Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

49 results about "Fraudulent Data" patented technology

Mobile User Identify And Risk/Fraud Model Service

Transactions using, for example, Near Field Communication (NFC), Bluetooth, online, or other applications, may pose a risk of fraud or identity theft. According to an embodiment, a method of evaluating transaction information in view of potential fraud and / or risk includes receiving transaction information at a remote location. The method also includes correlating the received transaction information with user data maintained at the remote location. The method further includes generating a score and / or risk or fraud data based on the correlating. Such transactions may be facilitated by a payment service provider. Related methods, devices, and systems are also disclosed.
Owner:PAYPAL INC

Method and System for OCDM-Based Photonic Layer Security Robustness to Spoof Data Integrity

A system and method is provided for identifying fraudulent data in an optical data transmission. The system and method includes scrambling an encoded data signal using dynamically changing scramble code; transmitting the scrambled encoded data signal over a network; descrambling the scrambled encoded data signal using a descramble code corresponding to a compliment of the dynamically changing scramble code; analyzing the descrambled encoded data signal to search for a region of low error between descrambled data and noise; notifying of a possible spoofing attempt when a region of low error is not found; and decoding the descrambled encoded data signal using a compliment of phase codes originally used for encoding the encoded data signal in order to generate a decoded signal to retrieve a desired data signal when a region of low error is found.
Owner:TELCORDIA TECHNOLOGIES INC

Fraudulent user identification method, fraudulent user identification device and electronic equipment

The invention provides a fraudulent user identification method, a fraudulent user identification device and electronic equipment. The method comprises the steps of obtaining historical user data, historical transaction data and fraud data, and constructing a user fraud network graph; based on the user fraud network graph, extracting and screening model characteristic variables; subdividing the user group according to a preset strategy, and establishing a training data set and a verification data set based on a subdivision result of the user group and the screened model characteristic variables; establishing a plurality of segmented transaction fraud evaluation models, and training the transaction fraud evaluation models by using the training data set; obtaining user data and transaction data of a current user, and calculating a fraud evaluation value of the current user by using the corresponding transaction fraud evaluation model; and identifying whether the user is a fraudulent userbased on the fraudulent evaluation value of the user. According to the method, fraudulent clients can be identified more accurately, the fraudulent probability identification accuracy is effectively improved, and the model prediction precision is improved.
Owner:SHANGHAI QIYUE INFORMATION TECH CO LTD

Recognition processing method of data

The invention discloses a recognition processing method of data, comprising the following steps: step S10 of recognizing the data in real time, and respectively storing fraud data, non-fraud data and data corresponding trust values into a database; step S11 of recognizing the data periodically, storing a fraud site into a fraud site database, and distributing obtained site trust values to the data under the side at the same time; step S12 of comprehensively recognizing the data, recognizing and judging the data stored in the non-fraud database in real-time recognition again according to the trust values acquired in a periodically-recognizing stage. The method provided by the invention forms a set of complete data recognition mechanism through organically combining data real-time recognition periodical recognition and data comprehensive recognition based on data fusion, respond to clients fast through an effective recognition method on the basis of acquired user access data, and simultaneously ensure accuracy and comprehensiveness for recognition.
Owner:ZHEJIANG PANSHI INFORMATION TECH

Dynamically providing safe phone numbers for responding to inbound communications

A system and method for dynamically providing safe call back numbers to use to respond to an inbound communication, the method comprising parsing message records from a message server, analyzing the message records for untrustworthy phone numbers by comparing content of the message records to a reference data set that is retrieved from a database, the reference data set including genuine and fraud data wherein the genuine and fraud data includes entities and contact information corresponding to the entities, determining untrustworthy phone numbers in the message records from the analysis, and generating remedy actions based on the determination of the untrustworthy phone numbers.
Owner:YOUMAIL

Credit card fraud identification method

The invention discloses a credit card fraud identification method, and relates to the technical field of credit cards. The identification method comprises the following steps: after desensitizing acquired data, dividing the acquired data into a training set and a test set; adding part of noise to the fraudulent data in the training set, generating new fraudulent data, adding the new fraudulent data into the training set, and solving the problem of imbalance of the training set; a PCA method is adopted to perform feature extraction on the training set and the test set, and after feature vectorsare obtained, adopting an RF algorithm to construct a classifier according to feature data of the training set; importing the test set feature data into an RF classifier to identify and classify fraudulent transactions; and finally, evaluating the classification result by using a cost evaluation method to obtain the performance of the fraud identification method. According to the method, information can be quickly collected and preprocessed, and meanwhile, new fraud data is generated and added into a training set; modeling and classification are convenient to achieve, meanwhile, data evaluation can be achieved, and efficiency is improved.
Owner:HARBIN UNIV OF SCI & TECH

Malicious group determination method and device, electronic equipment and storage medium

The embodiment of the invention discloses a malicious group determination method and device, electronic equipment and a storage medium. The method comprises the steps of determining a knowledge graphaccording to a relationship between initial entities in historical fraud data; determining the similarity degree between different initial entities in the knowledge graph, and selecting candidate entities from the initial entities according to the similarity degree; according to the candidate entities, dividing the knowledge graph determined by the candidate entities into candidate groups; and determining whether the candidate group is a malicious group or not according to the score of the candidate entity in the candidate group. By running the technical scheme provided by the embodiment of the invention, the problems that a single-dimensional risk control strategy is difficult to acquire malicious gang behaviors in multiple directions, the occurrence time of the malicious gang behaviors is short, and malicious gangs are difficult to effectively discover and deploy the strategy in a short time can be solved, and the risk control efficiency is improved. The effect of improving the efficiency and accuracy of malicious group determination is achieved.
Owner:CHINA CONSTRUCTION BANK

Network security system

ordering information is received by the server 3 through the network 1, when the order is placed by a user. The received data storage means 6 stores data with an external format 4 the server received. The received data format conversion means 7 converts data with an external format 4 stored in the received data storage means 6 to data with an internal format 5, and must be stored in the received process data storage means 8. The host computer 10 administrates the orders using the data with the internal format 5 stored in the received process data storage means. By the construction stated above, fraudulent data can be eliminated as the received data format conversion means 7 can convert data with an external format 4 to data with reliable internal format 5.
Owner:SEIKO EPSON CORP +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products