Mastercard Incorporated
COMPROMISED DATA SOURCE DETECTOR AND METHOD

Last updated:

Abstract:

A compromise detection computing device is configured to receive transaction data associated with a set of transactions performed at a plurality of merchants, each transaction conducted using a payment device, identify a first merchant, and generate a list of every payment device that was used to conduct a transaction at the first merchant. The compromise detection computing device is further configured to monitor subsequent transaction activity associated with each payment device on the list, and generate a fraud proxy score for each payment device based upon the activity. The compromise detection computing device is further configured to access fraud report records associated with any payment device on the list, generate an implication score for the first merchant based upon the fraud proxy score and the fraud report records, and, when the first implication score meets a first criteria, automatically transmit an alert message to a receiving party.

Status:
Application
Type:

Utility

Filling date:

23 May 2022

Issue date:

8 Sep 2022