SYSTEM AND METHOD FOR MANAGING A FRAUD EXCHANGE
First Claim
1. A computer system for managing and enabling communication of information potentially pertinent to identifying fraudulent activity, the computer system comprising:
- a memory storing a plurality of data points identified as pertinent to potentially fraudulent activity, the plurality of data points including a first data point received from a first source system and a second data point received from a second source system different than the first source system;
at least one processor coupled to the memory;
a producer interface executed by the at least one processor and configured to receive, from a plurality of source systems, requests to store the plurality of data points, the plurality of source systems including the first source system and the second source system;
a fraud exchange engine executed by the at least one processor and configured to perform an analysis of the plurality of data points including the first data point and the second data point to produce at least one relational data point, wherein the relational data point is stored in the memory; and
a consumer interface executed by the at least one processor and configured to receive, from at least one target system, a request to retrieve at least one of a set of the plurality of data points and the at least one relational data point.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for presenting fraud detection information are presented. In one example, a computer system for managing and enabling communication of information potentially pertinent to identifying fraudulent activity receives requests via a producer interface, to store a plurality of data points potentially pertinent to identifying fraudulent activity from a plurality of source systems. A fraud exchange engine performs an analysis of the data points to produce a relational data point. And a consumer interface receives, from at least one target system, a request to retrieve at least one of a set of the plurality of data points and the at least one relational data point.
33 Citations
34 Claims
-
1. A computer system for managing and enabling communication of information potentially pertinent to identifying fraudulent activity, the computer system comprising:
-
a memory storing a plurality of data points identified as pertinent to potentially fraudulent activity, the plurality of data points including a first data point received from a first source system and a second data point received from a second source system different than the first source system; at least one processor coupled to the memory; a producer interface executed by the at least one processor and configured to receive, from a plurality of source systems, requests to store the plurality of data points, the plurality of source systems including the first source system and the second source system; a fraud exchange engine executed by the at least one processor and configured to perform an analysis of the plurality of data points including the first data point and the second data point to produce at least one relational data point, wherein the relational data point is stored in the memory; and a consumer interface executed by the at least one processor and configured to receive, from at least one target system, a request to retrieve at least one of a set of the plurality of data points and the at least one relational data point. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer implemented method for managing and enabling communication of information potentially pertinent to identifying fraudulent activity, the method comprising:
-
receiving, by a computer, a plurality of data points potentially pertinent to identifying fraudulent activity from a plurality of source systems, the plurality of data points including a first data point received from a first source system and a second data point received from a second source system different than the first source system, the plurality of source systems including the first source system and the second source system; storing, by the computer, the plurality of data points in memory; performing an analysis of the plurality of data points including the first data point and the second data point to produce at least one relational data point; storing, by the computer, the at least one relational data point in the memory; and receiving, by the computer, from at least one target system, a request to retrieve at least one of a set of data points and the at least one relational data point. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 33, 34)
-
-
32. A non-transitory computer readable medium having stored thereon sequences of instruction for managing information potentially pertinent to identifying fraudulent activity including instructions that will cause at least one processor to:
-
receive a plurality of data points potentially pertinent to identifying fraudulent activity from a plurality of source systems, the plurality of data points including a first data point received from a first source system and a second data point received from a second source system different than the first source system; store, by a computer, the plurality of data points in memory; perform an analysis of the plurality of data points including the first data point and the second data point to produce at least one relational data point; store, by the computer, the at least one relational data point in memory; and receive, by the computer, from at least one target system, a request to retrieve at least one of a set of data points and the at least one relational data point.
-
Specification