会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Risk assessment rule set application for fraud prevention
    • 风险评估规则设定防欺诈申请
    • US08924279B2
    • 2014-12-30
    • US12774521
    • 2010-05-05
    • Frederick LiuNancy HilgersMark NelsenKevin SiegelChristopher BrownThomas Dwyer
    • Frederick LiuNancy HilgersMark NelsenKevin SiegelChristopher BrownThomas Dwyer
    • G06Q40/00
    • G06Q20/4016G06Q20/40G06Q20/405
    • Rules, applied to deny authorization of likely fraudulent transactions, are derived from a modified Patient Rule Induction Method algorithm that uses a target variable and a data set of past transactions each associated with a plurality of input variables and a hyper-rectangle enclosing a multi-dimensional space defined by a representation of the input variable values as points within the multi-dimensional space. While a count of the points within the hyper-rectangle is greater than a minimum support parameter, a first plurality of points proximal to edges of the hyper-rectangle are removed, where each such removing maximizes a mean value of the target variable, and then, while the mean value remains maximized, a second plurality of points proximal to the edges is added, where each adding maximizes or maintains the mean value. The hyper-rectangle is bounded within a minimum bounding box that defines the rules.
    • 应用于拒绝对可能的欺诈交易的授权的规则来自修改的患者规则诱导方法算法,该算法使用目标变量和与多个输入变量相关联的过去交易的数据集,以及包围多个输入变量的超矩形, 由输入变量值的表示定义的多维空间作为多维空间内的点。 虽然超矩形内的点的计数大于最小支持参数,但是去除超矩形边缘附近的第一多个点,其中每个这样的移除最大化目标变量的平均值,然后 当平均值保持最大时,添加靠近边缘的第二多个点,其中每个添加最大化或维持平均值。 超矩形在定义规则的最小边界框内是有界的。
    • 2. 发明申请
    • RISK ASSESSMENT RULE SET APPLICATION FOR FRAUD PREVENTION
    • 风险评估规则申请预防欺诈
    • US20100287099A1
    • 2010-11-11
    • US12774521
    • 2010-05-05
    • Frederick LiuNancy HilgersMark NelsenKevin SiegelChristopher BrownThomas Dwyer
    • Frederick LiuNancy HilgersMark NelsenKevin SiegelChristopher BrownThomas Dwyer
    • G06Q40/00
    • G06Q20/4016G06Q20/40G06Q20/405
    • Rules, applied to deny authorization of likely fraudulent transactions, are derived from a modified Patient Rule Induction Method algorithm that uses a target variable and a data set of past transactions each associated with a plurality of input variables and a hyper-rectangle enclosing a multi-dimensional space defined by a representation of the input variable values as points within the multi-dimensional space. While a count of the points within the hyper-rectangle is greater than a minimum support parameter, a first plurality of points proximal to edges of the hyper-rectangle are removed, where each such removing maximizes a mean value of the target variable, and then, while the mean value remains maximized, a second plurality of points proximal to the edges is added, where each adding maximizes or maintains the mean value. The hyper-rectangle is bounded within a minimum bounding box that defines the rules.
    • 应用于拒绝对可能的欺诈交易的授权的规则来自修改的患者规则诱导方法算法,该算法使用目标变量和与多个输入变量相关联的过去交易的数据集,以及包围多个输入变量的超矩形, 由输入变量值的表示定义的多维空间作为多维空间内的点。 虽然超矩形内的点的计数大于最小支持参数,但是去除超矩形边缘附近的第一多个点,其中每个这样的移除最大化目标变量的平均值,然后 当平均值保持最大时,添加靠近边缘的第二多个点,其中每个添加最大化或维持平均值。 超矩形在定义规则的最小边界框内是有界的。
    • 6. 发明申请
    • SECURE REMOTE PAYMENT TRANSACTION PROCESSING
    • 安全远程付款交易处理
    • US20150019443A1
    • 2015-01-15
    • US14332245
    • 2014-07-15
    • John SheetsKim WagnerChristian AabyeFrederick LiuIgor KarpenkoGlenn PowellKiushan Pirzadeh
    • John SheetsKim WagnerChristian AabyeFrederick LiuIgor KarpenkoGlenn PowellKiushan Pirzadeh
    • G06Q20/32G06Q20/38
    • G06Q20/3278G06Q20/322G06Q20/3829
    • Embodiments of the present invention are directed to methods, apparatuses, computer readable media and systems for securely processing remote transactions. One embodiment of the invention is directed to a method of processing a remote transaction initiated by a mobile device comprising a server computer receiving a payment request including encrypted payment information. The encrypted payment information being generated by a mobile payment application of the mobile device and being encrypted using a third party key. The method further comprises decrypting the encrypted payment information using the third party key, determining a transaction processor public key associated with the payment information, and re-encrypting the payment information using the transaction processor public key. The method further comprises sending a payment response including the re-encrypted payment information to a transaction processor. The transaction processor decrypts the re-encrypted payment information using a transaction processor private key and initiates a payment transaction.
    • 本发明的实施例涉及用于安全地处理远程事务的方法,装置,计算机可读介质和系统。 本发明的一个实施例涉及一种处理由移动设备发起的远程交易的方法,该移动设备包括服务器计算机接收包括加密支付信息的支付请求。 加密的支付信息由移动设备的移动支付应用程序生成,并使用第三方密钥进行加密。 该方法还包括使用第三方密钥对加密的支付信息进行解密,确定与支付信息相关联的交易处理器公开密钥,以及使用交易处理器公开密钥重新加密支付信息。 该方法还包括向业务处理器发送包括重新加密的支付信息的支付响应。 交易处理器使用交易处理器私钥解密重新加密的支付信息并启动支付交易。