Patents by Inventor Haochuan Zhou

Haochuan Zhou has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11954218
    Abstract: Embodiments of the present disclosure provide systems, methods, and apparatuses for addressing the above problems through the use of access rules that involve analyzing historical access request result data for various data elements individually and in combination over a predefined time interval. An automated determination can be made for whether a transaction can be authenticated based upon the historical access request result data (e.g., ultimately, deciding whether the data element or set of data elements are associated with a valid access request).
    Type: Grant
    Filed: February 8, 2021
    Date of Patent: April 9, 2024
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Hung-Tzaw Hu, Haochuan Zhou, Ge Wen, Benjamin Scott Boding
  • Patent number: 11765173
    Abstract: Techniques for managing redundant or overlapping access rules are provided. Access rules are determined for evaluation. Performance metrics for the access rules prior to implementation and post implementation are determined. Overlapping access rules are identified. Performance of the overlapping access rules are evaluated to determine actions to be applied to the overlapping access rules. Recommended actions and adjustments can be automatically provided by the system based on the performance analysis.
    Type: Grant
    Filed: March 31, 2022
    Date of Patent: September 19, 2023
    Assignee: Visa International Service Association
    Inventors: Benjamin Scott Boding, Christopher Holmes, Haochuan Zhou
  • Patent number: 11722530
    Abstract: Resources can be secured by a resource security system. The resource security system can determine whether to grant or deny access to resources using authorization information in an access request. The resource security system can also determine whether the access request is legitimate or fraudulent using risk scoring models. A score transformation table can be used to provide consistency in the risk level for a particular score over time. The score transformation table can be based on a target score profile and a precision format (e.g., integer or floating point). The score transformation table can dynamically adapt based on the trending top percent of risk and can account for changes in the distribution of scores over time or by weekday. The scores can be used to determine an access request outcome. Access to the resource can be accepted or rejected based on the outcome.
    Type: Grant
    Filed: August 9, 2022
    Date of Patent: August 8, 2023
    Assignee: Visa International Service Association
    Inventors: Hung-Tzaw Hu, Haochuan Zhou, Ge Wen, Benjamin Scott Boding
  • Publication number: 20220391478
    Abstract: Resources can be secured by a resource security system. The resource security system can determine whether to grant or deny access to resources using authorization information in an access request. The resource security system can also determine whether the access request is legitimate or fraudulent using risk scoring models. A score transformation table can be used to provide consistency in the risk level for a particular score over time. The score transformation table can be based on a target score profile and a precision format (e.g., integer or floating point). The score transformation table can dynamically adapt based on the trending top percent of risk and can account for changes in the distribution of scores over time or by weekday. The scores can be used to determine an access request outcome. Access to the resource can be accepted or rejected based on the outcome.
    Type: Application
    Filed: August 9, 2022
    Publication date: December 8, 2022
    Applicant: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Hung-Tzaw Hu, Haochuan Zhou, Ge Wen, Benjamin Scott Boding
  • Patent number: 11451590
    Abstract: Resources can be secured by a resource security system. The resource security system can determine whether to grant or deny access to resources using authorization information in an access request. The resource security system can also determine whether the access request is legitimate or fraudulent using risk scoring models. A score transformation table can be used to provide consistency in the risk level for a particular score over time. The score transformation table can be based on a target score profile and a precision format (e.g., integer or floating point). The score transformation table can dynamically adapt based on the trending top percent of risk and can account for changes in the distribution of scores over time or by weekday. The scores can be used to determine an access request outcome. Access to the resource can be accepted or rejected based on the outcome.
    Type: Grant
    Filed: October 28, 2020
    Date of Patent: September 20, 2022
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Hung-Tzaw Hu, Haochuan Zhou, Ge Wen, Benjamin Scott Boding
  • Patent number: 11443200
    Abstract: Described are a system, method, and computer program product for optimizing a predictive condition classification model and automatically enacting reactive measures based thereon. The method includes receiving event data representative of a plurality of events. The method also includes receiving the predictive condition classification model configured to categorize each event as satisfying a condition or not. The predictive condition classification model is configured to order the plurality of events by likelihood of satisfying the condition. The method includes generating a performance evaluation dataset and plotting data configured to cause a visual display to represent at least two model performance metrics of the performance evaluation dataset on a same output plot. The method includes automatically rejecting a top percent of the plurality of events for suspected satisfaction of the condition, determined at least partially from a customized rejection algorithm or a preset rejection algorithm.
    Type: Grant
    Filed: March 6, 2018
    Date of Patent: September 13, 2022
    Assignee: Visa International Service Association
    Inventors: Hung-Tzaw Hu, Benjamin Scott Boding, Ge Wen, Haochuan Zhou
  • Publication number: 20220232008
    Abstract: Techniques for managing redundant or overlapping access rules are provided. Access rules are determined for evaluation. Performance metrics for the access rules prior to implementation and post implementation are determined. Overlapping access rules are identified. Performance of the overlapping access rules are evaluated to determine actions to be applied to the overlapping access rules. Recommended actions and adjustments can be automatically provided by the system based on the performance analysis.
    Type: Application
    Filed: March 31, 2022
    Publication date: July 21, 2022
    Inventors: Benjamin Scott Boding, Christopher Holmes, Haochuan Zhou
  • Publication number: 20220141225
    Abstract: Techniques for managing redundant or overlapping access rules are provided. Access rules are determined for evaluation. Performance metrics for the access rules prior to implementation and post implementation are determined. Overlapping access rules are identified. Performance of the overlapping access rules are evaluated to determine actions to be applied to the overlapping access rules. Recommended actions and adjustments can be automatically provided by the system based on the performance analysis.
    Type: Application
    Filed: October 29, 2020
    Publication date: May 5, 2022
    Inventors: Benjamin Scott Boding, Christopher Holmes, Haochuan Zhou
  • Patent number: 11323448
    Abstract: Techniques for managing redundant or overlapping access rules are provided. Access rules are determined for evaluation. Performance metrics for the access rules prior to implementation and post implementation are determined. Overlapping access rules are identified. Performance of the overlapping access rules are evaluated to determine actions to be applied to the overlapping access rules. Recommended actions and adjustments can be automatically provided by the system based on the performance analysis.
    Type: Grant
    Filed: October 29, 2020
    Date of Patent: May 3, 2022
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Benjamin Scott Boding, Christopher Holmes, Haochuan Zhou
  • Publication number: 20210248258
    Abstract: Embodiments of the present disclosure provide systems, methods, and apparatuses for addressing the above problems through the use of access rules that involve analyzing historical access request result data for various data elements individually and in combination over a predefined time interval. An automated determination can be made for whether a transaction can be authenticated based upon the historical access request result data (e.g., ultimately, deciding whether the data element or set of data elements are associated with a valid access request).
    Type: Application
    Filed: February 8, 2021
    Publication date: August 12, 2021
    Inventors: Hung-Tzaw Hu, Haochuan Zhou, Ge Wen, Benjamin Scott Boding
  • Publication number: 20210044624
    Abstract: Resources can be secured by a resource security system. The resource security system can determine whether to grant or deny access to resources using authorization information in an access request. The resource security system can also determine whether the access request is legitimate or fraudulent using risk scoring models. A score transformation table can be used to provide consistency in the risk level for a particular score over time. The score transformation table can be based on a target score profile and a precision format (e.g., integer or floating point). The score transformation table can dynamically adapt based on the trending top percent of risk and can account for changes in the distribution of scores over time or by weekday. The scores can be used to determine an access request outcome. Access to the resource can be accepted or rejected based on the outcome.
    Type: Application
    Filed: October 28, 2020
    Publication date: February 11, 2021
    Inventors: Hung-Tzaw Hu, Haochuan Zhou, Ge Wen, Benjamin Scott Boding
  • Patent number: 10862913
    Abstract: In some embodiments, a resource security system may determine an access request outcome (e.g., accept, reject, or review) for an access request based on access rules. The resource security system may generate and select the access rules to be used for using stability information. For instance, the resource security system may select a training set from the received access requests, e.g., including recently received access requests, and generate a plurality of potential access rules based on the training set. The resource security system may determine and compare the detection performance and the stability performance of the potential access rules. The resource security system may select the best performing potential access rules to be used in operation for determining the outcome of access requests.
    Type: Grant
    Filed: August 29, 2019
    Date of Patent: December 8, 2020
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Haochuan Zhou, Hung-Tzaw Hu, Rong Zhang, Benjamin Scott Boding
  • Patent number: 10855726
    Abstract: Resources can be secured by a resource security system. The resource security system can determine whether to grant or deny access to resources using authorization information in an access request. The resource security system can also determine whether the access request is legitimate or fraudulent using risk scoring models. A score transformation table can be used to provide consistency in the risk level for a particular score over time. The score transformation table can be based on a target score profile and a precision format (e.g., integer or floating point). The score transformation table can dynamically adapt based on the trending top percent of risk and can account for changes in the distribution of scores over time or by weekday. The scores can be used to determine an access request outcome. Access to the resource can be accepted or rejected based on the outcome.
    Type: Grant
    Filed: October 15, 2018
    Date of Patent: December 1, 2020
    Assignee: Visa International Service Association
    Inventors: Hung-Tzaw Hu, Haochuan Zhou, Ge Wen, Benjamin Scott Boding
  • Patent number: 10855685
    Abstract: Resources can be secured by a resource security system. The resource security system can determine whether to grant or deny access to resources using authorization information in an access request. The resource security system can also determine whether the access request is legitimate or fraudulent using risk scoring models. A score transformation table can be used to provide consistency in the risk level for a particular score over time. The score transformation table can be based on a target score profile and a precision format (e.g., integer or floating point). The score transformation table can dynamically adapt based on the trending top percent of risk and can account for changes in the distribution of scores over time or by weekday. The scores can be used to determine an access request outcome. Access to the resource can be accepted or rejected based on the outcome.
    Type: Grant
    Filed: October 15, 2018
    Date of Patent: December 1, 2020
    Assignee: Visa International Service Association
    Inventors: Hung-Tzaw Hu, Haochuan Zhou, Ge Wen, Benjamin Scott Boding
  • Publication number: 20200175388
    Abstract: Described are a system, method, and computer program product for optimizing a predictive condition classification model and automatically enacting reactive measures based thereon. The method includes receiving event data representative of a plurality of events. The method also includes receiving the predictive condition classification model configured to categorize each event as satisfying a condition or not. The predictive condition classification model is configured to order the plurality of events by likelihood of satisfying the condition. The method includes generating a performance evaluation dataset and plotting data configured to cause a visual display to represent at least two model performance metrics of the performance evaluation dataset on a same output plot. The method includes automatically rejecting a top percent of the plurality of events for suspected satisfaction of the condition, determined at least partially from a customized rejection algorithm or a preset rejection algorithm.
    Type: Application
    Filed: March 6, 2018
    Publication date: June 4, 2020
    Inventors: Hung-Tzaw Hu, Benjamin Scott Boding, Ge Wen, Haochuan Zhou
  • Publication number: 20200120135
    Abstract: Resources can be secured by a resource security system. The resource security system can determine whether to grant or deny access to resources using authorization information in an access request. The resource security system can also determine whether the access request is legitimate or fraudulent using risk scoring models. A score transformation table can be used to provide consistency in the risk level for a particular score over time. The score transformation table can be based on a target score profile and a precision format (e.g., integer or floating point). The score transformation table can dynamically adapt based on the trending top percent of risk and can account for changes in the distribution of scores over time or by weekday. The scores can be used to determine an access request outcome. Access to the resource can be accepted or rejected based on the outcome.
    Type: Application
    Filed: October 15, 2018
    Publication date: April 16, 2020
    Inventors: Hung-Tzaw Hu, Haochuan Zhou, Ge Wen, Benjamin Scott Boding
  • Publication number: 20200120100
    Abstract: Resources can be secured by a resource security system. The resource security system can determine whether to grant or deny access to resources using authorization information in an access request. The resource security system can also determine whether the access request is legitimate or fraudulent using risk scoring models. A score transformation table can be used to provide consistency in the risk level for a particular score over time. The score transformation table can be based on a target score profile and a precision format (e.g., integer or floating point). The score transformation table can dynamically adapt based on the trending top percent of risk and can account for changes in the distribution of scores over time or by weekday. The scores can be used to determine an access request outcome. Access to the resource can be accepted or rejected based on the outcome.
    Type: Application
    Filed: October 15, 2018
    Publication date: April 16, 2020
    Inventors: Hung-Tzaw Hu, Haochuan Zhou, Ge Wen, Benjamin Scott Boding
  • Patent number: 10609087
    Abstract: A resource security system may generate access rules for use in determining whether to grant or deny a request for access to a resource. In order to generate the access rules, the resource security system may select certain access request parameters and determine conditions associated with those parameters. The resource security system may generate mutually exclusive segments associated with a condition of each of the parameters. The resource security system may generate independent access rules based on the segments. The resource security system may then evaluate the performance of each of the access rules based on validity information corresponding to previously received access requests that satisfy the conditions of a particular access rule.
    Type: Grant
    Filed: May 8, 2019
    Date of Patent: March 31, 2020
    Assignee: Visa International Service Association
    Inventors: Haochuan Zhou, Hung-Tzaw Hu, Rong Zhang, Benjamin Scott Boding
  • Patent number: 10594738
    Abstract: Embodiments of the invention generally relate to methods and systems for operating authorization rules. An authorization rule has conditions that may be satisfied by an authorization request. A rule is rotated between the first mode and the second mode over a time interval wherein a first set of authorization requests are received. A first subset of the first set of authorization requests may not be rejected. After the first time interval, the authorization requests that were not rejected may be validated through an independent process. An accuracy rate for the rule is determined based on the portion of authorization requests that are valid and satisfied the conditions of the rule.
    Type: Grant
    Filed: May 14, 2019
    Date of Patent: March 17, 2020
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Hung-Tzaw Hu, Haochuan Zhou, Benjamin Scott Boding
  • Publication number: 20190387014
    Abstract: In some embodiments, a resource security system may determine an access request outcome (e.g., accept, reject, or review) for an access request based on access rules. The resource security system may generate and select the access rules to be used for using stability information. For instance, the resource security system may select a training set from the received access requests, e.g., including recently received access requests, and generate a plurality of potential access rules based on the training set. The resource security system may determine and compare the detection performance and the stability performance of the potential access rules. The resource security system may select the best performing potential access rules to be used in operation for determining the outcome of access requests.
    Type: Application
    Filed: August 29, 2019
    Publication date: December 19, 2019
    Inventors: Haochuan Zhou, Hung-Tzaw Hu, Rong Zhang, Benjamin Scott Boding