METHOD FOR DETECTING FRAUDULENT TRANSACTIONS BETWEEN PRACTICE MANAGEMENT AND ACCOUNTING SOFTWARE
First Claim
Patent Images
1. A method for detecting fraudulent transactions;
- comprising;
acquiring transaction data entered into an accounting software program by a monitoring software program;
acquiring transaction data entered into a practice management software program by a monitoring software program;
configuring the monitoring software program to detect any unusual activity in the acquired transaction data and to store detected unusual activity for later review;
directing the monitoring software to notify a responsible party that unusual activity has been found in the originally acquired data; and
configuring the monitoring software to format the acquired data and the data of the unusual activity into a report reviewable by the responsible party.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for detecting fraudulent transactions includes acquiring transaction data entered into an accounting software program and a practice management software program by a monitoring software program. The monitoring software program can be configured to detect any unusual activity in the acquired transaction data and to store detected unusual activity for later review. The monitoring software can be directed to notify a responsible party that unusual activity has been found in the originally acquired data. The monitoring software can be configured to format the acquired data and the data of the unusual activity into a report reviewable by the responsible party.
-
Citations
20 Claims
-
1. A method for detecting fraudulent transactions;
- comprising;
acquiring transaction data entered into an accounting software program by a monitoring software program; acquiring transaction data entered into a practice management software program by a monitoring software program; configuring the monitoring software program to detect any unusual activity in the acquired transaction data and to store detected unusual activity for later review; directing the monitoring software to notify a responsible party that unusual activity has been found in the originally acquired data; and configuring the monitoring software to format the acquired data and the data of the unusual activity into a report reviewable by the responsible party. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
- comprising;
-
11. A method for detecting fraudulent transactions;
- comprising;
a) enabling a monitoring software program to access entries into an accounting software program; b) enabling a monitoring software program to access entries into a practice management software program; c) configuring the monitoring program to compare and verify entries into the accounting program and practice management program during regular intervals to detect any unusual activity and to store the unusual activity as data for later review; d) notifying a responsible party of the status of the comparison and verification by the monitoring program; e) providing access to the responsible party to data relevant to the unusual activity; and f) allowing the responsible party to resolve unusual activity detected and stored by the monitoring software. - View Dependent Claims (12, 13, 14, 15, 16, 17)
- comprising;
-
18. A method for detecting fraudulent transactions;
- comprising;
a) enabling a monitoring software program to access entries into an accounting software program; b) enabling a monitoring software program to access entries into a practice management software program; b) configuring the monitoring program to compare and verify entries into the accounting program and the practice management program during regular intervals to detect any unusual activity and to store the unusual activity as data for later review; c) notifying a responsible party of the status of the comparison and verification by the monitoring program; d) providing access to the responsible party to data relevant to the unusual activity; e) allowing the responsible party to resolve unusual activity flagged by the monitoring software by deleting unusual transaction data if desired, and saving unusual transaction data for later use if unusual activity is unresolvable; and f) creating a police report and affidavit used in reporting and prosecuting embezzlement crimes with the saved unusual transaction data. - View Dependent Claims (19, 20)
- comprising;
Specification