WO2008141168A1 - Systèmes et procédés pour une détection de fraude via une analyse de liaison interactive - Google Patents

Systèmes et procédés pour une détection de fraude via une analyse de liaison interactive Download PDF

Info

Publication number
WO2008141168A1
WO2008141168A1 PCT/US2008/063229 US2008063229W WO2008141168A1 WO 2008141168 A1 WO2008141168 A1 WO 2008141168A1 US 2008063229 W US2008063229 W US 2008063229W WO 2008141168 A1 WO2008141168 A1 WO 2008141168A1
Authority
WO
WIPO (PCT)
Prior art keywords
database
rules
fraudulent
individuals
generated
Prior art date
Application number
PCT/US2008/063229
Other languages
English (en)
Inventor
Stuart L. Crawford
Chris Erickson
Victor Miagkikh
Michael Steele
Megan Thorsen
Sergei Tolmanov
Original Assignee
Fair Isaac Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fair Isaac Corporation filed Critical Fair Isaac Corporation
Publication of WO2008141168A1 publication Critical patent/WO2008141168A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists

Definitions

  • FIGURE 14 shows one embodiment 1400 of the use of a fraud rule to block, in real-time, fraudulent activity with respect to an imposter attempting to obtain credit history data from a database of credit information.
  • Process 1401 controls the logon access to a credit database. This access can be, for example, so that the individual can access his/her credit history.
  • a process such as process 1402 queries the accessing user for some combination of attributes uniquely pertaining to that user's data file. Some of thee possible attributes are shown in process 1402, but any number and any combination can be required, and the combination can change depending upon security levels, or depending upon previous query answers.

Abstract

L'invention concerne une détection de fraude qui est facilitée en développant des règles d'adhésion à un groupe de comptes et en les convertissant en des requêtes de base de données via une examen de groupes en rapport/extraits de la base de données client. Les règles d'adhésion à un compte sont basées sur certains modèles de données observés associés à une activité potentiellement frauduleuse. Selon un mode de réalisation, des groupes de comptes sont créés autour des modèles de comportements présentés par des imposteurs. Le système identifie ensuite ces groupes présentant une forte probabilité de fraude et établit des règles d'adhésion à un groupe pour identifier des comptes consécutifs qui correspondent à ces règles. Les règles sont conçues pour définir les paramètres des groupes identifiés. Lorsque les règles sont déployées dans un système de blocage de transaction, lorsqu'une règle appartenant à un agrégat frauduleux identifié est déclenchée, le système de blocage de transaction bloque la transaction pour des nouveaux utilisateurs qui entrent sur le site Web.
PCT/US2008/063229 2007-05-11 2008-05-09 Systèmes et procédés pour une détection de fraude via une analyse de liaison interactive WO2008141168A1 (fr)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US91751807P 2007-05-11 2007-05-11
US60/917,518 2007-05-11
US11744108A 2008-05-08 2008-05-08
US12/117,441 2008-05-08

Publications (1)

Publication Number Publication Date
WO2008141168A1 true WO2008141168A1 (fr) 2008-11-20

Family

ID=40002609

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2008/063229 WO2008141168A1 (fr) 2007-05-11 2008-05-09 Systèmes et procédés pour une détection de fraude via une analyse de liaison interactive

Country Status (1)

Country Link
WO (1) WO2008141168A1 (fr)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013062713A1 (fr) * 2011-10-28 2013-05-02 Visa International Service Association Système et procédé permettant un chaînage d'identité
US9311351B2 (en) 2013-03-11 2016-04-12 Sas Institute Inc. Techniques to block records for matching
US11354583B2 (en) 2020-10-15 2022-06-07 Sas Institute Inc. Automatically generating rules for event detection systems
US11954218B2 (en) 2020-02-10 2024-04-09 Visa International Service Association Real-time access rules using aggregation of periodic historical outcomes

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5790645A (en) * 1996-08-01 1998-08-04 Nynex Science & Technology, Inc. Automatic design of fraud detection systems
US6157864A (en) * 1998-05-08 2000-12-05 Rockwell Technologies, Llc System, method and article of manufacture for displaying an animated, realtime updated control sequence chart
US6163604A (en) * 1998-04-03 2000-12-19 Lucent Technologies Automated fraud management in transaction-based networks
US6597775B2 (en) * 2000-09-29 2003-07-22 Fair Isaac Corporation Self-learning real-time prioritization of telecommunication fraud control actions
US6714918B2 (en) * 2000-03-24 2004-03-30 Access Business Group International Llc System and method for detecting fraudulent transactions
US20060149674A1 (en) * 2004-12-30 2006-07-06 Mike Cook System and method for identity-based fraud detection for transactions using a plurality of historical identity records
US20070039049A1 (en) * 2005-08-11 2007-02-15 Netmanage, Inc. Real-time activity monitoring and reporting

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5790645A (en) * 1996-08-01 1998-08-04 Nynex Science & Technology, Inc. Automatic design of fraud detection systems
US6163604A (en) * 1998-04-03 2000-12-19 Lucent Technologies Automated fraud management in transaction-based networks
US6157864A (en) * 1998-05-08 2000-12-05 Rockwell Technologies, Llc System, method and article of manufacture for displaying an animated, realtime updated control sequence chart
US6714918B2 (en) * 2000-03-24 2004-03-30 Access Business Group International Llc System and method for detecting fraudulent transactions
US6597775B2 (en) * 2000-09-29 2003-07-22 Fair Isaac Corporation Self-learning real-time prioritization of telecommunication fraud control actions
US20060149674A1 (en) * 2004-12-30 2006-07-06 Mike Cook System and method for identity-based fraud detection for transactions using a plurality of historical identity records
US20070039049A1 (en) * 2005-08-11 2007-02-15 Netmanage, Inc. Real-time activity monitoring and reporting

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013062713A1 (fr) * 2011-10-28 2013-05-02 Visa International Service Association Système et procédé permettant un chaînage d'identité
US11676146B2 (en) 2011-10-28 2023-06-13 Visa International Service Association System and method for identity chaining
US9311351B2 (en) 2013-03-11 2016-04-12 Sas Institute Inc. Techniques to block records for matching
US11954218B2 (en) 2020-02-10 2024-04-09 Visa International Service Association Real-time access rules using aggregation of periodic historical outcomes
US11354583B2 (en) 2020-10-15 2022-06-07 Sas Institute Inc. Automatically generating rules for event detection systems

Similar Documents

Publication Publication Date Title
US10769290B2 (en) Systems and methods for fraud detection via interactive link analysis
Shehnepoor et al. NetSpam: A network-based spam detection framework for reviews in online social media
US11630918B2 (en) Systems and methods of determining compromised identity information
US7373669B2 (en) Method and system for determining presence of probable error or fraud in a data set by linking common data values or elements
CN104077396B (zh) 一种钓鱼网站检测方法及装置
Bercovitch et al. HoneyGen: An automated honeytokens generator
US6947924B2 (en) Group based search engine generating search results ranking based on at least one nomination previously made by member of the user group where nomination system is independent from visitation system
Zhu et al. An effective privacy preserving algorithm for neighborhood-based collaborative filtering
US7693833B2 (en) System and method for improving integrity of internet search
CN107292189B (zh) 面向文本检索服务的用户隐私保护方法
AU2017203586A1 (en) System and methods for identifying compromised personally identifiable information on the internet
WO2004081816A1 (fr) Acces a une base de donnees securisee par le biais d'un codage partiel
US20160148319A1 (en) Method and system for evaluating trustworthiness
CN106713347A (zh) 一种电力移动应用越权访问漏洞检测方法
US11595416B2 (en) Method, product, and system for maintaining an ensemble of hierarchical machine learning models for detection of security risks and breaches in a network
CN110019282A (zh) 一种信息资产探查系统及方法
WO2008141168A1 (fr) Systèmes et procédés pour une détection de fraude via une analyse de liaison interactive
Xiao et al. SQL injection attack detection method using expectation criterion
Ye et al. Modeling Access Environment and Behavior Sequence for Financial Identity Theft Detection in E-Commerce Services
CN111125747B (zh) 一种商务网站用户的商品浏览隐私保护方法及系统
US9971814B1 (en) Monitoring and analysis of social network traffic
Aonghusa et al. Don’t let Google know I’m lonely
Gafny et al. Poster: applying unsupervised context-based analysis for detecting unauthorized data disclosure
Schroeder et al. Crimelink explorer: Using domain knowledge to facilitate automated crime association analysis
Varshney et al. Improving the accuracy of search engine based anti-phishing solutions using lightweight features

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08755228

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 08755228

Country of ref document: EP

Kind code of ref document: A1