Improper financial activity detection tool
First Claim
1. A method to electronically identify a plurality of individuals performing improper financial activity, the method comprising:
- monitoring, by a transaction monitoring system at a first network location, a plurality of financial transactions for signs of improper financial activity, wherein the plurality of financial transactions are electronic transactions received via a plurality of remote computing devices;
generating, by the transaction monitoring system, a first list of identifiers, the first list of identifiers comprising one or more user identifiers identifying a particular individual suspected of being associated with improper financial activity performed by the plurality of individuals;
presenting, via a user interface device, a user interface screen to facilitate identification of a ring of individuals performing improper financial activities, the user interface screen for selecting a list of financial transaction attributes to be included in one or more attribute tables wherein the list of financial transaction attributes includes at least a sentinel cookie attribute and a device fingerprint attribute;
combining, by an analysis tool implemented on a computing device at a second network location, a first list of identifiers with a first attribute table, wherein the first list of identifiers includes at least one identifier suspected of being associated with one or more improper financial activities and wherein the first attribute table corresponds to one or more attributes of financial transactions performed during a specified duration, the attributes including at least the sentinel cookie attribute and the device fingerprint attribute;
recursively linking until a stopping condition has been met, by the analysis tool, a digital file comprising the first list of identifiers with an attribute included in the first attribute table, wherein the stopping condition comprises a maximum number of links and wherein each link comprises a match between an identifier in the first list of identifiers with one or more attributes of the first attribute table;
generating, by the analysis tool, a composite table as a merged combination of the first list of identifiers and a portion of the first attribute table, wherein each row of the composite table includes a count parameter that corresponds to a number of times that a particular input party identifier and attribute combination were linked using first attribute table data for a specified time period;
repeating the recursively linking step and the generating the composite table step until the stopping condition has been met, wherein the composite table of a previous iteration is used as a second list of identifiers in a successive iteration;
generating, by the analysis tool, a first report when the stopping condition has been met, the stopping condition comprising one or both of a specified number of iterations and a maximum list size; and
communicating, by the analysis tool the first report to a user, the first report including at least a portion of the composite table including a plurality of rows each including an identifier from the first or the second list of identifiers linked with one or more attributes of the first attribute table.
1 Assignment
0 Petitions
Accused Products
Abstract
An illustrative method for identifying information associated with a ring of individuals performing improper financial activities may include combining a list of user identifiers with one or more attributes tables corresponding to the financial transactions. A computer device may analyze a first list of identifiers in relation to an attribute table, where the identifiers may be associated with one or more suspected improper financial activities and the attribute table may include attributes of one or more financial transactions performed over a specified duration. The computer device may then link the first list of identifiers with one or more attributes included in the attribute table to determine a second list of identifiers and the process may be repeated until a stopping condition has been reached. After the stopping condition has been met, the computer device may communicate a report to a user.
-
Citations
19 Claims
-
1. A method to electronically identify a plurality of individuals performing improper financial activity, the method comprising:
-
monitoring, by a transaction monitoring system at a first network location, a plurality of financial transactions for signs of improper financial activity, wherein the plurality of financial transactions are electronic transactions received via a plurality of remote computing devices; generating, by the transaction monitoring system, a first list of identifiers, the first list of identifiers comprising one or more user identifiers identifying a particular individual suspected of being associated with improper financial activity performed by the plurality of individuals; presenting, via a user interface device, a user interface screen to facilitate identification of a ring of individuals performing improper financial activities, the user interface screen for selecting a list of financial transaction attributes to be included in one or more attribute tables wherein the list of financial transaction attributes includes at least a sentinel cookie attribute and a device fingerprint attribute; combining, by an analysis tool implemented on a computing device at a second network location, a first list of identifiers with a first attribute table, wherein the first list of identifiers includes at least one identifier suspected of being associated with one or more improper financial activities and wherein the first attribute table corresponds to one or more attributes of financial transactions performed during a specified duration, the attributes including at least the sentinel cookie attribute and the device fingerprint attribute; recursively linking until a stopping condition has been met, by the analysis tool, a digital file comprising the first list of identifiers with an attribute included in the first attribute table, wherein the stopping condition comprises a maximum number of links and wherein each link comprises a match between an identifier in the first list of identifiers with one or more attributes of the first attribute table; generating, by the analysis tool, a composite table as a merged combination of the first list of identifiers and a portion of the first attribute table, wherein each row of the composite table includes a count parameter that corresponds to a number of times that a particular input party identifier and attribute combination were linked using first attribute table data for a specified time period; repeating the recursively linking step and the generating the composite table step until the stopping condition has been met, wherein the composite table of a previous iteration is used as a second list of identifiers in a successive iteration; generating, by the analysis tool, a first report when the stopping condition has been met, the stopping condition comprising one or both of a specified number of iterations and a maximum list size; and communicating, by the analysis tool the first report to a user, the first report including at least a portion of the composite table including a plurality of rows each including an identifier from the first or the second list of identifiers linked with one or more attributes of the first attribute table. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer system for identifying a plurality of individuals suspected of performing improper financial activity, the computer system comprising:
-
a processor; a memory device communicatively coupled to the processor, the memory storing instructions that, when executed by the processor, cause the computer system to; monitor, by a transaction monitoring system, a plurality of financial transactions for signs of improper financial activity; generate, by the transaction monitoring system, a first list of identifiers, the first list of identifiers comprising one or more user identifiers suspected of being associated with improper financial activity performed by the plurality of individuals; present, via a user interface device, a user interface screen to facilitate identification of a ring of individuals performing improper financial activities, the user interface screen for selecting a list of financial transaction attributes to be included in one or more attribute tables wherein the list of financial transaction attributes includes at least a sentinel cookie attribute and a device fingerprint attribute; receive a first list of identifiers via a communication link, the first list of identifiers corresponding to a suspected pattern of improper financial activity occurring during a specified time period and wherein at least one identifier is associated with a financial transaction that occurred within the specified time period; recursively link at least one identifier in the first list of identifiers to an attribute in a first attribute table, wherein the first attribute table corresponds to one or more attributes of financial transactions performed during a specified duration, wherein the at least one identifier is matched to the least one attribute in the first attribute table and wherein a stopping condition comprises a maximum number of links and wherein each link comprises a match between an identifier in the first list of identifiers with one or more attributes of the first attribute table; generate a composite table as a merged combination of the first list of identifiers and a portion of the first attribute table, wherein each row of the composite table includes a count parameter that corresponds to a number of times that a particular input party identifier and attribute combination were linked using first attribute table data for a specified time period; repeat the recursively link step and the generate the composite table step until the stopping condition has been met, wherein the composite table of a previous iteration is used as a second list of identifiers in a successive iteration; generate a first report when the stopping condition has been met, the stopping condition comprising one or both of a specified number of iterations being performed or a maximum list size being reached; and communicate, via a communication link, the first report to a user, the first report including a subset of the first or second list of identifiers linked with one or more attributes of the first attribute table forming a composite table, wherein each row of the composite table corresponds to an individual identifier and its linked attribute. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
Specification