Fraud detection system audit capability
First Claim
Patent Images
1. A method comprising:
- providing, by a server computer, a user interface on a first computer for viewing and modifying a plurality of fraud detection rules for detecting fraudulent transactions;
receiving, by the server computer, a modification to a first fraud detection rule from the plurality of fraud detection rules from a user via the user interface;
recording, by the server computer, the modification in a database by creating a first entry for the modification, the first entry including a field indicating a user identifier associated with the user;
subsequent to recording the modification, providing, by the server computer, the user interface on a second computer;
receiving, by the server computer, via the user interface on the second computer, a search request for prior modifications associated with the first fraud detection rule, the search request including a search parameter corresponding to the first fraud detection rule;
searching the database, by the server computer, for entries of the prior modifications associated with the first fraud detection rule using the search parameter; and
returning, by the server computer, a search result to the second computer, wherein the search result includes the user identifier of the user who modified the first fraud detection rule in the first entry.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the invention are directed to a fraud detection system that records an audit log of modifications made by a user to a selection of fraud detection rules in a merchant profile. The audit log contains details of the modifications and the user associated with the modifications. A search can be conducted on the audit log to determine details of modifications made to a merchant profile within the fraud detection system.
-
Citations
20 Claims
-
1. A method comprising:
-
providing, by a server computer, a user interface on a first computer for viewing and modifying a plurality of fraud detection rules for detecting fraudulent transactions; receiving, by the server computer, a modification to a first fraud detection rule from the plurality of fraud detection rules from a user via the user interface; recording, by the server computer, the modification in a database by creating a first entry for the modification, the first entry including a field indicating a user identifier associated with the user; subsequent to recording the modification, providing, by the server computer, the user interface on a second computer; receiving, by the server computer, via the user interface on the second computer, a search request for prior modifications associated with the first fraud detection rule, the search request including a search parameter corresponding to the first fraud detection rule; searching the database, by the server computer, for entries of the prior modifications associated with the first fraud detection rule using the search parameter; and returning, by the server computer, a search result to the second computer, wherein the search result includes the user identifier of the user who modified the first fraud detection rule in the first entry. - View Dependent Claims (2, 3, 4, 5, 6, 7, 20)
-
-
8. A server computer comprising:
-
a processor; and a non-transitory computer-readable storage medium, comprising code executable by the processor for implementing a method comprising; providing a user interface on a first computer for viewing and modifying a plurality of fraud detection rules for detecting fraudulent transactions; receiving a modification to a first fraud detection rule from the plurality of fraud detection rules from a user via the user interface; recording the modification in a database by creating a first entry for the modification, the first entry including a field indicating a user identifier associated with the user; subsequent to recording the modification, providing the user interface on a second computer; receiving via the user interface on the second computer, a search request for prior modifications associated with the first fraud detection rule, the search request including a search parameter corresponding to the first fraud detection rule; searching the database for entries of the prior modifications associated with the first fraud detection rule using the search parameter; and returning a search result to the second computer, wherein the search result includes the user identifier of the user who modified the first fraud detection rule in the first entry. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method comprising:
-
receiving, by a client computer, a user interface for modifying and searching a plurality of fraud detection rules for detecting fraudulent transactions; transmitting, by the client computer, to a fraud detection system via a communications network, a set of search parameters for conducting a search for modifications to the plurality of fraud detection rules in a merchant profile in a fraud rules modification database, the search parameters provided via the user interface; and receiving, by the client computer, from the fraud detection system, a search result based on the set of search parameters, wherein the search result includes user information of a user who modified the plurality of fraud detection rules. - View Dependent Claims (16, 17)
-
-
18. A client computer comprising:
-
a processor; and a non-transitory computer-readable storage medium, comprising code executable by the processor for implementing a method comprising; receiving a user interface for modifying and searching a plurality of fraud detection rules for detecting fraudulent transactions; transmitting to a fraud detection system via a communications network, a set of search parameters for conducting a search for modifications to the plurality of fraud detection rules in a merchant profile in a fraud rules modification database, the search parameters provided via the user interface; and receiving from the fraud detection system, a search result based on the set of search parameters, wherein the search result includes user information of a user who modified the plurality of fraud detection rules. - View Dependent Claims (19)
-
Specification