How can Device Fingerprinting and Proxy Piercing Help Fight Fraud? - Proxy List 27 December 2015 2nd Share

Fighting eCommerce Fraud takes constant attention while keeping focused. Device ID or Device Fingerprinting and Proxy Piercing technologies help fight online fraud by enabling a world wide web merchant to find out a broader picture of who's going to be behind that online transaction.

What is usually a Device Fingerprint?

According to  Wikipedia "A device fingerprint (or machine fingerprint) is often a compact review of software and hardware settings collected from your remote computing device."
Proxy Piercing Help Fight Fraud
Or you can think about a more technical definition in accordance with US Patent 7,330,871 Rather than getting technical, let's concentrate on how the technology enables slowing advanced fraud schemes when properly put on your fraud prevention process.

In laymen's terms, device fingerprinting will be the ability to check out a combination of device identifiable attributes and collectively associate all of them with an identification tag on the machine familiar with access your internet site to facilitate a transaction.

A machine can represent any kind of connected device including PC, notebook, cell phone, touch screen phone, console, etc.

What is Proxy Piercing?

Proxy Piercing would be the ability to look in the evening device and determine the amalgamation of network identifiable attributes and collectively associate all of them where and how a person is accessing your web site to facilitate a transaction.


What accounts for an online transaction?

When a web based merchant is "processing" orders during checkout, there are some high-level components to contemplate making up that transaction.

  • Customer Data = (name, billing/shipping address, telephone, email, payment account, etc)
  • Device Data = details round the type of machine being employed to make buying (computer, phone, the game console ., etc)
  • Network Data = how and where may be the machine and person accessing the checkout page for making the purchase (satellite, remote software, IP, proxy, geo-location, etc)

The collective attributes of these 3 data sets equate to an internet based transaction Persona. The persona can be accustomed to gain comprehension of each transaction to ascertain if it's an excellent customer, bad customer or fraudsters seeking to steal of your stuff. Your objective should be to do this immediately with the highest level of efficiency plus the least quantity of operational cost and/or losses. Proxy List 27 December 2015 2nd Share :



When evaluating that the device fingerprint can be utilized in your fraud prevention program you need to think about data retrieved by device fingerprinting alone is less about "what would be the ID" then "how would be the ID used." The power is just not in just stopping an upcoming loss by associating a chargeback incurred together with the device ID it's in stopping losses with real-time information prior to a chargeback occurs or goods ship and preventing any future losses from related transactions.