Approaches for determining a potential merchant breach are described. A system can acquire card transaction data from one or more sources such as merchants or financial institutions, in some instances at a predetermined time interval. Cards associated with the card transaction data can be analyzed t
Approaches for determining a potential merchant breach are described. A system can acquire card transaction data from one or more sources such as merchants or financial institutions, in some instances at a predetermined time interval. Cards associated with the card transaction data can be analyzed to determine the health of a particular card, including the likelihood that the particular card has been compromised. A set of cards are accumulated, and their associated health data is stored. Based on the information obtained from a source, and the health associated with a set of cards, a potential date where a merchant was breached can be determined and fraudulent purchases can be prevented.
대표청구항▼
1. A system for determining a merchant breach, the system comprising: a memory device configured to store a set of instructions; andone or more processors configured to execute the set of instructions that cause the one or more processors to: acquire card transaction data from one or more merchants,
1. A system for determining a merchant breach, the system comprising: a memory device configured to store a set of instructions; andone or more processors configured to execute the set of instructions that cause the one or more processors to: acquire card transaction data from one or more merchants, wherein the acquisition of the card transaction data is performed at a first predetermined periodic interval;store information relating to payment cards associated with the card transaction data;for at least some of the payment cards, automatically determine at least one value indicative of card health and store the determined values for the payment cards, wherein determination of the at least one value indicative of card health is performed at a second predetermined periodic interval;accumulate, over a period of time, card health data for the payment cards based on the determined at least one value indicative of card health;store the accumulated card health data;identify a potential merchant breach and the timing of the potential merchant breach based on a comparison between the accumulated card health data and the stored information relating to payment cards associated with the card transaction data; anddisplay in a graph of a graphical user interface of the system, at least a portion of the accumulated card health data and the card transaction data indicating the potential merchant breach. 2. The system of claim 1, wherein the first predetermined periodic interval and the second predetermined periodic interval are both about one day. 3. The system of claim 1, wherein information identifying cards used at a particular merchant is collected at a particular time interval and stored in a memory. 4. The system of claim 1, wherein the card health is re-determined at least once for each of the payment cards. 5. The system of claim 1, wherein the card health values are stored based on a transaction date. 6. The system of claim 1, wherein a merchant breach is identified by determining the accumulated card health indicator values and identifying a concentration of abnormal card health indicator values within a particular date range. 7. They system of claim 1, wherein the comparison between the accumulated card health data and the stored information includes comparing the times at which card health data of the cards associated with the accumulated card health data changed and one or more common merchants included in the stored information. 8. A method for determining a merchant breach, the method comprising: acquiring card transaction data from one or more merchants, wherein the acquisition of the card transaction data is performed at a first predetermined periodic interval;storing information relating to payment cards associated with the card transaction data;for at least some of the payment cards, automatically determining at least one value indicative of card health and store the determined values for the payment cards, wherein determination of the at least one value indicative of card health is performed at a second predetermined periodic interval;accumulating, over a period of time, card health data for the payment cards based on the determined at least one value indicative of card health;storing the accumulated card health data;identifying a potential merchant breach and the timing of the potential merchant breach based on a comparison between the accumulated card health data and the stored information relating to payment cards associated with the card transaction data; anddisplaying in a graph of a graphical user interface of a system, at least a portion of the accumulated card health data and the card transaction data indicating the potential merchant breach. 9. The method of claim 8, wherein the first predetermined periodic interval and the second predetermined periodic interval are both about one day. 10. The method of claim 8, wherein information identifying cards used at a particular merchant is collected at a particular time interval and stored in a memory. 11. The method of claim 8, wherein the card health is re-determined at least once for each of the payment cards. 12. The method of claim 8, wherein the card health values are stored based on a transaction date. 13. The method of claim 8, wherein a merchant breach is identified by determining the accumulated card health indicator values and identifying a concentration of abnormal card health indicator values within a particular date range. 14. The method of claim 8, wherein the comparison between the accumulated card health data and the stored information includes comparing the times at which card health data of the cards associated with the accumulated card health data changed and one or more common merchants included in the stored information. 15. A non-transitory computer-readable medium storing a set of instructions that are executable by one or more processors to cause the one or more processors to perform a method to determine a merchant breach, the method comprising: acquiring card transaction data from one or more merchants, wherein the acquisition of the card transaction data is performed at a first predetermined periodic interval;storing information relating to payment cards associated with the card transaction data;for at least some of the payment cards, automatically determining at least one value indicative of card health and store the determined values for the payment cards, wherein determination of the at least one value indicative of card health is performed at a second predetermined periodic interval;accumulating, over a period of time, card health data for the payment cards based on the determined at least one value indicative of card health;storing the accumulated card health data;identifying a potential merchant breach and the timing of the potential merchant breach based on a comparison between the accumulated card health data and the stored information relating to payment cards associated with the card transaction data; anddisplaying in a graph of a graphical user interface of a system, at least a portion of the accumulated card health data and the card transaction data indicating the potential merchant breach. 16. The method of claim 15, wherein the first predetermined periodic interval and the second predetermined periodic interval are both about one day. 17. The method of claim 15, wherein information identifying cards used at a particular merchant is collected at a particular time interval and stored in a memory. 18. The method of claim 15, wherein the card health is re-determined at least once for each of the payment cards. 19. The method of claim 15, wherein the card health values are stored based on a transaction date. 20. The method of claim 15, wherein the comparison between the accumulated card health data and the stored information includes comparing the times at which card health data of the cards associated with the accumulated card health data changed and one or more common merchants included in the stored information.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (93)
Melby, Paul Christian, Accessing documents using predictive word sequences.
Gabbert, Charles Keith; Robbins, Mark Wayne; Lombard, Robin J.; Woolums, Thomas Michael; Moiceanu, Corneliu, Centralized terminology and glossary development.
Amirov, Anton; Dong, George Randell; Jacob, Sanjay; Yang, Mark Xiahong; Shetty, Rohan Ratnaker, Efficient data structures for multi-dimensional security.
Greenstein, Paul G.; Grunin, Galina; Nguyen, Luu Q., Facilitating management of service elements usable in providing information technology service offerings.
Gopinathan Krishna M. ; Biafore Louis S. ; Ferguson William M. ; Lazarus Michael A. ; Pathria Anu K. ; Jost Allen, Fraud detection using predictive modeling.
Vishniac, Ephraim Meriwether; Isman, Marshall A.; Bay, Paul; Bromley, H. Mark; Richardson, John L., Managing storage of individually accessible data units.
Kantrowitz, Mark, Method and apparatus for efficient identification of duplicate and near-duplicate documents and text spans using high-discriminability text fragments.
Comer Ross Ward ; Stein Adam Brett ; Williams ; Jr. David Russell, Method and apparatus for suggesting completions for a partially entered data item based on previously-entered, associate.
Berger, Ben; Hellman, Ziv; Marchant, Hayden; Meir, Rannen; Melamed, Boris; Schreiber, Zvi, Method and system for mapping enterprise data assets to a semantic information model.
Rao Ramana B. (San Francisco CA) Card Stuart K. (Los Alto Hills CA), Method and system for producing a table image showing indirect data representations.
Turner, James Luke; Turner, Robert Edward, Method for providing customized and automated security assistance, a document marking regime, and central tracking and control for sensitive or classified documents in electronic format.
Creeden, Denis Michael; Glionna, Jesse; Poulter, Martha Cecilia; Kaptinski, John Stephen; Persico, James Robert; Doolittle, William Roy; Cascade, Ryan Stuart; van Heyst, Amanda Jenks; Ernst, David Andrew; Chomienne, Kathleen Mary; Bellish, Robert Wayne; Crowley, Robert Francis, Methods and systems for managing risk management information.
Cornelia Edward J. ; Fine Benjamin ; Jacobs Jonathan D. ; Karasic Neal J., Multi-user electronic document authoring system with prompted updating of shared language.
Epard Marc A. (Lawrence KS) Ping He (Lawrence KS) Trautman Neal E. (Lawrence KS) VanVleck Paul F. (Lawrence KS), Screen image sharing among heterogeneous computers.
Dan, Asit; Dias, Daniel Manuel; Janakiraman, Pradeep, System and method for conducting disconnected transactions with service contracts for pervasive computing devices.
Gordon Brian Scott ; Preston David Ralph ; Henry Lee Sean, System and method for implementing revision management of linked data entities and user dependent terminology.
Burns, Michael J.; West, Robert A.; Brumfield, Harris; Ziemkiewicz, Peter F., System and method for money management in electronic trading environment.
Burr, Brandon Lawrence; Pundle, Akshay; Simler, Kevin D.; Miyake, Nicholas Niki Frank, System and method for parameterizing documents for automatic workflow generation.
Evanitsky, Eugene Stephen; Moore, John A.; Coene, Matthew Dylan; Schlonski, Steve; Chlebove, Wilma Wandersleben, System and method of on-demand document processing.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Shankar, Ankit; Ash, Andrew; Stowe, Geoff; Petracca, Thomas; Duffield, Benjamin, Systems and user interfaces for dynamic and interactive simultaneous querying of multiple data stores.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.