SYSTEMS AND METHODS FOR DETECTING OUT-OF-PATTERN TRANSACTIONS

    公开(公告)号:US20240201797A9

    公开(公告)日:2024-06-20

    申请号:US18449489

    申请日:2023-08-14

    CPC classification number: G06Q20/4016 G06Q20/10

    Abstract: An inverse recommender system for detecting out-of-pattern payment transactions includes a memory device and a processor programmed to receive transaction data. The transaction data corresponds to historical payment transactions between account holders and merchants. The processor is programmed to generate a merchant correspondence matrix including the merchants and counters indicating the number of historical payment transactions between merchant pairs of the merchants and the account holders. The processor is programmed to store the merchant correspondence matrix in a memory device linking the merchant pairs to each account holder. The processor receives additional transaction data associated with a new payment transaction between an account holder and a merchant, and to generate an inverse recommender score for the new payment transaction based on the account holder's historical payment transaction data. The account holder's historical payment transaction data includes historical payment transaction data associated with the merchants visited by the account holder.

    SYSTEMS AND METHODS FOR DETECTING
OUT-OF-PATTERN TRANSACTIONS

    公开(公告)号:US20230385841A1

    公开(公告)日:2023-11-30

    申请号:US18449489

    申请日:2023-08-14

    CPC classification number: G06Q20/4016 G06Q20/10

    Abstract: An inverse recommender system for detecting out-of-pattern payment transactions includes a memory device and a processor programmed to receive transaction data. The transaction data corresponds to historical payment transactions between account holders and merchants. The processor is programmed to generate a merchant correspondence matrix including the merchants and counters indicating the number of historical payment transactions between merchant pairs of the merchants and the account holders. The processor is programmed to store the merchant correspondence matrix in a memory device linking the merchant pairs to each account holder. The processor receives additional transaction data associated with a new payment transaction between an account holder and a merchant, and to generate an inverse recommender score for the new payment transaction based on the account holder's historical payment transaction data. The account holder's historical payment transaction data includes historical payment transaction data associated with the merchants visited by the account holder.

    Systems and methods for early detection of network fraud events

    公开(公告)号:US11741474B2

    公开(公告)日:2023-08-29

    申请号:US17188823

    申请日:2021-03-01

    CPC classification number: G06Q20/4016 G06N20/00 G06Q30/0185

    Abstract: A computing system for detecting a pattern of fraudulent network events in a payment card network is configured to continuously receive a plurality of scored transaction authorization requests each including a respective account number and a respective fraud score. The computing system is also configured to sort the scored transaction authorization requests into account ranges based the account number, and sort the transaction authorization requests within each of the account ranges into a fraud score range stripes based on the corresponding fraud score. The computing system is further configured to calculate, for the scored transaction authorization requests within each fraud score range stripe, a ratio of a cumulative metric for a shorter time period over a longer time period, and detect, in near real-time, a fraud event associated with one of the account ranges based on the ratio for one of the fraud score range stripes within the account range.

    COMPROMISED DATA SOURCE DETECTOR AND METHOD

    公开(公告)号:US20220284436A1

    公开(公告)日:2022-09-08

    申请号:US17751461

    申请日:2022-05-23

    Abstract: A compromise detection computing device is configured to receive transaction data associated with a set of transactions performed at a plurality of merchants, each transaction conducted using a payment device, identify a first merchant, and generate a list of every payment device that was used to conduct a transaction at the first merchant. The compromise detection computing device is further configured to monitor subsequent transaction activity associated with each payment device on the list, and generate a fraud proxy score for each payment device based upon the activity. The compromise detection computing device is further configured to access fraud report records associated with any payment device on the list, generate an implication score for the first merchant based upon the fraud proxy score and the fraud report records, and, when the first implication score meets a first criteria, automatically transmit an alert message to a receiving party.

    Systems and methods for detecting out-of-pattern transactions

    公开(公告)号:US10896424B2

    公开(公告)日:2021-01-19

    申请号:US15794768

    申请日:2017-10-26

    Abstract: An inverse recommender system for detecting out-of-pattern payment transactions includes a memory device and a processor programmed to receive transaction data. The transaction data corresponds to historical payment transactions between account holders and merchants. The processor is programmed to generate a merchant correspondence matrix including the merchants and counters indicating the number of historical payment transactions between merchant pairs of the merchants and the account holders. The processor is programmed to store the merchant correspondence matrix in a memory device linking the merchant pairs to each account holder. The processor receives additional transaction data associated with a new payment transaction between an account holder and a merchant, and to generate an inverse recommender score for the new payment transaction based on the account holder's historical payment transaction data. The account holder's historical payment transaction data includes historical payment transaction data associated with the merchants visited by the account holder.

    SYSTEMS AND METHODS FOR AUTHENTICATING ONLINE USERS WITH AN ACCESS CONTROL SERVER

    公开(公告)号:US20190392448A1

    公开(公告)日:2019-12-26

    申请号:US16448572

    申请日:2019-06-21

    Abstract: A computer-implemented method for authenticating an online user with an access control server (ACS) is provided. The method includes receiving, at a risk-based authentication enabled (RBA-enabled) directory server, an authentication request message including authentication data, extracting, using the RBA-enabled directory server, the authentication data from the authentication request message, transmitting the extracted authentication data to an RBA engine, generating, using the RBA engine, based at least in part on the extracted authentication data, RBA result data including a risk score, a risk analysis, and at least one reason code, transmitting the RBA result data to the RBA-enabled directory server, embedding, using the RBA-enabled directory server, the RBA result data into the authentication request message to generate an enhanced authentication request message, and transmitting the enhanced authentication request message to the ACS to enable the ACS to make an authentication decision based on the RBA result data.

    SYSTEMS AND METHODS FOR AUTHENTICATING ONLINE USERS

    公开(公告)号:US20190392440A1

    公开(公告)日:2019-12-26

    申请号:US16448822

    申请日:2019-06-21

    Abstract: An authentication platform for authenticating an online user is provided. The authentication platform includes a memory device including an authentication profile and at least one processor coupled to the memory device. The at least one processor is programmed to receive an authentication request message for a transaction. The authentication request message includes authentication data. The at least one processor is also programmed to extract the authentication data from the authentication request message and determine if the ACS is available to process the transaction. If the ACS is unavailable, the at least one processor is further programmed to generate, based at least in part on the extracted authentication data, risk-based authentication (RBA) result data including a risk score and transmit an authentication response message based on the RBA result data.

    SYSTEM AND COMPUTER-IMPLEMENTED METHOD FOR IDENTIFYING DEFECTIVE CHIP CARDS THROUGH SUBSTANDARD TRANSACTION EXPERIENCES

    公开(公告)号:US20190188422A1

    公开(公告)日:2019-06-20

    申请号:US15844320

    申请日:2017-12-15

    Abstract: A system and computer-implemented method for analyzing chip card transactions to identify defective chip cards and/or defective chip readers in need of replacement. Constraints are established to define a subset of card transactions. From a full set of card transactions the subset is identified consisting of each card transaction falling within the constraints and occurring at a merchant having a chip reader. From this subset the unique chip cards are identified, and for each unique chip card a percentage of fallback transactions is calculated. The percentage of fallback transactions is compared to a maximum value, and if the percentage of fallback transactions exceeds the maximum value, the chip card is identified as defective. Each defective chip card is reported to the card issuer, along with at least a recommendation to replace the defective chip card. A similar process may be used to identify defective chip readers of particular merchants.

Patent Agency Ranking