Patents by Inventor Benjamin Scott Boding

Benjamin Scott Boding has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190268378
    Abstract: A resource security system may generate access rules for use in determining whether to grant or deny a request for access to a resource. In order to generate the access rules, the resource security system may select certain access request parameters and determine conditions associated with those parameters. The resource security system may generate mutually exclusive segments associated with a condition of each of the parameters. The resource security system may generate independent access rules based on the segments. The resource security system may then evaluate the performance of each of the access rules based on validity information corresponding to previously received access requests that satisfy the conditions of a particular access rule.
    Type: Application
    Filed: May 8, 2019
    Publication date: August 29, 2019
    Inventors: Haochuan Zhou, Hung-Tzaw Hu, Rong Zhang, Benjamin Scott Boding
  • Publication number: 20190268382
    Abstract: Embodiments of the invention generally relate to methods and systems for operating authorization rules. An authorization rule has conditions that may be satisfied by an authorization request. A rule is rotated between the first mode and the second mode over a time interval wherein a first set of authorization requests are received. A first subset of the first set of authorization requests may not be rejected. After the first time interval, the authorization requests that were not rejected may be validated through an independent process. An accuracy rate for the rule is determined based on the portion of authorization requests that are valid and satisfied the conditions of the rule.
    Type: Application
    Filed: May 14, 2019
    Publication date: August 29, 2019
    Inventors: Hung-Tzaw HU, Haochuan ZHOU, Benjamin Scott BODING
  • Patent number: 10333982
    Abstract: Embodiments of the invention generally relate to methods and systems for operating authorization rules. An authorization rule has conditions that may be satisfied by an authorization request. A rule is rotated between the first mode and the second mode over a time interval wherein a first set of authorization requests are received. A first subset of the first set of authorization requests may not be rejected. After the first time interval, the authorization requests that were not rejected may be validated through an independent process. An accuracy rate for the rule is determined based on the portion of authorization requests that are valid and satisfied the conditions of the rule.
    Type: Grant
    Filed: April 19, 2016
    Date of Patent: June 25, 2019
    Assignee: Visa International Service Association
    Inventors: Hung-Tzaw Hu, Haochuan Zhou, Benjamin Scott Boding
  • Patent number: 10320846
    Abstract: A resource security system may generate access rules for use in determining whether to grant or deny a request for access to a resource. In order to generate the access rules, the resource security system may select certain access request parameters and determine conditions associated with those parameters. The resource security system may generate mutually exclusive segments associated with a condition of each of the parameters. The resource security system may generate independent access rules based on the segments. The resource security system may then evaluate the performance of each of the access rules based on validity information corresponding to previously received access requests that satisfy the conditions of a particular access rule.
    Type: Grant
    Filed: November 30, 2016
    Date of Patent: June 11, 2019
    Assignee: Visa International Service Association
    Inventors: Haochuan Zhou, Hung-Tzaw Hu, Rong Zhang, Benjamin Scott Boding
  • Publication number: 20190089726
    Abstract: In some embodiments, a resource security system may determine an access request outcome (e.g., accept, reject, or review) for an access request based on access rules. The resource security system may generate and select the access rules to be used for using stability information. For instance, the resource security system may select a training set from the received access requests, e.g., including recently received access requests, and generate a plurality of potential access rules based on the training set. The resource security system may determine and compare the detection performance and the stability performance of the potential access rules. The resource security system may select the best performing potential access rules to be used in operation for determining the outcome of access requests.
    Type: Application
    Filed: September 18, 2018
    Publication date: March 21, 2019
    Inventors: Haochuan Zhou, Hung-Tzaw Hu, Rong Zhang, Benjamin Scott Boding
  • Patent number: 10110621
    Abstract: In some embodiments, a resource security system may determine an access request outcome (e.g., accept, reject, or review) for an access request based on access rules. The resource security system may generate and select the access rules to be used for using stability information. For instance, the resource security system may select a training set from the received access requests, e.g., including recently received access requests, and generate a plurality of potential access rules based on the training set. The resource security system may determine and compare the detection performance and the stability performance of the potential access rules. The resource security system may select the best performing potential access rules to be used in operation for determining the outcome of access requests.
    Type: Grant
    Filed: November 14, 2017
    Date of Patent: October 23, 2018
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Haochuan Zhou, Hung-Tzaw Hu, Rong Zhang, Benjamin Scott Boding
  • Publication number: 20180204215
    Abstract: A data structure provides reliable data allowing a security application to detect potential instances of fraudulent use of a payment account. The data structure can be generated using data elements associated with transactions from new authentication requests in a transaction. Once the data structure is generated, clusters within the data structure can be associated with legitimate authentication requests or potentially fraudulent authentication requests. A baseline cluster can be identified from the data structure and used to determine whether the new incoming authentication requests are legitimate or potentially fraudulent.
    Type: Application
    Filed: January 17, 2017
    Publication date: July 19, 2018
    Inventors: Hung-Tzaw Hu, Haochuan Zhou, Ge Wen, Benjamin Scott Boding
  • Publication number: 20180152478
    Abstract: A resource security system may generate access rules for use in determining whether to grant or deny a request for access to a resource. In order to generate the access rules, the resource security system may select certain access request parameters and determine conditions associated with those parameters. The resource security system may generate mutually exclusive segments associated with a condition of each of the parameters. The resource security system may generate independent access rules based on the segments. The resource security system may then evaluate the performance of each of the access rules based on validity information corresponding to previously received access requests that satisfy the conditions of a particular access rule.
    Type: Application
    Filed: November 30, 2016
    Publication date: May 31, 2018
    Inventors: Haochuan Zhou, Hung-Tzaw Hu, Rong Zhang, Benjamin Scott Boding
  • Publication number: 20180139225
    Abstract: In some embodiments, a resource security system may determine an access request outcome (e.g., accept, reject, or review) for an access request based on access rules. The resource security system may generate and select the access rules to be used for using stability information. For instance, the resource security system may select a training set from the received access requests, e.g., including recently received access requests, and generate a plurality of potential access rules based on the training set. The resource security system may determine and compare the detection performance and the stability performance of the potential access rules. The resource security system may select the best performing potential access rules to be used in operation for determining the outcome of access requests.
    Type: Application
    Filed: November 14, 2017
    Publication date: May 17, 2018
    Inventors: Haochuan Zhou, Hung-Tzaw Hu, Rong Zhang, Benjamin Scott Boding
  • Patent number: 9853993
    Abstract: In some embodiments, a resource security system may determine an access request outcome (e.g., accept, reject, or review) for an access request based on access rules. The resource security system may generate and select the access rules to be used for using stability information. For instance, the resource security system may select a training set from the received access requests, e.g., including recently received access requests, and generate a plurality of potential access rules based on the training set. The resource security system may determine and compare the detection performance and the stability performance of the potential access rules. The resource security system may select the best performing potential access rules to be used in operation for determining the outcome of access requests.
    Type: Grant
    Filed: November 15, 2016
    Date of Patent: December 26, 2017
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Haochuan Zhou, Hung-Tzaw Hu, Rong Zhang, Benjamin Scott Boding
  • Publication number: 20170302702
    Abstract: Embodiments of the invention generally relate to methods and systems for operating authorization rules. An authorization rule has conditions that may be satisfied by an authorization request. A rule is rotated between the first mode and the second mode over a time interval wherein a first set of authorization requests are received. A first subset of the first set of authorization requests may not be rejected. After the first time interval, the authorization requests that were not rejected may be validated through an independent process. An accuracy rate for the rule is determined based on the portion of authorization requests that are valid and satisfied the conditions of the rule.
    Type: Application
    Filed: April 19, 2016
    Publication date: October 19, 2017
    Inventors: Hung-Tzaw Hu, Haochuan Zhou, Benjamin Scott Boding
  • Publication number: 20140089193
    Abstract: Systems and methods for testing new profiles and rules against past transaction data in a quick manner are provided. A set of transactions is identified by a merchant based on a selection criterion that is replayed against the new profile. Results of the replay are recorded and compared against the original results obtained from applying an existing profile to the same set of transaction data. A tic-tac-toe report is generated for the merchant showing shifts in transaction results between the existing profile and the new profile. Embodiments of the invention further allow merchants to generate multiple scores, in parallel, against different transaction models using knobs or hedges.
    Type: Application
    Filed: July 23, 2013
    Publication date: March 27, 2014
    Applicant: Visa International Service Association
    Inventors: Benjamin Scott Boding, Cory H. Siddens
  • Publication number: 20140089192
    Abstract: Embodiments of the invention are directed to computer that can utilize a first computer and a second computer. The first computer may determine a first fraud score based on transaction data. If the first fraud score is indeterminate, the transaction may be assigned to a transaction review queue. If the subsequent review takes too long to complete, then a second computer may be used to compute a second fraud score to determine an outcome for the transaction.
    Type: Application
    Filed: June 25, 2013
    Publication date: March 27, 2014
    Inventors: Benjamin Scott Boding, Andrew Naumann zu Koenigsbrueck, Cory H. Siddens
  • Publication number: 20130282578
    Abstract: In an embodiment, a data processing method comprises obtaining a plurality of first transaction data items for a proposed online credit card purchase transaction that has been recommended for review; obtaining a plurality of second transaction data items for a set of similar past online credit card purchase transactions, wherein each member of the set has one or more transaction feature values that are similar to the transaction data items of the proposed online credit card purchase transaction, and a decision value specifying whether the member was accepted or rejected by a reviewer; obtaining a stored data model of features, feature values, transaction acceptance decisions and rejection decisions of the reviewer based at least in part on the set, determining, based on applying the first transaction data items to the stored data model and a subsequent query to the database among more recent transactions that were not included during model construction, a likelihood value of a particular decision of whether t
    Type: Application
    Filed: October 22, 2012
    Publication date: October 24, 2013
    Inventors: Jianjie Ma, Benjamin Scott Boding, Shawna Bushart
  • Publication number: 20130218758
    Abstract: Embodiments of the invention relate to methods, apparatuses, and systems for performing, creating, generating, and displaying transaction scorecards related to fraud evaluations of transactions. Methods may include determining if one or more preselected rules are triggered by transaction data associated with a transaction, determining a trigger score for each of the preselected rules, adding the trigger score for each of the preselected rules to a profile score, applying the profile score to at least one transaction decision rule, and displaying transaction evaluation results in a transaction scorecard. Additionally, some embodiments of the invention may combine a centralized multiple merchant fraud model provided by a merchant processor and a merchant customized model, to a produce a hybrid scorecard model. The respective scores of the multiple merchant fraud model and the merchant customized model may be weighted for further customization.
    Type: Application
    Filed: February 19, 2013
    Publication date: August 22, 2013
    Inventors: Andrew John Bruno Naumann zu Koenigsbrueck, Cory Howard Siddens, Benjamin Scott Boding
  • Patent number: 8326760
    Abstract: In an embodiment, a data processing method comprises obtaining a plurality of first transaction data items for a proposed online credit card purchase transaction that has been recommended for review; obtaining a plurality of second transaction data items for a set of similar past online credit card purchase transactions, wherein each member of the set has one or more transaction feature values that are similar to the transaction data items of the proposed online credit card purchase transaction, and a decision value specifying whether the member was accepted or rejected by a reviewer; obtaining a stored data model of features, feature values, transaction acceptance decisions and rejection decisions of the reviewer based at least in part on the set, determining, based on applying the first transaction data items to the stored data model and a subsequent query to the database among more recent transactions that were not included during model construction, a likelihood value of a particular decision of whether t
    Type: Grant
    Filed: September 13, 2010
    Date of Patent: December 4, 2012
    Assignee: Cybersource Corporation
    Inventors: Jianjie Ma, Benjamin Scott Boding, Shawna Bushart
  • Publication number: 20120066125
    Abstract: In an embodiment, a data processing method comprises obtaining a plurality of first transaction data items for a proposed online credit card purchase transaction that has been recommended for review; obtaining a plurality of second transaction data items for a set of similar past online credit card purchase transactions, wherein each member of the set has one or more transaction feature values that are similar to the transaction data items of the proposed online credit card purchase transaction, and a decision value specifying whether the member was accepted or rejected by a reviewer; obtaining a stored data model of features, feature values, transaction acceptance decisions and rejection decisions of the reviewer based at least in part on the set, determining, based on applying the first transaction data items to the stored data model and a subsequent query to the database among more recent transactions that were not included during model construction, a likelihood value of a particular decision of whether t
    Type: Application
    Filed: September 13, 2010
    Publication date: March 15, 2012
    Inventors: Jianjie Ma, Benjamin Scott Boding, Shawna Bushart