SYSTEM AND METHOD FOR EVALUATING RISK IN FRAUD PREVENTION
First Claim
1. A computer-implemented method executable by one or more computing devices, the method being for use with a merchant, the method comprising:
- receiving transaction data associated with a not yet completed transaction from the merchant, the transaction data comprising one or more first characteristics related to the transaction;
selecting a profile identifying a plurality of network devices each associated with the one or more first characteristics, each of the plurality of network devices being associated with a reputation;
determining a profile-based risk factor as a function of a percentage of the plurality of network devices of the profile having a negative reputation;
determining a risk score as a function of the profile-based risk factor; and
providing the risk score to the merchant to be used thereby to determine whether to proceed with the transaction.
4 Assignments
0 Petitions
Accused Products
Abstract
A method of determining a risk score indicating a risk that an electronic transaction will involve fraud and/or abuse. The method includes receiving transaction data associated with a not yet completed transaction from a merchant. The transaction data includes one or more characteristics related to the transaction. A profile is selected that identifies network devices each associated with the characteristics and having a device reputation. Next, a profile-based risk factor is determined as a function of a percentage of the network devices having a negative reputation. The risk score is determined as a function of the profile-based risk factor. In some embodiments, a transaction-based risk factor may also be determined. In such embodiments, the risk score is determined as a function of the profile-based and transaction-based risk factors. The risk score is provided to the merchant to be used thereby to determine whether to proceed with the transaction.
195 Citations
21 Claims
-
1. A computer-implemented method executable by one or more computing devices, the method being for use with a merchant, the method comprising:
-
receiving transaction data associated with a not yet completed transaction from the merchant, the transaction data comprising one or more first characteristics related to the transaction; selecting a profile identifying a plurality of network devices each associated with the one or more first characteristics, each of the plurality of network devices being associated with a reputation; determining a profile-based risk factor as a function of a percentage of the plurality of network devices of the profile having a negative reputation; determining a risk score as a function of the profile-based risk factor; and providing the risk score to the merchant to be used thereby to determine whether to proceed with the transaction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computer-implemented method executable by one or more computing devices, the method being for use with a merchant, the method comprising:
-
receiving transaction data associated with a not yet completed transaction from the merchant, the transaction data comprising one or more first characteristics related to the transaction; selecting a plurality of profiles each identifying at least a portion of the one or more first characteristics; for each of the plurality of profiles, identifying a plurality of network devices each associated with the portion of the one or more first characteristics identified by the profile, each of the plurality of network devices being associated with a reputation; for each of the plurality of profiles, determining a profile-based risk factor as a function of a percentage of the plurality of network devices identified for the profile having a negative reputation; determining a risk score as a function of the profile-based risk factors determined for the plurality of profiles; and providing the risk score to the merchant to be used thereby to determine whether to proceed with the transaction. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
-
21. A method for use with a database storing transaction data related to a plurality of past transactions between a plurality of network devices and a plurality of merchants, each of the plurality of network devices being associated with a device identifier, the method comprising:
-
identifying as fraudulent devices ones of the plurality of network devices associated with fraudulent or abusive transactions in the transaction data; associating a negative reputation with each of the fraudulent devices; identifying characteristics common to the fraudulent devices; constructing a plurality of profiles based on the identified characteristics, each of the profiles comprising one or more of the identified characteristics; receiving new transaction data associated with a not yet completed transaction; for each of the plurality of profiles, identifying a value for each of the one or more identified characteristics of the profile included in the new transaction data; for each of the plurality of profiles, identifying as belonging to the profile ones of the plurality of network devices associated with the value identified for each of the one or more identified characteristics of the profile; for each of the plurality of profiles, determining a portion of the ones of the plurality of network devices that belong to the profile that are fraudulent devices; and constructing a risk score based at least in part on the portion of the ones of the plurality of network devices that belong to each of the profiles that are fraudulent devices.
-
Specification