System and method for MICR-based duplicate detection and management
First Claim
1. A computer readable storage medium encoded with instructions, execution of the instructions by a computing device causing the computing device to perform steps of:
- detecting that a presented item in a payment stream is a suspect item by determining that MICR data for the presented item matches MICR data of a previous item in the payment stream, the payment stream comprising a plurality of channels, the channels in the payment stream including at least a first channel and a second channel, a financial institution receiving the presented item over the first channel, the financial institution receiving the previous item over the second channel, the first channel and the second channel being different ones of the following types of channels;
a check processing channel, a local image capture channel, and a distributed image capture channel;
after determining that the presented item is a suspect item, evaluating the presented item against a set of suspect rules to determine whether the presented item is a false positive, wherein false positives are suspect items that are not actually duplicates of other ones of the presented items;
after determining that the presented item is not a false positive, sending the presented item for research;
receiving an inquiry file containing MICR data for presented items in the payment stream;
evaluating the inquiry file against a threshold rule, wherein evaluation of the inquiry file against the threshold rule reveals whether the inquiry file contains more than a threshold number of suspect items that are not false positives;
after determining that the inquiry file contains more than the threshold number of suspect items that are not false positives, directing the inquiry file to a first suspect queue to be researched to confirm whether or not the suspect items in the inquiry file are duplicates of other presented items in the payment stream; and
after determining that the inquiry file contains less than the threshold number of suspect items that are not false positives, extracting the suspect items that are not false positives from the inquiry file and direct the extracted suspect items individually to a second suspect queue to confirm whether or not the extracted suspect items are actually duplicates of other presented items in the payment stream.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for MICR-based duplicate detection and management identifies duplicate presented items on day one across a plurality of payment channels, prior to posting, preventing them from impacting financial institution customers by rerouting to an adjustments team. Inquiry files containing MICR data for a plurality of presented items are evaluated by a duplicate detection module. Each item presented is evaluated against all previous items based on its MICR line. Unique items are processed in the usual manner. Duplicate suspects undergo further processing. Suspects having identical MICR data, but that are not duplicates, such as NSF (non-sufficient funds) checks being re-deposited, are identified and posted. The remaining suspects go in the suspect queue of a universal workstation. After being researched, suspects found not to be duplicates are posted. The remaining suspects are flagged as duplicates and routed to an adjustor for further action.
110 Citations
5 Claims
-
1. A computer readable storage medium encoded with instructions, execution of the instructions by a computing device causing the computing device to perform steps of:
-
detecting that a presented item in a payment stream is a suspect item by determining that MICR data for the presented item matches MICR data of a previous item in the payment stream, the payment stream comprising a plurality of channels, the channels in the payment stream including at least a first channel and a second channel, a financial institution receiving the presented item over the first channel, the financial institution receiving the previous item over the second channel, the first channel and the second channel being different ones of the following types of channels;
a check processing channel, a local image capture channel, and a distributed image capture channel;after determining that the presented item is a suspect item, evaluating the presented item against a set of suspect rules to determine whether the presented item is a false positive, wherein false positives are suspect items that are not actually duplicates of other ones of the presented items; after determining that the presented item is not a false positive, sending the presented item for research; receiving an inquiry file containing MICR data for presented items in the payment stream; evaluating the inquiry file against a threshold rule, wherein evaluation of the inquiry file against the threshold rule reveals whether the inquiry file contains more than a threshold number of suspect items that are not false positives; after determining that the inquiry file contains more than the threshold number of suspect items that are not false positives, directing the inquiry file to a first suspect queue to be researched to confirm whether or not the suspect items in the inquiry file are duplicates of other presented items in the payment stream; and after determining that the inquiry file contains less than the threshold number of suspect items that are not false positives, extracting the suspect items that are not false positives from the inquiry file and direct the extracted suspect items individually to a second suspect queue to confirm whether or not the extracted suspect items are actually duplicates of other presented items in the payment stream. - View Dependent Claims (2, 3, 4, 5)
-
Specification