Patents by Inventor Paul C Dulany
Paul C Dulany has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9594907Abstract: Systems and methods are provided for identifying and detecting unauthorized user activity and for decreasing the rate of false-positives. The disclosed systems and techniques may involve analysis of users' past activity data so that individual classifications and authorization decisions with respect to requested user activity are based on activity data associated with a user's use of multiple services.Type: GrantFiled: February 12, 2016Date of Patent: March 14, 2017Assignee: SAS Institute Inc.Inventors: Brian Lee Duke, Paul C. Dulany, Kannan Shashank Shah
-
Patent number: 9576290Abstract: A method of operating a computer system is disclosed. An eCommerce authentication request is received from a merchant node. The eCommerce authentication request has content including cardholder information. A risk score for the eCommerce authentication request is generated based on comparison of the cardholder information of the eCommerce authentication request to cardholder information of eCommerce authentication requests of a plurality of merchant nodes. The eCommerce authentication request is selectively provided to an authentication node based on the risk score.Type: GrantFiled: March 21, 2014Date of Patent: February 21, 2017Assignee: CA, Inc.Inventors: Revathi Subramanian, Paul C Dulany, Hongrui Gong, Kannan Shashank Shah
-
Patent number: 9563894Abstract: A method of operating a computer system is disclosed. An eCommerce authentication request is received from a merchant node. The eCommerce authentication request has content including merchant information. A risk score for the eCommerce authentication request is generated based on comparison of the merchant information of the eCommerce authentication request to merchant information of eCommerce authentication requests of a plurality of merchant nodes. The eCommerce authentication request is selectively provided to an authentication node based on the risk score.Type: GrantFiled: March 21, 2014Date of Patent: February 7, 2017Assignee: CA, Inc.Inventors: Revathi Subramanian, Paul C. Dulany, Hongrui Gong, Kannan Shashank Shah
-
Patent number: 9552582Abstract: A method of operating a computer system is disclosed. An eCommerce authentication request is received. Content of the eCommerce authentication request is processed through a non-linear analytical model to generate a risk score. The eCommerce authentication request is selectively provided to an authentication node based on the risk score. Related authentication gateway nodes and computer program products are disclosed.Type: GrantFiled: March 21, 2014Date of Patent: January 24, 2017Assignee: CA, Inc.Inventors: Revathi Subramanian, Paul C Dulany, Hongrui Gong, Kannan Shashank Shah
-
Publication number: 20160283715Abstract: Systems and methods are provided for identifying and detecting unauthorized user activity and for decreasing the rate of false-positives. The disclosed systems and techniques may involve analysis of users' past activity data so that individual classifications and authorization decisions with respect to requested user activity are based on activity data associated with a user's use of multiple services.Type: ApplicationFiled: February 12, 2016Publication date: September 29, 2016Applicant: SAS Institute Inc.Inventors: Brian Lee Duke, Paul C. Dulany, Kannan Shashank Shah
-
Publication number: 20160203485Abstract: A method of operating a computer system includes receiving from a merchant node an eCommerce authentication request for a pending eCommerce transaction associated with a user terminal. The eCommerce authentication request contains transaction information of the pending eCommerce transaction that includes a user terminal identifier. A risk score for the pending eCommerce transaction is generated based on similarities between the transaction information of the pending eCommerce transaction and a cluster of historical eCommerce transactions each containing transaction information including a user terminal identifier that matches the user terminal identifier of the pending eCommerce transaction. The eCommerce authentication request is selectively provided to an authentication node based on the risk score.Type: ApplicationFiled: January 8, 2015Publication date: July 14, 2016Applicant: CA, INC.Inventors: Revathi Subramanian, Paul C. Dulany, Hongrui Gong, Kannan Shashank Shah
-
Patent number: 9231979Abstract: This disclosure describes methods, systems, and computer-program products for determining classification rules to use within a fraud detection system The classification rules are determined by accessing distributional data representing a distribution of historical transactional events over a multivariate observational sample space defined with respect to multiple transactional variables. Each of the transactional events is represented by data with respect to each of the variables, and the distributional data is organized with respect to multi-dimensional subspaces of the sample space. A classification rule that references at least one of the subspaces is accessed, and the rule is modified using local optimization applied using the distributional data. A pending transaction is classified based on the modified classification rule and the transactional data.Type: GrantFiled: March 13, 2014Date of Patent: January 5, 2016Assignee: SAS INSTITUTE INC.Inventors: Brian Lee Duke, Vijay S. Desai, Paul C. Dulany, Kannan Shashank Shah
-
Publication number: 20150269579Abstract: A method of operating a computer system is disclosed. An eCommerce authentication request is received from a merchant node. The eCommerce authentication request has content including cardholder information. A risk score for the eCommerce authentication request is generated based on comparison of the cardholder information of the eCommerce authentication request to cardholder information of eCommerce authentication requests of a plurality of merchant nodes. The eCommerce authentication request is selectively provided to an authentication node based on the risk score.Type: ApplicationFiled: March 21, 2014Publication date: September 24, 2015Applicant: CA, INC.Inventors: Revathi Subramanian, Paul C. Dulany, Hongrui Gong, Kannan Shashank Shah
-
Publication number: 20150269578Abstract: A method of operating a computer system is disclosed. An eCommerce authentication request is received. Content of the eCommerce authentication request is processed through a non-linear analytical model to generate a risk score. The eCommerce authentication request is selectively provided to an authentication node based on the risk score. Related authentication gateway nodes and computer program products are disclosed.Type: ApplicationFiled: March 21, 2014Publication date: September 24, 2015Applicant: CA, INC.Inventors: Revathi Subramanian, Paul C. Dulany, Hongrui Gong, Kannan Shashank Shah
-
Publication number: 20150269580Abstract: A method of operating a computer system is disclosed. An eCommerce authentication request is received from a merchant node. The eCommerce authentication request has content including merchant information. A risk score for the eCommerce authentication request is generated based on comparison of the merchant information of the eCommerce authentication request to merchant information of eCommerce authentication requests of a plurality of merchant nodes. The eCommerce authentication request is selectively provided to an authentication node based on the risk score.Type: ApplicationFiled: March 21, 2014Publication date: September 24, 2015Applicant: CA, INC.Inventors: Revathi Subramanian, Paul C. Dulany, Hongrui Gong, Kannan Shashank Shah
-
Publication number: 20140282856Abstract: This disclosure describes methods, systems, and computer-program products for determining classification rules to use within a fraud detection system The classification rules are determined by accessing distributional data representing a distribution of historical transactional events over a multivariate observational sample space defined with respect to multiple transactional variables. Each of the transactional events is represented by data with respect to each of the variables, and the distributional data is organized with respect to multi-dimensional subspaces of the sample space. A classification rule that references at least one of the subspaces is accessed, and the rule is modified using local optimization applied using the distributional data. A pending transaction is classified based on the modified classification rule and the transactional data.Type: ApplicationFiled: March 13, 2014Publication date: September 18, 2014Applicant: SAS Institute Inc.Inventors: Brian Lee Duke, Vijay S. Desai, Paul C. Dulany, Kannan Shashank Shah
-
Publication number: 20140279527Abstract: Methods, systems, computer-readable media, and apparatuses for detecting unauthorized activity are disclosed. Detecting unauthorized activity is done by accessing first data that represents activity involving a first service provided to a customer, accessing second data that represents activity involving a second service provided to a customer. The activity involving the second service and the activity involving the first service both include authorized customer activity, and the activity associated with the second service further includes unauthorized activity. The first data is filtered using a filtering criteria and a portion of the first data is selected to be retained. The second data and the retained portion of the first data are analyzed, and the analysis includes classifying the activity associated with the second service in a way that distinguishes the unauthorized activity from the authorized activity associated with the second service.Type: ApplicationFiled: October 24, 2013Publication date: September 18, 2014Applicant: SAS Institute Inc.Inventors: Brian Lee Duke, Paul C. Dulany, Vijay Desai, Kannan Shashank Shah
-
Publication number: 20140249934Abstract: Transaction data is processed by first determining transactions in a database that are associated with a respective event that indicates a classification of interest and that share at least one common point of purchase (CPP) identifier across two or more of the determined transactions associated with the classification of interest. A set of the transactions in the database are determined, based on the CPP identifiers for transactions from as time period prior to a start time of the event and accounts associated with the event. Times of occurrence for the transactions in the set are determined, based on the CPP, and a score is generated for the received transaction for any transactions associated with at least one of the respective events and sharing at least one common CPP.Type: ApplicationFiled: March 1, 2013Publication date: September 4, 2014Inventors: Revathi Subramanian, Paul C. Dulany, Brian Lee Duke
-
Publication number: 20140172690Abstract: Systems and methods for matching domain-specific transactions are provided. Some of the disclosed systems and methods can include receiving, on a computing device, transaction data associated with an entity, retrieving signature data associated with the entity, wherein the signature data includes historic data associated with the entity; updating the signature data to include the transaction data, wherein updating includes using a model, and generating a score for the transaction data using the updated signature data and the model. The disclosed system and method further includes receiving new transaction data associated with the entity; retrieving the updated signature data associated with the entity; determining whether the transaction data and the new transaction data are related, and if so, updating the transaction data with the new transaction data, and generating a score for the updated transaction data using the updated signature data and the model.Type: ApplicationFiled: December 17, 2012Publication date: June 19, 2014Inventors: Brian Duke, Revathi Subramanian, Paul C. Dulany
-
Publication number: 20130339218Abstract: Systems and methods for performing fraud detection. As an example, a system and method can be configured to contain a raw data repository for storing raw data related to financial transactions. A data store contains rules to indicate how many generations or to indicate a time period within which data items are to be stored in the raw data repository. Data items stored in the raw data repository are then accessed by a predictive model in order to perform fraud detection.Type: ApplicationFiled: May 30, 2013Publication date: December 19, 2013Applicant: SAS Institute Inc.Inventors: Revathi Subramanian, Radu Drossu, Kevin Chaowen Chen, Paul C. Dulany
-
Publication number: 20120317008Abstract: Systems and methods for storing transaction data associated with transactions of disparate types are provided. Transaction data is received describing a transaction that has occurred, the transaction being performed by an customer of a particular customer type and the transaction being performed using a channel of a particular channel type. Transaction data about the customer is stored in an customer segment according to one of a plurality of customer templates, the one of the plurality of customer templates being selected according to the customer type. Transaction data about the channel is stored in a channel segment according to one of a plurality of channel templates, the one of the plurality of channel templates being selected according to the channel type. Data from the customer segment, the activity segment, and the channel segment for the transaction is extracted and scored by a predictive model.Type: ApplicationFiled: June 13, 2011Publication date: December 13, 2012Inventors: Revathi Subramanian, Ho Ming Luk, Brian Lee Duke, Paul C. Dulany
-
Publication number: 20120317013Abstract: Systems and methods are provided for scoring transaction data representative of transactions of disparate types transaction data describing a transaction that has occurred is received. The transaction data is stored in a plurality of segments, where a segment is formatted according to a template, where the template is selected based on an attribute of the transaction, and where the attribute is a customer attribute, an activity attribute, or a channel attribute. Transaction data associated with a segment is aggregated based on a particular attribute. The aggregate transaction data is provided to a predictive model to generate a fraud score. New transaction data is received describing a new transaction, wherein the new transaction includes the particular attribute. A real-time score is provided indicating a likelihood of fraud for the new transaction, wherein the score is based at least in part on the fraud score generated using the aggregate transaction data.Type: ApplicationFiled: June 13, 2011Publication date: December 13, 2012Inventors: Ho Ming Luk, Revathi Subramanian, Brian Lee Duke, Paul C. Dulany
-
Publication number: 20120317027Abstract: Systems and methods are provided for providing real-time scoring of received transaction data. Transaction data describing a particular transaction that has occurred is received. The transaction data is stored in an enterprise database, where the enterprise database is configured to store transactions of disparate types, where the transaction data is stored using a plurality of segments, where a segment is formatted according to a template, and where the template is selected based on an attribute of the transaction, wherein the attribute is a customer attribute, an activity attribute, or a channel attribute. A transaction type of the particular transaction is determined. One or more models are selected from a pool of models based on the transaction type, wherein the one or more models are configured based on a plurality of records from the enterprise database, and a score of the received transaction data is generated based on the transaction data.Type: ApplicationFiled: June 13, 2011Publication date: December 13, 2012Inventors: Ho Ming Luk, Daniel J. Dotson, Paul C. Dulany, Revathi Subramanian, Brian Lee Duke, Vijay S. Desai
-
Patent number: 8032448Abstract: Computer implemented methods and systems of processing transactions to determine the risk of transaction convert high categorical information, such as text data, to low categorical information, such as category or cluster IDs. The text data may be merchant names or other textual content of the transactions, or data related to a consumer, or any other type of entity which engages in the transaction. Content mining techniques are used to provide the conversion from high to low categorical information. In operation, the resulting low categorical information is input, along with other data, into a statistical model. The statistical model provides an output of the level of risk in the transaction. Methods of converting the high categorical information to low categorical clusters, of using such information, and other aspects of the use of such clusters are disclosed.Type: GrantFiled: October 4, 2007Date of Patent: October 4, 2011Assignee: Fair Isaac CorporationInventors: Russell Anderson, Larry S. Peranich, Ricardo M. Dungca, Joseph P. Milana, Xuhui Shao, Paul C. Dulany, Khosrow M. Hassibi, James C. Baker
-
Patent number: 7912773Abstract: Systems and methods for performing fraud detection. As an example, a system and method can be configured to contain a raw data repository for storing raw data related to financial transactions. A data store contains rules to indicate how many generations or to indicate a time period within which data items are to be stored in the raw data repository. Data items stored in the raw data repository are then accessed by a predictive model in order to perform fraud detection.Type: GrantFiled: March 26, 2007Date of Patent: March 22, 2011Assignee: SAS Institute Inc.Inventors: Revathi Subramanian, Radu Drossu, Kevin Chaowen Chen, Paul C. Dulany