作者: Pieter Janssens , Hans De Jong
DOI:
关键词:
摘要: Articles and methods for transaction irregularity detection are disclosed. In one example, the article discloses: a memory including record of last-reported security-device with security-device, counter value associated transaction; previous device identifier; identifier current currently-reported back-end tagging fraud if differs from by other than an increment. method process based on article.