Method and system for implementing multi-level data fusion
First Claim
Patent Images
1. A computer implemented method for implementing data fusion, the method comprising the steps of:
- aggregating data from a plurality of sources via one or more computer networks, wherein the data comprises at least unstructured data wherein the unstructured data comprises video, images and voice data;
extracting one or more features from the aggregated data;
enriching the extracted data by compiling the data into one or more categories to identify one or more variances in volume, acceleration, deceleration and velocity of activity;
wherein the step of enriching the extracted data further comprises the step of aggregating the enriched extracted data by similar features and generating an actionable report in response;
generating one or more datasets based on the enriched data for identifying potentially fraudulent activity; and
automatically identifying one or more proposed actions, based at least in part on the actionable report, to address the potentially fraudulent activity using a graphical interface;
wherein the one or more proposed actions are identified from a group comprising at least an autonomic response, investigation and incident of interest.
2 Assignments
0 Petitions
Accused Products
Abstract
An embodiment of the present invention involves a computer implemented method and system for implementing data fusion comprising aggregating data from a plurality of sources via one or more computer networks, wherein the data comprises at least unstructured data; extracting one or more features from the aggregated data; enriching the extracted data by compiling the data into one or more categories; generating one or more datasets based on the enriched data for identifying potentially fraudulent activity; and identifying one or more proposed actions to address the potentially fraudulent activity using a graphical interface.
232 Citations
18 Claims
-
1. A computer implemented method for implementing data fusion, the method comprising the steps of:
-
aggregating data from a plurality of sources via one or more computer networks, wherein the data comprises at least unstructured data wherein the unstructured data comprises video, images and voice data; extracting one or more features from the aggregated data; enriching the extracted data by compiling the data into one or more categories to identify one or more variances in volume, acceleration, deceleration and velocity of activity;
wherein the step of enriching the extracted data further comprises the step of aggregating the enriched extracted data by similar features and generating an actionable report in response;generating one or more datasets based on the enriched data for identifying potentially fraudulent activity; and automatically identifying one or more proposed actions, based at least in part on the actionable report, to address the potentially fraudulent activity using a graphical interface;
wherein the one or more proposed actions are identified from a group comprising at least an autonomic response, investigation and incident of interest. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer implemented system for implementing data fusion, the system comprising:
-
a processor; and a memory comprising computer-readable instructions which when executed by the processor cause the processor to perform the steps comprising; aggregating data from a plurality of sources via one or more computer networks, wherein the data comprises at least unstructured data wherein the unstructured data comprises video, images and voice data; extracting one or more features from the aggregated data; enriching the extracted data by compiling the data into one or more categories to identify one or more variances in volume, acceleration, deceleration and velocity of activity;
wherein the step of enriching the extracted data further comprises the step of aggregating the enriched extracted data by similar features and generating an actionable report in response;generating one or more datasets based on the enriched data for identifying potentially fraudulent activity; and automatically identifying one or more proposed actions, based at least in part on the actionable report, to address the potentially fraudulent activity using a graphical interface;
wherein the one or more proposed actions are identified from a group comprising at least an autonomic response, investigation and incident of interest. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification