Using Credit/Debit Card Dynamic Soft Descriptor as Fraud Prevention System for Merchant

نویسندگان

  • Roy Laurens
  • Cliff Changchun Zou
چکیده

This paper presents a novel method of using Dynamic Soft Descriptor as a fraud prevention method for Merchant (as opposed to card Issuer) in a credit/debit card transaction under Card Not Present (CNP) environment, such as online transactions. A unique identifier is embedded into the transaction descriptor, which will instantly appear in the cardholder’s credit/debit card online statement. By checking his online statement, or calling his credit/debit card bank, a cardholder can obtain this identifier; and then provides the Merchant with this identifier as a proof of access to the statement. As the identifier is propagated using card association’s back-end system and as only legitimate cardholder can access the card’s statement, it is very unlikely that a fraudster can obtain this identifier information. Unlike other fraud prevention proposals, this proposed method is readily available and can be used right now by Merchant without the need for explicit support from card Issuer. Furthermore, it can be used starting with the very first transaction. So, it is more attractive than ordinary fraud detection method that requires significant amount of transactions. It can be readily deployed under the current card processing infrastructure, and we will show real life result at an e-commerce Merchant. Keywords—Electronic Commerce; credit card fraud; Card Not Present; dynamic soft descriptor; fraud prevention; chargeback

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fraud Detection in Credit Card by Clustering Approach

Fraud is an unauthorized activity taking place in electronic payments systems, but these are treated as illegal activities. Fraud detection methods are continuously developed to defend criminals in adapting to their strategies. Fraud can be identified quickly and easily through fraud detection techniques. In this paper, clustering approach is used for credit card fraud detection. Data is genera...

متن کامل

Credit Card Fraud Prevention: a Successful Retail Strategy

Substantial losses from credit card fraud are forcing retail industry executives to reevaluate the effectiveness of their ability to prevent this type of crime. In 1992, management at Tops Appliance City Inc. decided to reassess its own fraud prevention program in an attempt to prevent future losses. An analysis of the Tops' problem pointed out the need to differentiate legitimate from illegiti...

متن کامل

A Review: Secure Payment System for Electronic Transaction

In this paper we review a secure electronic payment system for Internet transaction. The electronic payment system is to be secure for Internet transaction participants such as Payment gateway server, Bank sever and Merchant server. The security architecture of the system is designed by using Many Security Protocols and techniques, which eliminates the fraud that occurs today with stolen credit...

متن کامل

The Prevention of Plastic and Cheque Fraud: a Briefing Paper

Inevitably, there is a tension between the provision of services in a market society and the management of crime risks in both public and private sectors. As central media of exchange in global networks, credit, debit and charge cards can never avoid the risk of crime entirely: the primary goals of corporations are profit maximisation rather than maximum crime reduction. There will always be so...

متن کامل

Tying in Two-Sided Markets and the Honor All Cards Rule∗

Payment card associations offer both debit and credit cards and, until recently, engaged in a tie-in on the merchant side through the so-called honor-all-cards (HAC) rule. The HAC rule came under attack on the grounds that the credit and debit card markets are separate markets and that the associations lever their market power in the “credit card market” to exclude on-line debit cards and there...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016