Fraud detection mechanism adapted for inconsistent data collection
First Claim
1. In a verification system including a processing device, the verification system having items intended for a single use, in which usage of an item is confirmed by scanning an identification number associated with the item, and wherein scanning activity is inconsistent, a method for identifying a suspect for fraudulent use of the identification numbers comprising:
- creating, by the processing device, a profile of scanning activity for a plurality of items that meet a first parameter, the profile including a percentage of items that meet the first parameter that have been scanned more than once;
creating, by the processing device, a profile of scanning activity for a plurality of items used by a specified user, the profile including a total number of scans for items used by the specified user that meet the first parameter and a percentage of items used by the specified user that meet the first parameter that have been scanned more than once;
analyzing, by the processing device, the profile of scanning activity for the plurality of items used by the specified user to determine that the total number of scans for items used by the specified user that meet the first parameter exceeds a predetermined minimum number and that the percentage of items used by the specified user that meet the first parameter that have been scanned more than once is greater than a first threshold value, the first threshold value being based on the percentage of items that meet the first parameter that have been scanned more than once from the profile of scanning activity for the plurality of items that meet the first parameter; and
identifying, by the processing device, the specified user as a suspect for fraudulent use of the identification numbers.
3 Assignments
0 Petitions
Accused Products
Abstract
Fraud detection mechanisms and methods that are adapted for inconsistent data collection are provided. Data is analyzed to determine normal operational variations from ideal system behavior. Profiles are developed for each individual sender, e.g., the number of multiple scans performed per confirmation number generated by each sender, and other parameters, such as delivery areas, e.g., the number of multiple scans performed per specific geographic area. If the sender'"'"'s profile differs significantly from the normal operational variations, there is an indication of potential fraudulent activity and an investigation can be initiated. By analyzing a combination of sender and delivery scan data with system wide scan data, the effect of inconsistent data is minimized to significantly reduce the number of erroneous indications of fraudulent activity while still providing a high level of fraud detection.
14 Citations
22 Claims
-
1. In a verification system including a processing device, the verification system having items intended for a single use, in which usage of an item is confirmed by scanning an identification number associated with the item, and wherein scanning activity is inconsistent, a method for identifying a suspect for fraudulent use of the identification numbers comprising:
-
creating, by the processing device, a profile of scanning activity for a plurality of items that meet a first parameter, the profile including a percentage of items that meet the first parameter that have been scanned more than once; creating, by the processing device, a profile of scanning activity for a plurality of items used by a specified user, the profile including a total number of scans for items used by the specified user that meet the first parameter and a percentage of items used by the specified user that meet the first parameter that have been scanned more than once; analyzing, by the processing device, the profile of scanning activity for the plurality of items used by the specified user to determine that the total number of scans for items used by the specified user that meet the first parameter exceeds a predetermined minimum number and that the percentage of items used by the specified user that meet the first parameter that have been scanned more than once is greater than a first threshold value, the first threshold value being based on the percentage of items that meet the first parameter that have been scanned more than once from the profile of scanning activity for the plurality of items that meet the first parameter; and identifying, by the processing device, the specified user as a suspect for fraudulent use of the identification numbers. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for identifying a suspect for fraudulent use of identification numbers associated with items intended for a single use, wherein usage of an item is confirmed by scanning the identification number associated with the item, and wherein scanning activity is inconsistent, the system comprising:
-
a database for storing data associated with scanning the identification numbers; a processing device coupled to the database, the processing device being configured to create a profile, from the data stored in the database, of scanning activity for a plurality of items that meet a first parameter, the profile including a percentage of items that meet the first parameter that have been scanned more than once; create, from the data stored in the database, a profile of scanning activity for a plurality of items used by a specified user, the profile including a total number of scans for items used by the specified user that meet the first parameter and a percentage of items used by the specified user that meet the first parameter that have been scanned more than once; analyze the profile of scanning activity for the plurality of items used by the specified user to determine that the total number of scans for items used by the specified user that meet the first parameter exceeds a predetermined minimum number and that the percentage of items used by the specified user that meet the first parameter that have been scanned more than once is greater than a first threshold value, the first threshold value being based on the percentage of items that meet the first parameter that have been scanned more than once from the profile of scanning activity for the plurality of items that meet the first parameter; and identify the specified user as a suspect for fraudulent use of the identification numbers based on the percentage of items used by the specified user that meet the first parameter that have been scanned more than once from the profile of scanning activity for the plurality of items used by a specified user being greater than the first threshold value. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
Specification