×

Risk assessment rule set application for fraud prevention

  • US 10,140,616 B2
  • Filed: 12/11/2017
  • Issued: 11/27/2018
  • Est. Priority Date: 05/07/2009
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for determining and for denying the authorization of fraudulent financial transactions, the computer-implemented method comprising:

  • receiving, via a communication network, by one or more processors, a request to authorize a transaction between a merchant and an account holder on an account issued by an issuer, wherein the transaction includes associated transaction data;

    generating, via the one or more processors, a data structure defining a hyper-rectangle enclosing a multi-dimensional space defined by a plurality of edges, said data structure including data fields storing data for each of the plurality of edges of the hyper-rectangle, said plurality of edges representing a plurality of variable values;

    retrieving, via the one or more processors, a target optimization variable associated with a data set;

    in response to the determination that a number of points within the hyper-rectangle is greater than a minimum support parameter, removing, via the one or more processors, a first plurality of the points proximal to the plurality of edges;

    in response to the determination that the mean value of the target optimization variable is maximized, adding, via the one or more processors, a second set of data fields representing a second plurality of points proximal to the plurality of edges until a threshold is reached;

    bounding, via the one or more processors, the hyper-rectangle within a minimum bounding box, wherein the minimum bounding box defining a subspace confined by those dimensions involved in the first plurality of the points and the second plurality of the points;

    identifying authorization business rules defining the minimum bounding box;

    determining, via the one or more processors, points a plurality of fraud prevention boundary limits based on the determined minimum bounding box;

    determining, via the one or more processors, whether the transaction is fraudulent based on the evaluating the authorization business rules on the received transaction data using the hyper-rectangle; and

    in response to the determination that the transaction is fraudulent, transmitting, via the one or more processors, via the communication network, a denial response to the request to authorize the transaction.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×