Neural network systems and methods for generating distributed representations of electronic transaction information

ABSTRACT

Systems and methods are provided for authorizing an electronic transaction. In one implementation at least one processor is programmed to receive electronic transaction data and historical transaction data, the electronic transaction data including an entity identifier component and an amount component of an electronic transaction; determine, based on the entity identifier component and the amount component, a location of the electronic transaction in a space of a distributed representation space, the distributed representation space comprising a mapping of electronic transaction components in a high-order space; determine locations of the historical transaction data in the distributed representation space; determine a decision boundary in the distributed representation space based on the locations of the historical transaction data; and authorize the electronic transaction based on the location of the electronic transaction being within the decision boundary.

TECHNICAL FIELD

The disclosed embodiments concern the generation of distributedrepresentations of electronic transaction information using machinelearning systems. More specifically, the disclosed embodiments concernneural network systems that use machine learning for generatingdistributed representations of electronic transaction information, andauthorizing electronic transactions electronic transaction authorizationusing such distributed representations.

BACKGROUND

Electronic data transfers often fall victim to fraud due to identitytheft, data breaches, or otherwise insecure systems. Current methods offraud detection depend on simple models and rules to identifypotentially fraudulent electronic transactions. For example, suchconventional methods may rely on whether a physical token associatedwith electronic data is physically present at a certain geographictransaction, a history of fraudulent electronic transactions associatedwith certain electronic data, or a classification associated withinsecure electronic data transfers. But these simple models areimperfect, often missing actual fraud while flagging innocuouselectronic transactions as fraudulent. Fraudulent electronictransactions often result in insecure data management and transfersystems as well as decreased computer system performance due to excessprocessing load due to the fraudulent electronic transactions, andadditional corrective actions taken to remedy the fraud.

Accordingly, improved systems are needed for identifying fraudulentelectronic data transactions and controlling the authorization of suchelectronic transactions, to reduce computer system loads, improve systemefficiency, and enhance electronic data security.

SUMMARY

The disclosed embodiments may enable generation of a distributedrepresentation of electronic transaction data. For example, a generationsystem may be configured to learn a distributed representation ofelectronic transaction component values from received electronictransaction data. Authorization systems may be configured to use thisdistributed representation of electronic transaction component values toapprove or deny further electronic transactions.

The disclosed embodiments provide a specific way to generate distributedrepresentations of electronic transactions using existing, unlabeledelectronic transaction data. These distributed representations may beused to authorize electronic transactions, reducing the cost offraudulent electronic transactions. These systems and methods maybenefit from improved performance over simple, conventional models, andmay allow the beneficial use of immense amounts of currently unused,unlabeled electronic transaction information. Therefore the generationand use of these distributed representations represents an innovative,technical improvement to electronic transaction authorizationinfrastructure that is not routine or conventional in the field ofelectronic transaction authorization.

The disclosed embodiments may further include, for example, acomputer-implemented method for generating a distributed representationof electronic transaction data. This computer-implemented method maycomprise steps. The steps may include receiving electronic transactiondata. The electronic transaction data may include components of anelectronic transaction. The components may include a first entityidentifier and a second entity identifier. The steps may further includegenerating an output distributed representation by iteratively updatinga distributed representation. The updating may use the electronictransaction data. The distributed representation may include rowscorresponding to first entity identifiers and rows corresponding tosecond entity identifiers. An iteration of the updating may compriseoperations. These operations may include generating a training sampleand an embedding vector using the components and the distributedrepresentation. These operations may further include determining, by aneural network, a predicted category from the embedding vector. Theoperations may additionally include updating the distributedrepresentation using the predicted category and the training sample. Thesteps of the computer-implemented method may further include outputtingthe output distributed representation to determine authorization ofelectronic transactions.

In some aspects, one of the components may be selected as the trainingsample. A length of the embedding vector may equal a length of the rowsof the distributed representation. Generating the embedding vector maycomprise averaging rows of the distributed representation correspondingto the components.

In some aspects, updating the distributed representation may comprisecalculating an update vector representing the effect on a cost functionof changing the embedding vector, and updating the rows of thedistributed representation corresponding to the components using theupdate vector. A length of the update vector may equal a length of therows of the distributed representation. The update vector may contributeequally to the rows of the distributed representation corresponding tothe components.

In some aspects, the components may further include a continuousvariable, and generating the training sample and the at least oneembedding vector may comprise discretizing the continuous variable. Thecontinuous variable may be an electronic transaction time or anelectronic transaction amount. The components further include at leastone of electronic transaction day-of-week, day-of-month, andday-of-year.

In some aspects, the computer-implemented method may further comprisedetermining first entity identifier frequencies in the electronictransaction data. Generating the final distributed representation mayfurther include resampling the electronic transaction data based on thefirst entity identifier frequencies. The distributed representation mayinclude between 80 and 120 features, and the neural network may comprisea hidden layer including between 80 and 120 nodes.

In some aspects, the generating the output distributed representationmay further comprise aligning multiple distributed representations.Aligning multiple distributed representations may comprise steps. Thesteps may include identifying common rows in the distributedrepresentation and another distributed representation. The steps mayfurther include aligning the distributed representation and the otherdistributed representation using values of the common rows. The stepsmay also include combining the distributed representation and the otherdistributed representation to form the output distributedrepresentation. Aligning the distributed representation and the otherdistributed representation may comprise determining a transformationthat minimizes a function of the values of the common rows. Thedistributed representation and other distributed representation may becombined using this transformation. The other distributed representationmay be generated using other electronic transaction data. The electronictransaction data and the other electronic transaction data maycorrespond to at least one of different time periods, geographic areas,and second entity demographic groups. The common rows may correspond tofirst entity identifiers.

The disclosed embodiments may further include, for example, anauthorization server. The authorization server may include at least oneprocessor and at least one non-transitory computer readable medium. Thenon-transitory computer readable medium may contain instructions that,when executed by the at least one processor, cause the authorizationserver to perform operations. These operations may comprise receivingcomponents of an electronic transaction from a first system, thecomponents including a first entity identifier and a second entityidentifier. The operations may further comprise generating arepresentation of the electronic transaction using the components and adistributed representation of electronic transaction data. Theelectronic transaction data may include rows corresponding to thecomponents. The operations may include determining authorization of theelectronic transaction by applying a decision rule. The decision rulemay use the representation of the electronic transaction, andrepresentations of past electronic transactions associated with at leastone of the first entity identifier and the second entity identifier. Theoperations may include providing an authorization indication to thefirst system based on the determined authorization.

In some aspects, the first entity identifier may correspond to a firstentity associated with the first system. Applying the decision rule maycomprise determining whether a distance between the representation ofthe electronic transaction and a point dependent on the representationsof past electronic transactions exceeds a value. Generating therepresentation of the electronic transaction may comprise multiplesteps. The steps may include determining a first row of the distributedrepresentation of electronic transaction data corresponding to the firstentity identifier. The steps may also include determining a second rowof the distributed representation of electronic transaction datacorresponding to the second entity identifier. And the steps may includegenerating the representation of the electronic transaction as anaverage of at least the first row and the second row.

In some aspects, the components may further include a continuousvariable. Generating the representation of the electronic transactionmay further comprise discretizing the continuous variable. Thecomponents may further include at least one of a time of the electronictransaction, an amount of the electronic transaction, day of week, dayof month, and day of year. In some aspects, the decision rule mayadditionally use fraud criteria, the fraud criteria including at leastone of: a card not present indication, a first geographic locationassociated with the first entity identifier, a second geographiclocation associated with the second entity identifier, and apredetermining category corresponding to the first entity identifier.

The disclosed embodiments may further include, for example, anauthorization server comprising at least one processor and at least onenon-transitory computer readable medium. The non-transitory computerreadable medium may contain instructions. When executed by the at leastone processor, the instructions may cause the authorization server toperform operations. The operations may include receiving a distributedrepresentation of electronic transaction data generated using theabove-disclosed computer-implemented method. The operations may alsoinclude receiving components of an electronic transaction from a firstsystem, the components including a first entity identifier and a secondentity identifier. The components may further include generating arepresentation of the electronic transaction using the components andthe distributed representation: The operations may further includedetermining authorization of the electronic transaction by applying adecision rule. The decision rule may use the representation of theelectronic transaction, and representations of past electronictransactions associated with at least one of the first entity identifierand the second entity identifier. The operations may also includeproviding an authorization indication to the first system based on thedetermined authorization.

It is to be understood that both the foregoing general description andthe following detailed description are exemplary and explanatory onlyand are not restrictive of the disclosed embodiments, as claimed.

BRIEF DESCRIPTION OF THE DRAWINGS

The drawings are not necessarily to scale or exhaustive. Instead,emphasis is generally placed upon illustrating the principles of theinventions described herein. The accompanying drawings, which areincorporated in and constitute a part of this specification, illustrateseveral embodiments consistent with the disclosure and together with thedescription, serve to explain the principles of the disclosure. In thedrawings:

FIGS. 1A-1C depict three projections of a distributed representation ofelectronic transaction data.

FIG. 2 depicts a schematic illustrating an exemplary system forauthorizing electronic transactions.

FIG. 3 depicts a logical model of a non-transitory memory storingelectronic transaction data, a distributed representation of electronictransaction data, and neural network parameters.

FIG. 4 depicts a flowchart illustrating a process for generating adistributed representation of electronic transaction data.

FIG. 5A depicts a flowchart illustrating a process for updating adistributed representation of electronic transaction data.

FIG. 5B depicts details of input mapping and generation of inputvectors.

FIG. 5C depicts details of predicting an electronic transactioncomponent.

FIG. 6 depicts a flowchart illustrating a process for authorizingelectronic transactions.

FIG. 7A depicts a representation of an electronic transaction.

FIG. 7B depicts authorization of electronic transactions based on adecision rule and previous electronic transactions.

FIG. 8 depicts a flowchart illustrating a process for generating acombined distributed representation.

FIGS. 9A-9C depict three projections of distributed representationsillustrating an exemplary alignment of distributed representations.

FIG. 10 depicts a schematic of an exemplary computing device forperforming the envisioned systems and methods.

DETAILED DESCRIPTION

Reference will now be made in detail to the disclosed embodiments,examples of which are illustrated in the accompanying drawings. Whereverconvenient, the same reference numbers will be used throughout thedrawings to refer to the same or like parts.

As described in “A Neural Probabilistic Language Model,” by YoshuaBengio et al., hereby incorporated by reference in its entirety, adistributed representation may characterize a symbol using a set ofcontinuously valued features, mapping the symbol to a location in ahigh-order space. This approach scales well, allowing for convenientgeneralization to large numbers of symbols and reducing reliance onlabeled training data. Distributed representations may be generatedusing neural networks. As a non-limiting example, a distributedrepresentation may be included as the input layer in a neural networkthat also includes at least one hidden layer and an output layer.Training of the neural network may include generation of outputs fromtraining data according to parameters of the neural network. Theseparameters may include the values of the distributed representation. Theoutputs may be used to generate updates of the parameters. This trainingprocess may be repeated until the parameters demonstrate an acceptabledegree of convergence. As would be understood by one of skill in theart, various measures of convergence may be used, and the acceptabledegree of convergence may be application-specific. Upon completion ofthe training process, the distributed representation may map at leastsome of the symbols in the training set to locations in a higher-orderspace. This distributed representation of the symbols may then be usedfor authorizing subsequent electronic transactions.

As would be appreciated by one of skill in the art, the design andtraining of neural networks for particular applications is extremelyunpredictable. Apparently minor changes in neural networkcharacteristics (e.g., the topology of the neural network, theparameters used, the output function, or the update function) may resultin poor performance of the neural network. For example, using too manynodes in a hidden layer may cause overfitting of the training data. Suchoverfitting may result in a neural network that correctly predictsoutputs for the training data, but is unable to generalize to new data.Alternatively, using too few nodes in the training data may result in aneural network that simply generates poor predictions of outputs.Changes in the parameters or the output and update functions may alsoresult in poor performance. For example, the neural network may fail toconverge on a stable set of parameters, or may quickly converge onparameters resulting in poor predictions. Thus designing a neuralnetwork useful for a particular application is not straightforward.

FIGS. 1A-1C depict three projections of a distributed representation ofelectronic transaction data, consistent with disclosed embodiments. Insome embodiments, the distributed representation may be represented as amatrix with rows corresponding to symbols and columns corresponding tofeatures. In some aspects, the elements of the matrix may becontinuous-valued. Thus each symbol may be represented by a location inthe space defined by the features. In some embodiments, the electronictransaction data may include electronic transaction components, and thedistributed representation may include rows corresponding to theelectronic transaction components.

The disclosed distributed representation differs from convention datastructures that structurally distinguish between electronic transactioncomponents. For example, a relational database may include a row for anelectronic transaction, and different columns for entity identifiers(such as merchant identifiers or customer identifiers), day-of-week,etc. Each electronic transaction in such a relational database may bespecified by the value of merchant identifier in the merchant identifiercolumn, the value of the customer identifier in the customer identifiercolumn, the value of day-of-week in the day-of-week column. In contrast,as a non-limiting example, the distributed representation may include arow for each value of the merchant identifier, each value of thecustomer identifier, each day-of-week. As described below with regard toFIGS. 7A and 7B, electronic transactions may be represented, in someembodiments, as functions of these rows.

The distributed representations therefore include rows corresponding todifferent types of electronic transaction components. As a non-limitingexample, electronic transaction data may include components such as oneor more identifiers for a first entity such as a merchant, one or moreidentifiers for a second entity such as a customer, electronictransaction date (e.g., day-of-week, day-of-month, and/or day-of-year),electronic transaction time, electronic transaction amounts, and otherelectronic transaction data suitable for use in fraud detection (e.g.,card presence, electronic transaction location). This use of adistributed representation with row corresponding to values of differentelectronic transaction components therefore represents an innovative andunconventional approach in the field of fraud detection.

FIGS. 1A-1C depict projections of such an exemplary distributedrepresentation of electronic transaction data. This exemplarydistributed representation includes rows corresponding to second entityidentifiers (e.g., customers A, B and C), first entity identifiers (e.g.merchant 1, 2, and 3), days of the week (e.g. Thursday, Friday, andWednesday), and discretized electronic transaction amounts (e.g. lessthan $10, between $10 and $100, and between $100 and $500). As shown inthese exemplary projections, values for each component clusters nearvalues for other such components. For example, values for customeridentifiers cluster together, values for merchant identifiers clustertogether, values for days-of-week clusters together, and values fordiscretized electronic transaction amounts cluster together.Additionally, in the high-order space defined by the distributedrepresentation, similar values of each component cluster together. Asdescribed below, with regard to FIGS. 7A and 7B, similar electronictransactions may also cluster together.

This innovative and unconventional approach to representing electronictransactions may improve the effectiveness of fraud detection. Forexample, the distributed representation may reveal latent structures incustomer and merchant interactions. Certain interactions with particulartypes of merchants may be typical for certain types of customers. As anon-limiting example, certain types of customers may routinely frequentchain coffee stores, while other types of customers may routinelyfrequent specialty coffee stores. As an additional non-limiting example,certain types of customers that routinely frequent certain types ofupscale supermarkets may also routinely frequent certain types offitness establishments. These frequent interactions may cause thesecustomers to cluster together, may cause these merchants to clustertogether, and may cause these customers to be closer to these merchantsin the space of the distributed representation. Such latent structuresmay enable beneficial generalizations about customer behavior. Forexample, an electronic transaction may involve a new combination ofcustomer identifier and merchant identifier. Even though system 200 hasnot encountered this particular combination of customer identifier andmerchant identifier, the distributed representation encodes informationabout previous electronic transaction between similar customeridentifiers and similar merchant identifiers. Thus the distributedrepresentation enables system 200 to make effective authorizationdecisions about previously un-encountered electronic transactions.

FIG. 2 depicts a schematic illustrating an exemplary system forauthorizing electronic transactions, consistent with disclosedembodiments. This system 200 may comprise generation system 210,authorization system 220, and merchant system 230. In some embodiments,generation system 210 may be configured to generate a distributedrepresentation from electronic transactions data received from anotherelement of system 200, such as authorization system 220 and/or merchantsystem 230, or from another system. In some embodiments, authorizationsystem 220 may be configured to authorize electronic transactionsoccurring at merchant system 230, or occurring at another system. Theseelectronic transactions may be authorized using a distributedrepresentation of electronic transaction data. This distributedrepresentation may be received from generation system 210, or anothersystem. Merchant system 230 may be configured to request authorizationof an electronic transaction from authorization server, or anothersystem. The elements of system 200 may be configured to communicate overnetwork 240. As would be recognized by one of skill in the art, thedepiction of system 200 in FIG. 2 is not intended to be limiting In someembodiments, additional elements may be added, and/or the depictedelements of system 200 may be combined, divided, modified, or removed.For example, envisioned embodiments may implement a superset or a subsetof the depicted elements of system 200.

Generation system 210 may be configured to generate a distributedrepresentation of electronic transaction data, consistent with disclosedembodiments. Generation system 210 may include one or more computingdevices, such as servers, workstations, desktop computers, orspecial-purpose computing devices. In some embodiments, generationsystem 210 may be implemented using a parallel computing environment,such as the MapReduce architecture described in “MapReduce: SimplifiedData Processing on Large Clusters,” by Jeffrey Dean and Sanjay Ghemawat,or the Spark architecture described in “Spark: Cluster Computing withWorking Sets,” by Matei Zaharia, Mosharaf Chowdhury, Michael J.Franklin, Scott Shenker, and Ion Stoica, each of which is incorporatedherein by reference in its entirety. Generation system 210 is notlimited to a specific parallelization technology, job scheduler (e.g.,YARN or Mesos), programming language, parallel computing environment, orparallel computing environment communications protocol. For example,generation system 210 may be implemented in scientific computingclusters, databases, cloud-based computing environments, and ad-hocparallel computing environments (e.g., SETI at home or the like). Insuch a parallel computing environment, generation system 210 may beimplements as a collection of logical nodes. In some aspects, theselogical nodes may include controller, mapper, and reducer nodes, aswould be recognized by one of skill in the art. These logical nodes maybe implemented using servers, workstations, desktops, graphics cards,videogame systems, embedded systems, or other computing devicesaccording to systems and methods known by one of skill in the art.

Generation system 210 may be standalone, or it may be part of asubsystem, which may be part of a larger system. For example, generationsystem 210 may be associated with a financial institution, such as abank (not shown). Generation system 210 may include distributed serversthat are remotely located, and may communicate with other systems of thefinancial institution over a public network, or over a dedicated privatenetwork.

Generation system 210 may comprise memory 215, consistent with disclosedembodiments. Memory 215 may be implemented using one or morenon-transitory computer memories. In various aspects, memory 215 maycomprise one or more hard disk drives, solid state drives, random accessmemories, or similar non-transitory computer memories. In some aspects,memory 2015 may be implemented using a distributed file system, such asHadoop Distributed File System, GlusterFS, Parallel Virtual File System,Google File system, Moose File System, or another distributed filesystem enabling distributed storage, modification, and retrieval of dataacross a cluster, arrangement, or collection of computing devices.

As described in greater detail with regard to FIG. 3, memory 215 may beconfigured to store data and instructions used to generate thedistributed representation of electronic transaction data. In certainaspects, when executed by the one or more computing devices implementinggeneration system 210, the instructions may cause generation system 210to perform various disclosed operations. As a non-limiting example, theinstructions may cause generation system 210 to generate a distributedrepresentation of the electronic transaction data.

Authorization system 220 may be configured to authorize electronictransactions, consistent with disclosed embodiments. Authorizationsystem 220 may include one or more computing devices, such as servers,workstations, desktop computers, or special-purpose computing devices.Authorization system 220 may be standalone, or it may be part of asubsystem, which may be part of a larger system. For example,authorization system 220 may be associated with a financial institution,such as a bank (not shown). In some aspects, the same financialinstitution may be associated with generation system 210 andauthorization system 220. Authorization system 220 may includedistributed servers that are remotely located and communicate with othersystems of the financial institution over a public network, or over adedicated private network. Authorization system 220 may be configured toreceive a request to authorize an electronic transaction. In someembodiments, authorization system 220 may receive the request fromanother element of system 200, such as merchant system 230, or fromanother system. As described below with regard to FIG. 8, authorizationsystem 220 may be configured to apply a decision rule to determinewhether to authorize the electronic transaction. Authorization system220 may be configured to provide a response to the request based on theapplication of the decision rule. The response may authorize theelectronic transaction.

Merchant system 230 may comprise a system for collecting paymentinformation, consistent with disclosed embodiments. Merchant system 230may include one or more computing systems, such as servers, generalpurpose computers, or mainframe computers. For example, Merchant system230 may comprise one or more point-of-sale terminals, automated tellermachines, check verification systems, credit card processing systems, orsimilar systems. Merchant system 230 may be standalone, or it may bepart of a subsystem, which may be part of a larger system. For example,merchant system 230 may be associated with a business institution. As anon-limiting example, the business institution may be a manufacturer,distributor, wholesaler, retailer, service provider, or other commercialentity. As would be recognized by one of skill in the art, the nature ofthe business institution is not intended to be limiting. Merchant system230 may include distributed servers that are remotely located, and maycommunicate with other systems of the business institution over a publicnetwork, or over a dedicated private network.

Network 240 may be configured to provide communications betweencomponents of FIG. 2. For example, network 240 may be any type ofnetwork (including infrastructure) that provides communications,exchanges information, and/or facilitates the exchange of information,such as the Internet, a Local Area Network, or other suitableconnection(s) that enables system 200 to send and receive informationbetween the components of system 200.

FIG. 3 depicts a logical model of memory 215, consistent with disclosedembodiments. Memory 215 may be configured to store one or more computerprograms, applications, software, firmware, or other instructions (notshown) executable for generating a distributed representation. In someembodiments, memory 215 may be configured to store electronictransaction data 310 and parameters 320. In some aspects, electronictransaction data 310 may comprise one or more electronic transactions.In various aspects electronic transactions may comprise electronictransaction components. As described above, electronic transactioncomponents may include at least one of merchant identifier, customeridentifier, date (e.g., day-of-week, day-of-month, and/or day-of-year),time, electronic transaction amount, electronic transaction location,and any other electronic transaction feature recognized by one of skillin the art. Electronic transaction components may be discrete-valued(e.g., merchant identifier, date), or continuous-valued (e.g., amount,time). As a non-limiting example, the electronic transaction may berepresented by a tuple of electronic transaction components, as follows:

Electronic transaction_(i)={Merchant_(i) Customer_(i) Day-of-Week_(i)Amount_(i)}

As described below with respect to FIGS. 5A-5C, generation system 210may be configured to implement a neural network for predictingelectronic transaction components. In some aspects, parameters 320 maycomprise parameters of this neural network. Generation system 210 may beconfigured to update parameters 320 during training of this neuralnetwork. In some embodiments, parameters 320 may include weights 324 anddistributed representation 322.

Weights 324 may comprise parameters of the neural network trained topredict electronic transaction components. In some embodiments, asdescribed below with respect to FIGS. 5A-5C, weights 324 may comprise atleast one of scaling factors and biases for the nodes of the neuralnetwork.

Distributed representation 322 may comprise values corresponding toelectronic transaction components, consistent with disclosedembodiments. In some embodiments, distributed representation 322 mayinclude a number of features. In some aspects, the number of featuresmay be between 10 and 10000. In various aspects, the number of featuresmay be between 50 and 3000 features. In some aspects, the number offeatures may be between 80 and 120 features. Each value of distributedrepresentation 322 may correspond to a feature and at least one value ofan electronic transaction component. For example, a value of distributedrepresentation 322 may correspond to both a value of a customeridentifier and one of the features. In some embodiments, as describedabove, distributed representation 322 may be implemented as a matrix,with rows corresponding to electronic transaction components and columnscorresponding to features. For example, distributed representation 322may include rows corresponding to merchant identifiers and rowscorresponding to customer identifiers. As an additional example,distributed representation 322 may include rows corresponding to date,time, electronic transaction amount, electronic transaction location,and any other electronic transaction feature recognized by one of skillin the art. In some embodiments, as described above, electronictransaction data 310 may include continuous-valued electronictransaction components. Distributed representation 322 may include rowscorresponding to such continuous-valued electronic transactioncomponents. In some aspects, these rows may correspond to sets of valuesfor the continuous-valued electronic transaction components. Forexample, distributed representation 322 may include rows correspondingto ranges of electronic transaction amounts (e.g., as shown in FIG. 1C).As an additional example, distributed representation 322 may includerows corresponding to electronic transaction location regions (e.g.,country, state, city, zip code, or similar regions).

Distributed representation 322 may include rows corresponding tocombinations of electronic transaction data 310, consistent withdisclosed embodiments. In some aspects, distributed representation 322may include rows corresponding to multiple values of the same electronictransaction component. As a non-limiting example, distributedrepresentation 322 may include a row corresponding to day-of-week values“Saturday” and “Sunday,” (i.e., a “weekend” row) and/or a rowcorresponding to day-of-week values “Monday,” “Tuesday,” “Wednesday,”“Thursday,” and “Friday” (i.e. a “weekday” row). In various aspects,distributed representation 322 may include rows corresponding tomultiple values of the different electronic transaction components. As anon-limiting example, distributed representation 322 may include a rowcorresponding to day-of-week value “Friday” and range of time values8:00 PM-11:59 PM, and to day-of-week value “Saturday” and range of timevalues 12:00 AM-6:00 AM (i.e., a “Friday night” row).

In some embodiments, distributed representation 322 may be configuredwith rows according to predetermined models of customer and merchantinteraction. In various embodiments, distributed representation 322 maybe empirically configured with rows. For example, in certain aspects,users of system 200 may configure distributed representation 322 withrows corresponding to electronic transaction components, and/or rowscorresponding to multiple electronic transaction components, based onthe empirical success of previous implementations of distributedrepresentation 322. As a non-limiting example, distributedrepresentation 322 may be configured with rows corresponding toelectronic transaction locations when experimentation demonstrates suchrows improve fraud detection. In some embodiments, distributedrepresentation 322 may be configured with rows according to anoptimization function. For example, an optimization function may assigncosts based on the number of rows and the accuracy of predictions, anddelete or combine rows to minimize this cost function.

FIG. 4 depicts a flowchart illustrating a process for generating adistributed representation of electronic transaction data, consistentwith disclosed embodiments. In some embodiments, generation system 210,or another system, may be configured to receive electronic transactions,iteratively update parameters 320, and output a final distributedrepresentation (e.g. distributed representation 322). As would berecognized by one of skill in the art, the process illustrated in FIG. 4is not intended to be limiting. In some embodiments, additional stepsmay be added, and/or the steps illustrated in FIG. 4 may be combined,divided, modified, or removed. For example, envisioned embodiments mayimplement a superset or a subset of the steps illustrated in FIG. 4.

Generation system 210 may be configured to receive electronictransaction data in step 410, consistent with disclosed embodiments. Insome embodiments, the electronic transaction data may be received fromanother element of system 200, or another system. In some aspects,generation system 210 may be configured to receive electronictransaction data from merchant system 230 (and optionally from othermerchant systems). In various aspects, generation system 210 may beconfigured to receive electronic transaction data from authorizationsystem 220. For example, authorization system 220 may be configured toaccumulate electronic transaction data, and to provide the accumulatedelectronic transaction data to generation system 210. In some aspects,generation system 210 may be configured to receive electronictransaction data from another system, such as a database of electronictransaction information. In some aspects, as discussed above with regardto FIG. 2, the same financial institution may be associated with atleast one of the database of electronic transaction information,generation system 210, and authorization system 220. In someembodiments, the electronic transaction may be received over network240. In various embodiments, the electronic transactions may be receivedon a tangible non-transitory computer readable media, such as a flashdrive, optical disk, or other storage media.

The received electronic transaction data may be limited to electronictransactions satisfying criteria, consistent with disclosed embodiments.In some embodiments, the criteria may involve at least one of time,geographic location, customer, merchant, and similar electronictransaction criteria. For example, the received electronic transactiondata may be limited to electronic transactions occurring within a timeperiod or geographical area, involving certain merchants or customers,or having certain electronic transaction amounts. As a non-limitingexample, the received electronic transaction data may compriseelectronic transactions occurring within the previous hour, day, week,month, year, or other time period; or electronic transactions occurringwithin a time interval. In some embodiments, the criteria may involveelectronic transaction component values satisfying criteria. Forexample, the received electronic transaction data may compriseelectronic transactions with certain customer identifier(s), merchantidentifier(s), date(s), electronic transaction location(s), electronictransaction time, electronic transaction amounts, and other electronictransaction data suitable for use in fraud detection (e.g., cardpresence, electronic transaction location).

In some embodiments, generation system 210 may be configured to processthe received electronic transaction data. In some embodiments,generation system 210 may be configured to discard or re-code electronictransactions satisfying a criteria. As a non-limiting example,generation system 210 may be configured to determine customeridentifiers and/or merchant identifiers involved in fewer than apredetermined number of received electronic transactions. Thispredetermined number may be an absolute number, or may be expressed as apercentage of the number of received electronic transactions. In someaspects, electronic transactions including these customer identifiersand/or merchant identifiers may be removed from the received electronictransaction data. In certain aspects, these customer identifiers may bere-coded to an “all-other” customer identifier and/or these merchantidentifiers may be re-coded to an “all-other” merchant identifier. Aswould be appreciated by one of skill in the art, generation system 210may be configured to similarly discard or re-code values of otherelectronic transaction components.

In some embodiments, generation system 210 may be configured to adjustthe relative proportion of electronic transaction component values inthe received electronic transaction data. For example, identifiers forcertain merchants (e.g., chain supermarkets) may be frequentlyrepresented in the received electronic transaction data, whileidentifiers for other merchants (e.g., luxury goods retailers) may berarely represented in the received electronic transaction data. Theserelative differences in representation may result in biases in thedistributed representation.

Generation system 210 may therefore be configured to determine thefrequencies of electronic transaction component values in the receivedelectronic transaction data, consistent with disclosed embodiments. Forexample, generation system 210 may be configured to determinefrequencies for the merchant identifiers in the received electronictransaction data. In some aspects, generation system 210 may beconfigured to resample electronic transactions including rarelyrepresented electronic transaction component values. Resampling mayinclude duplicating randomly selecting electronic transactions includingthe rarely represented electronic transaction component values. Invarious aspects, generation system 210 may be configured to discardelectronic transactions including frequently represented electronictransaction component values. The electronic transaction may be randomlydiscarded. In some aspects, electronic transaction component values maybe automatically or manually identified as rarely or frequentlyrepresented. This identification may occur according to methods ofoutlier analysis known to those of skill in the art.

For example, given a chain supermarket involved in 10% of the receivedelectronic transactions, and a luxury retailer involved in 0.1% of thereceived electronic transactions, generation system 210 may beconfigured to discard electronic transactions involving the chainsupermarket and resample electronic transactions involving the luxuryretailer. This processing may reduce the disparity between theproportion of electronic transactions involving the chain supermarketand the number of electronic transactions involving the luxury retailer.For example, after processing of the received electronic transactions,the chain supermarket may be involved in 5% of the processed receivedelectronic transactions and the luxury retailer may be involved in 0.5%of the processed received electronic transactions. As would beappreciated by one of skill in the art, the above merchant categoriesand proportions are exemplary and not intended to be limiting.

Generation system 210 may be configured to iteratively update parameters320 in step 420 to generate an output distributed representation,consistent with disclosed embodiments. As described below with regard toFIG. 5A-5C, generation system 210 may be configured to update parameters320 using the received electronic transaction data. In some embodiments,generation system 210 may be configured to iteratively update parameters(step 420) until a termination condition is satisfied. This terminationcondition may comprise at least one of an elapsed time condition, a costcondition, and an improvement rate condition. For example, generationsystem 210 may be configured to iteratively update parameters (step 420)until a predetermined amount of time elapses. As an additional example,generation system 210 may be configured to iteratively update parameters(step 420) until a cost function crosses a predetermined level. In someaspects, the cost function may indicate the effectiveness of the neuralnetwork at predicting electronic transaction components. Satisfying thecost condition may indicate that the neural network has achieved apredetermined degree of accuracy. As an additional example, generationsystem 210 may be configured to iteratively update parameters (step 420)until a rate of change in the cost function crosses a predeterminedlevel. In some aspects; a large rate of change in the cost function mayindicate rapid improvements in effectiveness, while a small (ornegative) rate of change in the in the cost function may indicate slowimprovements in effectiveness (or a decrease in effectiveness).Consistent with disclosed embodiments, the distributed representationupon satisfaction of the termination condition may comprise the outputdistributed representation.

Generation system 210 may be configured to output the output distributedrepresentation in step 430, consistent with disclosed embodiments. Forexample, generation system 210 may be configured to store the outputdistributed representation on a non-transitory, computer-readablemedium, such as memory 215; another computer memory; or a flash drive,optical disk, or other tangible storage media. As an additional example,generation system 210 may be configured to provide at least some of theoutput distributed representation to another component of system 200, oranother system. In some aspects, generation system 210 may be configuredto provide the rows of the distributed representation corresponding toat least one electronic transaction component to the authorizationsystem 220. As a non-limiting example, generation system 210 may beconfigured to provide the rows corresponding to the merchantidentifiers, and/or the customer identifiers. In various aspects,generation system 210 may be configured to provide the entiredistributed representation to the authorization system 220.

In some embodiments, generation system 210, another element of system200, or another system, may be configured to combine distributedrepresentations, as described below with regards to FIGS. 9 and 10A-10C.For example, in some aspects, generation system 210 may be configured toidentify common rows in the output distributed representation andanother distributed representation, align the output distributedrepresentation and the other distributed representation using values ofthe common rows, and combine the output distributed representation andthe other distributed representation. Generation system 210 may beconfigured to output this combined distributed representation. In someaspects, generation system 210 may be configured to store this combineddistributed representation in a non-transitory, computer-readable media.In various aspects, generation system 210 may be configured to provideat least some of the output distributed representation to anotherelement of system 200, or another system.

FIGS. 5A-5C depict updating a distributed representation of electronictransaction data, consistent with disclosed embodiments. FIG. 5A depictsa flowchart illustrating a process for updating a distributedrepresentation of electronic transaction data, while FIG. 5B depictsexemplary details of input mapping and generation of input vectors andFIG. 5C depicts exemplary details of predicting an electronictransaction component. In some embodiments, generation system 210 may beconfigured to process electronic transaction component values toidentify corresponding rows in distributed representation 322.Generation system 210 may then be configured to generate trainingsamples, according to the methods disclosed in “word2vec ParameterLearning Explained,” by Xin Rong (“Parameter Learning”), hereinincorporated by reference. As would be recognized by one of skill in theart, the process illustrated in FIG. 5A and the exemplary detailsdepicted in FIGS. 5B and 5C are not intended to be limiting. In someembodiments, additional steps may be added, and/or the steps illustratedin FIG. 5A may be combined, divided, modified, or removed. For example,envisioned embodiments may implement a superset or a subset of the stepsillustrated in FIG. 5A. Similarly, in some embodiments, input mapping,generation of input vectors, and predicting an electronic transactioncomponent may differ from the exemplary details depicted in FIGS. 5B and5C.

Generation system 210 may be configured to process electronictransaction component values in step 510, consistent with disclosedembodiments. In some embodiments, generation system 210 may beconfigured to map electronic transaction components to rows ofdistributed representation 322. For example, as shown in FIG. 5B, givenan electronic transaction with three electronic transaction componentshaving values A, B, and C, generation system 210 may be configured tomap these electronic transaction components values to three rows ofdistributed representation 322.

Generation system 210 may be configured to discretize continuous-valuedelectronic transaction components, consistent with disclosedembodiments. In some embodiments, generation system 210 may beconfigured to map these discretized values to rows of distributedrepresentation 322. For example, generation system 210 may be configuredto map values of an electronic transaction amount to amount ranges(e.g., less than $10, between $10 and $50, between $50 and $500, over$500). As an additional example, generation system 210 may be configuredto map values of an electronic transaction time to times ranges (e.g.,between 12:00 AM and 6:00 AM, between 6:00 AM and 9:00 AM, between 9:00AM and 10:00 AM, etc.). In some aspects, these time and amount rangesmay correspond to rows of distributed representation 322.

In some aspects, generation system 210 may be configured to mapelectronic transaction components to rows of distributed representation322 using contextual information distinct from electronic transactiondata 310. Such contextual information may concern electronic transactioncomponents. For example, contextual information may concern the customerassociated with the customer identifier, the business institutionassociated with the merchant identifier, the electronic transactiondata, or other contextual information. For example, generation system210 may be configured to map electronic transaction components to rowsof the distributed representation using customer account informationfrom systems of an associated financial institution. As a furtherexample, the customer account information may include addressinformation, and the generation system 210 may be configured to use thisaddress information to map electronic transaction location values torows of distributed representation 322. In some aspects, generationsystem 210 may be configured to map electronic transaction locationvalues to rows of distributed representation 322 corresponding todistance ranges from an address associated with the customer identifier(e.g., less than 1 mile, between 1 mile and 10 miles, greater than 10miles).

Generation system 210 may be further configured to generate trainingsamples for an update, consistent with disclosed embodiments. In someaspects, as described in Parameter Learning, the training samples may bepositive training samples. As a nonlimiting example, in a positivesample generation system 210 may be configured to select an electronictransaction component value of the electronic transaction as a positivetraining sample. In some aspects, selection may include determining therow corresponding to the selected electronic transaction value. Forexample, given electronic transaction data comprising a merchantidentifier, a customer identifier, and an electronic transaction amountof $11.37, generation system 210 may be configured to map the electronictransaction amount to the range of between $10 and $50 dollars. Thisrange may correspond to a row of distributed representation 322. In thisnon-limiting example, generation system 210 may select the range ofbetween $10 and $50 dollars as the training example for the update. Invarious aspects, as described in Parameter Learning, the trainingsamples may be negative training samples. As a non-limiting example,random rows may be selected from distributed representation 322, andthese random rows may be used as negative training examples. In suchaspects, generation system 210 may be configured to generate theembedding vector as disclosed above, but the update step may differ, andmay depend on the estimated probabilities for both a positive trainingsample and the negative training samples, as described in ParameterLearning, and incorporated herein by reference.

Generation system 210 may be configured to generate an embedding vectorin step 520, consistent with disclosed embodiments. For example, theembedding vector may include values corresponding to the features indistributed representation 322. In some aspects, the length of theembedding vector may equal the number of features in distributedrepresentation 322. Similarly, the length of the embedding vector mayequal the length of the rows in distributed representation 322.Generation system 210 may be configured to generate the embedding vectorusing the electronic transaction components and distributedrepresentation 322. In some aspects, as shown in FIG. 5B, generationsystem 210 may be configured to generate the embedding vector using therows corresponding to at least some of the processed electronictransaction component values. For example, when generation system 210selects one of the processed electronic transaction component values asa positive training sample, generation system 210 may be configured togenerate the embedding vector using the rows corresponding to theremaining processed electronic transaction component values. In someaspects, the embedding vector may be a function of these rows. Forexample, the embedding vector may be a linear combination of these rows,with each contribution to this linear combination having a non-zerocoefficient. As an additional example, the embedding vector may be anaverage of these rows.

As shown in FIG. 5B, multiple embedding vectors may be generated from asingle electronic transaction, depending on the selected trainingexample. For example, generation system 210 may be configured togenerate embedding vector 520 a from the rows corresponding toelectronic transaction component values A and C, when the rowcorresponding to electronic transaction component value B comprises thetraining example; generate embedding vector 520 b from the rowscorresponding to electronic transaction component values B and C, whenthe row corresponding to electronic transaction component value Acomprises the training example; and generate embedding vector 520 c fromthe rows corresponding to electronic transaction component values A andB, when the row corresponding to electronic transaction component valueC comprises the training example.

Generation system 210 may be configured to predict the training examplein step 530, consistent with disclosed embodiments. As shown in FIG. 5C,in some aspects, generation system 210 may be configured to predict thetraining example using an input layer 550, a hidden layer 560, and anoutput layer 570. In some embodiments, input layer 550 may comprise avector with a width equal to the width of the embedding vector.Generation system 210 may be configured to set the values of input layer550 equal to the values of the embedding vector (e.g., embedding vector520 c). The values of the embedding vector may be used to calculateinput values for the hidden layer. For example:

o=d+Hx

where x is the embedding vector, H is a matrix of weights mapping theembedding vector into the space of the hidden layer, d is a vector ofbiases, and o is the vector of inputs to the hidden layer. Generationsystem 210 may be configured to store d and H in weights 324. In someembodiments, the size of the hidden layer may be between 10 and 10,000nodes, between 50 and 3000 nodes, or between 80 and 120 nodes. In someaspects, the width of the hidden layer may equal the number of features.In some aspects, the elements of hidden layer 560 may have activationvalues dependent on input values. For example:

a=ƒ(o)

where a is a vector of activation values, o is the previously discloseda vector of input values, and ƒ(o) is a function of the input values. Insome embodiments, ƒ(o) may be a linear function, a sigmoidal function, ahyperbolic tangent, or another function used for calculating activationvalues for neural networks, as would be known by one of skill in theart. The activation values may be used to calculate the output valuesprovided by output layer 570. For example:

y=b+Ua

where b is a vector of output biases, U is a matrix of weights mappingthe previously disclosed vector of activation values to output values,and y is a matrix of output values for the hidden layer. Generationsystem 210 may be configured to store b and U in weights 324. In someembodiments, the vector of output values for the hidden layer mayadditionally or alternatively depend directly on the values of theembedding vector. For example:

y=b+Wx+Ua

where W is a matrix of weights mapping the embedding vector directly tothe output vector. Generation system 210 may be configured to store W inweights 324.

In some embodiments, output layer 570 may be configured to compute atleast one likelihood from the output values of the hidden layer. Incertain aspects, this likelihood may be a probability. In someembodiments, output layer 570 may be configured to compute thelikelihood as a softmax function. For example:

P(C _(i) |C _(j) ,C _(k), . . . )=e ^(yi)/Σ_(n) ^(y) ^(n)

where P(C_(i)|C_(j), C_(k), . . . ) is the estimated likelihood that thetraining sample (i.e. C_(i)) corresponds to the i^(th) element of outputlayer 570, given an embedding vector input generated using the rows ofdistributed representation 322 corresponding to the remaining electronictransaction component {C_(j), C_(k), . . . }. In some aspects, y_(i) maybe the value of the output layer provided to the i^(th) element ofoutput layer 570 by hidden layer 560. In some various aspects, y_(i) maybe based on the value of the output layer provided to the i^(th) elementof output layer 570 by hidden layer 560. For example, y_(i) may bemodified to prevent numerical instabilities or inaccuracies associatedwith exponentiation. As an additional example, y_(i) may be thedifference between the value of the output layer provided to the i^(th)element of output layer 570 by hidden layer 560, and another such value(as a non-limiting example, the minimum, average, or median of suchvalues).

As a non-limiting example, when the electronic transaction includeselectronic transactions components A, B, and C, each corresponding to arow of the distributed representation, and the embedding vectorcomprises the average of the rows corresponding to the electronictransaction component A and B, then output layer 570 may compriseestimates that elements of output layer 570 correspond to the missingelectronic transaction component. For example, when parameters 320converge on suitable values, the likelihood value for the element 580 ofoutput layer 570 may be the greatest likelihood value for output layer570.

Generation system 210 may be configured to update parameters 320 in step540, consistent with disclosed embodiments. In some embodiments,generation system 210 may be configured to use a gradient ascent (orgradient descent) method to update parameters 320. For example:

${\Delta\theta} = {ɛ\frac{\delta{\log\left( {P\left( {{C_{i}❘C_{j}},C_{k},\ldots}\mspace{14mu} \right)} \right)}}{\delta\theta}}$

Where Δθ comprises the update to parameters 320 and ε is a trainingparameter, selected according to methods known to one of skill in theart. As noted above, P(C_(i)|C_(j), C_(k), . . . ) may be the likelihoodfunction, and the cost may be calculated as the logarithm of thislikelihood function. As would be appreciated by one of skill in the art,this choice of likelihood function is not intended to be limiting.

The update of the future parameters may be calculated according tobackpropagation algorithms known to one of skill in the art. As anon-limiting example, the change in the cost function with respect tothe inputs of output layer 570 may be calculated as follows:

$\frac{\delta L}{\delta y_{m}} = {1_{m = {= i}} - p_{m}}$

Where

$\frac{\delta\; L}{\delta y_{m}}$

is the change in the cost function, 1_(mmml) is valued as 1 when theindex m of the output layer equals the index i of the row correspondingto the training example, and e^(y) ^(m) is the estimated likelihood forindex i of output layer 570. As a non-limiting example, the values forthe updates to weights 324 may be calculated as follows:

$\frac{\delta\; L}{\delta\; a} = {\frac{\delta\; L}{\delta\; y}U}$$\frac{\delta\; L}{\delta\; o} = {\frac{\delta\; L}{\delta\; a}{f^{\prime}(o)}}$$\frac{\delta\; L}{\delta\; x} = {{\frac{\delta\; L}{\delta\; y}W} + {\frac{\delta\; L}{\delta\; o}H}}$${\Delta\; b} = {ɛ\frac{\delta\; L}{\delta\; y}}$${\Delta\; W} = {ɛ\frac{\delta\; L}{\delta\; y}x}$${\Delta\; U} = {ɛ\frac{\delta\; L}{\delta\; y}a}$${\Delta\; d} = {ɛ\frac{\delta\; L}{\delta\; o}}$${\Delta\; H} = {ɛ\frac{\delta\; L}{\delta\; o}x}$

The values for the rows of distributed representation 322 correspondingto the electronic transactions components may also be updated. Theseupdates may be based on the change in the cost function. In someaspects, the update may be implemented as an update vector, or as anassortment or collection of scalars. The number of scalars, or length ofthe vector, may equal a length of the rows of the distributedrepresentation. For example, the size of the update vector may equal thelength of the embedding vector. As an additional example, the value ofthe update may depend on

$ɛ{\frac{\delta L}{\delta x}.}$

In some aspects, the update for each corresponding row may be equal. Forexample, when the electronic transaction comprises components A, B, andC, and the embedding vector is generated from the rows of distributedrepresentation 322 corresponding to A and B, these rows may be equallyupdated based on

$\frac{\delta L}{\delta x},$

the change in the cost function with respect to a change in theembedding vector, and ε, the training parameter. As would be recognizedby one of skill in the art, other backpropagation algorithms may also beused, and the above example is not intended to be limiting. For example,negative sampling may be used, as described above with respect to FIG.4. When negative sampling is used, the update may depend on thecalculated likelihoods of the negative samples, as well as thecalculated likelihood of the positive samples, as described in ParameterLearning and incorporated herein by reference.

FIG. 6 depicts a flowchart illustrating a process for authorizingelectronic transactions using distributed representation 322, consistentwith disclosed embodiments. As shown in FIG. 6, authorization system 220may be configured to receive authorization information, generate arepresentation of the electronic transaction; apply a decision rule; andauthorize the electronic transaction (or not authorize the electronictransaction) based on the result of applying the decision rule. As wouldbe recognized by one of skill in the art, the process illustrated inFIG. 6 is not intended to be limiting. In some embodiments, additionalsteps may be added, and/or the steps illustrated in FIG. 6 may becombined, divided, modified, or removed. For example, envisionedembodiments may implement a superset or a subset of the stepsillustrated in FIG. 6.

Authorization system 220 may be configured to receive authorizationinformation in step 610, consistent with disclosed embodiments. In someembodiments, the authorization information may comprise at least one ofa distributed representation, an electronic transaction, arepresentation of an electronic transaction, a decision rule, historicalelectronic transaction data, and representations of historicalelectronic transaction data. In some embodiments, at least some of theauthorization information may be received from another component ofsystem 200, such as merchant system 230, or another system. In variousembodiments, at least some of the authorization information may beretrieved from a non-transitory computer readable medium, such as acomputer memory associated with authorization system 220.

In some embodiments, authorization system 220 may be configured with adistributed representation including rows corresponding to theelectronic transaction component values comprising the electronictransaction (e.g., distributed representation 322). For example,authorization system 220 may be configured to receive a distributedrepresentation from another component of system 200, such as generationsystem 210, or another system. In some embodiments, one or more of theelectronic transaction and distributed representation 322 may bereceived over network 240. In some embodiments, the received electronictransaction may comprise electronic transaction components, as disclosedabove. For example, the electronic transaction components may includemerchant identifiers, customer identifiers, electronic transaction date(e.g., day-of-week, day-of-month, and/or day-of-year), electronictransaction time, electronic transaction amount, and other electronictransaction data suitable for use in fraud detection (e.g., cardpresence, electronic transaction location).

Authorization system 220 may be configured to generate a representationof the electronic transaction in step 620. In some aspects, as shown inFIG. 7A, authorization system 220 may be configured to represent theelectronic transaction in the space of distributed representation 322.In various aspects, authorization system 220 may be configured to mapthe electronic transaction component values to rows of the distributedrepresentation, as described above with regard to FIG. 5A. For example,authorization system 220 may be configured to discretizecontinuous-valued electronic transaction component values, or mapelectronic transaction component values to rows based on contextualinformation.

In some aspects, authorization system 220 may be configured to use therows of the distributed representation corresponding to the electronictransaction component values to determine a location of the electronictransaction in the space of distributed representation 322 (e.g.,electronic transaction 705). For example, as depicted in FIG. 7A,customer 701 may be the location in distributed representation 322corresponding to a customer identifier for the electronic transaction.Merchant 703 may be the location in distributed representation 322corresponding to a merchant identifier for the electronic transaction.In some aspects, authorization system 220 may be configured to determinethe location of the electronic transaction as a linear combination ofthe rows corresponding to the electronic transaction components of thereceived electronic transaction. In this non-limiting example,authorization system 220 may be configured to determine the electronictransaction 705 as a linear combination of customer 701 and merchant703. In some aspects, authorization system 220 may be configured todetermine the location of the electronic transaction as the average ofthe rows corresponding, to the electronic transaction component valuesof the received combination. For example, electronic transaction 705 maybe the average of customer 701 and merchant 703.

Authorization system 220 may be configured to apply a decision rule instep 630, consistent with disclosed embodiments. In some embodiments,the decision rule may be implemented as a partition on the space ofdistributed representation 322. In some aspects, as shown in FIG. 7B,authorization system 220 may be configured to use decision boundary 730to discriminate between acceptable and unacceptable electronictransactions. For example, authorization system 220 may be configured toprovide an authorization indication for electronic transactions withindecision boundary 730 (e.g., approved electronic transaction 741). As anadditional example, authorization system 220 may be configured to denyauthorization for electronic transactions outside of decision boundary730 (e.g., denied electronic transaction 743). For example,authorization system 220 may be configured to not provide anauthorization indication for such electronic transactions. As a furtherexample, authorization system 220 may be configured to provide adenial-of-authorization indication for such electronic transactions.

Authorization system 220 may be configured to request historicalelectronic transaction data, consistent with disclosed embodiments. Insome aspects, authorization system 220 may be configured to request allavailable historical electronic transaction data. In various aspects,authorization system 220 may be configured to request a limited subsetof available historical electronic transaction data. In some aspects,the limits on the subset may concern electronic transaction components.For example, the subset may be limited to electronic transactionsincluding an electronic transaction components satisfying criteria. Thecriteria may concern a single electronic transaction component. As anon-limiting example, the subset may comprise electronic transactionsincluding a merchant or set of merchants. As a further non-limitingexample, the subset may comprise electronic transactions including acustomer or set of customers. The criteria may concern multipleelectronic transaction components. As a non-limiting example, the subsetmay comprise electronic transactions including a customer or set ofcustomers, and amounts in excess of a certain amount. In some aspects,authorization system 220 may be configured to provide the criteria toone or more of another component of system 200 and a component ofanother system.

Authorization system 220 may be configured to receive the historicalelectronic transaction data from a network socket, a source of messagesin a publication and subscription framework (e.g., Apache Kafka), or adata stream (e.g., as computer network traffic). In various aspects,authorization system 220 may be configured to retrieve the historicalelectronic transaction data from a non-transitory computer-readablemedium, such as a computer memory associated with at least one ofauthorization system 220, another component of system 200, and anothersystem.

The historical electronic transaction data may associate previouselectronic transactions with locations in distributed representation322, consistent with disclosed embodiments. In some embodiments,historical electronic transaction data may correspond to previouselectronic transactions. In various aspects, in the manner discussedabove with regards to FIGS. 5A-5C, the historical electronic transactiondata may comprise tuples of historical electronic transactioncomponents. As a non-limiting example, authorization system 220 may beconfigured to receive historical electronic transaction data as tuplesof customer identifier and merchant identifier (e.g., customer 701 andmerchant 703). In various aspects, historical electronic transactiondata may be received as electronic transaction locations. As anon-limiting example, authorization system 220 may be configured toreceive historical electronic transaction data as a set of electronictransaction locations, the electronic transaction locations specifyinglocations in distributed representation 322 (e.g., electronictransaction 705).

In some embodiments, the historical electronic transaction data maysummarize a set of previous electronic transactions. For example, thehistorical electronic transaction data may comprise statistical summaryinformation. In some aspects, the statistical summary information maycomprise one or more locations in distributed representation 322representative of the set of previous electronic transactions. As afurther non-limiting example, the one or more locations may berepresentative of clusters of previous electronic transactions. Forexample, the one or more locations may correspond to one or more centralpoints of the representative clusters. In some embodiments, thestatistical summary information may comprise measures of dispersion. Insome aspects, the measures of dispersion may comprise one or moredistances. The one or more distances may correspond to the one or morecentral points, such that one or more predetermined percentages ofelectronic transactions associated with the one or more central pointsare within the one or more corresponding distances. As a non-limitingexample, a first central point may define a first cluster of electronictransactions, and 95% of the electronic transactions associated with thefirst cluster may lie within the first distance of the first centralpoint. In various aspects, the measures of dispersion may comprise oneor more statistical measures of dispersion, such standard deviations.

Authorization system 220 may be configured to apply the decision ruleusing the historical electronic transaction data, consistent withdisclosed embodiments. In some embodiments, applying the decision rulemay comprise determining whether a distance from the representation ofthe received electronic transaction in distributed representation 322exceeds a value. The distance may be to a point in distributedrepresentation 322 dependent on the historical electronic transactiondata. For example, authorization system 220 may be configured togenerate a partition of distributed representation 322 using thestatistical summary information disclosed above. As an additionalexample, authorization system 220 may be configured to determine whetheran electronic transaction lies within a distance from a central point inthe space of distributed representation 322 (e.g., approved electronictransaction 741), or lies outside the distance from the central point inthe space of distributed representation 322 (e.g., denied electronictransaction 743). The decision rule may comprise data or instructionsstored in a non-transitory computer readable medium, such as a computermemory, for performing this analysis, given the historical electronictransaction data.

Authorization system 220 may be configured to generate the partitionbased on the individual electronic transactions, consistent withdisclosed embodiments. For example, authorization system 220 may beconfigured to cluster the individual electronic transactions into one ormore clusters, and to determine the resemblance of the receivedelectronic transaction to the one or more of clusters. As an example,authorization system 220 may be configured to determine a cluster fromhistorical trans. 721, historical trans. 723 and historical trans. 725,and determine, according to methods known in the art, that oneelectronic transaction (e.g., approved electronic transaction 741) maybe included in that cluster, while another electronic transaction (e.g.,denied electronic transaction 743) may not be included in that cluster.The decision rule may comprise data or instructions stored in anon-transitory memory for performing this analysis, given the historicalelectronic transaction data.

In some embodiments, authorization system 220 may be configured todetermine a representative electronic transaction component value,consistent with disclosed embodiments. In some aspects, authorizationsystem 220 may be configured to determine a representative merchantvalue based on at least some rows corresponding to merchant identifiersin the distributed representation. As a non-limiting example, thehistorical electronic transaction data may include merchant identifiers,and authorization system 220 may be configured to average the rows ofdistributed representation 322 corresponding to these merchantidentifiers to generate a “typical” merchant value. In some aspects,authorization system 220 may be configured to determine whether thereceived electronic transaction lies within a predetermined distance ofthis “typical” merchant value. For example, the received electronictransaction may include a customer identifier and a merchant identifier.The historical electronic transaction data may be limited to electronictransactions including the customer identifier. The historicalelectronic transaction data may include merchant identifiers, andauthorization system 220 may be configured to generate a “typical”merchant value based on the rows of distributed representation 322corresponding to these merchant identifiers. Authorization system 220may be configured to determine whether the value in distributedrepresentation 322 for the merchant identifier in the receivedelectronic transaction is within a predetermined distance of this“typical” merchant value. In some aspects, authorization system 220 maybe configured to determine a representative customer value based on atleast some rows corresponding to customer identifiers in the distributedrepresentation. For example, authorization system 220 may be configuredto determine a “typical” customer value in a similar manner to thedetermination of the “typical” merchant value described above.Authorization system 220 may be configured to determine whether thevalue in distributed representation 322 for the customer identifier inthe received electronic transaction is within a predetermined distanceof this “typical” customer value. In some embodiments, authorizationsystem 220 may be configured to determine whether criteria based onmultiple “typical” components are satisfied by the components of thereceived electronic transaction. For example, authorization system 220may be configured to determine the differences between multiple“typical” electronic transaction component values and values indistributed representation 322 for corresponding components of thereceived electronic transaction. Authorization system 220 may beconfigured to determine a value based on these differences, and todetermine whether this value falls within a predetermined threshold. Thedecision rule may comprise data or instructions stored in anon-transitory memory for performing this analysis, given the historicalelectronic transaction data.

In some embodiments, authorization system 220 may be configured to useboth the distributed representation and additional fraud criteria inapplying the decision rule. In some embodiments, authorization system220 may be configured to apply the additional fraud criteria first,before determining whether a distance from the representation of thereceived electronic transaction in distributed representation 322exceeds a value. For example, authorization system 220 may be configuredto use distributed representation 322 as a secondary check forelectronic transactions flagged according to the fraud criteria. Invarious embodiments, authorization system 220 may be configured todetermine whether a distance from the representation of the receivedelectronic transaction in distributed representation 322 exceeds a valuefirst, before applying the additional fraud criteria. Thus authorizationsystem 220 may be configured to use the fraud criteria as a secondarycheck of electronic transactions flagged using distributedrepresentation 322. In some embodiments, authorization system 220 may beconfigured to integrate distributed representation 322 and theadditional fraud criteria. For example, authorization system 220 may beconfigured to determine a fraud score based on distributedrepresentation 322 and the additional fraud criteria. As a non-limitingexample, the fraud score may comprise a linear combination of fraudvalues and fraud weights. The fraud values may depend on the fraudcriteria and distributed representation 322. For example, a fraud valuefor distributed representation 322 may depend on a distance from thereceived electronic transaction in distributed representation 322, asdisclosed above. In some aspects, at least one of the fraud values maybe discrete-valued. For example, a fraud value for distributedrepresentation 322 may be zero or one depending on whether the distancefrom the received electronic transaction exceeds a predetermined value.In some aspects, at least one of the fraud values may becontinuous-valued. For example, the fraud value for distributedrepresentation 322 may be a continuously valued function of the distancefrom the received electronic transaction, optionally parameterized bythe predetermined value. For example, the fraud value for distributedrepresentation 322 may be the distance normalized by the predeterminedvalue. The values for the weights may be determined using historicalelectronic transaction data according to methods known to one of skillin the art. In some embodiments, authorization system 220 may beconfigured to apply the decision rule as a threshold fraud score, andapprove the received electronic transaction based on the calculatedfraud score and the threshold fraud score. For example, where anincreasing fraud score indicates an increasing likelihood of fraud,authorization system 220 may be configured to approve electronictransactions with a calculated fraud score below the threshold value.

The additional fraud criteria may include, as a non-limiting example, atleast one of a card not present indication, a first geographic locationassociated with the merchant identifier, a second geographic locationassociated with the customer identifier, and a predetermining categorycorresponding to the merchant identifier. The first geographic locationmay include, for example, the geographic location of a store of thebusiness institution associated with the merchant identifier. Thereceived electronic transaction may be occurring at the store. Thesecond geographic location may include, for example, the geographiclocation of an address of the customer associated with the customer id.The address may be a home address, a mailing address, a work address, oranother similar address. The predetermined category may indicate theprimary category of goods or services offered by the businessinstitution associated with the merchant identifier. The predeterminedcategory may comprise, for example, a merchant category code (MCC).

Authorization system 220 may be configured to authorize an electronictransaction in step 640, consistent with disclosed embodiments. Asdescribed above, in some embodiments, authorization system 220 may beconfigured to authorize a received electronic transaction based onapplication of a decision rule. In some embodiments, authorization maybe expressed by providing an authorization indication to anothercomponent of system 200, or to a component of another system. Forexample, authorization system 220 may be configured to send anauthorization indication to a system of a financial institution. Asdescribed above, the financial institution may be associated with atleast one of generation system 210 and authorization system 220.Additionally or alternatively, authorization system 220 may beconfigured to send an authorization indication to merchant system 230.In some aspects, the authorization indication may comprise anaffirmation of authorization. In various aspects, the authorizationindication may comprise a denial-of-authorization indication. In someaspects, failure to provide an affirmation of authorization, for examplewithin a period of time, may comprise a denial-of-authorizationindication. In some embodiments, the electronic transaction may proceedbased on the authorization indication, according to systems and methodsfor settling electronic transactions known to one of skill in the art.

FIG. 8 depicts a flowchart illustrating a process for generating acombined distributed representation, consistent with disclosedembodiments. In some aspects, generation system 210 may be configured togenerate multiple distributed representations (e.g., distributedrepresentation 322) from differing sets of electronic transaction data.In various aspects, generation system 210 may be configured to receiveat least one of the distributed representations to be combined.Generation system 210 may be configured to align these distributedrepresentations. Generation system 210 may further be configured togenerate a combined distributed representation from these distributedrepresentations. As would be recognized by one of skill in the art, theprocess illustrated in FIG. 8 is not intended to be limiting. In someembodiments, additional steps may be added, and/or the steps illustratedin FIG. 8 may be combined, divided, modified, or removed. For example,envisioned embodiments may implement a superset or a subset of the stepsillustrated in FIG. 8. Additionally, though described below with regardsto generation system 210, alignment and generation of the combineddistributed representation may be performed by another element of system200 (e.g., authorization system 220), or by another system.

Generation system 210 may be configured to generate multiple distributedrepresentations in step 810. In some embodiments, generation system 210may be configured to generate distributed representations from differingsets of electronic transaction data. In some aspects, generation system210 may be configured to generate distributed representations from setsof electronic transaction data limited to differing geographic areas, ordiffering electronic transaction time periods. For example, generationsystem 210 may be configured to generate distributed representationscorresponding to differing cities, metropolitan areas, states, regions,countries, or other geographic areas. As an additional example,generation system 210 may be configured to generate distributedrepresentations corresponding to different time periods, such asdifferent days, weeks, months, years, or other differing time intervals.

Generation system 210 may be configured to align distributedrepresentations in step 820, consistent with disclosed embodiments.FIGS. 9A-9C depict three projections of distributed representationsillustrating an exemplary alignment of distributed representations. As anon-limiting example, FIG. 9A depicts a first distributed representationgenerated from a first set of electronic transaction data, and FIG. 9Bdepicts a second distributed representation generated from a second setof electronic transaction data. As shown in these non-limiting examples,the each of the first and second distributed representations includesrows not present in the other distributed representation. For example,the first distributed representation includes a row corresponding to“Customer A,” but not a row corresponding to “Customer Y.” Similarly thesecond distributed representation includes a row corresponding to“Merchant 4,” but not a row corresponding to “Merchant 3.” However, asalso shown in these non-limiting examples, a common subset of rows maybe present in multiple representations. For example, “Merchant 2” and“Merchant 1” are present in both the first and second distributedrepresentations. In some aspects, the common rows may correspond tomajor retail chains or franchises, such as supermarkets, restaurants, ordepartment stores. For example, common rows may correspond to retailerssuch as McDonalds, Burger King, Starbucks, Walmart, Target, Whole Foods,or similar major retail chains or franchises.

In some embodiments, generation system 210 may be configured to estimatea transformation between the first and second distributedrepresentations based on the common rows. These transformations maycomprise one or more of a rotation, translation, and scaling of at leastone of the distributed representations. In some embodiments, generationsystem 210 may be configured to estimate a transformation between afirst and second distributed representation that minimizes a costfunction. In some embodiments, the cost function may depend on thedifference between the locations of the common rows in a distributedrepresentation and the transformed locations of the common rows inanother distributed representation. As a non-limiting example:

ƒ(x ₁ ,x ₂)=Σ_(i)(x _(1i) −g(x _(2l)))(x _(1i) −g(x _(2i)))^(T)

In the above relationship, ƒ(x₁, x₂) may be a cost function of thematrix x₁ in the first distributed representation and the matrix x₂ inthe second distributed representation, where the matrices x₁ and x₂comprise rows of the first and second distributed representations withcommon electronic transaction component values. The transformationg(x_(2i)) may map individual rows of x₂ to the space of the firstdistributed representation. Generation system 210 may be configured toestimate g(x_(2i)) to minimize ƒ(x₁, x₂), according to method known toone of skill in the art. As would be appreciated by one of skill in theart, the estimation of the transformation may be formulated differently,and the above formulation is not intended to be limiting.

Generation system 210 may be configured to generate a combineddistributed representations in step 830. In some embodiments, thecombined distributed representation may be generated from the first andsecond distributed representations using the estimated transformation.As a non-limiting example, FIG. 9C depicts the distributedrepresentation of FIG. 9B transformed based on the common rowscorresponding to “Merchant 1” and “Merchant 2”. As shown in thisnon-limiting example, this transformation maps “Customer X,” “CustomerY,” and “Customer Z” from the second distributed representation into theproximity of “Customer A,” “Customer B,” and “Customer C” from the firstrepresentation. Likewise, “Merchant 4” from the second distributedrepresentation is mapped into the proximity of “Merchant 3” from thefirst distributed representation. In some embodiments, the combineddistributed representation may include rows corresponding to allelectronic transaction component values in either distributedrepresentation. In various embodiments, the combined distributedrepresentation may include rows corresponding to all merchantidentifiers and/or customer identifiers. In some embodiments, thecombined distributed representation may include the values of the firstdistributed representation for the common rows. In various embodiments,the combined distributed representation may include the transformedvalues of the second distributed representation for the common rows. Insome embodiments, the combined distributed representation may include afunction of the values of the first distributed representation and thetransformed values of the second distributed representation for thecommon rows. In some aspects, the function may be an average.

FIG. 10 depicts a schematic of exemplary computing system 1000 forperforming the envisioned systems and methods, consistent with disclosedembodiments. In some embodiments, computer system 1000 includes aprocessor 1010, memory 1015, display 1020, I/O interface(s) 1025, andnetwork adapter 1030. These units may communicate with each other viabus 1035, or wirelessly. The components shown in FIG. 10 may reside in asingle device or multiple devices.

Consistent with disclosed embodiments, processor 1010 may be a centralprocessing unit (CPU), graphical processing unit (GPU), or similarmicroprocessor having one or more processing cores. Computer system 1000may include one or more processors 1010 and may further operate with oneor more other processors that are remote with respect to processors1010. Memory 1015 may include non-transitory memory containingnon-transitory instructions, such as a computer hard disk, random accessmemory (RAM), removable storage, or remote computer storage. In someaspects, memory 1015 may be configured to store data and instructions,such as software programs. For example, memory 1015 may be configured tostore data and instructions, as described above with regards to memory215 in FIG. 3. In some aspects, processor 1010 may be configured toexecute non-transitory instructions and/or programs stored on memory1015 to configure computer system 1000 to perform operations of thedisclosed systems and methods. In various aspects, as would berecognized by one of skill in the art, processor 1010 may be configuredto execute non-transitory instructions and/or programs stored on aremote memory to perform operations of the disclosed systems andmethods.

Display 1020 may be any device which provides a visual output, forexample, a computer monitor, an LCD screen, etc. I/O interfaces 1025 mayinclude hardware and/or a combination of hardware and software forcommunicating information to computer system 1000 from a user ofcomputer system 1000, such as a keyboard, mouse, trackball, audio inputdevice, touch screen, infrared input interface, or similar device.Network adapter 1030 may include hardware and/or a combination ofhardware and software for enabling computer system 1000 to exchangeinformation using external networks, such as network 240. For example,network adapter 1030 may include a wireless wide area network (WWAN)adapter, a Bluetooth module, a near field communication module, or alocal area network (LAN) adapter.

Other embodiments will be apparent to those skilled in the art fromconsideration of the specification and practice of the disclosedembodiments disclosed herein. It is intended that the specification andexamples be considered as exemplary only, with a true scope and spiritof the disclosed embodiments being indicated by the following claims.Furthermore, although aspects of the disclosed embodiments are describedas being associated with data stored in memory and other tangiblecomputer-readable storage mediums, one skilled in the art willappreciate that these aspects can also be stored on and executed frommany types of tangible computer-readable media, such as secondarystorage devices, like hard disks, floppy disks, or CD-ROM; or otherforms of RAM or ROM. Accordingly, the disclosed embodiments are notlimited to the above described examples, but instead is defined by theappended claims in light of their full scope of equivalents.

Moreover, while illustrative embodiments have been described herein, thescope includes any and all embodiments having equivalent elements,modifications, omissions, combinations (e.g., of aspects across variousembodiments), adaptations or alterations based on the presentdisclosure. The elements in the claims are to be interpreted broadlybased on the language employed in the claims and not limited to examplesdescribed in the present specification or during the prosecution of theapplication, which examples are to be construed as non-exclusive.Further, the steps of the disclosed methods can be modified in anymanner, including by reordering steps or inserting or deleting steps. Itis intended, therefore, that the specification and examples beconsidered as example only, with a true scope and spirit being indicatedby the following claims and their full scope of equivalents.

1-23. (canceled)
 24. An authorization system comprising: at least oneprocessor; and at least one non-transitory computer readable mediumcontaining instructions that when executed by the at least one processorcause the authorization system to perform operations comprising:receiving electronic transaction data and historical transaction data,the electronic transaction data including an entity identifier componentand an amount component of an electronic transaction; determining, basedon the entity identifier component and the amount component, a locationof the electronic transaction in a distributed representation space, thedistributed representation space comprising a mapping of electronictransaction components in a high-order space; determining locations ofthe historical transaction data in the distributed representation space;determining a decision boundary in the distributed representation spacebased on the locations of the historical transaction data; andauthorizing the electronic transaction based on the location of theelectronic transaction being within the decision boundary.
 25. Theauthorization system of claim 24, wherein the operations furthercomprise: determining a location of an additional electronic transactionin the distributed representation space; and denying the additionalelectronic transaction based on the location of the additionalelectronic transaction being outside of the decision boundary.
 26. Theauthorization system of claim 24, wherein the historical transactiondata is limited to electronic transactions including componentssatisfying one or more criteria.
 27. The authorization system of claim26, wherein the one or more criteria includes electronic transactionsassociated with a specified merchant identifier.
 28. The authorizationsystem of claim 26, wherein the one or more criteria includes electronictransactions associated with a specified customer identifier.
 29. Theauthorization system of claim 26, wherein the one or more criteriaincludes electronic transactions associated with transaction amountsexceeding a specified amount.
 30. The authorization system of claim 24,wherein the distributed representation space comprises first rowscorresponding to entities and second rows corresponding to amountranges.
 31. The authorization system of claim 30, wherein determiningthe location of the electronic transaction includes: identifying rows ofthe distributed representation, the identified rows including a firstrow corresponding to a value of the entity identifier component and oneof the second rows corresponding to a value of the amount component; anddetermining the location of the electronic transaction as a linearcombination of the identified rows.
 32. The authorization system ofclaim 24, wherein the electronic transaction data further includes atleast one of an electronic transaction time component, a day of weekcomponent, a day of month component, and a day of year component. 33.The authorization system of claim 24, wherein the operations furthercomprise determining a fraud score based on fraud criteria and thedistributed representation space.
 34. The authorization system of claim33, wherein the fraud criteria include at least one of: a card notpresent indication, a geographic location associated with the entityidentifier, and a predetermined category corresponding to the entityidentifier.
 35. A computer-implemented method for generating adistributed representation of electronic transaction data, comprising:receiving electronic transaction data and historical transaction data,the electronic transaction data including an entity identifier componentand an amount component of an electronic transaction; determining, basedon the entity identifier component and the amount component, a locationof the electronic transaction in a distributed representation space, thedistributed representation space comprising a mapping of electronictransaction components in a high-order space; determining locations ofthe historical transaction data in the distributed representation space;determining a decision boundary in the distributed representation spacebased on the locations of the historical transaction data; andauthorizing the electronic transaction based on the location of theelectronic transaction being within the decision boundary.
 36. Thecomputer-implemented method of claim 35, wherein the method furthercomprises: determining a location of an additional electronictransaction in the distributed representation space; and denying theadditional electronic transaction based on the location of theadditional electronic transaction being outside of the decisionboundary.
 37. The computer-implemented method of claim 35, wherein thehistorical transaction data is limited to electronic transactionsincluding components satisfying one or more criteria.
 38. Thecomputer-implemented method of claim 35, wherein the distributedrepresentation space comprises first rows corresponding to entities andsecond rows corresponding to amount ranges.
 39. The computer-implementedmethod of claim 38, wherein determining the location of the electronictransaction includes: identifying rows of the distributedrepresentation, the identified rows including a first row correspondingto a value of the entity identifier component and one of the second rowscorresponding to a value of the amount component; and determining thelocation of the electronic transaction as a linear combination of theidentified rows.
 40. The computer-implemented method of claim 35,wherein the electronic transaction data further includes at least one ofan electronic transaction time component, a day of week component, a dayof month component, and a day of year component.
 41. Thecomputer-implemented method of claim 35, wherein the method furthercomprises determining a fraud score based on fraud criteria and thedistributed representation space.
 42. The computer-implemented method ofclaim 41, wherein the fraud criteria include at least one of: a card notpresent indication, a geographic location associated with the entityidentifier, and a predetermined category corresponding to the entityidentifier.
 43. A non-transitory computer-readable medium storinginstructions that, when executed by at least one processor, areconfigured to cause at least one processor to perform a method, themethod comprising: receiving electronic transaction data and historicaltransaction data, the electronic transaction data including an entityidentifier component and an amount component of an electronictransaction; determining, based on the entity identifier component andthe amount component, a location of the electronic transaction in adistributed representation space, the distributed representation spacecomprising a mapping of electronic transaction components in ahigh-order space; determining locations of the historical transactiondata in the distributed representation space; determining a decisionboundary in the distributed representation space based on the locationsof the historical transaction data; and authorizing the electronictransaction based on the location of the electronic transaction beingwithin the decision boundary.