Unlock instant, AI-driven research and patent intelligence for your innovation.

System and Method For Identity Chaining

a technology of identity chaining and identity, applied in the field of identity chaining system and method, can solve problems such as fraud detection

Inactive Publication Date: 2013-05-02
VISA INT SERVICE ASSOC
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This patent describes a method for detecting fraud by analyzing a series of transactions and connecting them based on shared identities. If there are too many variations in the identities over a period of time, fraud can be detected. The method can also identify fraudulent transactions and add them to a negative list, which can be used to detect fraud in subsequent transactions. This helps prevent fraud by reducing the number of linked transactions. The method can also visualize the transactions and show patterns of activity that may be suspicious. Overall, this method helps improve the accuracy and preventiveness of fraud detection in payment processing.

Problems solved by technology

If a number of linked transactions over a period of time, e.g., a chain, reaches a maximum limit indicating too many variations for a single set of identities, fraud can be detected.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and Method For Identity Chaining
  • System and Method For Identity Chaining
  • System and Method For Identity Chaining

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017]In embodiments of the invention, identity chaining can be used in conjunction with a negative list in order to identify transactions as being potentially fraudulent. More specifically, in an identity chaining process, transactions associated with specific identities can be linked together to form a web of transactions. This process can be performed when screening orders for goods purchased on the Internet or for purchases made in person at a merchant's physical location.

[0018]Before discussing specific embodiments and examples, some descriptions of terms used herein are provided below.

[0019]As used herein, an “identity” can be a specific detail of a transaction, such as a username, a billing and / or shipping address, a payment card account number, a phone number, a device identifier or fingerprint, an email address, or any other information that can be associated with a transaction.

[0020]As used herein, a “chain” or “identity chain” can refer to a plurality of transactions whic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An identity chaining fraud detection method that allows each current transaction to be linked to other transactions through commonly shared identities. Over a period of time the links create a chain of associated transactions which can be analyzed to determine if identity variances occur, which indicates that fraud is detected. Additionally, if a specific identity is detected as being fraudulent, that identity can be tagged as fraudulent and can be referenced by a plurality of other merchant transaction chains to determine fraud.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS[0001]This application is related to U.S. Provisional Patent Application No. 61 / 552,972, filed on Oct. 28, 2011, titled “IDENTITY CHAINING,” by B. Scott Boding, and U.S. Provisional Patent Application No. 61 / 695,674, filed Aug. 31, 2012, titled “MULTIDIMENSIONAL LINKING ANALYSIS, SPIDERING FUNCTIONALITY, AND NEGATIVE LIST CHECKING ON BOUNCE,” by B. Scott Boding, each of which are herein incorporated by reference in their entirety for all purposes.BACKGROUND[0002]Fraud detection in payment card transactions can be based on historical data. Transaction details are collected over a period of time and analyzed by various methods. Two such methods include a velocity method and an identity morphing method.[0003]The velocity method determines a number of repeated transactions performed using a payment card over a period of time. For example, if one hundred different online transactions are charged on a payment card within a one hour time frame, the ve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q20/40
CPCG06Q20/4016G06Q20/4014
Inventor BODING, B. SCOTT
Owner VISA INT SERVICE ASSOC