Systems and methods for monitoring and detecting fraudulent uses of business applications

A systems and methods are described detect fraud in existing logs of raw data. There can be several disparate logs, each including data of disparate data types and generated by different and possibly unrelated software enterprise applications. The fraud management system aggregates and organizes the...

Full description

Saved in:
Bibliographic Details
Main Authors KRISHNA BAGEPALLI C, WALSH JOSEPH, POSNIAK ROBERT, BAMMI JWAHAR R
Format Patent
LanguageEnglish
Published 05.05.2015
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:A systems and methods are described detect fraud in existing logs of raw data. There can be several disparate logs, each including data of disparate data types and generated by different and possibly unrelated software enterprise applications. The fraud management system aggregates and organizes the raw log data, archives the data in a manner that facilitates efficient access and processing of the data, allows for investigation of potentially fraudulent usage scenarios, and uses the results of the investigation to identify patterns of data that correspond to correspond to high risk usage scenarios and/or process steps. In subsequent processing, archived data can be compared against the identified patterns corresponding to high risk usage scenarios to detect matches, and the invention thereby automatically detects high risk usage scenarios and issues appropriate alerts and reports.
Bibliography:Application Number: US20060435159