[go: up one dir, main page]

AU2015203184A1 - Methods and a system for detecting fraud in betting and lottery games - Google Patents

Methods and a system for detecting fraud in betting and lottery games Download PDF

Info

Publication number
AU2015203184A1
AU2015203184A1 AU2015203184A AU2015203184A AU2015203184A1 AU 2015203184 A1 AU2015203184 A1 AU 2015203184A1 AU 2015203184 A AU2015203184 A AU 2015203184A AU 2015203184 A AU2015203184 A AU 2015203184A AU 2015203184 A1 AU2015203184 A1 AU 2015203184A1
Authority
AU
Australia
Prior art keywords
coupon
computer system
played
abnormal pattern
game
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
AU2015203184A
Other versions
AU2015203184B2 (en
Inventor
Menelaos Bakopoulos
Ioannis Christou
Christos K. Dimitriadis
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intralot SA Integrated Lottery Systems and Services
Original Assignee
Intralot SA Integrated Lottery Systems and Services
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AU2011259831A external-priority patent/AU2011259831A1/en
Application filed by Intralot SA Integrated Lottery Systems and Services filed Critical Intralot SA Integrated Lottery Systems and Services
Priority to AU2015203184A priority Critical patent/AU2015203184B2/en
Publication of AU2015203184A1 publication Critical patent/AU2015203184A1/en
Application granted granted Critical
Publication of AU2015203184B2 publication Critical patent/AU2015203184B2/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Pinball Game Machines (AREA)

Abstract

In one embodiment of the invention, a method to detect fraud includes a) receiving by the computer system from a source information regarding a plurality of played coupons for at least one game, wherein the plurality of played coupons comprises at least one first coupon; b) populating by the computer system a two-dimensional array for each played game from the received information, wherein the at least one two-dimensional array holds aggregated game statistics, c) storing by the computer system the at least one two- dimensional array with in a data structure; d) scanning, using the received information for the at least one first coupon, by the computer system the at least one data structure to identify at least one abnormal pattern; and e) generating, when the at least one abnormal pattern is identified, by the computer system an alert prior to a payout on the at least one first coupon. Fig 1 WO 2011/148260 PCT/IB2011/001433 Client Device Client Device Client Device - \~~--------------K ewakSr(.!r NetworkSevr( )

Description

WO 2011/148260 PCT/IB2011/001433 METHODS AND A SYSTEM FOR DETECTING FRAUD IN BETTING AND LOTTERY GAMES FIELD OF THE INVENTION 5 [0011 One embodiment of the present invention relates to a method for identifying and preventing fraud in non-Internet-based Lottery and Betting games (including terminal based or any other online or offline approach). Another embodiment of the present invention relates to a method for identifying and preventing fraud in Internet-based Lottery and Betting Gaming modes. The methods consist of the definition of the parameters of a Lottery and/or 0 Betting system that are correlated in order to identify fraud cases, as well as the correlation functions themselves. BACKGROUND OF THE INVENTION [002] Most online businesses today are familiar with the negative impact associated with fraud. The damage caused by the use of cheating techniques, stolen financial data, 5 identity theft, spam, phishing, internal system behavior intervention and other similar activities can be enormously expensive and difficult to manage. The Lottery and Betting sector in particular is increasingly exposed to all of these dangers. [003] The online environment provides very little verifiable information related to players and their accounts. In fact, the anonymity of online gaming services has actually 20 encouraged the invention and dissemination of many new types of fraud. The motives for such actions vary from simply "beating the system" to profit making scams from insiders and outsiders. 1 WO 2011/148260 PCT/IB2011/001433 BRIEF SUMMARY OF THE INVENTION [004] In one embodiment, the instant invention identifies fraud cases with sufficient efficiency in high volume of data. In another embodiment, the instant invention provides at most two sequential scans of the data and stores only aggregate statistics of the coupons 5 contained in the data into a data cube which possesses a granularity sufficient to catch all specified fraud scenarios. In some embodiments, coarse-grained time intervals (with a factor of granularity that is user-controlled), in other words sampling on time at user-controlled sampling rates, help reduce the amount of data required to be resident in main memory. [0051 In one embodiment, the instant invention may include a method to detect fraud 0 performed in a computing system that includes a) receiving by the computer system from at least one source information regarding a plurality of played coupons for at least one game, wherein the plurality of played coupons comprises at least one first coupon and at least one second coupon; b) populating by the computer system at least one two-dimensional array for each played game from the received information, i) wherein the at least one two-dimensional 5 array holds aggregated game statistics, and ii) wherein the aggregate statistics is user-defined and includes: 1) an identity of the at least one source, 2) the received information for the plurality of played coupons, and 3) at least one of: a) a frequency of at least one played amount, b) a number of cancelled coupons, c) a maximum coupon value played, and d) a maximum number of combinations per the at least one first coupon and the at least one 20 second coupon; c) storing by the computer system the at least one two-dimensional array with in at least one data structure; d) scanning, using the received information for the at least one first coupon, by the computer system the at least one data structure to identify at least one abnormal pattern; e) generating, when the at least one abnormal pattern is identified, by the 2 WO 2011/148260 PCT/IB2011/001433 computer system an alert prior to a payout on the at least one first coupon; f) scanning, using the received information for the at least one second coupon, by the computer system the at least one data structure to identify at least one abnormal pattern; and g) generating, when the at least one abnormal pattern is identified, by the computer system an alert prior to a payout 5 on the at least one second coupon. [006] In one embodiment of the instant invention, the at least one abnormal pattern is when a ratio of a coupon gross amount for a random player to a total gross amount for all players in the at least one game exceeds a predetermined ratio amount. [0071 In one embodiment of the instant invention, the step of scanning by the 0 computer system further comprises: identifying by the computer system a first suspected coupon and a second suspected coupon, wherein a suspected coupon is the at least one played coupon whose played amount exceeds a predetermined played threshold amount; hashing by the computer system the aggregate statistics regarding the first suspected coupon to generate a first hash value; hashing by the computer system the aggregate statistics regarding the 5 second suspected coupon to generate a second hash value; aggregating by the computer system the first and the second hash values when a length of the first hash value differs from a length of the second hash value by less than a predefined difference number; and scanning, when a length of the first hash value differs from a length of the second hash value by less than a predefined difference number, by the computer system the aggregate statistics 20 regarding the first and the second suspected coupons, wherein the at least one abnormal pattern is a presence of similar betting combinations from the same at least one agent. [008] In one embodiment of the instant invention, the at least one abnormal pattern is a presence of similar betting combinations from at least two agents. In one embodiment of 3 WO 2011/148260 PCT/IB2011/001433 the instant invention, the at least one abnormal pattern is when a frequency of cancellations for the at least one agent exceeds a predetermined cancellation frequency threshold number. [009] In one embodiment of the instant invention, the at least one abnormal pattern is when a percentage of participation in the at least one game during a sampled time period to 5 a total participation in the at least one game exceeds a predetermined participation percentage. In one embodiment of the instant invention, the at least one abnormal pattern is when the at least one played coupon includes bets for all played combinations in the at least one played coupon. [0010] In one embodiment of the instant invention, the at least one abnormal pattern 0 is when a plurality of the played coupons sold by the same agent include bets having the same amount placed for all played combinations. In one embodiment of the instant invention, the at least one abnormal pattern is when a plurality of the played coupons sold by a plurality of the agents include bets having the same amount placed for all played combinations. 5 [00111 In one embodiment of the instant invention, the at least one abnormal pattern is when a plurality of the played coupons sold by the same agent include bets having the same amount placed for all played combinations. In one embodiment of the instant invention, the at least one abnormal pattern is when a plurality of the played coupons sold by a plurality of the agents include bets having the same amount placed for all played 20 combinations. [0012] In one embodiment of the instant invention, the at least one abnormal pattern is when a plurality of the played coupons sold by the same agent include bets having amounts that are less than a limit amount by less than a predetermined deviation amount. In one 4 WO 2011/148260 PCT/IB2011/001433 embodiment of the instant invention, the at least one abnormal pattern is when the at least one played coupon is a winning coupon and wherein the winning coupon is received for payment during a predetermined period prior to an expiration date of the wining coupon. [0013] In one embodiment, the instant invention may include a method to detect fraud 5 performed in a computing system, that includes: a) receiving by the computer system from at least one source information about a plurality of transactions regarding at least one game, wherein the plurality of transactions comprises at least one first transaction and at least one second transaction; b) populating by the computer system at least one two-dimensional array for each player with information from the received plurality of transactions, i) wherein the at 0 least one two-dimensional array holds aggregated game statistics regarding each player's participation in a particular game during at least one period of time, and ii) wherein the aggregate statistics is user-defined and comprises a distribution of cash in - cash out amounts per each play type played by the player, wherein the distribution is based on: 1) an amount of each transaction; 2) a largest amount from all cash in - cash out amounts; 3) a total number 5 of transactions whose value was within a predetermined range; and 4) at least one transaction whose value was required official approval; c) storing by the computer system the at least one two-dimensional array in at least one data structure; d) scanning, using the received information for the at least one first transaction, by the computer system the at least one data structure to identify at least one abnormal pattern; e) generating, when the at least 20 one abnormal pattern is identified, by the computer system an alert prior to a payout on the at least one first transaction; f) scanning, using the received information for the at least one second transaction, by the computer system the at least one data structure to identify at least 5 WO 2011/148260 PCT/IB2011/001433 one abnormal pattern; and e) generating, when the at least one abnormal pattern is identified, by the computer system an alert prior to a payout on the at least one second transaction. [0014] In one embodiment of the instant invention, the at least one abnormal pattern is based on a number of times and on a frequency with which a cash in-cash out amount 5 correlated with a particular play type and winnings. In one embodiment of the instant invention, the at least one abnormal pattern relates to the player's usage of at least one bank account and at least one credit card account and is based on at least one of: i) the amount of each transactions; ii) a type of the usage; iii) a frequency of the usage; and iv) a frequency of change the at least one bank account or at least one credit card account. 0 [00151 In one embodiment of the instant invention, the at least one abnormal pattern relates to a frequency of changing player's profile and is based on a similarity between an old and a new profiles. In one embodiment of the instant invention, the at least one abnormal pattern is when a number of changes to the player's profile exceeds a predetermined change number for at least one the following categories of the personal information: a) password 5 change frequency, b) credit card numbers or pointers to credit card numbers, c) account block or exclude, and d) play cancellation and amount of cancellation [0016] In one embodiment, the instant invention may include a programmed computer for detecting fraud than includes: memory having at least one region for storing computer executable program code; and a processor for executing the program code stored in 20 the memory, wherein the program code includes: a) code to receive by the computer system from at least one source information regarding a plurality of played coupons for at least one game, wherein the plurality of played coupons comprises at least one first coupon and at least one second coupon; b) code to populate by the computer system at least one two-dimensional 6 WO 2011/148260 PCT/IB2011/001433 array for each played game from the received information, i) wherein the at least one two dimensional array holds aggregated game statistics, and ii) wherein the aggregate statistics is user-defined and includes: 1) an identity of the at least one source, 2) the received information for the plurality of played coupons, and 3) at least one of: a) a frequency of at 5 least one played amount, b) a number of cancelled coupons, c) a maximum coupon value played, and d) a maximum number of combinations per the at least one first coupon and the at least one second coupon; c) code to store by the computer system the at least one two dimensional array with in at least one data structure; d) code to scan, using the received information for the at least one first coupon, by the computer system the at least one data 0 structure to identify at least one abnormal pattern; e) code to generate, when the at least one abnormal pattern is identified, by the computer system an alert prior to a payout on the at least one first coupon; f) code to scan, using the received information for the at least one second coupon, by the computer system the at least one data structure to identify at least one abnormal pattern; and g) code to generate, when the at least one abnormal pattern is 5 identified, by the computer system an alert prior to a payout on the at least one second coupon.. [00171 In one embodiment, the instant invention may include a programmed computer for detecting fraud that includes a memory having at least one region for storing computer executable program code; and a processor for executing the program code stored in 20 the memory, wherein the program code includes: a) code to receive by the computer system from at least one source information about a plurality of transactions regarding at least one game, wherein the plurality of transactions comprises at least one first transaction and at least one second transaction; b) code to populate by the computer system at least one two 7 WO 2011/148260 PCT/IB2011/001433 dimensional array for each player with information from the received plurality of transactions, i) wherein the at least one two-dimensional array holds aggregated game statistics regarding each player's participation in a particular game during at least one period of time, and ii) wherein the aggregate statistics is user-defined and comprises a distribution of 5 cash in - cash out amounts per each play type played by the player, wherein the distribution is based on: 1) an amount of each transaction; 2) a largest amount from all cash in - cash out amounts; 3) a total number of transactions whose value was within a predetermined range; and 4) at least one transaction whose value was required official approval; c) code to store by the computer system the at least one two-dimensional array in at least one data structure; d) 0 code to scan, using the received information for the at least one first transaction, by the computer system the at least one data structure to identify at least one abnormal pattern; e) code to generate, when the at least one abnormal pattern is identified, by the computer system an alert prior to a payout on the at least one first transaction; f) code to scan, using the received information for the at least one second transaction, by the computer system the at 5 least one data structure to identify at least one abnormal pattern; and e) code to generate, when the at least one abnormal pattern is identified, by the computer system an alert prior to a payout on the at least one second transaction. [0018] In some embodiments, the system and methods of the present invention may allow, as information about each played coupon is received, to analyze on a coupon-by 20 coupon basis and determine instantaneously, real-time, a presence of potentially abnormal, fraudulent, patterns/activities/trends while a game is proceeding and/or prior to a potential payout on the analyzed, played coupon. In some embodiments, the system and methods of the present invention may allow, as information about each played coupon is received, to 8 WO 2011/148260 PCT/IB2011/001433 automatically analyze on a coupon-by-coupon basis and determine instantaneously, real-time, a presence of potentially abnormal, fraudulent, patterns/activities/trends while a game is proceeding and/or prior to a potential payout on the analyzed, played coupon. [0019] In some embodiments, the system and methods of the present invention 5 provide the Abnormal Behavior Detection ("ABD") on pre-specified scenarios, that is already known cases of potential fraud alerts. In some embodiments, ABD may include actions from players, retailers and internal users that may represent, including but not limiting, attempts for multiple ticket validations (especially for Instant Gaming), unusual promotion scenarios, unusual win patterns, sales exceptions, suspicious betting pattern identification, and/or ticket 0 cancelations. In some embodiments, ABD is used to detect "unlikely events" which may not be based on a-priori specified scenarios, but are rather based on unknown yet cases of potential fraud, by deploying, for example, statistical analysis, data mining and machine learning techniques. In some embodiments, noting cases of potential fraud, the system and methods of the present invention allow to the inventive system to "learn" fraud patterns. 5 [0020] In some embodiments, the instant invention further includes a Decision Support System (DSS) for Response which combines multiple events to derive a final alert and an ability to provide evidence (reasoning) which led to the final alert. [0021] In some embodiments, the instant invention utilizes a Games Data Mapping that may translate any type of online chance game data collected from different countries 20 internationally to a common data description format so that all subsequent algorithms for ABD and DSS are seamlessly executed without any modifications. 9 WO 2011/148260 PCT/IB2011/001433 [00221 In some embodiments, the instant invention results in black-listing of players and/or IP addresses based on alerts raised from player behavior and/or group behavior, for example from specific Internet addresses and/or terminals. BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS 5 [0023] The present invention will be further explained with reference to the attached drawings, wherein like structures are referred to by like numerals throughout the several views. The drawings shown are not necessarily to scale, with emphasis instead generally being placed upon illustrating the principles of the present invention. [0024] FIG. 1 shows a schematic of an embodiment of the present invention. 0 [00251 FIG. 2 shows a schematic of another embodiment of the present invention. [0026] FIG. 3 shows a schematic of yet another embodiment of the present invention. [00271 While the above-identified drawings set forth presently disclosed embodiments, other embodiments are also contemplated, as noted in the discussion. This disclosure presents illustrative embodiments by way of representation and not limitation. 5 Numerous other modifications and embodiments can be devised by those skilled in the art which fall within the scope and spirit of the principles of the presently disclosed invention. DETAILED DESCRIPTION OF THE INVENTION [0028] Detailed embodiments of the present invention are disclosed herein; however, it is to be understood that the disclosed embodiments are merely illustrative of the invention that 20 may be embodied in various forms. In addition, each of the examples given in connection with the various embodiments of the invention are intended to be illustrative, and not restrictive. Further, the figures are not necessarily to scale, some features may be exaggerated to show details of particular components. In addition, any measurements, specifications and the like 10 WO 2011/148260 PCT/IB2011/001433 shown in the figures are intended to be illustrative, and not restrictive. Therefore, specific structural and functional details disclosed herein are not to be interpreted as limiting, but merely as a representative basis for teaching one skilled in the art to variously employ the present invention. 5 Illustrative Operating Environment [0029] FIG. 1 illustrates one embodiment of an environment in which the present invention may operate. However, not all of these components may be required to practice the invention, and variations in the arrangement and type of the components may be made without departing from the spirit or scope of the invention. In some embodiment, the fraud 0 detection system hosts a large number of members and concurrent transactions. In other embodiments, the fraud detection system computer is based on a scalable computer and network architecture that incorporates varies strategies for assessing the data, caching, searching, and database connection pooling. An example of the scalable architecture is an architecture that is capable of operating multiple servers. 5 [0030] In embodiments, members of the inventive computer system 102-104 (e.g. user (e.g. players, agents, etc.) ) include virtually any computing device capable of receiving and sending a message over a network, such as network 105, to and from another computing device, such as servers 106 and 107, each other, and the like. In embodiments, the set of such devices includes devices that typically connect using a wired communications medium such 20 as personal computers, multiprocessor systems, microprocessor-based or programmable consumer electronics, network PCs, and the like. In embodiments, the set of such devices also includes devices that typically connect using a wireless communications medium such as cell phones, smart phones, pagers, walkie talkies, radio frequency (RF) devices, infrared (IR) 11 WO 2011/148260 PCT/IB2011/001433 devices, CBs, integrated devices combining one or more of the preceding devices, or virtually any mobile device, and the like. Similarly, in embodiments, client devices 102-104 are any device that is capable of connecting using a wired or wireless communication medium such as a PDA, POCKET PC, wearable computer, and any other device that is equipped to 5 communicate over a wired and/or wireless communication medium. [0031] In embodiments, each member device within member devices 102-104 may include a browser application that is configured to receive and to send web pages, and the like. In embodiments, the browser application may be configured to receive and display graphics, text, multimedia, and the like, employing virtually any web based language, 0 including, but not limited to Standard Generalized Markup Language (SMGL), such as HyperText Markup Language (HTML), a wireless application protocol (WAP), a Handheld Device Markup Language (HDML), such as Wireless Markup Language (WML), WMLScript, JavaScript, and the like. In embodiments, the invention is programmed in either Java or .Net. 5 [0032] In embodiments, member devices 102-104 may be further configured to receive a message from the another computing device employing another mechanism, including, but not limited to email, Short Message Service (SMS), Multimedia Message Service (MMS), instant messaging (IM), internet relay chat (IRC), mIRC, Jabber, and the like. 20 [0033] In embodiments, network 105 may be configured to couple one computing device to another computing device to enable them to communicate. In embodiments, network 105 may be enabled to employ any form of computer readable media for communicating information from one electronic device to another. Also, in embodiments, 12 WO 2011/148260 PCT/IB2011/001433 network 105 may include a wireless interface, and/or a wired interface, such as the Internet, in addition to local area networks (LANs), wide area networks (WANs), direct connections, such as through a universal serial bus (USB) port, other forms of computer-readable media, or any combination thereof. In embodiments, on an interconnected set of LANs, including 5 those based on differing architectures and protocols, a router may act as a link between LANs, enabling messages to be sent from one to another. [0034] Also, in some embodiments, communication links within LANs typically include twisted wire pair or coaxial cable, while communication links between networks may utilize analog telephone lines, full or fractional dedicated digital lines including TI, T2, T3, 0 and T4, Integrated Services Digital Networks (ISDNs), Digital Subscriber Lines (DSLs), wireless links including satellite links, or other communications links known to those skilled in the art. Furthermore, in some embodiments, remote computers and other related electronic devices could be remotely connected to either LANs or WANs via a modem and temporary telephone link. In essence, in some embodiments, network 105 includes any communication 5 method by which information may travel between client devices 102-104, and servers 106 and 107. [00351 FIG. 2 shows another exemplary embodiment of the computer and network architecture that supports the inventive fraud detection system. The member devices 202a, 202b thru 202n shown (e.g. traders' desktops) each comprises a computer-readable medium, 20 such as a random access memory (RAM) 208 coupled to a processor 210 or FLASH memory. The processor 210 may execute computer-executable program instructions stored in memory 208. Such processors comprise a microprocessor, an ASIC, and state machines. Such processors comprise, or may be in communication with, media, for example computer 13 WO 2011/148260 PCT/IB2011/001433 readable media, which stores instructions that, when executed by the processor, cause the processor to perform the steps described herein. Embodiments of computer-readable media may include, but are not limited to, an electronic, optical, magnetic, or other storage or transmission device capable of providing a processor, such as the processor 210 of client 5 202a, with computer-readable instructions. Other examples of suitable media may include, but are not limited to, a floppy disk, CD-ROM, DVD, magnetic disk, memory chip, ROM, RAM, an ASIC, a configured processor, all optical media, all magnetic tape or other magnetic media, or any other medium from which a computer processor can read instructions. Also, various other forms of computer-readable media may transmit or carry 0 instructions to a computer, including a router, private or public network, or other transmission device or channel, both wired and wireless. The instructions may comprise code from any computer-programming language, including, for example, C, C++, C#, Visual Basic, Java, Python, Perl, and JavaScript. [0036] Member devices 202a-n may also comprise a number of external or internal 5 devices such as a mouse, a CD-ROM, DVD, a keyboard, a display, or other input or output devices. Examples of client devices 202a-n may be personal computers, digital assistants, personal digital assistants, cellular phones, mobile phones, smart phones, pagers, digital tablets, laptop computers, Internet appliances, and other processor-based devices. In general, a client device 202a are be any type of processor-based platform that is connected to a 20 network 206 and that interacts with one or more application programs. Client devices 202a-n may operate on any operating system capable of supporting a browser or browser-enabled application, such as MicrosoftTM, WindowsTM, or Linux. The client devices 202a-n shown may include, for example, personal computers executing a browser application program such 14 WO 2011/148260 PCT/IB2011/001433 as Microsoft Corporation's Internet ExplorerTM, Apple Computer, Inc.'s SafariTM, Mozilla Firefox, and Opera. [00371 Through the client devices 202a-n, users (e.g. players, agents, etc.) 212a-n communicate over the network 206 with each other and with other systems and devices 5 coupled to the network 206. As shown in FIG. 2, server devices 204 and 213 may be also coupled to the network 206. Examples of Data Structures For Non-Internet-Gaming Data 0 [0038] In some embodiments, At denotes the minimum length of time (time-quantum, or time period) within which statistics about a game g (lottery, betting, etc...) may be measured and stored. In some embodiments, as a default value, At or T may be set to 12 hour (but is in general user-controlled through the system's GUI). In some embodiments, there is a 2 dimensional array Sg(t,a)t =1.... T,, a =1,... N-A where NA is the total number of agents (or 5 groups of agents, if such a partitioning is known a-priori), and T -- 7,d - T,,,) / At , the number of sampled periods, with Tstart being the time when the first coupon (or ticket) for game category g was played, and Tend being the time when the last coupon for the game category g was played in the available transactional data. In some embodiments, this array holds the following aggregate statistics for the coupons for game category g played in agent a, within the 20 time interval [t, t+At), denoted by t, measured for all t=1,..., Te. [0039] 1. The frequency (distribution) of amounts played. In some embodiments, this implies a quantization of the amount-played variable, which is also user-defined. In some embodiments, Am denotes the money-quantum used for the particular game (e.g. C50). In some embodiments, for each cell of the 2-D array S (t,a) it may be maintained a data member 1b WO 2011/148260 PCT/IB2011/001433 _mDistro which is as follows: double _mDistro[Mmax/Am] where Mmax-1 is the max. amount of money allowed to be played in the game without official approval, and the last element in the array holds all larger bets (that require official approval). In some embodiments, the size of mDistro is [Mmax/Am]. In some embodiments, each cell holds the total number of coupons that 5 were played for this game, and whose value was within the specified monetary amount interval n representing the interval [(n-i)Am, nAm), where n = 1, ... , [Mmax/Am] [0040] 2. Number of cancelled coupons. [0041] 3. Max. coupon value played. In some embodiments, if player-id information was known, then this value may be substituted for the maximum of a player's amount for the 0 game, independent of agent; but player-id does not exist yet. [0042] 4. max. number of combinations in played coupon so far. [0043] In some embodiments, the above accounts for all necessary data for detecting the initially specified fraud scenarios. In some embodiments, the above detailed data structures and statistics could be extended to enhance the applicability of the proposed methodology to other 5 aggregate statistics-based fraud cases detection. [0044] In some embodiments, the data structures may be described in the pseudo-code as follows: class S { final static double _Dt; 20 final static double _Dm; final static double _Mmax; double _mdistro[_Mmax/_Dm]; double _numCancelled; 16 WO 2011/148260 PCT/IB2011/001433 double _maxCombsInCouponPlayed; double _maxCouponValue; double _totCouponValue; long _numCoupons; 5 }; class StatsPerGame { final static double _totTime; final static double _numAgents; S _array[_totTime/S._Dt] [numAgents]; 0 S _sumArray[_totTime/S._Dt]; } ; In some embodiments, the _sumArray[] data member of the data structure StatsPerGame may aggregate the array[][] data member in the agent variable. In some embodiments, the StatsPerGame data structure may be completely populated using only a single scan of the input 5 files. [00451 In some embodiments, FIG. 3 visualizes the data cube structure. In some embodiments, an algorithm of linear complexity may be optimal. For example, any algorithm has to read the input at least once, hence any linear time algorithm is considered optimal. In some embodiments, the above detailed information may remain in computer memory in order to 20 speed up computation and avoid expensive disk-access operations. [0046] In some embodiments, to achieve this optimal behavior, a one-time scan of all played coupons may be utilized to collect all the necessary information, as presented previously. In some embodiments, such information may present a first-level of "compactness" to allow for 17 WO 2011/148260 PCT/IB2011/001433 more compact representation of the initially provided transactional data. In some embodiments, based on the fraud cases at hand, the compact representation is optimal for their detection without any substantial information being lost during this process. In some embodiments, after the one-time scan gathered necessary information as detailed above, the instant invention allows 5 to effectively answer queries that are relevant to the various fraud cases specified so far. [00471 In some embodiments, for example, it may be easy to identify event E (say a match between two teams A and B) that is used to place a bet in a coupon C, the agent that filed this coupon and the amount M played. [0048] In some embodiments, the system and methods of the present invention may 0 allow, as information about each played coupon is received, to analyze on a coupon-by coupon basis and determine instantaneously, real-time, a presence of potentially abnormal, fraudulent, patterns/activities/trends while a game is proceeding and/or prior to a potential payout on the analyzed, played coupon. In some embodiments, the system and methods of the present invention may allow, as information about each played coupon is received, to 5 automatically analyze on a coupon-by-coupon basis and determine instantaneously, real-time, a presence of potentially abnormal, fraudulent, patterns/activities/trends while a game is proceeding and/or prior to a potential payout on the analyzed, played coupon. [0049] Abnormal patterns/activities/trends/conditions are situations that create a suspicion that a fraudulent activity may have occurred or about to occur, and/or create a 20 apprehension of a vulnerability that may allow a fraudulent activity to take place. Below are embodiments of the present invention illustrating the claim requirement of "at least one abnormal pattern is identified." 18 WO 2011/148260 PCT/IB2011/001433 Examples of Identifying and Preventing Fraud in non-Internet-based Lottery and Betting Games Scenario 1: % percentage of player gross amount / total gross amounts in a betting 5 game [0050] The following is one example that how a particular abnormal pattern may be identified. In some embodiments, when dealing with anonymous coupons, the player-id information is not given in the input files. The present invention allows to check whether the 0 ratio of a coupon-gross-amount for any random player over the total gross amount for all players in a game exceeds a threshold by computing for a particular game the ratio of a maximum coupon(ticket)-gross-amount played for that game (e.g. maximum amount bet per a ticket) over total gross-amount for that game (sum of amounts of all coupons (tickets) played during that game. In some embodiments, if that ratio exceeds a (administrator 5 defined) threshold, an ALERT, indicative of a potentially abnormal, fraudulent behavior/condition, is raised citing the offending coupon. [00511 In some embodiments, to implement this scenario, the following double for-loop may be used: 20 Begin; M=0; Sum=O; for t=1,...Te do for a=1...NA do 25 if StatsPerGame._array[t] [a]._maxCouponValue > M M = StatsPerGame._array[t] [a]._maxCouponValue; 19 WO 2011/148260 PCT/IB2011/001433 endif; Sum+= StatsPerGame._array[t][a]._totCouponValue; endfor; endfor; 5 if M/Sum > threshold ALERT; End; Scenario 2: Many identical winning combinations of bettings (systems) for the same agent 0 [0052] The following is one example that how a particular abnormal pattern may be identified. In some embodiments, input information may be information about played coupons. In some embodiments, output information may identify the "identical" combinations of betting that come from the same agent. In some embodiments, such output information may essentially correspond to matches that have been "fixed" in advance. In some embodiments, this scenario 5 tests for a presence of a combination in a particular coupon/ticket that has been played from the same agent many more times than the statistical expectation for this combination. In some embodiments, to eliminate a need for checking each coupon combination against every other coupon combination, the present invention applies a hash function to a byte stream of the particular coupon, representing a combination played in the coupon, to produce a hash value 20 representing the particular coupon. In some embodiments, the generated hash value is then stored in two hash-tables in a database, along with the number of appearances of that value in the coupons played. In some embodiments, from the two hash-tables, -- the first hash table corresponds to coupons/tickets played from the agent where the coupon was cast/sold, and the second hash table corresponds to the sum of coupons/tickets from all agents. In some 20 WO 2011/148260 PCT/IB2011/001433 embodiments, if the ratio of appearances of any similar or identical hash values against the total coupons played for a given game exceeds an administrator-defined threshold, an ALERT, indicative of a potentially abnormal, fraudulent behavior, is generated with information about potentially fraudulent coupons/tickets. 5 [0053] The determination in accordance with the instant invention may include, but not limiting to, the following sequence of steps: For every coupon C if (amount M is in the range [M1, M2]) then do the following: Identify the event E from coupon (E relates to a specific played combination, or to a pool of similar ones (i.e. differing very slightly) Set h = hash(E) Place the coupon in a bucket B[h] End-if End-for [0054] In some embodiments, when looking for cases of fixed events (e.g. events whose outcome is known in advance and whose outcome corresponds to "valid" games/combinations 10 offered for play), the instant invention may only consider coupons whose amount is above a certain threshold. In some embodiments, for those coupons that belong in the range [M1, M2] parameters that can be determined in advance - the instant invention may collect all identical events. [00551 In some embodiments, to accomplish the collection step, the present invention 15 hash the event information to get back a numerical value h = hash(E). In some embodiments, 21 WO 2011/148260 PCT/IB2011/001433 the hash value may be used to place the coupon (or a link to the coupon) inside a bucket array B[] whose length may be determined by the output range of the hash function. In some embodiments, the preceding approach allows to substantially limit the data space representation size and easily pinpoint to similar events, in terms of close hash function outputs. In some 5 embodiments, the length of the array may be a design parameter that depends on available memory and can be fixed in advance. [00561 In some embodiments, the instant invention allows to complete the collecting scan for every coupon C within a single pass. In some embodiments, the collected infromation in buckets may contain identical bets whose amount is in the range [M1, M2], for example 0 above 500 Euros. In some embodiments, the instant invention allows to locate identical combinations by simply looking at the coupons that reside in each bucket. [00571 In some embodiments, the instant invention may minimizes collisions (e.g. significantly different bets that hash to the same bucket), by carefully defining the hash function and the length of the bucket array. In some embodiments, a suitable choice of hash function may 5 include, but not limiting to, cryptographic hash functions and/or simple functions that perform modular arithmetic. In some embodiments, the consideration of amounts greater than a specific amount may also decrease the chance of collisions. In some embodiments, the instant invention may first clusters coupons based on the coupon amount. In some embodiments, the instant invention may second apply the hash function to each cluster of similar amount coupons, to 20 identify coupons with similar combinations. In some embodiments, the instant invention may apply an additional constraint for this scenario by having the same agent Id (which may further partition the initial clusters to smaller ones). In some embodiments, this partitioning may further reduce the risk of collisions. 22 WO 2011/148260 PCT/IB2011/001433 Scenario 3: Many identical combinations of bettings (systems) from many agents [0058] The following is one example that how a particular abnormal pattern may be identified. In some embodiments, this scenario tests for a presence of a combination in a 5 particular coupon/ticket that has been played from multiple agents many more times than the statistical expectation for this combination. In some embodiments, to eliminate a need for checking each coupon combination against every other coupon combination, the present invention applies a hash function to a byte stream of the particular coupon, representing a combination played in the coupon, to produce a hash value representing the particular coupon. 0 In some embodiments, the generated hash value is then stored in two hash-tables in a database, along with the number of appearances of that value in the coupons played. [00591 In some embodiments, from the two hash-tables, -- the first hash table corresponds to coupons/tickets played from the agent where the coupon was cast/sold, and the second hash table corresponds to the sum of coupons/tickets from all agents. In some 5 embodiments, if the ratio of appearances of any similar or identical hash values against the total coupons played for a given game exceeds an administrator-defined threshold, an ALERT, indicative of a potentially abnormal, fraudulent behavior/condition, is generated with information about potentially fraudulent coupons/tickets. In some embodiments, the methods and the system used to identify potentially fraudulent trends in the scenario 2 may also be 20 implemented to address scenario 3. In some embodiments, the present invention identifies a combination in a particular coupon/ticket that has been played from multiple agents many more times than the statistical expectation for this combination because a bucket may contain identical bets, irrespective of the agent, that was used to file the coupon. In some embodiments, 23 WO 2011/148260 PCT/IB2011/001433 simply looking at a specific bucket may provide additional information about potentially collaborating agents. Scenario 4: Increased cancellation frequency in a betting game and/or a lottery game [0060] The following is one example that how a particular abnormal pattern may be 5 identified. In some embodiments, the present invention computes a percentage of coupon cancellations over total coupons played from any given agent within an administrator-defined time interval. In some embodiments, if the percentage is sufficiently above the average cancellation rate for all agents within the given time-interval and for all games, ("sufficiently above" is defined by an administrator-defined threshold that multiplies the average global 0 cancellation rate during the specified time-interval), an ALERT, indicative of a potentially abnormal, fraudulent behavior/condition, is generated with information about potentially offending agent(s). In some embodiments, the following for-loop may be used to detect fraud in this scenario (e.g. finding an average frequency of cancellations among all agents and per a specific agent): 5 Begin numc=O; for a=1...NA do numca[a] = 0; endfor; 20 for t=1...Te do numc += StatsPerGame._sumArray[t].numCancelled; for a=1...NA do numca[a]+=StatsPerGame._array[t][a].numCancelled; 24 WO 2011/148260 PCT/IB2011/001433 endfor; endfor; [00611 In some embodiments, the instant invention may check the collected information using the following procedure: 5 avgfreq = numc / (Te*NA); for t=1... Te do for a=1... NA do if StatsPerGame._array[t][a]._numCancelled > avgfreq*(1+user-defined-threshold) 0 ALERT; endfor; endfor; [0062] In some embodiments, the instant invention may use a mixed solution by performing scans within a certain timeframe before each game closes. For example: 5 avgfreq = numc / (Te*NA); or a=1... NA do if numca[a] > avgfreq*(1+user-defined-threshold) ALERT (output agent Id -> a); 20 endfor; End. 25 WO 2011/148260 PCT/IB2011/001433 Scenario 5: A ratio of game participation in a particular betting or lottery game to a total participation in all games [0063] The following is one example that how a particular abnormal pattern may be identified. In some embodiments, the instant invention may track a participation in a particular 5 game to total participation in all games. In some embodiments, the instant invention estimates whether a ratio of coupons/tickets played from all agents for a given game over a total number of coupons/tickets played from all agents during an administrator-defined time-interval exceeds an administrator-defined threshold. In some embodiments, the instant invention generates an ALERT, indicative of a potentially abnormal, fraudulent behavior/condition, containing 0 information about the potentially offending, fraudulent game. [0064] In some embodiments, the instant invention may produce an alert if the game participation is above certain threshold (e.g. >20%). In some embodiments, the instant invention may produce an alert if the game participation is above certain threshold within a certain timeframe ( e.g. within a half an hour timeframe). 5 [00651 In some embodiments, the instant invention may include, but not limiting to, the following pseudo code to identify fraud based on tracking game participation: Begin for each t=1... Te do totjpart = 0; 20 for each game g active in [t,t+At) do totjpart += StatsPerGame[g]._sumArray[t].numCoupons; endfor; for each game g active in [t,t+At) do 26 WO 2011/148260 PCT/IB2011/001433 if StatsPerGame[g]._sumArray[t].numCoupons > totpart*userdefinedthreshold ALERT; endfor; 5 End; Scenario 6: Playing different combinations in a coupon/ticket of a lottery game or a betting game 0 [0066] The following is one example that how a particular abnormal pattern may be identified. In some embodiments, the instant invention may allow detecting a fraud in situations when bets are placed for more than one combination in a coupon (e.g. 40 % of all possible combinations in a coupon, all possible combinations in a coupon) (e.g. potentially money laundering activities). In some embodiments, the instant invention computes a total 5 number of combinations present in a coupon/ticket played by reading the played value of the coupon/ticket and dividing the played value by value of possible combinations (e.g. value of all combinations in a single column). In some embodiments, if the resulted number is above an administrator-defined threshold, an ALERT, indicative of a potentially abnormal, fraudulent behavior/condition, is generated with information about a potentially offending coupon/ticket. 20 [00671 In some embodiments, the instant invention may include, but not limiting to, the following pseudocode to identify a potential fraud case: Begin For t=1... Te do If StatsPerGame._sumArray[t].maxCombsInCouponPlayed > threshold 25 ALERT; 27 WO 2011/148260 PCT/IB2011/001433 endfor; End; [00681 Scenario 7: Playing different combinations of the same amount in a lottery game or a betting game The following is one example that how a particular abnormal pattern 5 may be identified. In some embodiments, the instant invention may allow detecting a fraud in situations when bets of the same amount are placed using more than one coupon/ticket. In some embodiments, the instant invention may allow detecting a fraud in situations when bets of the same amount are placed using more than one coupon/ticket sold by the same agent. In some embodiments, the instant invention may allow detecting a fraud in situations when bets of the 0 same amount are placed using more than one coupon/ticket sold by different agents. In some embodiments, the instant invention hashes a value of each coupon/ticket of a selected game into buckets of hash-values in a manner which is similar to examples detailed with respect to the Scenario 2. In some embodiments, buckets with hash values represent pairs of values (e.g. hash value, num-coupons-hashing-into-that-value). In some embodiments, if in the end of a scan of 5 the input data, the instant invention identifies a key-value pair with a value above an administrator-defined threshold, then an ALERT, indicative of a potentially abnormal, fraudulent behavior/condition, is generated having information about the potentially fraudulent coupon/ticket. 20 [00691 In some embodiments, the instant invention may include, but not limiting to, the following pseudocode to identify a potential fraud case in these scenarios: Begin totc=0; 28 WO 2011/148260 PCT/IB2011/001433 for each t=1... Te do tote += StatsPerGame._sumArray[t]._numCoupons; endfor; avgfreq = totc/NA; 5 for each a=1... NA do double freqs = 0; // init. to zero for each m=1 ... Mmax/Am do for each t=1... Te do freqs += StatsPerGame._array[t][a]._mdistro[m]; 0 endfor; if freqs > avgfreq*threshold ALERT; endfor; endfor; End; 5 [00701 In some embodiments, the instant invention may allow detecting a fraud in situations when bets of the same amount are placed using more than one coupon by using the hash-function to hash a particular coupon into a collection of buckets. For example, the hashing of the coupon may be performed as described for scenarios 2 and 3 above. In some embodiments, the instant invention may allow hashing each coupon read into a value using, for 20 example, an amount of money played and/or the agent id. In some embodiments, the buckets may hold pairs of the form. In some embodiments, an example of a pair of the form may include, but not limiting to, a hash-value and a num-coupons-hashing-into-that-value. In some embodiments, if in the end of the scan the instant invention identifies a key-value pair with a 29 WO 2011/148260 PCT/IB2011/001433 value that is too high based on initial settings for the scan, the instant invention may issue an ALERT. Scenario 8: Continuous playing a lottery game or a betting game with an amount that is a little-less than a limit. 5 [0071] The following is one example that how a particular abnormal pattern may be identified. In some embodiments, the instant invention may allow detecting a fraud in situations when there may be continuous playing with an amount that is a little-less than a limit. In some embodiments, similarly to hashing calculations performed with respect to Scenario 7, the instant invention hashes values of coupon/tickets into pairs of hash values for coupons that 0 have values that fall within a pre-determined value-range. In some embodiments, the present invention may be adapted to detect continuous playing below the limit from a single agent. In some embodiments, if a variance of the values in the distribution of amounts played for a given game in the interval [m-v,Mmax] (where m is essentially the coupon-value limit, and v is some user-defined (presumably small) integer) is significant and there exists an agent a, for whom the 5 number of coupons played immediately below the limit is above an average for all other agents, the present invention generates an ALERT, indicative of a potentially abnormal, fraudulent behavior/condition, having information about the potentially offending agent(s). [0072] In some embodiments, detecting a fraud based on continuous playing with an amount that is a little-less than a limit may include, but not limiting to, the following 20 pseudocode: Begin m = cell-index in _mdistro histogram that corresponds to amount little-less than the limit sum= 0; 30 WO 2011/148260 PCT/IB2011/001433 for t=1... Te do sum+= StatsPerGame._sumArray[t]._mdistro[m]; endfor; if sum > threshold ALERT; 5 End; [0073] In some embodiments, the instant invention may issue another alert independent of the user-defined threshold as follows. If the variance of the values in StatsPerGame._sumArray[t]._mdistro in the interval [m-v,Mmax], where v is some user-defined (presumably small) integer and is significant, and where there is an agent a, for whom the 0 StatsPerGame._array[t][a]._mdistro[m] array value is above a factor of the average of this value for all other agents, then the instant invention may issue an ALERT (continuous playing from a given agent). Scenario 9: Claiming unpaid coupons/tickets during the last days before expiration of a lottery game or a betting game. 5 [0074] The following is one example that how a particular abnormal pattern may be identified. In some embodiments, when investigating near-to-expire unclaimed winning prizes, the instant invention may allow to identify a fraud or alert about a potential fraud by checking, for example, at least the following values for all winning tickets: draw number and date, ticket pointer (indirect identifier). In some embodiments, when, in accordance with the 20 instant invention, the ticket is near the expiration date, an alert is produced. [00751 In some embodiments, the instant invention includes a method to detect fraud performed in a computing system that includes receiving by the computer system from a plurality of sources information regarding at least one played coupon for at least one betting 31 WO 2011/148260 PCT/IB2011/001433 game, wherein the received information corresponds to at least one period of time during which the at least one betting game is played; populating by the computer system at least one two-dimensional array for each played betting game from the received information, wherein the at least one two-dimensional array holds aggregated game statistics regarding the at least 5 one played coupon sold by at least one agent during the at least one period of time, and wherein the aggregate statistics is user-defined and comprises at least one of: 1) a frequency of at least one played amount, 2) a number of cancelled coupons, 3) a maximum coupon value played, and 4) a maximum number of combinations per the at least one coupon; storing by the computer system the at least one two-dimensional array in at least one data 0 structure; scanning by the computer system the at least one data structure to identify at least one abnormal pattern; and e) generating by the computer system an alert when the at least one abnormal pattern is identified. [0076] In some embodiments, an abnormal pattern is when a ratio of a coupon gross amount for a random player to a total gross amount for all players in the at least one game 5 exceeds a predetermined ratio amount. [00771 In some embodiments, the instant invention further includes identifying by the computer system a first suspected coupon and a second suspected coupon, wherein a suspected coupon is the at least one played coupon whose played amount exceeds a predetermined played threshold amount; hashing by the computer system the aggregate 20 statistics regarding the first suspected coupon to generate a first hash value; hashing by the computer system the aggregate statistics regarding the second suspected coupon to generate a second hash value; aggregating by the computer system the first and the second hash values when a length of the first hash value differs from a length of the second hash value by less 32 WO 2011/148260 PCT/IB2011/001433 than a predefined difference number; and scanning, when a length of the first hash value differs from a length of the second hash value by less than a predefined difference number, by the computer system the aggregate statistics regarding the first and the second suspected coupons, wherein the at least one abnormal pattern is a presence of similar betting 5 combinations from the same at least one agent. Examples of Data Structures For Internet-Gaming Data [00781 In some embodiments, the data structures maintained for Internet Gaming may be very similar and completely analogous to the data cube described with respect to Non 0 Internet-Gaming, as depicted in FIG. 1. [00791 In some embodiments, time may be coarse-grained in order to reduce the amount of data stored in main memory. In some embodiments, AJt denotes the minimum length of time (time-quantum) within which statistics about a player P may be stored. In some embodiments, as a default value, AJt can be set to 1 hour or 1 day whichever is more appropriate based on level 5 of detail required. In some embodiments, for example, for every player P, a 2-dimensional array '' '''' T' ''' . may be used, where Ng denotes the different play types, and T (n -- T,,,,) / At with Tsar, and Tend identify the time intervals for which statistics is collected. In some embodiments, this above array may hold the following aggregate statistics for a particular play type g within time interval [t, t+zlt): 20 [0080] 1. The distribution of amounts for cash in - cash out. In some embodiments, this characteristic implies a quantization of the amount-played variable, which may also be user defined. In some embodiments, Am denote the money-quantum that is used for the particular transaction (e.g. C1O). In some embodiments, Am can be set equal to 1. In some embodiments, 33 WO 2011/148260 PCT/IB2011/001433 for each cell of the 2-D array SP (t, g), a data member may be maintained. In some embodiments, _mDistro may be double _mDistro[Mmax/lm], where Mmax-1 may be the largest known amount of money used for cash in - cash out. In some embodiments, the last element in the array may hold all larger bets that require official approval. In some embodiments, each cell 5 may hold the total number of transactions whose value, for example, was within the specified monetary amount. [00811 In some embodiments, the instant invention includes a method to detect fraud performed in a computing system that includes receiving by the computer system from at least one source a plurality of transactions regarding at least one betting game, wherein the 0 received plurality of transactions corresponds to at least one period of time during which the at least one betting game has been played; populating by the computer system at least one two-dimensional array for each player with information from the received plurality of transactions, i) wherein the at least one two-dimensional array holds aggregated game statistics regarding each player's participation in a particular betting game during the at least 5 one period of time, and ii) wherein the aggregate statistics is user-defined and comprises a distribution of cash in - cash out amounts per each play type played by the player, wherein the distribution is based on: 1) an amount of each transaction; 2) a largest amount from all cash in - cash out amounts; 3) a total number of transactions whose value was within a predetermined range; and 4) at least one transaction whose value was required official 20 approval; storing by the computer system the at least one two-dimensional array in at least one data structure; scanning by the computer system the at least one data structure to identify at least one abnormal pattern; and generating by the computer system an alert when the at least one abnormal pattern is identified. 34 WO 2011/148260 PCT/IB2011/001433 [00821 In some embodiments, the data structures can be represented by the following pseudo-code: class S { final static double _Dt; 5 final static double _Dm; final static double _Mmax; double _mdistro[_Mmax/_Dm]; } ; class StatsPerPlayer { 0 final static double _totTime; final static double _nunPlayTypes; S _array[_totTime/S._Dt][_ numPlayTypes]; } ; Examples of Identifying and Preventing Fraud in Internet-based Lottery and Betting 5 Games [0083] Below are embodiments of the present invention illustrating the claim requirement of "at least one abnormal pattern is identified." Scenario 1 20 Financial Transactions Subcategory 1: Number of times and frequency / amount for cash in - cash out . [0084] The following is one example that how a particular abnormal pattern may be identified. In some embodiments, the instant invention may allow to correlate a number of 25 times and/or a frequency and/or an amount of cash in - cash out with a play type and/or 35 WO 2011/148260 PCT/IB2011/001433 winnings. In some embodiments, the instant invention may allow on a player-by-player basis and/or play type basis to access the corresponding cell in [t, t+At] and increase the value of _mDistro[Mmax/Am]. [00851 In some embodiments, the data may be visualized using an appropriate 5 histogram to highlight amounts of cash in - cash out for a particular user and/or a specific duration. In some embodiments, parameters such as Starting and/or Ending date provide time granularity on which all events may be bundled together. In some embodiments, a user may set a minimum amount. [0086] In some embodiments, the instant invention may allow to generate cumulative 0 histograms of the above mentioned quantities that show the function x(t) as well as the function J x(z)dz Financial Transactions Subcategory 2: Use of bank accounts and credit cards [00871 The following is one example that how a particular abnormal pattern may be 5 identified. In some embodiments, the instant invention may allow to identify fraud regarding a use of bank accounts and credit cards. In some embodiments, the fraud may be identified based on an amount per time and a type and/or frequency of use and change. In some embodiments, the instant invention may allow to generate a histogram to visualize the collected data. In some embodiments, once the Starting and/or Ending date, and the time granularity are set, information 20 may be displayed regarding the amount and the account used (bank or credit). In some embodiments, visualizations may include, but not limiting to, visualizations of time-series for: cash-in, cash-out, play, winning amounts, cross-correlation, auto-correlation, and/or dependency between any pair of these time-series, and cumulative time-series (e.g. total cash-out since 36 WO 2011/148260 PCT/IB2011/001433 beginning of time). In some embodiments, the instant invention may allow to generate an alert when impossible patterns are identified. For example, one impossible pattern may be a pattern when a total-cash-out exceeds a total-cash-in plus winnings at any point in time. Scenario 2: Abuse of promotions - gifts 5 [0088] The following is one example that how a particular abnormal pattern may be identified. In some embodiments, the instant invention may allow to identify fraud regarding promotions. For example, in some embodiments, for every player, the instant invention may use data about a frequency of participation in promotions and a value of gift certificates to identifying possible internal fraud. In some embodiments, the instant invention may utilize 0 approaches discusses with respect to the first scenario for detecting Internet based fraud by considering a gift certificate to be similar to a play type. Scenario 3: Registration Subcategory 1: Frequency of changes of personal information [0089] The following is one example that how a particular abnormal pattern may be 5 identified. In some embodiments, the instant invention may allow to identify fraud based on a frequency of changes of personal information: e-mail, resident details, contact details, etc by, for example, keeping a counter for each category that is updated every time a change occurs. Subcategory 2: Use of Similar profiles. [0090] The following is one example that how a particular abnormal pattern may be 20 identified. In some embodiments, the instant invention may allow to identify fraud based on use of similar profiles by utilizing an algorithm based on Dynamic Programming. In some embodiments, the algorithm may determine the "distance" between two strings as a measure of a minimum number of "character edit operations" that is needed to turn one sequence into the 37 WO 2011/148260 PCT/IB2011/001433 other. In some embodiments, strings may be two different profiles (for example, a profile may contain more than simply the name of the user). In some embodiments, "similarity" between strings may have levels: Identical -- when the edit distance is zero, 5 Nearly Identical -- when the edit distance, for example, is less than 3 operations, Similar -- when the edit distance is between 4 and 7, and etc. [0091] In some embodiments, based on given two strings (e.g. profiles) s and t having a length m and n respectively, the instant invention may include, but not limiting to, the following set of operations: 0 - Copy (i.e. use as is) character from s over to t (cost 0) . Delete a character in s (cost 1) . Insert a character in t (cost 1) - Substitute one character for another (cost 1) [0092] In some embodiments, the instant invention may additionally use a cost of a 5 Partial Solution, i.e. let C[i, j] = cost, for correlating the first i characters of s with the firstj characters of t. In some embodiments, C[i, j] may be defined in terms of previous values by maintaining a two-dimensional mxn table where the instant invention may record the values of C[k, 1] for all k < i and 1> j, as follows: C[i -1, j - 1] if s[i] #t[j], i.e. copy last char SC[i-1,j -1]+1 if s[i] wt[j], i.e. substitute C[i-1, j]+1 i.e. delete s[i] C[i, j -1]+1 i.e. insert t[j] 20 [00931 In some embodiments, the instant invention may initialize the table using C[O, j] =j and C[i, 0] = i for all i:m and j:n. In some embodiments, the instant invention may use 2 38 WO 2011/148260 PCT/IB2011/001433 for-loops to fill the table entries according to the above equation. In some embodiments, the Edit Distance is simply the entry C[m, n] of the matrix. In some embodiments, the complexity may be given by a time ( O(m.n)) that may be necessary to fill the matrix. Scenario 4: Profile change monitoring 5 [0094] The following is one example that how a particular abnormal pattern may be identified. In some embodiments, the instant invention may allow to identify fraud based on monitoring changes in user profiles. In some embodiments, the instant invention may keep a counter for each category that is updated every time a change occurs. In some embodiments, the instant invention may provide the corresponding alert when abnormal profile changes are 0 identified. . In some embodiments, the instant invention may monitor changes in user profiles based categories that include, but not limiting to, the following at least one of: a) password change frequency b) credit card numbers or pointers to credit card numbers c) account block or exclude, and/or 5 d) play cancellation and amount of cancellation [00951 In one embodiment, the instant invention may include a method to detect fraud performed in a computing system that includes a) receiving by the computer system from at least one source information regarding a plurality of played coupons for at least one game, wherein the plurality of played coupons comprises at least one first coupon and at least one 20 second coupon; b) populating by the computer system at least one two-dimensional array for each played game from the received information, i) wherein the at least one two-dimensional array holds aggregated game statistics, and ii) wherein the aggregate statistics is user-defined and includes: 1) an identity of the at least one source, 2) the received information for the 39 WO 2011/148260 PCT/IB2011/001433 plurality of played coupons, and 3) at least one of: a) a frequency of at least one played amount, b) a number of cancelled coupons, c) a maximum coupon value played, and d) a maximum number of combinations per the at least one first coupon and the at least one second coupon; c) storing by the computer system the at least one two-dimensional array with 5 in at least one data structure; d) scanning, using the received information for the at least one first coupon, by the computer system the at least one data structure to identify at least one abnormal pattern; e) generating, when the at least one abnormal pattern is identified, by the computer system an alert prior to a payout on the at least one first coupon; f) scanning, using the received information for the at least one second coupon, by the computer system the at 0 least one data structure to identify at least one abnormal pattern; and g) generating, when the at least one abnormal pattern is identified, by the computer system an alert prior to a payout on the at least one second coupon. [0096] In one embodiment of the instant invention, the at least one abnormal pattern is when a ratio of a coupon gross amount for a random player to a total gross amount for all 5 players in the at least one game exceeds a predetermined ratio amount. [00971 In one embodiment of the instant invention, the step of scanning by the computer system further comprises: identifying by the computer system a first suspected coupon and a second suspected coupon, wherein a suspected coupon is the at least one played coupon whose played amount exceeds a predetermined played threshold amount; hashing by 20 the computer system the aggregate statistics regarding the first suspected coupon to generate a first hash value; hashing by the computer system the aggregate statistics regarding the second suspected coupon to generate a second hash value; aggregating by the computer system the first and the second hash values when a length of the first hash value differs from 40 WO 2011/148260 PCT/IB2011/001433 a length of the second hash value by less than a predefined difference number; and scanning, when a length of the first hash value differs from a length of the second hash value by less than a predefined difference number, by the computer system the aggregate statistics regarding the first and the second suspected coupons, wherein the at least one abnormal 5 pattern is a presence of similar betting combinations from the same at least one agent. [00981 In one embodiment of the instant invention, the at least one abnormal pattern is a presence of similar betting combinations from at least two agents. In one embodiment of the instant invention, the at least one abnormal pattern is when a frequency of cancellations for the at least one agent exceeds a predetermined cancellation frequency threshold number. 0 [0099] In one embodiment of the instant invention, the at least one abnormal pattern is when a percentage of participation in the at least one game during a sampled time period to a total participation in the at least one game exceeds a predetermined participation percentage. In one embodiment of the instant invention, the at least one abnormal pattern is when the at least one played coupon includes bets for all played combinations in the at least 5 one played coupon. [00100] In one embodiment of the instant invention, the at least one abnormal pattern is when a plurality of the played coupons sold by the same agent include bets having the same amount placed for all played combinations. In one embodiment of the instant invention, the at least one abnormal pattern is when a plurality of the played coupons sold by 20 a plurality of the agents include bets having the same amount placed for all played combinations. [00101] In one embodiment of the instant invention, the at least one abnormal pattern is when a plurality of the played coupons sold by the same agent include bets having the 41 WO 2011/148260 PCT/IB2011/001433 same amount placed for all played combinations. In one embodiment of the instant invention, the at least one abnormal pattern is when a plurality of the played coupons sold by a plurality of the agents include bets having the same amount placed for all played combinations. 5 [00102] In one embodiment of the instant invention, the at least one abnormal pattern is when a plurality of the played coupons sold by the same agent include bets having amounts that are less than a limit amount by less than a predetermined deviation amount. In one embodiment of the instant invention, the at least one abnormal pattern is when the at least one played coupon is a winning coupon and wherein the winning coupon is received for 0 payment during a predetermined period prior to an expiration date of the wining coupon. [00103] In one embodiment, the instant invention may include a method to detect fraud performed in a computing system, that includes: a) receiving by the computer system from at least one source information about a plurality of transactions regarding at least one game, wherein the plurality of transactions comprises at least one first transaction and at least one 5 second transaction; b) populating by the computer system at least one two-dimensional array for each player with information from the received plurality of transactions, i) wherein the at least one two-dimensional array holds aggregated game statistics regarding each player's participation in a particular game during at least one period of time, and ii) wherein the aggregate statistics is user-defined and comprises a distribution of cash in - cash out amounts 20 per each play type played by the player, wherein the distribution is based on: 1) an amount of each transaction; 2) a largest amount from all cash in - cash out amounts; 3) a total number of transactions whose value was within a predetermined range; and 4) at least one transaction whose value was required official approval; c) storing by the computer system the 42 WO 2011/148260 PCT/IB2011/001433 at least one two-dimensional array in at least one data structure; d) scanning, using the received information for the at least one first transaction, by the computer system the at least one data structure to identify at least one abnormal pattern; e) generating, when the at least one abnormal pattern is identified, by the computer system an alert prior to a payout on the at 5 least one first transaction; f) scanning, using the received information for the at least one second transaction, by the computer system the at least one data structure to identify at least one abnormal pattern; and e) generating, when the at least one abnormal pattern is identified, by the computer system an alert prior to a payout on the at least one second transaction. [00104] In one embodiment of the instant invention, the at least one abnormal pattern 0 is based on a number of times and on a frequency with which a cash in-cash out amount correlated with a particular play type and winnings. In one embodiment of the instant invention, the at least one abnormal pattern relates to the player's usage of at least one bank account and at least one credit card account and is based on at least one of: i) the amount of each transactions; ii) a type of the usage; iii) a frequency of the usage; and iv) a frequency of 5 change the at least one bank account or at least one credit card account. [001051 In one embodiment of the instant invention, the at least one abnormal pattern relates to a frequency of changing player's profile and is based on a similarity between an old and a new profiles. In one embodiment of the instant invention, the at least one abnormal pattern is when a number of changes to the player's profile exceeds a predetermined change 20 number for at least one the following categories of the personal information: a) password change frequency, b) credit card numbers or pointers to credit card numbers, c) account block or exclude, and d) play cancellation and amount of cancellation 43 WO 2011/148260 PCT/IB2011/001433 [001061 In one embodiment, the instant invention may include a programmed computer for detecting fraud than includes: memory having at least one region for storing computer executable program code; and a processor for executing the program code stored in the memory, wherein the program code includes: a) code to receive by the computer system 5 from at least one source information regarding a plurality of played coupons for at least one game, wherein the plurality of played coupons comprises at least one first coupon and at least one second coupon; b) code to populate by the computer system at least one two-dimensional array for each played game from the received information, i) wherein the at least one two dimensional array holds aggregated game statistics, and ii) wherein the aggregate statistics is 0 user-defined and includes: 1) an identity of the at least one source, 2) the received information for the plurality of played coupons, and 3) at least one of: a) a frequency of at least one played amount, b) a number of cancelled coupons, c) a maximum coupon value played, and d) a maximum number of combinations per the at least one first coupon and the at least one second coupon; c) code to store by the computer system the at least one two 5 dimensional array with in at least one data structure; d) code to scan, using the received information for the at least one first coupon, by the computer system the at least one data structure to identify at least one abnormal pattern; e) code to generate, when the at least one abnormal pattern is identified, by the computer system an alert prior to a payout on the at least one first coupon; f) code to scan, using the received information for the at least one 20 second coupon, by the computer system the at least one data structure to identify at least one abnormal pattern; and g) code to generate, when the at least one abnormal pattern is identified, by the computer system an alert prior to a payout on the at least one second coupon.. 44 WO 2011/148260 PCT/IB2011/001433 [001071 In one embodiment, the instant invention may include a programmed computer for detecting fraud that includes a memory having at least one region for storing computer executable program code; and a processor for executing the program code stored in the memory, wherein the program code includes: a) code to receive by the computer system 5 from at least one source information about a plurality of transactions regarding at least one game, wherein the plurality of transactions comprises at least one first transaction and at least one second transaction; b) code to populate by the computer system at least one two dimensional array for each player with information from the received plurality of transactions, i) wherein the at least one two-dimensional array holds aggregated game 0 statistics regarding each player's participation in a particular game during at least one period of time, and ii) wherein the aggregate statistics is user-defined and comprises a distribution of cash in - cash out amounts per each play type played by the player, wherein the distribution is based on: 1) an amount of each transaction; 2) a largest amount from all cash in - cash out amounts; 3) a total number of transactions whose value was within a predetermined range; 5 and 4) at least one transaction whose value was required official approval; c) code to store by the computer system the at least one two-dimensional array in at least one data structure; d) code to scan, using the received information for the at least one first transaction, by the computer system the at least one data structure to identify at least one abnormal pattern; e) code to generate, when the at least one abnormal pattern is identified, by the computer 20 system an alert prior to a payout on the at least one first transaction; f) code to scan, using the received information for the at least one second transaction, by the computer system the at least one data structure to identify at least one abnormal pattern; and e) code to generate, 45 WO 2011/148260 PCT/IB2011/001433 when the at least one abnormal pattern is identified, by the computer system an alert prior to a payout on the at least one second transaction. [001081 Of note, the embodiments described herein may, of course, be implemented using any appropriate computer system hardware and/or computer system software. In this 5 regard, those of ordinary skill in the art are well versed in the type of computer hardware that may be used (e.g., a mainframe, a mini-computer, a personal computer ("PC"), a network (e.g., an intranet and/or the internet)), the type of computer programming techniques that may be used (e.g., object oriented programming), and the type of computer programming languages that may be used (e.g., C++, Basic, AJAX, Javascript). The aforementioned 0 examples are, of course, illustrative and not restrictive. [00109] While a number of embodiments of the present invention have been described, it is understood that these embodiments are illustrative only, and not restrictive, and that many modifications and/or alternative embodiments may become apparent to those of ordinary skill in the art. For example, any steps may be performed in any desired order (and 5 any desired steps may be added and/or any desired steps may be deleted). Therefore, it will be understood that the appended claims are intended to cover all such modifications and embodiments that come within the spirit and scope of the present invention. 20 25 46

Claims (20)

1. A method to detect fraud performed in a computing system, the method comprising: a) receiving by the computer system from at least one source information regarding a plurality of played coupons for at least one game, wherein the plurality of played coupons comprises at least one first coupon and at least one second coupon; b) populating by the computer system at least one two-dimensional array for each played game from the received information, i) wherein the at least one two-dimensional array holds aggregated game statistics, and ii) wherein the aggregate statistics is user-defined and comprises: 1) an identity of the at least one source, 2) the received information for the plurality of played coupons, and 3) at least one of: a) a frequency of at least one played amount., b) a number of cancelled coupons, c) a maximum coupon value played, and d) a maximum number of combinations per the at least one first coupon and the at least one second coupon; c) storing by the computer system the at least one two-dimensional array with in at least one data structure; d) scanning, using the received information for the at least one first coupon, by the computer system the at least one data structure to identify at least one abnormal pattern; e) generating, when the at least one abnormal pattern is identified, by the computer system an alert prior to a payout on the at least one first coupon; f) scanning, using the received information for the at least one second coupon, by the computer system the at least one data structure to identify at least one abnormal pattern; and g) generating, when the at least one abnormal pattern is identified, by the computer system an alert prior to a payout on the at least one second coupon..
2. The method of claim 1, wherein the at least one abnormal pattern is when a ratio of a coupon gross amount for a random player to a total gross amount for all players in the at least one game exceeds a predetermined ratio amount. 47
3. The method of claim 1, wherein the step of scanning by the computer system further comprises: identifying by the computer system a first suspected coupon and a second suspected coupon, wherein a suspected coupon is the at least one played coupon whose played amount exceeds a predetermined played threshold amount; hashing by the computer system the aggregate statistics regarding the first suspected coupon to generate a first hash value; hashing by the computer system the aggregate statistics regarding the second suspected coupon to generate a second hash value; aggregating by the computer system the first and the second hash values when a length of the first hash value differs from a length of the second hash value by less than a predefined difference number; and scanning, when a length of the first hash value differs from a length of the second hash value by less than a predefined difference number, by the computer system the aggregate statistics regarding the first and the second suspected coupons, wherein the at least one abnormal pattern is a presence of similar betting combinations from the same at least one agent.
4. The method of claim 3, wherein the at least one abnormal pattern is a presence of similar betting combinations from at least two agents.
The method of claim 1, wherein the at least one abnormal pattern is when a frequency of cancellations for the at least one agent exceeds a predetermined cancellation frequency threshold number.
6. The method of claim 1, wherein the at least one abnormal pattern is when a percentage of participation in the at least one game during a sampled time period to a total participation in the at least one game exceeds a predetermined participation percentage.
7. The method of claim I , wherein the at least one abnormal pattern is when the at least one played coupon includes bets for all played combinations in the at least one played coupon. 48
8. The method of claim 1, wherein the at least one abnormal pattern is when a plurality of the played coupons sold by the same agent include bets having the same amount placed for all played combinations.
9. The method of claim 1, wherein the at least one abnormal pattern is when a plurality of the played coupons sold by a plurality of the agents include bets having the same amount placed for all played combinations.
10. The method of claim 3, wherein the at least one abnormal pattern is when a plurality of the played coupons sold by the same agent include bets having the same amount placed for all played combinations.
11. The method of claim 3, wherein the at least one abnormal pattern is when a plurality of the played coupons sold by a plurality of the agents include bets having the same amount placed for all played combinations.
12. The method of claim 1, wherein the at least one abnormal pattern is when a plurality of the played coupons sold by the same agent include bets having amounts that are less than a limit amount by less than a predetermined deviation amount.
13. The method of claim 1, wherein the at least one abnormal pattern is when the at least one played coupon is a winning coupon and wherein the winning coupon is received for payment during a predetermined period prior to an expiration date of the wining coupon.
14. A method to detect fraud performed in a computing system, the method comprising: a) receiving by the computer system from at least one source information about a plurality of transactions regarding at least one game, wherein the plurality of transactions comprises at least one first transaction and at least one second transaction; b) populating by the computer system at least one two-dimensional array for each player with information from the received plurality of transactions, i) wherein the at least one two-dimensional array holds aggregated game statistics regarding each player's participation in a particular game during at least one period of time, and 49 ii) wherein the aggregate statistics is user-defined and comprises a distribution of cash in cash out amounts per each play type played by the player, wherein the distribution is based on: 1) an amount of each transaction; 2) a largest amount from all cash in - cash out amounts; 3) a total number of transactions whose value was within a predetermined range; and 4) at least one transaction whose value was required official approval; c) storing by the computer system the at least one two-dimensional array in at least one data structure: d) scanning, using the received information for the at least one first transaction, by the computer system the at least one data structure to identify at least one abnormal pattern; e) generating, when the at least one abnormal pattern is identified, by the computer system an alert prior to a payout on the at least one first transaction; f) scanning, using the received information for the at least one second transaction, by the computer system the at least one data structure to identify at least one abnormal pattern; and e) generating, when the at least one abnormal pattern is identified, by the computer system an alert prior to a payout on the at least one second transaction.
15. The method of claim 14, wherein the at least one abnormal pattern is based on a number of times and on a frequency with which a cash in-cash out amount correlated with a particular play type and winnings.
16. The method of claim 14, wherein the at least one abnormal pattern relates to the player's usage of at least one bank account and at least one credit card account and is based on at least one of: i) the amount of each transactions: ii) a type of the usage; iii) a frequency of the usage; and iv) a frequency of change the at least one bank account or at least one credit card account. 50
17. The method of claim 14, wherein the at least one abnormal pattern relates to a frequency of changing player's profile and is based on a similarity between an old and a new profiles.
18. The method of claim 17, wherein the at least one abnormal pattern is when a number of changes to the player's profile exceeds a predetermined change number for at least one the following categories of the personal information: a) password change frequency, b) credit card numbers or pointers to credit card numbers, c) account block or exclude, and d) play cancellation and amount of cancellation
19. A programmed computer for detecting fraud, the programmed computer comprising: memory having at least one region for storing computer executable program code; and a processor for executing the program code stored in the memory, wherein the program code comprises: a) code to receive by the computer system from at least one source information regarding a plurality of played coupons for at least one game, wherein the plurality of played coupons comprises at least one first coupon and at least one second coupon; b) code to populate by the computer system at least one two-dimensional array for each played game from the received information, i) wherein the at least one two-dimensional array holds aggregated game statistics, and ii) wherein the aggregate statistics is user-defined and comprises: 1) an identity of the at least one source, 2) the received information for the plurality of played coupons, and 3) at least one of: a) a frequency of at least one played amount, b) a number of cancelled coupons, c) a maximum coupon value played, and d) a maximum number of combinations per the at least one first coupon and the at least one second coupon: 51 c) code to store by the computer system the at least one two-dimensional array with in at least one data structure; d) code to scan, using the received information for the at least one first coupon, by the computer system the at least one data structure to identify at least one abnormal pattern; e) code to generate, when the at least one abnormal pattern is identified, by the computer system an alert prior to a payout on the at least one first coupon; f) code to scan, using the received information for the at least one second coupon, by the computer system the at least one data structure to identify at least one abnormal pattern: and g) code to generate, when the at least one abnormal pattern is identified, by the computer system an alert prior to a payout on the at least one second coupon..
20. A programmed computer for detecting fraud, the programmed computer comprising: memory having at least one region for storing computer executable program code; and a processor for executing the program code stored in the memory, wherein the program code comprises: a) code to receive by the computer system from at least one source information about a plurality of transactions regarding at least one game, wherein the plurality of transactions comprises at least one first transaction and at least one second transaction; b) code to populate by the computer system at least one two-dimensional array for each player with information from the received plurality of transactions, i) wherein the at least one two-dimensional array holds aggregated game statistics regarding each player's participation in a particular game during at least one period of time, and ii) wherein the aggregate statistics is user-defined and comprises a distribution of cash in cash out amounts per each play type played by the player, wherein the distribution is based on: 1 an amount of each transaction; 2) a largest amount from all cash in - cash out amounts; 3) a total number of transactions whose value was within a predetermined range; and 4) at least one transaction whose value was required official approval; 52 c) code to store by the computer system the at least one two-dimensional array in at least one data structure; d) code to scan, using the received information for the at least one first transaction, by the computer system the at least one data structure to identify at least one abnormal pattern; e) code to generate, when the at least one abnormal pattern is identified, by the computer system an alert prior to a payout on the at least one first transaction: f) code to scan, using the received information for the at least one second transaction, by the computer system the at least one data structure to identify at least one abnormal pattern; and e) code to generate, when the at least one abnormal pattern is identified, by the computer system an alert prior to a payout on the at least one second transaction. 53
AU2015203184A 2010-05-25 2015-06-12 Methods and a system for detecting fraud in betting and lottery games Active AU2015203184B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2015203184A AU2015203184B2 (en) 2010-05-25 2015-06-12 Methods and a system for detecting fraud in betting and lottery games

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US12/787,024 2010-05-25
AU2011259831A AU2011259831A1 (en) 2010-05-25 2011-05-23 Methods and a system for detecting fraud in betting and lottery games
AU2015203184A AU2015203184B2 (en) 2010-05-25 2015-06-12 Methods and a system for detecting fraud in betting and lottery games

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
AU2011259831A Division AU2011259831A1 (en) 2010-05-25 2011-05-23 Methods and a system for detecting fraud in betting and lottery games

Publications (2)

Publication Number Publication Date
AU2015203184A1 true AU2015203184A1 (en) 2015-07-09
AU2015203184B2 AU2015203184B2 (en) 2016-06-09

Family

ID=53626405

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2015203184A Active AU2015203184B2 (en) 2010-05-25 2015-06-12 Methods and a system for detecting fraud in betting and lottery games

Country Status (1)

Country Link
AU (1) AU2015203184B2 (en)

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7699694B2 (en) * 1995-10-17 2010-04-20 Shuffle Master, Inc. System including card game dispensing shoe and method
US6341778B1 (en) * 1999-11-29 2002-01-29 John S. Lee Method for playing pointspread blackjack
US8597116B2 (en) * 2002-03-12 2013-12-03 Igt Virtual player tracking and related services
US20060090073A1 (en) * 2004-04-27 2006-04-27 Shira Steinberg System and method of using human friendly representations of mathematical values and activity analysis to confirm authenticity
US7328838B2 (en) * 2004-09-09 2008-02-12 Igt Counterfeit cashless instrument detection methods and systems
US8668568B2 (en) * 2005-04-27 2014-03-11 Ticketmaster, L.L.C. Methods and systems for determining user location
US8088001B2 (en) * 2008-08-18 2012-01-03 Igt Casino gaming exchange market

Also Published As

Publication number Publication date
AU2015203184B2 (en) 2016-06-09

Similar Documents

Publication Publication Date Title
CA2800146C (en) Methods and a system for detecting fraud in betting and lottery games
US10135788B1 (en) Using hypergraphs to determine suspicious user activities
US10009358B1 (en) Graph based framework for detecting malicious or compromised accounts
CN107665432A (en) The system and method that suspicious user behavior is identified in the interacting of user and various bank services
Lopez-Rojas et al. Analysis of fraud controls using the PaySim financial simulator
Tsuchiya et al. Identifying risky vendors in cryptocurrency p2p marketplaces
CN111712817B (en) Spatial and temporal convolutional networks for system call-based process monitoring.
JP2018034008A (en) Game information analysis system, analysis server, and game information analysis method
US20250103711A1 (en) System and method for improving cybersecurity for telecommunication devices
CN109919767B (en) Transaction risk management method, device and equipment
AU2015203184A1 (en) Methods and a system for detecting fraud in betting and lottery games
CN117459262A (en) Financial business logic vulnerability alarm monitoring method, system and storage medium based on behavior analysis
US20220156872A1 (en) Network computer system and methods for use in operating casino patron loyalty programs
HK1185437B (en) Methods and a system for detecting fraud in betting and lottery games
JP6329927B2 (en) GAME INFORMATION ANALYSIS SYSTEM, ANALYSIS SERVER, AND GAME INFORMATION ANALYSIS METHOD
Stachyra The characteristics of fraudulent financial transactions in the context of a graph model
Han et al. Behavior Analysis: A Survey
JP6193936B2 (en) GAME INFORMATION ANALYSIS SYSTEM, ANALYSIS SERVER, AND GAME INFORMATION ANALYSIS METHOD
JP6300767B2 (en) GAME INFORMATION ANALYSIS SYSTEM, ANALYSIS SERVER, AND GAME INFORMATION ANALYSIS METHOD
CN121169474A (en) Risk control method, apparatus, device, medium and program product for marketing campaign
JP6467318B2 (en) GAME INFORMATION ANALYSIS SYSTEM, ANALYSIS SERVER, AND GAME INFORMATION ANALYSIS METHOD
JP6193935B2 (en) GAME INFORMATION ANALYSIS SYSTEM, ANALYSIS SERVER, AND GAME INFORMATION ANALYSIS METHOD
JP6074466B1 (en) GAME INFORMATION ANALYSIS SYSTEM, ANALYSIS SERVER, AND GAME INFORMATION ANALYSIS METHOD
JP2017038727A (en) Game information analysis system, analysis server, and game information analysis method
JP2017038724A (en) Game information analysis system, analysis server, and game information analysis method

Legal Events

Date Code Title Description
FGA Letters patent sealed or granted (standard patent)