Patent Issued for Systems and methods for detecting fraudulent requests on client accounts (USPTO 11704728): United Services Automobile Association
2023 AUG 09 (NewsRx) -- By a
The patent’s assignee for patent number 11704728 is
News editors obtained the following quote from the background information supplied by the inventors: “The present disclosure relates generally to detecting fraudulent activity on certain financial accounts. More specifically, the present disclosure relates to analyzing certain behavior to detect and predict potential fraudulent actors associated with an account.
“This section is intended to introduce the reader to various aspects of art that may be related to various aspects of the present disclosure, which are described and/or claimed below. This discussion is believed to be helpful in providing the reader with background information to facilitate a better understanding of the various aspects of the present disclosure. Accordingly, it may be understood that these statements are to be read in this light, and not as admissions of prior art.
“Gaining access to private information via hacking or fraud is a well-established and growing problem. There are many systems of communication that are targets for hacking and fraudsters desire for private data. For example, potential fraudsters or individuals who pose as an existing client may contact an organization multiple times via phone or email relying on the fact that each time that the fraudster contacts the organization, he will most likely be connected to a different representative of the organization. Relying on this behavior, the fraudster may solicit information from each representative to assist the fraudster in gleaning some information regarding the existing client from each different representative. As such, improved systems and methods for efficiently and effectively detecting potential fraudsters and fraudulent activities are desirable.”
As a supplement to the background information on this patent, NewsRx correspondents also obtained the inventors’ summary information for this patent: “One or more specific embodiments will be described below. In an effort to provide a concise description of these embodiments, not all features of an actual implementation are described in the specification. It should be appreciated that in the development of any such actual implementation, as in any engineering or design project, numerous implementation-specific decisions must be made to achieve the developers’ specific goals, such as compliance with system-related and business-related constraints, which may vary from one implementation to another. Moreover, it should be appreciated that such a development effort might be complex and time consuming, but would nevertheless be a routine undertaking of design, fabrication, and manufacture for those of ordinary skill having the benefit of this disclosure.
“When introducing elements of various embodiments of the present disclosure, the articles “a,” “an,” and “the” are intended to mean that there are one or more of the elements. The terms “comprising,” “including,” and “having” are intended to be inclusive and mean that there may be additional elements other than the listed elements. Additionally, it should be understood that references to “one embodiment” or “an embodiment” of the present disclosure are not intended to be interpreted as excluding the existence of additional embodiments that also incorporate the recited features.
“As mentioned above, gaining access to private information via hacking or fraud is a well-established and growing problem. There are many systems of communication that are targets for hacking and fraudsters desire for private data. For example, in certain organizations, clients or customers frequently contact an organization via telephone, Internet-based chat rooms, or via other communication options. When contacting the organization using any of these communication options, the client may initially speak with a first customer service representative (CSR). However, if the client contacts the organization again, the client may often be connected to a different CSR, as opposed to the original CSR that the client initially spoke with. It is now recognized that this system can be attacked using techniques that slowly acquire relevant information and this facilitates hacking.
“Potential fraudsters or individuals who pose as an existing client may contact an organization multiple times relying on the fact that each time that the fraudster contacts the organization, he will most likely be connected to a new CSR. Relying on this behavior, the fraudster may solicit clues to security questions, attempt to gain access to a client’s account, and the like. For example, each client may set up or provide hints that may assist the client in remembering his/her password, access code, or the like. Since each new call to the organization may be routed to a different CSR, each individual CSR may provide different hints to the fraudster. Alternatively, the fraudster may attempt to gain access to the client’s account by attempting to guess the answer to a security question each time the fraudster speaks with a different CSR.
“To prevent potential fraudsters from gaining insight regarding a client’s account through different CSRs, the present disclosure describes certain systems and methods for detecting potential fraudulent access attempts. In addition to detecting potential fraudulent access attempts, the present disclosure details certain outputs (e.g., visualizations) that may assist CSRs in assessing the likelihood that a particular caller is not who he/she claims to be. The present disclosure also details certain actions that may be performed to prevent the fraudster from gaining unauthorized access to a client’s account information after detecting or determining that the likelihood that a particular caller is fraudulent.”
The claims supplied by the inventors are:
“1. A non-transitory computer-readable medium comprising computer executable instructions, when executed, are configured to cause at least one processor to: receive a notification indicative of suspicious activity occurring in a communication that is currently being conducted between a representative associated with an organization and an individual contacting the organization concerning an account; identify one or more accounts associated with one or more organizations that corresponds to the individual or the account as being potentially at risk of attack based on transaction data stored in one or more databases; receive a plurality of datasets associated with the one or more accounts that are potentially at risk of attack; receive external data associated with one or more fraud methods from one or more external data sources unaffiliated with the one or more organizations, wherein each of the one or more fraud methods is associated with a lifecycle comprising a plurality of lifecycle stages that corresponds to a respective fraud method; determine a fraud method of the one or more fraud methods and a respective lifecycle stage of the fraud method being used to access the one or more accounts based on the communication currently being conducted and the plurality of datasets associated with the one or more organizations with respect to the one or more fraud methods; and transmit an additional notification comprising the fraud method and the respective lifecycle stage of the fraud method to one or more computing system associated with the one or more organizations in response to determining the fraud method and the respective lifecycle stage.
“2. The non-transitory computer-readable medium of claim 1, wherein the transaction data comprises payment data, money transfer data, deposit data, or any combination thereof.
“3. The non-transitory computer-readable medium of claim 1, wherein the computer-executable instructions, when executed, are configured to generate a visualization comprising a plurality of categories that corresponds to a plurality of levels of fraud risk, wherein at least a portion of the plurality of datasets is associated with one of the plurality of categories.
“4. The non-transitory computer-readable medium of claim 3, wherein the computer-executable instructions, when executed, are configured to update the visualization to modify a visual aspect of the at least a portion of the plurality of datasets based on a priority of a respective fraud level of a plurality of fraud levels that corresponds to the one of the plurality of categories.
“5. The non-transitory computer-readable medium of claim 1, wherein the computer-executable instructions, when executed, are configured to determine one or more risk profiles corresponding to the one or more accounts potentially at risk of attack, wherein the one or more risk profiles are indicative of an amount of exposure to the one or more organizations.
“6. The non-transitory computer-readable medium of claim 5, wherein the one or more risk profiles are determined based on an amount of funds, a value of one or more assets, the respective lifecycle stage of the fraud method, or any combination thereof.
“7. The non-transitory computer-readable medium of claim 6, wherein the computer-executable instructions, when executed, are configured to cause the at least one processor to transmit the one or more risk profiles to the one or more computing systems in response to the one or more risk profiles being above one or more thresholds.
“8. A method for detecting a fraud attempt in a communication session, comprising: receiving, via at least one processor, a notification indicative of suspicious activity occurring in a communication that is currently being conducted between a representative associated with an organization and an individual contacting the organization concerning an account; identifying, via the at least one processor, one or more accounts associated with one or more organizations that corresponds to the individual or the account as being potentially at risk of attack based on transaction data stored in one or more databases; receiving, via the at least one processor, a plurality of datasets associated with the one or more accounts that are potentially at risk of attack; receiving, via the at least one processor, external data associated with one or more fraud methods from one or more external data sources unaffiliated with the one or more organizations, wherein each of the one or more fraud methods is associated with a lifecycle comprising a plurality of lifecycle stages that corresponds to a respective fraud method; determining, via the at least one processor, a fraud method of the one or more fraud methods and a respective lifecycle stage of the fraud method being used to access the one or more accounts based on the communication currently being conducted and the plurality of datasets associated with the one or more organizations with respect to the one or more fraud methods; and transmitting, via the at least one processor, an additional notification comprising the fraud method and the respective lifecycle stage of the fraud method to one or more computing systems associated with the one or more organizations in response to determining the fraud method and the respective lifecycle stage.
“9. The method of claim 8, comprising determining, via the at least one processor, one or more risk profiles corresponding to the one or more accounts potentially at risk of attack, wherein the one or more risk profiles are indicative of an amount of exposure to the one or more organizations.
“10. The method of claim 9, comprising transferring, via the at least one processor, the communication session to a second representative based on the one or more risk profiles exceeding a threshold amount of exposure.
“11. The method of claim 10, wherein the risk profile is determined based on an amount of funds, a value of one or more assets, the respective lifecycle stage of the fraud method, or any combination thereof.
“12. The method of claim 11, comprising transmitting, via the at least one processor, the one or more risk profiles to the one or more computing systems in response to the one or more risk profiles being above one or more thresholds.
“13. The method of claim 12, comprising initiating, via the at least one processor, a tracking service configured to track a location of a user in response to the one or more risk profiles being above the one or more thresholds.
“14. A fraud detection system, comprising: one or more databases comprising a plurality of transaction datasets associated with a plurality of financial accounts; and a processor configured to: receive a notification indicative of suspicious activity occurring in a communication that is currently being conducted between a representative associated with an organization and an individual contacting the organization concerning a financial account of the plurality of financial accounts; identify one or more financial accounts of the plurality of financial accounts associated with one or more organizations that corresponds to the individual or the financial account as being potentially at risk of attack based on transaction data stored in the one or more databases; receive a plurality of datasets associated with the one or more financial accounts that are potentially at risk of attack; receive external data associated with one or more fraud methods from one or more external data sources unaffiliated with the one or more organizations, wherein each of the one or more fraud methods is associated with a lifecycle comprising a plurality of lifecycle stages that corresponds to a respective fraud method; determine a fraud method of the one or more fraud methods and a respective lifecycle stage of the fraud method being used to access the one or more financial accounts based on the communication currently being conducted and the plurality of datasets associated with the one or more organizations with respect to the one or more fraud methods; and transmit an additional notification comprising the fraud method and the respective lifecycle stage of the fraud method to one or more computing systems associated with the one or more organizations in response to determining the fraud method and the respective lifecycle stage.
“15. The fraud detection system of claim 14, wherein the transaction data comprises payment data, money transfer data, deposit data, or any combination thereof.
“16. The fraud detection system of claim 14, wherein the processor is configured to generate a visualization comprising a plurality of categories that corresponds to a plurality of levels of fraud risk, wherein at least a portion of the plurality of datasets is associated with one of the plurality of categories.
“17. The fraud detection system of claim 16, wherein the processor is configured to update the visualization to highlight a visual aspect of the at least a portion of the plurality of datasets based on a priority of a respective fraud level of a plurality of fraud levels that corresponds to the one of the plurality of categories.
“18. The fraud detection system of claim 14, wherein the processor is configured to determine one or more risk profiles corresponding to the one or more financial accounts potentially at risk of attack, wherein the one or more risk profiles are indicative of an amount of exposure to the one or more organizations.
“19. The fraud detection system of claim 18, wherein the one or more risk profiles are determined based on an amount of funds, a value of one or more assets, the respective lifecycle stage of the fraud method, or any combination thereof.”
There are additional claims. Please visit full patent to read further.
For additional information on this patent, see: Fiedler, Kevin K. Systems and methods for detecting fraudulent requests on client accounts.
(Our reports deliver fact-based news of research and discoveries from around the world.)
Patent Issued for Data security classification sampling and labeling (USPTO 11704431): Microsoft Technology Licensing LLC
Researchers Submit Patent Application, “Systems And Methods For Using Tokenized Icons To Provide Insurance Policy Quotes”, for Approval (USPTO 20230230175): Patent Application
Advisor News
Annuity News
Health/Employee Benefits News
Life Insurance News