Patent attributes
A computer-implemented technique provides a compromised payment card risk assessment. The technique involves gathering, by processing circuitry, compromised payment card data. The technique further involves identifying, by the processing circuitry, a set of compromised payment cards from the compromised payment card data. The technique further involves providing, in response to identifying the set of compromised payment cards and by the processing circuitry, a compromised payment card assessment report which includes a set of payment card entries corresponding to the set of compromised payment cards. Each payment card entry includes (i) identification data which identifies a respective compromised payment card and (ii) a score which indicates an estimated likelihood that the respective compromised payment card will actually be used for fraud. Such scores may be based on summations of different sub-scores and serve as overall numerical measures of risk.