WO2008141168A1 - Systèmes et procédés pour une détection de fraude via une analyse de liaison interactive - Google Patents
Systèmes et procédés pour une détection de fraude via une analyse de liaison interactive Download PDFInfo
- Publication number
- WO2008141168A1 WO2008141168A1 PCT/US2008/063229 US2008063229W WO2008141168A1 WO 2008141168 A1 WO2008141168 A1 WO 2008141168A1 US 2008063229 W US2008063229 W US 2008063229W WO 2008141168 A1 WO2008141168 A1 WO 2008141168A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- database
- rules
- fraudulent
- individuals
- generated
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
Definitions
- FIGURE 14 shows one embodiment 1400 of the use of a fraud rule to block, in real-time, fraudulent activity with respect to an imposter attempting to obtain credit history data from a database of credit information.
- Process 1401 controls the logon access to a credit database. This access can be, for example, so that the individual can access his/her credit history.
- a process such as process 1402 queries the accessing user for some combination of attributes uniquely pertaining to that user's data file. Some of thee possible attributes are shown in process 1402, but any number and any combination can be required, and the combination can change depending upon security levels, or depending upon previous query answers.
Abstract
L'invention concerne une détection de fraude qui est facilitée en développant des règles d'adhésion à un groupe de comptes et en les convertissant en des requêtes de base de données via une examen de groupes en rapport/extraits de la base de données client. Les règles d'adhésion à un compte sont basées sur certains modèles de données observés associés à une activité potentiellement frauduleuse. Selon un mode de réalisation, des groupes de comptes sont créés autour des modèles de comportements présentés par des imposteurs. Le système identifie ensuite ces groupes présentant une forte probabilité de fraude et établit des règles d'adhésion à un groupe pour identifier des comptes consécutifs qui correspondent à ces règles. Les règles sont conçues pour définir les paramètres des groupes identifiés. Lorsque les règles sont déployées dans un système de blocage de transaction, lorsqu'une règle appartenant à un agrégat frauduleux identifié est déclenchée, le système de blocage de transaction bloque la transaction pour des nouveaux utilisateurs qui entrent sur le site Web.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US91751807P | 2007-05-11 | 2007-05-11 | |
US60/917,518 | 2007-05-11 | ||
US11744108A | 2008-05-08 | 2008-05-08 | |
US12/117,441 | 2008-05-08 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2008141168A1 true WO2008141168A1 (fr) | 2008-11-20 |
Family
ID=40002609
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2008/063229 WO2008141168A1 (fr) | 2007-05-11 | 2008-05-09 | Systèmes et procédés pour une détection de fraude via une analyse de liaison interactive |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2008141168A1 (fr) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013062713A1 (fr) * | 2011-10-28 | 2013-05-02 | Visa International Service Association | Système et procédé permettant un chaînage d'identité |
US9311351B2 (en) | 2013-03-11 | 2016-04-12 | Sas Institute Inc. | Techniques to block records for matching |
US11354583B2 (en) | 2020-10-15 | 2022-06-07 | Sas Institute Inc. | Automatically generating rules for event detection systems |
US11954218B2 (en) | 2020-02-10 | 2024-04-09 | Visa International Service Association | Real-time access rules using aggregation of periodic historical outcomes |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5790645A (en) * | 1996-08-01 | 1998-08-04 | Nynex Science & Technology, Inc. | Automatic design of fraud detection systems |
US6157864A (en) * | 1998-05-08 | 2000-12-05 | Rockwell Technologies, Llc | System, method and article of manufacture for displaying an animated, realtime updated control sequence chart |
US6163604A (en) * | 1998-04-03 | 2000-12-19 | Lucent Technologies | Automated fraud management in transaction-based networks |
US6597775B2 (en) * | 2000-09-29 | 2003-07-22 | Fair Isaac Corporation | Self-learning real-time prioritization of telecommunication fraud control actions |
US6714918B2 (en) * | 2000-03-24 | 2004-03-30 | Access Business Group International Llc | System and method for detecting fraudulent transactions |
US20060149674A1 (en) * | 2004-12-30 | 2006-07-06 | Mike Cook | System and method for identity-based fraud detection for transactions using a plurality of historical identity records |
US20070039049A1 (en) * | 2005-08-11 | 2007-02-15 | Netmanage, Inc. | Real-time activity monitoring and reporting |
-
2008
- 2008-05-09 WO PCT/US2008/063229 patent/WO2008141168A1/fr active Application Filing
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5790645A (en) * | 1996-08-01 | 1998-08-04 | Nynex Science & Technology, Inc. | Automatic design of fraud detection systems |
US6163604A (en) * | 1998-04-03 | 2000-12-19 | Lucent Technologies | Automated fraud management in transaction-based networks |
US6157864A (en) * | 1998-05-08 | 2000-12-05 | Rockwell Technologies, Llc | System, method and article of manufacture for displaying an animated, realtime updated control sequence chart |
US6714918B2 (en) * | 2000-03-24 | 2004-03-30 | Access Business Group International Llc | System and method for detecting fraudulent transactions |
US6597775B2 (en) * | 2000-09-29 | 2003-07-22 | Fair Isaac Corporation | Self-learning real-time prioritization of telecommunication fraud control actions |
US20060149674A1 (en) * | 2004-12-30 | 2006-07-06 | Mike Cook | System and method for identity-based fraud detection for transactions using a plurality of historical identity records |
US20070039049A1 (en) * | 2005-08-11 | 2007-02-15 | Netmanage, Inc. | Real-time activity monitoring and reporting |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013062713A1 (fr) * | 2011-10-28 | 2013-05-02 | Visa International Service Association | Système et procédé permettant un chaînage d'identité |
US11676146B2 (en) | 2011-10-28 | 2023-06-13 | Visa International Service Association | System and method for identity chaining |
US9311351B2 (en) | 2013-03-11 | 2016-04-12 | Sas Institute Inc. | Techniques to block records for matching |
US11954218B2 (en) | 2020-02-10 | 2024-04-09 | Visa International Service Association | Real-time access rules using aggregation of periodic historical outcomes |
US11354583B2 (en) | 2020-10-15 | 2022-06-07 | Sas Institute Inc. | Automatically generating rules for event detection systems |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10769290B2 (en) | Systems and methods for fraud detection via interactive link analysis | |
Shehnepoor et al. | NetSpam: A network-based spam detection framework for reviews in online social media | |
US11630918B2 (en) | Systems and methods of determining compromised identity information | |
US7373669B2 (en) | Method and system for determining presence of probable error or fraud in a data set by linking common data values or elements | |
CN104077396B (zh) | 一种钓鱼网站检测方法及装置 | |
Bercovitch et al. | HoneyGen: An automated honeytokens generator | |
US6947924B2 (en) | Group based search engine generating search results ranking based on at least one nomination previously made by member of the user group where nomination system is independent from visitation system | |
Zhu et al. | An effective privacy preserving algorithm for neighborhood-based collaborative filtering | |
US7693833B2 (en) | System and method for improving integrity of internet search | |
CN107292189B (zh) | 面向文本检索服务的用户隐私保护方法 | |
AU2017203586A1 (en) | System and methods for identifying compromised personally identifiable information on the internet | |
WO2004081816A1 (fr) | Acces a une base de donnees securisee par le biais d'un codage partiel | |
US20160148319A1 (en) | Method and system for evaluating trustworthiness | |
CN106713347A (zh) | 一种电力移动应用越权访问漏洞检测方法 | |
US11595416B2 (en) | Method, product, and system for maintaining an ensemble of hierarchical machine learning models for detection of security risks and breaches in a network | |
CN110019282A (zh) | 一种信息资产探查系统及方法 | |
WO2008141168A1 (fr) | Systèmes et procédés pour une détection de fraude via une analyse de liaison interactive | |
Xiao et al. | SQL injection attack detection method using expectation criterion | |
Ye et al. | Modeling Access Environment and Behavior Sequence for Financial Identity Theft Detection in E-Commerce Services | |
CN111125747B (zh) | 一种商务网站用户的商品浏览隐私保护方法及系统 | |
US9971814B1 (en) | Monitoring and analysis of social network traffic | |
Aonghusa et al. | Don’t let Google know I’m lonely | |
Gafny et al. | Poster: applying unsupervised context-based analysis for detecting unauthorized data disclosure | |
Schroeder et al. | Crimelink explorer: Using domain knowledge to facilitate automated crime association analysis | |
Varshney et al. | Improving the accuracy of search engine based anti-phishing solutions using lightweight features |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08755228 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 08755228 Country of ref document: EP Kind code of ref document: A1 |