Abstract:
Certain embodiments of the disclosed technology may include systems and methods for detecting tax refund fraud. According to an exemplary embodiment of the disclosed technology, a method is provided for detecting tax refund fraud. The method includes receiving entity-supplied information. In an exemplary embodiment, the entity-supplied information includes at least a name, social security number, and mailing address. The method further includes querying one or more databases with the entity-supplied information and receiving a plurality of independent information in response to the querying. The method can include determining, based at least in part on a comparison of the entity-supplied information with the plurality of independent information, zero or more indicators of fraud. The method can include outputting the zero or more indicators of fraud.
Abstract:
Embodiment of the disclosed technology include systems and methods for identifying one or more entities associated with activities. In an example implementation, a method includes determining one or more geographical regions proximate to the plurality of locations associated with the one or more activities; determining connections between one or more identities of a population and a plurality of related entities associated with the one or more identities; determining geographical information associated with related entities; weighting one or more metrics for each of the identities based on the geographical information associated with the related entities and the one or more geographical regions proximate to the plurality of locations associated with the one or more activities; scoring the one or more weighted metrics; and providing, based on the scoring, an indication of a likelihood that the one or more identities of the population are associated with the one or more activities.
Abstract:
Systems and methods are disclosed for the utilization of personally identifiable information (PII) to identify an individual while de-identifying the associated data through tokenization. A method includes receiving, at a main tokenizer and from a first trading partner, a first data set comprising a first subset of a plurality of PII fields corresponding to an individual, receiving, at the main tokenizer and from a second trading partner, a second data set comprising a second subset of the plurality of PII fields corresponding to the individual, resolving, at the main tokenizer, the individual, linking a unique patient-centric token (PCT) to the individual based on the resolving, and outputting the PCT for generating a non-PII token linked to the individual.
Abstract:
Certain implementations of the disclosed technology may include systems, methods, and apparatus for determining risks associated with a driving route. According to an example implementation, a method is provided. The method may include identifying one or more probable routes of travel that include one or more first road segments. The method includes estimating risk associated with vehicular travel along one or more first road segments based at least in part on one or more of static road characteristics, temporal road characteristics, historical accident information, incident information, and traffic violation information associated with the one or more first road segments, and estimating risk associated with vehicular travel along the one or more probable routes by accumulating the estimated risk associated with vehicular travel along the one or more first road segments.
Abstract:
Certain implementations of the disclosed technology may include systems, methods, and apparatus for determining risks associated with a driving route. According to an example implementation, a method is provided. The method may include identifying one or more probable routes of travel that include one or more first road segments. The method includes estimating risk associated with vehicular travel along one or more first road segments based at least in part on one or more of static road characteristics, temporal road characteristics, historical accident information, incident information, and traffic violation information associated with the one or more first road segments, and estimating risk associated with vehicular travel along the one or more probable routes by accumulating the estimated risk associated with vehicular travel along the one or more first road segments.
Abstract:
Certain embodiments of the invention may include systems and methods for identity authentication using an social network. According to an exemplary embodiment of the invention, a method is provided for authenticating an identity of a target person. The method can include determining, from a first system graph, connections between one or more hypothetical identities and a plurality of related entities associated with the one or more hypothetical identities; determining, from a second system graph, one or more real entities associated with the target person; identifying matches comprising common real entities associated with the target person and related entities associated with the one or more hypothetical identities based at least in part on the determined connections; and providing an indication of identity authentication of the target person based at least in part on the identified matches.
Abstract:
Certain implementations of the disclosed technology may include systems, methods, and computer-readable media for identifying connected organizations from a collection of records. A method is provided for determining, from a collection of records comprising a plurality of distinct data points, connections between one or more of the plurality of distinct data points. The method includes identifying, from the plurality of distinct data points, a plurality of clusters, each of the clusters comprising a cluster centroid, each cluster centroid comprising a distinct data point, wherein each cluster comprises the determined connections between the one or more of the plurality of distinct data points and the cluster centroid. The method further includes identifying cluster connections among the plurality of clusters, scoring the cluster connections based on predetermined criteria, and identifying one or more of the distinct data points associated with the scored cluster connections.
Abstract:
Certain embodiments of the disclosed technology may include systems and methods for detecting tax refund fraud. According to an exemplary embodiment of the disclosed technology, a method is provided for detecting tax refund fraud. The method includes receiving entity-supplied information. In an exemplary embodiment, the entity-supplied information includes at least a name, social security number, and mailing address. The method further includes querying one or more databases with the entity-supplied information and receiving a plurality of independent information in response to the querying. The method can include determining, based at least in part on a comparison of the entity-supplied information with the plurality of independent information, zero or more indicators of fraud. The method can include outputting the zero or more indicators of fraud.
Abstract:
Certain embodiments of the invention may include systems and methods for identity authentication using an social network. According to an exemplary embodiment of the invention, a method is provided for authenticating an identity of a target person. The method can include determining, from a first system graph, connections between one or more hypothetical identities and a plurality of related entities associated with the one or more hypothetical identities; determining, from a second system graph, one or more real entities associated with the target person; identifying matches comprising common real entities associated with the target person and related entities associated with the one or more hypothetical identities based at least in part on the determined connections; and providing an indication of identity authentication of the target person based at least in part on the identified matches.