US20080288385A1 - Method and system for preventing card fraud - Google Patents

Method and system for preventing card fraud Download PDF

Info

Publication number
US20080288385A1
US20080288385A1 US11/811,299 US81129907A US2008288385A1 US 20080288385 A1 US20080288385 A1 US 20080288385A1 US 81129907 A US81129907 A US 81129907A US 2008288385 A1 US2008288385 A1 US 2008288385A1
Authority
US
United States
Prior art keywords
card
provider
information
user
event
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/811,299
Inventor
Julie A. Geschwender
Michele Murphy-Houser
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
First Data Corp
Original Assignee
First Data Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by First Data Corp filed Critical First Data Corp
Priority to US11/811,299 priority Critical patent/US20080288385A1/en
Publication of US20080288385A1 publication Critical patent/US20080288385A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes

Definitions

  • the present invention relates to systems and methods for detecting and preventing purchasing card fraud during all phases of a purchasing card life cycle.
  • purchasing cards are defined as credit cards, debit cards, “Smart” cards (having IC chips), retail cards (such as gas cards), and the like.
  • the present invention provides a method for preventing card fraud.
  • the method includes obtaining card event information of a card user from a provider during a card event between the card user and the provider.
  • the method further includes comparing the card event information with known fraudulent information stored in a database.
  • the method further includes sending an alert to the card user if there is a match between the card event information and the known fraudulent information.
  • the present invention provides a system for preventing card fraud.
  • the system includes a database for storing known fraudulent information.
  • the system further includes a processor in communication with the database and a provider.
  • the processor receives card event information of a card user from the provider during a card event between the card user and the provider, compares the card event information with the known fraudulent information stored in the database, and sends an alert to the card user if there is a match between the card event information and the known fraudulent information.
  • a central fraud database is created for receiving known fraudulent or “high risk” personal information.
  • the personal information may include fraudulent names, fraudulent addresses, fraudulent phone numbers, fraudulent places of employment, criminal history, and other personal information for example.
  • the central fraud database receives information from a variety of sources including but not limited to proprietary databases, client fraud files, law enforcement, and USPS databases. After a contact event has a occurred the fraud database is scanned for a match between the contact event information and the contents of the fraud database. If a possible fraud match occurs the system sends a fraud alert to the client or user of the database.
  • the present invention has many advantages including the capability to send fraud alerts in real time, “near” real time, or via batch to clients thus reducing or eliminating damage caused by potential purchasing card fraud.
  • FIG. 1 illustrates a schematic representation of a purchasing card fraud detection system in accordance with an embodiment of the present invention
  • FIG. 2 illustrates a flow diagram of a method of detecting purchasing card fraud in accordance with an embodiment of the present invention
  • FIG. 3 illustrates a flow diagram of a fraud matching process in accordance with an embodiment of the present invention.
  • FIG. 4 illustrates a schematic representation of a fraud database architecture in accordance with an embodiment of the present invention.
  • Systems and methods in accordance with embodiments of the present invention facilitate fraud prevention and detection for all contact events during a purchasing card life cycle.
  • Such contact events include: 1) application processing; 2) card activation; 3) cardholder usage, including mail and telephone orders; and 4) maintenance events, such as name and address changes, PIN changes, plastic requests, and credit line increases.
  • a system in accordance with an embodiment of the present invention includes a single, comprehensive risk (or fraud) database 10 for the detection of purchasing card fraud.
  • Risk database 10 may include information from various sources 12 , as will be described below.
  • Risk database 10 may be server-based having connectivity, via a local area network 14 or other network, to a mainframe 16 .
  • Mainframe 16 is provided for on-line transactions involving the various contact events 18 described above.
  • Clients 20 are provided with connectivity to risk database 10 for file transfer and general access, and are also provided with connectivity to mainframe 16 (graphical user interface, dummy terminal, or the like) for receipt of fraud alerts and queue information.
  • An optional, more limited database could be provided for non-contributors to risk database 10 .
  • a backup server may be provided.
  • the system possesses the technical functionality to pool data from multiple sources in multiple formats and to standardize reporting structure guidelines, enabling risk database 10 to function for many types of transactions or contact events 18 .
  • the system provides the ability to query in real time, “near” real time, or via batch with on-line interfaces to the mainframe transactions. Limited client 20 resources are required for access.
  • a daily queue statistics report is developed at client 20 level to identify all accounts matching risk database 10 , including the source of the data match. Furthermore, at the server level, reports are generated which track contributor statistics. In addition, reporting is developed to track client statistics on a query basis, such as by the number of record transactions queried against risk database 10 , or by the number of records with a data match.
  • consortium fraud database 10 Possible sources for consortium fraud database 10 include client databases, credit card issuer databases, credit bureau databases, research and investigation fraud files, ANI risk databases, the U.S. Postal Service NRI database, Account Takeover modeling/scoring, the Social Security Administration, the Department of Motor Vehicles, Western Union, Telecheck, the American Business List, law enforcement, court and public information records, phone directories, and direct mail surveys.
  • the available data includes, but is not limited to: 1) personal information, such as addresses, phone numbers, and social security numbers used in known frauds; 2) valid US addresses and their nature, i.e. residential, commercial, or vacant; 3) valid address/name combinations; 4) high risk zip codes; 5) public information, such as bankruptcy filings, tax liens, and civil judgments; and 6) consumer and purchase data.
  • the proposed data element structure within risk database 10 includes at least the following:
  • Fraudulent or potentially fraudulent (“high risk”) home and business addresses including P.O. Box, city, state, and zip code.
  • Risk database 10 acts as a central repository for fraud data to be queried against by lenders and adjacent market users.
  • Potential primary users or clients include bank card issuers, non-bank card issuers, potential card issuers, oil card issuers, merchants, and retailers.
  • Possible secondary users include phone companies, DDA Account banks, and utility companies, among others.
  • a method of detecting potential purchasing card fraud in accordance with an embodiment of the present invention is outlined in the flow diagram of FIG. 2 .
  • the method includes obtaining contact event information at mainframe 16 , as represented by block 50 , and comparing contact event 18 information to fraud information stored in risk database 10 , as represented by block 52 . If a match is found between contact event 18 information and the fraud information, the method further includes issuing an on-line alert to client 20 and queuing the information for manual review by the particular client, as represented by block 54 . If a match does not occur, then client 20 is notified as such and communication with risk database 10 is concluded, as represented by block 56 .
  • a fraud match may be scored, as represented by block 58 and as will be explained below.
  • client 20 does not wish to receive a score then communication with the database is concluded, as represented by block 60 . However, if client 20 has elected to receive a match score, a scorecard is generated and sent to client 20 , as represented by block 62 and then communication with risk database 10 is terminated at block 64 .
  • contact event 18 transactions are preferably structured to create automatic queries which compare account record data elements against the fraud information stored in risk database 10 . If a match is found between the account data and the fraud data, then the system generates an alert message in real time, “near” real time, or via batch to the queue. In addition, the account record is sent to an on-line queue to be monitored and/or manually worked by client 20 . Upon entry to the queue, contact event 18 transaction is suspended or placed on hold until manual follow-up is completed. Contact event 18 information may for example be purged from the database.
  • An additional feature is to offer clients 20 the option of having matched fraud data records “scored” to assist in the decision/action processes when a record is queued.
  • a generic suite of scorecards is provided, while also allowing client-defined scorecards to be developed and implemented.
  • a scorecard is provided which predicts the likelihood of a fraudulent takeover of an existing, active, or inactive cardholder account.
  • selected non-monetary transactions may be structured to create queries which compare account record data elements against Consortium Fraud Database 10 .
  • an account entry transaction 18 application processing, card activation, mail/phone order, address change, and the like
  • an alert message 84 is generated in real time, “near” real time, or via batch.
  • the account record may be sent to an on-line queue 86 to be monitored and/or manually worked by the client.
  • the non-monetary transactions would be suspended or placed on hold until manual follow up is completed.
  • the accounts may be built on the system, however, plastic generation would be suspended.
  • Information residing within the queue includes the account record information, the reason for the alert (i.e., potential fraudulent name, address, social security number, or phone number), and the contributing source of the matched data. This process helps to reduce responsibility/liability for data integrity.
  • clients have the option of having matched fraud data records “scored” to assist in the decision/action processes when a record is queued, as represented by block 88 .
  • a generic suite of scorecards 90 may be implemented as well as client-defined scorecards 92 .
  • Usage incentives may be provided for “global” contributors.
  • An example of a usage incentive may be reduced fees for accessing fraud database 10 .
  • Other incentives include partial to full access to information contained in fraud database 10 .
  • a non-contributor to the consortium may be offered access to information that the database manager may have purchased or provided in a non-consortium database 100 . Otherwise non-contributors may be restricted from information provided by “global” contributors to Risk Consortium Database 10 .
  • Consortium data warehouse 10 (i.e., risk or fraud database 10 ) contains data contributed from various business sources 110 including, but not limited to:
  • the data element structure 200 may include:
  • systems and methods in accordance with embodiments of the present invention provide a single source of uniform data from various contributor business sources 210 , increase the effectiveness of fraud detection efforts, allow clients 212 to reduce current manual processes for fraud identification and actioning, and allow pooling of data across the client base to improve the identification of repeat offenders.

Abstract

A method and system for preventing card fraud include obtaining card event information of a card user from a provider such as a card issuer, a merchant, a retailer, etc., during a card event between the card user and the provider. The card event information is compared with known fraudulent information stored in a database. An alert is sent to the provider if there is a match between the card event information and the known fraudulent information.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation of U.S. application Ser. No. 09/425,471, filed Oct. 22, 1999, now U.S. Pat. No. ______; which claims the benefit of U.S. Provisional Application No. 60/105,611, filed Oct. 26, 1998.
  • BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • The present invention relates to systems and methods for detecting and preventing purchasing card fraud during all phases of a purchasing card life cycle.
  • 2. Background Art
  • Roughly half a billion transactions with significant, but preventable, fraud potential occur in the United States each year. Purchasing card contact events that can lead to fraudulent occurrences include application processing, card activation, usage, such as mail and phone ordering, and maintenance events, such as address or other information changes. It is estimated that the total cost of fraud is $1.3 million for every one million gross active accounts, or $1.34 in fraud loss per gross active account (Sources: VISA/MC, Credit Card Prevention Sourcebook).
  • A large portion of this fraud could effectively be addressed though improved identification of known fraudulent names, fraudulent addresses, fraudulent phone numbers, fraudulent social security numbers, and other fraudulent personal information. In fact, a large number of fraud cases are typically perpetrated by repeat offenders or organized rings.
  • Current tools to combat repeat and organized fraud are still underdeveloped. While there are a myriad of sources for fraud-related information, the various sources focus on differing pieces of personal data and return fraudulent alerts in non-standard formats. In addition to the lack of uniformity of the alert information, current systems lack real time, “near” real time, or via batch functionality. Furthermore, no single comprehensive source exists that is capable of addressing fraud during the many stages of a purchasing card account.
  • SUMMARY OF THE INVENTION
  • Therefore, it is an object of the present invention to provide a system and method for facilitating fraud prevention and detection at all stages of a purchasing card life cycle, wherein purchasing cards are defined as credit cards, debit cards, “Smart” cards (having IC chips), retail cards (such as gas cards), and the like.
  • It is another object of the present invention to provide a single comprehensive database of standardized fraud data from various contributory sources.
  • It is still another object of the present invention to allow clients to reduce manual processes for fraud detection.
  • In carrying out the above objects and other objects, the present invention provides a method for preventing card fraud. The method includes obtaining card event information of a card user from a provider during a card event between the card user and the provider. The method further includes comparing the card event information with known fraudulent information stored in a database. The method further includes sending an alert to the card user if there is a match between the card event information and the known fraudulent information.
  • Further, in carrying out the above objects and other objects, the present invention provides a system for preventing card fraud. The system includes a database for storing known fraudulent information. The system further includes a processor in communication with the database and a provider. The processor receives card event information of a card user from the provider during a card event between the card user and the provider, compares the card event information with the known fraudulent information stored in the database, and sends an alert to the card user if there is a match between the card event information and the known fraudulent information.
  • In embodiments of the present invention, a central fraud database is created for receiving known fraudulent or “high risk” personal information. The personal information may include fraudulent names, fraudulent addresses, fraudulent phone numbers, fraudulent places of employment, criminal history, and other personal information for example. The central fraud database receives information from a variety of sources including but not limited to proprietary databases, client fraud files, law enforcement, and USPS databases. After a contact event has a occurred the fraud database is scanned for a match between the contact event information and the contents of the fraud database. If a possible fraud match occurs the system sends a fraud alert to the client or user of the database. The present invention has many advantages including the capability to send fraud alerts in real time, “near” real time, or via batch to clients thus reducing or eliminating damage caused by potential purchasing card fraud.
  • The above objects and other objects, features, and advantages of the present invention are readily apparent from the following detailed description of the preferred embodiment(s) when taken in connection with the accompanying drawings.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 illustrates a schematic representation of a purchasing card fraud detection system in accordance with an embodiment of the present invention;
  • FIG. 2 illustrates a flow diagram of a method of detecting purchasing card fraud in accordance with an embodiment of the present invention;
  • FIG. 3 illustrates a flow diagram of a fraud matching process in accordance with an embodiment of the present invention; and
  • FIG. 4 illustrates a schematic representation of a fraud database architecture in accordance with an embodiment of the present invention.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT(S)
  • U.S. application Ser. No. 09/425,471, filed Oct. 22, 1999, now U.S. Pat. No. ______, is hereby incorporated by reference in its entirety.
  • Systems and methods in accordance with embodiments of the present invention facilitate fraud prevention and detection for all contact events during a purchasing card life cycle. Such contact events include: 1) application processing; 2) card activation; 3) cardholder usage, including mail and telephone orders; and 4) maintenance events, such as name and address changes, PIN changes, plastic requests, and credit line increases.
  • Referring now to FIG. 1, a system in accordance with an embodiment of the present invention includes a single, comprehensive risk (or fraud) database 10 for the detection of purchasing card fraud. Risk database 10 may include information from various sources 12, as will be described below. Risk database 10 may be server-based having connectivity, via a local area network 14 or other network, to a mainframe 16. Mainframe 16 is provided for on-line transactions involving the various contact events 18 described above. Clients 20 are provided with connectivity to risk database 10 for file transfer and general access, and are also provided with connectivity to mainframe 16 (graphical user interface, dummy terminal, or the like) for receipt of fraud alerts and queue information. An optional, more limited database (not shown) could be provided for non-contributors to risk database 10. A backup server may be provided.
  • The system possesses the technical functionality to pool data from multiple sources in multiple formats and to standardize reporting structure guidelines, enabling risk database 10 to function for many types of transactions or contact events 18. In addition, the system provides the ability to query in real time, “near” real time, or via batch with on-line interfaces to the mainframe transactions. Limited client 20 resources are required for access.
  • In an embodiment, at mainframe 16 level, a daily queue statistics report is developed at client 20 level to identify all accounts matching risk database 10, including the source of the data match. Furthermore, at the server level, reports are generated which track contributor statistics. In addition, reporting is developed to track client statistics on a query basis, such as by the number of record transactions queried against risk database 10, or by the number of records with a data match.
  • Possible sources for consortium fraud database 10 include client databases, credit card issuer databases, credit bureau databases, research and investigation fraud files, ANI risk databases, the U.S. Postal Service NRI database, Account Takeover modeling/scoring, the Social Security Administration, the Department of Motor Vehicles, Western Union, Telecheck, the American Business List, law enforcement, court and public information records, phone directories, and direct mail surveys.
  • From such sources, the available data includes, but is not limited to: 1) personal information, such as addresses, phone numbers, and social security numbers used in known frauds; 2) valid US addresses and their nature, i.e. residential, commercial, or vacant; 3) valid address/name combinations; 4) high risk zip codes; 5) public information, such as bankruptcy filings, tax liens, and civil judgments; and 6) consumer and purchase data.
  • The proposed data element structure within risk database 10 includes at least the following:
  • 1. Names of fraudulent or potentially fraudulent (“high risk”) primary, secondary, and additional cardholders in the form of first name, last name, and middle initial.
  • 2. Fraudulent or potentially fraudulent (“high risk”) home and business addresses, including P.O. Box, city, state, and zip code.
  • 3. Fraudulent or potentially fraudulent (“high risk”) home and business telephone numbers.
  • 4. Fraudulent or potentially fraudulent (“high risk”) social security numbers of primary, secondary, and additional cardholders.
  • Risk database 10 acts as a central repository for fraud data to be queried against by lenders and adjacent market users. Potential primary users or clients include bank card issuers, non-bank card issuers, potential card issuers, oil card issuers, merchants, and retailers. Possible secondary users include phone companies, DDA Account banks, and utility companies, among others.
  • A method of detecting potential purchasing card fraud in accordance with an embodiment of the present invention is outlined in the flow diagram of FIG. 2. The method includes obtaining contact event information at mainframe 16, as represented by block 50, and comparing contact event 18 information to fraud information stored in risk database 10, as represented by block 52. If a match is found between contact event 18 information and the fraud information, the method further includes issuing an on-line alert to client 20 and queuing the information for manual review by the particular client, as represented by block 54. If a match does not occur, then client 20 is notified as such and communication with risk database 10 is concluded, as represented by block 56. Optionally, a fraud match may be scored, as represented by block 58 and as will be explained below. If client 20 does not wish to receive a score then communication with the database is concluded, as represented by block 60. However, if client 20 has elected to receive a match score, a scorecard is generated and sent to client 20, as represented by block 62 and then communication with risk database 10 is terminated at block 64.
  • Within the system, contact event 18 transactions are preferably structured to create automatic queries which compare account record data elements against the fraud information stored in risk database 10. If a match is found between the account data and the fraud data, then the system generates an alert message in real time, “near” real time, or via batch to the queue. In addition, the account record is sent to an on-line queue to be monitored and/or manually worked by client 20. Upon entry to the queue, contact event 18 transaction is suspended or placed on hold until manual follow-up is completed. Contact event 18 information may for example be purged from the database.
  • An additional feature is to offer clients 20 the option of having matched fraud data records “scored” to assist in the decision/action processes when a record is queued. Preferably, a generic suite of scorecards is provided, while also allowing client-defined scorecards to be developed and implemented. In an embodiment, a scorecard is provided which predicts the likelihood of a fraudulent takeover of an existing, active, or inactive cardholder account.
  • The following attributes of systems and methods in accordance with embodiments of the present invention are thus possibly provided to facilitate fraud detection at all stages of a purchasing card life cycle:
      • Application Processing
      • Card Activation
      • Cardholder Usage/Maintenance
      • Other Transaction or Contact Events: Priority Non-Mons: PIN changes, plastic requests, credit line increases and changes to the account record.
  • Components of systems and methods in accordance with embodiments of the present invention include:
      • Consortium Data Warehouse
      • Fraud Scoring
      • Actioning (Alerts to On-Line Screens)
      • Queuing for Manual Review
    The Matching Process
  • As shown in FIG. 3, selected non-monetary transactions may be structured to create queries which compare account record data elements against Consortium Fraud Database 10. For example, during an account entry transaction 18 (application processing, card activation, mail/phone order, address change, and the like) could automatically compare key application data elements against the Data Warehouse or Risk Database 10. If a match is found, as represented by block 82, between the account and fraud database 10, then an alert message 84 is generated in real time, “near” real time, or via batch. In addition, the account record may be sent to an on-line queue 86 to be monitored and/or manually worked by the client. Upon entry to the queue, the non-monetary transactions would be suspended or placed on hold until manual follow up is completed. In the case of new account entries and batch-entered new accounts, the accounts may be built on the system, however, plastic generation would be suspended.
  • Information residing within the queue includes the account record information, the reason for the alert (i.e., potential fraudulent name, address, social security number, or phone number), and the contributing source of the matched data. This process helps to reduce responsibility/liability for data integrity.
  • Scoring of Matched Data
  • In an embodiment of the present invention, clients have the option of having matched fraud data records “scored” to assist in the decision/action processes when a record is queued, as represented by block 88. This should provide business opportunities to build the appropriate scorecard logic. Accordingly, a generic suite of scorecards 90 may be implemented as well as client-defined scorecards 92.
  • Consortium Contributors
  • All consortium contributors are allowed access to the entire data warehouse. Usage incentives may be provided for “global” contributors. An example of a usage incentive may be reduced fees for accessing fraud database 10. Other incentives include partial to full access to information contained in fraud database 10.
  • Non-Consortium User
  • A non-contributor to the consortium may be offered access to information that the database manager may have purchased or provided in a non-consortium database 100. Otherwise non-contributors may be restricted from information provided by “global” contributors to Risk Consortium Database 10.
  • Summary of Benefits and Critical Needs Met
      • Provides a single source of uniform data from various contributor business sources;
      • Increases the effectiveness of fraud detection efforts;
      • Allows clients to reduce current manual processes for fraud identification and actioning;
      • Pools data across the client base to improve identification of repeat offenders.
    Consortium Risk Data Warehouse
  • Consortium data warehouse 10 (i.e., risk or fraud database 10) contains data contributed from various business sources 110 including, but not limited to:
      • Clients;
      • Research and Investigation Fraud Files (Fraud App's and Account takeovers (type lost 3,5,8));
      • Customer Service Fraud File Database;
      • Card Activation ANI Risk Database;
      • Postal NRI Database (high risk Zip Codes);
      • Social Security Administration compromised SSN's;
      • International Association of Financial Crimes Investigators;
      • Cellular or Pay Phone Numbers/Numbers used fraudulently;
      • Western Union Fraud Data;
      • American Business List (prison addresses, hospitals, etc.);
      • Account takeover modeling/scoring;
      • Potential model for Skimmin;
      • American Correctional Association;
      • Lexis/Nexis.
    Proposed Data Element Structure
  • As depicted in FIG. 4, the data element structure 200 may include:
      • Name (Primary and Secondary and additional): First, Last, Middle Initial;
      • Address: Home, Business (including PO Box);
      • City;
      • State;
      • Zip Code;
      • Phone: Home, Business;
      • Social Security Number: Primary, Secondary;
      • High Risk Zip Codes (NRI data); and
      • Known fraudulent accounts determined by type lost.
  • Therefore, systems and methods in accordance with embodiments of the present invention provide a single source of uniform data from various contributor business sources 210, increase the effectiveness of fraud detection efforts, allow clients 212 to reduce current manual processes for fraud identification and actioning, and allow pooling of data across the client base to improve the identification of repeat offenders.
  • While embodiments of the present invention have been illustrated and described, it is not intended that these embodiments illustrate and describe all possible forms of the present invention. Rather, the words used in the specification are words of description rather than limitation, and it is understood that various changes may be made without departing from the spirit and scope of the present invention.

Claims (20)

1. A method for preventing card fraud, the method comprising:
obtaining card event information of a card user from a provider during a card event between the card user and the provider;
comparing the card event information with known fraudulent information stored in a database; and
sending an alert to the provider if there is a match between the card event information and the known fraudulent information.
2. The method of claim 1 wherein:
obtaining card event information of the card user from the provider comprises obtaining at least one of a name of the card user, a social security number of the card user, and an address of the card user.
3. The method of claim 1 further comprising:
receiving known fraudulent information by the database for storage therein from at least one source of known fraudulent information.
4. The method of claim 1 wherein:
the card event involves a card application process between the card user and the provider.
5. The method of claim 1 wherein:
the card event involves a card activation process between the card user and the provider.
6. The method of claim 1 wherein:
the card event involves either a card mail order transaction or a card phone order transaction between the card user and the provider.
7. The method of claim 1 wherein:
the card event involves an address change process between the card user and the provider.
8. The method of claim 1 further comprising:
suspending the card event if there is a match between the card event information and the known fraudulent information.
9. The method of claim 1 wherein:
sending an alert to the provider comprises sending the alert either in real time or via batch to the provider.
10. The method of claim 1 wherein:
the provider is either a card issuer, a merchant, or a service provider.
11. A system for preventing card fraud, the system comprising:
a database for storing known fraudulent information; and
a processor in communication with the database and a provider;
wherein the processor receives card event information of a card user from the provider during a card event between the card user and the provider, compares the card event information with the known fraudulent information stored in the database, and sends an alert to the provider if there is a match between the card event information and the known fraudulent information.
12. The system of claim 11 wherein:
the card event information includes at least one of a name of the card user, a social security number of the card user, and an address of the card user.
13. The system of claim 11 further comprising:
at least one source of known fraudulent information;
wherein the database receives known fraudulent information for storage therein from the at least one source of known fraudulent information.
14. The system of claim 11 wherein:
the card event involves a card application process between the card user and the provider.
15. The system of claim 11 wherein:
the card event involves a card activation process between the card user and the provider.
16. The system of claim 11 wherein:
the card event involves either a card mail order transaction or a card phone order transaction between the card user and the provider.
17. The system of claim 11 wherein:
the card event involves an address change process between the card user and the provider.
18. The system of claim 1 wherein:
the processor suspends the card event if there is a match between the card event information and the known fraudulent information.
19. The system of claim 11 wherein:
the processor sends the alert to the provider either in real time or via batch.
20. The system of claim 11 wherein:
the provider is either a card issuer, a merchant, or a service provider.
US11/811,299 1998-10-26 2007-06-08 Method and system for preventing card fraud Abandoned US20080288385A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/811,299 US20080288385A1 (en) 1998-10-26 2007-06-08 Method and system for preventing card fraud

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US10561198P 1998-10-26 1998-10-26
US09/425,471 US7337119B1 (en) 1998-10-26 1999-10-22 System and method for detecting purchasing card fraud
US11/811,299 US20080288385A1 (en) 1998-10-26 2007-06-08 Method and system for preventing card fraud

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US09/425,471 Continuation US7337119B1 (en) 1998-10-26 1999-10-22 System and method for detecting purchasing card fraud

Publications (1)

Publication Number Publication Date
US20080288385A1 true US20080288385A1 (en) 2008-11-20

Family

ID=39103715

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/425,471 Expired - Lifetime US7337119B1 (en) 1998-10-26 1999-10-22 System and method for detecting purchasing card fraud
US11/811,299 Abandoned US20080288385A1 (en) 1998-10-26 2007-06-08 Method and system for preventing card fraud

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US09/425,471 Expired - Lifetime US7337119B1 (en) 1998-10-26 1999-10-22 System and method for detecting purchasing card fraud

Country Status (1)

Country Link
US (2) US7337119B1 (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100138338A1 (en) * 2008-09-24 2010-06-03 Ayman Hammad Intelligent alert system and method
US20100268696A1 (en) * 2009-04-16 2010-10-21 Brad Nightengale Advanced Warning
US20110238575A1 (en) * 2010-03-23 2011-09-29 Brad Nightengale Merchant fraud risk score
US8346662B2 (en) 2008-05-16 2013-01-01 Visa U.S.A. Inc. Desktop alert with interactive bona fide dispute initiation through chat session facilitated by desktop application
US8396455B2 (en) 2008-09-25 2013-03-12 Visa International Service Association Systems and methods for sorting alert and offer messages on a mobile device
CN103780592A (en) * 2012-10-24 2014-05-07 阿里巴巴集团控股有限公司 Method and apparatus for determining being stolen of user account
US9449327B2 (en) 2009-04-28 2016-09-20 Visa International Service Association Merchant alert based system and method including customer presence notification
US9542675B2 (en) 2009-04-28 2017-01-10 Visa International Service Association Alert architecture
US9710802B2 (en) 2009-04-28 2017-07-18 Visa International Service Association Merchant competition alert
US10387885B2 (en) 2009-04-28 2019-08-20 Visa International Service Association SKU level control and alerts
US20230231876A1 (en) * 2020-08-18 2023-07-20 Wells Fargo Bank, N.A. Fuzzy logic modeling for detection and presentment of anomalous messaging

Families Citing this family (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7870078B2 (en) 2002-11-01 2011-01-11 Id Insight Incorporated System, method and computer program product for assessing risk of identity theft
EP1668490A4 (en) * 2003-10-03 2008-05-14 Npx Technologies Ltd Methods and systems for determining the reliability of transactions
US7715560B2 (en) * 2004-11-17 2010-05-11 Inventec Appliances Corp. Systems and methods for hiding a data group
CN1835014A (en) * 2006-03-28 2006-09-20 阿里巴巴公司 Method and system of monitoring on-line service risk
US7575157B2 (en) * 2007-05-22 2009-08-18 Bank Of America Corporation Fraud protection
US8447669B2 (en) 2008-08-26 2013-05-21 Visa U.S.A. Inc. System and method for implementing financial assistance programs
US9317876B2 (en) * 2009-02-24 2016-04-19 Blake Bookstaff Automatically adding gratuity to amount charged in electronic transaction
US20110131131A1 (en) * 2009-12-01 2011-06-02 Bank Of America Corporation Risk pattern determination and associated risk pattern alerts
US8473415B2 (en) 2010-05-04 2013-06-25 Kevin Paul Siegel System and method for identifying a point of compromise in a payment transaction processing system
WO2012054786A1 (en) 2010-10-20 2012-04-26 Playspan Inc. Flexible monetization service apparatuses, methods and systems
US10204327B2 (en) 2011-02-05 2019-02-12 Visa International Service Association Merchant-consumer bridging platform apparatuses, methods and systems
US9953334B2 (en) 2011-02-10 2018-04-24 Visa International Service Association Electronic coupon issuance and redemption apparatuses, methods and systems
BR112013021059A2 (en) 2011-02-16 2020-10-27 Visa International Service Association Snap mobile payment systems, methods and devices
US10586227B2 (en) 2011-02-16 2020-03-10 Visa International Service Association Snap mobile payment apparatuses, methods and systems
BR112013021057A2 (en) 2011-02-22 2020-11-10 Visa International Service Association universal electronic payment devices, methods and systems
US9773212B2 (en) 2011-02-28 2017-09-26 Visa International Service Association Secure anonymous transaction apparatuses, methods and systems
WO2012122060A1 (en) 2011-03-04 2012-09-13 Visa International Service Association Cloud service facilitator apparatuses, methods and systems
WO2012155081A1 (en) 2011-05-11 2012-11-15 Visa International Service Association Electronic receipt manager apparatuses, methods and systems
WO2012167202A2 (en) 2011-06-03 2012-12-06 Visa International Service Association Virtual wallet card selection apparatuses, methods and systems
US9582598B2 (en) 2011-07-05 2017-02-28 Visa International Service Association Hybrid applications utilizing distributed models and views apparatuses, methods and systems
WO2013006725A2 (en) 2011-07-05 2013-01-10 Visa International Service Association Electronic wallet checkout platform apparatuses, methods and systems
US9355393B2 (en) 2011-08-18 2016-05-31 Visa International Service Association Multi-directional wallet connector apparatuses, methods and systems
US10438176B2 (en) 2011-07-17 2019-10-08 Visa International Service Association Multiple merchant payment processor platform apparatuses, methods and systems
US10825001B2 (en) 2011-08-18 2020-11-03 Visa International Service Association Multi-directional wallet connector apparatuses, methods and systems
US10318941B2 (en) 2011-12-13 2019-06-11 Visa International Service Association Payment platform interface widget generation apparatuses, methods and systems
US10242358B2 (en) 2011-08-18 2019-03-26 Visa International Service Association Remote decoupled application persistent state apparatuses, methods and systems
US9710807B2 (en) 2011-08-18 2017-07-18 Visa International Service Association Third-party value added wallet features and interfaces apparatuses, methods and systems
US9117225B2 (en) 2011-09-16 2015-08-25 Visa International Service Association Apparatuses, methods and systems for transforming user infrastructure requests inputs to infrastructure design product and infrastructure allocation outputs
US10223730B2 (en) 2011-09-23 2019-03-05 Visa International Service Association E-wallet store injection search apparatuses, methods and systems
WO2013090611A2 (en) 2011-12-13 2013-06-20 Visa International Service Association Dynamic widget generator apparatuses, methods and systems
US9953378B2 (en) 2012-04-27 2018-04-24 Visa International Service Association Social checkout widget generation and integration apparatuses, methods and systems
US10223710B2 (en) 2013-01-04 2019-03-05 Visa International Service Association Wearable intelligent vision device apparatuses, methods and systems
US10262148B2 (en) 2012-01-09 2019-04-16 Visa International Service Association Secure dynamic page content and layouts apparatuses, methods and systems
US11308227B2 (en) 2012-01-09 2022-04-19 Visa International Service Association Secure dynamic page content and layouts apparatuses, methods and systems
AU2013214801B2 (en) 2012-02-02 2018-06-21 Visa International Service Association Multi-source, multi-dimensional, cross-entity, multimedia database platform apparatuses, methods and systems
US11216468B2 (en) 2015-02-08 2022-01-04 Visa International Service Association Converged merchant processing apparatuses, methods and systems

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5239462A (en) * 1992-02-25 1993-08-24 Creative Solutions Groups, Inc. Method and apparatus for automatically determining the approval status of a potential borrower
US5774882A (en) * 1992-03-12 1998-06-30 Keen; Regina D. Credit approval system
US5819226A (en) * 1992-09-08 1998-10-06 Hnc Software Inc. Fraud detection using predictive modeling

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5239462A (en) * 1992-02-25 1993-08-24 Creative Solutions Groups, Inc. Method and apparatus for automatically determining the approval status of a potential borrower
US5774882A (en) * 1992-03-12 1998-06-30 Keen; Regina D. Credit approval system
US5819226A (en) * 1992-09-08 1998-10-06 Hnc Software Inc. Fraud detection using predictive modeling

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8346662B2 (en) 2008-05-16 2013-01-01 Visa U.S.A. Inc. Desktop alert with interactive bona fide dispute initiation through chat session facilitated by desktop application
US20100138338A1 (en) * 2008-09-24 2010-06-03 Ayman Hammad Intelligent alert system and method
US9325833B2 (en) 2008-09-25 2016-04-26 Visa International Service Association Systems and methods for sorting alert and offer messages on a mobile device
US9071463B2 (en) 2008-09-25 2015-06-30 Visa International Service Association Systems and methods for sorting alert and offer messages on a mobile device
US8396455B2 (en) 2008-09-25 2013-03-12 Visa International Service Association Systems and methods for sorting alert and offer messages on a mobile device
US8903735B2 (en) 2009-04-16 2014-12-02 Visa International Service Association System and method for pushing advanced warning alerts
US20100268696A1 (en) * 2009-04-16 2010-10-21 Brad Nightengale Advanced Warning
US8380569B2 (en) * 2009-04-16 2013-02-19 Visa International Service Association, Inc. Method and system for advanced warning alerts using advanced identification system for identifying fraud detection and reporting
US10552842B2 (en) 2009-04-28 2020-02-04 Visa International Service Association SKU level control and alerts
US9710802B2 (en) 2009-04-28 2017-07-18 Visa International Service Association Merchant competition alert
US10748149B2 (en) 2009-04-28 2020-08-18 Visa International Service Association Alert architecture
US10387885B2 (en) 2009-04-28 2019-08-20 Visa International Service Association SKU level control and alerts
US10380571B2 (en) 2009-04-28 2019-08-13 Visa International Service Association Merchant alert based system and method including customer presence notification
US9449327B2 (en) 2009-04-28 2016-09-20 Visa International Service Association Merchant alert based system and method including customer presence notification
US9542675B2 (en) 2009-04-28 2017-01-10 Visa International Service Association Alert architecture
US8626663B2 (en) 2010-03-23 2014-01-07 Visa International Service Association Merchant fraud risk score
US20110238575A1 (en) * 2010-03-23 2011-09-29 Brad Nightengale Merchant fraud risk score
WO2011119761A3 (en) * 2010-03-23 2012-04-12 Visa International Service Association Merchant fraud risk score
WO2011119761A2 (en) * 2010-03-23 2011-09-29 Visa International Service Association Merchant fraud risk score
US11132686B2 (en) 2010-03-23 2021-09-28 Visa International Service Association Merchant fraud risk score
US11775976B2 (en) 2010-03-23 2023-10-03 Visa International Service Association Merchant fraud risk score
CN103780592A (en) * 2012-10-24 2014-05-07 阿里巴巴集团控股有限公司 Method and apparatus for determining being stolen of user account
US20230231876A1 (en) * 2020-08-18 2023-07-20 Wells Fargo Bank, N.A. Fuzzy logic modeling for detection and presentment of anomalous messaging

Also Published As

Publication number Publication date
US7337119B1 (en) 2008-02-26

Similar Documents

Publication Publication Date Title
US7337119B1 (en) System and method for detecting purchasing card fraud
US6418436B1 (en) Scoring methodology for purchasing card fraud detection
US20230177635A1 (en) System, Method and Computer Program Product for Assessing Risk of Identity Theft
US10319028B2 (en) Payment account monitoring system and method
US5950179A (en) Method and system for issuing a secured credit card
US8296232B2 (en) Systems and methods for screening payment transactions
US6783065B2 (en) Purchasing card transaction risk model
US7028052B2 (en) Systems and methods for notifying a consumer of changes made to a credit report
US7313545B2 (en) System and method for detecting fraudulent calls
US8170953B1 (en) Systems and method for screening payment transactions
US6658393B1 (en) Financial risk prediction systems and methods therefor
US7699221B2 (en) Systems and methods for performing a simplified risk assessment
US20030009426A1 (en) Methods and apparatus for protecting against credit card fraud, check fraud, and identity theft
US20040215543A1 (en) Systems and methods for providing enhanced merchant contact detail for credit and debit card transactions
US20030195859A1 (en) System and methods for authenticating and monitoring transactions
US20020161701A1 (en) Debit or credit card transaction clearing house system
WO2000011574A2 (en) System and method for updating a credit information database
EP2845153A1 (en) Systems and methods for preventing fraudulent purchases
US20190287088A1 (en) System and method for setting a hot product alert on transaction data
WO2000025251A1 (en) System and method for detecting purchasing card fraud
WO2002059849A1 (en) Method and system for preventing credit card fraud

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION