Method and system for detecting, monitoring and addressing data compromises
First Claim
1. An automated computer implemented method for detecting one or more data compromises, wherein the method is executed by a programmed computer processor which communicates with a user via a network, the method comprising the steps of:
- detecting, via a computer processor, an activity indicative of a data compromise based at least in part on a compromise detection report involving at least one of merchant compromise report, region compromise report and acquirer compromise report, wherein the compromise detection report is generated by an automated detection algorithm using account data associated with at least one merchant;
classifying, via a computer processor, the activity based on a combination of risk level, size of data compromise and fraud severity; and
identifying a specific mitigation response to the activity through an interface.
1 Assignment
0 Petitions
Accused Products
Abstract
According to an embodiment of the present invention, an automated computer implemented method for detecting one or more data compromises comprises the steps of detecting an activity indicative of a data compromise based at least in part on a compromise detection report involving at least one of merchant compromise report, region compromise report and acquirer compromise report, wherein the compromise detection report is generated by an automated detection algorithm; classifying the activity based on a combination of risk level, size of data compromise and fraud severity; and identifying a specific mitigation response to the activity through an interface. Another embodiment of the present invention determines whether one or more accounts associated with the activity have been probed or tested by a fraudster to determine if the one or more accounts are valid.
-
Citations
21 Claims
-
1. An automated computer implemented method for detecting one or more data compromises, wherein the method is executed by a programmed computer processor which communicates with a user via a network, the method comprising the steps of:
-
detecting, via a computer processor, an activity indicative of a data compromise based at least in part on a compromise detection report involving at least one of merchant compromise report, region compromise report and acquirer compromise report, wherein the compromise detection report is generated by an automated detection algorithm using account data associated with at least one merchant; classifying, via a computer processor, the activity based on a combination of risk level, size of data compromise and fraud severity; and identifying a specific mitigation response to the activity through an interface. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An automated computer implemented system for detecting one or more data compromises, the system comprising:
-
a detection module, comprising a computer processor, configured to detect an activity indicative of a data compromise based at least in part on a compromise detection report involving at least one of merchant compromise report, region compromise report and acquirer compromise report, wherein the compromise detection report is generated by an automated detection algorithm using account data associated with at least one merchant; a classification module, comprising a computer processor, configured to classify the activity based on a combination of risk level, size of data compromise and fraud severity; and a mitigation module, comprising a computer processor, configured to identify a specific mitigation response to the activity through an interface. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. An automated computer implemented method for detecting one or more data compromises, wherein the method is executed by a programmed computer processor which communicates with a user via a network, the method comprising the steps of:
-
detecting, via a computer processor, an activity indicative of a data compromise based at least in part on a compromise detection report involving at least one of merchant compromise report, region compromise report and acquirer compromise report, wherein the compromise detection report is generated by an automated detection algorithm using account data associated with at least one merchant; determining, via a computer processor, whether one or more accounts associated with the activity have been probed by a fraudster to determine if the one or more accounts are valid; classifying, via a computer processor, the activity based on a combination of risk level, size of data compromise and fraud severity; and identifying, via a computer processor, a specific mitigation response to the activity through an interface; wherein the merchant compromise report identities one or more common merchants where authorizations were swiped with one or more counterfeit cards;
wherein an account fraud rate is calculated for each common merchant, wherein the account fraud rate represents a number of counterfeit fraud accounts as compared to a total of accounts transacted at a merchant;wherein the region compromise report identifies one or more non-U.S. countries having an increase in account fraud rate for a predetermined time period;
wherein one or more card transactions that have turned fraud during a predetermined time period occurred in the identified one or more countries; andwherein the acquirer compromise report identities one or more common acquirers with authorizations involving one or more fraud card numbers.
-
Specification