Example embodiments relate to a network-based vulnerability detection system configured to access a database of customer transaction data corresponding to a set of card readers that includes transaction codes, receive an identification of a set of compromised card readers among the set of card reade
Example embodiments relate to a network-based vulnerability detection system configured to access a database of customer transaction data corresponding to a set of card readers that includes transaction codes, receive an identification of a set of compromised card readers among the set of card readers, identify common transaction codes within the transaction data of the set of compromised card readers, and correlate the common transaction codes to one or more instances of fraud associated with the compromised set of card readers. In some example embodiments, the vulnerability detection system may be applied to monitor one or more card readers, receive transaction data corresponding to transaction conducted through the card readers, identify the common transaction codes correlated to the instances of fraud, and cause display of a notification that includes an indication of the instance of fraud at a client device.
대표청구항▼
1. A method comprising: accessing historical transaction data gathered from a set of devices, the historical transaction data including a set of device identifiers and transaction codes, the device identifiers and the transaction codes corresponding to a set of transactions conducted through the set
1. A method comprising: accessing historical transaction data gathered from a set of devices, the historical transaction data including a set of device identifiers and transaction codes, the device identifiers and the transaction codes corresponding to a set of transactions conducted through the set of devices identified by the device identifiers;identifying a set of compromised devices from among the set of devices based on a subset of the historical transaction data, the subset associated with the set of compromised devices;identifying a common transaction code within the subset of the historical transaction data;correlating the common transaction code to an instance of fraud associated with the compromised set of devices;receiving new transaction data from a first device, the new transaction data including a new set of transaction codes and a first device identifier that identifiers the first device;detecting the common transaction code within the new transaction data from the first device; andcausing display of a notification at a client device in response to the identifying the common transaction code within the new transaction data, the notification including a presentation of the first device identifier of the first device. 2. The method of claim 1, wherein the method further comprises: disabling the first device in response to the identifying the common transaction code within the new transaction data from the first device. 3. The method of claim 1, wherein the method further comprises: causing the first device to display an indication that the first device is compromised in response to the detecting the common transaction code within the new transaction data from the first device. 4. The method of claim 1, wherein the transaction codes among the historical transaction data include timestamps that indicate a time of a transaction, and wherein the identifying the set of compromised devices from among the set of devices based on the subset of the historical transaction data includes: receiving an identification of a time period;identifying the subset of the historical transaction data based on the time period, the subset of the historical transaction data having timestamps within the time period; andidentifying the set of compromised devices based on the subset of the historical transaction data. 5. The method of claim 1, wherein the new transaction data includes transaction details, and the method further comprises: generating a report that includes the first device identifier, and the transaction details. 6. The method of claim 1, wherein the new transaction data includes at least a user account identifier, and the method further comprises: transmitting the notification to a user account associated with the user account identifier in response to the identifying the common transaction code within the new transaction data from the first device. 7. The method of claim 1, wherein the method further comprises: collecting the new transaction data from the first device for a duration;determining a rate in which the common transaction code appears within the new transaction data within the duration;calculating a vulnerability score based on the rate and the duration; andassigning the vulnerability score to the first device. 8. The method of claim 7, wherein the first device is of a device type, and wherein the method further comprises: retrieving an expected rate of the first device in response to the determining the rate in which the common transaction code appears within the new transaction data within the duration, the expected rate based on the device type;determining a threshold value to apply to the vulnerability score based on the expected rate;determining that the vulnerability score transgresses the threshold value; andcausing display of the notification at the client device in response to the determining that the vulnerability score transgresses the threshold value. 9. The method of claim 7, wherein the duration includes at least one of: a length of time; anda maximum number of transactions conducted through the first device. 10. The method of claim 1, wherein the transaction codes indicate a status of a transaction, and wherein the status includes at least one of: an incomplete transaction;a complete transaction; anda declined transaction. 11. A system comprising: one or more processors of a machine; anda memory storing instructions that, when executed by at least one processor among the one or more processors, causes the machine to perform operations comprising:accessing historical transaction data gathered from a set of devices, the historical transaction data including a set of device identifiers and transaction codes, the device identifiers and the transaction codes corresponding to a set of transactions conducted through the set of devices identified by the device identifiers;identifying a set of compromised devices from among the set of devices based on a subset of the historical transaction data, the subset associated with the set of compromised devices;identifying a common transaction code within the subset of the historical transaction data;correlating the common transaction code to an instance of fraud associated with the compromised set of devices;receiving new transaction data from a first device, the new transaction data including a new set of transaction codes and a first device identifier that identifiers the first device;detecting the common transaction code within the new transaction data from the first device; andcausing display of a notification at a client device in response to the identifying the common transaction code within the new transaction data, the notification including a presentation of the first device identifier of the first device. 12. The system of claim 11, wherein the instructions cause the system to perform operations further comprising: disabling the first device in response to the identifying the common transaction code within the new transaction data from the first device. 13. The system of claim 11, wherein the instructions cause the system to perform operations further comprising: causing the first device to display an indication that the first device is compromised in response to the detecting the common transaction code within the new transaction data from the first device. 14. The system of claim 11, wherein the transaction codes among the historical transaction data include timestamps that indicate a time of a transaction, and wherein the identifying the set of compromised devices from among the set of devices based on the subset of the historical transaction data includes: receiving an identification of a time period;identifying the subset of the historical transaction data based on the time period, the subset of the historical transaction data having timestamps within the time period; andidentifying the set of compromised devices based on the subset of the historical transaction data. 15. The system of claim 11, wherein the new transaction data includes transaction details, and the method further comprises: generating a report that includes the first device identifier, and the transaction details. 16. The system of claim 11, wherein the new transaction data includes at least a user account identifier, and the instructions cause the system to perform operations further comprising: transmitting the notification to a user account associated with the user account identifier in response to the identifying the common transaction code within the new transaction data from the first device. 17. The system of claim 11, wherein the instructions cause the system to perform operations further comprising: collecting the new transaction data from the first device for a duration;determining a rate in which the common transaction code appears within the new transaction data within the duration;calculating a vulnerability score based on the rate and the duration; andassigning the vulnerability score to the first device. 18. The system of claim 17, wherein the first device is of a device type, and wherein the instructions cause the system to perform operations further comprising: retrieving an expected rate of the first device in response to the determining the rate in which the common transaction code appears within the new transaction data within the duration, the expected rate based on the device type;determining a threshold value to apply to the vulnerability score based on the expected rate;determining that the vulnerability score transgresses the threshold value; andcausing display of the notification at the client device in response to the determining that the vulnerability score transgresses the threshold value. 19. The system of claim 17, wherein the duration includes at least one of: a length of time; anda maximum number of transactions conducted through the first device. 20. A non-transitory machine-readable storage medium comprising instructions that, when executed by one or more processors of a machine, cause the machine to perform operations comprising: accessing historical transaction data gathered from a set of devices, the historical transaction data including a set of device identifiers and transaction codes, the device identifiers and the transaction codes corresponding to a set of transactions conducted through the set of devices identified by the device identifiers;identifying a set of compromised devices from among the set of devices based on a subset of the historical transaction data, the subset associated with the set of compromised devices;identifying a common transaction code within the subset of the historical transaction data;correlating the common transaction code to an instance of fraud associated with the compromised set of devices;receiving new transaction data from a first device, the new transaction data including a new set of transaction codes and a first device identifier that identifiers the first device;detecting the common transaction code within the new transaction data from the first device; andcausing display of a notification at a client device in response to the identifying the common transaction code within the new transaction data, the notification including a presentation of the first device identifier of the first device.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (37)
Ma, Songtao; Huria, Sangeeta; Klein, Eric; Crews, Tim, Banking system controlled responsive to data bearing records.
Gabbert, Charles Keith; Robbins, Mark Wayne; Lombard, Robin J.; Woolums, Thomas Michael; Moiceanu, Corneliu, Centralized terminology and glossary development.
Greenstein, Paul G.; Grunin, Galina; Nguyen, Luu Q., Facilitating management of service elements usable in providing information technology service offerings.
Gopinathan Krishna M. ; Biafore Louis S. ; Ferguson William M. ; Lazarus Michael A. ; Pathria Anu K. ; Jost Allen, Fraud detection using predictive modeling.
Vishniac, Ephraim Meriwether; Isman, Marshall A.; Bay, Paul; Bromley, H. Mark; Richardson, John L., Managing storage of individually accessible data units.
Kantrowitz, Mark, Method and apparatus for efficient identification of duplicate and near-duplicate documents and text spans using high-discriminability text fragments.
Bunzel, Breeana D.; Rangara, Akbar A.; Chan, Kai Chun, Method and system for automatic correlation of check-based payments to customer accounts and/or invoices.
Creeden, Denis Michael; Glionna, Jesse; Poulter, Martha Cecilia; Kaptinski, John Stephen; Persico, James Robert; Doolittle, William Roy; Cascade, Ryan Stuart; van Heyst, Amanda Jenks; Ernst, David Andrew; Chomienne, Kathleen Mary; Bellish, Robert Wayne; Crowley, Robert Francis, Methods and systems for managing risk management information.
Burns, Michael J.; West, Robert A.; Brumfield, Harris; Ziemkiewicz, Peter F., System and method for money management in electronic trading environment.
Evanitsky, Eugene Stephen; Moore, John A.; Coene, Matthew Dylan; Schlonski, Steve; Chlebove, Wilma Wandersleben, System and method of on-demand document processing.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.