User's Guide
Table Of Contents
- Payflow Fraud Protection Services User’s Guide
- Preface
- Overview
- How Fraud Protection Services Protect You
- Configuring the Fraud Protection Services Filters
- Assessing Transactions that Triggered Filters
- Activating and Configuring the Buyer Authentication Service
- Performing Buyer Authentication Transactions Using the SDK
- Testing the Buyer Authentication Service
- Buyer Authentication Transaction Overview
- Buyer Authentication Terminology
- Buyer Authentication Server URLs
- Detailed Buyer Authentication Transaction Flow
- Call 1: Verify that the cardholder is enrolled in the 3-D Secure program
- Call 2: POST the authentication request to and redirect the customer’s browser to the ACS URL
- Call 3: Validate the PARES authentication data returned by the ACS server
- Call 4: Submit the intended transaction request to the Payflow server
- Example Buyer Authentication Transactions
- Buyer Authentication Transaction Parameters and Return Values
- ECI Values
- Logging Transaction Information
- Screening Transactions Using the Payflow SDK
- Downloading the Payflow SDK (Including APIs and API Documentation)
- Transaction Data Required by Filters
- Transaction Parameters Unique to the Filters
- Existing Payflow Parameters Used by the Filters
- Response Strings for Transactions that Trigger Filters
- Accepting or Rejecting Transactions That Trigger Filters
- Logging Transaction Information
- Responses to Credit Card Transaction Requests
- Fraud Filter Reference
- Testing the Transaction Security Filters
- Good and Bad Lists
- AVS Failure Filter
- BIN Risk List Match Filter
- Country Risk List Match Filter
- Email Service Provider Risk List Match Filter
- Geo-location Failure Filter
- International IP Address Filter
- International Shipping/Billing Address Filter
- IP Address Match Filter
- Shipping/Billing Mismatch Filter
- Total Item Ceiling Filter
- Total Purchase Price Ceiling Filter
- Total Purchase Price Floor Filter
- USPS Address Validation Failure Filter
- ZIP Risk List Match Filter
- Deactivating Fraud Protection Services
- Index
Fraud Protection Services User’s Guide 21
4
Assessing Transactions that
Triggered Filters
As part of the task of minimizing the risk of fraud, you review each transaction that triggered a
filter. You decide, based on the transaction’s risk profile, whether to accept or reject the
transaction. This chapter describes how to review transactions that triggered filters, and
provides guidance on deciding on risk.
NOTE: The Fraud Protection Services package (Basic or Advanced) to which you subscribe
determines the number of filters that screen your transactions. Basic subscribers have
access to a subset of the filters discussed in this chapter. Advanced subscribers have
full access. See “Filters Included with the Fraud Protection Services” on page 75 for
complete lists of Basic and Advanced filters.
In This Chapter
“Reviewing Suspicious Transactions” on page 21
“Fine-tuning Filter Settings—Using the Filter Scorecard” on page 25
“Re-running Transactions That Were Not Screened” on page 26
Reviewing Suspicious Transactions
Transactions that trigger filters might or might not represent attempted fraud. It is your
responsibility to analyze the transaction data and then to decide whether to accept or reject the
transaction. Accepting a transaction requires no further action. To reject a transaction, a
separate void of the transaction is required.
The first step in reviewing filtered transactions is to list the transactions.
1. Click Reports > Fraud Protection > Fraud Transactions
The Fraud Transactions Report page appears.