Systems and methods for monitoring and detecting fraudulent uses of business applications
A systems and methods are described detect fraud in existing logs of raw data. There can be several disparate logs, each including data of disparate data types and generated by different and possibly unrelated software enterprise applications. The fraud management system aggregates and organizes the...
Saved in:
Main Authors | , , , |
---|---|
Format | Patent |
Language | English |
Published |
22.05.2018
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | A systems and methods are described detect fraud in existing logs of raw data. There can be several disparate logs, each including data of disparate data types and generated by different and possibly unrelated software enterprise applications. The fraud management system aggregates and organizes the raw log data, extends the raw data with reference data, archives the data in a manner that facilitates efficient access and processing of the data, allows for investigation of potentially fraudulent usage scenarios, and uses the results of the investigation to identify patterns of data that correspond to correspond to high risk usage scenarios and/or process steps. In subsequent processing, archived data can be compared against the identified patterns corresponding to high risk usage scenarios to detect matches, and the invention thereby automatically detects high risk usage scenarios and issues appropriate alerts and reports. |
---|---|
AbstractList | A systems and methods are described detect fraud in existing logs of raw data. There can be several disparate logs, each including data of disparate data types and generated by different and possibly unrelated software enterprise applications. The fraud management system aggregates and organizes the raw log data, extends the raw data with reference data, archives the data in a manner that facilitates efficient access and processing of the data, allows for investigation of potentially fraudulent usage scenarios, and uses the results of the investigation to identify patterns of data that correspond to correspond to high risk usage scenarios and/or process steps. In subsequent processing, archived data can be compared against the identified patterns corresponding to high risk usage scenarios to detect matches, and the invention thereby automatically detects high risk usage scenarios and issues appropriate alerts and reports. |
Author | Posniak, Robert Krishna, Bagepalli C Bammi, Jwahar R Walsh, Joseph |
Author_xml | – fullname: Posniak, Robert – fullname: Bammi, Jwahar R – fullname: Krishna, Bagepalli C – fullname: Walsh, Joseph |
BookMark | eNqNjDsOwjAQBV1Awe8OewEkIAVJCwLRBwqqyNhrsJTsWt51we35iANQPY1m9KZmREw4Mdf2KYqDgCUPA-qDvUDgDANTVM6R7l_lUdHph0K2xZceSaEICnCAW5FIKO-TlProrEYmmZtxsL3g4rczA8fDeX9aYuIOJVmHhNpd2qbZ1qtqvdtUfyQvEL89Eg |
ContentType | Patent |
DBID | EVB |
DatabaseName | esp@cenet |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: EVB name: esp@cenet url: http://worldwide.espacenet.com/singleLineSearch?locale=en_EP sourceTypes: Open Access Repository |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Medicine Chemistry Sciences Physics |
ExternalDocumentID | US9978031B2 |
GroupedDBID | EVB |
ID | FETCH-epo_espacenet_US9978031B23 |
IEDL.DBID | EVB |
IngestDate | Fri Jul 19 16:33:02 EDT 2024 |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-epo_espacenet_US9978031B23 |
Notes | Application Number: US201314082753 |
OpenAccessLink | https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20180522&DB=EPODOC&CC=US&NR=9978031B2 |
ParticipantIDs | epo_espacenet_US9978031B2 |
PublicationCentury | 2000 |
PublicationDate | 20180522 |
PublicationDateYYYYMMDD | 2018-05-22 |
PublicationDate_xml | – month: 05 year: 2018 text: 20180522 day: 22 |
PublicationDecade | 2010 |
PublicationYear | 2018 |
RelatedCompanies | FIS FINANCIAL COMPLIANCE SOLUTIONS, LLC |
RelatedCompanies_xml | – name: FIS FINANCIAL COMPLIANCE SOLUTIONS, LLC |
Score | 3.147923 |
Snippet | A systems and methods are described detect fraud in existing logs of raw data. There can be several disparate logs, each including data of disparate data types... |
SourceID | epo |
SourceType | Open Access Repository |
SubjectTerms | CALCULATING COMPUTING COUNTING DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES ELECTRIC DIGITAL DATA PROCESSING PHYSICS SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR |
Title | Systems and methods for monitoring and detecting fraudulent uses of business applications |
URI | https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20180522&DB=EPODOC&locale=&CC=US&NR=9978031B2 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1La8MwDBale962bGPdCx9GbmGLm7TZIQzyogz6YG1GdyqJY0MPTUqTsL8_2Uu7XrajbRC24JNky_oE8Jhi0CFMZhsJGn_DsoWJkMJAzkF00R4X6KJkvfNw1BvE1tvcnrdgua2FUTyhX4ocERHFEO-Vstfr30esQP2tLJ_SJU4Vr9HMDfTmdmxKgn6qB54bTsbB2Nd9342n-ujdfZFMO13TQ2t9gFF0X4Ih_PBkUcp636NEZ3A4QWF5dQ4tnmtw4m8br2lwPGzy3RocqQ-arMTJBoTlBXw2LOMkyTPy0wG6JBh7kpXCp3yoU0sZlwkCORKbpM5q6V9IXfKSFII0zSdRyF4G-xJIFM78gYG7Xew0s4inu3N1r6CdFzm_BmKh039mGRV9K8PrG00yxm1GHWE5kkon6UDnTzE3_6zdwqlUscydU3oH7WpT83t0yVX6oJT5DTGPkgI |
link.rule.ids | 230,309,783,888,25576,76876 |
linkProvider | European Patent Office |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3dT8IwEL8Q_MA3RQ342QezN6IrG8yHxWQbZCobRMDgE9nWNuHBQdgW_32vdSAv-tg2ubSX_O6uvd7vAO5iDDqEnpitCI1_yzCFjpDCQM5CdNEOF-iiZL1zEHb8qfEyM2cVWGxqYRRP6JciR0REJYj3XNnr1e8jlqf-Vmb38QKnlk_9ie1p5e1YlwT9VPMcuzcaekNXc117OtbCN_tRMu20dQet9R5G2F0Jht67I4tSVrsepX8M-yMUluYnUOFpHWrupvFaHQ6DMt9dhwP1QTPJcLIEYXYKHyXLOIlSRn46QGcEY0_yqfApH-rUEuMyQSBHYh0VrJD-hRQZz8hSkLL5JArZyWCfAen3Jq7fwt3Ot5qZT8fbc7XPoZouU94AYqDTf0gYFV2D4fWNRizhZkItYViSSidqQvNPMRf_rN1CzZ8Eg_ngOXy9hCOpbplHp_QKqvm64NfonvP4Rin2GzcjlPU |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Apatent&rft.title=Systems+and+methods+for+monitoring+and+detecting+fraudulent+uses+of+business+applications&rft.inventor=Posniak%2C+Robert&rft.inventor=Bammi%2C+Jwahar+R&rft.inventor=Krishna%2C+Bagepalli+C&rft.inventor=Walsh%2C+Joseph&rft.date=2018-05-22&rft.externalDBID=B2&rft.externalDocID=US9978031B2 |