摘要:
A first set of variables is introduced into a data transaction scoring system. The first set of variables having a maturity level less than a second set of variables previously matured on the data transaction scoring system. The maturity level corresponding to an amount of exposure to the data transaction scoring system. The amount of exposure affecting a degree of precision for the data transaction scoring system. The first set of variables are introduced by expanding a data transaction profile for the data transaction scoring system including second set of variables to further include the first set of variables. Initial values are assigned for the first set of variables based on a statistical model. After such an assignment, scoring of data transactions using the expanded data transaction profile prior to maturing the data transaction system using the first set of variables can be initiated. Related apparatus, systems, techniques, and articles are also described.
摘要:
Disclosed is a data collection and analysis system that is capable of extracting data from various disparate sources, i.e., contact channels, storing the data and analyzing the data to show trends in the business operation. The data is stored in a data model that uses a star schema approach to providing a unified data source. Analyzed data can be made available to users on a nearly real time basis that allows the users to view trends in business operation and plan accordingly.
摘要:
A system and method for managing mass compromise of financial transaction devices is disclosed. A method includes maintaining a summary of a transaction history for a financial transaction device, and forming a device history profile based on the transaction history, the device history profile including predictive variables indicative of fraud associated with the financial transaction device. A method further includes generating a fraud score based on the predictive variables, the fraud score representing a likelihood that the financial transaction device is compromised will be used fraudulently.
摘要:
The invention provides an overall architecture for optimal strategy design using both historical data and human expertise. The presently preferred architecture supports the tasks of strategy design and strategy analysis, and provides extensions to influence diagrams, translation of an influence diagram as a nonlinear optimization problem, and use of induction after optimization to derive decision rules.
摘要:
Detection of insurance premium fraud is provided by a predictive model, which uses derived variables to assess the likelihood of fraud for each policy. The predictive model produces a score, which is a measure of the likelihood of premium fraud or abuse. The predictive model is included in a system that accepts policies to be considered for scoring, selects which policies are appropriate for scoring, stores data about the policies in a database, uses the data to derive variables for the model, and processes and outputs the model scores and related information. A rule-based analysis, which detects specific inconsistencies in the data that are indicative of premium fraud, may also be part of the system. The model scores and red-flag indicators from the rule-based analysis may be further processed to provide customized output for users.
摘要:
The invention, referred to herein as PeaCoCk, uses a unique blend of technologies from statistics, information theory, and graph theory to quantify and discover patterns in relationships between entities, such as products and customers, as evidenced by purchase behavior. In contrast to traditional purchase-frequency based market basket analysis techniques, such as association rules which mostly generate obvious and spurious associations, PeaCoCk employs information-theoretic notions of consistency and similarity, which allows robust statistical analysis of the true, statistically significant, and logical associations between products. Therefore, PeaCoCk lends itself to reliable, robust predictive analytics based on purchase-behavior.
摘要:
A knowledge base is first characterized by an association-grounded semantics collapsed language. In response to the receipt of a query of the knowledge base, the collapsed language is used to determine whether there is an indication that the knowledge base contains knowledge requested in the query. Thereafter, the collapsed language can be used to carry out a full search for the knowledge much more efficiently than would otherwise be possible. Related methods, apparatus, and articles are also described.
摘要:
The subject matter of this specification can be embodied in, among other things, a method that includes accessing a data structure that includes information about purchasers, merchants, and financial transactions between the purchasers and the merchants and generating purchaser clusters. Generating purchaser clusters includes clustering the purchasers based on which purchasers make purchases from the same or similar merchants. Each purchaser cluster adopts associations between purchasers belonging to the purchase cluster and merchants from which these purchasers have made purchases. The method also includes generating merchant clusters, where generating the merchant clusters includes clustering merchants based on which merchants are associated with the same or similar purchase clusters and outputting profile information that characterizes typical purchases associated with one or more of the merchant clusters for use in detecting fraudulent transactions.
摘要:
A request to compare strategies is received. The first strategy can be graphically represented by a first set of linked nodes arranged in a first form of decision logic. The second strategy can be graphically represented by a second set of linked nodes arranged in a second form of decision logic. The first set of linked nodes can be converted to a first modified set of linked nodes arranged in a third form of decision logic. The second set of linked nodes can be converted to a second modified set of linked nodes arranged in the third form of decision logic. A visual representation of the first modified set of linked nodes and the second modified set of linked nodes can be provided to a user. Related apparatus, techniques, and articles are also described.
摘要:
A computerized method and system for evaluating customers of a financial institution using customer relationship value tags and associated customer treatment actions includes automatically analyzing information about a customer from a database of the financial institution by a customer assessment engine using a predefined statistical model to assess the value of the customer to the financial institution. At least one customer treatment action associated with the assessed value is identified by the assessment engine, and the assessment engine marks a file associated with the customer with a mark representing the assessed value and the associated customer treatment action. The marked file is then accessed by other financial systems of the financial institution, or by customer representatives of the financial institution, and the associated customer treatment action is implemented by such systems or representatives in dealing with the customer.