-
公开(公告)号:US11323448B1
公开(公告)日:2022-05-03
申请号:US17084492
申请日:2020-10-29
Applicant: Visa International Service Association
Inventor: Benjamin Scott Boding , Christopher Holmes , Haochuan Zhou
Abstract: Techniques for managing redundant or overlapping access rules are provided. Access rules are determined for evaluation. Performance metrics for the access rules prior to implementation and post implementation are determined. Overlapping access rules are identified. Performance of the overlapping access rules are evaluated to determine actions to be applied to the overlapping access rules. Recommended actions and adjustments can be automatically provided by the system based on the performance analysis.
-
公开(公告)号:US20210044624A1
公开(公告)日:2021-02-11
申请号:US17083086
申请日:2020-10-28
Applicant: Visa International Service Association
Inventor: Hung-Tzaw Hu , Haochuan Zhou , Ge Wen , Benjamin Scott Boding
IPC: H04L29/06 , G06F16/901 , G06F16/2458 , H04L29/08 , G06F17/18 , G06F16/2457
Abstract: Resources can be secured by a resource security system. The resource security system can determine whether to grant or deny access to resources using authorization information in an access request. The resource security system can also determine whether the access request is legitimate or fraudulent using risk scoring models. A score transformation table can be used to provide consistency in the risk level for a particular score over time. The score transformation table can be based on a target score profile and a precision format (e.g., integer or floating point). The score transformation table can dynamically adapt based on the trending top percent of risk and can account for changes in the distribution of scores over time or by weekday. The scores can be used to determine an access request outcome. Access to the resource can be accepted or rejected based on the outcome.
-
公开(公告)号:US10855726B2
公开(公告)日:2020-12-01
申请号:US16160943
申请日:2018-10-15
Applicant: VISA INTERNATIONAL SERVICE ASSOCIATION
Inventor: Hung-Tzaw Hu , Haochuan Zhou , Ge Wen , Benjamin Scott Boding
IPC: H04L29/06 , G06F21/00 , G06F16/901 , G06F17/18 , G06F16/2458 , H04L29/08 , G06F16/2457
Abstract: Resources can be secured by a resource security system. The resource security system can determine whether to grant or deny access to resources using authorization information in an access request. The resource security system can also determine whether the access request is legitimate or fraudulent using risk scoring models. A score transformation table can be used to provide consistency in the risk level for a particular score over time. The score transformation table can be based on a target score profile and a precision format (e.g., integer or floating point). The score transformation table can dynamically adapt based on the trending top percent of risk and can account for changes in the distribution of scores over time or by weekday. The scores can be used to determine an access request outcome. Access to the resource can be accepted or rejected based on the outcome.
-
公开(公告)号:US10855685B2
公开(公告)日:2020-12-01
申请号:US16160936
申请日:2018-10-15
Applicant: VISA INTERNATIONAL SERVICE ASSOCIATION
Inventor: Hung-Tzaw Hu , Haochuan Zhou , Ge Wen , Benjamin Scott Boding
IPC: H04L29/06 , H04L29/08 , G06F17/18 , G06F21/00 , G06F16/2458 , G06F16/2457
Abstract: Resources can be secured by a resource security system. The resource security system can determine whether to grant or deny access to resources using authorization information in an access request. The resource security system can also determine whether the access request is legitimate or fraudulent using risk scoring models. A score transformation table can be used to provide consistency in the risk level for a particular score over time. The score transformation table can be based on a target score profile and a precision format (e.g., integer or floating point). The score transformation table can dynamically adapt based on the trending top percent of risk and can account for changes in the distribution of scores over time or by weekday. The scores can be used to determine an access request outcome. Access to the resource can be accepted or rejected based on the outcome.
-
-
-