Patent application number | Description | Published |
20120278246 | FRAUD DETECTION SYSTEM AUTOMATIC RULE POPULATION ENGINE - Embodiments of the invention are directed to a fraud detection system that stores fraud detection rules and merchant profiles. The fraud detection system allows a user to designate fraud detection rules as core fraud detection rules, and the fraud detection system can automatically populate new merchant profiles with the user's core fraud detection rules. | 11-01-2012 |
20120278868 | FRAUD DETECTION SYSTEM AUDIT CAPABILITY - Embodiments of the invention are directed to a fraud detection system that records an audit log of modifications made by a user to a selection of fraud detection rules in a merchant profile. The audit log contains details of the modifications and the user associated with the modifications. A search can be conducted on the audit log to determine details of modifications made to a merchant profile within the fraud detection system. | 11-01-2012 |
20130282583 | FRAUD DETECTION SYSTEM RULE PROFILE INTERACTION - Embodiments of the invention generally relate to methods and systems for generating rule profile reports, the rule profile reports comprising statistical data regarding the performance of rules. One embodiment of the invention discloses a method for generating a rule profile report. The method comprises determining, by a processor, a rule profile, wherein the rule profile comprises a plurality of rules, and wherein each rule in the plurality of rules is associated with a plurality of rule outcomes, determining for the plurality of rules a plurality of rule outcome frequencies associated with the plurality of rule outcomes, wherein each rule outcome in the plurality of rule outcomes is associated with an outcome for a transaction, and providing, by the processor, the plurality of rule outcome frequencies. | 10-24-2013 |
20130346311 | Method and System For Data Security Utilizing User Behavior and Device Identification - Embodiments of the invention broadly described, introduce systems and methods for detecting the likelihood that a transaction is fraudulent using user access pattern data and device fingerprint data. One embodiment of the invention discloses a method for determining the likelihood that a payment transaction is fraudulent. The method comprises receiving user access pattern data generated by a user client computer, receiving a device fingerprint associated with the user client computer conducting a payment transaction, determining, using the user access pattern data and the device fingerprint, a likelihood that the payment transaction is fraudulent. | 12-26-2013 |
20140358789 | ACQUIRER FACING FRAUD MANAGEMENT SYSTEM AND METHOD - Embodiments of the invention are directed to systems, apparatus, and methods for preventing merchant fraud by processing electronic payment transactions using acquirer rules. In some embodiments, a server computer can receive from an acquirer a rule to be applied to transactions conducted with a merchant. A plurality of authorization messages (e.g., request or response messages) can be received, each corresponding to a different transaction conducted with the merchant. An aggregate value can be calculated based on transaction data included in the authorization messages. It can be determined whether the aggregate value triggers the rule. If the rule is triggered, a transaction can be processed in accordance with a first protocol (e.g., by declining authorization or by withholding a settlement amount). If the rule is not triggered, the transaction can be processed in accordance with a second protocol (e.g., by proceeding with the transaction or releasing the full settlement amount). | 12-04-2014 |