System and method for identification, detection and investigation of maleficent acts
First Claim
1. A method for identification, detection and investigation of maleficent acts, comprising the steps of:
- receiving one or more transaction datasets;
verifying each transaction dataset identity and classifying each transaction dataset into a first category, a second category and a third category;
detecting and arbitrating ambiguities in each transaction dataset in the second category for reclassifying into the first category and the third category;
investigating each transaction dataset in the third category for affirming the third category classification of a first group of investigated datasets and reclassifying the third category classification of a remaining second group of investigated datasets into the first category classification;
enabling transaction datasets in the first category; and
disabling transaction datasets in the third category.
3 Assignments
0 Petitions
Accused Products
Abstract
The invention relates to enterprise software for enabling organizations to apply business intelligence in an operational environment by integrating real-time transactional data with remote and disparate historical data to achieve true enterprise intelligence for maleficent activity detection, such as fraud and threat detection. It enables a workflow process comprising classification of data in remote disparate databases for identity verification, arbitration of fuzzy differences between data sets for detection of maleficent acts, and investigation of relationships between people, places and events using refined search techniques, analytical tools and visualization methods. The invention receives, verifies and classifies transaction datasets into predefined categories, enables detection and arbitration of ambiguities in the datasets, investigates high risk datasets, enables transaction datasets in a low risk category and disables transaction datasets in a high risk category. Remote similarity search agents are used to search disparate databases to ensure privacy of the information in the disparate databases.
107 Citations
27 Claims
-
1. A method for identification, detection and investigation of maleficent acts, comprising the steps of:
-
receiving one or more transaction datasets;
verifying each transaction dataset identity and classifying each transaction dataset into a first category, a second category and a third category;
detecting and arbitrating ambiguities in each transaction dataset in the second category for reclassifying into the first category and the third category;
investigating each transaction dataset in the third category for affirming the third category classification of a first group of investigated datasets and reclassifying the third category classification of a remaining second group of investigated datasets into the first category classification;
enabling transaction datasets in the first category; and
disabling transaction datasets in the third category. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for identification, detection and investigation of maleficent acts, comprising:
-
a means for receiving one or more transaction datasets;
a means for verifying each transaction dataset identity and classifying each transaction dataset into a first category, a second category and a third category;
a means for detecting and arbitrating ambiguities in each transaction dataset in the second category for reclassifying into the first category and the third category;
a means for investigating each transaction dataset in the third category for affirming the third category classification of a first group of investigated datasets and reclassifying the third category classification of a remaining second group of investigated datasets into the first category classification;
a means for enabling transaction datasets in the first category; and
a means for disabling transaction datasets in the third category. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A method for identification, detection and investigation of maleficent acts, comprising the steps of:
-
controlling a workflow process for classifying transaction datasets into a high risk category and a low risk category, including the steps of;
verifying and classifying transaction datasets;
detecting and arbitrating transaction dataset ambiguities;
investigating high risk transaction datasets for ensuring correct classification;
initiating analytic functions comprising a similarity search function, a biometric function, a rules engine, a neural net, a model engine, an auto link analysis, a decision tree, and a report engine; and
accessing disparate databases including an alias identification database, an expert rules database, a government threat database, public databases, and known threat databases. - View Dependent Claims (27)
-
Specification