US 12,265,967 B2
Systems and methods for detection of fraud attacks using merchants to test payment accounts
Mario Segal, Stamford, CT (US); Muthu Sundar Somasundaram, Elmsford, NY (US); Denis Tchaouchev, New York, NY (US); and Ziying Li, Stamford, CT (US)
Assigned to MASTERCARD INTERNATIONAL INCORPORATED, Purchase, NY (US)
Filed by MASTERCARD INTERNATIONAL INCORPORATED, Purchase, NY (US)
Filed on Aug. 25, 2023, as Appl. No. 18/455,819.
Application 18/455,819 is a continuation of application No. 16/994,188, filed on Aug. 14, 2020, granted, now 11,775,974.
Prior Publication US 2023/0401584 A1, Dec. 14, 2023
This patent is subject to a terminal disclaimer.
Int. Cl. G06Q 20/40 (2012.01); G06Q 20/38 (2012.01)
CPC G06Q 20/4016 (2013.01) [G06Q 20/3825 (2013.01); G06Q 20/409 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computing system for detecting compromised merchants in a payment card network, the computing system comprising:
at least one processor in communication with at least one memory; and
the at least one memory storing instructions, that when executed by the at least one processor, cause the at least one processor to perform the steps of:
storing historical key merchant variable values for each of a plurality of merchants in the at least one memory;
receiving current transaction data associated with a plurality of current transactions from a merchant of the plurality of merchants, wherein the plurality of current transactions comprises test transactions of payment accounts;
determining, based upon the current transaction data, current key merchant variable values for the merchant;
identifying, in real-time, abnormalities between the current key merchant variable values and the historical key merchant variable values for the merchant;
determining, based upon the identified abnormalities, that the merchant is a compromised merchant and the test transactions processed at the compromised merchant are fraudulent and associated with a security breach;
identifying a compromised merchant computing system associated with the compromised merchant;
identifying, based on the identified compromised merchant computing system, at least one of code fixes and security patches tailored to address the security breach associated with the fraudulent test transactions; and
deploying the at least one of code fixes and security patches to the compromised merchant computing system to address the security breach associated with the fraudulent test transactions.