Unlock instant, AI-driven research and patent intelligence for your innovation.

Mobile device fraud detection using locally stored behavioral information of others

a fraud detection and local storage technology, applied in the field of mobile devices, can solve the problems of insufficient user experience, inoptimized user experience, limited user interface technology, etc., and achieve the effect of fewer infrastructure investments, improved accuracy, and precise identification and prevention of fraud

Inactive Publication Date: 2016-05-19
OFFLA SELFSAFE LTD
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This approach enhances fraud detection accuracy for both customers and merchants, reduces false positives and negatives, and allows for more stringent security measures without overloading financial institutions, while minimizing data transmission and processing time.

Problems solved by technology

The SMS communications protocol is inexpensive and relatively simple to use and is now the more accepted method of payment using mobile device, however, the user experience is not adequate.
This technology has limited user interface and user experience is not optimal.
Payment card fraud occurs when an element (e.g. person) creates financial or material gain by the use of payment means or payment means information to complete a transaction that is not approved by the legal account holder.
However, since no statistical model is foolproof, in practice there is always a need to balance between two extremes: a model that will find almost every fraudulent transaction but with many errors (false positive) and a model that will not have many errors but will also miss on real fraud (false negative).
In the current systems it is impossible to check every suspected transaction because it will create an enormous load on the resources of the computing system.
As a result, current systems compromise and do not check every transaction, even though some transactions can be fraudulent.
Ongoing struggle with fraud drove their extent down.
This is because the investment in infrastructure in order to verify small amount transactions would not be cost effective compared to the gain.
During the check, the server has to retrieve all the needed information needed for processing and perform a large amount of complex mathematical calculations.
In practice, these servers are very expensive.
Therefore the issuer compromises on the quality of the statistical models and the quantity of the cheeks.
The result is that the level of coverage and accuracy are insufficient and there are many mistakes:
In practice, due to the low level of accuracy, transactions are rarely blocked.
However, when self-authentication (offline approval) process estimates a possibility of fraud usage, online approval for more detailed statistical analysis processing is requested from a remote computer.
None of the current technologies and prior art, taken alone or in combination, does not address the issue of offline authorization, self-authentication and fraud detection of a transaction, e.g. there is no handling of the security aspects of the transaction without requesting the bank or the credit card company for approval.
There is also no solution to the issue of using a statistical model with lower suspicious rate then current statistical models without blocking the transaction or the card.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile device fraud detection using locally stored behavioral information of others
  • Mobile device fraud detection using locally stored behavioral information of others
  • Mobile device fraud detection using locally stored behavioral information of others

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0102]The following terminology will be used throughout the description:

[0103]ACH

[0104]Short for “Automated Clearing House”, a nationwide electronic network for financial transactions. The network clears credit sod debit transactions. Rules and regulations for the network are set by NACHA and the Federal Reserve.

[0105]Acquirer, Merchant Acquirer

[0106]Either a bank, a processor or independent sales organization (ISO) handling the merchant's card acceptance. A processor or ISO will work with an acquiring hank, which is needed to officially accept payment on behalf of the merchant.

[0107]AML / ATF

[0108]Anti-Money Laundering / Anti-Terrorist Financing

[0109]Associations, also referred to as “Payment brands” or “Network” In the world of credit and debit cards, this is a legacy term that referred to ownership of networks by groups of financial institutions. Today, the word is sometimes used to refer to companies such as MasterCard, Visa, American Express, Discover, STAR, NYCE and others which r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system; method and a device for offline authentication of transactions using mobile device, based on, analytic engine such as behavioral pattern detection are provided. The behavioral pattern can be for a specific person, for group of people with similar characteristics, or a combination of the two. The invention has the advantage over the prior art controlized authenication and fraud detection systems in that it is more precise in identifying and preventing fraud in real time. The precision is better for both customer and merchant frauds. The present invention also requires fewer investments in infrastructure and uses less communication traffic when compared in the prior art.

Description

FIELD OF THE INVENTION[0001]The present invention is directed to the use of mobile devices in offline transactions, and, more particularly, to a system, method and device for self-authentication of transactions.DESCRIPTION OF THE RELATED ART[0002]Mobile devices nowadays are in widespread use. The mobile devices of today have many uses other than plain conversation and messaging. One of the emerging fields of use for the mobile devices is for transactions such as purchasing an item.[0003]The improved ability of mobile devices provides enhanced web capabilities (e.g. internet) and applications. The user interface has improved and thus created a platform for applications, innovative initiatives and new opportunities.[0004]In the context of financial transactions, the mobile device can he used in many processes, when payments by which (in-payments) are one category:of financial transactions implemented by the mobile platform, along with financial services (nit-services) and trade (m-com...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): G06Q20/40G06Q20/32
CPCG06Q20/327G06Q20/4016G06Q20/3224G06Q20/40145G06Q30/0201G06Q20/3229G06Q20/3278G06Q20/38215G06Q20/4012G06Q20/3227H04L9/50G06Q20/202G06Q20/3674G06Q20/085G06Q20/40G06Q20/4014G06Q2220/00G06Q20/10G06Q20/3226G06Q20/405G06Q20/325
Inventor EINHORN, ORI
Owner OFFLA SELFSAFE LTD