-
41.
公开(公告)号:US20080021801A1
公开(公告)日:2008-01-24
申请号:US11254077
申请日:2005-10-18
申请人: Yuh-shen Song , Catherine Lew , Alexander Song , Victoria Song
发明人: Yuh-shen Song , Catherine Lew , Alexander Song , Victoria Song
IPC分类号: G06Q40/00
摘要: A computerized method is established to detect suspicious and fraudulent activities in a group of subjects by defining and dynamically integrating multidimensional risks, which are based on the characteristics of the subjects, into a mathematical model to produce a set of the most up-to-date representative risk values for each subject based on its activities and background. These multidimensional risk definitions and representative risk values are used to select a subset of multidimensional risk-weighted detection algorithms so that suspicious or fraudulent activities in the group of subjects can be effectively detected with higher resolution and accuracy. A priority sequence, which is based on the set of detection algorithms that detect the subject and the representative risk values of the detected subject, is produced to determine the priority of each detected case during the investigation process. To assist the user to make a more objective decision, any set of multidimensional risks can be used to identify a group of subjects that contain this set of multidimensional risks so that group statistics can be obtained for comparison and other analytical purposes. Furthermore, to fine-tune the system for future detections and analyses, the detection results are used as the feedback to adjust the definitions of the multidimensional risks and their values, the mathematical model, and the multidimensional risk-weighted detection algorithms.
摘要翻译: 建立了一种计算机化方法,通过将基于主体特征的多维度风险定义并动态地集成到数学模型中,以产生一组最新的数据,来检测一组主题中的可疑和欺诈活动 基于其活动和背景的每个主题的代表性风险值。 这些多维风险定义和代表性风险值用于选择多维风险加权检测算法的子集,以便能够以更高的分辨率和准确性有效地检测该组受试者中的可疑或欺诈活动。 产生基于检测对象的检测算法集合和检测到的对象的代表性风险值的优先级序列,以确定调查过程中每个检测到的病例的优先级。 为了帮助用户做出更客观的决定,可以使用任何一套多维风险来识别一组包含这一组多维风险的科目,以便获得群体统计数据用于比较和其他分析目的。 此外,为了对未来的检测和分析进行微调,将检测结果作为反馈来调整多维风险及其价值的定义,数学模型和多维风险加权检测算法。
-
公开(公告)号:US20060089905A1
公开(公告)日:2006-04-27
申请号:US11036931
申请日:2005-01-14
申请人: Yuh-shen Song , Catherine Lew , Alexander Song , Victoria Song
发明人: Yuh-shen Song , Catherine Lew , Alexander Song , Victoria Song
IPC分类号: G06Q40/00
摘要: A computer network, Credit and Identity Protection Network (“CIPN”), is established to detect credit damage and identity theft occurring to individuals, organizations, and other entities. It automatically advises the potential victims to verify the possible fraudulent activities and helps them to take proper actions to protect their credit and identity. In addition, this computer network provides the potential victim with assistance in notifying financial institutions, credit bureaus, merchants, and government agencies of suspicious activities and/or of confirmed fraudulent cases so that these organizations can take proper actions to protect themselves and the victims.
摘要翻译: 建立了信用和身份保护网络(“CIPN”)的计算机网络,以检测个人,组织和其他实体发生的信用损害和身份盗用。 它自动建议潜在受害者验证可能的欺诈活动,并帮助他们采取适当行动保护他们的信用和身份。 此外,该计算机网络为潜在的受害者提供了向金融机构,信贷机构,商户和政府机构通报可疑活动和/或确定的欺诈案件的协助,使这些组织能够采取适当行动保护自己和受害者。
-
公开(公告)号:US20240330923A1
公开(公告)日:2024-10-03
申请号:US18737806
申请日:2024-06-07
申请人: Yuh-shen SONG , Catherine LEW , Alexander SONG , Victoria SONG
发明人: Yuh-shen SONG , Catherine LEW , Alexander SONG , Victoria SONG
摘要: A computerized method electronically verifies identity data of a person by issuing an account for the person based on unverified identity data of the person. The method receives a request to verify an identity of the person associated with the account; and receives a portion of identity data provided by an identification document of the person. The method updates an identity profile of the person by combining the received portion of identity data with different portions of identity data previously received from different remote computer systems that requested verifying of the identity of the person associated with the account. The method compares the identity profile of the person to the unverified identity data of the person; and confirms the identity of the person associated with the account when no discrepancy between the identity profile of the person and the unverified identity data of the person is found.
-
公开(公告)号:US12039532B2
公开(公告)日:2024-07-16
申请号:US18202745
申请日:2023-05-26
申请人: Yuh-shen Song , Catherine Lew , Alexander Song , Victoria Song
发明人: Yuh-shen Song , Catherine Lew , Alexander Song , Victoria Song
摘要: A computerized method electronically verifies identity data of a customer by requesting the customer to provide identity data from a customer identification document during a financial transaction. The method updates an identity profile of the customer by combining the received portion of identity data with different portions of previously received identity data that were previously received from different merchants during different transactions between the customer and the different merchants. The method compares the identity profile to the unverified identity data of the customer when a number of transactions with the account is greater than a first transaction threshold, and approves the financial transaction when the identity profile matches the unverified identity data.
-
公开(公告)号:US11908030B2
公开(公告)日:2024-02-20
申请号:US17211717
申请日:2021-03-24
申请人: Yuh-Shen Song , Catherine Lew , Alexander Song , Victoria Song
发明人: Yuh-Shen Song , Catherine Lew , Alexander Song , Victoria Song
IPC分类号: G06Q50/26 , G06Q30/0601 , G06Q40/02 , G06Q30/04
CPC分类号: G06Q50/265 , G06Q30/04 , G06Q30/0601 , G06Q40/02
摘要: A computer-implemented method approves a transaction by storing, at a first computer system, first data identifying at least a portion of an identity of a user, an information locator associated with the first data, and a transformation method associated with the information locator. The computer-implemented method also receives, at the first computer system from a second computer system, the information locator when the user conducts the transaction, and second data converted from electronically obtained identification information of the user. An identity of the user cannot be identified from the second data. The computer-implemented method transforms, at the first computer system, the second data into third data based on the transformation method retrieved in response to the received information locator, and approves, by the first computer system, the transaction associated with the information locator when the third data corresponds to the first data.
-
公开(公告)号:US20230153835A1
公开(公告)日:2023-05-18
申请号:US18099182
申请日:2023-01-19
申请人: Alexander SONG , Yuh-Shen SONG , Catherine LEW
发明人: Alexander SONG , Yuh-Shen SONG , Catherine LEW
IPC分类号: G06Q30/02
CPC分类号: G06Q30/02
摘要: A method for conducting a transaction with a consumer device includes receiving user input selecting a store as a party to the transaction with a consumer associated with the consumer device. The method also includes transmitting, to the account computer system, first identification information of the store and second identification information of the consumer device. The method further includes receiving, from the account computer system, a passcode based on transmitting the first identification information of the store. The method also includes receiving, from the account computer system, a payment amount due. The method still further includes transmitting the passcode to the store to finalize the transaction.
-
公开(公告)号:US11640611B2
公开(公告)日:2023-05-02
申请号:US17545868
申请日:2021-12-08
申请人: Yuh-Shen Song , Catherine Lew , Alexander Song , Victoria Song
发明人: Yuh-Shen Song , Catherine Lew , Alexander Song , Victoria Song
摘要: Verifying a check includes receiving, from a check issuer computer system, first check information comprising a first routing number, a first account number, a first check number, and a first dollar amount associated with an issued check. The verifying also includes receiving from a computer system of a payee financial institution, second check information comprising a second routing number, a second account number, a second check number, and a second dollar amount from a received paper check. The method includes verifying that the first check information corresponds to the second check information and sending, to the computer system of the payee financial institution in response to the first check information matching the second check information, a verification message indicating that the first check information corresponds to the second check information.
-
公开(公告)号:US11599945B2
公开(公告)日:2023-03-07
申请号:US17147398
申请日:2021-01-12
申请人: Yuh-shen Song , Catherine Lew , Alexander Song , Victoria Song
发明人: Yuh-shen Song , Catherine Lew , Alexander Song , Victoria Song
摘要: A computer system uses risk-based principles to identify customers who have conducted money laundering activities. A money laundering risk score is derived from transactional information, background information, and/or due diligence information for each customer of a group of customers. Customers with higher money laundering risks are identified and monitored more closely. The computer system also assists a user to identify at least one transaction that has caused the identified customer to have a money laundering risk score that is in the higher percentiles of the customers.
-
公开(公告)号:US20220407699A1
公开(公告)日:2022-12-22
申请号:US17894037
申请日:2022-08-23
申请人: Yuh-shen SONG , Catherine LEW , Alexander SONG , Victoria SONG
发明人: Yuh-shen SONG , Catherine LEW , Alexander SONG , Victoria SONG
摘要: A computer-implemented method for sharing information about a subject without disclosing identification information about the subject includes comparing, by a first computer system, a third set of data with a fourth set of data. The third set of data is converted by a transformation from a first set of identification data of a first subject provided by the first computer system. The fourth set of data is converted by the transformation from a second set of identification data of a second subject provided by a second computer system. The transformation renders the first subject unidentifiable from the third set of data and the second subject unidentifiable from the fourth set of data. The computer-implemented method also includes transmitting, from the first computer system to the second computer, a fifth set of data when the third set of data corresponds to the fourth set of data.
-
公开(公告)号:US20220180361A1
公开(公告)日:2022-06-09
申请号:US17678922
申请日:2022-02-23
申请人: Yuh-shen SONG , Catherine LEW , Alexander SONG , Victoria SONG
发明人: Yuh-shen SONG , Catherine LEW , Alexander SONG , Victoria SONG
IPC分类号: G06Q20/40 , G06F21/33 , G06Q20/02 , G06Q20/10 , G06Q20/38 , G06Q30/02 , G06Q50/26 , G06Q40/00 , G06Q20/32 , H04L9/40
摘要: A computerized method for transactional approval stores, at a first computer system, first user identification data associated with a user. The first user identification data is insufficient to confirm an identity of the user. The computerized method stores, at the first computer system, first account identification data associated with the first user identification data. The computerized method receives, at the first computer system, second account identification data associated with a transaction, the second account identification data received from a second computer system. The computerized method also receives, at the first computer system, electronically obtained identification data associated with the transaction. Finally, the computerized method approves, by the first computer system, the transaction when the electronically obtained identification data associated with the transaction corresponds to the first user identification data, and the second account identification data corresponds to the first account identification data.
-
-
-
-
-
-
-
-
-