US20030097320A1 - Method and system of data analysis for the detection of fraudulent financial transactions - Google Patents

Method and system of data analysis for the detection of fraudulent financial transactions Download PDF

Info

Publication number
US20030097320A1
US20030097320A1 US10/152,169 US15216902A US2003097320A1 US 20030097320 A1 US20030097320 A1 US 20030097320A1 US 15216902 A US15216902 A US 15216902A US 2003097320 A1 US2003097320 A1 US 2003097320A1
Authority
US
United States
Prior art keywords
complexity
transaction
information
catalog
unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/152,169
Inventor
Goren Gordon
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gordonomics Ltd
Original Assignee
Gordonomics Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from PCT/IL2001/001074 external-priority patent/WO2002046960A2/en
Application filed by Gordonomics Ltd filed Critical Gordonomics Ltd
Assigned to GORDONOMICS LTD. reassignment GORDONOMICS LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: GORDON, GOREN
Priority to EP03723023A priority Critical patent/EP1552442A4/en
Priority to AU2003235990A priority patent/AU2003235990A1/en
Priority to PCT/IL2003/000396 priority patent/WO2003098505A1/en
Publication of US20030097320A1 publication Critical patent/US20030097320A1/en
Priority to IL16511004A priority patent/IL165110A0/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0201Market modelling; Market analysis; Collecting market data

Definitions

  • the present invention generally relates to a system and method for detecting and analyzing information units. More specifically, the present invention relates to the analysis and evaluation of data records by selecting particular aspects of the data record.
  • Enormous volumes of data and information are accessible to users worldwide as a consequence of the so-called Information Age.
  • Information Age The development of computerized databases, high-volume storage devices and the capability of transmitting data over global data communications networks provides a great influx of data which is not always processed and evaluated completely. Due to the massive quantities of data and information and the resources required for the processing thereof, the evaluation processes are typically incomplete.
  • Financial organizations that provide credit card usage supervision services, transaction processing services, business indicator analysis services and the like are handling an immense amount of data records daily. The large amount of data records that are formed by business transactions initiated and performed by credit card holders are typically transmitted to credit card supervision transaction services organizations (CCTSO) for appropriate processing.
  • CCTSO credit card supervision transaction services organizations
  • the required processing includes the updating of the relevant accounts of the credit card holders, the updating of the accounts of the services and goods suppliers, and the creation of records associated with clearing instructions.
  • the update of the relevant accounts includes the entire set of information units associated with a single transaction, such as credit card number and type, account number, transaction date, point of sale, type of goods or services purchased and the like. Further processing of data by the CCTSO includes the validation, error checking, authorization, and evaluation of the transaction and most importantly detection or identification of fraudulent transactions.
  • a suitable “watchdog” procedure is performed such as the issuance of an alert, a warning message or other pre-defined set of operating instructions that are transmitted to the appropriate functionaries within the CCSTO and, if applicable, transmitted in real-time back to the point of sale to be displayed on the supplier's display device.
  • Detection of fraudulent credit card usage requires the CCTSO to analyze a particular transaction initiated and performed by credit card holder by comparing transaction-specific information, such as personal characteristics of the cardholder. The characteristics may include age, address, previous credit card usage and the like. The type of goods or services purchased, the price, the location of the point of sale are also analyzed in order to detect unusual transaction patterns. The immense amount of transactions performed and the urgency concerning the detection of fraudulent behavior as soon as possible consequent to its occurrence necessitates the utilization of sophisticated computerized systems. Computerized evaluations of transactions and the identification of fraudulent behavior are known in the art. Typically these procedures are commonly performed by specific computer programs utilizing large decision trees. As a result, the CCTSO has the ability to recognize obvious fraudulent behavior.
  • one anomalous transaction could be associated with a credit card holder that purchases goods and services in a total sum that is significantly higher than the amounts used in prior transactions of the same cardholder.
  • the CCTSO is typically maintains within its computerized database price limits regarding acceptable usage of a specific credit card.
  • the anomalous credit card usage could effect a suitable alert or warning.
  • decision trees as currently known in the art are substantially limited and thereby can provide only comparatively simple diagnosis. All too often the diagnosis is inaccurate and as a result fraudulent transactions are ignored while valid transactions could generate an alert. Erroneous diagnosis, which generates non-justified alerts, warnings or operating instructions, has many disadvantages for a CCTSO or any other organizations utilizing computerized analysis and evaluation of data.
  • CCTSO Erroneous diagnosis provided by CCTSO determines the relation of the decision making managing rank to alerts or warnings raised by the computerized system. Consequently, all too often alerts and warnings are not accepted readily and as a result many fraudulent transactions are not detected in real-time.
  • a prior art system known in the field of fraudulent behavior detection is disclosed in U.S. Pat. No. 5,819,226.
  • the patent provides an automated system and method for detecting fraudulent transactions using a neural network as a predictive model.
  • the neural network model “learns” a pattern that it can later identify.
  • the learning process is based on a given number of iterations executed by the neural network based detection system thus, providing its output result.
  • the ability of a fraudulent behavior detection system based upon a neural network is not accurate and could provide false diagnosis of transactions.
  • the principal reason for providing false diagnosis is subject to the manner the neural networks method operates.
  • the neural network method ability within a fraudulent behavior detection system is limited as it learns the pattern of a single customer, credit card holder, or a group of customers, and their fraudulent behavior and produces a score based on the “learned” patterns. Consequently, the neural network provides a large amount of false recognitions, such as identifying a valid credit card transaction as fraudulent.
  • the inefficiency of neural networks is due to their disability to deal with “trouble making” customers who have a non-simple or erratic behavior pattern.
  • the present invention provides a computing environment accommodating at least one input device connectable to at least one server device connectable to at least one output device, a method of processing at least one information unit introduced by the at least one input device by the at least one server device to create at least one information score based on the at least one information unit, the method comprising the steps of: creating at least one complexity catalog based on the at least one information unit, and establishing at least one score unit based on the at least one complexity catalog.
  • the method for processing the data mentioned above can further comprise the steps of: obtaining at least one information unit from the at least one input device by the at least one server device, and displaying the at least one scoring unit.
  • the information unit that can be used within the present invention may contain information of a transaction performed by a credit card holder.
  • the present invention includes a computing environment accommodating at least one input device connected to at least one server device having at least one output device, a system for the processing at least one information unit introduced via the at least one input device by the at least one server device to process at least one information unit based, the system comprising the elements of: an infrastructure server device to create at least one complexity catalog; and a complexity catalog to hold at least one list of ordered complexity values associated with the partitioned sub-unit blocks; and an application server to build at least one information summary unit based on the at least one information unit and on at least one associated complexity catalog; and a scoring component to provide scores.
  • FIG. 1 is a schematic block diagram of the system environment of the preferred embodiment of the present invention.
  • FIG. 2 is a schematic block diagram of the data analysis and evaluation system of the preferred embodiment of the present invention.
  • FIG. 3 is simplified flow chart illustrating the operation of the system and method of the preferred embodiment of the present invention.
  • FIG. 4 is a simplified infrastructure of the operation of the complexity engine in accordance with the preferred embodiment of the present invention.
  • FIGS. 5A, 5B and 5 C illustrate a typical transaction input record and the manner of storage thereof in the information analysis and evaluation system of the preferred embodiment of the present invention.
  • IAES information analysis and evaluation system
  • the use of the innovative complexity system and method for analyzing and evaluating data within the present invention provides the option of acquiring accurate information rapidly.
  • the present invention regards the analysis and evaluation data within a computerized environment.
  • the IAES can derive the required information from database records, text and graphics that are inserted within the IAES either on-line or off-line.
  • the input data units received by the IAES are processed by a set of specifically developed computer programs, which read the data units and divide the data records into fragments or blocks known to the IAES.
  • the division of the data records by the routines is performed in accordance with predetermined parameters associated with the format and the content of the data record collection.
  • the fragments and blocks have substantially identical dimensions.
  • Each of the dimensionally substantially identical record fragment is assigned an arbitrarily predetermined complexity value by a set of specifically developed computer programs that calculate the complexity value of the fragments in association with predetermined processing parameters.
  • the division of the related data records into multiple fragments having identical dimensions, the assignment of the complexity value to the fragments, and the subsequent organization of the data fragments provides the option of creating data segmentation meaningful groups and detecting characteristic groups that provide conclusive information regarding the input information.
  • the complexity value calculation requires no a-priori knowledge of the diverse input data received by the IAES. However, a minimum of indicative input regarding to the type and format of the input data is required.
  • IAES when IAES is operative as a supervising system for a CCTSO, as illustrated in the preferred embodiment of the present invention, an indication is made for the IAES that the input data has a number of fields, indicates the field types and the like.
  • the complexity values provided by the IAES are processed and organized in accordance to doctrines, such that the required information will be provided most accurately.
  • the IAES is supplied with data relating to transactions initiated and performed by credit card holders. Accordingly, the IAES operates as the supervising system for a CCTSO.
  • the IAES can provide indication whether a transaction is fraudulent and consequently can provide an alert, a warning or a set of operating instructions following the analysis.
  • the IAES can detect characteristic information regarding a particular credit card holder or a group of credit card holders.
  • the complexity value can be calculated for each field of the input data or for the combination of one or more fields within the input data.
  • the learning and scoring components provide the required output of the IAES.
  • FIG. 1 The system environment in which the preferred embodiment of the present invention could operate is illustrated in FIG. 1.
  • Users 10 , 12 and 14 are linked communicatively to a data communication network (DCN) 20 .
  • the users 10 , 12 , 14 utilize computing and communicating devices to transmit transaction records via the DCN 20 .
  • users 10 , 12 and 14 transmit credit card transaction records to IAES 18 through the DCN 20 .
  • the users 10 , 12 and 14 may be individuals initiating and performing a credit card transaction or businesses, such as commercial retail outlets or agents providing credit card transaction transmission services.
  • the transaction server 16 represents credit card companies and clearing houses.
  • the transaction server 16 contains databases including information concerning the associated credit card holders, transaction histories of credit card holders, and the like.
  • DCN 20 links the transaction server 16 and the IAES 18 .
  • the transaction server 16 and the IAES 18 can be located at identical or adjacent locations and thereby could be provided with the option of being connected physically.
  • the DCN 20 can be the Internet, a LAN, a WAN a satellite communications network or any other communications network.
  • DCN 20 is typically a standard telephone network (POTS) that enables communication via ordinary telephone lines. Users 10 , 12 and 14 typically use a dedicated telephone line or a dial-up connection for transmitting information via the POTS.
  • POTS standard telephone network
  • the IAES 18 includes an input device 56 , a communication device 54 , an output device 58 and an analysis and evaluation server platform 22 .
  • the input device 56 can be a pointing device, a keyboard device or the like.
  • the output device 58 can be a printer, a screen display or the like.
  • the communication device 54 can be a modem, a network interface card or any other suitable communication devices providing transmission and reception of data via DCN 20 of FIG. 1.
  • the analysis and evaluation server platform 22 within the preferred embodiment of the present invention includes a processor device 24 , and a memory device 26 .
  • the processor device 24 is the logic unit designed to perform arithmetic and logic operations by responding to and processing the basic instructions driving the computing device.
  • the processor device 24 can be one of the Intel Pentium series, the PowerPC series, the K6 series, the Celeron, the Athlon, the Duron, the Alpha, or the like.
  • the memory device 26 includes a reference transaction database 28 , an operating system 30 , a control database 32 , a complexity database catalog 36 and an application server 38 .
  • the reference transaction database 28 includes database information including a list of the credit card holders, personal information regarding credit card holders, history files containing the transactions performed by credit card holders, history files containing fraudulent transactions and other relevant information related to credit card holders and agents.
  • the reference transaction database 28 can be located within the IAES 18 as illustrated in FIG. 2, within a transaction server 16 as illustrated in FIG. 1 or in any other separate location.
  • the operating system 30 is responsible for managing the operation of the entire set of software programs implemented in the operation of the IAES 18 .
  • the operating system 30 can be of any known operating system such as Windows NT, Windows XP, UNIX, Linux, VMS, OS/400, AIX, OS X and the like.
  • the complexity database catalog 36 includes all the complexity values assigned to the records processed by the complexity engine 52 .
  • the complexity values stored within the complexity database catalog 36 are further discussed herein under in association with the description of the complexity engine 52 .
  • the control database 32 controls the input data received by the input device 56 and the transfer thereof to the application server 38 .
  • the control database 32 also directs the movement of the data from the reference transaction database 28 to the application server 38 and to the complexity database catalog 36 from the application server 38 .
  • the application server 38 within the preferred embodiment includes a complexity catalog handler 40 , a scoring component 42 , a learning component 44 , a database handler 46 , a resource allocation component 48 , a user interface component 50 and a complexity engine 52 .
  • the complexity catalog handler 40 is responsible for the obtaining the appropriate complexity metrics records created by the application server 38 from the complexity database catalog 36 .
  • the resource allocation component 48 is responsible for allocating variable resources to the processing of the separate records in accordance with the complexity metrics thereof.
  • the user interface component 50 is a set of specifically designed and developed front-end programs. The component 50 allows the user of the system to interact dynamically with the system by performing a set of predefined procedures operative to the running of the method.
  • the user could select an application, as selected for the CCTSO supervision purposes, activate the selected application, adjust specific processing parameters, select sets of records for processing according to the complexity metrics thereof, and the like.
  • the component 50 could be developed as a plug-in to any of the known user interfaces.
  • the component 50 will be preferably a Graphical User Interface (GUI) but any other manner of interfacing with the user could be used such as a command-driven interface, a menu-driven interface or the like.
  • GUI Graphical User Interface
  • the database handler 46 receives the input data records from the control database 32 and provides the records to the complexity catalog handler 40 .
  • the database handler 46 further receives complexity values and scores provided to data records from the complexity catalog handler 40 and provides the control database 32 that provides the complexity database catalog 36 and reference transaction database 28 with the complexity values and scores regarding to data records.
  • the learning component 44 provides mechanism for matching a given input such as the complexity vectors for each transaction to a given output such as a fraudulent indication.
  • the learning component 44 provides the scoring component 42 with different scores that are than processed within the scoring component 42 .
  • the complexity engine 52 provides complexity values to data records received from the control database 32 within the application server 38 and handled by the database handler 46 .
  • the drawing under discussion includes a single analysis and evaluation server platform 22 only and it is shown thereon that the entire set of software routines is co-located on the single platform 22 .
  • the analysis and evaluation server platform 22 will include additional hardware elements and software components in order to support the system and method proposed by the present invention or any other non-related applications implemented on the platform 22 .
  • FIG. 3 illustrates a flowchart including a database handler 60 , a preprocessing component 62 , a learning component 64 , a scoring component 66 and an output generator 68 .
  • the stream represents the stages that provide the final fraud detection product.
  • the data records received at the first procedure by the preprocessing component 62 operates a preprocess module that processes the external database from reference transaction database 28 (FIG. 2) and new transactions received within the IAES from the input device 56 (FIG. 2).
  • the preprocessing component 62 uses the internal database received from the complexity database catalog 36 and complexity engine 52 to calculate the complexity vector value for each transaction.
  • the database handler 46 provides the input data to the complexity engine 52 .
  • the complexity value is calculated within the complexity engine 52 .
  • the method used for the complexity calculation is the “Multiple Single Dimension” complexity calculation. The method and system of the operation of the complexity engine is further explained within the pending PCT application PCT/IL01/01074, which is incorporated herein by reference.
  • the “Multiple Single Dimension” complexity calculation method is used within the description of the preferred embodiment of the present invention.
  • a multiple feed of single dimensions are fed to complexity engine 52 having the complexity calculation calculated.
  • a complexity calculation is made and the complexity metric (i.e. for each block a complexity parameter) is stored in a complexity file.
  • the complexity calculation for each block is as follows: The first stage includes determination of a word size list (WS), a feed number list (FN) and a letter parameter. The second stage includes the modification of each block according to the letter parameter. Accordingly, the number of the maximum different words size is calculated, by either the maximal words given the letter parameter, FN and WS (max 1 ) or by the maximal possible words in the given block (max 2 ). The number of actual different words is calculated. Each word has WS*FN bytes describing it. Finally, the ratio between actual words and maximal words is calculated. The result is multiplied to give the final complexity parameter.
  • the complexity value given by the complexity engine 52 is stored within the complexity database catalog 36 .
  • the next stage within the preprocessing component 62 is the operation of an access module that provides the complexity engine 52 with a predetermined number of similar last transactions according to resource allocation component 48 .
  • the complexity engine 52 calculates the complexity values of the fields of the additional transactions.
  • the output vector of said complexity values is the first step of preprocessing component 62 .
  • the second step of the preprocessing component 62 is the calculation of the average and standard deviation of the complexity of each parallel field within the transactions. The calculation of the average and standard deviation is performed only for non-fraudulent transactions.
  • the complexity database catalog 36 stores the complexity vector of each record and of the last transactions as calculated above for each account of credit card holder.
  • Each account within the complexity database catalog 36 contains an average and standard deviation of each element of the vector calculated (e.g. average complexity for amount field, average complexity for date field, standard-deviation complexity for amount field, etc.).
  • the learning component 64 is the next stage within the preferred embodiment. However, other preferred embodiment can operate without the learning component 64 .
  • the proposed method includes a fraudulent behavior scoring module. Scoring modules used can be of known techniques for matching a given input (e.g. the complexity vectors for each transaction and average and standard-deviation of the complexity the account, demographic properties of the account, etc.) to a given output (e.g. Fraud ⁇ Not Fraud).
  • the scoring module After the execution of the scoring module the output received is an appropriate profile of a behavior scoring module components (e.g. weights, matrices, thresholds, etc.). The appropriate profile can produce a score based on a new transaction.
  • the next stage is the scoring component 66 that produces the final calculation the result of which provided at the output generator 68 and indicates whether a transaction is fraudulent.
  • the Integrating module receives the scores from all the scoring modules to produce a single score. The single score providing giving weights for each associated score of related transactions performs the output of the IAES received from the learning component 64 to produce the final score.
  • the scoring component 66 can use an individual scoring module, a group scoring module, a fraud scoring module, a fraudulent behavior scoring module and other modules.
  • the output generator 68 receives the output from the scoring component 66 and processes the result to be presented by the output device 58 to the user of the IAES.
  • the output generator is positioned within the scoring component 42 .
  • the scoring component uses different integrating modules that receive the scores from all the previously calculated, within the preprocessing component 62 and learning component 64 , scoring modules to produce a single score.
  • the Individual scoring module produces a score based on the individual behavior and the new transaction's deviation from it.
  • the new transaction was preprocessed and now has a complexity vector.
  • the absolute value of the deviation of every element of the vector from the preprocessed average of the account is calculated (e.g. ABS ((Amount complexity ⁇ Amount average complexity)/(Amount complexity standard-deviation)), etc.). This produces a vector of deviation for the new transaction. All the elements are averaged and scaled to produce a score between 0.999, where 0 denotes average behavior and 0.999 denotes maximal deviation from average behavior.
  • the group-scoring module produces a score based on the group behavioral change and its relation to the new transaction.
  • All accounts are segmented to groups (e.g. by demographic properties, average complexity, etc.).
  • the average complexity is calculated by averaging the average complexity for each field of each account.
  • the average of average complexity of the accounts within the group is calculated producing a vector. Taking a time interval parameter from the internal database, this vector is calculated for every such interval (e.g. day, week, month, etc.) and the change in the vector is also calculated. By multiplying each element of the vector with the appropriate element of the new transaction's deviation vector (i.e.
  • a vector containing the relation between the group's behavioral change and the new transaction's deviation is received.
  • the new vector will have a positive element, while if the group's change is different from the transaction deviation, the new vector will have a negative element.
  • the new vector is averaged and scaled to produce a score between 0.999, where 0 denotes that the new transaction changed exactly as the group and 0.999 denotes that the new transaction changed exactly opposite to the group's change.
  • the Fraud scoring module takes all the fraudulent transactions within the appropriate group and their preprocessed complexity vectors. For each such transaction, a complexity deviation vector is calculated using the account's average and standard deviation. Thus each fraudulent transaction within the group has a complexity deviation vector. These are averaged and each of their elements is multiplied by the new transaction's deviation vector (without the absolute value). The elements of the new vector are averaged and scaled to produce a score between 0.999 where 0 denotes that the new transaction behaved exactly the opposite of the fraudulent transactions and 999 denotes that the new transaction behaved exactly as the fraudulent transaction.
  • the Fraudulent behavior scoring module takes the complexity deviation vector of the new transaction, as well as other input variables needed (e.g. averages, demographic properties, etc.) and uses the learned profile to produce a score between 0.999 where 0 denotes that the new transaction is not included in the fraudulent behavior and 0.999 denotes that the new transaction is exactly the fraudulent behavior.
  • FIG. 4 illustrates the components of the general infrastructure and manner of operation of the complexity engine 52 (FIG. 2) that was explained within PCT/IL01/01074 incorporated to this application.
  • the server 72 accepts one or more input records from an input records stream 70 .
  • the input records stream 70 is provided to the server 72 via diverse input devices described hereinabove.
  • the server 72 is a set of functional computer programs specifically designed and developed to implement the method and system proposed by the present invention.
  • the server 72 includes an input records handler 76 , a control table 74 , a record dividing component 78 , a complexity assignment component 80 , and a complexity catalog handler 82 .
  • the input records handler 76 receives the input records from the input records stream 70 and provides the records to the record-dividing component 78 .
  • the record-dividing component 78 accepts the records, obtains the suitable control parameters from the control table 74 , and divides the records into dimensional blocks having a size determined by the control parameters. Subsequently the dimensional blocks are provided to the complexity assignment component 80 .
  • the component 80 obtains the suitable control parameters from the control table 74 , assigns appropriate complexity metrics to the records, and passes the complexity metrics records to the complexity catalog handler 82 .
  • the complexity catalog handler 82 inserts the complexity metrics records that include suitable pointers to the input records to the complexity catalog 84 .
  • the catalog 84 is a data structure holding the list of the complexity records for further processing.
  • FIG. 5A represents a transaction preformed by one credit card holder.
  • FIG. 5A presents different fields included within the transaction record 104 received within the IAES.
  • the records consist from a serial number field 90 , a date field 92 , a credit card holder name field 94 , an agent/business name field 96 , a sum field 98 , an address field 100 .
  • Additional fields could include the type of services or goods that were purchased during the specific transactions and other relevant information.
  • Each of the fields indicating data concerning the transaction can indicate fraudulent behavior in accordance to the preferred embodiment of the present invention.
  • the date field can indicate fraudulent behavior when a large number of transactions are performed on one particular day.
  • Other examples can demonstrate the ability of each field type within the transaction record to provide indication of fraudulent behavior.
  • the transaction 104 received within the IAES is processed to diagnose whether the transaction is detected as fraudulent or not.
  • the diagnosis can be a result of a fraudulent indicator emerging from the analysis of a single field of a particular transaction or from more the analysis of more than one field of a transaction record.
  • the data within the fields are processed provide scores.
  • the scores of the fields are concentrated to a cluster that is processed according to the procedures illustrated above in accordance to FIG. 3 to provide a final score.
  • Each field within the transaction 104 or any combination thereof is processed as predetermined by the complexity database catalog 36 (FIG. 2).
  • the process includes the procedure stages indicated in FIG. 3 including the preprocessing procedure, a learning procedure and a scoring procedure.
  • the transaction record can be processed by the preprocessing procedure alone or by any other procedure or combination thereof.
  • the complexity values received from the procedures mentioned above that process the transaction record 104 are stored in a record 106 illustrated in FIG. 5B within the complexity database catalog 36 (FIG. 2).
  • One simple example illustrating a fraudulent behavior can be the anomaly of the sum for a single transaction.
  • a credit card holder that initiates a transaction for about $10,000 in comparison to his usual habit of not exceeding about $200 per transaction will indicate a possible fraudulent behavior that will be indicated by high score.
  • the record 106 includes different fields regarding different transactions. Each row relates to a specific transaction.
  • Column 108 includes serial numbers that indicate a different transaction.
  • the different field in each row includes a calculated value received from the procedures operated by one or more of the components illustrated in FIG. 3.
  • Integrating module as indicated above to provide score values indicated in column 110 processes the processed transactions concentrated within the record 106 .
  • the transactions are organized within the final result record 112 .
  • the final result record 112 indicated a transaction serial number column 108 .
  • the transactions within the final result record 112 include all the processed data of relevant transactions and the final score provided by the IAES.
  • the highest score 0.999 indicates the greatest anomaly of the particular transaction.
  • FIG. 5B the transaction are not arranged and organized according to their final score.
  • FIG. 5C shows the transactions organized according to their anomaly.

Abstract

A system and method for detecting and analyzing information units and particularly the analysis and evaluation of data records by selecting particular aspects of the data record is disclosed. The method comprises creating a complexity catalog based on an information unit and establishing at least one score unit based on the at least one complexity catalog. The system comprises an infrastructure server device to create at least one complexity catalog, and a complexity catalog to hold at least one list of ordered complexity values associated with partitioned sub-unit blocks, an application server to build at least one information summary unit based on an information unit and on an associated complexity catalog, and a scoring component to provide scores.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • This application claims priority from PCT Application No. PCT/IL01/01074, filed Nov. 21, 2001, and Israeli Patent Application No. 146597, filed Nov. 20, 2001, each of which is hereby incorporated by reference as if fully set forth herein.[0001]
  • BACKGROUND OF THE INVENTION
  • The present invention generally relates to a system and method for detecting and analyzing information units. More specifically, the present invention relates to the analysis and evaluation of data records by selecting particular aspects of the data record. [0002]
  • Enormous volumes of data and information are accessible to users worldwide as a consequence of the so-called Information Age. The development of computerized databases, high-volume storage devices and the capability of transmitting data over global data communications networks provides a great influx of data which is not always processed and evaluated completely. Due to the massive quantities of data and information and the resources required for the processing thereof, the evaluation processes are typically incomplete. Financial organizations that provide credit card usage supervision services, transaction processing services, business indicator analysis services and the like are handling an immense amount of data records daily. The large amount of data records that are formed by business transactions initiated and performed by credit card holders are typically transmitted to credit card supervision transaction services organizations (CCTSO) for appropriate processing. The required processing includes the updating of the relevant accounts of the credit card holders, the updating of the accounts of the services and goods suppliers, and the creation of records associated with clearing instructions. The update of the relevant accounts includes the entire set of information units associated with a single transaction, such as credit card number and type, account number, transaction date, point of sale, type of goods or services purchased and the like. Further processing of data by the CCTSO includes the validation, error checking, authorization, and evaluation of the transaction and most importantly detection or identification of fraudulent transactions. When a fraudulent transaction is recognized a suitable “watchdog” procedure is performed such as the issuance of an alert, a warning message or other pre-defined set of operating instructions that are transmitted to the appropriate functionaries within the CCSTO and, if applicable, transmitted in real-time back to the point of sale to be displayed on the supplier's display device. [0003]
  • Detection of fraudulent credit card usage requires the CCTSO to analyze a particular transaction initiated and performed by credit card holder by comparing transaction-specific information, such as personal characteristics of the cardholder. The characteristics may include age, address, previous credit card usage and the like. The type of goods or services purchased, the price, the location of the point of sale are also analyzed in order to detect unusual transaction patterns. The immense amount of transactions performed and the urgency concerning the detection of fraudulent behavior as soon as possible consequent to its occurrence necessitates the utilization of sophisticated computerized systems. Computerized evaluations of transactions and the identification of fraudulent behavior are known in the art. Typically these procedures are commonly performed by specific computer programs utilizing large decision trees. As a result, the CCTSO has the ability to recognize obvious fraudulent behavior. For example one anomalous transaction could be associated with a credit card holder that purchases goods and services in a total sum that is significantly higher than the amounts used in prior transactions of the same cardholder. The CCTSO is typically maintains within its computerized database price limits regarding acceptable usage of a specific credit card. The anomalous credit card usage could effect a suitable alert or warning. However, decision trees as currently known in the art are substantially limited and thereby can provide only comparatively simple diagnosis. All too often the diagnosis is inaccurate and as a result fraudulent transactions are ignored while valid transactions could generate an alert. Erroneous diagnosis, which generates non-justified alerts, warnings or operating instructions, has many disadvantages for a CCTSO or any other organizations utilizing computerized analysis and evaluation of data. Erroneous diagnosis provided by CCTSO determines the relation of the decision making managing rank to alerts or warnings raised by the computerized system. Consequently, all too often alerts and warnings are not accepted readily and as a result many fraudulent transactions are not detected in real-time. [0004]
  • A prior art system known in the field of fraudulent behavior detection is disclosed in U.S. Pat. No. 5,819,226. The patent provides an automated system and method for detecting fraudulent transactions using a neural network as a predictive model. The neural network model “learns” a pattern that it can later identify. The learning process is based on a given number of iterations executed by the neural network based detection system thus, providing its output result. Nevertheless, the ability of a fraudulent behavior detection system based upon a neural network is not accurate and could provide false diagnosis of transactions. The principal reason for providing false diagnosis is subject to the manner the neural networks method operates. The neural network method ability within a fraudulent behavior detection system is limited as it learns the pattern of a single customer, credit card holder, or a group of customers, and their fraudulent behavior and produces a score based on the “learned” patterns. Consequently, the neural network provides a large amount of false recognitions, such as identifying a valid credit card transaction as fraudulent. The inefficiency of neural networks is due to their disability to deal with “trouble making” customers who have a non-simple or erratic behavior pattern. [0005]
  • There is an urgent need to introduce a system and a method that will minimize false fraudulent behavior detection within a CCTSO. A further need exists for a system and method that is able the create segmentation of the incoming data records, such as business data records and thereby characterizing data within groups separated in a predefined manner. The segmentation enables the processing of data concentrated within separated segments in an efficient and accurate manner providing “clear cut” results. The required system and method will provide analysis and evaluation of the information in such a manner as to provide a minimum of false results. These requirements could be accomplished by the application of the complexity system and method introduced within PCT/IL01/01074. [0006]
  • SUMMARY OF THE INVENTION
  • The present invention provides a computing environment accommodating at least one input device connectable to at least one server device connectable to at least one output device, a method of processing at least one information unit introduced by the at least one input device by the at least one server device to create at least one information score based on the at least one information unit, the method comprising the steps of: creating at least one complexity catalog based on the at least one information unit, and establishing at least one score unit based on the at least one complexity catalog. [0007]
  • The method for processing the data mentioned above can further comprise the steps of: obtaining at least one information unit from the at least one input device by the at least one server device, and displaying the at least one scoring unit. The information unit that can be used within the present invention may contain information of a transaction performed by a credit card holder. [0008]
  • The present invention includes a computing environment accommodating at least one input device connected to at least one server device having at least one output device, a system for the processing at least one information unit introduced via the at least one input device by the at least one server device to process at least one information unit based, the system comprising the elements of: an infrastructure server device to create at least one complexity catalog; and a complexity catalog to hold at least one list of ordered complexity values associated with the partitioned sub-unit blocks; and an application server to build at least one information summary unit based on the at least one information unit and on at least one associated complexity catalog; and a scoring component to provide scores.[0009]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The present invention will be understood and appreciated more fully from the following detailed description taken in conjunction with the drawings in which: [0010]
  • FIG. 1 is a schematic block diagram of the system environment of the preferred embodiment of the present invention; [0011]
  • FIG. 2 is a schematic block diagram of the data analysis and evaluation system of the preferred embodiment of the present invention; [0012]
  • FIG. 3 is simplified flow chart illustrating the operation of the system and method of the preferred embodiment of the present invention; [0013]
  • FIG. 4 is a simplified infrastructure of the operation of the complexity engine in accordance with the preferred embodiment of the present invention; and [0014]
  • FIGS. 5A, 5B and [0015] 5C illustrate a typical transaction input record and the manner of storage thereof in the information analysis and evaluation system of the preferred embodiment of the present invention.
  • DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
  • A novel method and system for analysis and evaluation of information units is disclosed. The information analysis and evaluation system (IAES) facilitates its user with information regarding the input data of the IAES. The incoming raw data is processed, analyzed and evaluated using the complexity system and method introduced in the pending PCT application PCT/IL01/01074. [0016]
  • The use of the innovative complexity system and method for analyzing and evaluating data within the present invention provides the option of acquiring accurate information rapidly. The present invention regards the analysis and evaluation data within a computerized environment. According to the present invention the IAES can derive the required information from database records, text and graphics that are inserted within the IAES either on-line or off-line. The input data units received by the IAES are processed by a set of specifically developed computer programs, which read the data units and divide the data records into fragments or blocks known to the IAES. The division of the data records by the routines is performed in accordance with predetermined parameters associated with the format and the content of the data record collection. The fragments and blocks have substantially identical dimensions. Each of the dimensionally substantially identical record fragment is assigned an arbitrarily predetermined complexity value by a set of specifically developed computer programs that calculate the complexity value of the fragments in association with predetermined processing parameters. The division of the related data records into multiple fragments having identical dimensions, the assignment of the complexity value to the fragments, and the subsequent organization of the data fragments, provides the option of creating data segmentation meaningful groups and detecting characteristic groups that provide conclusive information regarding the input information. The complexity value calculation requires no a-priori knowledge of the diverse input data received by the IAES. However, a minimum of indicative input regarding to the type and format of the input data is required. For instance, when IAES is operative as a supervising system for a CCTSO, as illustrated in the preferred embodiment of the present invention, an indication is made for the IAES that the input data has a number of fields, indicates the field types and the like. The complexity values provided by the IAES are processed and organized in accordance to doctrines, such that the required information will be provided most accurately. [0017]
  • In the preferred embodiment of the present invention the IAES is supplied with data relating to transactions initiated and performed by credit card holders. Accordingly, the IAES operates as the supervising system for a CCTSO. The IAES can provide indication whether a transaction is fraudulent and consequently can provide an alert, a warning or a set of operating instructions following the analysis. Furthermore, the IAES can detect characteristic information regarding a particular credit card holder or a group of credit card holders. The complexity value can be calculated for each field of the input data or for the combination of one or more fields within the input data. The learning and scoring components provide the required output of the IAES. [0018]
  • The complexity calculation method and system is described in detail in the pending PCT application PCT/IL01/01074, which is incorporated herein by reference. The system environment in which the preferred embodiment of the present invention could operate is illustrated in FIG. 1. [0019] Users 10, 12 and 14 are linked communicatively to a data communication network (DCN) 20. The users 10, 12, 14 utilize computing and communicating devices to transmit transaction records via the DCN 20. In accordance with the preferred embodiment of the present invention, users 10, 12 and 14 transmit credit card transaction records to IAES 18 through the DCN 20. The users 10, 12 and 14 may be individuals initiating and performing a credit card transaction or businesses, such as commercial retail outlets or agents providing credit card transaction transmission services. The transaction server 16 represents credit card companies and clearing houses. The transaction server 16 contains databases including information concerning the associated credit card holders, transaction histories of credit card holders, and the like. DCN 20 links the transaction server 16 and the IAES 18. The transaction server 16 and the IAES 18 can be located at identical or adjacent locations and thereby could be provided with the option of being connected physically. The DCN 20 can be the Internet, a LAN, a WAN a satellite communications network or any other communications network. DCN 20 is typically a standard telephone network (POTS) that enables communication via ordinary telephone lines. Users 10, 12 and 14 typically use a dedicated telephone line or a dial-up connection for transmitting information via the POTS. The IAES 18 general structure is described below in association with FIG. 2.
  • Referring now to FIG. 2 the [0020] IAES 18 includes an input device 56, a communication device 54, an output device 58 and an analysis and evaluation server platform 22. The input device 56 can be a pointing device, a keyboard device or the like. The output device 58 can be a printer, a screen display or the like. The communication device 54 can be a modem, a network interface card or any other suitable communication devices providing transmission and reception of data via DCN 20 of FIG. 1. The analysis and evaluation server platform 22 within the preferred embodiment of the present invention includes a processor device 24, and a memory device 26. The processor device 24 is the logic unit designed to perform arithmetic and logic operations by responding to and processing the basic instructions driving the computing device. The processor device 24 can be one of the Intel Pentium series, the PowerPC series, the K6 series, the Celeron, the Athlon, the Duron, the Alpha, or the like. The memory device 26 includes a reference transaction database 28, an operating system 30, a control database 32, a complexity database catalog 36 and an application server 38. The reference transaction database 28 includes database information including a list of the credit card holders, personal information regarding credit card holders, history files containing the transactions performed by credit card holders, history files containing fraudulent transactions and other relevant information related to credit card holders and agents. The reference transaction database 28 can be located within the IAES 18 as illustrated in FIG. 2, within a transaction server 16 as illustrated in FIG. 1 or in any other separate location. The operating system 30 is responsible for managing the operation of the entire set of software programs implemented in the operation of the IAES 18. The operating system 30 can be of any known operating system such as Windows NT, Windows XP, UNIX, Linux, VMS, OS/400, AIX, OS X and the like. The complexity database catalog 36 includes all the complexity values assigned to the records processed by the complexity engine 52. The complexity values stored within the complexity database catalog 36 are further discussed herein under in association with the description of the complexity engine 52. The control database 32 controls the input data received by the input device 56 and the transfer thereof to the application server 38. The control database 32 also directs the movement of the data from the reference transaction database 28 to the application server 38 and to the complexity database catalog 36 from the application server 38. The application server 38 within the preferred embodiment includes a complexity catalog handler 40, a scoring component 42, a learning component 44, a database handler 46, a resource allocation component 48, a user interface component 50 and a complexity engine 52. The complexity catalog handler 40 is responsible for the obtaining the appropriate complexity metrics records created by the application server 38 from the complexity database catalog 36. The resource allocation component 48 is responsible for allocating variable resources to the processing of the separate records in accordance with the complexity metrics thereof. The user interface component 50 is a set of specifically designed and developed front-end programs. The component 50 allows the user of the system to interact dynamically with the system by performing a set of predefined procedures operative to the running of the method. Via the component 50 the user could select an application, as selected for the CCTSO supervision purposes, activate the selected application, adjust specific processing parameters, select sets of records for processing according to the complexity metrics thereof, and the like. The component 50 could be developed as a plug-in to any of the known user interfaces. The component 50 will be preferably a Graphical User Interface (GUI) but any other manner of interfacing with the user could be used such as a command-driven interface, a menu-driven interface or the like. The database handler 46 receives the input data records from the control database 32 and provides the records to the complexity catalog handler 40. The database handler 46 further receives complexity values and scores provided to data records from the complexity catalog handler 40 and provides the control database 32 that provides the complexity database catalog 36 and reference transaction database 28 with the complexity values and scores regarding to data records. The learning component 44 provides mechanism for matching a given input such as the complexity vectors for each transaction to a given output such as a fraudulent indication. The learning component 44 provides the scoring component 42 with different scores that are than processed within the scoring component 42. The complexity engine 52 provides complexity values to data records received from the control database 32 within the application server 38 and handled by the database handler 46.
  • For purposes of clarity the drawing under discussion includes a single analysis and [0021] evaluation server platform 22 only and it is shown thereon that the entire set of software routines is co-located on the single platform 22. In a realistic system configuration several platforms could be used for solving practical problems such as activating load-balancing techniques for the enhancement of system performance and the like. Furthermore in a realistic system the analysis and evaluation server platform 22 will include additional hardware elements and software components in order to support the system and method proposed by the present invention or any other non-related applications implemented on the platform 22.
  • The stream of data records processed within the application server will be better understood in view of FIG. 3. FIG. 3 illustrates a flowchart including a [0022] database handler 60, a preprocessing component 62, a learning component 64, a scoring component 66 and an output generator 68. The stream represents the stages that provide the final fraud detection product. The data records received at the first procedure by the preprocessing component 62 operates a preprocess module that processes the external database from reference transaction database 28 (FIG. 2) and new transactions received within the IAES from the input device 56 (FIG. 2). The preprocessing component 62 uses the internal database received from the complexity database catalog 36 and complexity engine 52 to calculate the complexity vector value for each transaction. Each transaction processed, either drawn from the reference transaction database 28 (FIG. 2) or a new transaction from the input device 56, is inserted as an input to the complexity engine 52 for processing. The database handler 46 provides the input data to the complexity engine 52. The complexity value is calculated within the complexity engine 52. The method used for the complexity calculation is the “Multiple Single Dimension” complexity calculation. The method and system of the operation of the complexity engine is further explained within the pending PCT application PCT/IL01/01074, which is incorporated herein by reference.
  • The “Multiple Single Dimension” complexity calculation method is used within the description of the preferred embodiment of the present invention. According to the Multiple Single Dimension, a multiple feed of single dimensions are fed to [0023] complexity engine 52 having the complexity calculation calculated. At first the data containing “n” bytes composed out of “f” feeds, each of a single dimension is segmented into “m” blocks, each block having “f” feeds, within each RF bytes, where RF is the reading frame (i.e. n=m*f*RF bytes). For each block, a complexity calculation is made and the complexity metric (i.e. for each block a complexity parameter) is stored in a complexity file. The complexity calculation for each block is as follows: The first stage includes determination of a word size list (WS), a feed number list (FN) and a letter parameter. The second stage includes the modification of each block according to the letter parameter. Accordingly, the number of the maximum different words size is calculated, by either the maximal words given the letter parameter, FN and WS (max1) or by the maximal possible words in the given block (max2). The number of actual different words is calculated. Each word has WS*FN bytes describing it. Finally, the ratio between actual words and maximal words is calculated. The result is multiplied to give the final complexity parameter. The complexity value given by the complexity engine 52 is stored within the complexity database catalog 36.
  • In one particular example one transaction record inserted to the [0024] complexity engine 52 and has complexity calculation performed for one of its fields or for any combination of fields. The next stage within the preprocessing component 62 is the operation of an access module that provides the complexity engine 52 with a predetermined number of similar last transactions according to resource allocation component 48. The complexity engine 52 calculates the complexity values of the fields of the additional transactions. The output vector of said complexity values is the first step of preprocessing component 62. The second step of the preprocessing component 62 is the calculation of the average and standard deviation of the complexity of each parallel field within the transactions. The calculation of the average and standard deviation is performed only for non-fraudulent transactions. Accordingly, the complexity database catalog 36 stores the complexity vector of each record and of the last transactions as calculated above for each account of credit card holder. Each account within the complexity database catalog 36 contains an average and standard deviation of each element of the vector calculated (e.g. average complexity for amount field, average complexity for date field, standard-deviation complexity for amount field, etc.). The learning component 64 is the next stage within the preferred embodiment. However, other preferred embodiment can operate without the learning component 64. The proposed method includes a fraudulent behavior scoring module. Scoring modules used can be of known techniques for matching a given input (e.g. the complexity vectors for each transaction and average and standard-deviation of the complexity the account, demographic properties of the account, etc.) to a given output (e.g. Fraud\Not Fraud). These techniques can be neural network methods, linear regression techniques, genetic algorithms, etc. After the execution of the scoring module the output received is an appropriate profile of a behavior scoring module components (e.g. weights, matrices, thresholds, etc.). The appropriate profile can produce a score based on a new transaction. The next stage is the scoring component 66 that produces the final calculation the result of which provided at the output generator 68 and indicates whether a transaction is fraudulent. In the scoring procedure, the Integrating module receives the scores from all the scoring modules to produce a single score. The single score providing giving weights for each associated score of related transactions performs the output of the IAES received from the learning component 64 to produce the final score. The scoring component 66 can use an individual scoring module, a group scoring module, a fraud scoring module, a fraudulent behavior scoring module and other modules. The output generator 68 receives the output from the scoring component 66 and processes the result to be presented by the output device 58 to the user of the IAES. The output generator is positioned within the scoring component 42.
  • As indicated the scoring component uses different integrating modules that receive the scores from all the previously calculated, within the [0025] preprocessing component 62 and learning component 64, scoring modules to produce a single score.
  • The Individual scoring module produces a score based on the individual behavior and the new transaction's deviation from it. The new transaction was preprocessed and now has a complexity vector. The absolute value of the deviation of every element of the vector from the preprocessed average of the account is calculated (e.g. ABS ((Amount complexity−Amount average complexity)/(Amount complexity standard-deviation)), etc.). This produces a vector of deviation for the new transaction. All the elements are averaged and scaled to produce a score between 0.999, where 0 denotes average behavior and 0.999 denotes maximal deviation from average behavior. [0026]
  • The group-scoring module produces a score based on the group behavioral change and its relation to the new transaction. All accounts are segmented to groups (e.g. by demographic properties, average complexity, etc.). For each group, the average complexity is calculated by averaging the average complexity for each field of each account. Thus, for each field, the average of average complexity of the accounts within the group is calculated producing a vector. Taking a time interval parameter from the internal database, this vector is calculated for every such interval (e.g. day, week, month, etc.) and the change in the vector is also calculated. By multiplying each element of the vector with the appropriate element of the new transaction's deviation vector (i.e. the same as in the Individual scoring module, only without the absolute value), a vector containing the relation between the group's behavioral change and the new transaction's deviation is received. Thus if the group's change is the same as the transaction deviation (e.g. both increase in complexity or both decrease in complexity) the new vector will have a positive element, while if the group's change is different from the transaction deviation, the new vector will have a negative element. The new vector is averaged and scaled to produce a score between 0.999, where 0 denotes that the new transaction changed exactly as the group and 0.999 denotes that the new transaction changed exactly opposite to the group's change. [0027]
  • The Fraud scoring module takes all the fraudulent transactions within the appropriate group and their preprocessed complexity vectors. For each such transaction, a complexity deviation vector is calculated using the account's average and standard deviation. Thus each fraudulent transaction within the group has a complexity deviation vector. These are averaged and each of their elements is multiplied by the new transaction's deviation vector (without the absolute value). The elements of the new vector are averaged and scaled to produce a score between 0.999 where 0 denotes that the new transaction behaved exactly the opposite of the fraudulent transactions and 999 denotes that the new transaction behaved exactly as the fraudulent transaction. [0028]
  • The Fraudulent behavior scoring module takes the complexity deviation vector of the new transaction, as well as other input variables needed (e.g. averages, demographic properties, etc.) and uses the learned profile to produce a score between 0.999 where 0 denotes that the new transaction is not included in the fraudulent behavior and 0.999 denotes that the new transaction is exactly the fraudulent behavior. [0029]
  • Referring now to FIG. 4 that illustrates the components of the general infrastructure and manner of operation of the complexity engine [0030] 52 (FIG. 2) that was explained within PCT/IL01/01074 incorporated to this application. The server 72 accepts one or more input records from an input records stream 70. The input records stream 70 is provided to the server 72 via diverse input devices described hereinabove. The server 72 is a set of functional computer programs specifically designed and developed to implement the method and system proposed by the present invention. The server 72 includes an input records handler 76, a control table 74, a record dividing component 78, a complexity assignment component 80, and a complexity catalog handler 82. The input records handler 76 receives the input records from the input records stream 70 and provides the records to the record-dividing component 78. The record-dividing component 78 accepts the records, obtains the suitable control parameters from the control table 74, and divides the records into dimensional blocks having a size determined by the control parameters. Subsequently the dimensional blocks are provided to the complexity assignment component 80. The component 80 obtains the suitable control parameters from the control table 74, assigns appropriate complexity metrics to the records, and passes the complexity metrics records to the complexity catalog handler 82. The complexity catalog handler 82 inserts the complexity metrics records that include suitable pointers to the input records to the complexity catalog 84. The catalog 84 is a data structure holding the list of the complexity records for further processing.
  • FIGS. 5A, 5B and [0031] 5C illustrate one example of the preferred embodiment of the present invention. Accordingly, FIG. 5A represents a transaction preformed by one credit card holder. FIG. 5A presents different fields included within the transaction record 104 received within the IAES. The records consist from a serial number field 90, a date field 92, a credit card holder name field 94, an agent/business name field 96, a sum field 98, an address field 100. Additional fields could include the type of services or goods that were purchased during the specific transactions and other relevant information. Each of the fields indicating data concerning the transaction can indicate fraudulent behavior in accordance to the preferred embodiment of the present invention. Accordingly, the date field can indicate fraudulent behavior when a large number of transactions are performed on one particular day. Other examples can demonstrate the ability of each field type within the transaction record to provide indication of fraudulent behavior. The transaction 104 received within the IAES is processed to diagnose whether the transaction is detected as fraudulent or not. The diagnosis can be a result of a fraudulent indicator emerging from the analysis of a single field of a particular transaction or from more the analysis of more than one field of a transaction record. The data within the fields are processed provide scores. The scores of the fields are concentrated to a cluster that is processed according to the procedures illustrated above in accordance to FIG. 3 to provide a final score. Each field within the transaction 104 or any combination thereof is processed as predetermined by the complexity database catalog 36 (FIG. 2). The process includes the procedure stages indicated in FIG. 3 including the preprocessing procedure, a learning procedure and a scoring procedure. The transaction record can be processed by the preprocessing procedure alone or by any other procedure or combination thereof. The complexity values received from the procedures mentioned above that process the transaction record 104 are stored in a record 106 illustrated in FIG. 5B within the complexity database catalog 36 (FIG. 2). One simple example illustrating a fraudulent behavior can be the anomaly of the sum for a single transaction. A credit card holder that initiates a transaction for about $10,000 in comparison to his usual habit of not exceeding about $200 per transaction will indicate a possible fraudulent behavior that will be indicated by high score. The record 106 includes different fields regarding different transactions. Each row relates to a specific transaction. Column 108 includes serial numbers that indicate a different transaction. The different field in each row includes a calculated value received from the procedures operated by one or more of the components illustrated in FIG. 3. Integrating module as indicated above to provide score values indicated in column 110 processes the processed transactions concentrated within the record 106. The transactions are organized within the final result record 112. The final result record 112 indicated a transaction serial number column 108. The transactions within the final result record 112 include all the processed data of relevant transactions and the final score provided by the IAES. The highest score 0.999 indicates the greatest anomaly of the particular transaction. As shown within FIG. 5B the transaction are not arranged and organized according to their final score. FIG. 5C shows the transactions organized according to their anomaly.
  • The person skilled in the art will appreciate that what has been shown is not limited to the description above. Many modifications and other embodiments of the invention will be appreciated by those skilled in the art to which this invention pertains. It will be apparent that the present invention is not limited to the specific embodiments disclosed and those modifications and other embodiments are intended to be included within the scope of the invention. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation. The invention, therefore, should not be restricted, except to the following claims are their equivalents. [0032]

Claims (4)

What is claimed is:
1. In a computing environment accommodating at least one input device connectable to at least one server device connectable to at least one output device, a method of processing at least one information unit introduced by the at least one input device by the at least one server device to create at least one information score based on the at least one information unit, the method comprising the steps of:
creating at least one complexity catalog based on the at least one information unit; and
establishing at least one score unit based on the at least one complexity catalog.
2. The method of claim 1 further comprising the steps of:
obtaining at least one information unit from the at least one input device by the at least one server device; and
displaying the at least one scoring unit.
3. The method of claim 1 wherein the information unit contains transaction performed by a credit card holder.
4. In a computing environment accommodating at least one input device connected to at least one server device having at least one output device, a system for the processing at least one information unit introduced via the at least one input device by the at least one server device to process at least one information unit based, the system comprising the elements of:
an infrastructure server device to create at least one complexity catalog; and
a complexity catalog to hold at least one list of ordered complexity values associated with the partitioned sub-unit blocks; and
an application server to build at least one information summary unit based on the at least one information unit and on at least one associated complexity catalog; and
a scoring component to provide scores.
US10/152,169 2001-11-20 2002-05-20 Method and system of data analysis for the detection of fraudulent financial transactions Abandoned US20030097320A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
EP03723023A EP1552442A4 (en) 2002-05-20 2003-05-15 Method and system of data analysis for the detection of fraudulent financial transactions
AU2003235990A AU2003235990A1 (en) 2002-05-20 2003-05-15 Method and system of data analysis for the detection of fraudulent financial transactions
PCT/IL2003/000396 WO2003098505A1 (en) 2002-05-20 2003-05-15 Method and system of data analysis for the detection of fraudulent financial transactions
IL16511004A IL165110A0 (en) 2002-05-20 2004-11-09 Method and system of data analysis for the detection of frudulent financial transactions

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
IL14659701A IL146597A0 (en) 2001-11-20 2001-11-20 Method and system for creating meaningful summaries from interrelated sets of information
IL146597 2001-11-20
PCT/IL2001/001074 WO2002046960A2 (en) 2000-11-23 2001-11-21 Method and system for creating meaningful summaries from interrelated sets of information units
WOPCT/IL01/01074 2001-11-21

Publications (1)

Publication Number Publication Date
US20030097320A1 true US20030097320A1 (en) 2003-05-22

Family

ID=11075869

Family Applications (8)

Application Number Title Priority Date Filing Date
US10/145,574 Abandoned US20030095148A1 (en) 2001-11-20 2002-05-13 System and method for analyzing and evaluation of audio signals
US10/152,169 Abandoned US20030097320A1 (en) 2001-11-20 2002-05-20 Method and system of data analysis for the detection of fraudulent financial transactions
US10/152,309 Expired - Fee Related US7227975B2 (en) 2001-11-20 2002-05-20 System and method for analyzing aerial photos
US10/152,308 Expired - Lifetime US7069218B2 (en) 2001-11-20 2002-05-20 System and method for detection and analysis of audio recordings
US10/152,310 Expired - Fee Related US6928228B2 (en) 2001-11-20 2002-05-20 System and method for detection and analysis of video recordings
US10/152,367 Expired - Lifetime US6768811B2 (en) 2001-11-20 2002-05-21 System and method for analysis of imagery data
US10/154,427 Abandoned US20030097294A1 (en) 2001-11-20 2002-05-21 System and method for analyzing data
US10/153,418 Active 2025-05-27 US7142774B2 (en) 2001-11-20 2002-05-21 System and method for message insertion within video recordings

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US10/145,574 Abandoned US20030095148A1 (en) 2001-11-20 2002-05-13 System and method for analyzing and evaluation of audio signals

Family Applications After (6)

Application Number Title Priority Date Filing Date
US10/152,309 Expired - Fee Related US7227975B2 (en) 2001-11-20 2002-05-20 System and method for analyzing aerial photos
US10/152,308 Expired - Lifetime US7069218B2 (en) 2001-11-20 2002-05-20 System and method for detection and analysis of audio recordings
US10/152,310 Expired - Fee Related US6928228B2 (en) 2001-11-20 2002-05-20 System and method for detection and analysis of video recordings
US10/152,367 Expired - Lifetime US6768811B2 (en) 2001-11-20 2002-05-21 System and method for analysis of imagery data
US10/154,427 Abandoned US20030097294A1 (en) 2001-11-20 2002-05-21 System and method for analyzing data
US10/153,418 Active 2025-05-27 US7142774B2 (en) 2001-11-20 2002-05-21 System and method for message insertion within video recordings

Country Status (2)

Country Link
US (8) US20030095148A1 (en)
IL (2) IL146597A0 (en)

Cited By (54)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040199570A1 (en) * 2003-02-14 2004-10-07 Fuji Xerox Co., Ltd. Information processing system
US20050149455A1 (en) * 2003-07-01 2005-07-07 Visa U.S.A. Inc. Method and system for providing advanced authorization
US20050222929A1 (en) * 2004-04-06 2005-10-06 Pricewaterhousecoopers Llp Systems and methods for investigation of financial reporting information
US20050222928A1 (en) * 2004-04-06 2005-10-06 Pricewaterhousecoopers Llp Systems and methods for investigation of financial reporting information
US20070043577A1 (en) * 2005-08-16 2007-02-22 Sheldon Kasower Apparatus and method of enabling a victim of identity theft to resolve and prevent fraud
US20080109392A1 (en) * 2006-11-07 2008-05-08 Ebay Inc. Online fraud prevention using genetic algorithm solution
US20080114886A1 (en) * 2006-11-14 2008-05-15 Fmr Corp. Detecting and Interdicting Fraudulent Activity on a Network
US20080114885A1 (en) * 2006-11-14 2008-05-15 Fmr Corp. Detecting Fraudulent Activity on a Network
US20080114888A1 (en) * 2006-11-14 2008-05-15 Fmr Corp. Subscribing to Data Feeds on a Network
US20080115213A1 (en) * 2006-11-14 2008-05-15 Fmr Corp. Detecting Fraudulent Activity on a Network Using Stored Information
US20080162259A1 (en) * 2006-12-29 2008-07-03 Ebay Inc. Associated community platform
US20080294540A1 (en) * 2007-05-25 2008-11-27 Celka Christopher J System and method for automated detection of never-pay data sets
US20090044279A1 (en) * 2007-05-11 2009-02-12 Fair Isaac Corporation Systems and methods for fraud detection via interactive link analysis
US20090125543A1 (en) * 2007-11-09 2009-05-14 Ebay Inc. Transaction data representations using an adjacency matrix
US20090125349A1 (en) * 2007-11-09 2009-05-14 Patil Dhanurjay A S Global conduct score and attribute data utilization
US20090157598A1 (en) * 2007-12-13 2009-06-18 Electronic Data Systems Corporation Systems and processes for evaluating database complexities
US7841004B1 (en) 2007-04-05 2010-11-23 Consumerinfo.Com, Inc. Child identity monitor
US20110184986A1 (en) * 2002-12-31 2011-07-28 American Express Travel Related Service Company, Inc. Method and system for implementing and managing an enterprise identity management for distributed security in a computer system
US20110184845A1 (en) * 2002-12-31 2011-07-28 American Express Travel Related Services Company, Inc. Method and system for implementing and managing an enterprise identity management for distributed security in a computer system
US7991689B1 (en) 2008-07-23 2011-08-02 Experian Information Solutions, Inc. Systems and methods for detecting bust out fraud using credit data
US8214262B1 (en) 2006-12-04 2012-07-03 Lower My Bills, Inc. System and method of enhancing leads
US8341111B2 (en) 2007-11-30 2012-12-25 Ebay, Inc. Graph pattern recognition interface
US20130024300A1 (en) * 2011-07-21 2013-01-24 Bank Of America Corporation Multi-stage filtering for fraud detection using geo-positioning data
US20130031061A1 (en) * 2011-07-25 2013-01-31 Salesforce.Com Inc. Fraud analysis in a contact database
WO2013116154A1 (en) * 2012-01-30 2013-08-08 Mastercard International Incorporated Methods and systems for analyzing weirdness of variables
US20140108243A1 (en) * 2006-11-07 2014-04-17 Benjamin T. Breeden, JR. System and Method for Processing Duplicative Electronic Check Return Files
US20140122171A1 (en) * 2010-12-07 2014-05-01 Groupon Zappedy, Inc. Method and System for Credit Card Holder Identification
US8725613B1 (en) 2010-04-27 2014-05-13 Experian Information Solutions, Inc. Systems and methods for early account score and notification
US20150178825A1 (en) * 2013-12-23 2015-06-25 Citibank, N.A. Methods and Apparatus for Quantitative Assessment of Behavior in Financial Entities and Transactions
US9110916B1 (en) 2006-11-28 2015-08-18 Lower My Bills, Inc. System and method of removing duplicate leads
US9508092B1 (en) 2007-01-31 2016-11-29 Experian Information Solutions, Inc. Systems and methods for providing a direct marketing campaign planning environment
US9563916B1 (en) 2006-10-05 2017-02-07 Experian Information Solutions, Inc. System and method for generating a finance attribute from tradeline data
US9633322B1 (en) 2013-03-15 2017-04-25 Consumerinfo.Com, Inc. Adjustment of knowledge-based authentication
US9652802B1 (en) 2010-03-24 2017-05-16 Consumerinfo.Com, Inc. Indirect monitoring and reporting of a user's credit data
US10078868B1 (en) 2007-01-31 2018-09-18 Experian Information Solutions, Inc. System and method for providing an aggregation tool
US10242019B1 (en) 2014-12-19 2019-03-26 Experian Information Solutions, Inc. User behavior segmentation using latent topic detection
US10255598B1 (en) 2012-12-06 2019-04-09 Consumerinfo.Com, Inc. Credit card account data extraction
US10262362B1 (en) 2014-02-14 2019-04-16 Experian Information Solutions, Inc. Automatic generation of code for attributes
US10339527B1 (en) 2014-10-31 2019-07-02 Experian Information Solutions, Inc. System and architecture for electronic fraud detection
US10373198B1 (en) 2008-06-13 2019-08-06 Lmb Mortgage Services, Inc. System and method of generating existing customer leads
US10453093B1 (en) 2010-04-30 2019-10-22 Lmb Mortgage Services, Inc. System and method of optimizing matching of leads
US10586279B1 (en) 2004-09-22 2020-03-10 Experian Information Solutions, Inc. Automated analysis of data to generate prospect notifications based on trigger events
US10593004B2 (en) 2011-02-18 2020-03-17 Csidentity Corporation System and methods for identifying compromised personally identifiable information on the internet
US10592982B2 (en) 2013-03-14 2020-03-17 Csidentity Corporation System and method for identifying related credit inquiries
US10699028B1 (en) 2017-09-28 2020-06-30 Csidentity Corporation Identity security architecture systems and methods
US10896472B1 (en) 2017-11-14 2021-01-19 Csidentity Corporation Security and identity verification system and architecture
US10937090B1 (en) 2009-01-06 2021-03-02 Consumerinfo.Com, Inc. Report existence monitoring
US20210081949A1 (en) * 2019-09-12 2021-03-18 Mastercard Technologies Canada ULC Fraud detection based on known user identification
US11030562B1 (en) 2011-10-31 2021-06-08 Consumerinfo.Com, Inc. Pre-data breach monitoring
US11151468B1 (en) 2015-07-02 2021-10-19 Experian Information Solutions, Inc. Behavior analysis using distributed representations of event data
WO2022081269A1 (en) * 2020-10-14 2022-04-21 Feedzai-Consultadoria e Inovação Tecnológica, S.A. Weakly supervised multi-task learning for concept-based explainability
US11392954B2 (en) 2020-10-14 2022-07-19 Feedzai—Consultadoria e Inovação Tecnológica, S.A. Hierarchical machine learning model for performing a decision task and an explanation task
US11574360B2 (en) 2019-02-05 2023-02-07 International Business Machines Corporation Fraud detection based on community change analysis
US11593811B2 (en) 2019-02-05 2023-02-28 International Business Machines Corporation Fraud detection based on community change analysis using a machine learning model

Families Citing this family (63)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6674894B1 (en) * 1999-04-20 2004-01-06 University Of Utah Research Foundation Method and apparatus for enhancing an image using data optimization and segmentation
EP1225545A1 (en) * 2001-01-23 2002-07-24 Koninklijke Philips Electronics N.V. Image processing method for tracking the deformation of an organ in time
US20050075929A1 (en) * 2002-10-17 2005-04-07 Wolinsky Robert I. System and method for partitioning airtime for distribution and display of content
US7614065B2 (en) * 2001-12-17 2009-11-03 Automated Media Services, Inc. System and method for verifying content displayed on an electronic visual display
US20030229549A1 (en) 2001-10-17 2003-12-11 Automated Media Services, Inc. System and method for providing for out-of-home advertising utilizing a satellite network
US8221321B2 (en) 2002-06-07 2012-07-17 Verathon Inc. Systems and methods for quantification and classification of fluids in human cavities in ultrasound images
US7450746B2 (en) * 2002-06-07 2008-11-11 Verathon Inc. System and method for cardiac imaging
US8221322B2 (en) 2002-06-07 2012-07-17 Verathon Inc. Systems and methods to improve clarity in ultrasound images
US7819806B2 (en) 2002-06-07 2010-10-26 Verathon Inc. System and method to identify and measure organ wall boundaries
GB2391625A (en) 2002-08-09 2004-02-11 Diagnostic Ultrasound Europ B Instantaneous ultrasonic echo measurement of bladder urine volume with a limited number of ultrasound beams
US7613630B2 (en) * 2002-10-17 2009-11-03 Automated Media Services, Inc. System and method for editing existing footage to generate and distribute advertising content to retail locations
DE10256075A1 (en) * 2002-11-29 2004-06-17 Siemens Ag Combined emission and computer tomography unit uses smoothed extrapolation processing to produce reconstruction field outside measurement field
US20040138968A1 (en) * 2003-01-10 2004-07-15 Rina Systems, Inc. Purchase card performance system
US20040186370A1 (en) * 2003-02-10 2004-09-23 Konica Minolta Holdings, Inc. Medical image processing system, medical image pickup system and method of administrating medical images
US20040236188A1 (en) * 2003-05-19 2004-11-25 Ge Medical Systems Information Method and apparatus for monitoring using a mathematical model
US8238696B2 (en) * 2003-08-21 2012-08-07 Microsoft Corporation Systems and methods for the implementation of a digital images schema for organizing units of information manageable by a hardware/software interface system
US7590643B2 (en) * 2003-08-21 2009-09-15 Microsoft Corporation Systems and methods for extensions and inheritance for units of information manageable by a hardware/software interface system
US8166101B2 (en) 2003-08-21 2012-04-24 Microsoft Corporation Systems and methods for the implementation of a synchronization schemas for units of information manageable by a hardware/software interface system
EP1668459A4 (en) 2003-09-22 2009-05-13 Citicorp Credit Services Inc Method and system for purchase-based segmentation
EP3121615A3 (en) * 2003-10-24 2017-03-22 Koninklijke Philips N.V. Diagnostic imaging system with user interface
KR20050049062A (en) * 2003-11-21 2005-05-25 삼성전자주식회사 Apparatus for image sharpening and method thereof
GB0400984D0 (en) * 2004-01-16 2004-02-18 Rue De Int Ltd Security document with threads
JP4103890B2 (en) * 2004-12-28 2008-06-18 ソニー株式会社 Recording method and recording apparatus
FR2884948B1 (en) * 2005-04-26 2009-01-23 Gen Electric METHOD AND DEVICE FOR REDUCING NOISE IN A SEQUENCE OF FLUOROSCOPIC IMAGES
JP2007013235A (en) * 2005-06-28 2007-01-18 Canon Inc Image compositing apparatus, control method and program of image processor
US20070098351A1 (en) * 2005-10-31 2007-05-03 Sony Ericsson Mobile Communication Ab Methods and computer program products for playing audio/video programs on a portable electronic device
JP2007194974A (en) * 2006-01-20 2007-08-02 Hitachi Ltd Image display device, image recording device, and image distribution control system
US20070174074A1 (en) * 2006-01-24 2007-07-26 International Business Machine Corporation Method, system, and program product for detecting behavior change in transactional data
US8920343B2 (en) 2006-03-23 2014-12-30 Michael Edward Sabatino Apparatus for acquiring and processing of physiological auditory signals
DE102006029718A1 (en) * 2006-06-28 2008-01-10 Siemens Ag Organ system`s e.g. brain, images evaluating method for detecting pathological change in medical clinical picture, involves extending registration for area to extended registration, such that another area is detected
US20080021813A1 (en) * 2006-07-21 2008-01-24 Sheshunoff Management Services, Lp Method for scoring accounts for retention and marketing accounts based on retention and profitability
GB2440381B (en) * 2006-07-27 2008-11-05 Motorola Inc An internet protocol multimedia subsystem network element and method of operation therefor
CA2660960C (en) * 2006-08-15 2014-07-08 Intellisist, Inc. Managing a dynamic call flow during automated call processing
US7646936B2 (en) * 2006-10-03 2010-01-12 Varian Medical Systems International Ag Spatially variant image deformation
WO2008141293A2 (en) * 2007-05-11 2008-11-20 The Board Of Regents Of The University Of Oklahoma One Partner's Place Image segmentation system and method
US8167803B2 (en) 2007-05-16 2012-05-01 Verathon Inc. System and method for bladder detection using harmonic imaging
JP2009022626A (en) * 2007-07-23 2009-02-05 Ge Medical Systems Global Technology Co Llc Ultrasonic imager and image diagnostic system
CN101399708B (en) * 2007-09-28 2012-04-04 华为技术有限公司 Method and device for establishing network performance model
US8561081B1 (en) 2007-11-13 2013-10-15 Accenture Global Services Limited System and method for dynamic brokering of digital content requests
WO2009086033A1 (en) 2007-12-20 2009-07-09 Dean Enterprises, Llc Detection of conditions from sound
WO2009100453A2 (en) * 2008-02-08 2009-08-13 Automated Media Services, Inc. System and method for creating an in-store media network using traditional media metrics
JP5150341B2 (en) * 2008-04-10 2013-02-20 株式会社東芝 Data creation apparatus and method
WO2010017508A1 (en) 2008-08-07 2010-02-11 Verathon Inc. Device, system, and method to measure abdominal aortic aneurysm diameter
US8237962B2 (en) 2008-12-10 2012-08-07 Xerox Corporation Throughput estimate based upon document complexity analysis
US8449301B2 (en) * 2009-02-12 2013-05-28 American Registry for Diagnostic Medical Sonography, Inc. Systems and methods for assessing a medical ultrasound imaging operator's competency
JP5481163B2 (en) * 2009-10-30 2014-04-23 株式会社東芝 Magnetic resonance imaging system
US8520920B2 (en) * 2009-11-11 2013-08-27 Siemens Corporation System for dynamically improving medical image acquisition quality
US9189137B2 (en) 2010-03-08 2015-11-17 Magisto Ltd. Method and system for browsing, searching and sharing of personal video by a non-parametric approach
US9554111B2 (en) * 2010-03-08 2017-01-24 Magisto Ltd. System and method for semi-automatic video editing
US9502073B2 (en) 2010-03-08 2016-11-22 Magisto Ltd. System and method for semi-automatic video editing
US8737702B2 (en) * 2010-07-23 2014-05-27 International Business Machines Corporation Systems and methods for automated extraction of measurement information in medical videos
DE102011075917B4 (en) * 2011-05-16 2021-10-28 Siemens Healthcare Gmbh Method for providing a 3D image data set with suppressed measuring field exceedance artifacts and computer tomograph
US8768707B2 (en) 2011-09-27 2014-07-01 Sensory Incorporated Background speech recognition assistant using speaker verification
US8996381B2 (en) * 2011-09-27 2015-03-31 Sensory, Incorporated Background speech recognition assistant
US8712126B2 (en) * 2012-03-12 2014-04-29 Xerox Corporation Web-based system and method for video analysis
US9449380B2 (en) * 2012-03-20 2016-09-20 Siemens Medical Solutions Usa, Inc. Medical image quality monitoring and improvement system
US9064392B2 (en) * 2012-10-23 2015-06-23 Verizon Patent And Licensing Inc. Method and system for awareness detection
TWI494780B (en) * 2013-08-22 2015-08-01 Apacer Technology Inc Method and system for sorting photos base on geographic position, and computer readable recording media
US9396409B2 (en) 2014-09-29 2016-07-19 At&T Intellectual Property I, L.P. Object based image processing
US10325250B2 (en) * 2014-12-10 2019-06-18 Meijer, Inc. System and method for linking POS purchases to shopper membership accounts
JP6751779B2 (en) 2016-06-15 2020-09-09 ホプキンズ、マイケル Syringe systems and methods for collecting and sampling body fluids
US11167085B2 (en) 2016-06-15 2021-11-09 True Concepts Medical Technologies, Llc Syringe systems and methods for multi-stage fluid delivery
CN111274443B (en) * 2020-01-10 2023-06-09 北京百度网讯科技有限公司 Video clip description generation method and device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5819226A (en) * 1992-09-08 1998-10-06 Hnc Software Inc. Fraud detection using predictive modeling
US5895453A (en) * 1996-08-27 1999-04-20 Sts Systems, Ltd. Method and system for the detection, management and prevention of losses in retail and other environments
US6018723A (en) * 1997-05-27 2000-01-25 Visa International Service Association Method and apparatus for pattern generation
US6070141A (en) * 1995-05-08 2000-05-30 Image Data, Llc System and method of assessing the quality of an identification transaction using an identificaion quality score

Family Cites Families (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4773009A (en) * 1986-06-06 1988-09-20 Houghton Mifflin Company Method and apparatus for text analysis
US4945478A (en) * 1987-11-06 1990-07-31 Center For Innovative Technology Noninvasive medical imaging system and method for the identification and 3-D display of atherosclerosis and the like
EP0487110B1 (en) * 1990-11-22 1999-10-06 Kabushiki Kaisha Toshiba Computer-aided diagnosis system for medical use
US5301679A (en) * 1991-05-31 1994-04-12 Taylor Microtechnology, Inc. Method and system for analysis of body sounds
US5452416A (en) * 1992-12-30 1995-09-19 Dominator Radiology, Inc. Automated system and a method for organizing, presenting, and manipulating medical images
US5431161A (en) * 1993-04-15 1995-07-11 Adac Laboratories Method and apparatus for information acquistion, processing, and display within a medical camera system
US5384703A (en) * 1993-07-02 1995-01-24 Xerox Corporation Method and apparatus for summarizing documents according to theme
US6022315A (en) * 1993-12-29 2000-02-08 First Opinion Corporation Computerized medical diagnostic and treatment advice system including network access
KR0142483B1 (en) * 1994-02-28 1998-08-17 고지마 게이지 Non-linear time sequential data predicting device
US5732158A (en) * 1994-11-23 1998-03-24 Tec-Masters, Inc. Fractal dimension analyzer and forecaster
JPH11506575A (en) * 1995-03-07 1999-06-08 インターバル リサーチ コーポレイション Information selective storage system and method
US5659741A (en) * 1995-03-29 1997-08-19 Stuart S. Bowie Computer system and method for storing medical histories using a carrying size card
US5957866A (en) * 1995-07-03 1999-09-28 University Technology Corporation Apparatus and methods for analyzing body sounds
US6430309B1 (en) * 1995-09-15 2002-08-06 Monogen, Inc. Specimen preview and inspection system
US5995153A (en) * 1995-11-02 1999-11-30 Prime Image, Inc. Video processing system with real time program duration compression and expansion
US5988862A (en) * 1996-04-24 1999-11-23 Cyra Technologies, Inc. Integrated system for quickly and accurately imaging and modeling three dimensional objects
US6006191A (en) * 1996-05-13 1999-12-21 Dirienzo; Andrew L. Remote access medical image exchange system and methods of operation therefor
US6050950A (en) * 1996-12-18 2000-04-18 Aurora Holdings, Llc Passive/non-invasive systemic and pulmonary blood pressure measurement
US7016413B2 (en) * 1998-03-20 2006-03-21 International Business Machines Corporation Adaptively encoding a picture of contrasted complexity having normal video and noisy video portions
US6473516B1 (en) * 1998-05-22 2002-10-29 Asa Systems, Inc. Large capacity steganography
US6542894B1 (en) * 1998-12-09 2003-04-01 Unica Technologies, Inc. Execution of multiple models using data segmentation
US6825875B1 (en) * 1999-01-05 2004-11-30 Interval Research Corporation Hybrid recording unit including portable video recorder and auxillary device
US6526389B1 (en) * 1999-04-20 2003-02-25 Amdocs Software Systems Limited Telecommunications system for generating a three-level customer behavior profile and for detecting deviation from the profile to identify fraud
US6430539B1 (en) * 1999-05-06 2002-08-06 Hnc Software Predictive modeling of consumer financial behavior
US6904409B1 (en) * 1999-06-01 2005-06-07 Lucent Technologies Inc. Method for constructing an updateable database of subject behavior patterns
JP3508836B2 (en) * 1999-06-22 2004-03-22 インターナショナル・ビジネス・マシーンズ・コーポレーション Apparatus and method for detecting approximate position of two-dimensional code
US6151571A (en) * 1999-08-31 2000-11-21 Andersen Consulting System, method and article of manufacture for detecting emotion in voice signals through analysis of a plurality of voice signal parameters
US6275806B1 (en) * 1999-08-31 2001-08-14 Andersen Consulting, Llp System method and article of manufacture for detecting emotion in voice signals by utilizing statistics for voice signal parameters
WO2001022883A1 (en) * 1999-09-29 2001-04-05 Siemens Corporate Research, Inc. Multi-modal cardiac diagnostic decision support system and method
KR100355404B1 (en) * 1999-12-03 2002-10-11 삼성전자 주식회사 Texture description method and texture retrieval method using Gabor filter in frequency domain
US7822629B2 (en) * 1999-12-15 2010-10-26 Hewlett-Packard Development Company, L.P. Customer profiling apparatus for conducting customer behavior pattern analysis, and method for comparing customer behavior patterns
US7263506B2 (en) * 2000-04-06 2007-08-28 Fair Isaac Corporation Identification and management of fraudulent credit/debit card purchases at merchant ecommerce sites
US6539330B2 (en) * 2000-07-19 2003-03-25 Pentax Corporation Method and apparatus for measuring 3-D information
US6705990B1 (en) * 2000-07-25 2004-03-16 Tensys Medical, Inc. Method and apparatus for monitoring physiologic parameters of a living subject
US6763136B1 (en) * 2000-09-19 2004-07-13 Bae Systems Mission Solutions, Inc. Method and apparatus for determining spectral similarity
US6834120B1 (en) * 2000-11-15 2004-12-21 Sri International Method and system for estimating the accuracy of inference algorithms using the self-consistency methodology
US6604126B2 (en) * 2001-04-11 2003-08-05 Richard S. Neiman Structural data presentation method
US6735348B2 (en) * 2001-05-01 2004-05-11 Space Imaging, Llc Apparatuses and methods for mapping image coordinates to ground coordinates
US7272575B2 (en) * 2001-07-13 2007-09-18 Lilly Mae Vega Method and system for facilitating service transactions
US6868172B2 (en) * 2001-10-03 2005-03-15 Eastman Kodak Company Method for registering images in a radiography application

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5819226A (en) * 1992-09-08 1998-10-06 Hnc Software Inc. Fraud detection using predictive modeling
US6070141A (en) * 1995-05-08 2000-05-30 Image Data, Llc System and method of assessing the quality of an identification transaction using an identificaion quality score
US5895453A (en) * 1996-08-27 1999-04-20 Sts Systems, Ltd. Method and system for the detection, management and prevention of losses in retail and other environments
US6018723A (en) * 1997-05-27 2000-01-25 Visa International Service Association Method and apparatus for pattern generation

Cited By (127)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110184988A1 (en) * 2002-12-31 2011-07-28 American Express Travel Related Services Company, Method and system for implementing and managing an enterprise identity management for distributed security in a computer system
US20110184987A1 (en) * 2002-12-31 2011-07-28 American Express Travel Related Services Company, Inc. Method and system for implementing and managing an enterprise identity management for distributed security in a computer system
US20110184985A1 (en) * 2002-12-31 2011-07-28 American Express Travel Related Services Company, Inc. Method and system for implementing and managing an enterprise identity management for distributed security in a computer system
US20110202565A1 (en) * 2002-12-31 2011-08-18 American Express Travel Related Services Company, Inc. Method and system for implementing and managing an enterprise identity management for distributed security in a computer system
US20110184986A1 (en) * 2002-12-31 2011-07-28 American Express Travel Related Service Company, Inc. Method and system for implementing and managing an enterprise identity management for distributed security in a computer system
US20110184860A1 (en) * 2002-12-31 2011-07-28 American Express Travel Related Services Company, Inc. Method and system for implementing and managing an enterprise identity management for distributed security in a computer system
US20110184845A1 (en) * 2002-12-31 2011-07-28 American Express Travel Related Services Company, Inc. Method and system for implementing and managing an enterprise identity management for distributed security in a computer system
US20110184861A1 (en) * 2002-12-31 2011-07-28 American Express Travel Related Services Company, Inc. Method and system for implementing and managing an enterprise identity management for distributed security in a computer system
US7433919B2 (en) * 2003-02-14 2008-10-07 Fuji Xerox Co., Ltd. Information processing system
US20040199570A1 (en) * 2003-02-14 2004-10-07 Fuji Xerox Co., Ltd. Information processing system
US9785944B2 (en) 2003-07-01 2017-10-10 Visa U.S.A. Inc. Method and system for providing risk information in connection with transaction processing
US7809650B2 (en) * 2003-07-01 2010-10-05 Visa U.S.A. Inc. Method and system for providing risk information in connection with transaction processing
US20110112954A1 (en) * 2003-07-01 2011-05-12 Bruesewitz Belva J Method and System for Providing Risk Information in Connection with Transaction Processing
US10580005B2 (en) 2003-07-01 2020-03-03 Visa U.S.A. Inc. Method and system for providing risk information in connection with transaction processing
US20050149455A1 (en) * 2003-07-01 2005-07-07 Visa U.S.A. Inc. Method and system for providing advanced authorization
US8706641B2 (en) 2003-07-01 2014-04-22 Visa U.S.A. Inc. Method and system for providing risk information in connection with transaction processing
US20050222928A1 (en) * 2004-04-06 2005-10-06 Pricewaterhousecoopers Llp Systems and methods for investigation of financial reporting information
US20050222929A1 (en) * 2004-04-06 2005-10-06 Pricewaterhousecoopers Llp Systems and methods for investigation of financial reporting information
US11861756B1 (en) 2004-09-22 2024-01-02 Experian Information Solutions, Inc. Automated analysis of data to generate prospect notifications based on trigger events
US10586279B1 (en) 2004-09-22 2020-03-10 Experian Information Solutions, Inc. Automated analysis of data to generate prospect notifications based on trigger events
US11373261B1 (en) 2004-09-22 2022-06-28 Experian Information Solutions, Inc. Automated analysis of data to generate prospect notifications based on trigger events
US11562457B2 (en) 2004-09-22 2023-01-24 Experian Information Solutions, Inc. Automated analysis of data to generate prospect notifications based on trigger events
US20070043577A1 (en) * 2005-08-16 2007-02-22 Sheldon Kasower Apparatus and method of enabling a victim of identity theft to resolve and prevent fraud
US11954731B2 (en) 2006-10-05 2024-04-09 Experian Information Solutions, Inc. System and method for generating a finance attribute from tradeline data
US9563916B1 (en) 2006-10-05 2017-02-07 Experian Information Solutions, Inc. System and method for generating a finance attribute from tradeline data
US10121194B1 (en) 2006-10-05 2018-11-06 Experian Information Solutions, Inc. System and method for generating a finance attribute from tradeline data
US11631129B1 (en) 2006-10-05 2023-04-18 Experian Information Solutions, Inc System and method for generating a finance attribute from tradeline data
US10963961B1 (en) 2006-10-05 2021-03-30 Experian Information Solutions, Inc. System and method for generating a finance attribute from tradeline data
US10776790B2 (en) 2006-11-07 2020-09-15 Paypal, Inc. Online fraud prevention using genetic algorithm solution
US8321341B2 (en) * 2006-11-07 2012-11-27 Ebay, Inc. Online fraud prevention using genetic algorithm solution
US20110055078A1 (en) * 2006-11-07 2011-03-03 Ebay Inc. Online fraud prevention using genetic algorithm solution
US20140108243A1 (en) * 2006-11-07 2014-04-17 Benjamin T. Breeden, JR. System and Method for Processing Duplicative Electronic Check Return Files
US8930268B2 (en) 2006-11-07 2015-01-06 Ebay Inc. Online fraud prevention using genetic algorithm solution
US11348114B2 (en) 2006-11-07 2022-05-31 Paypal, Inc. Online fraud prevention using genetic algorithm solution
US20080109392A1 (en) * 2006-11-07 2008-05-08 Ebay Inc. Online fraud prevention using genetic algorithm solution
US7657497B2 (en) 2006-11-07 2010-02-02 Ebay Inc. Online fraud prevention using genetic algorithm solution
US20080114888A1 (en) * 2006-11-14 2008-05-15 Fmr Corp. Subscribing to Data Feeds on a Network
US8145560B2 (en) * 2006-11-14 2012-03-27 Fmr Llc Detecting fraudulent activity on a network
US7856494B2 (en) * 2006-11-14 2010-12-21 Fmr Llc Detecting and interdicting fraudulent activity on a network
US8180873B2 (en) 2006-11-14 2012-05-15 Fmr Llc Detecting fraudulent activity
US20080114885A1 (en) * 2006-11-14 2008-05-15 Fmr Corp. Detecting Fraudulent Activity on a Network
US20080115213A1 (en) * 2006-11-14 2008-05-15 Fmr Corp. Detecting Fraudulent Activity on a Network Using Stored Information
US20080114886A1 (en) * 2006-11-14 2008-05-15 Fmr Corp. Detecting and Interdicting Fraudulent Activity on a Network
US11106677B2 (en) 2006-11-28 2021-08-31 Lmb Mortgage Services, Inc. System and method of removing duplicate user records
US10204141B1 (en) 2006-11-28 2019-02-12 Lmb Mortgage Services, Inc. System and method of removing duplicate leads
US9110916B1 (en) 2006-11-28 2015-08-18 Lower My Bills, Inc. System and method of removing duplicate leads
US10977675B2 (en) 2006-12-04 2021-04-13 Lmb Mortgage Services, Inc. System and method of enhancing leads
US10255610B1 (en) 2006-12-04 2019-04-09 Lmb Mortgage Services, Inc. System and method of enhancing leads
US8214262B1 (en) 2006-12-04 2012-07-03 Lower My Bills, Inc. System and method of enhancing leads
US20080162259A1 (en) * 2006-12-29 2008-07-03 Ebay Inc. Associated community platform
US9916596B1 (en) 2007-01-31 2018-03-13 Experian Information Solutions, Inc. Systems and methods for providing a direct marketing campaign planning environment
US9508092B1 (en) 2007-01-31 2016-11-29 Experian Information Solutions, Inc. Systems and methods for providing a direct marketing campaign planning environment
US10891691B2 (en) 2007-01-31 2021-01-12 Experian Information Solutions, Inc. System and method for providing an aggregation tool
US10692105B1 (en) 2007-01-31 2020-06-23 Experian Information Solutions, Inc. Systems and methods for providing a direct marketing campaign planning environment
US10650449B2 (en) 2007-01-31 2020-05-12 Experian Information Solutions, Inc. System and method for providing an aggregation tool
US10402901B2 (en) 2007-01-31 2019-09-03 Experian Information Solutions, Inc. System and method for providing an aggregation tool
US10078868B1 (en) 2007-01-31 2018-09-18 Experian Information Solutions, Inc. System and method for providing an aggregation tool
US11443373B2 (en) 2007-01-31 2022-09-13 Experian Information Solutions, Inc. System and method for providing an aggregation tool
US11908005B2 (en) 2007-01-31 2024-02-20 Experian Information Solutions, Inc. System and method for providing an aggregation tool
US10311466B1 (en) 2007-01-31 2019-06-04 Experian Information Solutions, Inc. Systems and methods for providing a direct marketing campaign planning environment
US11176570B1 (en) 2007-01-31 2021-11-16 Experian Information Solutions, Inc. Systems and methods for providing a direct marketing campaign planning environment
US11803873B1 (en) 2007-01-31 2023-10-31 Experian Information Solutions, Inc. Systems and methods for providing a direct marketing campaign planning environment
US7841004B1 (en) 2007-04-05 2010-11-23 Consumerinfo.Com, Inc. Child identity monitor
US7975299B1 (en) 2007-04-05 2011-07-05 Consumerinfo.Com, Inc. Child identity monitor
US20090044279A1 (en) * 2007-05-11 2009-02-12 Fair Isaac Corporation Systems and methods for fraud detection via interactive link analysis
US10769290B2 (en) * 2007-05-11 2020-09-08 Fair Isaac Corporation Systems and methods for fraud detection via interactive link analysis
US8364588B2 (en) 2007-05-25 2013-01-29 Experian Information Solutions, Inc. System and method for automated detection of never-pay data sets
US20080294540A1 (en) * 2007-05-25 2008-11-27 Celka Christopher J System and method for automated detection of never-pay data sets
US9251541B2 (en) 2007-05-25 2016-02-02 Experian Information Solutions, Inc. System and method for automated detection of never-pay data sets
US20090125543A1 (en) * 2007-11-09 2009-05-14 Ebay Inc. Transaction data representations using an adjacency matrix
US8775475B2 (en) 2007-11-09 2014-07-08 Ebay Inc. Transaction data representations using an adjacency matrix
US20090125349A1 (en) * 2007-11-09 2009-05-14 Patil Dhanurjay A S Global conduct score and attribute data utilization
US8204840B2 (en) 2007-11-09 2012-06-19 Ebay Inc. Global conduct score and attribute data utilization pertaining to commercial transactions and page views
US8341111B2 (en) 2007-11-30 2012-12-25 Ebay, Inc. Graph pattern recognition interface
US9275340B2 (en) 2007-11-30 2016-03-01 Paypal, Inc. System and method for graph pattern analysis
US20090157598A1 (en) * 2007-12-13 2009-06-18 Electronic Data Systems Corporation Systems and processes for evaluating database complexities
US8001158B2 (en) * 2007-12-13 2011-08-16 Hewlett-Packard Development Company, L.P. Systems and processes for evaluating database complexities
US10373198B1 (en) 2008-06-13 2019-08-06 Lmb Mortgage Services, Inc. System and method of generating existing customer leads
US10565617B2 (en) 2008-06-13 2020-02-18 Lmb Mortgage Services, Inc. System and method of generating existing customer leads
US11704693B2 (en) 2008-06-13 2023-07-18 Lmb Mortgage Services, Inc. System and method of generating existing customer leads
US8001042B1 (en) 2008-07-23 2011-08-16 Experian Information Solutions, Inc. Systems and methods for detecting bust out fraud using credit data
US7991689B1 (en) 2008-07-23 2011-08-02 Experian Information Solutions, Inc. Systems and methods for detecting bust out fraud using credit data
US10937090B1 (en) 2009-01-06 2021-03-02 Consumerinfo.Com, Inc. Report existence monitoring
US10909617B2 (en) 2010-03-24 2021-02-02 Consumerinfo.Com, Inc. Indirect monitoring and reporting of a user's credit data
US9652802B1 (en) 2010-03-24 2017-05-16 Consumerinfo.Com, Inc. Indirect monitoring and reporting of a user's credit data
US8725613B1 (en) 2010-04-27 2014-05-13 Experian Information Solutions, Inc. Systems and methods for early account score and notification
US11430009B2 (en) 2010-04-30 2022-08-30 Lmb Mortgage Services, Inc. System and method of optimizing matching of leads
US10453093B1 (en) 2010-04-30 2019-10-22 Lmb Mortgage Services, Inc. System and method of optimizing matching of leads
US11295394B2 (en) * 2010-12-07 2022-04-05 Groupon, Inc. Method and system for credit card holder identification
US20140122171A1 (en) * 2010-12-07 2014-05-01 Groupon Zappedy, Inc. Method and System for Credit Card Holder Identification
US10593004B2 (en) 2011-02-18 2020-03-17 Csidentity Corporation System and methods for identifying compromised personally identifiable information on the internet
US20130024300A1 (en) * 2011-07-21 2013-01-24 Bank Of America Corporation Multi-stage filtering for fraud detection using geo-positioning data
US8620875B2 (en) * 2011-07-25 2013-12-31 Salesforce.Com, Inc. Fraud analysis in a contact database
US20130031061A1 (en) * 2011-07-25 2013-01-31 Salesforce.Com Inc. Fraud analysis in a contact database
US11568348B1 (en) 2011-10-31 2023-01-31 Consumerinfo.Com, Inc. Pre-data breach monitoring
US11030562B1 (en) 2011-10-31 2021-06-08 Consumerinfo.Com, Inc. Pre-data breach monitoring
WO2013116154A1 (en) * 2012-01-30 2013-08-08 Mastercard International Incorporated Methods and systems for analyzing weirdness of variables
US8832120B2 (en) 2012-01-30 2014-09-09 Mastercard International Incorporated Methods and systems for analyzing weirdness of variables
US10255598B1 (en) 2012-12-06 2019-04-09 Consumerinfo.Com, Inc. Credit card account data extraction
US10592982B2 (en) 2013-03-14 2020-03-17 Csidentity Corporation System and method for identifying related credit inquiries
US11775979B1 (en) 2013-03-15 2023-10-03 Consumerinfo.Com, Inc. Adjustment of knowledge-based authentication
US10740762B2 (en) 2013-03-15 2020-08-11 Consumerinfo.Com, Inc. Adjustment of knowledge-based authentication
US10169761B1 (en) 2013-03-15 2019-01-01 ConsumerInfo.com Inc. Adjustment of knowledge-based authentication
US11288677B1 (en) 2013-03-15 2022-03-29 Consumerlnfo.com, Inc. Adjustment of knowledge-based authentication
US9633322B1 (en) 2013-03-15 2017-04-25 Consumerinfo.Com, Inc. Adjustment of knowledge-based authentication
US20150178825A1 (en) * 2013-12-23 2015-06-25 Citibank, N.A. Methods and Apparatus for Quantitative Assessment of Behavior in Financial Entities and Transactions
US11107158B1 (en) 2014-02-14 2021-08-31 Experian Information Solutions, Inc. Automatic generation of code for attributes
US11847693B1 (en) 2014-02-14 2023-12-19 Experian Information Solutions, Inc. Automatic generation of code for attributes
US10262362B1 (en) 2014-02-14 2019-04-16 Experian Information Solutions, Inc. Automatic generation of code for attributes
US10339527B1 (en) 2014-10-31 2019-07-02 Experian Information Solutions, Inc. System and architecture for electronic fraud detection
US11941635B1 (en) 2014-10-31 2024-03-26 Experian Information Solutions, Inc. System and architecture for electronic fraud detection
US10990979B1 (en) 2014-10-31 2021-04-27 Experian Information Solutions, Inc. System and architecture for electronic fraud detection
US11436606B1 (en) 2014-10-31 2022-09-06 Experian Information Solutions, Inc. System and architecture for electronic fraud detection
US10445152B1 (en) 2014-12-19 2019-10-15 Experian Information Solutions, Inc. Systems and methods for dynamic report generation based on automatic modeling of complex data structures
US11010345B1 (en) 2014-12-19 2021-05-18 Experian Information Solutions, Inc. User behavior segmentation using latent topic detection
US10242019B1 (en) 2014-12-19 2019-03-26 Experian Information Solutions, Inc. User behavior segmentation using latent topic detection
US11151468B1 (en) 2015-07-02 2021-10-19 Experian Information Solutions, Inc. Behavior analysis using distributed representations of event data
US10699028B1 (en) 2017-09-28 2020-06-30 Csidentity Corporation Identity security architecture systems and methods
US11580259B1 (en) 2017-09-28 2023-02-14 Csidentity Corporation Identity security architecture systems and methods
US11157650B1 (en) 2017-09-28 2021-10-26 Csidentity Corporation Identity security architecture systems and methods
US10896472B1 (en) 2017-11-14 2021-01-19 Csidentity Corporation Security and identity verification system and architecture
US11593811B2 (en) 2019-02-05 2023-02-28 International Business Machines Corporation Fraud detection based on community change analysis using a machine learning model
US11574360B2 (en) 2019-02-05 2023-02-07 International Business Machines Corporation Fraud detection based on community change analysis
US20210081949A1 (en) * 2019-09-12 2021-03-18 Mastercard Technologies Canada ULC Fraud detection based on known user identification
US11392954B2 (en) 2020-10-14 2022-07-19 Feedzai—Consultadoria e Inovação Tecnológica, S.A. Hierarchical machine learning model for performing a decision task and an explanation task
WO2022081269A1 (en) * 2020-10-14 2022-04-21 Feedzai-Consultadoria e Inovação Tecnológica, S.A. Weakly supervised multi-task learning for concept-based explainability
US11544471B2 (en) 2020-10-14 2023-01-03 Feedzai—Consultadoria e Inovação Tecnológica, S.A. Weakly supervised multi-task learning for concept-based explainability

Also Published As

Publication number Publication date
US20030097294A1 (en) 2003-05-22
US20030095148A1 (en) 2003-05-22
US6768811B2 (en) 2004-07-27
US20030095684A1 (en) 2003-05-22
US20030095782A1 (en) 2003-05-22
US7142774B2 (en) 2006-11-28
US20030095694A1 (en) 2003-05-22
IL146597A0 (en) 2002-08-14
US6928228B2 (en) 2005-08-09
US7227975B2 (en) 2007-06-05
IL149523A (en) 2008-06-05
US20030097255A1 (en) 2003-05-22
US20030095784A1 (en) 2003-05-22
IL149523A0 (en) 2002-11-10
US7069218B2 (en) 2006-06-27

Similar Documents

Publication Publication Date Title
US20030097320A1 (en) Method and system of data analysis for the detection of fraudulent financial transactions
CN108876133B (en) Risk assessment processing method, device, server and medium based on business information
US10127554B2 (en) Fraud early warning system and method
US8086528B2 (en) Transaction aggregator
AU2012302018B2 (en) Rules suggestion engine
US20160034467A1 (en) Methods, systems, and computer program products for generating data quality indicators for relationships in a database
US20230351400A1 (en) Systems and methods for early detection of network fraud events
US11157913B2 (en) Systems and methods for improved detection of network fraud events
US20020120559A1 (en) Tiered processing method and system for identifying and mitigating merchant risk
CN109583966B (en) High-value customer identification method, system, equipment and storage medium
EP2329447A1 (en) Evaluating loan access using online business transaction data
US20100332899A1 (en) Quality Management in a Data-Processing Environment
US10733674B2 (en) System and method for pattern-recognition based monitoring and controlled processing of data objects based on conformity measurements
EP1503329A2 (en) Method and system for determining whether a situation is logically true or false upon occurrence of an event
WO2003098505A1 (en) Method and system of data analysis for the detection of fraudulent financial transactions
WO2023076553A1 (en) Systems and methods for improved detection of network attacks
US10210528B2 (en) Method and system for assessing and improving individual customer profitability for a profit-making organization
CN113469787A (en) Consumption management system
JP5578689B1 (en) Data input system and data input method in verify input
KR100785717B1 (en) Method for providing service of inauguration and management consult using credit payment system
EP1514205A2 (en) A system and method for analyzing data
CN114596091A (en) Method and device for examining and managing suspicious transaction subjects
CN112967127A (en) Suspicious loan checking method, system, computer equipment and storage medium
CN115953023A (en) Method, device, equipment, medium and product for collecting limit of item attribution party
CN114971697A (en) Data processing method, device, equipment, storage medium and product

Legal Events

Date Code Title Description
AS Assignment

Owner name: GORDONOMICS LTD., IRELAND

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GORDON, GOREN;REEL/FRAME:013421/0197

Effective date: 20020731

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION