one
REAL-TIME UPDATING OF A SECURITY MODEL
Last updated:
Abstract:
In some implementations, a device may receive exchange information associated with an exchange initiated by a medium that indicates a first location associated with the exchange and may enable the exchange to be completed. The device may transmit, to the user device, an indication of the exchange and a request to indicate whether the exchange is fraudulent. The device may receive, from the user device, a response indicating whether the exchange is fraudulent that indicates a second location associated with the user device. The device may determine whether the response is valid based on a comparison between the first location and the second location. The device may determine whether the exchange is fraudulent based on the response and determining whether the response is valid. The device may train the model using the exchange information and an indication of whether the exchange is fraudulent as an input to the model.
Utility
4 Jan 2021
7 Jul 2022