User's Guide
Table Of Contents
- Payflow Fraud Protection Services User’s Guide
- Preface
- Overview
- How Fraud Protection Services Protect You
- Configuring the Fraud Protection Services Filters
- Assessing Transactions that Triggered Filters
- Activating and Configuring the Buyer Authentication Service
- Performing Buyer Authentication Transactions Using the SDK
- Testing the Buyer Authentication Service
- Buyer Authentication Transaction Overview
- Buyer Authentication Terminology
- Buyer Authentication Server URLs
- Detailed Buyer Authentication Transaction Flow
- Call 1: Verify that the cardholder is enrolled in the 3-D Secure program
- Call 2: POST the authentication request to and redirect the customer’s browser to the ACS URL
- Call 3: Validate the PARES authentication data returned by the ACS server
- Call 4: Submit the intended transaction request to the Payflow server
- Example Buyer Authentication Transactions
- Buyer Authentication Transaction Parameters and Return Values
- ECI Values
- Logging Transaction Information
- Screening Transactions Using the Payflow SDK
- Downloading the Payflow SDK (Including APIs and API Documentation)
- Transaction Data Required by Filters
- Transaction Parameters Unique to the Filters
- Existing Payflow Parameters Used by the Filters
- Response Strings for Transactions that Trigger Filters
- Accepting or Rejecting Transactions That Trigger Filters
- Logging Transaction Information
- Responses to Credit Card Transaction Requests
- Fraud Filter Reference
- Testing the Transaction Security Filters
- Good and Bad Lists
- AVS Failure Filter
- BIN Risk List Match Filter
- Country Risk List Match Filter
- Email Service Provider Risk List Match Filter
- Geo-location Failure Filter
- International IP Address Filter
- International Shipping/Billing Address Filter
- IP Address Match Filter
- Shipping/Billing Mismatch Filter
- Total Item Ceiling Filter
- Total Purchase Price Ceiling Filter
- Total Purchase Price Floor Filter
- USPS Address Validation Failure Filter
- ZIP Risk List Match Filter
- Deactivating Fraud Protection Services
- Index
Fraud Protection Services User’s Guide 87
Fraud Filter Reference
High-risk Address Filters
A
addresses. IP (Internet protocol) addresses are unique identifiers for computers that can often
be mapped to a specific city or area code.
The specified action is taken whenever the IP address, shipping address, and billing address do
not fall within a 100 mile radius. If you provide only one physical address (billing or shipping
address), then the filter triggers when the distance between the IP address and the address that
you provided is greater than 100 miles.
NOTE: Gift purchases shipped far from the billing address will trigger the filter.
Every effort has been made to ensure that IP address mapping is accurate and
up-to-date. Given the nature of the Internet’s architecture, however, some Internet
Service Providers use data centers far from the customers being serviced. In addition, as
described in the IP Address Risk List Match filter, IP addresses can change
dynamically. For these reasons, treat this filter as an indicator of suspicious activity, not
as a definitive result.
How does the filter protect me?
Comparing the geographical location associated with the IP address to the submitted shipping
and billing information can be an effective method for identifying identity spoofing.
Fraudsters often pretend to live in a location, but live and shop from another.
All three elements should match one realistic customer profile. For example, a customer with a
billing address in New York would typically shop from a computer in New York, and request
delivery to a New York address. While there may be some minor inconsistencies in the overall
profile, it should generally fit together. Remember, however, that gift purchases sent to another
part of the country will not fit this profile.
NOTE: You should be especially wary when a customer has an international IP address but
uses U.S. billing and shipping information.
IP Address Velocity Filter
What does the filter do?
The IP Address Velocity filter triggers when five or more transactions within three days (72
hours) originate from any individual IP address.
IMPORTANT:The specified action is performed on only the transaction that triggered the
filter and not on the previous four transactions. You must manually review and
act upon those transactions. Generate a Transaction Details report and click
the IP Address Velocity link to view the transactions.
IP addresses do not always identify a unique computer or user. For example,
an Internet Service Provider (ISP) may use a limited number of IP addresses
for all of its users. To protect against triggering the filter in this case, set up an
IP Address Velocity Ignore List (described in the online help).
What is Velocity?
In the risk management industry, an event’s velocity is a measure of its frequency of
occurrence during a defined time period. Unusually high velocity is can be associated with a