WO2008141168A1 - Systèmes et procédés pour une détection de fraude via une analyse de liaison interactive - Google Patents
Systèmes et procédés pour une détection de fraude via une analyse de liaison interactive Download PDFInfo
- Publication number
- WO2008141168A1 WO2008141168A1 PCT/US2008/063229 US2008063229W WO2008141168A1 WO 2008141168 A1 WO2008141168 A1 WO 2008141168A1 US 2008063229 W US2008063229 W US 2008063229W WO 2008141168 A1 WO2008141168 A1 WO 2008141168A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- database
- rules
- fraudulent
- individuals
- generated
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
Definitions
- FIGURE 14 shows one embodiment 1400 of the use of a fraud rule to block, in real-time, fraudulent activity with respect to an imposter attempting to obtain credit history data from a database of credit information.
- Process 1401 controls the logon access to a credit database. This access can be, for example, so that the individual can access his/her credit history.
- a process such as process 1402 queries the accessing user for some combination of attributes uniquely pertaining to that user's data file. Some of thee possible attributes are shown in process 1402, but any number and any combination can be required, and the combination can change depending upon security levels, or depending upon previous query answers.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
L'invention concerne une détection de fraude qui est facilitée en développant des règles d'adhésion à un groupe de comptes et en les convertissant en des requêtes de base de données via une examen de groupes en rapport/extraits de la base de données client. Les règles d'adhésion à un compte sont basées sur certains modèles de données observés associés à une activité potentiellement frauduleuse. Selon un mode de réalisation, des groupes de comptes sont créés autour des modèles de comportements présentés par des imposteurs. Le système identifie ensuite ces groupes présentant une forte probabilité de fraude et établit des règles d'adhésion à un groupe pour identifier des comptes consécutifs qui correspondent à ces règles. Les règles sont conçues pour définir les paramètres des groupes identifiés. Lorsque les règles sont déployées dans un système de blocage de transaction, lorsqu'une règle appartenant à un agrégat frauduleux identifié est déclenchée, le système de blocage de transaction bloque la transaction pour des nouveaux utilisateurs qui entrent sur le site Web.
Applications Claiming Priority (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US91751807P | 2007-05-11 | 2007-05-11 | |
| US60/917,518 | 2007-05-11 | ||
| US11744108A | 2008-05-08 | 2008-05-08 | |
| US12/117,441 | 2008-05-08 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2008141168A1 true WO2008141168A1 (fr) | 2008-11-20 |
Family
ID=40002609
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/US2008/063229 Ceased WO2008141168A1 (fr) | 2007-05-11 | 2008-05-09 | Systèmes et procédés pour une détection de fraude via une analyse de liaison interactive |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2008141168A1 (fr) |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2013062713A1 (fr) * | 2011-10-28 | 2013-05-02 | Visa International Service Association | Système et procédé permettant un chaînage d'identité |
| US9311351B2 (en) | 2013-03-11 | 2016-04-12 | Sas Institute Inc. | Techniques to block records for matching |
| US11354583B2 (en) | 2020-10-15 | 2022-06-07 | Sas Institute Inc. | Automatically generating rules for event detection systems |
| US11954218B2 (en) | 2020-02-10 | 2024-04-09 | Visa International Service Association | Real-time access rules using aggregation of periodic historical outcomes |
Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5790645A (en) * | 1996-08-01 | 1998-08-04 | Nynex Science & Technology, Inc. | Automatic design of fraud detection systems |
| US6157864A (en) * | 1998-05-08 | 2000-12-05 | Rockwell Technologies, Llc | System, method and article of manufacture for displaying an animated, realtime updated control sequence chart |
| US6163604A (en) * | 1998-04-03 | 2000-12-19 | Lucent Technologies | Automated fraud management in transaction-based networks |
| US6597775B2 (en) * | 2000-09-29 | 2003-07-22 | Fair Isaac Corporation | Self-learning real-time prioritization of telecommunication fraud control actions |
| US6714918B2 (en) * | 2000-03-24 | 2004-03-30 | Access Business Group International Llc | System and method for detecting fraudulent transactions |
| US20060149674A1 (en) * | 2004-12-30 | 2006-07-06 | Mike Cook | System and method for identity-based fraud detection for transactions using a plurality of historical identity records |
| US20070039049A1 (en) * | 2005-08-11 | 2007-02-15 | Netmanage, Inc. | Real-time activity monitoring and reporting |
-
2008
- 2008-05-09 WO PCT/US2008/063229 patent/WO2008141168A1/fr not_active Ceased
Patent Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5790645A (en) * | 1996-08-01 | 1998-08-04 | Nynex Science & Technology, Inc. | Automatic design of fraud detection systems |
| US6163604A (en) * | 1998-04-03 | 2000-12-19 | Lucent Technologies | Automated fraud management in transaction-based networks |
| US6157864A (en) * | 1998-05-08 | 2000-12-05 | Rockwell Technologies, Llc | System, method and article of manufacture for displaying an animated, realtime updated control sequence chart |
| US6714918B2 (en) * | 2000-03-24 | 2004-03-30 | Access Business Group International Llc | System and method for detecting fraudulent transactions |
| US6597775B2 (en) * | 2000-09-29 | 2003-07-22 | Fair Isaac Corporation | Self-learning real-time prioritization of telecommunication fraud control actions |
| US20060149674A1 (en) * | 2004-12-30 | 2006-07-06 | Mike Cook | System and method for identity-based fraud detection for transactions using a plurality of historical identity records |
| US20070039049A1 (en) * | 2005-08-11 | 2007-02-15 | Netmanage, Inc. | Real-time activity monitoring and reporting |
Cited By (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2013062713A1 (fr) * | 2011-10-28 | 2013-05-02 | Visa International Service Association | Système et procédé permettant un chaînage d'identité |
| US11676146B2 (en) | 2011-10-28 | 2023-06-13 | Visa International Service Association | System and method for identity chaining |
| US9311351B2 (en) | 2013-03-11 | 2016-04-12 | Sas Institute Inc. | Techniques to block records for matching |
| US11954218B2 (en) | 2020-02-10 | 2024-04-09 | Visa International Service Association | Real-time access rules using aggregation of periodic historical outcomes |
| US11354583B2 (en) | 2020-10-15 | 2022-06-07 | Sas Institute Inc. | Automatically generating rules for event detection systems |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10769290B2 (en) | Systems and methods for fraud detection via interactive link analysis | |
| US20240193305A1 (en) | Systems and methods of determining compromised identity information | |
| US7373669B2 (en) | Method and system for determining presence of probable error or fraud in a data set by linking common data values or elements | |
| Ding | Applying weighted PageRank to author citation networks | |
| Shehnepoor et al. | NetSpam: A network-based spam detection framework for reviews in online social media | |
| CN104077396B (zh) | 一种钓鱼网站检测方法及装置 | |
| Bercovitch et al. | HoneyGen: An automated honeytokens generator | |
| US6947924B2 (en) | Group based search engine generating search results ranking based on at least one nomination previously made by member of the user group where nomination system is independent from visitation system | |
| US8621562B2 (en) | Methods and systems for authentication | |
| US9262767B2 (en) | Systems and methods for generating statistics from search engine query logs | |
| US7693833B2 (en) | System and method for improving integrity of internet search | |
| AU2017203586A1 (en) | System and methods for identifying compromised personally identifiable information on the internet | |
| WO2022064348A1 (fr) | Protection de données sensibles dans des documents | |
| CN111292008A (zh) | 一种基于知识图谱的隐私保护数据发布风险评估方法 | |
| US9971814B1 (en) | Monitoring and analysis of social network traffic | |
| US11595416B2 (en) | Method, product, and system for maintaining an ensemble of hierarchical machine learning models for detection of security risks and breaches in a network | |
| Maillé et al. | Are search engines biased? Detecting and reducing bias using meta search engines | |
| US20230385451A1 (en) | Systems and methods of determining compromised identity information | |
| Ye et al. | Modeling access environment and behavior sequence for financial identity theft detection in E-commerce services | |
| WO2008141168A1 (fr) | Systèmes et procédés pour une détection de fraude via une analyse de liaison interactive | |
| CN120632954B (zh) | 一种基于深度学习的跨部门政务数据安全共享与分析方法 | |
| Pallis et al. | Validation and interpretation of Web users’ sessions clusters | |
| CN107291930A (zh) | 权重数的计算方法 | |
| CN111125747B (zh) | 一种商务网站用户的商品浏览隐私保护方法及系统 | |
| Schroeder et al. | Crimelink explorer: Using domain knowledge to facilitate automated crime association analysis |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08755228 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 08755228 Country of ref document: EP Kind code of ref document: A1 |