COMPREHENSIVE SUSPICIOUS ACTIVITY MONITORING AND ALERT SYSTEM
First Claim
1. An apparatus for risk management, the apparatus comprising:
- a computing platform including at least one processor and a memory;
a risk database stored in the memory and configured to receive financial institution data, from a plurality of financial institutions, wherein the financial institution data includes transaction data associated with a plurality of financial institution products and a plurality of financial institution channels; and
a suspicious activity monitoring routine stored in the memory, executable by the processor and configured to analytically monitor the financial institution data to identify suspicious activity potentially associated with an identity theft incident.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the present invention relate to systems, apparatus, methods and computer program products for integrated risk management. More specifically, embodiments of the present invention provide for monitoring financial institution data from a plurality of financial institutions, including transactional data associated with multiple products and channels, to identify suspicious activity potentially associated with identity theft incidents and, in specific embodiments, communicate suspicious activity and/or identity theft alerts and/or reports in response to identifying the suspicious activities and/or confirming an identity theft incident associated with the suspicious activity. In further embodiments, the monitored financial institution may include one or more, and in some embodiments all of, account data, asset data, liability data, negative file data, customer data, device data, credit data, or biometric data. In addition, in certain embodiments, the monitored data may include non-financial institution data.
-
Citations
69 Claims
-
1. An apparatus for risk management, the apparatus comprising:
-
a computing platform including at least one processor and a memory; a risk database stored in the memory and configured to receive financial institution data, from a plurality of financial institutions, wherein the financial institution data includes transaction data associated with a plurality of financial institution products and a plurality of financial institution channels; and a suspicious activity monitoring routine stored in the memory, executable by the processor and configured to analytically monitor the financial institution data to identify suspicious activity potentially associated with an identity theft incident. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A method for risk management, the method comprising:
-
receiving, at a risk database stored in computing device memory, financial institution data from a plurality of financial institutions, including transaction data associated with a plurality of financial institution products and a plurality of financial institution channels; monitoring, via a computing device processor, the risk database to identify a suspicious activity potentially associated with an identity theft incident; and initiating, via a computing device processor, a risk management action in response to identification of the suspicious activity. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46)
-
-
47. A computer program product comprising:
-
a computer-readable medium comprising; a first set of codes for causing a computer to receive financial institution data from a plurality of financial institutions, including transaction data associated with a plurality of financial institution products and a plurality of financial institution channels; a second set of codes for causing a computer to monitor the risk database to identify a likelihood of a suspicious activity potentially associated with an identity theft incident; and a third set of codes for causing a computer to initiate a risk management action in response to identification of the suspicious activity. - View Dependent Claims (48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69)
-
Specification