US20210342411A1 - Event stream processing - Google Patents

Event stream processing Download PDF

Info

Publication number
US20210342411A1
US20210342411A1 US17/377,033 US202117377033A US2021342411A1 US 20210342411 A1 US20210342411 A1 US 20210342411A1 US 202117377033 A US202117377033 A US 202117377033A US 2021342411 A1 US2021342411 A1 US 2021342411A1
Authority
US
United States
Prior art keywords
rule
event
stream
historical
results
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
US17/377,033
Inventor
Hamith NISSAM
Vishal Rao
Niranjan R. Kamath
Vikram KULKARNI
Sambhavi Piskala DHANABALAN
Tulika CHATTERJEE
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ent Services Development Corp LP
Original Assignee
Ent Services Development Corp LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ent Services Development Corp LP filed Critical Ent Services Development Corp LP
Priority to US17/377,033 priority Critical patent/US20210342411A1/en
Publication of US20210342411A1 publication Critical patent/US20210342411A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9535Search customisation based on user profiles and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • G06F16/24568Data stream processing; Continuous queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • G06F16/24564Applying rules; Deductive queries
    • G06F16/24565Triggers; Constraints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
    • G06F16/2477Temporal data queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling

Definitions

  • FIG. 1 shows a system in accordance with various examples
  • FIG. 2 shows a system in accordance with other examples
  • FIG. 3 shows yet another example of a system
  • FIG. 4 shows another example of a system
  • FIG. 5 shows a method in accordance with various examples
  • FIG. 6 shows another method in accordance with various examples.
  • the examples disclosed herein reduce the detrimental impacts that may occur to processing and/or storage resources in the face of analyzing data such as large amounts of data in a short period of time.
  • the data may be received by the disclosed systems in the form of multiple input event streams and the system may process the event streams by one or more complex event rules.
  • An event is any data item that typically occurs over time.
  • a complex event rule is a rule that causes a system to track and analyze streams of information about things that happen and derive conclusions from them.
  • Complex event processing is event processing that combines data from multiple sources to infer events or patterns that suggest more complicated circumstances.
  • a goal of complex event processing is to identify meaningful events (such as opportunities or threats) and respond to them as quickly as possible.
  • a historical rule and/or a time window-based rule may be applied to the correlated results.
  • a historical may be, for example, a rule that specifies an operation to be performed that is based on previously stored information.
  • Application of a historical rule generally entails an access to a non-volatile device such as a hard disk drive, which incurs significant latency overhead relative to an access of volatile storage such as random access memory.
  • a time window-based rule may be applied to the correlated results or the results from the application of the historical rule.
  • a time window-based rule may entail the determination of certain events that occur over a defined period of time (a time window). As such, the correlated results or results from the application of the historical rule are saved to memory for subsequent analysis per the time window-based rule. Storage of such results in memory may burden the memory resources in the system, but applying the time window-based rule after the initial filtering of the individual event streams and after correlation of such data reduces the amount of data to be saved per the time window-based rules.
  • a fraud detection complex event rule might be to check for credit card transactions for a given card in excess of $500 and for which the credit card owner's cell phone GPS indicates that the user is within a threshold distance of the point of sale (credit card swipe location). Most card users also carry a cell phone and the location of the cell phone and the location of the credit card swipe should be the same—a difference in locations may be indicative of fraudulent activity.
  • the complex event may also include detecting whether the same credit card has been used in at least two locations more than a threshold distance apart in less than a certain period of time. That a credit card has been used, for example, in two locations more than 100 miles apart in less than 30 minutes may also be indicative of a fraudulent credit card use.
  • the complex event rule may also cause, in the case of a fraud event being detected, a different level of a fraud response service to be performed for different levels of credit card customers.
  • a credit card company may offer platinum, gold, silver, and bronze service levels.
  • the reaction to a fraud event may differ from platinum users than for bronze users.
  • a fraud response service may put a temporary hold on the card, send a text message to the card owner, make a phone call to one or more phone numbers associated with the card owner, and automatically issue the card owner a new card, but for a bronze user, the service might only put a temporary hold on the card.
  • This particular credit card fraud detection complex event rule is referred to below throughout the description of the implementations described herein.
  • FIG. 1 shows an example of a system including one or more event stream filter engines (event stream filter engines 100 a and 100 b shown in FIG. 1 ), a correlation engine 110 , and a historical processing engine 120 .
  • Each event stream filter engine 100 a , 100 b receives a separate event stream as shown.
  • Each event stream includes a plurality of records related to a particular activity. Some or all of the records of a given event stream may have a time stamp (time and/or date) to record when that particular event occurred.
  • the event stream provided to event stream filter engine 100 a may include credit card transaction records including such information as credit card account number, amount of transaction, location of transaction (point of sale), date and time the transaction occurred, credit card account holder's name, etc.
  • the event stream provided to event stream filter engine 100 b may include cell phone records including such information as cell phone location data (e.g., obtained from the phone's Global Positioning System (GPS) receiver), cell phone account holder's name, date and time the GPS location was obtained, etc.
  • a credit card owner may agree to have his or her cell phone location monitored as part of the credit card fraud detection for that person's credit card.
  • the credit card owner may register his or her cell phone (e.g., cell phone number, cell phone carrier identity and account number, authorize to have his phone's location monitored, etc.) with the credit card fraud detection service.
  • Each event stream filter engine 100 a , 100 b implements a filter rule that is specified for that particular event stream to generate a filtered output event stream.
  • Event stream filter engine 100 a thus generates a filtered output event stream 105 a and event stream filter engine 100 b generates a filtered output event stream 105 b .
  • the filter rule for that engine might be to exclude credit card transactions that are less than $500.
  • the filter rule for that filter engine might be to exclude those cell phone records that do not have a complete cell phone location.
  • the fraud detection service may prompt the user's cell phone to report its location every 10 minutes so that the service knows the location of the cell phone at all times (at least within a resolution of 10 minutes). If the cell phone's GPS is disabled, non-functional or the phone is inside a building and not within line of sight of a GPS satellite, the data record reported by the phone might not have any or enough information to enable the service to precisely determine the location of the user's phone.
  • Each individual filter rule thus causes a subset of the event stream received by that event stream filter engine to be output by the event stream filter engine as the filtered output event stream. Therefore, there are fewer records in filtered output event streams 105 a 105 b than in their counterpart input event streams.
  • Each filter rule for a given event stream filter engine only applies to the event stream for that particular event stream filter engine. That is, the various input event streams are separately filtered without regard to the records of the other stream(s).
  • the correlation engine 110 then receives the filtered output event streams 105 a , 105 b from the event stream filter engines 100 a , 100 b .
  • the correlation engine 110 applies a correlation rule to the filtered output event streams to produce correlated event results 115 .
  • the correlation rule causes the correlation engine 110 to compare the individual filtered output event streams 105 a , 105 b to each other.
  • a correlation rule might cause the correlation engine 110 to associate the location of a particular customer's credit card transaction in excess of $500 (from filtered output event stream 105 a ) with the same customer's cell phone location information (from filtered output event stream 105 b ).
  • the correlation engine 110 associates records from the various filtered output event streams 105 a , 105 b (e.g., associating credit card transactions above $500 and their location with the card owner's cell phone location) to form “tuples” in the correlated event results 115 .
  • the correlated event results 115 are then provided to the historical processing engine 120 , which applies a historical rule to the correlated event results 115 to produce historical filtered results.
  • the historical rule indicates a processing operation to be performed by the historical processing engine 120 on the correlated event results based on data previously mapped to at least one of the event streams and previously stored in non-volatile storage (not shown in FIG. 1 but shown in other figures).
  • the correlated event may indicate a possible fraud event and the complex event rule may require the performance of a certain response operation based on the credit card service level of the credit card owner as exemplified above.
  • the historical processing engine 120 per the historical rule, retrieves the credit card service level from the non-volatile storage and performs the corresponding response operation.
  • the response operation might be different for a platinum credit-card owner than a bronze credit card owner. Because the event stream filter engine 100 a has already filtered out certain transactions and because the correlation engine 110 has already correlated the remaining transactions to cell phone location data, there are fewer potential credit card transaction records requiring access to the non-volatile storage than might otherwise have been the case. As such, less bandwidth is needed for accesses to the non-volatile storage.
  • FIG. 2 illustrates another implementation, similar in some respects to that of FIG. 1 .
  • the implementation of FIG. 2 also includes event stream filter engines 100 a , 100 b , a correlation engine 110 , and a historical processing engine 120 . A description of those components, therefore, will not be repeated with respect to FIG. 2 .
  • the implementation of FIG. 2 includes a time window engine 130 and a rule engine 140 .
  • the time window engine 130 applies a time window-based rule to the historical filtered results 125 .
  • the time window-based rule specifies a plurality of historical filtered results 125 that must be true over a defined period of time. For example, a time window-based rule may specify that two or more credit card transactions occurring within a 30 minute window and more than 100 miles apart is indicative of fraudulent activity. To implement this rule, the time window engine 130 must store, or caused to be stored, credit card transactions over a rolling 30-minute window.
  • the correlation and historical processing engines 110 , 120 there is less data to be stored for the relevant time window than otherwise would be the case if the time window-based rule was applied before, for example, the correlation stage.
  • the implementation of FIG. 2 also includes a rule engine 140 , which receives one or more complex event rules. For each such complex event rule, the rule engine 140 decomposes the complex event rule to generate the filter rules for the various event stream filter engines, the correlation rule, the historical rule, and the time window-based rule and provides those rules to the corresponding engines 100 a , 100 b , 110 , 120 , and 130 .
  • the rule engine 140 has knowledge of the type and format of the event streams and uses that knowledge in the decomposition process. For example, one of the event streams may include credit card transactions as noted above, with each transaction including a dollar amount of the transaction among other information.
  • the rule engine 140 decomposes the complex event rule to generate a filter rule that specifies that credit card transactions less than $500 are dropped from the event stream and not forwarded on to the correlation engine 110 .
  • FIG. 3 shows an example of the implementation of FIG. 1 .
  • FIG. 3 shows a processing resource 200 coupled to an interface 205 and a non-transitory storage device 210 .
  • the processing resource 200 may include a single processor, multiple processors, a single computer, a network of computers, or any other type of hardware processing resource.
  • the processing resource 200 receives the event streams via interface 205 .
  • Interface 205 may provide network access and/or access to a peripheral device which provides the event streams.
  • the non-transitory storage device 210 may include volatile storage such as random access memory, non-volatile storage such as a magnetic storage device, optical storage device, solid state storage device, etc. or combinations thereof.
  • the non-transitory storage device 210 includes an event stream reception module 212 , a stream rule application module 214 , a correlation rule module 216 , a historical rule module 218 , and a time window module 220 .
  • Each of these modules includes machine instructions, which are executable by the processing resource 200 .
  • Each of the engines of FIG. 1 is implemented as the processing resource 200 of FIG. 3 executing a corresponding module.
  • each event stream filter engine 100 a , 100 b is implemented as the processing resource 200 executing an instance of the stream rule application module 214 , or one executed instance of the stream rule application module 214 may implement all event stream filter engines.
  • the stream rule application module 214 causes the processing resource 200 to perform the functionality described herein attributed to the event stream filter engines (e.g., receive event stream and apply a filter rule).
  • the correlation engine 110 is implemented as the processing resource 200 executing the correlation rule module 216 which correlates the various filtered output event streams 105 a , 105 b .
  • the historical processing engine 120 is implemented as the processing resource 200 executing the historical rule module 218 , which applies a historical rule to the correlated event results.
  • Any information previously stored in non-volatile storage to be used in accordance with a historical rule may be stored in non-transitory storage device 210 .
  • the time window engine 130 is implemented as the processing resource 200 executing the time window module 220 which applies a time window-based rule as explained above.
  • Data from the event streams to be stored in accordance with a time window-based rule may be stored in the non-volatile storage device 210 .
  • FIG. 4 shows the processing resource 200 coupled to a non-transitory storage device 230 that comprises volatile and/or non-volatile storage device 210 as for the non-transitory storage device of FIG. 3 .
  • the storage device 230 of FIG. 4 includes an event stream reception module 212 , a stream rule application module 214 , a correlation rule module 216 , a historical rule module 218 , and a time window module 220 , which perform the same or similar functions, once executed by processing resource 200 , as their counterparts in FIG. 3 .
  • the storage device 230 of FIG. 4 also includes a complex rule module 222 , which is executable by the processing resource 200 to implement the following functionality.
  • the complex rule module 222 causes the processing resource 200 to receive one or more complex event rules. For each such complex event rule, the complex rule module 222 decomposes the complex event rule to generate the filter rules for the various event stream filter engines, the correlation rule, the historical rule, and the time window-based rule described above and provides those rules to the corresponding engines 100 a , 100 b , 110 , 120 , and 130 .
  • the complex rule module 222 may be programmed with, or otherwise have access to, the type and format of the event streams and uses that information in the decomposition process as explained previously.
  • FIG. 5 shows a method in accordance with an example. The various operations shown in FIG. 5 are performed the hardware described herein.
  • the method includes receiving a plurality of event streams.
  • the method at 302 applies a separate stream rule to each individual event stream to produce a filtered output event stream from each such event stream.
  • the method includes correlating the filtered output event streams to produce correlated event results.
  • the method then includes at 306 applying a time window-based rule to produce time window results.
  • FIG. 6 shows another method in accordance with another example. The various operations shown in FIG. 6 are performed the hardware described herein.
  • the method includes receiving a complex event rule.
  • method includes decomposing the complex event rule to generate separate stream rules, a correlation rule, a historical rule, and a time window-based rule.
  • the method includes receiving a plurality of event streams.
  • the method then includes at 302 applying a separate stream rule to each individual event stream to produce a filtered output event stream from each such event stream.
  • the method includes correlating the filtered output event streams to produce correlated event results.
  • the method includes applying the historical rule to the correlated event results to produce historical filtered results.
  • the method then includes applying a time window-based rule to the historical filtered results to produce time window results.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Business, Economics & Management (AREA)
  • Computational Linguistics (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Software Systems (AREA)
  • Strategic Management (AREA)
  • Human Resources & Organizations (AREA)
  • Fuzzy Systems (AREA)
  • Operations Research (AREA)
  • Probability & Statistics with Applications (AREA)
  • Game Theory and Decision Science (AREA)
  • Development Economics (AREA)
  • Mathematical Physics (AREA)
  • Marketing (AREA)
  • Educational Administration (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephonic Communication Services (AREA)
  • Computer And Data Communications (AREA)

Abstract

An example system receives a plurality of event streams. A separate stream rule is applied to each individual event stream to produce a filtered output event stream. The system also applies a correlation rule to the filtered output event streams to produce correlated event results.

Description

    BACKGROUND
  • Many businesses today analyze large amounts of data to make business decisions. Often the amount of data to be analyzed is voluminous, to the point at which real-time analysis of such large amounts of data is problematic. Analysis of such data may burden processing (e.g., latency) and storage resources.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • For a detailed description of various examples, reference will now be made to the accompanying drawings in which:
  • FIG. 1 shows a system in accordance with various examples;
  • FIG. 2 shows a system in accordance with other examples;
  • FIG. 3 shows yet another example of a system;
  • FIG. 4 shows another example of a system;
  • FIG. 5 shows a method in accordance with various examples; and
  • FIG. 6 shows another method in accordance with various examples.
  • DETAILED DESCRIPTION
  • The examples disclosed herein reduce the detrimental impacts that may occur to processing and/or storage resources in the face of analyzing data such as large amounts of data in a short period of time. The data may be received by the disclosed systems in the form of multiple input event streams and the system may process the event streams by one or more complex event rules. An event is any data item that typically occurs over time. A complex event rule is a rule that causes a system to track and analyze streams of information about things that happen and derive conclusions from them. Complex event processing (CEP) is event processing that combines data from multiple sources to infer events or patterns that suggest more complicated circumstances. A goal of complex event processing is to identify meaningful events (such as opportunities or threats) and respond to them as quickly as possible.
  • Some disclosed examples provide for an initial filtering of each individual input event stream followed by correlating the filtered results. Because the input event streams are initially separately filtered, less data is then subjected to the correlation operation, which thereby alleviates the burden on the processing resources of the system. A historical rule and/or a time window-based rule may be applied to the correlated results. A historical may be, for example, a rule that specifies an operation to be performed that is based on previously stored information. Application of a historical rule generally entails an access to a non-volatile device such as a hard disk drive, which incurs significant latency overhead relative to an access of volatile storage such as random access memory. A time window-based rule may be applied to the correlated results or the results from the application of the historical rule. A time window-based rule may entail the determination of certain events that occur over a defined period of time (a time window). As such, the correlated results or results from the application of the historical rule are saved to memory for subsequent analysis per the time window-based rule. Storage of such results in memory may burden the memory resources in the system, but applying the time window-based rule after the initial filtering of the individual event streams and after correlation of such data reduces the amount of data to be saved per the time window-based rules.
  • An example of the usefulness of the disclosed systems is for credit card fraud detection. For example, a fraud detection complex event rule might be to check for credit card transactions for a given card in excess of $500 and for which the credit card owner's cell phone GPS indicates that the user is within a threshold distance of the point of sale (credit card swipe location). Most card users also carry a cell phone and the location of the cell phone and the location of the credit card swipe should be the same—a difference in locations may be indicative of fraudulent activity. The complex event may also include detecting whether the same credit card has been used in at least two locations more than a threshold distance apart in less than a certain period of time. That a credit card has been used, for example, in two locations more than 100 miles apart in less than 30 minutes may also be indicative of a fraudulent credit card use. The complex event rule may also cause, in the case of a fraud event being detected, a different level of a fraud response service to be performed for different levels of credit card customers. For example, a credit card company may offer platinum, gold, silver, and bronze service levels. The reaction to a fraud event may differ from platinum users than for bronze users. For a platinum user, a fraud response service may put a temporary hold on the card, send a text message to the card owner, make a phone call to one or more phone numbers associated with the card owner, and automatically issue the card owner a new card, but for a bronze user, the service might only put a temporary hold on the card. This particular credit card fraud detection complex event rule is referred to below throughout the description of the implementations described herein.
  • FIG. 1 shows an example of a system including one or more event stream filter engines (event stream filter engines 100 a and 100 b shown in FIG. 1), a correlation engine 110, and a historical processing engine 120. Each event stream filter engine 100 a, 100 b receives a separate event stream as shown. Each event stream includes a plurality of records related to a particular activity. Some or all of the records of a given event stream may have a time stamp (time and/or date) to record when that particular event occurred. In the example above, the event stream provided to event stream filter engine 100 a may include credit card transaction records including such information as credit card account number, amount of transaction, location of transaction (point of sale), date and time the transaction occurred, credit card account holder's name, etc. The event stream provided to event stream filter engine 100 b may include cell phone records including such information as cell phone location data (e.g., obtained from the phone's Global Positioning System (GPS) receiver), cell phone account holder's name, date and time the GPS location was obtained, etc. In some implementations, a credit card owner may agree to have his or her cell phone location monitored as part of the credit card fraud detection for that person's credit card. As such, the credit card owner may register his or her cell phone (e.g., cell phone number, cell phone carrier identity and account number, authorize to have his phone's location monitored, etc.) with the credit card fraud detection service.
  • Each event stream filter engine 100 a, 100 b implements a filter rule that is specified for that particular event stream to generate a filtered output event stream. Event stream filter engine 100 a thus generates a filtered output event stream 105 a and event stream filter engine 100 b generates a filtered output event stream 105 b. For example, if the event stream for event stream filter engine 100 a includes credit card transactions, the filter rule for that engine might be to exclude credit card transactions that are less than $500. If the event stream for event stream filter engine 100 b includes cell phone records, the filter rule for that filter engine might be to exclude those cell phone records that do not have a complete cell phone location. For example, the fraud detection service may prompt the user's cell phone to report its location every 10 minutes so that the service knows the location of the cell phone at all times (at least within a resolution of 10 minutes). If the cell phone's GPS is disabled, non-functional or the phone is inside a building and not within line of sight of a GPS satellite, the data record reported by the phone might not have any or enough information to enable the service to precisely determine the location of the user's phone. Each individual filter rule thus causes a subset of the event stream received by that event stream filter engine to be output by the event stream filter engine as the filtered output event stream. Therefore, there are fewer records in filtered output event streams 105 a 105 b than in their counterpart input event streams.
  • Each filter rule for a given event stream filter engine only applies to the event stream for that particular event stream filter engine. That is, the various input event streams are separately filtered without regard to the records of the other stream(s).
  • The correlation engine 110 then receives the filtered output event streams 105 a, 105 b from the event stream filter engines 100 a, 100 b. The correlation engine 110 applies a correlation rule to the filtered output event streams to produce correlated event results 115. The correlation rule causes the correlation engine 110 to compare the individual filtered output event streams 105 a, 105 b to each other. By way of the preceding example, a correlation rule might cause the correlation engine 110 to associate the location of a particular customer's credit card transaction in excess of $500 (from filtered output event stream 105 a) with the same customer's cell phone location information (from filtered output event stream 105 b). The correlation engine 110 associates records from the various filtered output event streams 105 a, 105 b (e.g., associating credit card transactions above $500 and their location with the card owner's cell phone location) to form “tuples” in the correlated event results 115.
  • The correlated event results 115 are then provided to the historical processing engine 120, which applies a historical rule to the correlated event results 115 to produce historical filtered results. The historical rule indicates a processing operation to be performed by the historical processing engine 120 on the correlated event results based on data previously mapped to at least one of the event streams and previously stored in non-volatile storage (not shown in FIG. 1 but shown in other figures). For example, the correlated event may indicate a possible fraud event and the complex event rule may require the performance of a certain response operation based on the credit card service level of the credit card owner as exemplified above. The historical processing engine 120, per the historical rule, retrieves the credit card service level from the non-volatile storage and performs the corresponding response operation. For example, the response operation might be different for a platinum credit-card owner than a bronze credit card owner. Because the event stream filter engine 100 a has already filtered out certain transactions and because the correlation engine 110 has already correlated the remaining transactions to cell phone location data, there are fewer potential credit card transaction records requiring access to the non-volatile storage than might otherwise have been the case. As such, less bandwidth is needed for accesses to the non-volatile storage.
  • FIG. 2 illustrates another implementation, similar in some respects to that of FIG. 1. Like the implementation of FIG. 1, the implementation of FIG. 2 also includes event stream filter engines 100 a, 100 b, a correlation engine 110, and a historical processing engine 120. A description of those components, therefore, will not be repeated with respect to FIG. 2. The implementation of FIG. 2 includes a time window engine 130 and a rule engine 140.
  • After the historical processing engine 120 processes the correlated event results 115 to produce the historical event results (identified in FIG. 2 with reference numeral 125), the time window engine 130 applies a time window-based rule to the historical filtered results 125. The time window-based rule specifies a plurality of historical filtered results 125 that must be true over a defined period of time. For example, a time window-based rule may specify that two or more credit card transactions occurring within a 30 minute window and more than 100 miles apart is indicative of fraudulent activity. To implement this rule, the time window engine 130 must store, or caused to be stored, credit card transactions over a rolling 30-minute window. However, because the event streams have been significantly filtered, and thus reduced, by the correlation and historical processing engines 110, 120, there is less data to be stored for the relevant time window than otherwise would be the case if the time window-based rule was applied before, for example, the correlation stage.
  • The implementation of FIG. 2 also includes a rule engine 140, which receives one or more complex event rules. For each such complex event rule, the rule engine 140 decomposes the complex event rule to generate the filter rules for the various event stream filter engines, the correlation rule, the historical rule, and the time window-based rule and provides those rules to the corresponding engines 100 a, 100 b, 110, 120, and 130. The rule engine 140 has knowledge of the type and format of the event streams and uses that knowledge in the decomposition process. For example, one of the event streams may include credit card transactions as noted above, with each transaction including a dollar amount of the transaction among other information. If the complex event rule received by the rule engine 140 specifies that only credit card transactions in excess of $500 are to be considered for possible credit card fraud, then the rule engine 140 decomposes the complex event rule to generate a filter rule that specifies that credit card transactions less than $500 are dropped from the event stream and not forwarded on to the correlation engine 110.
  • FIG. 3 shows an example of the implementation of FIG. 1. FIG. 3 shows a processing resource 200 coupled to an interface 205 and a non-transitory storage device 210. The processing resource 200 may include a single processor, multiple processors, a single computer, a network of computers, or any other type of hardware processing resource. The processing resource 200 receives the event streams via interface 205. Interface 205 may provide network access and/or access to a peripheral device which provides the event streams.
  • The non-transitory storage device 210 may include volatile storage such as random access memory, non-volatile storage such as a magnetic storage device, optical storage device, solid state storage device, etc. or combinations thereof. The non-transitory storage device 210 includes an event stream reception module 212, a stream rule application module 214, a correlation rule module 216, a historical rule module 218, and a time window module 220. Each of these modules includes machine instructions, which are executable by the processing resource 200. Each of the engines of FIG. 1 is implemented as the processing resource 200 of FIG. 3 executing a corresponding module. For example, each event stream filter engine 100 a, 100 b is implemented as the processing resource 200 executing an instance of the stream rule application module 214, or one executed instance of the stream rule application module 214 may implement all event stream filter engines. The stream rule application module 214 causes the processing resource 200 to perform the functionality described herein attributed to the event stream filter engines (e.g., receive event stream and apply a filter rule). Similarly, the correlation engine 110 is implemented as the processing resource 200 executing the correlation rule module 216 which correlates the various filtered output event streams 105 a, 105 b. Further, the historical processing engine 120 is implemented as the processing resource 200 executing the historical rule module 218, which applies a historical rule to the correlated event results. Any information previously stored in non-volatile storage to be used in accordance with a historical rule may be stored in non-transitory storage device 210. The time window engine 130 is implemented as the processing resource 200 executing the time window module 220 which applies a time window-based rule as explained above. Data from the event streams to be stored in accordance with a time window-based rule may be stored in the non-volatile storage device 210.
  • FIG. 4 shows the processing resource 200 coupled to a non-transitory storage device 230 that comprises volatile and/or non-volatile storage device 210 as for the non-transitory storage device of FIG. 3. Like the storage device 210 of FIG. 3, the storage device 230 of FIG. 4 includes an event stream reception module 212, a stream rule application module 214, a correlation rule module 216, a historical rule module 218, and a time window module 220, which perform the same or similar functions, once executed by processing resource 200, as their counterparts in FIG. 3.
  • The storage device 230 of FIG. 4 also includes a complex rule module 222, which is executable by the processing resource 200 to implement the following functionality. The complex rule module 222 causes the processing resource 200 to receive one or more complex event rules. For each such complex event rule, the complex rule module 222 decomposes the complex event rule to generate the filter rules for the various event stream filter engines, the correlation rule, the historical rule, and the time window-based rule described above and provides those rules to the corresponding engines 100 a, 100 b, 110, 120, and 130. The complex rule module 222 may be programmed with, or otherwise have access to, the type and format of the event streams and uses that information in the decomposition process as explained previously.
  • FIG. 5 shows a method in accordance with an example. The various operations shown in FIG. 5 are performed the hardware described herein. At 300, the method includes receiving a plurality of event streams. The method at 302 applies a separate stream rule to each individual event stream to produce a filtered output event stream from each such event stream. At 304, after applying a separate stream rule to each individual event stream, the method includes correlating the filtered output event streams to produce correlated event results. After correlating the filtered event streams, the method then includes at 306 applying a time window-based rule to produce time window results.
  • FIG. 6 shows another method in accordance with another example. The various operations shown in FIG. 6 are performed the hardware described herein. At 308, the method includes receiving a complex event rule. At 310, method includes decomposing the complex event rule to generate separate stream rules, a correlation rule, a historical rule, and a time window-based rule.
  • At 300, the method includes receiving a plurality of event streams. The method then includes at 302 applying a separate stream rule to each individual event stream to produce a filtered output event stream from each such event stream. At 304, after applying a separate stream rule to each individual event stream, the method includes correlating the filtered output event streams to produce correlated event results. At 314, after correlating the filtered output event streams, the method includes applying the historical rule to the correlated event results to produce historical filtered results. At 316, after applying the historical rule, the method then includes applying a time window-based rule to the historical filtered results to produce time window results.
  • The above discussion is meant to be illustrative of the principles and various embodiments of the present invention. Numerous variations and modifications will become apparent to those skilled in the art once the above disclosure is fully appreciated. It is intended that the following claims be interpreted to embrace all such variations and modifications.

Claims (15)

What is claimed is:
1. A system, comprising:
a plurality of event stream filter engines to receive a plurality of event streams, each event stream filter engine to receive a separate event stream, apply a filter rule specified for that particular event stream filter, and generate a filtered output event stream;
a correlation engine to receive the filtered output event streams from the event stream filter engines and apply a correlation rule to the filtered output event streams to produce correlated event results; and
a historical processing engine to receive the correlated event results, and apply a historical rule to the correlated event results to produce historical filtered results.
2. The system of claim 1 further comprising a time window engine to apply a time window-based rule to the historical filtered results.
3. The system of claim 2 further comprising a rule engine to:
receive a complex event rule; and
decompose the complex event rule to generate:
the filter rules for the event stream filter engines;
a correlation rule;
the historical rule; and
the time window-based rule.
4. The system of claim 3 wherein the rule engine distributes the filter rules to the event stream filter engines, the correlation rule to the correlation engine, the historical rule to the historical processing engine, and the time window-based rule to the time window engine.
5. The system of claim 1 wherein:
each filter rule, when applied by the corresponding event stream filter engine, causes a subset of the event stream received by that event stream filter engine to be output by the event stream filter engine as the filtered output event stream; and
the correlation rule is to specify a relationship between separate filtered output event streams that the correlation engine is to detect.
6. The system of claim 1 wherein the historical rule indicates a processing operation to be performed by the historical processing engine on the correlated event results based on data previously mapped to at least one of the event streams and previously stored in non-volatile storage.
7. The system of claim 1 wherein the correlation engine does not receive nor operate on the event streams received by the event stream filter engines.
8. A non-transitory storage device containing machine instructions that, when executed by a processing resource, cause the processing resource to:
receive a plurality of event streams, each event stream including a plurality of records;
apply a separate stream rule to each individual event stream to produce a plurality of filtered output event streams;
after applying a separate stream rule to each individual event stream, apply a correlation rule to correlate the filtered output event streams to produce correlated event results;
after correlating the filtered event streams, apply a historical rule to the correlated event results to produce historical filtered results; and
after applying the historical rule, apply a time window-based rule to the historical filtered results.
9. The non-transitory storage device of claim 8 wherein the time window-based rule implements a user-programmable period of time and also implements a user-programmable rule that specifies certain historical filtered results that must be true during the user-programmable period of time.
10. The non-transitory storage device of claim 8 wherein the machine instructions, when executed, further cause the processing resource to:
receive a complex event rule from a user; and
decompose the complex event rule to generate:
the stream rules;
the correlation rule;
the historical rule; and
the time window-based rule.
11. The non-transitory storage device of claim 10 wherein, when the machine instructions, when executed, cause the processing resource to apply the historical rule, the machine instructions cause the processing resource to perform an operation on the correlated event results based on data previously mapped to at least one of the event streams and previously stored in non-volatile storage.
12. A method, comprising:
receiving a plurality of event streams;
applying a separate stream rule to each individual event stream to produce a filtered output event stream from each such event stream;
after applying a separate stream rule to each individual event stream, correlating the filtered output event streams to produce correlated event results; and
after correlating the filtered event streams, applying a time window-based rule to produce time window results.
13. The method of claim 12 further comprising, after correlating the filtered output event streams but before applying the time window-based rule, applying a historical rule to the correlated event results to produce historical filtered results and wherein applying the time window-based rule comprises applying the time window-based rule to the historical filtered results.
14. The method of claim 13 further comprising:
receiving a complex event rule; and
decomposing the complex event rule to generate:
the separate stream rules for the event streams;
a correlation rule to be applied to the filtered event streams while correlating the filtered event streams;
the historical rule; and
the time window-based rule.
15. The method of claim 12:
wherein each event stream includes a plurality of records;
wherein applying the separate stream rules to each such event stream comprises causing a subset of the records of each event stream to be the filtered output event stream for that event stream; and
wherein correlating the filtered event streams includes applying a correlation rule that specifies a relationship between separate filtered output event streams.
US17/377,033 2014-08-04 2021-07-15 Event stream processing Pending US20210342411A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US17/377,033 US20210342411A1 (en) 2014-08-04 2021-07-15 Event stream processing

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
PCT/IN2014/000512 WO2016020927A1 (en) 2014-08-04 2014-08-04 Event stream processing
US201615306293A 2016-10-24 2016-10-24
US17/377,033 US20210342411A1 (en) 2014-08-04 2021-07-15 Event stream processing

Related Parent Applications (2)

Application Number Title Priority Date Filing Date
US15/306,293 Continuation US11093562B2 (en) 2014-08-04 2014-08-04 Event stream processing
PCT/IN2014/000512 Continuation WO2016020927A1 (en) 2014-08-04 2014-08-04 Event stream processing

Publications (1)

Publication Number Publication Date
US20210342411A1 true US20210342411A1 (en) 2021-11-04

Family

ID=55263258

Family Applications (2)

Application Number Title Priority Date Filing Date
US15/306,293 Active 2035-04-15 US11093562B2 (en) 2014-08-04 2014-08-04 Event stream processing
US17/377,033 Pending US20210342411A1 (en) 2014-08-04 2021-07-15 Event stream processing

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US15/306,293 Active 2035-04-15 US11093562B2 (en) 2014-08-04 2014-08-04 Event stream processing

Country Status (2)

Country Link
US (2) US11093562B2 (en)
WO (1) WO2016020927A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180060869A1 (en) * 2016-09-01 2018-03-01 Mastercard International Incorporated Method and system for location scoring based on cardholder wallet item redemption
CN109344170B (en) * 2018-09-04 2022-04-12 创新先进技术有限公司 Stream data processing method, system, electronic device and readable storage medium
US20220036219A1 (en) * 2020-07-29 2022-02-03 Jpmorgan Chase Bank, N.A. Systems and methods for fraud detection using game theory

Citations (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6343279B1 (en) * 1998-08-26 2002-01-29 American Management Systems, Inc. System integrating credit card transactions into a financial management system
US20020198803A1 (en) * 2000-02-03 2002-12-26 Rick Rowe Method and apparatus for facilitating monetary and commercial transactions and for providing consumer reward programs
US7117172B1 (en) * 1999-03-11 2006-10-03 Corecard Software, Inc. Methods and systems for managing financial accounts
US20060237531A1 (en) * 2005-04-26 2006-10-26 Jacob Heffez Method and system for monitoring electronic purchases and cash-withdrawals
US7376431B2 (en) * 2002-02-05 2008-05-20 Niedermeyer Brian J Location based fraud reduction system and method
US20090012898A1 (en) * 2007-07-02 2009-01-08 Lucent Technologies Inc. Location based credit card fraud prevention
US20090287628A1 (en) * 2008-05-15 2009-11-19 Exegy Incorporated Method and System for Accelerated Stream Processing
US20090319638A1 (en) * 2008-05-28 2009-12-24 Patrick Faith Gateway service platform
US20100106611A1 (en) * 2008-10-24 2010-04-29 Uc Group Ltd. Financial transactions systems and methods
US20100235279A1 (en) * 2007-06-04 2010-09-16 Bce Inc. Online transaction validation using a location object
US20100274679A1 (en) * 2009-04-28 2010-10-28 Ayman Hammad Fraud location determination
US20110288692A1 (en) * 2010-05-20 2011-11-24 Accenture Global Services Gmbh Malicious attack detection and analysis
US20120209768A1 (en) * 2011-02-14 2012-08-16 Ebay, Inc. Payment system with location restrictions
US20120244885A1 (en) * 2005-04-26 2012-09-27 Guy Hefetz Method and system for monitoring and validating electronic transactions
US20130030934A1 (en) * 2011-01-28 2013-01-31 Zumigo, Inc. System and method for credit card transaction approval based on mobile subscriber terminal location
US20130027561A1 (en) * 2011-07-29 2013-01-31 Panasonic Corporation System and method for improving site operations by detecting abnormalities
US8370909B2 (en) * 2007-05-29 2013-02-05 Guy Heffez Method and system for authenticating internet user identity
US20130110715A1 (en) * 2011-10-27 2013-05-02 Bank Of America Corporation Use of Velocity in Fraud Detection or Prevention
US8656458B2 (en) * 2005-08-25 2014-02-18 Guy Heffez Method and system for authenticating internet user identity
US20140162598A1 (en) * 2010-11-17 2014-06-12 Antony-Euclid C. Villa-Real Customer-controlled instant-response anti-fraud/anti-identity theft devices (with true- personal identity verification), method and systems for secured global applications in personal/business e-banking, e-commerce, e-medical/health insurance checker, e-education/research/invention, e-disaster advisor, e-immigration, e-airport/aircraft security, e-military/e-law enforcement, with or without NFC component and system, with cellular/satellite phone/internet/multi-media functions
US20140250009A1 (en) * 2013-05-09 2014-09-04 Daniel Edward Carlson Debit/Credit Card Fraud Prevention Software and Smart Phone Application System and Process
US20150052587A1 (en) * 2013-08-19 2015-02-19 Mastercard International Incorporated System and method for graduated security in user authentication
US20150142595A1 (en) * 2013-03-15 2015-05-21 Allowify Llc System and Method for Enhanced Transaction Authorization
US20170076306A1 (en) * 2015-09-14 2017-03-16 The Western Union Company Multi-network transaction analysis
US10521786B2 (en) * 2005-04-26 2019-12-31 Spriv Llc Method of reducing fraud in on-line transactions
US11308477B2 (en) * 2005-04-26 2022-04-19 Spriv Llc Method of reducing fraud in on-line transactions

Family Cites Families (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7562814B1 (en) * 2003-05-12 2009-07-21 Id Analytics, Inc. System and method for identity-based fraud detection through graph anomaly detection
US7289988B2 (en) * 2003-07-08 2007-10-30 Hewlett-Packard Development Company, L.P. Method and system for managing events
US20060130070A1 (en) * 2004-11-22 2006-06-15 Graf Lars O System and method of event correlation
US7653633B2 (en) * 2005-11-12 2010-01-26 Logrhythm, Inc. Log collection, structuring and processing
US7408458B1 (en) * 2005-12-29 2008-08-05 At&T Corp. Method and apparatus for suppressing duplicate alarms
US20080301135A1 (en) * 2007-05-29 2008-12-04 Bea Systems, Inc. Event processing query language using pattern matching
US20080301207A1 (en) * 2007-05-31 2008-12-04 Marc Demarest Systems and methods for cascading destruction of electronic data in electronic evidence management
US20090089352A1 (en) * 2007-09-28 2009-04-02 Yahoo!, Inc. Distributed live multimedia switching mechanism and network
US9483583B2 (en) * 2007-10-22 2016-11-01 Check Point Software Technologies Ltd. Syslog parser
US8185488B2 (en) * 2008-04-17 2012-05-22 Emc Corporation System and method for correlating events in a pluggable correlation architecture
US9135583B2 (en) * 2008-07-16 2015-09-15 Business Objects S.A. Systems and methods to create continuous queries associated with push-type and pull-type data
US8166351B2 (en) * 2008-10-21 2012-04-24 At&T Intellectual Property I, L.P. Filtering redundant events based on a statistical correlation between events
US9866426B2 (en) * 2009-11-17 2018-01-09 Hawk Network Defense, Inc. Methods and apparatus for analyzing system events
US20110251951A1 (en) * 2010-04-13 2011-10-13 Dan Kolkowitz Anti-fraud event correlation
US8886870B2 (en) * 2010-05-25 2014-11-11 Marvell World Trade Ltd. Memory access table saving and restoring system and methods
US20120054420A1 (en) * 2010-08-31 2012-03-01 Jeonguk Kang Storage device and stream filtering method thereof
US20120060173A1 (en) * 2010-09-02 2012-03-08 James Malnati System and method for enhanced alert handling
US8788484B2 (en) * 2010-12-27 2014-07-22 Software Ag Systems and/or methods for user feedback driven dynamic query rewriting in complex event processing environments
EP2702522A4 (en) * 2011-04-29 2015-03-25 Hewlett Packard Development Co Systems and methods for in-memory processing of events
US20130325890A1 (en) 2012-05-31 2013-12-05 Ca, Inc. Leveraging persisted data queries in stream-based complex event processing
US9563663B2 (en) * 2012-09-28 2017-02-07 Oracle International Corporation Fast path evaluation of Boolean predicates
US11288277B2 (en) 2012-09-28 2022-03-29 Oracle International Corporation Operator sharing for continuous queries over archived relations
CN104111872B (en) * 2013-04-19 2016-02-17 腾讯科技(深圳)有限公司 The filter method of system event, device and terminal
US9408051B2 (en) * 2013-05-29 2016-08-02 Avaya Inc. Context-aware social media disaster response and emergency management
US20150100436A1 (en) * 2013-10-07 2015-04-09 MaxPoint Interactive, Inc. System and method for combining past user events with real-time user events to rapidly respond to advertising opportunities
US9613362B2 (en) * 2013-10-17 2017-04-04 Baker Hughes Incorporated Monitoring a situation by comparing parallel data streams
US9712645B2 (en) * 2014-06-26 2017-07-18 Oracle International Corporation Embedded event processing
US10057082B2 (en) * 2014-12-22 2018-08-21 Ebay Inc. Systems and methods for implementing event-flow programs

Patent Citations (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6343279B1 (en) * 1998-08-26 2002-01-29 American Management Systems, Inc. System integrating credit card transactions into a financial management system
US7117172B1 (en) * 1999-03-11 2006-10-03 Corecard Software, Inc. Methods and systems for managing financial accounts
US20020198803A1 (en) * 2000-02-03 2002-12-26 Rick Rowe Method and apparatus for facilitating monetary and commercial transactions and for providing consumer reward programs
US7376431B2 (en) * 2002-02-05 2008-05-20 Niedermeyer Brian J Location based fraud reduction system and method
US20060237531A1 (en) * 2005-04-26 2006-10-26 Jacob Heffez Method and system for monitoring electronic purchases and cash-withdrawals
US20090206157A1 (en) * 2005-04-26 2009-08-20 Bpriv, Llc Method and system for authenticating use of item
US10521786B2 (en) * 2005-04-26 2019-12-31 Spriv Llc Method of reducing fraud in on-line transactions
US20120244885A1 (en) * 2005-04-26 2012-09-27 Guy Hefetz Method and system for monitoring and validating electronic transactions
US11308477B2 (en) * 2005-04-26 2022-04-19 Spriv Llc Method of reducing fraud in on-line transactions
US8656458B2 (en) * 2005-08-25 2014-02-18 Guy Heffez Method and system for authenticating internet user identity
US8370909B2 (en) * 2007-05-29 2013-02-05 Guy Heffez Method and system for authenticating internet user identity
US20100235279A1 (en) * 2007-06-04 2010-09-16 Bce Inc. Online transaction validation using a location object
US20090012898A1 (en) * 2007-07-02 2009-01-08 Lucent Technologies Inc. Location based credit card fraud prevention
US20090287628A1 (en) * 2008-05-15 2009-11-19 Exegy Incorporated Method and System for Accelerated Stream Processing
US20090319638A1 (en) * 2008-05-28 2009-12-24 Patrick Faith Gateway service platform
US20100106611A1 (en) * 2008-10-24 2010-04-29 Uc Group Ltd. Financial transactions systems and methods
US20100274679A1 (en) * 2009-04-28 2010-10-28 Ayman Hammad Fraud location determination
US20110288692A1 (en) * 2010-05-20 2011-11-24 Accenture Global Services Gmbh Malicious attack detection and analysis
US20140162598A1 (en) * 2010-11-17 2014-06-12 Antony-Euclid C. Villa-Real Customer-controlled instant-response anti-fraud/anti-identity theft devices (with true- personal identity verification), method and systems for secured global applications in personal/business e-banking, e-commerce, e-medical/health insurance checker, e-education/research/invention, e-disaster advisor, e-immigration, e-airport/aircraft security, e-military/e-law enforcement, with or without NFC component and system, with cellular/satellite phone/internet/multi-media functions
US20130030934A1 (en) * 2011-01-28 2013-01-31 Zumigo, Inc. System and method for credit card transaction approval based on mobile subscriber terminal location
US20120209768A1 (en) * 2011-02-14 2012-08-16 Ebay, Inc. Payment system with location restrictions
US20130027561A1 (en) * 2011-07-29 2013-01-31 Panasonic Corporation System and method for improving site operations by detecting abnormalities
US20130110715A1 (en) * 2011-10-27 2013-05-02 Bank Of America Corporation Use of Velocity in Fraud Detection or Prevention
US20150142595A1 (en) * 2013-03-15 2015-05-21 Allowify Llc System and Method for Enhanced Transaction Authorization
US20140250009A1 (en) * 2013-05-09 2014-09-04 Daniel Edward Carlson Debit/Credit Card Fraud Prevention Software and Smart Phone Application System and Process
US20150052587A1 (en) * 2013-08-19 2015-02-19 Mastercard International Incorporated System and method for graduated security in user authentication
US20170076306A1 (en) * 2015-09-14 2017-03-16 The Western Union Company Multi-network transaction analysis

Also Published As

Publication number Publication date
US20170147697A1 (en) 2017-05-25
WO2016020927A1 (en) 2016-02-11
US11093562B2 (en) 2021-08-17

Similar Documents

Publication Publication Date Title
US20210342411A1 (en) Event stream processing
EP3343422B1 (en) Systems and methods for detecting resources responsible for events
US9661012B2 (en) Systems and methods for identifying information related to payment card breaches
US20180253350A1 (en) Monitoring node usage in a distributed system
US20160360355A1 (en) Repackaging media content data with anonymous identifiers
US20170024828A1 (en) Systems and methods for identifying information related to payment card testing
US20130031169A1 (en) Conditional location-based reminders
WO2014015233A1 (en) System and method for protecting consumer privacy in the measuring of the effectiveness of advertisements
US11303658B2 (en) System and method for data analysis and detection of threat
US11356469B2 (en) Method and apparatus for estimating monetary impact of cyber attacks
US10452847B2 (en) System call vectorization
CN106708879B (en) Service data processing method and device
US10880691B1 (en) Passively capturing and monitoring device behaviors
CN106875268B (en) Bank account information reminding method, server and terminal
US20210035235A1 (en) System and method for detecting fraud among tax experts
CN110782327B (en) Abnormal information discovery method, device and equipment
US9798626B2 (en) Implementing change data capture by interpreting published events as a database recovery log
US11893629B1 (en) Systems and methods for integrating, aggregating and utilizing data from a plurality of data sources
US10949850B1 (en) Systems and methods for using location services to detect fraud
US20210233082A1 (en) Fraud detection via incremental fraud modeling
US11394735B2 (en) Dynamic record identification and analysis computer system with event monitoring components
US20150169776A1 (en) System and method for displaying contextual data respective of events
EA038077B1 (en) Method and system for marking user actions for subsequent analysis and accumulation
CN114417279A (en) Method and device for processing encryption behavior
EP2829991B1 (en) Systems and methods for signal detection

Legal Events

Date Code Title Description
STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STCV Information on status: appeal procedure

Free format text: NOTICE OF APPEAL FILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED