会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Method and system for detecting fraud
    • US08548858B2
    • 2013-10-01
    • US12491801
    • 2009-06-25
    • Jason W. MayIan Flint
    • Jason W. MayIan Flint
    • G06Q20/00
    • G06Q20/4016G06Q20/02G06Q20/04G06Q20/206G06Q20/40G06Q20/401G06Q20/403G06Q30/04G06Q30/0619G06Q40/12G07G3/003
    • A system and method for detecting fraud when facilitating a payment transaction over a global wide area network. The method comprises receiving a sale information, receiving a payment information from a buyer, and analyzing a transaction information for fraud. If the analyzing indicates fraud, an enhanced transaction information is communicated to a human for fraud analysis. In one embodiment, the method comprises performing rule-based analyses to determine whether the transaction appears to be fraudulent. Rule-based analyses may include suspect data rules and velocity rules. Velocity rules generally determine whether there has been excessive activity that may lead to a conclusion that the transaction may be fraudulent. Suspect data rules are used to determine whether the billing, shipping, selling addresses, telephone numbers, and account numbers, and other data are in a syntactically correct format and whether they exist. In one embodiment, the method further comprises performing simple screening of the transaction information. In one embodiment, the method further comprises seeking approval from a third party such as a financial institution based on the payment information. The method may be implemented as part of a system that includes personal computers, server computers, and other personal computing devices, some of which may communicate over the Internet, and others which may communicate via dedicated communication lines.
    • 4. 发明申请
    • METHOD AND SYSTEM FOR DETECTING FRAUD
    • 检测欺诈的方法和系统
    • US20090265211A1
    • 2009-10-22
    • US12491801
    • 2009-06-25
    • Jason W. MayIan Flint
    • Jason W. MayIan Flint
    • G06Q20/00G06Q10/00G06Q30/00G06Q40/00G06F15/16
    • G06Q20/4016G06Q20/02G06Q20/04G06Q20/206G06Q20/40G06Q20/401G06Q20/403G06Q30/04G06Q30/0619G06Q40/12G07G3/003
    • A system and method for detecting fraud when facilitating a payment transaction over a global wide area network. The method comprises receiving a sale information, receiving a payment information from a buyer, and analyzing a transaction information for fraud. If the analyzing indicates fraud, an enhanced transaction information is communicated to a human for fraud analysis. In one embodiment, the method comprises performing rule-based analyses to determine whether the transaction appears to be fraudulent. Rule-based analyses may include suspect data rules and velocity rules. Velocity rules generally determine whether there has been excessive activity that may lead to a conclusion that the transaction may be fraudulent. Suspect data rules are used to determine whether the billing, shipping, selling addresses, telephone numbers, and account numbers, and other data are in a syntactically correct format and whether they exist. In one embodiment, the method further comprises performing simple screening of the transaction information. In one embodiment, the method further comprises seeking approval from a third party such as a financial institution based on the payment information. The method may be implemented as part of a system that includes personal computers, server computers, and other personal computing devices, some of which may communicate over the Internet, and others which may communicate via dedicated communication lines.
    • 一种用于在促进全球广域网上的支付交易时检测欺诈的系统和方法。 该方法包括接收销售信息,从买方接收支付信息,并分析交易信息以进行欺诈。 如果分析指示欺诈,则将增强的交易信息传达给人以进行欺诈分析。 在一个实施例中,该方法包括执行基于规则的分析以确定该交易是否是欺诈性的。 基于规则的分析可能包括可疑数据规则和速度规则。 速度规则通常决定是否存在可能导致交易可能是欺诈性的结论的过度活动。 可疑数据规则用于确定计费,运输,销售地址,电话号码和帐号以及其他数据是否具有语法正确的格式,以及是否存在。 在一个实施例中,该方法还包括执行交易信息的简单筛选。 在一个实施例中,该方法还包括基于支付信息来寻求诸如金融机构的第三方的批准。 该方法可以被实现为包括个人计算机,服务器计算机和其他个人计算设备的系统的一部分,其中一些可以通过因特网通信,以及可以经由专用通信线路进行通信的其他个人计算设备。
    • 5. 发明授权
    • Method and system for detecting fraud
    • 检测欺诈的方法和系统
    • US07610216B1
    • 2009-10-27
    • US09615638
    • 2000-07-13
    • Jason W. MayIan Flint
    • Jason W. MayIan Flint
    • G06Q20/00G06Q40/00
    • G06Q20/4016G06Q20/02G06Q20/04G06Q20/206G06Q20/40G06Q20/401G06Q20/403G06Q30/04G06Q30/0619G06Q40/12G07G3/003
    • A system and method for detecting fraud when facilitating a payment transaction over a global wide area network. The method comprises receiving a sale information, receiving a payment information from a buyer, and analyzing a transaction information for fraud. If the analyzing indicates fraud, an enhanced transaction information is communicated to a human for fraud analysis. In one embodiment, the method comprises performing rule-based analyses to determine whether the transaction appears to be fraudulent. Rule-based analyses may include suspect data rules and velocity rules. Velocity rules generally determine whether there has been excessive activity that may lead to a conclusion that the transaction may be fraudulent. Suspect data rules are used to determine whether the billing, shipping, selling addresses, telephone numbers, and account numbers, and other data are in a syntactically correct format and whether they exist. In one embodiment, the method further comprises performing simple screening of the transaction information. In one embodiment, the method further comprises seeking approval from a third party such as a financial institution based on the payment information. The method may be implemented as part of a system that includes personal computers, server computers, and other personal computing devices, some of which may communicate over the Internet, and others which may communicate via dedicated communication lines.
    • 一种用于在促进全球广域网上的支付交易时检测欺诈的系统和方法。 该方法包括接收销售信息,从买方接收支付信息,并分析交易信息以进行欺诈。 如果分析指示欺诈,则将增强的交易信息传达给人以进行欺诈分析。 在一个实施例中,该方法包括执行基于规则的分析以确定该交易是否是欺诈性的。 基于规则的分析可能包括可疑数据规则和速度规则。 速度规则通常决定是否存在可能导致交易可能是欺诈性的结论的过度活动。 可疑数据规则用于确定计费,运输,销售地址,电话号码和帐号以及其他数据是否具有语法正确的格式,以及是否存在。 在一个实施例中,该方法还包括执行交易信息的简单筛选。 在一个实施例中,该方法还包括基于支付信息从第三方(例如金融机构)获得批准。 该方法可以被实现为包括个人计算机,服务器计算机和其他个人计算设备的系统的一部分,其中一些可以通过因特网通信,以及可以经由专用通信线路进行通信的其他个人计算设备。