KR20160017629A - Predictive fraud screening - Google Patents
Predictive fraud screening Download PDFInfo
- Publication number
- KR20160017629A KR20160017629A KR1020150110520A KR20150110520A KR20160017629A KR 20160017629 A KR20160017629 A KR 20160017629A KR 1020150110520 A KR1020150110520 A KR 1020150110520A KR 20150110520 A KR20150110520 A KR 20150110520A KR 20160017629 A KR20160017629 A KR 20160017629A
- Authority
- KR
- South Korea
- Prior art keywords
- transaction
- fraud
- probability
- determining
- cost
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0207—Discounts or incentives, e.g. coupons or rebates
- G06Q30/0225—Avoiding frauds
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Development Economics (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Entrepreneurship & Innovation (AREA)
- Marketing (AREA)
- Economics (AREA)
- Computer Security & Cryptography (AREA)
- Game Theory and Decision Science (AREA)
Abstract
The present invention relates to methods, systems and computer program products for blocking transactions. Transactions stored in the transaction database can provide a statistical basis for determining the probability of fraud for pending transactions. The fraud cost can be determined for each of a plurality of possible actions based on the fraud probability, and the action provides the lowest fraud cost selected. Cumulative fraud costs can be determined for a set of transactions in the database. If taking action at the lowest fraud cost for a transaction would result in a higher cumulative fraud cost, an action with a higher fraud cost for the transaction could be selected. Transactions can be added to the database, and the probability of fraud is adjusted based on the amount of time since the transaction was approved. The statistical basis can be optimized based on the cost error.
Description
The present invention relates generally to computers and computer systems, and more particularly to methods, systems, and computer program products for screening transactions against fraud.
In the travel industry, airline tickets are often sold through indirect sellers such as travel agencies. Indirect sellers will generally check for available flights or other travel services that meet traveler's travel plans, and once services that match are found, book a service for travelers, We collect payment. Charges are often collected by charging the cost of travel services purchased to a credit card account provided by the traveler, and the indirect seller or validating carrier acts as the merchant.
Credit card transactions typically involve a two-stage process of authorization and settlement. At the time of the transaction, transaction information such as the purchase amount, the merchant's identity, the credit card account number, and the expiration date is transmitted from the merchant to the issuing bank. The issuing bank may then check the account to verify that the credit card is valid and that the credit line is sufficient to allow the transaction. If the bank approves the transaction, the merchant completes the transaction and issues a ticket to the traveler. To receive a payment, the merchant may send a batch of approved certifications to the "acquiring bank" at the close of the business day (business day). The acceptance bank can then reconcile and transmit certificates to issuing banks, typically via a card network or clearing house, deposit funds in the merchant's account do. The reserves are then transferred from the issuing bank to the accepting bank and a bill is sent by the issuing bank to the cardholder.
Unfortunately, credit cards are often used by unscrupulous individuals who make unauthorized purchases using improperly acquired or stolen credit cards to illegally purchase tickets. When a real cardholder notices an unauthorized purchase, the cardholder may dispute the charge with the issuing bank. These disputes typically result in a "chargeback" to the merchant for the cost of the transaction. Chargebacks may be received up to a maximum number of months for which travel services are typically used after a transaction occurs. Thus, fraudulent credit card transactions generally cause significant damage to merchants who can not recover the cost of travel services.
Thus, an improved system for analyzing transactions and detecting fraud to reduce the incidence of illegal charges and reduce losses incurred to merchants and travel service providers due to illegal purchases of travel services Methods, and computer program products are needed.
In one embodiment of the invention, a method is provided for blocking transactions. The method includes receiving first data characterizing a first transaction and determining a first probability of a first transaction based on the first data. The method includes receiving second data characterizing a second transaction occurring during a period during which a chargeback for a first transaction can be received and receiving second data characterizing a first probability and a second transaction based on the amount of time since approval of the first transaction And determining a second probability of a first transaction to be fraudulent. The method may then determine a third probability of a second transaction based on the second data and a second probability based at least in part.
In another embodiment of the invention, an apparatus is provided for blocking transactions. The apparatus includes a processor and a memory coupled to the processor. The memory, when executed by the processor, includes instructions to cause the device to receive first data characterizing a first transaction and to determine a first probability of a first transaction based on the first data. The device may also receive second data characterizing a second transaction occurring during a period during which a chargeback for the first transaction can be received and may include a first probability and an amount of time after the first transaction has been approved The first transaction can determine the second probability of fraud. The device may also determine a third probability of a second transaction based on the second data and a second probability at least partially.
In another embodiment of the present invention, a computer program product is provided that includes a non-transitory computer-readable storage medium including instructions. The instructions, when executed by the processor, may be configured to cause the processor to receive first data characterizing the first transaction and to determine a first probability of a first transaction based on the first data. The instructions may also cause the processor to receive second data characterizing a second transaction occurring during a period during which a chargeback for the first transaction can be received, and after the first probability and after the first transaction has been approved The first transaction may determine the second probability of fraud based on the amount of time of the first transaction. The processor may also determine a third probability of a second transaction based on the second data and a second probability at least partially.
In another embodiment of the present invention, a method is provided for blocking transactions involving receiving data defining a first transaction. The method may further comprise determining a first fraud cost for taking a first action and a second fraud cost for taking a second action. In response to the second fraud cost exceeding the first fraud cost, the method may determine a reduction in the cumulative fraud cost for a testing set of transactions that may be caused by taking a second action. The method may also determine a first difference between the first fraud cost and the second fraud cost and take a second action if the decrease is greater than the first difference.
In another embodiment of the invention, an apparatus is provided for blocking transactions. The apparatus includes a processor and a memory coupled to the processor. The memory, when executed by the processor, includes instructions for causing the device to receive data defining a first transaction. The instructions may also be configured to cause the device to determine a first fraud cost for taking the first action and a second fraud cost for taking the second action. In response to the second fraud cost exceeding the first fraud cost, the device may determine a reduction in the cumulative fraud cost for the testing set of transactions by taking a second action, The first difference can be determined. If the decrease is greater than the first difference, then the device can take a second action.
In another embodiment of the present invention, a computer program product is provided that includes a non-transient computer-readable storage medium including instructions. The instructions, when executed by the processor, may be configured to cause the processor to receive data defining a first transaction. The instructions may also be configured to determine a first fraud cost for taking a first action and a second fraud cost for taking a second action. In response to the second fraud cost exceeding the first fraud cost, the instructions can determine a decrease in the cumulative fraud cost for the testing set of transactions by taking the second action, and the difference between the first fraud cost and the second fraud cost The first difference can be determined. If the decrease is greater than the first difference, the instructions may take a second action.
BRIEF DESCRIPTION OF THE DRAWINGS The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate various embodiments of the invention and, together with the general description of the invention given above and the detailed description of the embodiments given below, .
1 is a schematic diagram of an exemplary operating environment including a plurality of computing systems communicating over a network.
Figure 2 is a schematic diagram of the exemplary computing system of Figure 1;
3 is a schematic diagram of a transaction blocking system including a fraud screening module, a fraud probability module, and a transaction database.
Figure 4 is a graphical depiction of the relationship between the fraud cost and the fraud probability for a transaction blocked by the transaction blocking system of Figure 3;
5 is a graphical representation of a probability density function that illustrates the relationship between the probability of receiving a chargeback for a transaction and the amount of time after the acceptance of a transaction.
Figure 6 is a flow diagram of a transaction cut-off process that may be performed by the transaction cut-off system of Figure 3;
Embodiments of the present invention are directed to methods and systems for determining whether to approve or deny a transaction, such as a transaction for purchasing a travel service, by determining a fraud cost for the transaction. Embodiments of the invention may be implemented by a transaction blocking system that includes one or more networked computers or servers. Networked computers may include a Global Distribution System (GDS) and may provide processing and database functions for travel-related systems and modules that analyze transactions against fraud .
The transaction blocking system may include a transaction database that includes a set of historical transactions that provide a statistical basis for estimating fraud probabilities for future transactions. To initialize the transaction database, an initial fraud probability may be set for each of the transactions in the set of historical transactions. At appropriate intervals, or as new information is received, the fraud probability can be updated. The new information may include the expiration of an acceptable chargeback period without receiving a chargeback or receiving a chargeback for a transaction in the transaction database. The probability of fraud estimates can now be maintained with the latest information available thereby.
As requests for new transactions are received, the probability of fraud can be estimated for new transactions based on data in the transaction database. The fraud probability can be parameterized based on a learning algorithm that uses an error function to capture additional fraud costs caused by erroneous predictions. The fraud cost can thereby be associated with making an optimal decision based on both incorrect predictions and correct predictions. Since the results of the authorization transactions are constantly known, once the results are known, the fraud estimates for the authorization transactions are assigned a probability of fraud of zero (no chargeback received) or 1 (unity) Can receive.
Embodiments of the present invention may further include features that allow the system to learn by approving transactions to be rejected based only on the fraud cost for the transaction. For this, a predicted change in the cost of fraud can be determined across multiple transactions from information obtained by allowing transactions that would otherwise have been rejected. Transactions can be allowed if the expected improvement in the ability to estimate the fraud costs for other transactions offsets the fraud costs to allow the transaction. Embodiments of the present invention may also include features that extend on-line fraud screening by taking into account probability information about previous transactions as well as information relating to transactions for which authorization decisions should be made.
1, an operating
The
The
The
2, the
The
The
The I /
The
The database 46 may reside on the mass
3, the
The fraud blocking module 52 may analyze the transaction data 58 using the estimated fraud probability P E (e.g., the estimated probability of receiving a chargeback) and statistical data. The estimated fraud probability P E can be determined by the fraud probability module 54 that can generate the estimated fraud probability P E based on the fraud probability function. The parameters of the fraud probability function may include a set of parameters that are determined based on data in the transaction database 56. [ Transaction data 58 may also be used to adjust parameters in fraud blocking module 52 and fraud probability module 54 and to update transaction database 56 based on prediction errors.
Referring now to FIG. 4,
In an exemplary embodiment, the fraud cost C F for approving all transactions can be represented by
The fraud costs for transactions for which a security check is performed before accepting or rejecting a transaction can be represented by curve (68). Security checks may include, for example, requesting further identification from a traveler, such as an email, a cordless phone, or a code sent to another account associated with the cardholder. The transaction may be approved if the security check passes, and may be rejected if the security check is not passed. The security check may also include performing a manual review of the transaction or the execution of an additional security layer. In any case, performing a security check can add additional costs to the transaction. Exemplary costs include fixed costs such as costs required for implementation (e.g., purchases of computer systems, data connections, terminals, etc.), and cost per transaction (e.g., Costs incurred by the providing company), and costs associated with loss of legitimate sales due to a traveler failing to complete a transaction in response to a security check.
These costs may be reflected in the
In some cases, the security check may have the probability of returning a false negative. That is, security checks can sometimes provide a false indication that a transaction is legitimate when the transaction is actually fraudulent. The costs associated with false negative results may tend to increase the anticipated fraud costs to approve transactions as the probability of fraud P increases. Thus, in some embodiments, the slope of
The fraud costs that reject all transactions can be represented by
To minimize the cost of fraud, embodiments of the present invention determine whether to approve the transaction, whether to request a security check and reject the transaction based on it, or reject the transaction based on the fraud probability P . As shown in the exemplary embodiment depicted by Figure 4,
Credit card transactions may include "card presence" and "card absent" transactions. Card non-existent transactions occur when a buyer is physically absent, for example, when a transaction is carried out over the telephone or through an online travel agent website. Since the buyer does not carry a card during non-card transactions, the indirect seller may be more difficult to verify that the buyer is the actual cardholder. In some cases, the billing agreements between indirect sellers and airlines may allow liability for fraudulent charges to be transferred to indirect sellers if the underlying transaction is a card-less transaction.
Thus, for tickets sold in the indirect marketplace where the airline is a merchant, liability for fraudulent sales may ultimately be the responsibility of the indirect seller. Under these scenarios, in response to receiving the chargeback, the merchant carrier may send the ADM to the indirect merchant requesting the indirect seller to pay the amount of the fee plus ADM processing fee. Indirect sellers may be required to reimburse the airline for charges in the ADM if the indirect seller can not show that the sale was a "card present" sale. In cases where the transaction in question has been done through an online travel agent's website, the transaction will typically be a non-card transaction and the indirect seller may not be able to prove the sale. Thus, when airlines decide whether to approve or reject a transaction, or to ask for more information about a transaction, they may want to consider this difference in accountability between indirect sales and direct sales.
To this end, airlines can determine the percentage of total transactions that are online transactions for each indirect seller. The airline can then adjust the merchant's liability to fraud for each indirect seller based on the percentage of their total transactions, which are online transactions. In the
Therefore, if the airline considers the amount of online transactions performed by the travel agency when minimizing the fraud costs: (1) transactions with a fraud probability P of 0 to 20% must be approved without asking for a security check; (2) Transactions with fraud probability P of 20% to 92% shall be requested for security checks and transactions shall be approved or rejected based on the results; And (3) transactions with fraud probability P greater than 92% should be rejected without performing a security check. For purposes of clarity, the slope of
The above selection process may depend on the assumption that the fraud probability P is correct. However, the fraud probability P for determining which action to take may be the estimated fraud probability P E provided by the fraud probability module 54 and may be different from the actual fraud probability P A that the chargeback will be received for the transaction have. In order to reduce this prediction error and adapt the system to changing conditions, embodiments of the present invention can determine the "cost error" C E resulting from predicting additional costs to the merchant, or "false & And may adjust parameters in fraud blocking module 52, fraud probability module 54, or transaction database 56 to minimize cost error C E.
The
Based on the actual fraud probability P A , the optimal decision to minimize E COF was provided by
To parameterize the algorithm, historical data stored in the transaction database 56 may be used to minimize the sum of the error functions. Methods that can be used to ensure correct fit and convergence of error minimization functions include randomly initializing a set of parameters [theta], and a set of parameters using a stochastic gradient descent lt; / RTI > to < RTI ID = 0.0 > θ. < / RTI > This may include the use of the regularization parameter l. To this end, the history data may be stored in a training set TR (e.g., 60% of historical data); A cross-validation set CV (e.g., 20% of historical data), and a testing set TE (e.g., 20% of historical data). The regularization parameter lambda can be used to avoid exceeding or not exceeding fit while minimizing the following function:
Determining the error includes: (1) using the training set TE to determine the values of the set of parameters? As a function of?; (2) using a cross-check set CV to distinguish between different values of λ so that J (TR) to J (CV) are minimized and to select λ; And (3) selecting a set of parameters &thetas; corresponding to the determined lambda. The "representative" loss can then be determined by J (TE).
Referring now to FIG. 5,
The fraud probability P (t) from which the charge rejection will be received by time T from the approval date of the transaction can then be determined based on the area under the
The fraud probability P may be determined based on the set of transactions in the transaction database past the chargeback period. That is, for transactions outside the chargeback period, the transaction is denied payment, and thus it can be known whether it is fraudulent. The fraud probability P for a set of grant transactions over a chargeback period can thus be determined based on the ratio between the total number of transactions in the set and the number of chargebacks in the set. The total area under the
Where T max is the time limit or chargeback period for receiving a chargeback of the transaction. That is, once t> T max , the charge rejection may no longer be received, and hence the probability density f (t) = 0 out of T max .
For transactions that have not received a chargeback but are still within their chargeback period, the probability P (t) for t can be determined based on the past amount of time since the approval of the transaction as follows:
As can be seen from the equation for P (t) and the
To initialize the transaction database 56, an initial fraud probability P I may be established for all transactions. This value can be a predetermined value, or it can be based on transactions for which a previous fraud blocking strategy such as the previous accounting period has been applied. The initial fraud probability P I can be estimated based on the authorization decisions applied to the history transactions. On average, an observation or statistical fraud rate for authorization transactions can be measured to be a specific percentage referred to herein as X%. If the transactions are approved, the number of chargebacks that would have been received for the rejected transactions is not known, so the fraud rate for these transactions may have to be estimated and the percentage may simply be set to an estimated percentage. This estimate may be based on statistics for similar transactions that have been approved, or may be selected based on experience. For subsequent iterations, an initial fraud probability may be provided by the fraud probability module 54. [ If the decision to approve or deny the transaction is based on the results of the security check, the probability of fraud estimates can be taken into account.
Referring now to FIG. 6, a flow diagram illustrates a
At
At
For example, for a particular transaction, the fraud cost C F for approving the transaction is greater than the fraud cost C F for rejecting the transaction, or
Where C LS is the cost of lost sales resulting from an erroneously rejected transaction, C P is the cost of processing the chargeback, and C FL is the fraudulent liability cost (e.g., the cost of the travel service).
If the transaction is approved to acquire the information, the cost of approving the transaction to obtain this information, C A , can be given by the difference between the fraud cost C F authorizing the transaction and the fraud cost C F denying the transaction: have:
It may be useful to approve a transaction if the expected cumulative fraud cost C F that is saved in future transactions by obtaining information about the current transaction is greater than the approved cost C A.
Judgments to allow the transaction in question can produce three scenarios regarding the configuration of the transaction training set: (1) the current training set (TR 0 ) without additional transactions; (2) the current Training Set plus additional transaction (TR 1 ) assuming that the additional transaction is deceptive; And (3) additional Training Set plus additional transaction (TR 2 ) assuming that the additional transaction is not fraudulent. Determining the "gain" G in by approving the transaction due to the improvement in the accuracy of cumulative fraud cost: (1) the parameters for a fraud probability module 54 of each training set TR 0, TR 1, TR 2 To decide; (2) calculating cumulative fraud costs C F (TE, TR) for each set of parameters across the testing set TE; And (3) subtracting the cumulative sum of the cumulative fraud costs for the training sets, including additional transactions, from the cumulative fraud costs of the additional training-free training set. The gain G can be expressed in the form of the following equation:
Thus, the positive gain G may indicate an expected decrease in the cumulative fraud cost C F (TE, TR) over the testing set TE resulting from adding the current transaction to the training set TR. If the gain G is greater than the transaction approval cost C A for the transaction in question, the
At
Each authorization transaction can have one of three states: (1) a chargeback has been received, in which case the probability of fraud P can be set to 100% for that transaction; (2) no chargeback has been received, in which case the estimated fraud probability P E for that transaction may be reduced for each additional day passed without receiving a chargeback; And (3) the chargeback period has expired without receiving a chargeback, in which case the probability of fraud P may be set at 0% for that transaction. The decrease in the probability of fraud P for transactions that do not receive a chargeback but are still within the chargeback period can be estimated based on the data in the historical database as described above with respect to Figure 5 and is given by:
In certain tax jurisdictions, merchant fees may depend on the percentage of fraudulent transactions authorized by the merchant during the fiscal period. That is, the merchant fees may depend on the number of fraudulent transactions or the dollar amount and the ratio between the total sales during the accounting period in which the merchant fees are evaluated. To illustrate this change, the
By way of example, by day n, which is the end of the accounting period, the
Where P i (n) is the updated fraud probability for transaction i for n days and C is the cost of transaction i, or the cost of the chargeback, one of which must be received.
For each partial-period (e.g., days) k of an accounting period (e.g., month, quarter, year), for each approved transaction, a batch run that updates the fraud probability is: (1) If the probability of fraud P is 1 (for example, a chargeback has been received), keep P equal to 1; (2) If a chargeback was received on day n, set P i (n) = 1; (3) Otherwise, for each partial-period k,
To illustrate the current partial-period out-period, the
In general, a sequence, or even a subset thereof, of routines, components, programs, objects, modules or instructions executed to implement embodiments of the invention, whether implemented as part of an operating system or a specific application, May be referred to herein as "computer program code" or simply "program code". The program code typically resides in various instances in various memory and storage devices in a computer and, when readable and executed by one or more processors in a computer, causes the computer to implement various aspects of embodiments of the invention And / or < / RTI > the elements necessary to execute the elements. The computer readable program instructions for carrying out the operations of the embodiments of the present invention may be source code or object code written in, for example, an assembly language or any combination of one or more programming languages.
The various program codes described herein may be identified based on the applications in which they are implemented in specific embodiments of the invention. However, any subsequent specific program nomenclature is used merely for convenience, and thus the present invention should not be limited to use in any particular application identified and / or implied by such nomenclature Should be recognized. Moreover, it is to be appreciated that the program functions may be implemented in a variety of software layers (e. G., ≪ RTI ID = 0.0 > For example, if the various schemes that can be assigned to an operating system, libraries, APIs, applications, applets, etc., are specified, then embodiments of the present invention may be used for specific organization and assignment of program functions But it should be recognized that the invention is not limited to these.
Program code embodied in any of the applications / modules described herein may be distributed individually or collectively as program objects in a variety of different forms. In particular, the program code may be distributed using a computer-readable storage medium having computer-readable program instructions thereon for causing the processor to perform aspects of embodiments of the present invention.
An essentially non-transitory computer-readable storage medium is any volatile and nonvolatile, implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data, and Removable and non-separable tangible media. The computer readable storage medium may be any type of storage medium such as RAM, ROM, erasable programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM) , Flash memory or other solid state memory technology, a portable compact disc read-only memory (CD-ROM), or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage, Or any other medium that can be used to store the desired information and that can be read by a computer. The computer-readable storage medium can be any type of computer-readable storage medium, such as electrical signals (e.g., electromagnetic waves propagating electromagnetic waves or other electromagnetic waves propagating through a transmission medium such as a waveguide) ) Should not be interpreted. The computer-readable program instructions may be downloaded from a computer, another type of programmable data processing apparatus, or from a computer-readable storage medium to another computer or external storage device via a network or other device.
Computer-readable program instructions stored on a computer-readable medium may be stored on a computer-readable medium such that instructions stored on the computer-readable medium may cause the computer to perform the functions, acts and / or actions specified in the flowcharts, sequence diagrams and / May be used to derive a computer, other types of programmable data processing apparatus, or other devices that function in a particular manner, to produce a manufacturing article containing the instructions to implement. Computer program instructions may include instructions for executing instructions through one or more processors to cause a series of computations to be performed on functions, operations and / or operations specified in flowcharts, sequence diagrams and / or block diagrams May be provided to a general purpose computer, special purpose computer, or other programmable data processing apparatus for producing a machine, so as to be implemented to implement the invention.
In certain alternative embodiments, the functions, acts, and / or operations specified in the flowcharts, sequence diagrams and / or block diagrams may be reordered, processed in series, and / or consistent with embodiments of the present invention And can be processed concurrently. Moreover, any of the flowcharts, sequence diagrams, and / or block diagrams may include more or fewer blocks than those consistent with the embodiments of the present invention.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to limit the embodiments of the invention. As used herein, the singular forms "a," "an," and "the" are intended to also include the plural forms, unless the context clearly dictates otherwise. It will be further understood that the terms " comprises, " and / or "comprising" when used in this specification are taken to indicate the presence of stated features, integers, steps, operations, elements and / But do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and / or groups thereof. Moreover, the terms "includes", "having", "has", "with", "comprised of" To the extent that they are used in a range, such terms are intended to be inclusive in a manner similar to the term " comprising ".
While the invention has been illustrated by the description of various embodiments and these embodiments have been described in considerable detail, it is not the intention of the applicant to restrict or in any way limit the scope of the appended claims to such detail. Additional advantages and modifications will readily appear to those skilled in the art. The invention in its broader aspects is not therefore limited to the specific details, representative apparatus and method, and illustrative examples shown and described. Thus, deviations from such details can be made without departing from the spirit or scope of applicant's universal inventive concept.
Claims (39)
Receiving, at the computer, first data characterizing the first transaction;
Determining, by the computer, a first probability that the first transaction is fraudulent based on the first data;
Receiving, at the computer, second data characterizing a second transaction occurring during a period during which a chargeback for the first transaction can be received;
Determining, by the computer, a second probability of fraud of the first transaction based on the first probability and the amount of time since the approval of the first transaction; And
Determining, by the computer, a third probability of the second transaction being fraudulent based at least in part on the second data and the second probability;
The method comprising the steps of:
Wherein determining the second probability comprises:
Determining a probability density function with respect to time to receive the chargeback for the first transaction; And
Determining an area of a portion of the probability density function corresponding to an amount of time since the approval of the first transaction;
Lt; / RTI >
And wherein the second probability is determined based at least in part on the area.
Wherein the step of determining the probability density function comprises:
Determining a plurality of transactions in which chargebacks are received; And
Determining a reference distribution for the plurality of transactions with respect to an amount of time between the acceptance of each transaction and a receipt of a corresponding charge rejection
Lt; / RTI >
Wherein the probability density function is determined based on the reference distribution.
Wherein the first transaction and the second transaction include a plurality of transactions by a merchant, each transaction having an accounting period comprising a plurality of sub-periods with a date of acceptance, Lt; / RTI >
The method comprises:
For each transaction in the period,
Determining whether the chargeback has been received;
Setting a fraud probability for the transaction to a second probability for the transaction if the chargeback has not been received;
Setting the fraud probability of the transaction to unity if the chargeback is received; And
Multiplying the fraud probability for the transaction by the cost of the transaction to produce an expected chargeback amount for the transaction
The method comprising the steps of:
Wherein at least a portion of the plurality of transactions includes a transaction performed by an indirect seller,
The method comprises:
Determining a percentage of the transaction in the portion that is a card not present transaction; And
Adjusting the expected amount of chargeback for a transaction performed by the indirect seller based on the percentage
The method comprising the steps of:
In response to receiving the chargeback, determining whether an underlying transaction is a card-non-existent transaction; And
Generating an agency debit memo to recover the chargeback in response to the base transaction being the card-less transaction;
The method comprising the steps of:
Summing the expected chargeback amount to produce a cumulative expected chargeback amount; And
Determining a prospective merchant fee based on the cumulative expected chargeback amount
The method comprising the steps of:
Further comprising determining a cost of fraud for the second transaction based on the expected chargeback amount for the second transaction and the expected merchant fee.
Further comprising determining a chargeback amount density function for the merchant over the accounting period.
Wherein the step of determining the chargeback amount density function comprises:
Summing the expected charge rejection amount of the plurality of transactions to generate a cumulative expected chargeback amount for each partial-period up to the current sub-period and including the current partial-period; And
Carlo simulation (Monte-Carlo simulation) to obtain the distribution of the expected charge rejection amount for each sub-period beyond the current sub-period
Lt; / RTI >
Wherein the charge reject quantity density function comprises the cumulative expected charge reject quantity.
A processor; And
Memory containing instructions
Lt; / RTI >
Wherein the instructions, when executed by the processor, cause the device to:
To receive first data characterizing a first transaction,
Determine a first probability that the first transaction is fraudulent based on the first data,
To receive second data characterizing a second transaction occurring during a period during which a chargeback for the first transaction can be received,
Determine a second probability of the first transaction based on the first probability and the amount of time since the approval of the first transaction,
And cause the second transaction to determine a third probability of fraud based at least in part on the second data and the second probability.
Wherein the instructions cause the device to:
Determining a probability density function with respect to time to receive the chargeback for the first transaction,
By determining an area of a portion of the probability density function corresponding to the amount of time since the approval of the first transaction,
And determine the second probability - the second probability is determined based at least in part on the area.
Wherein the instructions cause the device to:
Determining a plurality of transactions for which chargebacks are received,
By determining a reference distribution for the plurality of transactions with respect to the amount of time between the acceptance of each transaction and the receipt of a corresponding charge rejection,
And determining a probability density function, the probability density function being determined based on the reference distribution.
Wherein the first transaction and the second transaction include a plurality of transactions by a merchant, each transaction having an date of acceptance and an accounting period comprising a plurality of sub- Lt; / RTI >
The instructions also cause the device to, for each transaction in the accounting period,
To determine whether the chargeback has been received,
Set a fraud probability for the transaction to a second probability for the transaction if the chargeback has not been received,
If the payment rejection is received, the fraud probability for the transaction is set to 1 (unity)
And multiplies the fraud probability for the transaction by the cost of the transaction to produce an expected chargeback amount for the transaction.
Wherein at least a portion of the plurality of transactions includes a transaction performed by an indirect seller, and wherein the instructions further cause the device to:
To determine the percentage of transactions in the portion of the card not present transaction
And adjust the expected amount of chargeback for a transaction performed by the indirect seller based on the percentage.
The instructions may also cause the device to:
In response to receiving the charge rejection, to determine whether the ground transaction is a card non-existent transaction,
And in response to the base transaction being the card-less transaction, generating an agency debit memo to recover the chargeback.
The instructions may also cause the device to:
Causing the expected chargeback amount to be added to produce a cumulative expected chargeback amount,
And determine an expected merchant fee based on the cumulative expected chargeback amount.
The instructions may also cause the device to:
And determine a fraud cost for the second transaction based on the expected chargeback amount for the second transaction and the expected merchant fee.
The instructions may also cause the device to:
And to determine a chargeback amount density function for the merchant over the accounting period.
Non-transitory computer readable storage medium; And
Instructions stored on the non-transient computer-readable storage medium
Lt; / RTI >
Wherein the instructions, when executed by a processor, cause the processor to:
To receive first data characterizing a first transaction,
Determine a first probability of the first transaction based on the first data,
To receive second data characterizing a second transaction occurring during a period during which a chargeback for the first transaction can be received,
Determine a second probability of the first transaction based on the first probability and the amount of time since the approval of the first transaction,
Cause the second transaction to determine a third probability of fraud based at least in part on the second data and the second probability.
At the computer, receiving data defining a first transaction;
Determining, by the computer, a first fraud cost for taking a first action and a second fraud cost for taking a second action;
Determining a decrease in the cumulative fraud cost for a testing set of transactions that can be caused by taking said second action by said computer in response to said second fraud cost exceeding said first fraud cost ;
Determining, by the computer, a first difference between the first fraud cost and the second fraud cost; And
If the decrease is greater than the first difference, taking the second action by the computer
The method comprising the steps of:
Wherein the first action includes rejecting the first transaction, and wherein the second action includes approving the first transaction.
Wherein the step of determining a decrease in the cumulative fraud cost comprises:
Defining a training set of a plurality of transactions;
Determining a set of a plurality of parameters for a probability probability function, each set of parameters corresponding to and based on another set of the training sets;
Determining, for each set of parameters, the cumulative fraud cost for a testing set of the transaction; And
Subtracting a weighted sum of the first portion of the cumulative fraud cost from a second portion of the cumulative fraud cost to determine the decrease
The method comprising the steps of:
Wherein the training set of the plurality of transactions comprises:
A first training set,
A second training set comprising the first training set and the first transaction that the first transaction assumes is fraud, and
The first training set including the first training set and the first transaction inferring that the first transaction is not a fraud,
The method comprising the steps of:
Wherein determining the plurality of sets of parameters for the fraud probability function comprises:
Determining a first set of parameters for the fraud probability function based on the first training set;
Determining a second set of parameters for the fraud probability function based on the second set of training; And
Determining a third set of parameters for the fraud probability function based on the third training set
The method comprising the steps of:
For each set of parameters, the step of determining the cumulative fraud cost for a testing set of the transaction comprises:
Determining a first cumulative fraud cost for the testing set using the first set of parameters;
Determining a second cumulative fraud cost for the testing set using the second set of parameters; And
Determining a third cumulative fraud cost for the testing set using the third set of parameters
The method comprising the steps of:
Determining a probability that the first transaction is fraudulent; And
1 minus determining the second difference as the probability
Further comprising:
Wherein the weighted sum is equal to a product of the second cumulative fraud cost plus the probability plus a product of the third cumulative fraud cost and the second difference.
Wherein the first transaction is performed by an indirect seller,
Determining a percentage of transactions by the indirect merchant that is a card not present transaction; And
Adjusting at least one of the first fraud cost or the second fraud cost for a transaction performed by the indirect seller based on the percentage
The method comprising the steps of:
In response to receiving the charge rejection, determining whether the ground transaction is a card non-existent transaction; And
Generating an agency debit memo to recover the charge rejection in response to the base transaction being the card non-existent transaction;
The method comprising the steps of:
A processor; And
Memory containing instructions
Lt; / RTI >
Wherein the instructions, when executed by the processor, cause the device to:
To receive data defining a first transaction,
To determine a first fraud cost for taking a first action and a second fraud cost for taking a second action,
Determine a reduction in the cumulative fraud cost for a testing set of transactions by taking the second action in response to the second fraud cost exceeding the first fraud cost,
Determine a first difference between the first fraud cost and the second fraud cost,
And if the decrease is greater than the first difference, take the second action.
Wherein the first action includes rejecting the first transaction, and wherein the second action includes approving the first transaction.
Wherein the instructions cause the device to:
Defining a training set of a plurality of transactions,
Determining a set of a plurality of parameters for a probability probability function, each set of parameters corresponding to and based on another set of the training sets;
Determining, for each set of parameters, the cumulative fraud cost for the testing set of the transaction;
By subtracting the weighted sum of the first portion of the cumulative fraud cost from a second portion of the cumulative fraud cost to determine the reduction,
And to determine a decrease in the cumulative fraud cost.
Wherein the training set of the plurality of transactions comprises:
A first training set,
A second training set comprising the first training set and the first transaction that the first transaction assumes is fraud, and
A third training set including the first training set and the first transaction that the first transaction is not a fraud,
The device comprising:
Wherein the instructions cause the device to:
Determining a first set of parameters for the fraud probability function based on the first training set,
Determining a second set of parameters for the fraud probability function based on the second training set,
And determining a third set of parameters for the fraud probability function based on the third training set,
And determine a set of the plurality of parameters for the fraud probability function.
Wherein the instructions cause the device to:
Determining a first cumulative fraud cost for the testing set using the first set of parameters,
Determining a second cumulative fraud cost for the testing set using the second set of parameters,
By determining a third cumulative fraud cost for the testing set using the third set of parameters,
And for each set of parameters to determine the cumulative fraud cost for the testing set of the transaction.
The instructions may also cause the device to:
Determine a probability that the first transaction is fraudulent,
1 minus to determine the second difference as the probability,
Wherein the weighted sum is equal to a product of the second cumulative fraud cost plus the probability plus a product of the third cumulative fraud cost and the second difference.
Wherein the first transaction is performed by an indirect seller,
The instructions may also cause the device to:
To determine the percentage of transactions by the indirect seller that is a card not present transaction,
And to adjust at least one of the first fraud cost or the second fraud cost for a transaction performed by the indirect seller based on the percentage.
Wherein the instructions cause the device to:
In response to receiving the charge rejection, determine whether the ground transaction is a card non-existent transaction,
And to generate an agency debit memo to recover the chargeback in response to the base transaction being the card non-existent transaction.
Non-transitory computer readable storage medium; And
Instructions stored on the non-transient computer-readable storage medium
Lt; / RTI >
Wherein the instructions, when executed by a processor, cause the processor to:
To receive data defining a first transaction,
To determine a first fraud cost for taking a first action and a second fraud cost for taking a second action,
Determine a reduction in the cumulative fraud cost for a testing set of transactions by taking the second action in response to the second fraud cost exceeding the first fraud cost,
Determine a first difference between the first fraud cost and the second fraud cost,
And if the decrease is greater than the first difference, take the second action.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP14290230.3 | 2014-08-06 | ||
US14/452,941 | 2014-08-06 | ||
EP14290230.3A EP2983119A1 (en) | 2014-08-06 | 2014-08-06 | Predictive fraud screening |
US14/452,941 US9412107B2 (en) | 2014-08-06 | 2014-08-06 | Predictive fraud screening |
Publications (2)
Publication Number | Publication Date |
---|---|
KR20160017629A true KR20160017629A (en) | 2016-02-16 |
KR101753474B1 KR101753474B1 (en) | 2017-07-04 |
Family
ID=55262601
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150110520A KR101753474B1 (en) | 2014-08-06 | 2015-08-05 | Predictive fraud screening |
Country Status (3)
Country | Link |
---|---|
KR (1) | KR101753474B1 (en) |
AU (1) | AU2015210357B2 (en) |
CA (1) | CA2898945C (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018097653A1 (en) * | 2016-11-25 | 2018-05-31 | 공주대학교 산학협력단 | Method and program for predicting chargeback fraud user |
KR102096647B1 (en) * | 2018-11-14 | 2020-04-02 | 주식회사 미탭스플러스 | Apparatus and method for approving deposit of cryptocurrency using artificial intelligene |
WO2022005913A1 (en) * | 2020-06-29 | 2022-01-06 | Stripe, Inc. | Systems and methods for identity graph based fraud detection |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3506068B2 (en) | 1999-09-29 | 2004-03-15 | 日本電気株式会社 | Outlier value calculator |
US10853855B2 (en) * | 2007-05-20 | 2020-12-01 | Michael Sasha John | Systems and methods for automatic and transparent client authentication and online transaction verification |
US20120158540A1 (en) * | 2010-12-16 | 2012-06-21 | Verizon Patent And Licensing, Inc. | Flagging suspect transactions based on selective application and analysis of rules |
-
2015
- 2015-07-30 CA CA2898945A patent/CA2898945C/en active Active
- 2015-08-05 AU AU2015210357A patent/AU2015210357B2/en active Active
- 2015-08-05 KR KR1020150110520A patent/KR101753474B1/en active IP Right Grant
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018097653A1 (en) * | 2016-11-25 | 2018-05-31 | 공주대학교 산학협력단 | Method and program for predicting chargeback fraud user |
KR20180059203A (en) | 2016-11-25 | 2018-06-04 | 공주대학교 산학협력단 | Method and program for predicting chargeback fraud user |
KR102096647B1 (en) * | 2018-11-14 | 2020-04-02 | 주식회사 미탭스플러스 | Apparatus and method for approving deposit of cryptocurrency using artificial intelligene |
KR102096658B1 (en) * | 2018-11-14 | 2020-04-02 | 주식회사 미탭스플러스 | Apparatus and method for approving deposit of cryptocurrency |
KR102096650B1 (en) * | 2018-11-14 | 2020-04-02 | 주식회사 미탭스플러스 | Apparatus and method for approving instant deposit of cryptocurrency using dynamic commission |
KR102096648B1 (en) * | 2018-11-14 | 2020-04-02 | 주식회사 미탭스플러스 | Apparatus and method for approving deposit of cryptocurrency using dynamic commission |
KR102096657B1 (en) * | 2018-11-14 | 2020-04-02 | 주식회사 미탭스플러스 | Apparatus and method for approving deposit of cryptocurrency |
KR102096653B1 (en) * | 2018-11-14 | 2020-04-02 | 주식회사 미탭스플러스 | Apparatus and method for approving instant deposit of cryptocurrency |
KR102096655B1 (en) * | 2018-11-14 | 2020-04-02 | 주식회사 미탭스플러스 | Apparatus and method for approving deposit of cryptocurrency using artificial intelligence |
KR102096656B1 (en) * | 2018-11-14 | 2020-04-02 | 주식회사 미탭스플러스 | Apparatus and method for approving deposit of cryptocurrency using artificial intelligence |
KR102096649B1 (en) * | 2018-11-14 | 2020-04-02 | 주식회사 미탭스플러스 | Apparatus and method for approving deposit of cryptocurrency using dynamic commission |
KR102096652B1 (en) * | 2018-11-14 | 2020-04-02 | 주식회사 미탭스플러스 | Apparatus and method for approving instant deposit of cryptocurrency |
KR102096654B1 (en) * | 2018-11-14 | 2020-05-28 | 주식회사 바디프랜드 | Apparatus and method for approving instant deposit of cryptocurrency |
KR102096651B1 (en) * | 2018-11-14 | 2020-05-28 | 주식회사 바디프랜드 | Apparatus and method for approving instant deposit of cryptocurrency using dynamic commission |
KR102096659B1 (en) * | 2018-11-14 | 2020-05-28 | 주식회사 바디프랜드 | Apparatus and method for approving deposit of cryptocurrency |
WO2022005913A1 (en) * | 2020-06-29 | 2022-01-06 | Stripe, Inc. | Systems and methods for identity graph based fraud detection |
Also Published As
Publication number | Publication date |
---|---|
KR101753474B1 (en) | 2017-07-04 |
CA2898945A1 (en) | 2016-02-06 |
AU2015210357A1 (en) | 2016-02-25 |
CA2898945C (en) | 2017-05-09 |
AU2015210357B2 (en) | 2016-12-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220327590A1 (en) | Secure execution of an exchange item acquisition request | |
US9412107B2 (en) | Predictive fraud screening | |
US20170262852A1 (en) | Database monitoring system | |
Aladağ et al. | Role of financial risks in BOT megatransportation projects in developing countries | |
KR20160017630A (en) | Predictive fraud screening | |
CN112789614B (en) | System for designing and validating fine-grained event detection rules | |
WO2017105760A1 (en) | Systems and methods for predicting chargebacks | |
CN101490704A (en) | Systems and methods for conducting financial transactions over a network | |
US20160232532A1 (en) | Using revenue management to improve payment fraud screening | |
US20220172214A1 (en) | Method for generating transferable tranches | |
US20230140190A1 (en) | Buffering services for suppliers | |
CN103827909A (en) | Systems and methods for global transfers | |
JP2009541818A (en) | System and method for conducting financial transactions over a network | |
KR101753474B1 (en) | Predictive fraud screening | |
CN116362903A (en) | Funds collaborative management system, method, electronic equipment and storage medium | |
KR20150065834A (en) | Methods, system and associated computer executable code for facilitating credit transactions | |
CN114862110A (en) | Method and device for building middle platform of commercial banking business, electronic equipment and storage medium | |
JP5592428B2 (en) | System and method for conducting financial transactions over a network | |
US20150221025A1 (en) | Method, system, and computer program product for determining a payment strategy | |
US20220084035A1 (en) | System and method for facilitating direct trading of electronic transactions | |
EP2983119A1 (en) | Predictive fraud screening | |
KR102251472B1 (en) | Method for future trading based on blockchain and apparatus for performing the method | |
US20230237569A1 (en) | Prediction method based on merchant transaction data | |
US20160260099A1 (en) | Prioritizing transactions in a transaction queue | |
US20230385965A1 (en) | Systems and methods for tokenized real estate |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
A302 | Request for accelerated examination | ||
E902 | Notification of reason for refusal | ||
E701 | Decision to grant or registration of patent right | ||
GRNT | Written decision to grant |