Patents by Inventor Scott M. Zoldi

Scott M. Zoldi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8150744
    Abstract: A system and method of revenue assurance for a service activity are presented. Multiple data feeds are received by a revenue assurance analytic system, where each data feed contains the same logical component of the service activity. The multiple data feeds are processed to detect revenue assurance issues in the service activity based on one or more common linking keys between disparate records related to the logical component.
    Type: Grant
    Filed: September 18, 2007
    Date of Patent: April 3, 2012
    Assignee: Fair Isaac Corporation
    Inventors: Scott M. Zoldi, Steven G. Wu
  • Patent number: 8131615
    Abstract: A system for classifying a transaction as fraudulent includes a training component and a scoring component. The training component acts on historical data and also includes a multi-dimensional risk table component comprising one or more multidimensional risk tables each of which approximates an initial risk value for a substantially empty cell in a risk table based upon risk values in cells related to the substantially empty cell. The scoring component produces a score, based in part, on the risk tables associated with groupings of variables having values determined by the training component. The scoring component includes a statistical model that produces an output and wherein the transaction is classified as fraudulent when the output is above a selected threshold value.
    Type: Grant
    Filed: June 27, 2008
    Date of Patent: March 6, 2012
    Assignee: Fair Isaac Corporation
    Inventors: Vesselin Diev, Shailesh Kumar, Scott M. Zoldi
  • Publication number: 20120005749
    Abstract: A method for dynamically updating a model is described. The method includes accessing a model that specifies expected characteristics for a transaction. The model includes variables associated with fraud. The method also includes receiving at least one value for each of the variables while monitoring transactions, and updating a distribution of values for each variable based on the received value. The received value is compared with the updated distribution to determine a deviation from a threshold value associated with a percentile of the updated distribution that is indicative of fraud.
    Type: Application
    Filed: September 9, 2011
    Publication date: January 5, 2012
    Inventors: Scott M. Zoldi, Steven Wu, Fei Chen
  • Patent number: 8090648
    Abstract: A computerized method for detecting fraud includes obtaining frequency information on entities in transaction data for at least one individual account, converting frequency information to a frequency variable, and predicting whether an activity is fraudulent in response to the frequency variable. In some embodiments, the frequency variable is used with at least one other variable to predict fraudulent activity.
    Type: Grant
    Filed: March 4, 2009
    Date of Patent: January 3, 2012
    Assignee: Fair Isaac Corporation
    Inventors: Scott M. Zoldi, Hua Li, Xinwei Xue
  • Publication number: 20110305329
    Abstract: A network assurance analytics (NAA) system and method is disclosed. The NAA can be part of a risk analytic for telecom (RAFT) program. The NAA system is configured to monitor telecommunications networks, detect errors or fraud in those telecommunications networks, and provide solutions to resolve the errors or reduce the fraud. Traffic of a telecommunications network is electronically monitored for at least one pattern that is indicative of a telecommunications anomaly. Based on a set of a set of telecommunications profiles stored in a database, a model score representing a value of the telecommunications anomaly is generated. A solution for the telecommunications network to reduce the model score associated with the telecommunications anomaly is then generated for execution on the telecommunications network.
    Type: Application
    Filed: June 13, 2011
    Publication date: December 15, 2011
    Applicant: FAIR ISSAC CORPORATION
    Inventors: Scott M. Zoldi, Michael P. Balon
  • Publication number: 20110288989
    Abstract: A system and method for maintaining a pre-defined score distribution for financial transactions are disclosed. A number of memory spaces are defined for a memory structure. Transaction data for the financial transactions is received by the system. Each of the financial transactions is scored based on the transaction data to generate a batch of scores for the financial transactions. A score range is divided into k bins, where each of the k bins representing one memory space of the memory spaces of the memory structure. The batch of scores are aggregated by storing a count of each score of the batch of scores in an associated memory space of the plurality of memory spaces, and a percentile is computed for each score in the batch of scores based on a set of values associated with the count of each score. Each new financial transaction is scored to generate a new score, and a new percentile is assigned to the new score according to the set of values.
    Type: Application
    Filed: May 20, 2010
    Publication date: November 24, 2011
    Applicant: FAIR ISAAC CORPORATION
    Inventors: Sridhar Maddipati, Scott M Zoldi
  • Patent number: 8041597
    Abstract: A system and method for detecting fraud is presented. A self-calibrating outlier model is hosted by a computing system. The self-calibrating outlier model receives transaction data representing transactions, and is configured to calculate transaction-based variables, profiles and calibration parameters, and to produce a score based on the transaction data according to the transaction-based variables, profiles and calibration parameters. An adaptive cascade model is also hosted by the computing system, and is configured to generate a secondary score for the transaction data based on profile information from the variables and/or profiles calculated by the self-calibrating outlier model, and based on a comparison with labeled transactions from a human analyst of historical transaction data.
    Type: Grant
    Filed: August 8, 2008
    Date of Patent: October 18, 2011
    Assignee: Fair Isaac Corporation
    Inventors: Xiang Li, Scott M. Zoldi, Jehangir Athwal
  • Patent number: 8027439
    Abstract: A method for dynamically updating a model is described. The method includes accessing a model that specifies expected characteristics for a transaction. The model includes variables associated with fraud. The method also includes receiving at least one value for each of the variables while monitoring transactions, and updating a distribution of values for each variable based on the received value. The received value is compared with the updated distribution to determine a deviation from a threshold value associated with a percentile of the updated distribution that is indicative of fraud.
    Type: Grant
    Filed: September 18, 2006
    Date of Patent: September 27, 2011
    Assignee: Fair Isaac Corporation
    Inventors: Scott M. Zoldi, Steven Wu, Fei Chen
  • Publication number: 20110166979
    Abstract: An apparatus and method for developing financial risk decisions for a customer associated with a number of different financial services/channels are disclosed. A hierarchy of relationships among the financial services/channels is generated. Transactional behaviors of the customer related to each of the financial services/channels is summarized, using one or more analytical approaches executed on the hierarchy of relationships, to generate a customer level transactional behavior summary. A customer profile associated with the customer is generated which includes the transactional behavior summary and aggregated information on recent financial transactions associated with each of the financial services/channels. A score for a risk decision can be generated for one or more specific services/channels, based on the customer profile.
    Type: Application
    Filed: January 6, 2010
    Publication date: July 7, 2011
    Inventor: SCOTT M. ZOLDI
  • Patent number: 7961857
    Abstract: A network assurance analytics (NAA) system and method is disclosed. The NAA can be part of a risk analytic for telecom (RAFT) program. The NAA system is configured to monitor telecommunications networks, detect errors or fraud in those telecommunications networks, and provide solutions to resolve the errors or reduce the fraud. Traffic of a telecommunications network is electronically monitored for at least one pattern that is indicative of a telecommunications anomaly. Based on a set of a set of telecommunications profiles stored in a database, a model score representing a value of the telecommunications anomaly is generated. A solution for the telecommunications network to reduce the model score associated with the telecommunications anomaly is then generated for execution on the telecommunications network.
    Type: Grant
    Filed: June 1, 2006
    Date of Patent: June 14, 2011
    Assignee: Fair Isaac Corporation
    Inventors: Scott M. Zoldi, Michael P. Balon
  • Patent number: 7945515
    Abstract: A system and method for managing mass compromise of financial transaction devices is disclosed. A method includes maintaining a summary of a transaction history for a financial transaction device, and forming a device history profile based on the transaction history, the device history profile including predictive variables indicative of fraud associated with the financial transaction device. A method further includes generating a fraud score based on the predictive variables, the fraud score representing a likelihood that the financial transaction device is compromised will be used fraudulently.
    Type: Grant
    Filed: July 16, 2010
    Date of Patent: May 17, 2011
    Assignee: Fair Isaac Corporation
    Inventors: Scott M. Zoldi, Liang Wang, Li Sun, Steven G. Wu
  • Publication number: 20110055074
    Abstract: A computer-implemented method and system for visualizing card transaction fraud analysis is presented. Transaction data and account data related to one or more payment card accounts is stored in a database. The transaction data includes a fraud score. A computer processor generates one or more of a plurality of visualizations of activity of at least one suspicious account from the one or more payment card accounts for display in a graphical user interface, each of the plurality of visualizations providing at least a graphical representation of the transaction data and which is selectable from a menu provided by the computer processor in the graphical user interface. The visualizations assist in case judgment of the one or more payment cards.
    Type: Application
    Filed: September 2, 2009
    Publication date: March 3, 2011
    Inventors: Yonghui Chen, Gregory Gancarz, Scott M. Zoldi
  • Publication number: 20100280943
    Abstract: A system and method for managing mass compromise of financial transaction devices is disclosed. A method includes maintaining a summary of a transaction history for a financial transaction device, and forming a device history profile based on the transaction history, the device history profile including predictive variables indicative of fraud associated with the financial transaction device. A method further includes generating a fraud score based on the predictive variables, the fraud score representing a likelihood that the financial transaction device is compromised will be used fraudulently.
    Type: Application
    Filed: July 16, 2010
    Publication date: November 4, 2010
    Inventors: Scott M. Zoldi, Liang Wang, Li Sun, Steven G. Wu
  • Publication number: 20100228580
    Abstract: A computerized method for detecting fraud includes obtaining frequency information on entities in transaction data for at least one individual account, converting frequency information to a frequency variable, and predicting whether an activity is fraudulent in response to the frequency variable. In some embodiments, the frequency variable is used with at least one other variable to predict fraudulent activity.
    Type: Application
    Filed: March 4, 2009
    Publication date: September 9, 2010
    Inventors: Scott M. Zoldi, Hua Li, Xinwei Xue
  • Patent number: 7761379
    Abstract: A system and method for managing mass compromise of financial transaction devices is disclosed. A method includes maintaining a summary of a transaction history for a financial transaction device, and forming a device history profile based on the transaction history, the device history profile including predictive variables indicative of fraud associated with the financial transaction device. A method further includes generating a fraud score based on the predictive variables, the fraud score representing a likelihood that the financial transaction device is compromised will be used fraudulently.
    Type: Grant
    Filed: June 26, 2006
    Date of Patent: July 20, 2010
    Assignee: Fair Isaac Corporation
    Inventors: Scott M. Zoldi, Liang Wang, Li Sun, Steven G. Wu
  • Publication number: 20100057773
    Abstract: A computer-implemented method of tagging a transaction that includes tagging a transaction with one of a first tag value or a second tag value, forming a set of clusters associated with the tagged transactions having a first value, and forming a second set of clusters associated with the tagged transactions having a second value. The computer implemented method also includes determining a fuzzy tag value based on a relationship between the transaction and one of the centroids of the clusters having a first tag value, and one of the centroids of the clusters having second value. The method also includes replacing the first tag value or the second tag value with the fuzzy tag value.
    Type: Application
    Filed: August 29, 2008
    Publication date: March 4, 2010
    Inventors: Prodip Hore, Scott M. Zoldi, Surjit Singh
  • Publication number: 20100036672
    Abstract: A system and method for detecting fraud is presented. A self-calibrating outlier model is hosted by a computing system. The self-calibrating outlier model receives transaction data representing transactions, and is configured to calculate transaction-based variables, profiles and calibration parameters, and to produce a score based on the transaction data according to the transaction-based variables, profiles and calibration parameters. An adaptive cascade model is also hosted by the computing system, and is configured to generate a secondary score for the transaction data based on profile information from the variables and/or profiles calculated by the self-calibrating outlier model, and based on a comparison with labeled transactions from a human analyst of historical transaction data.
    Type: Application
    Filed: August 8, 2008
    Publication date: February 11, 2010
    Inventors: Xiang Li, Scott M. Zoldi, Jehangir Athwal
  • Publication number: 20090327132
    Abstract: A system for classifying a transaction as fraudulent includes a training component and a scoring component. The training component acts on historical data and also includes a multi-dimensional risk table component comprising one or more multidimensional risk tables each of which approximates an initial risk value for a substantially empty cell in a risk table based upon risk values in cells related to the substantially empty cell. The scoring component produces a score, based in part, on the risk tables associated with groupings of variables having values determined by the training component. The scoring component includes a statistical model that produces an output and wherein the transaction is classified as fraudulent when the output is above a selected threshold value.
    Type: Application
    Filed: June 27, 2008
    Publication date: December 31, 2009
    Inventors: Vesselin Diev, Shailesh Kumar, Scott M. Zoldi
  • Publication number: 20090222308
    Abstract: A computerized method includes analyzing data associated with a credit line during an origination stage for predictive variables for use in a model for first party fraud, and flagging an account during the origination stage when at least one or more predictive origination stage variables cause a model score to exceed a pre-defined fraud likelihood threshold. The computerized method also includes analyzing data associated with one or more previously flagged, post-booked stage credit lines for data elements or transactions to be used as variables in a model to predictive of first party fraud at the customer-level or in one or more of the post-booked stage credit lines.
    Type: Application
    Filed: March 3, 2009
    Publication date: September 3, 2009
    Inventors: Scott M. Zoldi, Derek Malcolm Dempsey, Maria Edna Perez Derderian, Jacob Spoelstra
  • Publication number: 20090222243
    Abstract: A computer-implemented method includes receiving a new data record associated with a transaction, and generating, using an adaptive model executed by the computer, a score to represent a likelihood that the transaction is associated with fraud. The adaptive model employs feedback from one or more external data sources, the feedback containing information about one or more previous data records associated with fraud and non-fraud by at least one of the one or more external data sources. Further, the adaptive model uses the information about the one or more previous data records as input variables to update scoring parameters used to generate the score for the new data record.
    Type: Application
    Filed: February 29, 2008
    Publication date: September 3, 2009
    Inventors: Scott M. Zoldi, Larry Peranich, Jehangir Athwal, Uwe Mayer, Sajama