Paygilant
  • SOLUTION
  • INDUSTRIES
    • Financial Institutions
    • Challenger Banks
    • Retail
    • Digital Wallets
  • USE CASE
    • Account Takeover
    • Transaction Fraud
    • New Account Fraud
  • ABOUT
    • About Paygilant
    • Leadership
    • Partners
    • News
    • Contact us
  • RESOURCES
    • Data Sheets
    • Infographics
    • White Papers
    • Videos
    • Webinars
    • Glossary
  • BLOG
  • Seeing is Believing
Select Page

What 2020 Taught Us About Digital Banking?

Dec 10, 2020 | Infographics

CATEGORIES

  • CMA
  • P2P
  • eWallet
  • Mobile Pay
  • Mobile Fraud
  • Behavioral Biometrics

Recent Posts

  • Sign-Up Bonus Abuse

    Sign-Up Bonus Abuse

    December 8, 2020
  • Digital Fraud in Latin America: Q & A with Ziv Cohen, Paygilant’s CEO

    Digital Fraud in Latin America: Q & A with Ziv Cohen, Paygilant’s CEO

    November 25, 2020
  • Killer Mike, Hip-Hop and Digital Banks

    Killer Mike, Hip-Hop and Digital Banks

    November 3, 2020
  • Challenger/Neo Banks: Like vs. Trust

    Challenger/Neo Banks: Like vs. Trust

    October 22, 2020
  • The Correlation Between Cash and COVID–19

    The Correlation Between Cash and COVID–19

    October 22, 2020

Stay Updated

OUR BLOG

  • Twitter
© Paygilant 2021 | Developed by Magma
This website uses cookies to ensure you get the best experience on our website. For more information, see our Cookie Policy.   Accept Reject
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.

SAVE & ACCEPT
<!-- End of Meetings Embed Script —>

Device Attributes

Various attributes observed on the device can contribute to the detection of fraudulent behavior and to the derivation of a device ID. Device model, screen, memory, UUID, OS, IP, geolocation, app permissions, and more are observed. Geolocation is probably the best example for a device attribute used for detecting fraud - if a transaction is attempted from Moscow a short while after the preceding transaction was carried out in New York, then that is a strong indicator of fraud. Restricted app permissions is another indicator that the user might be hiding something. Another example is app permissions that are restricted by the user – that, in combination with other things, night suggest that the user might be hiding something.

Transaction Data

Paygilant employs propriety transaction behavioral maps. The Behavioral Maps represent the purchasing patterns/behavior of a specific customer and her nearest neighbors and are created using Paygilant's proprietary machine learning algorithms. The behavioral maps typically comprise a large amount of information but must be compact 9 enough since they are securely transmitted to the mobile device. To achieve this Paygilant utilizes its depth of field (DOF) approach from digital photography to compress the information so that complex calculations that do not require work intensive CPU and memory. A Behavioral Map shows a clear, high resolution picture of the different risk zones and is a key factor in determining the risk of a specific transaction and has the following key characteristics: - User specific: each map is unique, calculated and maintained on a per user basis, therefore representing a transaction risk level for each customer’s transaction. - Lightweight: Resolution variations enable maintaining only the necessary data, reducing the map's weight to a bare minimum. - Dynamic: As the purchase behavior changes, the map will be modified.

Device DNA

Various attributes observed on the device can contribute to the detection of fraudulent behavior and to the derivation of a device ID. Device model, screen, memory, UUID, OS, IP, geolocation, app permissions, and more are observed. Geolocation is probably the best example for a device attribute used for detecting fraud - if a transaction is attempted from Moscow a short while after the preceding transaction was carried out in New York, then that is a strong indicator of fraud. Restricted app permissions is another indicator that the user might be hiding something. Another example is app permissions that are restricted by the user – that, in combination with other things, night suggest that the user might be hiding something.

Bio Markers

Paygilant observes bio markers to passively identify the user behind the transaction. Common bio markers Paygilant observes include touch time, time between touches, size of touch inputs, finger velocity, scrolling pace and drag length, typing biometrics, and more. Paygilant’s robust bio markers are just one of the several intelligence sets that make up the broader solution and is designed to augment the fraud/no-fraud decision that precedes any step-up authentication request.

App Interactions

Paygilant looks at how the user interacts with the mobile application to determine if the interactions are consistent with a legitimate user. For example, if a user navigates directly to a high-ticket item and immediately proceeds to check-out, then that suggests something fraudulent might be happening. If a user inputs his name and address on the payment form in a manner that is not consistent with how normal users would do it (i.e. slower than expected because typing-in unfamiliar strings), then that provides another clue that something fraudulent might be happening.

User Data

Intelligent, privacy preserving analysis of user data on the mobile device provides valuable insights into fraudulent activities. User data analysis is especially helpful in hard-to-analyze scenarios like new account origination, where there is no established history for the user/account. Some examples for how device data can be used include comparing user accounts on the device with the payment cardholder identity, or the identity disclosed on a new account registration form – a mismatch provides a strong indicator for fraud. No media on the device, empty contacts list, and sparse call logs are also examples of fraud indicators that can be collected from user data on the device. 

[contact-form-7 id="1390" title="Contact+PDF_copy"]
[contact-form-7 id="1397" title="Contact_copy"]
[contact-form-7 id="1397" title="Contact_copy"]