RISK ASSESSMENT RULE SET APPLICATION FOR FRAUD PREVENTION
First Claim
1. A computer-implemented method for determining and for denying the authorization of fraudulent financial transactions, the method comprising:
- receiving, via a communication network, a request to authorize a transaction between a merchant and an account holder on an account issued by an issuer, wherein the transaction includes associated transaction data;
generating, via one or more processors, a hyper-rectangle enclosing a multi-dimensional space defined by a plurality of input variable values;
retrieving, via the one or more processors, a target optimization variable associated with the data set;
in response to the determination that a number of the points within the hyper-rectangle is greater than a minimum support parameter, removing, via the one or more processors, a first plurality of points proximal to the plurality of edges;
in response to the determination that the mean value of the target optimization variable is maximized, adding, via the one or more processors, a second plurality of points proximal to the plurality of edges;
bounding, via the one or more processors, the hyper-rectangle within a minimum bounding box;
determining, via the one or more processors, a plurality of fraud prevention boundary limits based on the determined minimum bounding box;
determining, via the one or more processors, whether the transaction is fraudulent based on the application of the plurality of fraud prevention boundary limits on the received transaction data; and
in response to the determination that the transaction is fraudulent, transmitting, via the communication network, a denial response to the request to authorize the transaction.
1 Assignment
0 Petitions
Accused Products
Abstract
Rules, applied to deny authorization of likely fraudulent transactions, are derived from a modified Patient Rule Induction Method algorithm that uses a target variable and a data set of past transactions each associated with a plurality of input variables and a hyper-rectangle enclosing a multi-dimensional space defined by a representation of the input variable values as points within the multi-dimensional space. While a count of the points within the hyper-rectangle is greater than a minimum support parameter, a first plurality of points proximal to edges of the hyper-rectangle are removed, where each such removing maximizes a mean value of the target variable, and then, while the mean value remains maximized, a second plurality of points proximal to the edges is added, where each adding maximizes or maintains the mean value. The hyper-rectangle is bounded within a minimum bounding box that defines the rules.
-
Citations
19 Claims
-
1. A computer-implemented method for determining and for denying the authorization of fraudulent financial transactions, the method comprising:
-
receiving, via a communication network, a request to authorize a transaction between a merchant and an account holder on an account issued by an issuer, wherein the transaction includes associated transaction data; generating, via one or more processors, a hyper-rectangle enclosing a multi-dimensional space defined by a plurality of input variable values; retrieving, via the one or more processors, a target optimization variable associated with the data set; in response to the determination that a number of the points within the hyper-rectangle is greater than a minimum support parameter, removing, via the one or more processors, a first plurality of points proximal to the plurality of edges; in response to the determination that the mean value of the target optimization variable is maximized, adding, via the one or more processors, a second plurality of points proximal to the plurality of edges; bounding, via the one or more processors, the hyper-rectangle within a minimum bounding box; determining, via the one or more processors, a plurality of fraud prevention boundary limits based on the determined minimum bounding box; determining, via the one or more processors, whether the transaction is fraudulent based on the application of the plurality of fraud prevention boundary limits on the received transaction data; and in response to the determination that the transaction is fraudulent, transmitting, via the communication network, a denial response to the request to authorize the transaction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer-readable medium having instructions stored thereon and executable by one or more processors to perform a method for determining and for denying the authorization of fraudulent financial transactions, the method comprising:
-
receiving, via a communication network, a request to authorize a transaction between a merchant and an account holder on an account issued by an issuer, wherein the transaction includes associated transaction data; generating, via one or more processors, a hyper-rectangle enclosing a multi-dimensional space defined by a plurality of input variable values; retrieving, via the one or more processors, a target optimization variable associated with the data set; in response to the determination that a number of the points within the hyper-rectangle is greater than a minimum support parameter, removing, via the one or more processors, a first plurality of points proximal to the plurality of edges; in response to the determination that the mean value of the target optimization variable is maximized, adding, via the one or more processors, a second plurality of points proximal to the plurality of edges; bounding, via the one or more processors, the hyper-rectangle within a minimum bounding box; determining, via the one or more processors, a plurality of fraud prevention boundary limits based on the determined minimum bounding box; determining, via the one or more processors, whether the transaction is fraudulent based on the application of the plurality of fraud prevention boundary limits on the received transaction data; and in response to the determination that the transaction is fraudulent, transmitting, via the communication network, a denial response to the request to authorize the transaction.
-
-
19. A system for determining and for denying the authorization of fraudulent financial transactions, the system comprising:
a transaction handler that includes one or more processors, the transaction handler configured to; receive, via a communication network, a request to authorize a transaction between a merchant and an account holder on an account issued by an issuer, wherein the transaction includes associated transaction data; generate, via one or more processors, a hyper-rectangle enclosing a multi-dimensional space defined by a plurality of input variable values; retrieve, via the one or more processors, a target optimization variable associated with the data set; in response to the determination that a number of the points within the hyper-rectangle is greater than a minimum support parameter, remove, via the one or more processors, a first plurality of points proximal to the plurality of edges; in response to the determination that the mean value of the target optimization variable is maximized, add, via the one or more processors, a second plurality of points proximal to the plurality of edges; bound, via the one or more processors, the hyper-rectangle within a minimum bounding box; determine, via the one or more processors, a plurality of fraud prevention boundary limits based on the determined minimum bounding box; determine, via the one or more processors, whether the transaction is fraudulent based on the application of the plurality of fraud prevention boundary limits on the received transaction data; and in response to the determination that the transaction is fraudulent, transmit, via the communication network, a denial response to the request to authorize the transaction.
Specification