Abstract: METHOD AND SYSTEM FOR APPLICATION INSTALLATION AND DETECTION OF FRAUD IN ADVERTISEMENT The present disclosure provides a system for application installation and detection of fraud in advertisement. The system receives a request for installing an application from a plurality of users (102) in real time. In addition, the system provides one or more methods to the plurality of users (102) for installing the application. Further, the system receives a first set of data and a second set of data in real time. Furthermore, the system analyzes the first set of data and the second set of data in real time. Moreover, the system identifies a user of the plurality of users (102) and a publisher of a plurality of publishers (106) committing the fraud. Also, the system blocks one or more users and one or more publishers committing the fraud in real time. To be published with Fig. 1
DESC:METHOD AND SYSTEM FOR APPLICATION INSTALLATION AND DETECTION OF FRAUD IN ADVERTISEMENT
TECHNICAL FIELD
[0001] The present disclosure relates to field of advertisement and, in particular, relates to a method and system for application installation and detection of fraud in advertisement.
BACKGROUND
[0002] With the advancements in technology over the last few years, users have predominantly shifted towards smartphones for accessing multimedia content. Nowadays, users access content through a number of mobile applications available for download through various online application stores by clicking on the media device. Businesses (Advertisers) have started focusing on generating revenue by targeting consumers through these mobile applications. In addition, businesses have started investing heavily on doing business through these mobile applications. Moreover, businesses (publishers and/or advertising networks) have started developing advertisement capable applications for serving advertisements through these mobile applications. These advertisements are published in real time or fixed placements through these mobile applications and watched by the users. The advertisers are benefited in terms of internet traffic generated on clicking, taking action like installing or on watching these advertisements. However, certain online publishers and advertising networks working with these publishers take undue advantage of this in order to generate high revenues. These online publishers and advertising networks employ fraudulent techniques in order to generate clicks, or increasing actions like increasing number of application installs for the advertisers through fraudulent means. In addition, these online publishers incentivize the users for clicking the links, downloading applications and the like. This results in a loss of advertisers marketing budget spent as many times these publishers claim a normal user-initiated action (Organic action, e.g. Organic Install) as one initiated by them or at times the clicks or application installs are not driven by humans at all and instead by bots. There is a consistent need to stop publishers from performing such types of click fraud and transaction fraud.
OBJECT OF THE DISCLOSURE
[0003] A primary object of the present disclosure is to provide a method and system for application installation and detection of fraud in advertisement.
[0004] Another object of the present disclosure is to provide one or more methods to a user for installing an application.
[0005] Yet another object of the present disclosure is to prevent advertisement fraud being committed by a publisher.
[0006] Yet another object of the present disclosure is to prevent revenue loss to the advertiser due to advertisement fraud.
[0007] Yet another object of the present disclosure is to allow the genuine user to download the application by using the one or more methods of installation.
SUMMARY
[0008] In an aspect of the present disclosure, the present disclosure provides a computer system. The computer system includes one or more processors and a memory. The memory is coupled to the one or more processors. The memory stores instructions. The instructions are executed by the one or more processors. The execution of instructions causes the one or more processors to perform method and system for application installation and detection of fraud in advertisement. The computer implemented method includes a first step to display one or more advertisements on mobile applications and web applications on a plurality of media devices. In addition, the plurality of media devices is associated with a plurality of users. Further, the one or more advertisements are displayed on the basis of interests of the plurality of users. Furthermore, the one or more advertisements are displayed for installing an application. Moreover, the one or more advertisements are displayed on a plurality of publishers. Also, the one or more advertisements are displayed in real time. In addition, the computer implemented method includes a second step to receive a request to download the application. The plurality of users requests for installing the application through the plurality of media devices. In addition, the request for installing the application is generated by clicking on the one or more advertisements displayed on the plurality of media devices. Further, the request for installing the application is received in real time. Further, the computer implemented method includes a third step to provide one or more methods to the plurality of users. The one or more methods are provided to the plurality of users for installing the application. In addition, the one or more methods include ways to authenticate the plurality of users. Further, the one or more methods are provided in real time. Furthermore, the computer implemented method includes a fourth step to fetch a first set of data from a database and the plurality of media devices. The first set of data is associated with past typing behavior of the plurality of users. In addition, the first set of data is received in real time. Moreover, the computer implemented method includes a fifth step to obtain a second set of data from the plurality of media devices. The second set of data is associated with a plurality of hardware components. In addition, the second set of data is obtained in real time. Also, the computer implemented method includes a sixth step to analyze the first set of data and the second set of data. The first set of data and the second set of data are analyzed using one or more machine learning algorithm. In addition, analysis is done to authenticate a user of the plurality of users for installing the application. Further, the first set of data and the second set of data are analyzed to identify that the fraud being committed by the plurality of users or the plurality of publishers. Furthermore, the first set of data and the second set of data are analyzed in real time. Also, the computer implemented method includes a seventh step to block a publisher of the plurality of publishers and the user of the plurality of users committing the fraud. The publisher of the plurality of publishers and the user of the plurality of users committing the fraud are identified on the basis of analysis of the first set of data and the second set of data. In addition, the publisher and the user are blocked in real time.
[0009] In an embodiment of the present disclosure, the plurality of publishers includes web pages, websites, mobile applications and blogs.
[0010] In an embodiment of the present disclosure, the one or more methods include making a pattern, solving a puzzle, speaking a sentence, scanning a barcode, writing a captcha and scanning an eye movement.
[0011] In an embodiment of the present disclosure, the first set of data includes touch delay, touch length, typing behavior, typing language, voice command length, voice recognition, touch pattern and gesture recognition.
[0012] In an embodiment of the present disclosure, the second set of data includes location of media device, user data, type of media device, pre-installed applications and available storage.
[0013] In an embodiment of the present disclosure, the plurality of hardware components includes gyroscope, an accelerometer, a proximity sensor, a light sensor, barometer, magnetometer, microphone, fingerprint sensor, image sensor and touch screen.
[0014] In an embodiment of the present disclosure, the one or more machine learning algorithm include linear discriminant analysis, learning vector quantization, linear regression, logistic regression, sum of vector machine, decision tree, random forest, K-nearest neighbor function and time series.
[0015] In an embodiment of the present disclosure, the fraud identification system identifies the user and the publisher committing the fraud. The identification of the fraud is done by comparing past typing behaviour and present typing behaviour of the one or more users of the plurality of users in real time.
[0016] In an embodiment of the present disclosure, the fraud identification system generates a report. In addition, the report has a list of the user and the publisher committing the fraud.
BRIEF DESCRIPTION OF FIGURES
[0017] Having thus described the invention in general terms, references will now be made to the accompanying figures, wherein:
[0018] FIG. 1 illustrates an interactive computing environment for an application installation and fraud detection, in accordance with various embodiments of the present disclosure; and
[0019] FIG. 2 illustrates a block diagram of a computing device, in accordance with various embodiments of the present disclosure.
[0020] It should be noted that the accompanying figures are intended to present illustrations of exemplary embodiments of the present invention. These figures are not intended to limit the scope of the present invention. It should also be noted that accompanying figures are not necessarily drawn to scale.
DETAILED DESCRIPTION
[0021] Reference will now be made in detail to selected embodiments of the present invention in conjunction with accompanying figures. The embodiments described herein are not intended to limit the scope of the invention, and the present invention should not be construed as limited to the embodiments described. This invention may be embodied in different forms without departing from the scope and spirit of the invention. It should be understood that the accompanying figures are intended and provided to illustrate embodiments of the invention described below and are not necessarily drawn to scale. In the drawings, like numbers refer to like elements throughout, and thicknesses and dimensions of some components may be exaggerated for providing better clarity and ease of understanding.
[0022] It should be noted that the terms "first", "second", and the like, herein do not denote any order, ranking, quantity, or importance, but rather are used to distinguish one element from another. Further, the terms "a" and "an" herein do not denote a limitation of quantity, but rather denote the presence of at least one of the referenced item.
[0023] FIG. 1 illustrates an interactive computing environment 100 for an application installation and fraud detection, in accordance with various embodiments of the present disclosure. The interactive computing environment 100 shows a relationship between various entities involved in application installation and detection of a fraud in advertisements 108. The interactive computing environment 100 includes a plurality of users 102, a plurality of media devices 104, a plurality of publishers 106, one or more advertisements 108, a plurality of hardware components 110, a communication network 112, a fraud identification system 114, a server 116 and a database 118. In addition, each of the components of the interactive computing environment 100 interacts with each other to share advertisement fraud data in real-time.
[0024] In general, fraud in advertisement is done to generate more revenue from advertisements being displayed by generating fake installs or clicks. In addition, fake installs or clicks are done with help of software, bots. Further, fake installs or fake traffic is done through techniques such as click fraud, transaction fraud and the like. Furthermore, click fraud corresponds to regular or constant clicking by user on advertisements in order to generate more revenue for publishers. Moreover, click fraud is done when publishers get paid based on pay-per-click or pay-per-view whenever advertisements are clicked. Also, click fraud refers to the generation of fraudulent clicks through online bots which are not identifiable and are treated as genuine install. Also, transaction fraud refers to initiating install via fake clicks and bots. In addition, transaction fraud takes place when publishers apply fraudulent techniques to drive fake installs of applications in order to generate more revenue.
[0025] The interactive computing environment 100 includes the plurality of users 102. The plurality of users 102 is any person present at any location and may or may not access multimedia content. In addition, the plurality of users 102 is any legal person or natural person who access online multimedia content and need an IP based network for accessing multimedia content. Further, the plurality of users 102 is individuals or persons who accesses online multimedia content on the plurality of media devices 104. In an embodiment of the present disclosure, the plurality of users 102 includes but may not be limited to a natural person, legal entity, the individual, machines and robots for viewing the one or more advertisements 108.
[0026] In addition, the interactive computing environment 100 includes the plurality of media devices 104 that helps to communicate information. In an embodiment of the present disclosure, the plurality of media devices 104 includes but may not be limited to a smartphone, a laptop, a desktop computer, a tablet, a personal digital assistant, a smart television, a workstation and an electronic wearable device. In an embodiment of the present disclosure, the plurality of media devices 104 is portable communication devices and fixed communication devices. The plurality of users 102 access the plurality of media devices 104 in real-time. In addition, the plurality of media devices 104 is any type of devices having an active internet connection. Further, the plurality of media devices 104 are internet-enabled devices for allowing the plurality of users 102 to access the plurality of publishers 106. In addition, the plurality of users 102 utilizes the plurality of media devices 104 for viewing the one or more advertisements 108.
[0027] Further, the interactive computing environment 100 includes the plurality of publishers 106. The plurality of publishers 106 utilizes the plurality of media devices 104 for displaying multimedia content. In an embodiment of the present disclosure, the plurality of publishers 106 includes but may not be limited to mobile application, web application, and website. The plurality of publishers 106 is mobile application that displays the one or more advertisements 108 to the plurality of users 102 on the plurality of media devices 104. The one or more advertisements 108 include audio advertisements, video advertisements, audio-video advertisements, image advertisements and the like. The plurality of publishers 106 displays the one or more advertisements 108 based on interest of the plurality of users 102 in real time. In an example, a user of the plurality of users 102 is interested in watching online videos, reading blogs, play online games, accessing social networking sites and the like. In addition, the plurality of publishers 106 shows the one or more advertisements 108 related to interest of the user.
[0028] The plurality of publishers 106 is advertisement supporting applications that are stored in the plurality of media devices 104. In general, publisher provides space; frame, area or a part of their application pages for advertising purposes. In addition, the space, frame, area, or part is referred to as advertisement slots. In addition, publisher consists of various advertisement slots that depend on the choice of publisher. Further, publisher advertises products, services or businesses to users for generating revenue. Furthermore, publisher displays advertisement on media devices when user accesses publisher.
[0029] The one or more advertisements 108 are a graphical or pictorial representation of information to promote a product, an event, service and the like. In general, advertisement is a medium for promoting a product, service, or an event. In addition, advertisements are displayed in third party applications developed by application developers. Further, advertisements are presented for attracting user based on their interest in order to generate more revenue. The plurality of users 102 clicks on the one or more advertisements 108 and the plurality of users 102 are re-directed to a website or application or application store associated with the clicked advertisement. In general, advertisements are provided to publishers by an advertiser who wants to advertise their product, services. In addition, publishers get paid when the user visits the application or website through the advertisement of the advertiser.
[0030] The one or more advertisements 108 are placed on the advertisement slots on the plurality of publishers 106 on the plurality of media devices 104 associated with the plurality of users 102. In general, advertiser purchases advertisement slots from publishers. In addition, advertisement may be served based on a real-time bidding technique or a direct contract between the advertiser and publisher. Further, advertisement networks enable display of advertisement in real-time on publisher on behalf of the advertiser. Furthermore, advertising networks are entities that connect the advertiser to websites and mobile applications that are willing to serve advertisements.
[0031] Furthermore, the interactive computing environment 100 includes the plurality of hardware components 110. In an embodiment of the present disclosure, the plurality of hardware components 110 includes but may not be limited to a gyroscope, an accelerometer, a proximity sensor, a light sensor, barometer, magnetometer, microphone, fingerprint sensor, image sensor and touch screen. The plurality of hardware 110 components is used to check activity of the plurality of users 102 on the plurality of media devices 104 during installation of the application.
[0032] Further, the interactive computing environment 100 includes the communication network 112 (as shown in FIG. 1). In an embodiment of the present disclosure, the communication network 112 enables the plurality of media devices 104 to gain access to internet. In addition, internet connection is established based on a type of network. In an embodiment of the present disclosure, the type of network is a wireless mobile network. In another embodiment of the present disclosure, the type of network is a wired network with a finite bandwidth. In yet another embodiment of the present disclosure, the type of network is a combination of the wireless and the wired network for an optimum throughput of data transmission. Further, the communication network 112 includes a set of channels. In addition, each channel of the set of channels supports finite bandwidth. Further, finite bandwidth of each channel of the set of channels is based on capacity of network.
[0033] In addition, the communication network 112 provides medium to share information among various entities of the interactive computing environment 100. In addition, the plurality of media devices 104 and the fraud identification system 114 are interlinked using the communication network 112. Further, the medium for communication may be infrared, microwave, radio frequency (RF) and the like. The communication network 112 includes but may not be limited to a local area network, a metropolitan area network, a wide area network, a virtual private network, a global area network, a home area network or any other communication network presently known in the art. The communication network 112 is a structure of various nodes or communication devices connected to each other through network topology method. In an example, the network topology includes a bus topology, a star topology, a mesh topology and the like.
[0034] The interactive computing environment 100 includes the fraud identification system 114. The fraud identification system 114 performs various tasks for detecting fraud and installing the application. Further, the fraud identification system 114 identifies whether the fraud is being committed by one or more users of the plurality of users 102 or one or more publishers of the plurality of publishers 106 in real-time. Further, the fraud identification system 114 take actions accordingly based on the fraud detected by the fraud identification system 114.
[0035] The fraud identification system 114 receives a request from the plurality of users 102 for installing the application. The plurality of users 102 requests for installing the application through the plurality of media devices 104. In addition, the request for installing the application from the plurality of users 102 is generated by clicking on the one or more advertisements 108. Further, the one or more advertisements 108 are displayed by the plurality of publishers 106 on the plurality of media devices 104 in real time. Furthermore, the fraud identification system 114 receives the request in real time. Moreover, the fraud identification system 114 provides one or more methods to the plurality of users 102 to install the application. The one or more methods include ways to identify that whether the fraud is being committed by the one or more users of the plurality of users 102 or the one or more publishers of the plurality of publishers 106. In addition, the fraud identification system 114 provides the one or more methods to the plurality of users 102 in real time. The one or more methods include various tasks which the plurality of users 102 needs to complete before installing the application. In an embodiment of the present disclosure, the one or more methods include but may not be limited to making a pattern, solving a puzzle, speaking a sentence, scanning a barcode, writing a captcha and scanning an eye movement.
[0036] In an embodiment of the present disclosure, the one or more methods include the plurality of users 102 to make a pattern on the plurality of media devices 104 to download the application. In another embodiment of the present disclosure, the one or more methods include the plurality of users 102 to solve a puzzle on the plurality of media devices 104 to download the application. In yet another embodiment of the present disclosure, the one or more methods include speaking a sentence that is displayed on the plurality of media devices 104 to download the application. In an example, the sentence “The quick brown fox jumps over the lazy dog” is displayed on the plurality of media devices 104 that need to be spoken by the plurality of users 102 to download the application.
[0037] In yet another embodiment of the present disclosure, the one or more methods include the plurality of users 102 to scan a bar code to download the application shown in the one or more advertisements 108. In an example, the plurality of users 102 is asked to point towards the source of the augmented reality and press a button in augmented reality to download the application.
[0038] In yet another embodiment of the present disclosure, the one or more methods include scanning eye movement to download the application. In yet another embodiment of the present disclosure, the one or more methods include filling captcha to download the application. In yet another embodiment of the present disclosure, the one or more methods include clicking on the install option on the plurality of media devices 104 to download the application. In yet another embodiment of the present disclosure, the one or more methods include the plurality of users 102 to blink the eye or shifting eye from left to right in order to install the application.
[0039] Further, the fraud identification system 114 fetches a first set of data from the database 118 and the plurality of media devices 104. The first set of data is associated with past typing behavior of the plurality of users 102. In an embodiment of the present disclosure, the first set of data includes but may not be limited to touch delay, touch length, typing language, typing behavior, voice command length, touch pattern and gesture recognition. In addition, the fraud identification system 114 receives the first set of data in real time. Furthermore, the fraud identification system 114 obtains the second set of data from the plurality of media devices 104. The second set of data is associated with a plurality of hardware components 110. In an embodiment of the present disclosure, the second set of data includes but may not be limited to location of media device, user data, type of media device, click to install, movement, vibration, voice data of the media devices, pre-installed applications and available storage. The fraud identification system 114 obtains the second set of data from the plurality of hardware components 110 to identify that the plurality of users 102 has completed the task in order to download the application. The fraud identification system 114 obtains the second set of data in real time.
[0040] Further, the fraud identification system 114 analyzes the first set of data and the second set of data. The first set of data and the second set of data are analyzed using one or more machine learning algorithms. In an embodiment of the present disclosure, the one or more machine learning algorithms include but may not be limited to linear discriminant analysis, learning vector quantization linear regression, logistic regression, sum of vector machine, decision tree, random forest, K-nearest neighbor function and time series. In addition, analysis is done to authenticate the one or more users of the plurality of users 102 to install the application. Further, the first set of data and the second set of data are analyzed to identify whether the fraud is being committed by the one or more users of the plurality of users 102 or the one or more publishers of the plurality of publishers 106. Furthermore, the first set of data and the second set of data are analyzed in real time. Moreover, the fraud identification system 114 may allow the plurality of users 102 to download the application after authentication based on the analysis.
[0041] In an embodiment of the present disclosure, the fraud identification system 114 analyzes the voice of the plurality of users 102 recorded during the installation in order to identify the fraud. The fraud identification system 114 may analyze voice of the plurality of users 102 to identify the fraud using speech recognition. In addition, the fraud identification system 114 may analyze the voice of the plurality of users 102 being a bot recorded voice or being spoken by the plurality of users 102 at the time of installation of the application. In another embodiment of the present disclosure, the fraud identification system 114 deciphers the data based on the one or more methods selected by the plurality of users 102. In addition, deciphering of the data is done in order to separate the one or more methods from each other. In an example, the data is deciphered based on selection of method from the one or more methods by the plurality of users 102 to install the application.
[0042] In yet another embodiment of the present disclosure, the fraud identification system 114 analyzes past typing behavior of the plurality of users 102 or the plurality of publishers 106 in real time to identify the fraud. In another embodiment of the present disclosure, the fraud identification system 114 identifies a threshold limit for number of install being done by each of the plurality of users 102. The threshold limit is identified by analyzing the number of installs being done by using method of the one or more methods. In yet another embodiment of the present disclosure, the fraud identification system 114 analyzes the threshold limit with pre-defined threshold limit for the plurality of users 102 to identify fraud or suspicious behavior. In yet another embodiment of the present disclosure, the fraud identification system 114 analyzes IP addresses, locations of the one or more users of the plurality of users 102.
[0043] Furthermore, the fraud identification system 114 identifies the one or more users of the plurality of users 102 and the one or more publishers of the plurality of publishers 106 committing the fraud. In an embodiment of the present disclosure, identification of the fraud is done by comparing past typing behaviour and present typing behaviour of the one or more users of the plurality of users 102 in real time. In an example, two finger typist takes time to reach edge keys, hence the distribution of the intervals between the keys can be used to determine the profile of the plurality of users 102. In an embodiment of the present disclosure, the fraud identification system 114 uses third party devices to identify the one or more users of the plurality of users 102 committing the fraud. In an embodiment of the present disclosure, third party devices includes but may not be limited to thin client, virtual reality devices, and Google Stadia. In an example, a user of the plurality of users 102 using virtual device or Google stadia cannot use mobile at the same time. Further, the fraud identification system 114 verifies whether the user of the plurality of users 102 has installed the application. Furthermore, identification is done in real time. Moreover, the fraud identification system 114 generates a report. The report includes list of the one or more users of the plurality of users 102 and the one or more publishers of the plurality of the plurality of publishers 106 committing the fraud.
[0044] Also, the fraud identification system 114 blocks the one or more publishers of the plurality of publishers 106 and the one or more users of the plurality of users 102 committing the fraud. The one or more publishers of the plurality of publishers 106 and the one or more users of the plurality of users 102 committing the fraud are identified based on analysis of the first set of data and the second set of data. In addition, the fraud identification system 114 updates list of blocked publishers and users after a period of time. In addition, the one or more publishers and the one or more users are blocked in real time.
[0045] The interactive computing environment 100 includes the server 116. The server 116 is used to perform task of accepting request and respond to the request of other functions. In an embodiment of the present disclosure, the server 116 is a cloud server which is used for cloud computing to enhance the real-time processing of the system and using virtual space for task performance. In an embodiment of the present disclosure, the server 116 may be any other server based on the requirement for application installation and detection of fraud in advertisement.
[0046] The interactive computing environment 100 includes the database 118 (as shown in FIG. 1). The database 118 is storage location where all information associated with the fraud identification system 114 is stored for accessing. The database 118 includes data that is pre-stored in the database 118 and data collected in real-time. In an embodiment of the present disclosure, the database 118 is a cloud database or any other database based on the requirement for application installation and detection of fraud in advertisement. The data is stored in the database 118 in various tables. In general, tables are matrix that stores different types of data in the form of rows and columns. In an example, one table may store the first set of data with media devices usage behavior of the plurality of users 102. In another example, other table may store the second set of data with the plurality of hardware components 110. The database 118 is included inside the server 116.
[0047] FIG. 2 illustrates a block diagram of a computing device 200, in accordance with various embodiments of the present disclosure. The computing device 200 includes a bus 202 that directly or indirectly couples the following devices: memory 204, one or more processors 206, one or more presentation components 208, one or more input/output (I/O) ports 210, one or more input/output components 212, and an illustrative power supply 214. The bus 202 represents what may be one or more busses (such as an address bus, data bus, or combination thereof). Although the various blocks of FIG. 2 are shown with lines for the sake of clarity, in reality, delineating various components is not so clear, and metaphorically, the lines would more accurately be grey and fuzzy. For example, one may consider a presentation component such as a display device to be an I/O component. Also, processors have memory. The inventors recognize that such is the nature of the art, and reiterate that the diagram of FIG. 2 is merely illustrative of an exemplary computing device 200 that can be used in connection with one or more embodiments of the present invention. The distinction is not made between such categories as “workstation,” “server,” “laptop,” “hand-held device,” etc., as all are contemplated within the scope of FIG. 2 and reference to “computing device.”
[0048] The computing device 200 typically includes a variety of computer-readable media. The computer-readable media can be any available media that can be accessed by the computing device 200 and includes both volatile and nonvolatile media, removable and non-removable media. By way of example, and not limitation, the computer-readable media may comprise computer storage media and communication media. The computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. The computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by the computing device 200. The communication media typically embodies computer-readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of any of the above should also be included within the scope of computer-readable media.
[0049] Memory 204 includes computer-storage media in the form of volatile and/or nonvolatile memory. The memory 204 may be removable, non-removable, or a combination thereof. Exemplary hardware devices include solid-state memory, hard drives, optical-disc drives, etc. The computing device 200 includes one or more processors that read data from various entities such as memory 204 or I/O components 212. The one or more presentation components 208 present data indications to a user or other device. Exemplary presentation components include a display device, speaker, printing component, vibrating component, etc. The one or more I/O ports 210 allow the computing device 200 to be logically coupled to other devices, including the one or more I/O components 212, some of which may be built in. Illustrative components include a microphone, joystick, game pad, satellite dish, scanner, printer, wireless device, etc.
[0050] It may be noted that the foregoing description has been explained with the help of one third party for the explanation purpose only. In an embodiment of the present disclosure, the interactive computing environment may contain any number of users being associated with any number of portable communication devices and any number of third parties present at an instance of time.
[0051] The foregoing descriptions of specific embodiments of the present technology have been presented for purposes of illustration and description. They are not intended to be exhaustive or to limit the present technology to the precise forms disclosed, and obviously many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to explain the principles of the present technology best and its practical application, to thereby enable others skilled in the art to best utilize the present technology and various embodiments with various modifications as are suited to the particular use contemplated. It is understood that various omissions and substitutions of equivalents are contemplated as circumstance may suggest or render expedient, but such are intended to cover the application or implementation without departing from the spirit or scope of the claims of the present technology.
[0052] While several possible embodiments of the invention have been described above and illustrated in some cases, it should be interpreted and understood as to have been presented only by way of illustration and example, but not by limitation. Thus, the breadth and scope of a preferred embodiment should not be limited by any of the above-described exemplary embodiments.
,CLAIMS:We Claim:
1. An interactive computer system comprising:
one or more processors (206); and
a memory (204) coupled to the one or more processors (206), the memory (204) for storing instructions which, when executed by the one or more processors (206), cause the one or more processors to perform a method for application installation and detection of fraud in advertisement, the method comprising:
displaying, at a fraud identification system (114), one or more advertisements (108) on mobile applications and web applications on a plurality of media devices (104), wherein the plurality of media devices (104) are associated with a plurality of users (102), wherein the one or more advertisements (108) are displayed based on interest of the plurality of users (102), wherein the one or more advertisements (108) are displayed for installing an application, wherein the one or more advertisements (108) are displayed on a plurality of publishers (106), wherein the one or more advertisements (108) are displayed in real time;
receiving, at the fraud identification system (114), a request for downloading the application, wherein the plurality of users (102) requests for downloading and installing the application through the plurality of media devices (104), wherein the request for installing the application is generated by clicking on the one or more advertisements (108) displayed on the plurality of media devices (104), wherein the request for installing the application is received in real time;
providing, at the fraud identification system (114), one or more methods to the plurality of users (102), wherein the one or more methods are provided to the plurality of users (102) for installing the application, wherein the one or more methods include ways for authenticating the plurality of users (102), wherein the one or more methods are provided in real time;
fetching, at the fraud identification system (114), a first set of data from a database and the plurality of media devices (104), wherein the first set of data is associated with past typing behavior of the plurality of users (102), wherein the first set of data is fetched in real time;
obtaining, at the fraud identification system (114), a second set of data from the plurality of media devices (104), wherein the second set of data is associated with a plurality of hardware components (110), wherein the second set of data is obtained in real time;
analyzing, at the fraud identification system (114), the first set of data and the second set of data, wherein the first set of data and the second set of data are analyzed using one or more machine learning algorithm, wherein analysis is performed for authenticating one or more users of the plurality of users (102) for installing the application, wherein the first set of data and the second set of data are analyzed for identifying whether the one or more users of the plurality of users (102) that are committing the fraud, wherein the first set of data and the second set of data are analyzed in real time; and
blocking, at the fraud identification system (114), one or more publishers of the plurality of publishers (106) and the one or more users of the plurality of users (102) committing the fraud, wherein the one or more publishers of the plurality of publishers (106) and the one or more users of the plurality of users (102) committing the fraud are identified based on analysis of the first set of data and the second set of data, wherein the one or more publishers and the one or more users are blocked in real time.
2. The computer system as recited in claim 1, wherein the plurality of publishers (106) comprising at least one of web pages, websites, mobile application and blogs.
3. The computer system as recited in claim 1, wherein the one or more methods comprising making a pattern, solving a puzzle, speaking a sentence, scanning a barcode, writing a captcha and scanning an eye movement.
4. The computer system as recited in claim 1, wherein the first set of data comprises touch delay, touch length, typing behavior, typing language, voice command length, voice recognition, touch pattern and gesture recognition.
5. The computer system as recited in claim 1, wherein the second set of data comprises location of media device, user data, type of media device, pre-installed applications and available storage.
6. The computer system as recited in claim 1, wherein the plurality of hardware components (110) comprising gyroscope, an accelerometer, a proximity sensor, a light sensor, barometer, magnetometer, microphone, fingerprint sensor, image sensor and touch screen.
7. The computer system as recited in claim 1, wherein the one or more machine learning algorithm comprising linear discriminant analysis, learning vector quantization, linear regression, logistic regression, sum of vector machine, decision tree, random forest, K-nearest neighbor function and time series.
8. The computer system as recited in claim 1, wherein the fraud identification system (114) identifies whether the one or more users and the one or more publishers are committing the fraud, wherein identification of the fraud is performed by comparing past typing behaviour and present typing behaviour of the one or more users of the plurality of users (102) in real time.
9. The computer system as recited in claim 1, wherein the fraud identification system (114) generates a report, wherein the report has a list of the one or more users and the one or more publishers committing the fraud.
| # | Name | Date |
|---|---|---|
| 1 | 201821039074-STATEMENT OF UNDERTAKING (FORM 3) [15-10-2018(online)].pdf | 2018-10-15 |
| 1 | 201821039074-Written submissions and relevant documents [09-08-2024(online)].pdf | 2024-08-09 |
| 2 | 201821039074-Correspondence to notify the Controller [17-07-2024(online)].pdf | 2024-07-17 |
| 2 | 201821039074-PROVISIONAL SPECIFICATION [15-10-2018(online)].pdf | 2018-10-15 |
| 3 | 201821039074-FORM-26 [17-07-2024(online)].pdf | 2024-07-17 |
| 3 | 201821039074-FORM 1 [15-10-2018(online)].pdf | 2018-10-15 |
| 4 | 201821039074-US(14)-HearingNotice-(HearingDate-26-07-2024).pdf | 2024-06-11 |
| 4 | 201821039074-FIGURE OF ABSTRACT [15-10-2018(online)].jpg | 2018-10-15 |
| 5 | 201821039074-DRAWINGS [15-10-2018(online)].pdf | 2018-10-15 |
| 5 | 201821039074-Covering Letter [03-07-2023(online)].pdf | 2023-07-03 |
| 6 | 201821039074-RELEVANT DOCUMENTS [23-10-2018(online)].pdf | 2018-10-23 |
| 6 | 201821039074-COMPLETE SPECIFICATION [13-06-2023(online)].pdf | 2023-06-13 |
| 7 | 201821039074-RELEVANT DOCUMENTS [23-10-2018(online)]-1.pdf | 2018-10-23 |
| 7 | 201821039074-FER_SER_REPLY [13-06-2023(online)].pdf | 2023-06-13 |
| 8 | 201821039074-OTHERS [13-06-2023(online)].pdf | 2023-06-13 |
| 8 | 201821039074-FORM 13 [23-10-2018(online)].pdf | 2018-10-23 |
| 9 | 201821039074-FORM 13 [23-10-2018(online)]-1.pdf | 2018-10-23 |
| 9 | 201821039074-PETITION UNDER RULE 137 [13-06-2023(online)]-1.pdf | 2023-06-13 |
| 10 | 201821039074-FORM 3 [15-10-2019(online)].pdf | 2019-10-15 |
| 10 | 201821039074-PETITION UNDER RULE 137 [13-06-2023(online)].pdf | 2023-06-13 |
| 11 | 201821039074-ENDORSEMENT BY INVENTORS [15-10-2019(online)].pdf | 2019-10-15 |
| 11 | 201821039074-RELEVANT DOCUMENTS [13-06-2023(online)]-1.pdf | 2023-06-13 |
| 12 | 201821039074-DRAWING [15-10-2019(online)].pdf | 2019-10-15 |
| 12 | 201821039074-RELEVANT DOCUMENTS [13-06-2023(online)].pdf | 2023-06-13 |
| 13 | 201821039074-CORRESPONDENCE-OTHERS [15-10-2019(online)].pdf | 2019-10-15 |
| 13 | 201821039074-FER.pdf | 2022-12-20 |
| 14 | 201821039074-COMPLETE SPECIFICATION [15-10-2019(online)].pdf | 2019-10-15 |
| 14 | 201821039074-FORM 18 [14-10-2022(online)].pdf | 2022-10-14 |
| 15 | Abstract1.jpg | 2019-10-22 |
| 16 | 201821039074-COMPLETE SPECIFICATION [15-10-2019(online)].pdf | 2019-10-15 |
| 16 | 201821039074-FORM 18 [14-10-2022(online)].pdf | 2022-10-14 |
| 17 | 201821039074-FER.pdf | 2022-12-20 |
| 17 | 201821039074-CORRESPONDENCE-OTHERS [15-10-2019(online)].pdf | 2019-10-15 |
| 18 | 201821039074-RELEVANT DOCUMENTS [13-06-2023(online)].pdf | 2023-06-13 |
| 18 | 201821039074-DRAWING [15-10-2019(online)].pdf | 2019-10-15 |
| 19 | 201821039074-ENDORSEMENT BY INVENTORS [15-10-2019(online)].pdf | 2019-10-15 |
| 19 | 201821039074-RELEVANT DOCUMENTS [13-06-2023(online)]-1.pdf | 2023-06-13 |
| 20 | 201821039074-FORM 3 [15-10-2019(online)].pdf | 2019-10-15 |
| 20 | 201821039074-PETITION UNDER RULE 137 [13-06-2023(online)].pdf | 2023-06-13 |
| 21 | 201821039074-FORM 13 [23-10-2018(online)]-1.pdf | 2018-10-23 |
| 21 | 201821039074-PETITION UNDER RULE 137 [13-06-2023(online)]-1.pdf | 2023-06-13 |
| 22 | 201821039074-FORM 13 [23-10-2018(online)].pdf | 2018-10-23 |
| 22 | 201821039074-OTHERS [13-06-2023(online)].pdf | 2023-06-13 |
| 23 | 201821039074-FER_SER_REPLY [13-06-2023(online)].pdf | 2023-06-13 |
| 23 | 201821039074-RELEVANT DOCUMENTS [23-10-2018(online)]-1.pdf | 2018-10-23 |
| 24 | 201821039074-RELEVANT DOCUMENTS [23-10-2018(online)].pdf | 2018-10-23 |
| 24 | 201821039074-COMPLETE SPECIFICATION [13-06-2023(online)].pdf | 2023-06-13 |
| 25 | 201821039074-DRAWINGS [15-10-2018(online)].pdf | 2018-10-15 |
| 25 | 201821039074-Covering Letter [03-07-2023(online)].pdf | 2023-07-03 |
| 26 | 201821039074-US(14)-HearingNotice-(HearingDate-26-07-2024).pdf | 2024-06-11 |
| 26 | 201821039074-FIGURE OF ABSTRACT [15-10-2018(online)].jpg | 2018-10-15 |
| 27 | 201821039074-FORM-26 [17-07-2024(online)].pdf | 2024-07-17 |
| 27 | 201821039074-FORM 1 [15-10-2018(online)].pdf | 2018-10-15 |
| 28 | 201821039074-PROVISIONAL SPECIFICATION [15-10-2018(online)].pdf | 2018-10-15 |
| 28 | 201821039074-Correspondence to notify the Controller [17-07-2024(online)].pdf | 2024-07-17 |
| 29 | 201821039074-Written submissions and relevant documents [09-08-2024(online)].pdf | 2024-08-09 |
| 29 | 201821039074-STATEMENT OF UNDERTAKING (FORM 3) [15-10-2018(online)].pdf | 2018-10-15 |
| 30 | 201821039074-PatentCertificate02-05-2025.pdf | 2025-05-02 |
| 31 | 201821039074-IntimationOfGrant02-05-2025.pdf | 2025-05-02 |
| 1 | search_201821039074E_19-12-2022.pdf |