Money transfer evaluation systems and methods
First Claim
Patent Images
1. A method for evaluating electronic value transfers, the method comprising:
- receiving a plurality of money transfer requests, wherein the money transfer requests include a first sender identification associated with a first money transfer request and at least a second sender identification associated with a second money transfer request;
electronically storing records of the money transfer requests;
performing an analysis of the records, wherein the analysis indicates the first sender identification and the second sender identification are related;
creating a reference designator, wherein the reference designator is associated with the first sender identification and the second sender identification; and
searching the records of the money transfer requests according to a specified criteria to determine if any of the money transfer requests associated with the reference designator are suspect money transfer requests; and
flagging any suspect money transfer requests.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for evaluating electronic value transfers. Various of the methods include receiving money transfer requests, electronically storing records of the money transfer requests, and performing an analysis of the records. The analysis of the records can indicate that two or more of the records are related. The related records are associated with a reference designator that is used to search money transfer records and identify suspect activity. The systems can include a fraud processing system associated with a money transfer system.
-
Citations
27 Claims
-
1. A method for evaluating electronic value transfers, the method comprising:
-
receiving a plurality of money transfer requests, wherein the money transfer requests include a first sender identification associated with a first money transfer request and at least a second sender identification associated with a second money transfer request;
electronically storing records of the money transfer requests;
performing an analysis of the records, wherein the analysis indicates the first sender identification and the second sender identification are related;
creating a reference designator, wherein the reference designator is associated with the first sender identification and the second sender identification; and
searching the records of the money transfer requests according to a specified criteria to determine if any of the money transfer requests associated with the reference designator are suspect money transfer requests; and
flagging any suspect money transfer requests. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method for evaluating electronic value transfers, the method comprising:
-
accessing a money transfer record, wherein the money transfer record includes a sender identification and a receiver identification;
assigning a master location identifier to the money transfer record, wherein the master location identifier is determined by one or both of the sender identification and the receiver identification;
comparing the money transfer record to a reference designator using a specified criteria, wherein one or more fields of the reference designator or the money transfer record indicate a relationship between the reference designator and the money transfer record; and
associating the money transfer record with the reference designator.
-
-
17. A method for iteratively compiling suspect money transfer activities from money transfer records, the method comprising:
-
accessing a first money transfer record;
providing a first reference designator, wherein the first reference designator is associated with one or more of a sender identification and a receiver identification from a second money transfer record;
comparing the first money transfer record to the first reference designator using a specified criteria, wherein the comparison indicates the first money transfer record is not related to the first reference designator; and
creating a second reference designator, wherein the second reference designator is associated with one or more of a sender identification and a receiver identification from the first money transfer record. - View Dependent Claims (18, 19, 20, 21, 22)
-
-
23. A method for evaluating electronic value transfers, the method comprising:
-
receiving money transfer requests, wherein the money transfer requests include a user identification associated each of the money transfer requests;
electronically storing records of the money transfer requests;
providing the records of the money transfer requests to a fraud processing computer; and
receiving an indication of a suspect money transfer request, wherein the indication includes the user identification associated with the suspect money transfer request.
-
-
24. A system for evaluating value transfers, the system comprising:
-
a fraud processing computer; and
a computer readable medium associated with the fraud processing computer, wherein the computer readable medium comprises computer instructions executable by the fraud processing computer to;
access a first money transfer record;
provide a first reference designator, wherein the first reference designator is associated with one or more of a sender identification and a receiver identification from a second money transfer record;
compare the first money transfer record to the first reference designator using a specified criteria, wherein the comparison indicates the first money transfer record is not related to the first reference designator; and
create a second reference designator, wherein the first reference designator is associated with one or more of a sender identification and a receiver identification from the first money transfer record. - View Dependent Claims (25, 26)
-
-
27. A system for transferring value, the system comprising:
-
a money transfer system; and
a fraud processing server communicably coupled to the money transfer system, wherein money transfer records associated with the money transfer system are accessible by the fraud processing server to identify any suspect money transfers.
-
Specification