisers can avoid sharing confidential customer information.
  • Click representations can be provided as they are generated, or a set of click representations can be collected and provided as a batch or group. Click representations can be provided via the Internet, in a letter, on computer-readable media or using any other suitable method.
  • sample set information based upon the click representations provided to the advertising system can be received by the advertiser.
  • the sample set information can identify the clicks selected for inclusion in the sample.
  • information can be included (e.g., click identifiers) that allows the advertiser to verify the selection of the sample.
  • the sample set information can be validated by the advertiser. In an aspect, validation can include verifying encoding of the click representation and sample selection parameters.
  • the click histories for the validated sample set can be analyzed at 612.
  • fraud can be established based at least in part upon the analysis of the click history.
  • one or more click representations can be received from the advertiser by an advertising system.
  • the click representations can be hash values of the click history. Use of hash values allows the advertising system to verify the click history at a later time if necessary, but protects confidential business information during the sample selection process.
  • the click representation or representations can be encoded at 704 utilizing a cryptographic technique, such as public key encryption (e.g., RSA).
  • public key encryption e.g., RSA
  • Use of public key encryption ensures that the advertiser will be unable to predict the resulting encoded click representation, referred to herein as a click identifier. However, the advertiser is able to confirm that the click identifier was correctly encoded from the click representation.
  • the sample set information can include information identifying the specific clicks selected for inclusion in the sample set. In addition, the sample set information can include information regarding clicks not selected for inclusion to allow the advertiser to verify sample set selection.
  • sample set information including click representations can be maintained in a data store. The click representations may be utilized in the event that the advertiser claims click fraud or disputes selection of the sample set.
  • a methodology for adjudicating claims of click fraud is illustrated.
  • a possibly fraudulent click is detected by the advertiser.
  • the click fraud can be detected by an advertiser during its analysis of the sample set of clicks.
  • the advertising system is notified of a claim of click fraud.
  • the notification or claim of click fraud can include the information necessary for the advertising system to perform an independent analysis of the click, including click history, click representation and the like.
  • Figs. 9 and 10 as well as the following discussion are intended to provide a brief, general description of a suitable environment in which the various aspects of the disclosed subject matter may be implemented. While the subject matter has been described above in the general context of computer-executable instructions of a computer program that runs on a computer and/or computers, those skilled in the art will recognize that the system and methods disclosed herein also may be implemented in combination with other program modules. Generally, program modules include routines, programs, components, data structures, etc. that perform particular tasks and/or implement particular abstract data types.
  • inventive methods may be practiced with other computer system configurations, including single-processor or multiprocessor computer systems, mini-computing devices, mainframe computers, as well as personal computers, hand-held computing devices (e.g., personal digital assistant (PDA), phone, watch%), microprocessor-based or programmable consumer or industrial electronics, and the like.
  • PDA personal digital assistant
  • the illustrated aspects may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. However, some, if not all aspects of the systems and methods described herein can be practiced on stand-alone computers.
  • program modules may be located in both local and remote memory storage devices.
  • the exemplary environment 900 for implementing various aspects of the embodiments includes a mobile device or computer 902, the computer 902 including a processing unit 904, a system memory 906 and a system bus 908.
  • the system bus 908 couples system components including, but not limited to, the system memory 906 to the processing unit 904.
  • the processing unit 904 can be any of various commercially available processors. Dual microprocessors and other multi-processor architectures may also be employed as the processing unit 904.
  • the system memory 906 includes read-only memory (ROM) 910 and random access memory (RAM) 912.
  • ROM read-only memory
  • RAM random access memory
  • a basic input/output system (BIOS) is stored in a non-volatile memory 910 such as ROM, EPROM, EEPROM, which BIOS contains the basic routines that help to transfer information between elements within the computer 902, such as during start-up.
  • the RAM 912 can also include a high-speed RAM such as static RAM for caching data.
  • the computer or mobile device 902 further includes an internal hard disk drive
  • HDD hard disk
  • EIDE EIDE
  • SATA Serial Advanced Technology Attachment
  • FDD magnetic floppy disk drive
  • optical disk drive 920 e.g., reading a CD- ROM disk 922 or, to read from or write to other high capacity optical media such as the DVD.
  • the hard disk drive 914, magnetic disk drive 916 and optical disk drive 920 can be connected to the system bus 908 by a hard disk drive interface 924, a magnetic disk drive interface 926 and an optical drive interface 928, respectively.
  • the interface 924 for external drive implementations includes at least one or both of Universal Serial Bus (USB) and IEEE 1194 interface technologies. Other external drive connection technologies are within contemplation of the subject systems and methods.
  • USB Universal Serial Bus
  • Other external drive connection technologies are within contemplation of the subject systems and methods.
  • the drives and their associated computer-readable media provide nonvolatile storage of data, data structures, computer-executable instructions, and so forth.
  • the drives and media accommodate the storage of any data in a suitable digital format.
  • a number of program modules can be stored in the drives and RAM 912, including an operating system 930, one or more application programs 932, other program modules 934 and program data 936.
  • a user can enter commands and information into the computer 902 through one or more wired/wireless input devices, e.g., a keyboard 938 and a pointing device, such as a mouse 940.
  • Other input devices may include a microphone, an IR remote control, a joystick, a game pad, a stylus pen, touch screen, or the like.
  • input devices are often connected to the processing unit 904 through an input device interface 942 that is coupled to the system bus 908, but can be connected by other interfaces, such as a parallel port, an IEEE 1194 serial port, a game port, a USB port, an IR interface, etc.
  • a display device 944 can be used to provide a set of group items to a user.
  • the display devices can be connected to the system bus 908 via an interface, such as a video adapter 946.
  • the mobile device or computer 902 may operate in a networked environment using logical connections via wired and/or wireless communications to one or more remote computers, such as a remote computer(s) 948.
  • the remote computer(s) 948 can be a workstation, a server computer, a router, a personal computer, portable computer, microprocessor-based entertainment appliance, a peer device or other common network node, and typically includes many or all of the elements described relative to the computer 902, although, for purposes of brevity, only a memory/storage device 950 is illustrated.
  • the logical connections depicted include wired/wireless connectivity to a local area network (LAN) 952 and/or larger networks, e.g., a wide area network (WAN) 954.
  • LAN local area network
  • WAN wide area network
  • LAN and WAN networking environments are commonplace in offices and companies, and facilitate enterprise-wide computer networks, such as intranets, all of which may connect to a global communications network, e.g. , the Internet.
  • the computer 902 When used in a LAN networking environment, the computer 902 is connected to the local network 952 through a wired and/or wireless communication network interface or adapter 956.
  • the adaptor 956 may facilitate wired or wireless communication to the LAN 952, which may also include a wireless access point disposed thereon for communicating with the wireless adaptor 956.
  • the computer 902 can include a modem 958, or is connected to a communications server on the WAN 954, or has other means for establishing communications over the WAN 954, such as by way of the Internet.
  • the modem 958 which can be internal or external and a wired or wireless device, is connected to the system bus 908 via the serial port interface 942.
  • program modules depicted relative to the computer 902, or portions thereof can be stored in the remote memory/storage device 950. It will be appreciated that the network connections shown are exemplary and other means of establishing a communications link between the computers can be used.
  • the computer 902 is operable to communicate with any wireless devices or entities operatively disposed in wireless communication, e.g. , a printer, scanner, desktop and/or portable computer, PDA, communications satellite, any piece of equipment or location associated with a wirelessly detectable tag (e.g., a kiosk, news stand, restroom), and telephone.
  • the wireless devices or entities include at least Wi-Fi and BluetoothTM wireless technologies.
  • the communication can be a predefined structure as with a conventional network or simply an ad hoc communication between at least two devices.
  • Wi-Fi allows connection to the Internet from a couch at home, a bed in a hotel room, or a conference room at work, without wires.
  • Wi-Fi is a wireless technology similar to that used in a cell phone that enables such devices, e.g., computers, to send and receive data indoors and out; anywhere within the range of a base station.
  • Wi-Fi networks use radio technologies called IEEE 802.11 (a, b, g, etc.) to provide secure, reliable, fast wireless connectivity.
  • a Wi-Fi network can be used to connect computers to each other, to the Internet, and to wired networks (which use IEEE 802.3 or Ethernet).
  • Wi-Fi networks operate in the unlicensed 2.4 and 5 GHz radio bands, at an 11 Mbps (802.1 Ia) or 54 Mbps (802.1 Ib) data rate, for example, or with products that contain both bands (dual band), so the networks can provide real-world performance similar to the basic lOBaseT wired Ethernet networks used in many offices.
  • Fig. 10 is a schematic block diagram of a sample-computing environment 1000 with which the systems and methods described herein can interact.
  • the system 1000 includes one or more client(s) 1002.
  • the client(s) 1002 can be hardware and/or software (e.g., threads, processes, computing devices).
  • the system 1000 also includes one or more server(s) 1004.
  • system 1000 can correspond to a two-tier client server model or a multi-tier model (e.g., client, middle tier server, data server), amongst other models.
  • the server(s) 1004 can also be hardware and/or software (e.g., threads, processes, computing devices).
  • One possible communication between a client 1002 and a server 1004 may be in the form of a data packet adapted to be transmitted between two or more computer processes.
  • the system 1000 includes a communication framework 1006 that can be employed to facilitate communications between the client(s) 1002 and the server(s) 1004.
  • the client(s) 1002 are operably connected to one or more client data store(s) 1008 that can be employed to store information local to the client(s) 1002.
  • the server(s) 1004 are operably connected to one or more server data store(s) 1010 that can be employed to store information local to the servers 1004.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Game Theory and Decision Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

L'invention concerne des systèmes et des procédés permettant de faciliter la détection de la fraude au clic dans un système publicitaire de paiement au clic. Un échantillon aléatoire non biaisé de clics peut être générés et utilisé pour estimer l'occurrence de la fraude au clic dans le système publicitaire. L'analyse de l'ensemble limité d'échantillons diminue les dépenses dans la détection de clics illégitimes. De plus, les cas de fraude au clic détectés dans l'ensemble deséchantillons peuvent être utilisés pour estimer le volume total de fraude au clic à des fins de jugement et de remboursement de l'annonceur, rendant la détection de la fraude au clic économiquement rentable. Dans un aspect, des techniques cryptographiques, telles que le chiffrement à clef publique, peuvent être utilisées pour la génération de l'ensemble des échantillons aléatoires, en permettant à l'annonceur de vérifier la sélection de l'ensemble d'échantillons.
PCT/US2007/074651 2006-09-08 2007-07-27 Détection et jugement de la fraude au clic WO2008030670A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US53015806A 2006-09-08 2006-09-08
US11/530,158 2006-09-08

Publications (1)

Publication Number Publication Date
WO2008030670A1 true WO2008030670A1 (fr) 2008-03-13

Family

ID=39157565

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2007/074651 WO2008030670A1 (fr) 2006-09-08 2007-07-27 Détection et jugement de la fraude au clic

Country Status (1)

Country Link
WO (1) WO2008030670A1 (fr)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8244752B2 (en) 2008-04-21 2012-08-14 Microsoft Corporation Classifying search query traffic
WO2015143096A1 (fr) * 2014-03-18 2015-09-24 Staples, Inc. Prédiction d'achats lors de parcours à l'aide de modèles de markov cachés
US9633364B2 (en) 2010-12-30 2017-04-25 Nokia Technologies Oy Method and apparatus for detecting fraudulent advertising traffic initiated through an application
US20180253755A1 (en) * 2016-05-24 2018-09-06 Tencent Technology (Shenzhen) Company Limited Method and apparatus for identification of fraudulent click activity
US10108968B1 (en) * 2014-03-05 2018-10-23 Plentyoffish Media Ulc Apparatus, method and article to facilitate automatic detection and removal of fraudulent advertising accounts in a network environment
US10277710B2 (en) 2013-12-04 2019-04-30 Plentyoffish Media Ulc Apparatus, method and article to facilitate automatic detection and removal of fraudulent user information in a network environment
US10387795B1 (en) 2014-04-02 2019-08-20 Plentyoffish Media Inc. Systems and methods for training and employing a machine learning system in providing service level upgrade offers
CN110457357A (zh) * 2019-07-05 2019-11-15 中国平安财产保险股份有限公司 基于神经网络的律师推荐方法及相关设备
US10540607B1 (en) 2013-12-10 2020-01-21 Plentyoffish Media Ulc Apparatus, method and article to effect electronic message reply rate matching in a network environment
WO2020055002A1 (fr) * 2018-09-12 2020-03-19 삼성전자주식회사 Dispositif électronique et son procédé de commande
US20200118162A1 (en) * 2018-10-15 2020-04-16 Affle (India) Limited Method and system for application installation and detection of fraud in advertisement
US10769221B1 (en) 2012-08-20 2020-09-08 Plentyoffish Media Ulc Apparatus, method and article to facilitate matching of clients in a networked environment
US10922715B2 (en) * 2019-04-26 2021-02-16 Criteo Sa Dynamically modifying activation behavior of a computerized graphical advertisement display
US11175808B2 (en) 2013-07-23 2021-11-16 Plentyoffish Media Ulc Apparatus, method and article to facilitate matching of clients in a networked environment
US11568008B2 (en) 2013-03-13 2023-01-31 Plentyoffish Media Ulc Apparatus, method and article to identify discrepancies between clients and in response prompt clients in a networked environment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001080846A2 (fr) * 2000-04-26 2001-11-01 Linkshare Corporation Systeme et reseau ameliores de traitement de donnees de pistage, de gestion et de verification de transactions
EP1282059A1 (fr) * 2001-08-03 2003-02-05 Overture Services, Inc. Contrôle de compte de moteur de recherche
WO2004084097A1 (fr) * 2003-03-19 2004-09-30 Nhn Corporation Procede et appareil de detection de clics invalides sur un moteur de recherche internet

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001080846A2 (fr) * 2000-04-26 2001-11-01 Linkshare Corporation Systeme et reseau ameliores de traitement de donnees de pistage, de gestion et de verification de transactions
EP1282059A1 (fr) * 2001-08-03 2003-02-05 Overture Services, Inc. Contrôle de compte de moteur de recherche
WO2004084097A1 (fr) * 2003-03-19 2004-09-30 Nhn Corporation Procede et appareil de detection de clics invalides sur un moteur de recherche internet

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8244752B2 (en) 2008-04-21 2012-08-14 Microsoft Corporation Classifying search query traffic
US9633364B2 (en) 2010-12-30 2017-04-25 Nokia Technologies Oy Method and apparatus for detecting fraudulent advertising traffic initiated through an application
US11908001B2 (en) 2012-08-20 2024-02-20 Plentyoffish Media Ulc Apparatus, method and article to facilitate matching of clients in a networked environment
US10769221B1 (en) 2012-08-20 2020-09-08 Plentyoffish Media Ulc Apparatus, method and article to facilitate matching of clients in a networked environment
US11568008B2 (en) 2013-03-13 2023-01-31 Plentyoffish Media Ulc Apparatus, method and article to identify discrepancies between clients and in response prompt clients in a networked environment
US11747971B2 (en) 2013-07-23 2023-09-05 Plentyoffish Media Ulc Apparatus, method and article to facilitate matching of clients in a networked environment
US11175808B2 (en) 2013-07-23 2021-11-16 Plentyoffish Media Ulc Apparatus, method and article to facilitate matching of clients in a networked environment
US10637959B2 (en) 2013-12-04 2020-04-28 Plentyoffish Media Ulc Apparatus, method and article to facilitate automatic detection and removal of fraudulent user information in a network environment
US11949747B2 (en) 2013-12-04 2024-04-02 Plentyoffish Media Ulc Apparatus, method and article to facilitate automatic detection and removal of fraudulent user information in a network environment
US10277710B2 (en) 2013-12-04 2019-04-30 Plentyoffish Media Ulc Apparatus, method and article to facilitate automatic detection and removal of fraudulent user information in a network environment
US11546433B2 (en) 2013-12-04 2023-01-03 Plentyoffish Media Ulc Apparatus, method and article to facilitate automatic detection and removal of fraudulent user information in a network environment
US10540607B1 (en) 2013-12-10 2020-01-21 Plentyoffish Media Ulc Apparatus, method and article to effect electronic message reply rate matching in a network environment
US10108968B1 (en) * 2014-03-05 2018-10-23 Plentyoffish Media Ulc Apparatus, method and article to facilitate automatic detection and removal of fraudulent advertising accounts in a network environment
US11042898B2 (en) 2014-03-18 2021-06-22 Staples, Inc. Clickstream purchase prediction using Hidden Markov Models
WO2015143096A1 (fr) * 2014-03-18 2015-09-24 Staples, Inc. Prédiction d'achats lors de parcours à l'aide de modèles de markov cachés
US20150269609A1 (en) * 2014-03-18 2015-09-24 Staples, Inc. Clickstream Purchase Prediction Using Hidden Markov Models
US10387795B1 (en) 2014-04-02 2019-08-20 Plentyoffish Media Inc. Systems and methods for training and employing a machine learning system in providing service level upgrade offers
US10929879B2 (en) * 2016-05-24 2021-02-23 Tencent Technology (Shenzhen) Company Limited Method and apparatus for identification of fraudulent click activity
US20180253755A1 (en) * 2016-05-24 2018-09-06 Tencent Technology (Shenzhen) Company Limited Method and apparatus for identification of fraudulent click activity
US11538063B2 (en) 2018-09-12 2022-12-27 Samsung Electronics Co., Ltd. Online fraud prevention and detection based on distributed system
WO2020055002A1 (fr) * 2018-09-12 2020-03-19 삼성전자주식회사 Dispositif électronique et son procédé de commande
US20200118162A1 (en) * 2018-10-15 2020-04-16 Affle (India) Limited Method and system for application installation and detection of fraud in advertisement
US12288222B2 (en) * 2018-10-15 2025-04-29 Affle (India) Limited Method and system for application installation and detection of fraud in advertisement
US10922715B2 (en) * 2019-04-26 2021-02-16 Criteo Sa Dynamically modifying activation behavior of a computerized graphical advertisement display
CN110457357A (zh) * 2019-07-05 2019-11-15 中国平安财产保险股份有限公司 基于神经网络的律师推荐方法及相关设备

Similar Documents

Publication Publication Date Title
WO2008030670A1 (fr) Détection et jugement de la fraude au clic
CN112132198B (zh) 数据处理方法、装置、系统和服务器
US10715515B2 (en) Generating code for a multimedia item
CN111095332B (zh) 用于保护隐私的社交媒体广告的方法和系统
CN117557270B (zh) 移动终端安全支付管理方法及系统
US10037544B2 (en) Technologies for collecting advertising statistics in a privacy sensitive manner
TWI389046B (zh) 用於潛在客戶追蹤之可信任第三者交換所
Goldsmith et al. Analyzing hack subnetworks in the bitcoin transaction graph
TW201530346A (zh) 利用社交關係資料驗證用戶端身份的方法、裝置及系統
CN105262779A (zh) 身份认证方法、装置及系统
CN112132676B (zh) 联合训练目标模型的贡献度的确定方法、装置和终端设备
US20200374270A1 (en) System, method and computer-accessible medium for supporting at least one cyber-physical signaling game
Yu et al. A multiperspective fraud detection method for multiparticipant e-commerce transactions
Lyu et al. BCFDPS: A Blockchain‐Based Click Fraud Detection and Prevention Scheme for Online Advertising
He et al. An accountable data trading platform based on blockchain
Liu et al. A blockchain‐based privacy‐preserving advertising attribution architecture: Requirements, design, and a prototype implementation
Emami et al. A blockchain-based privacy-preserving anti-collusion data auction mechanism with an off-chain approach
Lin et al. Predicting outcomes of active sessions using multi-action motifs
Aldweesh BlockTicket: A framework for electronic tickets based on smart contract
Kinai et al. Multi-factor authentication for users of non-internet based applications of blockchain-based platforms
TWI755210B (zh) 基於區塊鏈的允許確認身分之匿名揭露暨多對多承認之系統及其方法
AU2021103828A4 (en) A novel system and auditing technique for cloud based digital forensic readiness with integrity and privacy preservation of health care data
Saleem et al. Predicting functional roles of Ethereum blockchain addresses
Iqbal et al. Bridging two worlds: Framework for secure implementation of blockchain oracles
Sharma et al. Temporal and consumer driven cluster analysis for identification of FDI attacks in smart grid

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07799897

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 07799897

Country of ref document: EP

Kind code of ref document: A1

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载