Systems and methods for adaptive identification of sources of fraud
First Claim
1. A method for using a fraud detection engine on a computing system, comprising:
- at the fraud detection engine on the computing system, receiving transaction data from transactions between cardholder accounts and acceptors; and
with the fraud detection engine on the computing system, analyzing transaction data using fuzzy logic, comprising;
identifying, with fuzzy logic, transactions that have a high risk of being fraudulent, wherein identifying the transactions that have a high risk of being fraudulent comprises identifying in real-time the transactions that have a high risk of being fraudulent;
if a transaction has a high risk of being fraudulent, placing the transaction in a set of high-risk transactions to be analyzed; and
identifying sources of fraudulent transactions by analyzing the transactions in the set of high-risk transactions, wherein identifying the sources of fraudulent transactions comprises identifying the sources of fraudulent transactions in batch mode and wherein the computing system has a distributed architecture.
1 Assignment
0 Petitions
Accused Products
Abstract
A fraud detection engine is provided that analyzes transactions for fraudulent transactions. The transactions may include credit card or debit card transactions. The fraud detection engine may identify possible sources of fraud. The fraud detection engine may identify possible phony acceptors that masquerade as genuine merchants. The fraud detection engine may identify compromising points where accounts become compromised and are prone to fraudulent transactions thereafter. The fraud detection engine may receive and analyze transaction data in real-time or in batch mode. The fraud detection engine may use fuzzy logic. The fraud detection engine may use artificial intelligence such as case-based reasoning or business rules.
-
Citations
17 Claims
-
1. A method for using a fraud detection engine on a computing system, comprising:
-
at the fraud detection engine on the computing system, receiving transaction data from transactions between cardholder accounts and acceptors; and with the fraud detection engine on the computing system, analyzing transaction data using fuzzy logic, comprising; identifying, with fuzzy logic, transactions that have a high risk of being fraudulent, wherein identifying the transactions that have a high risk of being fraudulent comprises identifying in real-time the transactions that have a high risk of being fraudulent; if a transaction has a high risk of being fraudulent, placing the transaction in a set of high-risk transactions to be analyzed; and identifying sources of fraudulent transactions by analyzing the transactions in the set of high-risk transactions, wherein identifying the sources of fraudulent transactions comprises identifying the sources of fraudulent transactions in batch mode and wherein the computing system has a distributed architecture. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for using a fraud detection engine on a computing system, comprising:
-
at the fraud detection engine on the computing system, receiving authorization requests between an acceptor and an acquirer; with the fraud detection engine on the computing system, analyzing authorization requests using fuzzy logic, comprising; identifying, in real-time, fraudulent authorization requests; placing the fraudulent authorization requests in a set of high-risk authorization requests; and analyzing, in batch mode, the fraudulent authorization requests in the set of high-risk authorization requests to identify sources of fraudulent authorization requests, wherein the computing system has a distributed architecture; identifying authorization requests received from acceptors on a black list of acceptors; and placing cardholder accounts associated with authorization requests received from the acceptors on the black list of acceptors on a list of high-risk cardholder accounts.
-
Specification