The invention provides systems and methods for risk assessment using a variable risk engine. A method for risk assessment may comprise setting an amount of real-time risk analysis for an online transaction, performing the amount of real-time risk analysis based on the set amount, and performing an a
The invention provides systems and methods for risk assessment using a variable risk engine. A method for risk assessment may comprise setting an amount of real-time risk analysis for an online transaction, performing the amount of real-time risk analysis based on the set amount, and performing an amount of time-delayed risk analysis. In some embodiments, the amount of real-time risk analysis may depend on a predetermined period of time for completion of the real-time risk analysis. In other embodiments, the amount of real-time risk analysis may depend on selected tests to be completed during the real-time risk analysis.
대표청구항▼
1. A computerized method for performing variable risk assessment for an online transaction, the computerized method comprising: accessing electronic information associated with an online transaction while the online transaction is in progress;identifying one or more characteristics of the online tra
1. A computerized method for performing variable risk assessment for an online transaction, the computerized method comprising: accessing electronic information associated with an online transaction while the online transaction is in progress;identifying one or more characteristics of the online transaction based at least in part on the electronic information;selecting a set of tests for a real-time risk analysis based at least in part on the one or more characteristics of the online transaction;performing the set of tests while the online transaction is in progress until an event condition is met;determining a subset of tests of the set of tests which is not completed before the event condition is met;continuing to perform the subset of tests as a time-delayed risk analysis, the time-delayed risk analysis is completed after the online transaction ends;selecting a second set of tests for the time-delayed analysis;performing at least a portion of the second set of tests in parallel with the subset of tests; andassessing an overall risk of fraud for the online transaction based at least in part on results of the set of tests including results of the real-time risk analysis before the event condition is met and results of the time-delayed risk analysis. 2. The computerized method of claim 1, wherein the electronic information associated with the online transaction comprises device information of a device involved in the online transaction. 3. The computerized method of claim 2, wherein the device information comprises an IP address of the device. 4. The computerized method of claim 1, wherein the one or more characteristics of the online transaction comprises at least one of: a type of the online transaction, a history associated with the online transaction, an importance of the online transaction, or an amount of time of the online transaction. 5. The computerized method of claim 1, wherein the event condition is based on at least one of: the one or more characteristics of the online transaction, an action taken by a user of a device involved in the online transaction, or a decision event that occurred during the online transaction. 6. The computerized method of claim 5, wherein the decision event is based on an approval or a decline of the online transaction. 7. The computerized method of claim 1, wherein the event condition comprises a time limit for performing the real-time risk analysis or a predefined time stop. 8. The computerized method of claim 1, further comprising: determining a preliminary risk of fraud based on the results of the real-time risk analysis before the event condition is met; anddetermining, prior to the time-delayed analysis, whether to approve the online transaction based at least partly on the preliminary risk of fraud. 9. The computerized method of claim 1, further comprising: prioritizing one or more test of the set of tests for the real-time risk analysis. 10. A system for variable risk assessment, the system comprising: an institution server; anda device in communication with the institution server,wherein the institution server is configured to perform, with aid of a computer processor, a risk analysis of an online transaction with the device, andwherein the institution server: accesses electronic information associated with the online transaction while the online transaction is in progress;identifies one or more characteristics of the online transaction based at least in part on the electronic information;selects a set of tests for a real-time risk analysis based at least in part on the one or more characteristics of the online transaction;performs the set of tests while the online transaction is in progress until an event condition is met;determines a subset of tests of the set of tests which is not completed before the event condition is met;continues to perform the subset of tests as a time-delayed risk analysis, the time-delayed risk analysis is completed after the online transaction ends;selects a second set of tests for the time-delayed analysis;performs at least a portion of the second set of tests in parallel with the subset of tests; andassesses an overall risk of fraud for the online transaction based at least in part on results of the set of tests including results of the real-time risk analysis before the event condition is met and results of the time-delayed risk analysis. 11. The system of claim 10, wherein the electronic information associated with the online transaction comprises device information from a device involved in the online transaction. 12. The system of claim 11, wherein the device information comprises an IP address of the device. 13. The system of claim 10, wherein the one or more characteristics of the online transaction comprises at least one of: a type of an institution associated with the institution server, a type of the online transaction, a history of the online transaction, an importance of the online transaction, or an amount of time of the online transaction. 14. The system of claim 10, wherein the event condition is based on at least one of: the one or more characteristics of the online transaction, an action taken by a user of a device involved in the online transaction, or a decision event that occurred during the online transaction. 15. The system of claim 14, wherein the decision event is based on an approval or a decline of the online transaction. 16. The system of claim 10, wherein the event condition comprises a time limit for performing the real-time risk analysis or a predefined stop time. 17. The system of claim 10, wherein the institution server further: determines a preliminary risk of fraud based on the results of the real-time risk analysis before the event condition is met; anddetermines, prior to the time-delayed analysis, whether to approve the online transaction based at least partly on the preliminary risk of fraud. 18. The system of claim 10, wherein the institution server further: prioritizes one or more test of the set of tests for the real-time risk analysis.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (125)
Eisen, Ori; Pandich, Steve; Yalov, Raz, 2D web trilateration.
Lappington John P. ; Marshall Susan K. ; Yamamoto Wayne Y. ; Wilson Cameron A. ; Berkobin Eric C. ; Simons Richard S., Interactive television security through transaction time stamping.
Schweig,Marc E., Keyboard, mouse, and video (KVM) session capture system that stores and can playback portions of live KVM session via forensic capture module.
Mizushima Hiroshi (Yokohama JPX), Method and apparatus for changing screen image data based on cursor movement relative to a preset mark on the screen.
Ennis ; Jr. James D. (Gaithersburg MD) Hasselkus John E. (Germantown MD) Nisbet Thomas R. (Ellicott City MD) Troutman Robert (Gaithersburg MD), Method and apparatus for non-intrusive measurement of round trip delay in communications networks.
Brown Marcus E. (Tuscaloosa AL) Rogers Samuel J. (Breckenridge TX), Method and apparatus for verification of a computer user\s identification, based on keystroke characteristics.
Kowalchyk, Eric F.; Mo, See Yew; Lu, Jimmy M.; Buddhavarapu, Satish; Power, Michael J.; Mako, Janos Z., Method and system for assessing merchant risk during payment transaction.
Barrett,Michael Richard; Armes,David; Bishop,Fred; Shelby,James; Glazer,Elliott; Steitz,Philip W.; Gibbons,Stephen P., Method and system for implementing and managing an enterprise identity management for distributed security.
Dujari,Rajeev; Wang,Biao; Hawkins,John M.; Rouskov,Yordan; Erdogan,Samim, Method and system of integrating third party authentication into internet browser code.
Southard,David A.; Bell,Lowell F.; Aucoin,Michael A.; Gouin,Fr챕d챕ric; Cannaday, Jr.,Theodore H., Method for digital transmission and display of weather imagery.
Boulware, Van W., Method of conducting anti-fraud electronic bank security transactions having price-date-time variables and calculating apparatus thereof.
Tan Jeanette C. (21600 Cleardale St. Santa Clarita CA) Iggulden Jerry R. (21600 Cleardale St. Santa Clarita CA 91321) Streck Donald A. (832 Country Dr. Ojai CA 93023), Security facsimile systems.
Wood, David L.; Norton, Derk; Weschler, Paul; Ferris, Chris; Wilson, Yvonne, Single sign-on framework with trust-level mapping to authentication requirements.
Varghese, Thomas Emmanual; Fisher, Jon Bryan; Harris, Steven Lucas; Durai, Don Bosco, System and method for fraud monitoring, detection, and tiered user authentication.
Tedesco,Daniel E.; Jorasch,James A.; Gelman,Geoffrey M.; Walker,Jay S.; Tulley,Stephen C.; O'Neil,Vincent M.; Alderucci,Dean P., System for image analysis in a network that is structured with multiple layers and differentially weighted neurons.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Abraham,Magid; Brown,Michael; Heyman,Steve, Systems and methods for user identification, user demographic reporting and collecting usage data usage biometrics.
Rosen Sholom S., Trusted agents for open electronic commerce where the transfer of electronic merchandise or electronic money is provisional until the transaction is finalized.
Guo, Hui; Srinivasan, Venkatachary; Rajam, Surendra Sadanand; Jiang, Zhaowei Charlie; Zhou, Min, Universal device identifier for globally identifying and binding disparate device identifiers to the same mobile device.
Khanwalkar, Manoj; Camacho, Adler; Van Lare, Stephen; Winkler, Omer; Tuttle, Luke David; Patel, Surag I., Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.