one
SYSTEMS AND METHODS FOR MANAGING FRAUDULENT OPERATIONS IN A PLURALITY OF COMPUTING DEVICES
Last updated:
Abstract:
In some embodiments, a method includes receiving operation data about operations performed by computing devices managed by an entity. The operation data is stored in respective data entries of a log data storage on a server managed by an authorizing entity. A set of agents are identified from the entity associated with fraudulent operations in entries of the log data storage having positive fraud indications. A number of instances for each identified agent in the set associated with fraudulent operations are determined. A score is assigned to each agent in the set based on the number of instances that each agent was associated with fraudulent operations. An alert to an administering computing device associated with the entity is generated when the assigned score of at least one agent is greater than a predefined threshold.
Utility
31 Jan 2020
5 Aug 2021