×

System and method for MICR-based duplicate detection and management

  • US 8,060,442 B1
  • Filed: 04/21/2008
  • Issued: 11/15/2011
  • Est. Priority Date: 05/01/2007
  • Status: Active Grant
First Claim
Patent Images

1. A computer readable storage medium encoded with instructions, execution of the instructions by a computing device causing the computing device to perform steps of:

  • detecting that a presented item in a payment stream is a suspect item by determining that MICR data for the presented item matches MICR data of a previous item in the payment stream, the payment stream comprising a plurality of channels, the channels in the payment stream including at least a first channel and a second channel, a financial institution receiving the presented item over the first channel, the financial institution receiving the previous item over the second channel, the first channel and the second channel being different ones of the following types of channels;

    a check processing channel, a local image capture channel, and a distributed image capture channel;

    after determining that the presented item is a suspect item, evaluating the presented item against a set of suspect rules to determine whether the presented item is a false positive, wherein false positives are suspect items that are not actually duplicates of other ones of the presented items;

    after determining that the presented item is not a false positive, sending the presented item for research;

    receiving an inquiry file containing MICR data for presented items in the payment stream;

    evaluating the inquiry file against a threshold rule, wherein evaluation of the inquiry file against the threshold rule reveals whether the inquiry file contains more than a threshold number of suspect items that are not false positives;

    after determining that the inquiry file contains more than the threshold number of suspect items that are not false positives, directing the inquiry file to a first suspect queue to be researched to confirm whether or not the suspect items in the inquiry file are duplicates of other presented items in the payment stream; and

    after determining that the inquiry file contains less than the threshold number of suspect items that are not false positives, extracting the suspect items that are not false positives from the inquiry file and direct the extracted suspect items individually to a second suspect queue to confirm whether or not the extracted suspect items are actually duplicates of other presented items in the payment stream.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×