The invention relates generally to a usage of a transportation resource and more particularly to the verification of a usage of a transportation resource.
Transportation resources are limited. As a consequence, accesses to the limited transportation resources need to be distributed in a rational manner. For example, a new trend is emerging in the world as a method to reduce traffic congestion and to assign the cost impact of transportation resources to those consuming the resources, which is normally referred as road user charging. Road user charging requires active monitoring of vehicles and their use of roads, including, e.g., a chargeback for the use of congested segments at peak times. The process may also provide alternative routes which provide faster service at a higher cost, or even vary the cost of a road segment, e.g., a tunnel or bridge, to reduce congestion at peak times.
In a recent business model, users of transportation resources must pay for their usage through some means, for example, various fuel taxes. The amount of fuel tax paid is tied to the amount of fuel purchased within the defined geographic area of the government overseeing the transportation. If a user does not pay the appropriate amount in fuel taxes for its amount of usage of transportation resources in a defined specific geographic area, additional costs would be collected via other means. On the other hand, if a user pays too much in fuel taxes with respect to the actual usage of the transportation resources, refunds in fees would be made to the user.
Within this business model, it is important to prevent fraud or abuse of a transportation resource distribution/charging system. If a vehicle fraudulently shows lower usage than the actual usage, an undeserved refund in fees would occur. On the other hand, a situation might be that an overage in fuel tax payments results in a miss-match of payment and usage. As a consequence, incompliant behaviors in this model, such as frauds or abuses, will cause compliance costs to rise to offset the loss due to incompliant behaviors.
Given the emerging nature of this business model, no specific solution exists in the market today to provide a safeguard required to verify a usage of the transportation resources to prevent potential fraud regarding the charging of transportation resource usage. Based on the above, there is a need to verify a usage of a transportation resource.
A method, system and computer program product for verifying a usage of a transportation resource by an object user of the transportation resource is disclosed. A peer group of users that are expected to behave similarly as the object user is established to determine a normal behavior that the object user is supposed to act consistent with. An observed behavior of the object user is compared to the normal behavior to verify a usage of the transportation resource by the object user.
A first aspect of the invention is directed to a method for verifying a usage of a transportation resource by an object user of the transportation resource, the method comprising steps of: selecting a peer group of users that are expected to have similar behavior as the object user; identifying a set of behavioral attributes of the peer group; determining a normal behavior of the peer group regarding the identified set of behavioral attributes; and comparing a behavior of the object user to the normal behavior regarding the identified set of behavior attributes to verify the usage of the object user.
A second aspect of the invention is directed to a system for verifying a usage of a transportation resource by an object user of the transportation resource, the system comprising: a means for selecting a peer group of users that are expected to have similar behavior as the object user; a means for identifying a set of behavioral attributes of the peer group; a means for determining a normal behavior of the peer group regarding the identified set of behavioral attributes; and a means for comparing a behavior of the object user to the normal behavior regarding the identified set of behavior attributes to verify the usage of the object user.
A third aspect of the invention is directed to a computer program product for verifying a usage of a transportation resource by an object user of the transportation resource, the computer program product comprising: computer usable program code configured to: select a peer group of users that are expected to have similar behavior as the object user; identify a set of behavioral attributes of the peer group; determine a normal behavior of the peer group regarding the identified set of behavioral attributes; and compare a behavior of the object user to the normal behavior regarding the identified set of behavior attributes to verify the usage of the object user.
A fourth aspect of the invention is directed to a method of generating a system for verifying a usage of a transportation resource by an object user of the transportation resource, the method comprising: providing a computer infrastructure operable to: select a peer group of users that are expected to have similar behavior as the object user; identify a set of behavioral attributes of the peer group; determine a normal behavior of the peer group regarding the identified set of behavioral attributes; compare a behavior of the object user to the normal behavior regarding the identified set of behavior attributes to verify the usage of the object user; and communicate a result of the verification to a customer of the system.
Other aspects and features of the present invention, as defined solely by the claims, will become apparent to those ordinarily skilled in the art upon review of the following non-limited detailed description of the invention in conjunction with the accompanying figures.
The embodiments of this invention will be described in detail, with reference to the following figures, wherein like designations denote like elements, and wherein:
The following detailed description of embodiments refers to the accompanying drawings, which illustrate specific embodiments of the invention. Other embodiments having different structures and operations do not depart from the scope of the present invention.
Referring to
User 16 communicates with processing center 12 regarding, for example, usage of the transportation resource, taxes paid, refunds and/or additional charges to be collected. User 16 also communicates with monitoring units 14 in the process of data collecting. For example, user 16 pays fuel tax in gas stations and pays highway fees in toll booths. In charging system 10, an object user (16) is generally a user (16) of a transportation resource. However, for illustrative purposes only, in the following description, a user (16) is referred as an object user (16) when this user's case is processed by processing center 12, e.g., when the usage of a transportation resource by this specific user is to be verified as described below. It should be noted that in charging system 10, regardless of whether a user is an object user, its usage of transportation resources is monitored because: (a) any user may potentially become an object user, and (b) any user may be selected into a peer group as described later. Details of computer system 100 of processing center 12 will be described below.
Referring to
As shown in
Inputs to computer system 100 include monitoring inputs 160, operator inputs 162 and transportation resource (TR) user inputs 164. Monitoring inputs 160 include the data collected by monitoring units 14 (
Transportation resource usage verifying system 132 functions generally to verify whether an observed usage of a transportation resource that is to be used to process a usage charge represents the actual usage by an object user 16 (
According to one embodiment, the processing of collecting and refund by collecting and refund unit 200 (
Referring now to
For each specific user 16 (
User characteristics data include data regarding characteristics of a user (16) that affect the usage of road by the user (16). As is understandable, user characteristics are generally related to road usage indirectly, i.e., they do not directly indicate road usage, instead they affect road usage. For example, a taxi driver (user characteristic) tends to use road more frequently than an ordinary commute driver, and tends to have low gas/mileage efficiency because of frequent stops. But being a taxi driver does not directly indicate the amount of road usage. In step S201, user characteristic data and road usage data (usage indicators) may be organized together in a table to facilitate further analysis.
Next in step S202, normal behavior determinator 142 determines a normal behavior that object user 16 (
It should be noted that road usage indicators may also be used, independently or together with user characteristics data, to select peer groups. For example, a group of users 16 having similar behaviors regarding some of the road usage indicators may be expected to have similar behaviors regarding other road usage indicators. In the following description, however, selection of a peer group using user characteristics data is used as an illustrative example for descriptive purpose only.
It should also be noted that the selection of a peer group is performed by verifying system 132, specifically sampler 144, independent of user 16 interventions. No information regarding the peer group selection, for example, standards, procedures, and/or results, will be communicated to user 16. This is to ensure that object user 16 and other users having the potential of being selected into a peer group will not coordinate in a fraudulent type of actions, which will be more difficult to detect.
According to one embodiment, in step S202a, sampler 144 first identifies a pool of all the users that have the same (or similar) user characteristics as object user 16. Next, sampler 144 samples a peer group from the pool. One reason for sampling a peer group from the pool is to save system resources of computer system 100 (
Next in step S202b, behavioral attribute identifier 145 identifies a set of usage indicators, regarding which object user 16 is expected to behave similarly as the peer group identified in step S202a. The identified set of usage indicators is referred to as behavioral attributes, for illustrative purpose only. For a specific object user 16, it may not be expected that he behaves similarly regarding all road usage indicators, instead it is expected that object user 16 behaves similarly regarding some usage indicators. For example, an object taxi driver (user) may be expected to behave similarly regarding gas mileage as his peer group, but may not be expected to take the similar routes as detected by, e.g., a GPS device in the taxi car, as the peer group. Please note, behaving similarly includes similar behavior regarding each behavioral attribute or similar relationship between and among the behavioral attributes.
According to one embodiment, the selection of behavioral attributes may be based on statistical analysis of the behaviors of the selected peer group regarding road usage indicators. For example, a standard deviation of the peer group behaviors regarding a specific road usage indicator may be compared to a threshold, for example, standard deviation being less than 5 percent of mean. If the standard deviation of the peer group behaviors regarding a specific road usage indicator meets the threshold, that specific road usage indicator may be selected as a behavioral attribute.
According to an alternative embodiment, the selection of behavioral attributes may be based on empirical data/past cases of fraud in road usage charging. For example, past cases of fraud may show that for a user with a specific kind of user characteristic, frauds in road usage charging generally involve strange behaviors regarding a certain road usage indicators. The certain road usage indicators may be selected as the behavioral attributes. It should be noted that any now known or later developed methods of selecting behavior attributes are also included in the current invention. It should also be noted that those methods may used independently or in combination in selecting behavior attributes.
Next in step S202c, normal behavior determinator 142 determines a normal behavior of the peer group selected for object user 16 regarding the set of behavioral attributes identified in step S202b. Various methods may be used to determine the normal behavior. According to one embodiment, if the identified behavioral attributes have some kinds of causal or non-causal relationship, a statistical description of the relationship, such as a correlation table or a regression equation may be used to identify the normal behavior. For example, a mileage of a vehicle of object user 16 may be related to fuel consumption, time of use (e.g., whether peak traffic time or not), route taken (e.g., highway or not), and age of object user 16, etc. Using the data of the peer group, a regression equation may be obtained as follows:
Mileage=A*Fuel+B*Time+C*Route+D*age (1)
Regression equation (1) may be used to describe the normal behavior. As described above, object user 16 behaving similarly as the peer group includes similar relationship between and among the behaviors (data values) regarding each behavioral attribute as the peer group. Regression equation (1) represents such a similar relationship. That is, if the behaviors (data values) of object user 16 regarding behavioral attributes, e.g., mileage, fuel consumption, time of use, route taken, and age, conform to equation (1), object user 16 is considered behaving similarly as the peer group.
According to an alternative embodiment, especially when the identified behavioral attributes do not have a reasonable relationship, the statistical mean of the behaviors of the peer group regarding a behavioral attribute may be selected as the normal behavior regarding this behavioral attribute. The statistical mean may be either average or median depending on the specific object user 16 and the peer group. According to one embodiment, an average is a better choice because a standard deviation is calculated based on the average, instead of the median. As will be described below, a standard deviation will be used in further analysis. It should be noted that any now existing and later developed methods of determining a normal behavior are included in the scope of the present invention.
Next in step S203, usage verifier 148 verifies an observed road usage of object user 16. Specifically, in step S203a, comparator 150 compares the behavior of object user 16 with the normal behavior determined in step S202 regarding the identified set of behavioral attributes. The specific procedure of the comparison depends on how the normal behavior is determined in step S202c. According to one embodiment, if the normal behavior is determined using, e.g., regression equation (1), comparator 150 incorporates the observed behaviors of object user 16 (
Similarly, comparator 150 may obtain an obtained value for each of the identified behavioral attributes and compare the obtained value with the observed value. A difference between the obtained value and the observed value of each behavioral attribute may be converted into a score between 0 and 1000. Any now known and later developed score normalization procedures may be used in the conversion, and are included in the present invention. Because the details of the conversion are not necessary for an understanding of the invention, further details will not be provided.
According to an alternative embodiment, if the normal behavior is determined using the mean of the peer group behaviors regarding each identified behavioral attribute, comparator 150 compares the observed behavior of object user 16 with the normal behavior with respect to each of the identified set of behavioral attributes. The difference between the observed behavior and the normal behavior with respect to each behavioral attribute may be converted into a 0 to 1000 score using the same procedure described above. It should be noted that any now existing or later developed method of comparing an observed behavior with the normal behavior are included in the current invention.
Next in step S203b, combiner 152 combines the comparison results, i.e., the scores, with respect to each behavioral attribute to generate an overall comparison results, i.e., a combined score. The combined score may be compared to a threshold to determine whether the observed usage represents the actual usage of object user 16 (
If the combined score is larger than a pre-set threshold, i.e., not meeting the threshold, the observed usage is considered not representing the actual usage, and it is considered that a fraud is probably involved in obtaining the observed usage. In this case, verifying system 132 will communicate the verifying result to investigating unit 300 through verifying result outputs 166 (
Referring now to
Next in step S303, prospective abnormal behavior detector 154 detects an abnormal behavior of object user 16 before an observed usage of object user 16 is to be processed by processing center 12 and verified by verifying system 132 in a historic analysis operation. Specifically, in step S303a, perspective abnormal behavior detector 154 compares a behavior of object user 16 detected by monitoring units 14 (
Next in step S303b, prospective abnormal behavior detector 154 compares a behavior of object user 16 detected by monitoring units 14 (
While shown and described herein as a method and system for verifying a usage of a transportation resource, it is understood that the invention further provides various alternative embodiments. For example, in one embodiment, the invention provides a program product stored on a computer-readable medium, which when executed, enables a computer infrastructure to verify a usage of a transportation resource. To this extent, the computer-readable medium includes program code, such as computer system 100 (
In another embodiment, the invention provides a method of generating a system for verifying a usage of a transportation resource. In this case, a computer infrastructure, such as computer system 100 (
In still another embodiment, the invention provides a business method that performs the process described herein on a subscription, advertising supported, and/or fee basis. That is, a service provider could offer to verify a usage of a transportation resource as described herein. In this case, the service provider can manage (e.g., create, maintain, support, etc.) a computer infrastructure, such as computer system 100 (
As used herein, it is understood that the terms “program code” and “computer program code” are synonymous and mean any expression, in any language, code or notation, of a set of instructions that cause a computing device having an information processing capability to perform a particular function either directly or after any combination of the following: (a) conversion to another language, code or notation; (b) reproduction in a different material form; and/or (c) decompression. To this extent, program code can be embodied as one or more types of program products, such as an application/software program, component software/a library of functions, an operating system, a basic I/O system/driver for a particular computing and/or I/O device, and the like. Further, it is understood that the terms “component” and “system” are synonymous as used herein and represent any combination of hardware and/or software capable of performing some function(s).
The flowcharts and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the blocks may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
Although specific embodiments have been illustrated and described herein, those of ordinary skill in the art appreciate that any arrangement which is calculated to achieve the same purpose may be substituted for the specific embodiments shown and that the invention has other applications in other environments. This application is intended to cover any adaptations or variations of the present invention. The following claims are in no way intended to limit the scope of the invention to the specific embodiments described herein.