Improper financial activity detection tool

    公开(公告)号:US09947044B2

    公开(公告)日:2018-04-17

    申请号:US14148080

    申请日:2014-01-06

    CPC classification number: G06Q40/00

    Abstract: An illustrative method for identifying information associated with a ring of individuals performing improper financial activities may include combining a list of user identifiers with one or more attributes tables corresponding to the financial transactions. A computer device may analyze a first list of identifiers in relation to an attribute table, where the identifiers may be associated with one or more suspected improper financial activities and the attribute table may include attributes of one or more financial transactions performed over a specified duration. The computer device may then link the first list of identifiers with one or more attributes included in the attribute table to determine a second list of identifiers and the process may be repeated until a stopping condition has been reached. After the stopping condition has been met, the computer device may communicate a report to a user.

    Improper Financial Activity Detection Tool
    4.
    发明申请
    Improper Financial Activity Detection Tool 有权
    不正确的财务活动检测工具

    公开(公告)号:US20150193865A1

    公开(公告)日:2015-07-09

    申请号:US14148080

    申请日:2014-01-06

    CPC classification number: G06Q40/00

    Abstract: An illustrative method for identifying information associated with a ring of individuals performing improper financial activities may include combining a list of user identifiers with one or more attributes tables corresponding to the financial transactions. A computer device may analyze a first list of identifiers in relation to an attribute table, where the identifiers may be associated with one or more suspected improper financial activities and the attribute table may include attributes of one or more financial transactions performed over a specified duration. The computer device may then link the first list of identifiers with one or more attributes included in the attribute table to determine a second list of identifiers and the process may be repeated until a stopping condition has been reached. After the stopping condition has been met, the computer device may communicate a report to a user.

    Abstract translation: 用于识别与执行不正当金融活动的个人戒指相关联的信息的说明性方法可以包括将用户标识符列表与对应于金融交易的一个或多个属性表组合。 计算机设备可以分析关于属性表的标识符的第一列表,其中标识符可以与一个或多个可疑的不当财务活动相关联,并且属性表可以包括在指定的持续时间内执行的一个或多个金融交易的属性。 然后,计算机设备可以将标识符的第一列表与包括在属性表中的一个或多个属性链接以确定标识符的第二列表,并且可以重复该过程直到达到停止条件。 在满足停止条件之后,计算机设备可以向用户传送报告。

    Dynamic Record Identification and Analysis Computer System with Event Monitoring Components

    公开(公告)号:US20200344255A1

    公开(公告)日:2020-10-29

    申请号:US16929150

    申请日:2020-07-15

    Abstract: Aspects of the disclosure relate to deploying and utilizing a dynamic record identification and analysis computer system with event monitoring components. A computing device may receive account reconnaissance data identifying a first plurality of user accounts that have experienced at least one event associated with account security concern characteristics. The computing platform may analyze event history data associated with the first plurality of user accounts to identify one or more common interactions associated with a subset of the first plurality of user accounts. The computing platform may identify a point of compromise among the subset of the first plurality of user accounts. Subsequently, the computing platform may search enterprise user account records to identify a second plurality of user accounts that have at least one event associated with the point of compromise. The computing platform may add the second plurality of user accounts to an alert table.

    Improper Financial Activity Detection Tool
    6.
    发明申请

    公开(公告)号:US20180204278A1

    公开(公告)日:2018-07-19

    申请号:US15918717

    申请日:2018-03-12

    CPC classification number: G06Q40/00

    Abstract: An illustrative method for identifying information associated with a ring of individuals performing improper financial activities may include combining a list of user identifiers with one or more attributes tables corresponding to the financial transactions. A computer device may analyze a first list of identifiers in relation to an attribute table, where the identifiers may be associated with one or more suspected improper financial activities and the attribute table may include attributes of one or more financial transactions performed over a specified duration. The computer device may then link the first list of identifiers with one or more attributes included in the attribute table to determine a second list of identifiers and the process may be repeated until a stopping condition has been reached. After the stopping condition has been met, the computer device may communicate a report to a user.

    System and Network for Detecting Unauthorized Activity

    公开(公告)号:US20170221167A1

    公开(公告)日:2017-08-03

    申请号:US15009057

    申请日:2016-01-28

    CPC classification number: G06Q50/265

    Abstract: Methods, systems, and computer-readable media for identifying unauthorized activity events, assessing the unauthorized activity event and evaluating a potential impact of the unauthorized activity event are provided. In some examples, upon detection of an unauthorized activity event, merchant data may be received for a first evaluation time period. If a sufficient number of events has occurred in the first evaluation time period, additional data may be retrieved and analyzed to determine a control limit related to an expected rate of events. The number of events in the first evaluation time period may then be compared to the control limit and, if the number exceeds the control limit, a priority score for the merchant may be generated. Additional data, such as merchant category, particular state, and/or particular city data, may be analyzed in order to provide a more granular evaluation of a merchant.

    Dynamic record identification and analysis computer system with event monitoring components

    公开(公告)号:US10757123B2

    公开(公告)日:2020-08-25

    申请号:US15944908

    申请日:2018-04-04

    Abstract: Aspects of the disclosure relate to deploying and utilizing a dynamic record identification and analysis computer system with event monitoring components. A computing device may receive account reconnaissance data identifying a first plurality of user accounts that have experienced at least one event associated with account security concern characteristics. The computing platform may analyze event history data associated with the first plurality of user accounts to identify one or more common interactions associated with a subset of the first plurality of user accounts. The computing platform may identify a point of compromise among the subset of the first plurality of user accounts. Subsequently, the computing platform may search enterprise user account records to identify a second plurality of user accounts that have at least one event associated with the point of compromise. The computing platform may add the second plurality of user accounts to an alert table.

    Dynamic Record Identification and Analysis Computer System with Event Monitoring Components

    公开(公告)号:US20190230104A1

    公开(公告)日:2019-07-25

    申请号:US15944908

    申请日:2018-04-04

    Abstract: Aspects of the disclosure relate to deploying and utilizing a dynamic record identification and analysis computer system with event monitoring components. A computing device may receive account reconnaissance data identifying a first plurality of user accounts that have experienced at least one event associated with account security concern characteristics. The computing platform may analyze event history data associated with the first plurality of user accounts to identify one or more common interactions associated with a subset of the first plurality of user accounts. The computing platform may identify a point of compromise among the subset of the first plurality of user accounts. Subsequently, the computing platform may search enterprise user account records to identify a second plurality of user accounts that have at least one event associated with the point of compromise. The computing platform may add the second plurality of user accounts to an alert table.

Patent Agency Ranking