Patents by Inventor Scott Boding

Scott Boding has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10609087
    Abstract: A resource security system may generate access rules for use in determining whether to grant or deny a request for access to a resource. In order to generate the access rules, the resource security system may select certain access request parameters and determine conditions associated with those parameters. The resource security system may generate mutually exclusive segments associated with a condition of each of the parameters. The resource security system may generate independent access rules based on the segments. The resource security system may then evaluate the performance of each of the access rules based on validity information corresponding to previously received access requests that satisfy the conditions of a particular access rule.
    Type: Grant
    Filed: May 8, 2019
    Date of Patent: March 31, 2020
    Assignee: Visa International Service Association
    Inventors: Haochuan Zhou, Hung-Tzaw Hu, Rong Zhang, Benjamin Scott Boding
  • Patent number: 10594738
    Abstract: Embodiments of the invention generally relate to methods and systems for operating authorization rules. An authorization rule has conditions that may be satisfied by an authorization request. A rule is rotated between the first mode and the second mode over a time interval wherein a first set of authorization requests are received. A first subset of the first set of authorization requests may not be rejected. After the first time interval, the authorization requests that were not rejected may be validated through an independent process. An accuracy rate for the rule is determined based on the portion of authorization requests that are valid and satisfied the conditions of the rule.
    Type: Grant
    Filed: May 14, 2019
    Date of Patent: March 17, 2020
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Hung-Tzaw Hu, Haochuan Zhou, Benjamin Scott Boding
  • Publication number: 20190392421
    Abstract: Embodiments of the invention broadly described, introduce systems and methods for detecting the likelihood that a transaction is fraudulent using user access pattern data and device fingerprint data. One embodiment of the invention discloses a method for determining the likelihood that a payment transaction is fraudulent. The method comprises receiving user access pattern data generated by a user client computer, receiving a device fingerprint associated with the user client computer conducting a payment transaction, determining, using the user access pattern data and the device fingerprint, a likelihood that the payment transaction is fraudulent.
    Type: Application
    Filed: September 3, 2019
    Publication date: December 26, 2019
    Inventors: B. Scott Boding, Andrew Naumann zu Koenigsbrueck
  • Publication number: 20190387014
    Abstract: In some embodiments, a resource security system may determine an access request outcome (e.g., accept, reject, or review) for an access request based on access rules. The resource security system may generate and select the access rules to be used for using stability information. For instance, the resource security system may select a training set from the received access requests, e.g., including recently received access requests, and generate a plurality of potential access rules based on the training set. The resource security system may determine and compare the detection performance and the stability performance of the potential access rules. The resource security system may select the best performing potential access rules to be used in operation for determining the outcome of access requests.
    Type: Application
    Filed: August 29, 2019
    Publication date: December 19, 2019
    Inventors: Haochuan Zhou, Hung-Tzaw Hu, Rong Zhang, Benjamin Scott Boding
  • Patent number: 10445721
    Abstract: Systems and methods are provided for detecting the likelihood that a transaction is fraudulent using user access pattern data and device fingerprint data. One embodiment of the invention discloses a method for determining the likelihood that a payment transaction is fraudulent. For example, a transaction analysis system can receive user access pattern data generated by a user client computer, receive a device fingerprint associated with the user client computer conducting a payment transaction, and determine, using the user access pattern data and the device fingerprint, a likelihood that the payment transaction is fraudulent.
    Type: Grant
    Filed: June 24, 2013
    Date of Patent: October 15, 2019
    Assignee: Visa International Service Association
    Inventors: B. Scott Boding, Andrew Naumann zu Koenigsbrueck
  • Patent number: 10440041
    Abstract: In some embodiments, a resource security system may determine an access request outcome (e.g., accept, reject, or review) for an access request based on access rules. The resource security system may generate and select the access rules to be used for using stability information. For instance, the resource security system may select a training set from the received access requests, e.g., including recently received access requests, and generate a plurality of potential access rules based on the training set. The resource security system may determine and compare the detection performance and the stability performance of the potential access rules. The resource security system may select the best performing potential access rules to be used in operation for determining the outcome of access requests.
    Type: Grant
    Filed: September 18, 2018
    Date of Patent: October 8, 2019
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Haochuan Zhou, Hung-Tzaw Hu, Rong Zhang, Benjamin Scott Boding
  • Publication number: 20190268382
    Abstract: Embodiments of the invention generally relate to methods and systems for operating authorization rules. An authorization rule has conditions that may be satisfied by an authorization request. A rule is rotated between the first mode and the second mode over a time interval wherein a first set of authorization requests are received. A first subset of the first set of authorization requests may not be rejected. After the first time interval, the authorization requests that were not rejected may be validated through an independent process. An accuracy rate for the rule is determined based on the portion of authorization requests that are valid and satisfied the conditions of the rule.
    Type: Application
    Filed: May 14, 2019
    Publication date: August 29, 2019
    Inventors: Hung-Tzaw HU, Haochuan ZHOU, Benjamin Scott BODING
  • Publication number: 20190268378
    Abstract: A resource security system may generate access rules for use in determining whether to grant or deny a request for access to a resource. In order to generate the access rules, the resource security system may select certain access request parameters and determine conditions associated with those parameters. The resource security system may generate mutually exclusive segments associated with a condition of each of the parameters. The resource security system may generate independent access rules based on the segments. The resource security system may then evaluate the performance of each of the access rules based on validity information corresponding to previously received access requests that satisfy the conditions of a particular access rule.
    Type: Application
    Filed: May 8, 2019
    Publication date: August 29, 2019
    Inventors: Haochuan Zhou, Hung-Tzaw Hu, Rong Zhang, Benjamin Scott Boding
  • Patent number: 10333982
    Abstract: Embodiments of the invention generally relate to methods and systems for operating authorization rules. An authorization rule has conditions that may be satisfied by an authorization request. A rule is rotated between the first mode and the second mode over a time interval wherein a first set of authorization requests are received. A first subset of the first set of authorization requests may not be rejected. After the first time interval, the authorization requests that were not rejected may be validated through an independent process. An accuracy rate for the rule is determined based on the portion of authorization requests that are valid and satisfied the conditions of the rule.
    Type: Grant
    Filed: April 19, 2016
    Date of Patent: June 25, 2019
    Assignee: Visa International Service Association
    Inventors: Hung-Tzaw Hu, Haochuan Zhou, Benjamin Scott Boding
  • Publication number: 20190180282
    Abstract: An identity chaining fraud detection method that allows each current transaction to be linked to other transactions through commonly shared identities. Over a period of time the links create a chain of associated transactions which can be analyzed to determine if identity variances occur, which indicates that fraud is detected. Additionally, if a specific identity is detected as being fraudulent, that identity can be tagged as fraudulent and can be referenced by a plurality of other merchant transaction chains to determine fraud.
    Type: Application
    Filed: December 21, 2018
    Publication date: June 13, 2019
    Inventor: B. Scott Boding
  • Patent number: 10320846
    Abstract: A resource security system may generate access rules for use in determining whether to grant or deny a request for access to a resource. In order to generate the access rules, the resource security system may select certain access request parameters and determine conditions associated with those parameters. The resource security system may generate mutually exclusive segments associated with a condition of each of the parameters. The resource security system may generate independent access rules based on the segments. The resource security system may then evaluate the performance of each of the access rules based on validity information corresponding to previously received access requests that satisfy the conditions of a particular access rule.
    Type: Grant
    Filed: November 30, 2016
    Date of Patent: June 11, 2019
    Assignee: Visa International Service Association
    Inventors: Haochuan Zhou, Hung-Tzaw Hu, Rong Zhang, Benjamin Scott Boding
  • Publication number: 20190089726
    Abstract: In some embodiments, a resource security system may determine an access request outcome (e.g., accept, reject, or review) for an access request based on access rules. The resource security system may generate and select the access rules to be used for using stability information. For instance, the resource security system may select a training set from the received access requests, e.g., including recently received access requests, and generate a plurality of potential access rules based on the training set. The resource security system may determine and compare the detection performance and the stability performance of the potential access rules. The resource security system may select the best performing potential access rules to be used in operation for determining the outcome of access requests.
    Type: Application
    Filed: September 18, 2018
    Publication date: March 21, 2019
    Inventors: Haochuan Zhou, Hung-Tzaw Hu, Rong Zhang, Benjamin Scott Boding
  • Patent number: 10110621
    Abstract: In some embodiments, a resource security system may determine an access request outcome (e.g., accept, reject, or review) for an access request based on access rules. The resource security system may generate and select the access rules to be used for using stability information. For instance, the resource security system may select a training set from the received access requests, e.g., including recently received access requests, and generate a plurality of potential access rules based on the training set. The resource security system may determine and compare the detection performance and the stability performance of the potential access rules. The resource security system may select the best performing potential access rules to be used in operation for determining the outcome of access requests.
    Type: Grant
    Filed: November 14, 2017
    Date of Patent: October 23, 2018
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Haochuan Zhou, Hung-Tzaw Hu, Rong Zhang, Benjamin Scott Boding
  • Publication number: 20180300729
    Abstract: Embodiments of the present invention are directed to methods and systems for performing a secure authentication process by leveraging the historical transaction data associated with an issuer. The historical transaction data stored at a fraud detection system may include the types of frequency of past authentication processes performed by the issuer, allowing for a determination of the likelihood of an authentication challenge process being applied to a current transaction. A merchant may define merchant rules that define what authentication process, if any, should then be applied to the current transaction based on the likelihood of an authentication challenge process being applied to the current transaction.
    Type: Application
    Filed: June 8, 2018
    Publication date: October 18, 2018
    Inventors: Cory Siddens, Craig O'Connell, Scott Boding
  • Publication number: 20180232694
    Abstract: Embodiments of the invention are directed to a fraud detection system that stores fraud detection rules and merchant profiles. The fraud detection system allows a user to designate fraud detection rules as core fraud detection rules, and the fraud detection system can automatically populate new profiles with the user's core fraud detection rules.
    Type: Application
    Filed: April 10, 2018
    Publication date: August 16, 2018
    Inventors: B. Scott Boding, Cory H. Siddens
  • Publication number: 20180204215
    Abstract: A data structure provides reliable data allowing a security application to detect potential instances of fraudulent use of a payment account. The data structure can be generated using data elements associated with transactions from new authentication requests in a transaction. Once the data structure is generated, clusters within the data structure can be associated with legitimate authentication requests or potentially fraudulent authentication requests. A baseline cluster can be identified from the data structure and used to determine whether the new incoming authentication requests are legitimate or potentially fraudulent.
    Type: Application
    Filed: January 17, 2017
    Publication date: July 19, 2018
    Inventors: Hung-Tzaw Hu, Haochuan Zhou, Ge Wen, Benjamin Scott Boding
  • Patent number: 9996837
    Abstract: Embodiments of the present invention are directed to methods and systems for performing a secure authentication process by leveraging the historical transaction data associated with an issuer. The historical transaction data stored at a fraud detection system may include the types of frequency of past authentication processes performed by the issuer, allowing for a determination of the likelihood of an authentication challenge process being applied to a current transaction. A merchant may define merchant rules that define what authentication process, if any, should then be applied to the current transaction based on the likelihood of an authentication challenge process being applied to the current transaction.
    Type: Grant
    Filed: June 8, 2015
    Date of Patent: June 12, 2018
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Cory Siddens, Craig O'Connell, Scott Boding
  • Publication number: 20180152478
    Abstract: A resource security system may generate access rules for use in determining whether to grant or deny a request for access to a resource. In order to generate the access rules, the resource security system may select certain access request parameters and determine conditions associated with those parameters. The resource security system may generate mutually exclusive segments associated with a condition of each of the parameters. The resource security system may generate independent access rules based on the segments. The resource security system may then evaluate the performance of each of the access rules based on validity information corresponding to previously received access requests that satisfy the conditions of a particular access rule.
    Type: Application
    Filed: November 30, 2016
    Publication date: May 31, 2018
    Inventors: Haochuan Zhou, Hung-Tzaw Hu, Rong Zhang, Benjamin Scott Boding
  • Publication number: 20180139225
    Abstract: In some embodiments, a resource security system may determine an access request outcome (e.g., accept, reject, or review) for an access request based on access rules. The resource security system may generate and select the access rules to be used for using stability information. For instance, the resource security system may select a training set from the received access requests, e.g., including recently received access requests, and generate a plurality of potential access rules based on the training set. The resource security system may determine and compare the detection performance and the stability performance of the potential access rules. The resource security system may select the best performing potential access rules to be used in operation for determining the outcome of access requests.
    Type: Application
    Filed: November 14, 2017
    Publication date: May 17, 2018
    Inventors: Haochuan Zhou, Hung-Tzaw Hu, Rong Zhang, Benjamin Scott Boding
  • Patent number: D880494
    Type: Grant
    Filed: May 31, 2018
    Date of Patent: April 7, 2020
    Assignee: Visa International Service Association
    Inventors: Nathan Ryan Wood, Carl David Tucker, Jr., Benjamin Scott Boding, Cory Siddens, Andrew John Bruno Naumann zu Koenigsbrueck