TRUSTEV SNAPSHOT: TRUSTEV
Ireland-based startup Trustev checks patterns in Internet user behaviour to verify consumer identities and catch fraudsters in online transactions. TB&I spoke to chief marketing officer Donal Cahalane about how it protects the brand, and its users’ information.
patents to protect the algorithms used in our social fingerprinting technologies.
How does the Trustev model work?
Trustev verifies online consumers’ identities in real time by using thousands of dynamic data points from sources including device type, IP address, transactional histories and Internet browser behaviours. Tis is augmented by our proprietary social fingerprinting technology that uses data patterns behind an individual’s social graph of Internet activity to confirm they are a real person, and that they are exactly who they say they are.
Te Trustev model is implemented by online merchants to protect themselves from the growing problem of online fraud.
How does social fingerprinting technology work?
Te technology fits into the online order process by prompting the user to sign in to their social networking account. Technology research company Gartner estimates that by the end of 2014 over 65 percent of all new online transactions will be done using social sign-in.
Our algorithms then analyse the patterns behind the data in the customer’s social network account, such as friends responding to Facebook statuses or tagging them in pictures. Te data is cross-referenced with the other technologies including ‘proxy piercing’ and transactional and behavioural analysis, to generate a ‘Trustev Score’ of between 1 and 100.
If the customer scores less than 65, then the customer is rejected, between 65 and 70 and the transaction is put forward for manual review, and if the customer scores more than 70, the transaction is approved.
Tere is no truer reflection of a person’s identity online than their social account. Teir activity on these sites is the equivalent of a fingerprint on the web.
42
“IF THE CUSTOMER SCORES LESS THAN 65, THEN THE CUSTOMER IS REJECTED, BETWEEN 65 AND 70 AND THE TRANSACTION IS PUT FORWARD FOR MANUAL REVIEW.”
Is social fingerprinting a Trustev innovation? If so, how do you protect it with IP?
We are the first company to use social data for online identity verification in this way. Some companies have used social data to further screen transactions that have already been flagged as suspicious, but this is oſten a manual process that can be expensive. Our solution provides a level of automation and machine learning. Te algorithms behind our social fingerprinting technology are pending patents.
We’ve also built other technologies to verify the identity of online customers such as advanced proxy piercing and virtual private network (VPN) cracking tools to catch fraudsters who are hiding their IP addresses, and we’re developing tools to track transactional behaviour online.
What kinds of companies are using your service?
Our technology is being used by online merchants, gambling sites, dating sites and some of the big telecommunications companies.
Would it be easy to copy your business model?
No—we have created significant barriers to
entry for potential competitors who may try to duplicate our offering, including applying for
Trademarks Brands and the Internet Volume 2, Issue 3
Are you ever approached by customers concerned about what’s happening to their personal information? How do you protect it?
We are oſten asked by our customers what we do with their information, although we don’t look at any personal information at all. We look at patterns in the data that users have already given to social networking sites.
For example we’re not looking at the content of a person’s Facebook status, we’re looking at whether the status was responded to by friends or whether it was shared. We look at thousands of data points but no actual information, and we’re certainly are not concerned with storing or using people’s information.
As a company of individuals who have a very strong social footprint ourselves, we are incredibly focused on user privacy; it’s at the core of how we build our technologies. We ensure that we can use the data in a responsible way to help benefit the user, while never exposing them or their data to misuse.
What channels are you using to promote the brand?
Social media is one of the most powerful marketing tools available, but only if you have the product to back it up. We believe we are leading the way in anti-fraud and identity solutions by using social data, so it would only be right to promote our brand in the same way.
We have made a conscious effort to bring Trustev to every major technology event available, and encourage every member of the Trustev team to regularly blog about issues and news that relate either to the company, anti-fraud, e-commerce or to their specific job function. Tis has helped to establish us as knowledge leaders in the anti- fraud and e-commerce space.
www.worldipreview.com
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44