Suspicious persons database
First Claim
1. A method of processing financial transactions from a customer at an unmanned location, the method comprising:
- acquiring customer identification information from at least one customer;
acquiring transaction information associated with one or more previous financial transactions performed by the customer, wherein the transaction information comprises information about a financial instrument and wherein the transaction information is different than the customer identification information;
determining suspicious activity associated with the one or more previous financial transactions by identifying one or more validation errors in the transaction information wherein the validation errors comprise at least one of the group consisting of amount mismatch, fraudulent endorsement, magnetic ink not detected, altered magnetic ink recognition number, altered payee, negotiable instrument identified as stolen, negotiable instrument identified as stop pay, negotiable instrument identified as already cashed, Mod 10 validation failure, credit header validation failure, negotiable instrument type mismatch, postdated negotiable instrument, negotiable instrument date mismatch, and negotiable instrument does not exist in positive pay file;
calculating a suspicious activity score for the customer wherein the suspicious activity score is based at least in part on the validation errors such that the suspicious activity score is indicative of a level of suspicion associated with the one or more previous financial transactions performed by the customer;
storing the suspicious activity score in a database wherein the database associates the suspicious activity score with the customer identification information that identifies the customer;
acquiring customer identification information and transaction information for a current financial transaction;
determining suspicious activity associated with the current financial transaction by identifying one or more validation errors in the transaction information associated with the current financial transaction;
using the customer identification information to retrieve the suspicious activity score stored in the database that is indicative of a level of suspicion associated with the one or more previous financial transactions conducted by the consumer;
modifying the suspicious activity score based at least in part on validation errors in the transaction information associated with the current financial transaction; and
authorizing the current financial transaction based at least in part on the whether the suspicious activity score is acceptable.
8 Assignments
0 Petitions
Accused Products
Abstract
Most financial transactions involving check deposits and cashing at automatic teller machines are often associated with high risk. Although conventional security measures for many automatic teller machines record financial transactions, the recorded events are typically viewed after suspicious or criminal activity has already occurred. Therefore, a financial institution may not know in advance whether requested financial transactions are of suspicious or fraudulent intent. The present teachings relate to a method of scoring customers prior to authorization in a manner so as to identify suspicious behavior or suspicious activity. The method also relates to marking suspicious individuals by storing related transaction information, such as biometric data, in a database for purposes of verifying identification information and scoring the validity of future financial transactions.
181 Citations
20 Claims
-
1. A method of processing financial transactions from a customer at an unmanned location, the method comprising:
-
acquiring customer identification information from at least one customer; acquiring transaction information associated with one or more previous financial transactions performed by the customer, wherein the transaction information comprises information about a financial instrument and wherein the transaction information is different than the customer identification information; determining suspicious activity associated with the one or more previous financial transactions by identifying one or more validation errors in the transaction information wherein the validation errors comprise at least one of the group consisting of amount mismatch, fraudulent endorsement, magnetic ink not detected, altered magnetic ink recognition number, altered payee, negotiable instrument identified as stolen, negotiable instrument identified as stop pay, negotiable instrument identified as already cashed, Mod 10 validation failure, credit header validation failure, negotiable instrument type mismatch, postdated negotiable instrument, negotiable instrument date mismatch, and negotiable instrument does not exist in positive pay file; calculating a suspicious activity score for the customer wherein the suspicious activity score is based at least in part on the validation errors such that the suspicious activity score is indicative of a level of suspicion associated with the one or more previous financial transactions performed by the customer; storing the suspicious activity score in a database wherein the database associates the suspicious activity score with the customer identification information that identifies the customer; acquiring customer identification information and transaction information for a current financial transaction; determining suspicious activity associated with the current financial transaction by identifying one or more validation errors in the transaction information associated with the current financial transaction; using the customer identification information to retrieve the suspicious activity score stored in the database that is indicative of a level of suspicion associated with the one or more previous financial transactions conducted by the consumer; modifying the suspicious activity score based at least in part on validation errors in the transaction information associated with the current financial transaction; and authorizing the current financial transaction based at least in part on the whether the suspicious activity score is acceptable. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system for processing financial transactions from customers at an unmanned location, the system comprising:
-
an interactive component positioned at the unmanned location, wherein the interactive component is configured to obtain transaction information relating to a financial transaction performed by a customer, wherein the transaction information comprises information about a financial instrument and wherein the interactive component is further configured to obtain customer identification information that identifies the customer, wherein the customer identification information is different than the transaction information; a calculating component that generates a suspicious activity score for the customer wherein the suspicious activity score is based at least in part on one or more validation errors in the transaction information and wherein the suspicious activity score is indicative of a level of suspicion associated with customer activity and wherein the calculating component periodically modifies the suspicious activity score based on the customer activity, wherein the validation errors comprise at least one of the group consisting of amount mismatch, fraudulent endorsement, magnetic ink not detected, altered magnetic ink recognition number, altered payee, negotiable instrument identified as stolen, negotiable instrument identified as stop pay, negotiable instrument identified as already cashed, Mod 10 validation failure, credit header validation failure, negotiable instrument type mismatch, postdated negotiable instrument, negotiable instrument date mismatch, and negotiable instrument does not exist in positive pay file; a storage component that records the suspicious activity score and associates the suspicious activity score with the customer identification information; and a processing component that receives transaction information from the interactive component and identifies suspicious activity relating to a current financial transaction by obtaining the customer identification information associated with the current financial transaction and accessing the recorded suspicious activity score in the storage component associated with the customer identification information and by modifying the suspicious activity score based at least in part on validation errors in the transaction information associated with the current financial transaction. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification