1
Raman Chelliah, Jason S Cornez, Carl Dellar, Stephen Harrison, John A Hempe, Chih Cheng Hsu, Eric J Golin, Charles A Price, Neal S Rutta, Thomas A Wood, Wayne K Yamamoto: Computer system and method for electronic commerce. Broadvision, Cooley Godward, January 20, 1998: US05710887 (1421 worldwide citation)

A system for facilitating commercial transactions, between a plurality of customers and at least one supplier of items over a computer driven network capable of providing communications between the supplier and at least one customer site associated with each customer. Each site includes an associate ...


2
Jim Pitkow, Raman Chelliah, Marc Brown: Data transfer for network interaction fraudulence detection. Anchor Intelligence, Van Pelt Yi & James, September 21, 2010: US07801985 (135 worldwide citation)

Transferring metadata is disclosed. Information about a network interaction is processed to generate metadata describing the network interaction. Based on the metadata it is determined whether the metadata is to be transferred to an aggregator. In the event that the metadata is to be transferred, on ...


3
Jim Pitkow, Raman Chelliah, Marc Brown: Network interaction analysis. Anchor Intelligence, Van Pelt Yi & James, March 23, 2010: US07685275 (3 worldwide citation)

Network interaction analysis is disclosed. Traffic is monitored including a network interaction. Monitoring includes monitoring at least one of TCP, HTTP, or IP layer information. The network interaction is analyzed based at least in part on a source of a transaction determined from the layer inform ...


4
Jim Pitkow, Raman Chelliah, Marc Brown: Data transfer for network interaction fraudulence detection. COMSCORE, MH2 Technology Law Group, January 5, 2016: US09231982 (2 worldwide citation)

Transferring metadata is disclosed. Information about a network interaction is processed to generate metadata describing the network interaction. Based on the metadata it is determined whether the metadata is to be transferred to an aggregator. In the event that the metadata is to be transferred, on ...


5
Jim Pitkow, Raman Chelliah, Marc Brown: Network interaction monitoring appliance. Comscore, MH2 Technology Law Group, March 24, 2015: US08990379 (1 worldwide citation)

An appliance for analyzing a network interaction is disclosed. The appliance includes an input to monitor network traffic that includes a network interaction without interfering with the network traffic. The appliance further includes a processor to analyze network traffic to derive information abou ...


6
Jim Pitkow, Raman Chelliah, Marc Brown: Data transfer for network interaction fraudulence detection. COMSCORE, MH2 Technology Law Group, August 8, 2017: US09729563 (1 worldwide citation)

Transferring metadata is disclosed. Information about a network interaction is processed to generate metadata describing the network interaction. Based on the metadata it is determined whether the metadata is to be transferred to an aggregator. In the event that the metadata is to be transferred, on ...


7
Jim Pitkow, Raman Chelliah, Marc Brown: Data transfer for network interaction fraudulence detection. Comscore, MH2 Technology Law Group, September 16, 2014: US08838732 (1 worldwide citation)

Transferring metadata is disclosed. Information about a network interaction is processed to generate metadata describing the network interaction. Based on the metadata it is determined whether the metadata is to be transferred to an aggregator. In the event that the metadata is to be transferred, on ...


8
Jim Pitkow, Raman Chelliah, Marc Brown: Network interaction monitoring appliance. Comscore, MH2 Technology Law Group, August 9, 2016: US09412111

An appliance for analyzing a network interaction is disclosed. The appliance includes an input to monitor network traffic that includes a network interaction without interfering with the network traffic. The appliance further includes a processor to analyze network traffic to derive information abou ...


9
Jim Pitkow, Raman Chelliah, Marc Brown: Data transfer for network interaction fraudulence detection. comScore, Baker & Hostetler, January 29, 2019: US10193908

A method for analyzing network interaction data is disclosed. Initially, network interaction data is received from a network over time. A predetermined model comprising predetermined values associated with network interaction parameters is also received. The received network interaction data is proc ...


10
Jim Pitkow, Raman Chelliah, Marc Brown: Network interaction correlation. Fraudwall Technologies, Van Pelt Yi & James, June 19, 2008: US20080147499-A1

Correlating a network interaction is disclosed. A network interaction is detected at an advertising network. A network interaction is detected at an advertiser. The network interaction at the advertising network is correlated with the network interaction at the advertiser. The network interaction co ...