Risk assessment rule set application for fraud prevention
First Claim
1. A computer-implemented method for determining and for denying the authorization of fraudulent financial transactions, the method comprising:
- receiving, via a communication network, a request to authorize a transaction between a merchant and an account holder on an account issued by an issuer, wherein the transaction includes associated transaction data;
generating, via one or more processors, a hyper-rectangle enclosing a multi-dimensional space defined by a plurality of input variable values, wherein;
i) the plurality of input variable values respectively correspond to a plurality of transaction parameter input variables that are represented as points within the multi-dimensional space,ii) the hyper-rectangle includes a plurality of edges, each edge associated with one of the plurality of transaction parameter input variables,iii) the plurality of transaction parameter input variables is associated with a data set, andiv) the data set corresponds to information from a plurality of historical transactions, wherein each historical transaction was conducted between one of a plurality of merchants and one of a plurality of account holders on a corresponding account of the one of plurality of account holders issued by one of a plurality of issuers;
retrieving, via the one or more processors, a target optimization variable associated with the data set, wherein the target optimization variable i) is one of the plurality of transaction parameter input variables to be optimized to a specified and desired threshold and ii) represents an output value based on at least one of the plurality of input variable values;
in response to the determination that a number of the points within the hyper-rectangle is greater than a minimum support parameter, removing, via the one or more processors, a first plurality of points proximal to the plurality of edges, wherein said removing maximizes a mean value of the target optimization variable for the hyper-rectangle;
in response to the determination that the mean value of the target optimization variable is maximized, adding, via the one or more processors, a second plurality of points proximal to the plurality of edges, wherein said adding maximizes or maintains the mean value of the target optimization variable;
bounding, via the one or more processors, the hyper-rectangle within a minimum bounding box, the minimum bounding box defining dimensions involved at least in the removal of the first plurality of points and the addition of the second plurality of points;
determining, via the one or more processors, a plurality of fraud prevention boundary limits based on the determined minimum bounding box;
determining, via the one or more processors, whether the transaction is fraudulent based on the application of the plurality of fraud prevention boundary limits on the received transaction data; and
in response to the determination that the transaction is fraudulent, transmitting, via the communication network, a denial response to the request to authorize the transaction.
2 Assignments
0 Petitions
Accused Products
Abstract
Rules, applied to deny authorization of likely fraudulent transactions, are derived from a modified Patient Rule Induction Method algorithm that uses a target variable and a data set of past transactions each associated with a plurality of input variables and a hyper-rectangle enclosing a multi-dimensional space defined by a representation of the input variable values as points within the multi-dimensional space. While a count of the points within the hyper-rectangle is greater than a minimum support parameter, a first plurality of points proximal to edges of the hyper-rectangle are removed, where each such removing maximizes a mean value of the target variable, and then, while the mean value remains maximized, a second plurality of points proximal to the edges is added, where each adding maximizes or maintains the mean value. The hyper-rectangle is bounded within a minimum bounding box that defines the rules.
-
Citations
12 Claims
-
1. A computer-implemented method for determining and for denying the authorization of fraudulent financial transactions, the method comprising:
-
receiving, via a communication network, a request to authorize a transaction between a merchant and an account holder on an account issued by an issuer, wherein the transaction includes associated transaction data; generating, via one or more processors, a hyper-rectangle enclosing a multi-dimensional space defined by a plurality of input variable values, wherein; i) the plurality of input variable values respectively correspond to a plurality of transaction parameter input variables that are represented as points within the multi-dimensional space, ii) the hyper-rectangle includes a plurality of edges, each edge associated with one of the plurality of transaction parameter input variables, iii) the plurality of transaction parameter input variables is associated with a data set, and iv) the data set corresponds to information from a plurality of historical transactions, wherein each historical transaction was conducted between one of a plurality of merchants and one of a plurality of account holders on a corresponding account of the one of plurality of account holders issued by one of a plurality of issuers; retrieving, via the one or more processors, a target optimization variable associated with the data set, wherein the target optimization variable i) is one of the plurality of transaction parameter input variables to be optimized to a specified and desired threshold and ii) represents an output value based on at least one of the plurality of input variable values; in response to the determination that a number of the points within the hyper-rectangle is greater than a minimum support parameter, removing, via the one or more processors, a first plurality of points proximal to the plurality of edges, wherein said removing maximizes a mean value of the target optimization variable for the hyper-rectangle; in response to the determination that the mean value of the target optimization variable is maximized, adding, via the one or more processors, a second plurality of points proximal to the plurality of edges, wherein said adding maximizes or maintains the mean value of the target optimization variable; bounding, via the one or more processors, the hyper-rectangle within a minimum bounding box, the minimum bounding box defining dimensions involved at least in the removal of the first plurality of points and the addition of the second plurality of points; determining, via the one or more processors, a plurality of fraud prevention boundary limits based on the determined minimum bounding box; determining, via the one or more processors, whether the transaction is fraudulent based on the application of the plurality of fraud prevention boundary limits on the received transaction data; and in response to the determination that the transaction is fraudulent, transmitting, via the communication network, a denial response to the request to authorize the transaction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
Specification