Patents by Inventor Benjamin Scott Boding

Benjamin Scott Boding has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11323448
    Abstract: Techniques for managing redundant or overlapping access rules are provided. Access rules are determined for evaluation. Performance metrics for the access rules prior to implementation and post implementation are determined. Overlapping access rules are identified. Performance of the overlapping access rules are evaluated to determine actions to be applied to the overlapping access rules. Recommended actions and adjustments can be automatically provided by the system based on the performance analysis.
    Type: Grant
    Filed: October 29, 2020
    Date of Patent: May 3, 2022
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Benjamin Scott Boding, Christopher Holmes, Haochuan Zhou
  • Patent number: 11249634
    Abstract: Provided is a method for configuring at least one rule, e.g., using a graphical user interface. The method may include displaying a graphical user interface including a polygon having at least three edges and an icon at a first position within the polygon. Each edge of the polygon may be associated with a potential outcome of at least one rule. An input to move the icon to a second position within the polygon may be received. The graphical user interface may be displayed with the icon at the second position within the polygon. A distance from the second position of the icon to each edge of the polygon may be determined. The rule(s) may be adjusted based on the distance from the second position of the icon to each edge of the polygon. A system and computer program product are also disclosed.
    Type: Grant
    Filed: May 29, 2019
    Date of Patent: February 15, 2022
    Assignee: Visa International Service Association
    Inventors: Nathan Ryan Wood, Carl David Tucker, Jr., Benjamin Scott Boding, Cory Howard Siddens, Andrew John Bruno Naumann zu Koenigsbrueck
  • Publication number: 20220012352
    Abstract: Disclosed is a system to optimize rule weights for classifying access requests so as to manage rates of false positives and false negative classifications. A rules suggestion engine may suggest a profile of classification rules to a merchant for access requests. The system can optimize weights for the profile of rules using a cost function based on a training set of historical access requests, for example using stepwise regression or machine learning (ML). The system can compute a profile score based on the optimized weights, for example by summing the weights. The system statistically analyzes the profile score using classification thresholds and the historical access requests. The system can perform receiver operating characteristic (ROC) analysis for various threshold values, enabling a user to select a suitable threshold. The system can further optimize by adding or removing rules from the profile of rules.
    Type: Application
    Filed: July 10, 2020
    Publication date: January 13, 2022
    Inventors: Benjamin Scott Boding, Ge Wen
  • Publication number: 20210409374
    Abstract: Techniques managing access rules are provided. Access rules and their associated profiles are determined for evaluation. A triggering rate or a triggering percentage can be used to indicate efficacy of the rule. Recommendations can be provided based on a triggering percentage difference of the rule during a predetermined period of time. The recommendations can be provided in an interactive user interface.
    Type: Application
    Filed: June 24, 2020
    Publication date: December 30, 2021
    Inventors: Benjamin Scott Boding, Christopher Holmes, Cory Siddens, Henry Wong
  • Publication number: 20210248258
    Abstract: Embodiments of the present disclosure provide systems, methods, and apparatuses for addressing the above problems through the use of access rules that involve analyzing historical access request result data for various data elements individually and in combination over a predefined time interval. An automated determination can be made for whether a transaction can be authenticated based upon the historical access request result data (e.g., ultimately, deciding whether the data element or set of data elements are associated with a valid access request).
    Type: Application
    Filed: February 8, 2021
    Publication date: August 12, 2021
    Inventors: Hung-Tzaw Hu, Haochuan Zhou, Ge Wen, Benjamin Scott Boding
  • Publication number: 20210243198
    Abstract: Systems and methods are described for pre-authentication access request screening. A server computer may receive a request for access to a resource comprising access data. The server computer may transmit, to an authentication computer, an authentication request message comprising at least a subset of the access data and receive an authentication response message comprising authentication data. The server computer may determine an access score based on the authentication data. Alternatively, the server computer may determine the access score based on the access data without using/receiving authorization data. The server computer may generate an access indicator based on the access score. The server computer may prepare and transmit an authorization request message comprising the access indicator to an authorization computer. The authorization computer may approve or decline the access to the resource based on the access indicator.
    Type: Application
    Filed: January 7, 2019
    Publication date: August 5, 2021
    Inventors: Andrew John Bruno Naumann zu Koenigsbrueck, Ali Chamseddine, Cory Howard Siddens, Benjamin Scott Boding
  • Publication number: 20210191608
    Abstract: Provided is a method for configuring at least one rule, e.g., using a graphical user interface. The method may include displaying a graphical user interface including a polygon having at least three edges and an icon at a first position within the polygon. Each edge of the polygon may be associated with a potential outcome of at least one rule. An input to move the icon to a second position within the polygon may be received. The graphical user interface may be displayed with the icon at the second position within the polygon. A distance from the second position of the icon to each edge of the polygon may be determined. The rule(s) may be adjusted based on the distance from the second position of the icon to each edge of the polygon. A system and computer program product are also disclosed.
    Type: Application
    Filed: May 29, 2019
    Publication date: June 24, 2021
    Inventors: Nathan Ryan Wood, Carl David Tucker, JR., Benjamin Scott Boding, Cory Howard Siddens, Andrew John Bruno Naumann zu Koenigsbrueck
  • Publication number: 20210044624
    Abstract: Resources can be secured by a resource security system. The resource security system can determine whether to grant or deny access to resources using authorization information in an access request. The resource security system can also determine whether the access request is legitimate or fraudulent using risk scoring models. A score transformation table can be used to provide consistency in the risk level for a particular score over time. The score transformation table can be based on a target score profile and a precision format (e.g., integer or floating point). The score transformation table can dynamically adapt based on the trending top percent of risk and can account for changes in the distribution of scores over time or by weekday. The scores can be used to determine an access request outcome. Access to the resource can be accepted or rejected based on the outcome.
    Type: Application
    Filed: October 28, 2020
    Publication date: February 11, 2021
    Inventors: Hung-Tzaw Hu, Haochuan Zhou, Ge Wen, Benjamin Scott Boding
  • Patent number: 10862913
    Abstract: In some embodiments, a resource security system may determine an access request outcome (e.g., accept, reject, or review) for an access request based on access rules. The resource security system may generate and select the access rules to be used for using stability information. For instance, the resource security system may select a training set from the received access requests, e.g., including recently received access requests, and generate a plurality of potential access rules based on the training set. The resource security system may determine and compare the detection performance and the stability performance of the potential access rules. The resource security system may select the best performing potential access rules to be used in operation for determining the outcome of access requests.
    Type: Grant
    Filed: August 29, 2019
    Date of Patent: December 8, 2020
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Haochuan Zhou, Hung-Tzaw Hu, Rong Zhang, Benjamin Scott Boding
  • Patent number: 10855685
    Abstract: Resources can be secured by a resource security system. The resource security system can determine whether to grant or deny access to resources using authorization information in an access request. The resource security system can also determine whether the access request is legitimate or fraudulent using risk scoring models. A score transformation table can be used to provide consistency in the risk level for a particular score over time. The score transformation table can be based on a target score profile and a precision format (e.g., integer or floating point). The score transformation table can dynamically adapt based on the trending top percent of risk and can account for changes in the distribution of scores over time or by weekday. The scores can be used to determine an access request outcome. Access to the resource can be accepted or rejected based on the outcome.
    Type: Grant
    Filed: October 15, 2018
    Date of Patent: December 1, 2020
    Assignee: Visa International Service Association
    Inventors: Hung-Tzaw Hu, Haochuan Zhou, Ge Wen, Benjamin Scott Boding
  • Patent number: 10855726
    Abstract: Resources can be secured by a resource security system. The resource security system can determine whether to grant or deny access to resources using authorization information in an access request. The resource security system can also determine whether the access request is legitimate or fraudulent using risk scoring models. A score transformation table can be used to provide consistency in the risk level for a particular score over time. The score transformation table can be based on a target score profile and a precision format (e.g., integer or floating point). The score transformation table can dynamically adapt based on the trending top percent of risk and can account for changes in the distribution of scores over time or by weekday. The scores can be used to determine an access request outcome. Access to the resource can be accepted or rejected based on the outcome.
    Type: Grant
    Filed: October 15, 2018
    Date of Patent: December 1, 2020
    Assignee: Visa International Service Association
    Inventors: Hung-Tzaw Hu, Haochuan Zhou, Ge Wen, Benjamin Scott Boding
  • Publication number: 20200175388
    Abstract: Described are a system, method, and computer program product for optimizing a predictive condition classification model and automatically enacting reactive measures based thereon. The method includes receiving event data representative of a plurality of events. The method also includes receiving the predictive condition classification model configured to categorize each event as satisfying a condition or not. The predictive condition classification model is configured to order the plurality of events by likelihood of satisfying the condition. The method includes generating a performance evaluation dataset and plotting data configured to cause a visual display to represent at least two model performance metrics of the performance evaluation dataset on a same output plot. The method includes automatically rejecting a top percent of the plurality of events for suspected satisfaction of the condition, determined at least partially from a customized rejection algorithm or a preset rejection algorithm.
    Type: Application
    Filed: March 6, 2018
    Publication date: June 4, 2020
    Inventors: Hung-Tzaw Hu, Benjamin Scott Boding, Ge Wen, Haochuan Zhou
  • Publication number: 20200120135
    Abstract: Resources can be secured by a resource security system. The resource security system can determine whether to grant or deny access to resources using authorization information in an access request. The resource security system can also determine whether the access request is legitimate or fraudulent using risk scoring models. A score transformation table can be used to provide consistency in the risk level for a particular score over time. The score transformation table can be based on a target score profile and a precision format (e.g., integer or floating point). The score transformation table can dynamically adapt based on the trending top percent of risk and can account for changes in the distribution of scores over time or by weekday. The scores can be used to determine an access request outcome. Access to the resource can be accepted or rejected based on the outcome.
    Type: Application
    Filed: October 15, 2018
    Publication date: April 16, 2020
    Inventors: Hung-Tzaw Hu, Haochuan Zhou, Ge Wen, Benjamin Scott Boding
  • Publication number: 20200120100
    Abstract: Resources can be secured by a resource security system. The resource security system can determine whether to grant or deny access to resources using authorization information in an access request. The resource security system can also determine whether the access request is legitimate or fraudulent using risk scoring models. A score transformation table can be used to provide consistency in the risk level for a particular score over time. The score transformation table can be based on a target score profile and a precision format (e.g., integer or floating point). The score transformation table can dynamically adapt based on the trending top percent of risk and can account for changes in the distribution of scores over time or by weekday. The scores can be used to determine an access request outcome. Access to the resource can be accepted or rejected based on the outcome.
    Type: Application
    Filed: October 15, 2018
    Publication date: April 16, 2020
    Inventors: Hung-Tzaw Hu, Haochuan Zhou, Ge Wen, Benjamin Scott Boding
  • Patent number: 10609087
    Abstract: A resource security system may generate access rules for use in determining whether to grant or deny a request for access to a resource. In order to generate the access rules, the resource security system may select certain access request parameters and determine conditions associated with those parameters. The resource security system may generate mutually exclusive segments associated with a condition of each of the parameters. The resource security system may generate independent access rules based on the segments. The resource security system may then evaluate the performance of each of the access rules based on validity information corresponding to previously received access requests that satisfy the conditions of a particular access rule.
    Type: Grant
    Filed: May 8, 2019
    Date of Patent: March 31, 2020
    Assignee: Visa International Service Association
    Inventors: Haochuan Zhou, Hung-Tzaw Hu, Rong Zhang, Benjamin Scott Boding
  • Patent number: 10594738
    Abstract: Embodiments of the invention generally relate to methods and systems for operating authorization rules. An authorization rule has conditions that may be satisfied by an authorization request. A rule is rotated between the first mode and the second mode over a time interval wherein a first set of authorization requests are received. A first subset of the first set of authorization requests may not be rejected. After the first time interval, the authorization requests that were not rejected may be validated through an independent process. An accuracy rate for the rule is determined based on the portion of authorization requests that are valid and satisfied the conditions of the rule.
    Type: Grant
    Filed: May 14, 2019
    Date of Patent: March 17, 2020
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Hung-Tzaw Hu, Haochuan Zhou, Benjamin Scott Boding
  • Publication number: 20190387014
    Abstract: In some embodiments, a resource security system may determine an access request outcome (e.g., accept, reject, or review) for an access request based on access rules. The resource security system may generate and select the access rules to be used for using stability information. For instance, the resource security system may select a training set from the received access requests, e.g., including recently received access requests, and generate a plurality of potential access rules based on the training set. The resource security system may determine and compare the detection performance and the stability performance of the potential access rules. The resource security system may select the best performing potential access rules to be used in operation for determining the outcome of access requests.
    Type: Application
    Filed: August 29, 2019
    Publication date: December 19, 2019
    Inventors: Haochuan Zhou, Hung-Tzaw Hu, Rong Zhang, Benjamin Scott Boding
  • Patent number: 10440041
    Abstract: In some embodiments, a resource security system may determine an access request outcome (e.g., accept, reject, or review) for an access request based on access rules. The resource security system may generate and select the access rules to be used for using stability information. For instance, the resource security system may select a training set from the received access requests, e.g., including recently received access requests, and generate a plurality of potential access rules based on the training set. The resource security system may determine and compare the detection performance and the stability performance of the potential access rules. The resource security system may select the best performing potential access rules to be used in operation for determining the outcome of access requests.
    Type: Grant
    Filed: September 18, 2018
    Date of Patent: October 8, 2019
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Haochuan Zhou, Hung-Tzaw Hu, Rong Zhang, Benjamin Scott Boding
  • Patent number: D880494
    Type: Grant
    Filed: May 31, 2018
    Date of Patent: April 7, 2020
    Assignee: Visa International Service Association
    Inventors: Nathan Ryan Wood, Carl David Tucker, Jr., Benjamin Scott Boding, Cory Siddens, Andrew John Bruno Naumann zu Koenigsbrueck
  • Patent number: D881902
    Type: Grant
    Filed: May 31, 2018
    Date of Patent: April 21, 2020
    Assignee: Visa International Service Association
    Inventors: Nathan Ryan Wood, Carl David Tucker, Jr., Benjamin Scott Boding, Cory Siddens, Andrew John Bruno Naumann zu Koenigsbrueck