Referral Restrictions Example:
- Scenario: Ensuring that the country of the IP address matches the country associated with the source credit card number. The system can be configured to check if the country of the IP address used for the transaction is consistent with the country of the issuing bank of the source credit card. This helps in identifying potential fraud where the transaction is being initiated from a different country than the card issuer.
- Example: A transaction where the source credit card is issued by a bank in the United States and the IP address is also located in the United States would pass the referral filter. However, if the IP address is located in another country, such as Russia, this discrepancy might trigger an alert for further review.
This approach helps to ensure that the geographical location of the transaction aligns with the expected location based on the card issuer, thus adding an additional layer of security.
Velocity Restrictions Example:
The system offers an advanced mechanism for detecting and preventing fraudulent activities by allowing for the configuration of velocity restrictions with associated fraud scores. This enables a nuanced approach to transaction monitoring and decision-making based on the cumulative risk score. Here’s how it works:
Velocity Restrictions:
- Definition: Velocity restrictions monitor the rate at which certain attributes of transactions change. In this context, it tracks how frequently the same destination credit card is used with different source credit cards from various countries.
- Daily Monitoring: The system checks for high-frequency usage of the same destination credit card with source credit cards from different countries within a single day.
- Example: If the same destination credit card ending in “5678” is used with source credit cards from the USA, Germany, and Brazil all in one day, it indicates potential fraud. This might be assigned a high fraud score due to the suspicious nature of rapid international transactions.
- Monthly Monitoring: The system also monitors the usage over a month to identify patterns that are spread out over time.
- Example: If the same destination credit card ending in “5678” is used with source credit cards from the USA, Germany, Brazil, and Japan over a month, it is less likely to be flagged as fraudulent. This scenario might be assigned a lower fraud score.
Fraud Score Configuration:
- Fraud Score Assignment: For each velocity restriction, a specific fraud score can be assigned based on the perceived risk. For example:
- High-frequency usage in a single day might be assigned a fraud score of 80.
- Usage spread over a month might be assigned a fraud score of 20.
- Cumulative Score Calculation: The system calculates the sum of fraud scores from multiple velocity restrictions and other risk factors for a given transaction. This cumulative score helps in assessing the overall risk associated with the transaction.
Transaction Decision-Making:
- Threshold Setting: The system allows for setting a threshold for the cumulative fraud score. Transactions exceeding this threshold can be automatically declined, while those below can proceed.
- Example: If the threshold is set at 100, and a transaction accumulates a fraud score of 120 from various checks (e.g., high daily usage frequency combined with other risk factors), the transaction would be declined.
- Automated Decline: Based on the cumulative fraud score, the system can automatically decline high-risk transactions, preventing potential fraud before it occurs.
- Example: A transaction involving the destination credit card ending in “5678” with source cards from multiple countries within a day (fraud score of 80) combined with other suspicious activities (additional fraud scores totaling 50) would result in a cumulative score of 130, leading to an automatic decline.
By incorporating fraud scores and cumulative score thresholds into velocity restrictions, the system ensures a robust, dynamic approach to fraud detection and prevention. This method allows for fine-tuning and adaptability, effectively balancing security and customer experience by declining only the transactions that pose significant risks.