This disclosure generally relates to computer-based systems configured to predict operational risks related to a business policy or process.
Enterprise computing systems generally identify business risks or operational risks based on results of certain business processes. A particular business process may introduce various types of operational risks to a business entity or even to multiple business entities that are in some way connected in relation to the business process. Various forms of operational risks include reputational risk, legal risk, credit risk, and the like.
In general, this disclosure describes computer-based systems configured/programmed on a specific risk, instead of on a business process that may result in the specific risk. Existing risk identification models may be useful within the closed universe of a given business, in a siloed manner. However, the existing risk identification models may make it difficult to identify risk correlations between different business silos, such as between different business units within a firm (e.g., business units under the umbrella of a financial institution entity), or across an industry (e.g., across different business entities within the financial industry).
The computer-based systems of this disclosure are configured to correlate a specific risk to other processes that may experience repercussions from the same specific risk. In some examples, the computer-based systems of this disclosure are configured to generate a specific risk data model for each specific risk, and to identify data inputs that may create or lead to that specific risk. The computer-based systems of this disclosure may also identify one or more controls, which, as used herein, refer to resiliency-based process actions that might mitigate or potentially even eliminate the repercussions that could result from a triggering of the specific risk.
In some examples, the data inputs to the risk data model may represent one or more of regulations, numbers, or data points from across one or more business units or business entities. A specific risk data model is configured to continually monitor the data inputs and the controls, and to output risk predictions, including likelihood of the specific risk and related impacts. The computer-based systems of this disclosure are also configured to generate a notification of the risk prediction, and to communicate the notification via a user-facing communication interface, thereby notifying an administrator of the risk prediction information.
In one example, this disclosure is directed to a computing device that includes a memory, one or more processors in communication with the memory, and a communication unit. The memory is configured to store input data and a risk data model with respect to the input data. The one or more processors are configured to evaluate the input data stored to the memory for first risk information associated with a first remote device, and to correlate the first risk information to second risk information to form a risk correlation, based on one or more characteristics of the input data. The one or more processors are further configured to determine that the second risk information is associated with a second remote device that is different from the first remote device, and to generate a notification that includes information linking the second risk information to the input data. The communication unit is configured to transmit the notification to the second remote device.
In another example, this disclosure is directed to a method that includes storing, to a memory, input data and a risk data model with respect to the input data, and evaluating, by one or more processors, the input data stored to the memory for first risk information associated with a first remote device. The method further includes correlating, by the one or more processors, the first risk information to second risk information to form a risk correlation, based on one or more characteristics of the input data, and determining, by the one or more processors, that the second risk information is associated with a second remote device that is different from the first remote device. The method further includes generating, by the one or more processors, a notification that includes information linking the second risk information to the input data, and transmitting, by a communication unit, the notification to the second remote device.
In another example still, this disclosure is directed to a non-transitory computer-readable storage medium encoded with instructions that, when executed, cause one or more processors of a computing device to perform various operations. The instructions, when executed, cause the one or more processors of the computing device to store input data and a risk data model with respect to the input data to the non-transitory computer-readable storage medium, to evaluate the input data stored to the memory for first risk information associated with a first remote device, and to correlate the first risk information to second risk information to form a risk correlation, based on one or more characteristics of the input data. The instructions, when executed, further cause the one or more processors of the computing device to determine that the second risk information is associated with a second remote device that is different from the first remote device, to generate a notification that includes information linking the second risk information to the input data, and to to transmit, via a communication unit, the notification to the second remote device.
In another example still, this disclosure is directed to an apparatus that includes means for storing input data and a risk data model with respect to the input data, and means for evaluating, by one or more processors, the input data stored to the memory for first risk information associated with a first remote device. The apparatus further includes means for correlating the first risk information to second risk information to form a risk correlation, based on one or more characteristics of the input data, and means for determining that the second risk information is associated with a second remote device that is different from the first remote device. The apparatus further includes means for generating a notification that includes information linking the second risk information to the input data, and means for transmitting the notification to the second remote device.
Computer-based systems configured according to aspects of this disclosure may provide one or more improvements over existing risk modeling technologies. For instance, the computer-based systems of this disclosure may propagate information on risk-generating events across different business units or even business entities. In this way, the computer-based systems of this disclosure may enable risk owners, control owners, and administrators to instigate remediation measures, preventive measures, and escalation procedures expediently after the occurrence of a risk-generating event, instead of constraining the information in a siloed manner within a particular business unit or business entity.
The details of one or more examples of the disclosure are set forth in the accompanying drawings and the description below. Other features, objects, and advantages of the disclosure will be apparent from the description and drawings, and from the claims.
Aspects of the disclosure are described below with reference being made to the accompanying drawings.
Administrator-facing device 12 represents one or more network-connected computing hardware modalities that an administrator of an enterprise may operate or otherwise interact with. In one example, administrator-facing device 12 represents one or more banker-operated modalities (e.g., computing terminals) positioned in a bank branch. In this example, the individual banker(s) operating administrator-facing device 12 represent one or more “administrators” as the term is used herein. In another example, administrator-facing device 12 represents one or more airline staff-operated modalities positioned at an airport gate. In this example, the airline staffers operating administrator-facing device 12 at the gate represent one or more administrators in accordance with the description provided herein. Administrator-facing device 12 may, in other use case scenarios, represent a computing hardware modality or a grouping of computing hardware modalities deployed in various other administrator-operated environments, such as in various places of business in which an employee or agent of an enterprise interacts with customers/clients.
Administrator-facing device 12 may receive data either via manual input or via relay from another device communicatively coupled to administrator-facing device 12. As an example of manually-input data, administrator-facing device 12 may receive an input provided by an administrator stationed at the location where administrator-facing device 12 is deployed for enterprise operations. In various examples, administrator-facing device 12 may relay the input to risk data modeling device 16, or may extract metadata describing the input, and send the metadata to risk data modeling device 16. Moreover, in various examples, administrator-facing device 12 may agnostically relay all input information to risk data modeling device 16, or alternatively, may locally implement logic to determine whether and (if so) what type of input-related information to send to risk data modeling device 16. In some instances, in which administrator-facing device 12 locally implements logic to determine whether to send input-related information to risk data modeling device 16, administrator-facing device 12 may, under some circumstances, decline to send input-related information based on a determination that the particular input or some information related to the input is unnecessary or of marginal value to risk data modeling device 16 in terms of performing the techniques of this disclosure.
In the example implementation illustrated in
Inputs 20 may include information, such as raw data and/or metadata, associated with transactions performed at administrator-facing device 12. In various examples, inputs 20 may include one or more of data points, numerical information, regulations, etc. Moreover, in the example illustrated in
Again, administrator-facing device 12 represents a computing hardware modality or a clustering of computing hardware modalities deployed at one or more places of business. As such, administrator-facing device 12 may include, be, or be part of a number of different types of computing hardware, such as, but not limited to, desktop computers, laptop computers, network terminals, netbooks, tablet computers, mobile phones (including so-called “smartphones”), automatic teller machines (ATMs), handheld scanning devices (e.g., barcode scanners, QR code scanners, etc.), television (e.g., “smart TVs”), wearable devices with input-receiving capabilities and network connectivity (e.g., a computerized watch, computerized eyewear, computerized gloves, etc.), an automation device or system (e.g., an office/home assistant, an thermostat, or other network-connected appliance), personal digital assistants (PDAs), portable gaming systems, media players with input-relaying capabilities, e-readers, automobile navigation and entertainment systems, or any other types of mobile, non-mobile, wearable, and non-wearable computing devices with the capability to relay information via a data network, such as network 14.
As shown in
Risk data modeling device 16 may represent one or more back-end devices utilized by the business or entity that controls administrator-facing device 12. While illustrated in
As described above, administrator-facing device 12 may relay administrator input and/or generate and transmit metadata information describing an administrator input over network 14 to risk data modeling device 16. Administrator-facing device 12 may facilitate the functioning of risk data modeling device 16 by providing information on events occurring at the administrator's location, such as, but not limited to, customer interactions. In turn, risk data modeling device 16 may implement the techniques of this disclosure to determine cross-business unit or cross-entity risk information based on information from administrator-facing device 12, and to generate one or more notifications to administrators or risk owners based on the risk information.
For instance, risk data modeling device 16 may receive an event alert from administrator-facing device 12, and store the event as a data point to inputs 20. In accordance with the techniques of this disclosure, risk data modeling device 16 may invoke risk correlation engine 24 to evaluate risk information of the event (stored to inputs 20) in a cross-business unit or cross-entity manner. Risk correlation engine 24 may interrelate event information stored to inputs 20 across different business units or business entities. That is, risk correlation engine 24 may form, retrieve, and evaluate risk-related information from multiple systems both internal and external to the business unit or potentially the business entity that controls administrator-facing device 12.
In one use-case scenario, administrator-facing device 12 may detect a check-cashing process, and may transmit information to risk data modeling device 16 based on the check-cashing process. In turn, risk data modeling device 16 may store data representing the check-cashing alert to inputs 20. Moreover, risk data modeling device 16 may invoke one or more of controls 22 that are associated with a check-cashing risk data model of risk data models 23. As one example, risk data modeling device 16 may invoke strengthened authentication procedures (from controls 22) to mitigate or potentially eliminate fraudulent check-cashing risks. In this example, risk data modeling device 16 may transmit a communication over network 14 that causes administrator-facing device 12 to initiate additional identity-verification measures at the bank branch, ATM, or pertinent business location.
In this example, risk correlation engine 24 may link the check-cashing event to various business units, according to techniques of this disclosure. For instance, risk correlation engine 24 may associate the check-cashing event of inputs 20 with different ones of risk data models 23 associated with different business units in addition to the fraudulent check-cashing risk data model associated with an identity protection unit. For example, risk correlation engine 24 may detect a link between the additional identity-verification measures of controls 22 and a customer satisfaction risk data model of risk data models 23 stemming from the additional verification procedures to which a valid check-cashing customer is subjected. In this case, risk correlation engine 24 may associate the inputs and controls of the check-cashing risk data model of risk data models 23 with the customer satisfaction risk data model. Again, the data processed with respect to each of risk data models 23 may include one or more of regulations, numbers, or data points from across one or more business units or business entities. Each of risk data models 23 is configured to be used by risk correlation engine 24 for continual monitoring of the respective inputs 20 and/or the respective controls 22. In turn, risk correlation engine 24 may process one or more of risk data models 23 to output risk predictions, including likelihood of the specific risk and related impacts.
In accordance with techniques of this disclosure, risk data modeling device 16 may adjust the application of one or more of controls 22 based on the risk correlation information generated by risk correlation engine 24. For instance, using the risk correlation information described above with respect to the check-cashing event of inputs 20, risk data modeling device 16 may adjust controls 22 to balance the risk-mitigation process actions associated with both identity verification and customer satisfaction. In accordance with the techniques of this disclosure, risk data modeling device 16 may, subject to various conditions or considerations, adjust at least one of controls 22. In this particular example, risk data modeling device 16 may adjust the escalated identity-verification measures that are customarily triggered in response to a check-cashing alert received from administrator-facing device 12.
For example, risk data modeling device 16 may reduce or potentially eliminate the enhanced identity-verification measures, based on detecting a past history of validated check-cashing transactions with respect to the checking account with which the check is associated. By reducing or eliminating the identity-verification measures to which the customer is subjected, risk data modeling device 16 may use the risk correlation information generated by risk correlation engine 24 to mitigate the risk of diminished customer satisfaction. By mitigating the customer satisfaction risk stemming from the standard use of controls 22 in response to a check-cashing event, risk data modeling device 16 uses the techniques of this disclosure to leverage risk information in one business unit (identity protection) to improve operations in another business unit (customer relations). In this way, risk data modeling device 16 may reduce redundant processing with respect to both identity-verification escalation and customer service complaint input, by correlating risk information across business units/entities and using the correlated risk information to modify cross-business operations.
In accordance with aspects of this disclosure, risk data modeling device 16 may invoke notification generation engine 26 based on the correlated risk information generated by risk correlation engine 24 and the adjustments implemented with respect to controls 22. Notification generation engine 26 may implement the techniques of this disclosure to form communications data (e.g., in the form of network packets) that carries notification information regarding one or more of the inputs 20 that were analyzed for risk, the correlated risk information generated by risk correlation engine 24, or the resulting modifications effected with respect to controls 22. In turn, notification generation engine 26 may transmit the notification(s) to one or more of risk-correlated devices 18 and/or to administrator-facing device 12 over network 14. Because network 14 includes one or more packet-switched network architectures and risk-correlated devices 18 and/or to administrator-facing device 12 represent network-connected computing devices, risk data modeling device 16 and notification generation engine 26 may transmit the notifications over disparate geographic locations using packet-switched network communications technology.
In the check-cashing example described above, notification generation engine 26 may generate and transmit a notification of the control modification to one or more of risk-correlated devices 18 that are controlled by risk owners (e.g., back-end administrators) who are in charge of customer relations and/or customer satisfaction monitoring. Risk-correlated devices 18 may include a variety of computing devices implementing varying amounts and types of computing functionalities. In accordance with the examples described herein, risk-correlated devices 18 may include back-end computing hardware operated by risk managers with varying levels of authority or with different functions within a business, computing hardware modalities positioned at places of customer-facing business, etc. In this way, notification generation engine 26 may eliminate redundant processing by risk-correlated devices 18 that would otherwise be necessary in order to request information on the procedures followed at the check-cashing site, and to analyze the procedures with respect to customer satisfaction.
In the check-cashing example discussed above, notification generation engine 26 may generate and transmit a notification of the control modification to administrator-facing device 12 and/or one or more of risk-correlated devices 18 that are controlled by risk owners who are in charge of identity-protection functions of the business entities. In this manner, in the check-cashing scenario, notification generation engine 26 may eliminate redundant processing by risk-correlated devices 18 that would otherwise be necessary in order to request information on the procedures followed at the check-cashing site, and to analyze the procedures with respect to customer identity-protection. In this manner, risk data modeling device 16 may use the notification-providing functionalities of notification generation engine 26 to reduce processing resource usage and bandwidth consumption that risk-correlated devices 18 would otherwise require, in accordance with the techniques of this disclosure.
In some examples, risk data modeling device 16 may implement various risk-correlation and resulting control modification actions contingent upon risk-owner approval received from one or more of risk-correlated devices 18. For instance, one or more of risk-correlated devices 18 may initiate a risk-owner approval procedure in response to receiving risk correlation notifications from risk data modeling device 16. Based on whether or not the risk-owner approval procedure results in an approval or a denial, risk data modeling 16 may correlate or decorrelate various risk information, and may implement or decline modifications to the customary control procedures represented by controls 22.
By correlating risks and/or implementing updates to controls 22 based on approval/denial information received from risk-correlated devices 18, risk data modeling device 16 may implement the techniques of this disclosure to conserve computing resources by reducing redundant evaluations of risk correlations, while leveraging the benefits of already-performed risk correlation evaluations. Similarly, risk data modeling device 16 may thereby avoid redundant instances of notification generation engine 26 generating and transmitting notifications if a risk correlation has been denied by a risk owner operating any of risk-correlated devices 18. In this way, risk data modeling device 16 may implement the techniques of this disclosure to conserve computing resources and bandwidth by reducing redundant evaluations of risk correlations and reducing notification generation and transmission, while leveraging the benefits of already-performed risk correlation evaluations.
In some instances, one or more of risk-correlated devices 18 may transmit an indication or suggestion of additional risk correlation back to risk data modeling device 16. In these instances, risk data modeling device 16 may evaluate whether to update the currently-implemented one of risk data models 23 to correlate the risk information indicated in the recommendation, or to decorrelate the risks (effectively denying or declining the recommendation). Subject to approving the risk-correlation recommendation, risk data modeling device 16 may transmit a risk correlation notification to one or more affected risk-correlated devices 18 and/or update the one of risk data models 23 to correlate future events similar to the input that triggered the recommendation.
As shown in this example, risk data modeling device 16 may implement the techniques of this disclosure to crowdsource risk correlation information (e.g., in the form of recommendations) to update the risk data model for a certain type of risk-triggering input. In this way, risk data modeling device 16 may improve the operations of risk-correlated devices using risk-owner input, thereby supplementing the functioning of risk correlation engine 24 and/or notification generation engine 26 without further taxing the computing resources allotted to risk correlation engine 24 and/or notification engine 26.
As shown in the example of
Processors 30, in one example, are configured to implement functionality and/or process instructions for execution within risk data modeling device 16. For example, processors 30 may be capable of processing instructions stored in storage device(s) 36. Examples of processors 30 may include, any one or more of a microprocessor, a controller, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field-programmable gate array (FPGA), or equivalent discrete or integrated logic circuitry.
One or more storage devices 36 may be configured to store information within risk data modeling device 16 during operation. Storage device(s) 36, in some examples, are described as a computer-readable storage medium and/or as one or more computer-readable storage devices. In some examples, storage devices 36 comprise temporary memory, meaning that a primary purpose of storage device(s) 36 is not long-term storage. Storage device(s) 36, in some examples, are described as a volatile memory, meaning that storage device(s) 36 do not maintain stored contents when the computer is turned off. Examples of volatile memories include random access memories (RAM), dynamic random access memories (DRAM), static random access memories (SRAM), and other forms of volatile memories known in the art. In some examples, storage device(s) 36 are used to store program instructions for execution by processors 30. Storage device(s) 36, in one example, are used by software or applications running on risk data modeling device 16 to temporarily store information during program execution.
Storage device(s) 36, in some examples, also include one or more computer-readable storage media. Examples of such computer-readable storage media may include a non-transitory computer-readable storage medium, and various computer-readable storage devices. Storage device(s) 36 may be configured to store larger amounts of information than volatile memory. Storage device(s) 36 may further be configured for long-term storage of information. In some examples, storage device(s) 36 include non-volatile storage elements. Examples of such non-volatile storage elements include magnetic hard discs, optical discs, floppy discs, flash memories, or forms of electrically programmable memories (EPROM) or electrically erasable and programmable (EEPROM) memories.
In the implementation illustrated in
Risk data modeling device 16 may use communication unit(s) 32 to implement various communication-based functionalities described above. As one example, communication unit(s) 32 may facilitate the receipt, decapsulation, and interpretation of packet-based event alerts from administrator-facing device. As another example, communication unit(s) 32 may facilitate the formation, encapsulation and transmission of packet-based notifications generated by notification generation engine 26 to one or more of risk-correlated devices 18 and/or administrator-facing device 12.
Risk data modeling device 16 may also implement one or more aspects of operating system 38. Operating system 38, in some examples, controls the operation of components of risk data modeling device 16. For example, operating system 38 may facilitate the communication of various units illustrated in storage devices 36 with processors 30 and communication unit(s) 32. As shown in
As illustrated in
In the example illustrated in
Additionally, notification generation engine 26 may generate individual risk correlation notifications that are customized for each risk owner operating any of risk-correlated devices 18 that are associated with one of the correlated risks. In the example of
As shown in
In one example, administrator-facing device 12 may comprise various computing modalities deployed at an airport gate. For instance, administrator-facing device 12 may represent a grouping of a network-connected computing terminal and one or more handheld scanners. In this example, input 20A may represent flight crew information. Flight crew information may include one or more of a number of crew members who have checked in for the flight, the assignments for the individual flight crew members, current locations for the crew members, etc. In turn, risk data modeling device 16 may be configured to evaluate the flight crew information of input 20A using a flight operations-based risk data model to determine any potential risks arising from the specific flight crew information contained in input 20A.
In this example, based on any operational or technical risks that risk data modeling device identifies from the data of input 20A, risk correlation engine 24 may correlate the risk information across different business units/entities. For instance, based on the keyword matching and AI tools implemented by risk correlation engine 24 with respect to the data of input 20A, risk data modeling device 16 may identify a customer dissatisfaction risk based on understaffing and/or sub-optimal assignments with respect to the flight crew members. As another example, risk data modeling device 16 may identify a risk of regulatory noncompliance or guideline noncompliance, based on the keyword matching and AI tools implemented by risk correlation engine 24 with respect to the data of input 20A and on understaffing and/or sub-optimal assignments with respect to the flight crew members.
In an example where risk-correlated device 18A is operated by a risk owner who is in charge of customer relations and goodwill, notification generation engine 26 may generate risk correlation notification 44A to indicate the correlated customer dissatisfaction risk to the risk owner operating risk-correlated device 18A. In turn, risk-correlated device 18A may trigger one or more control process actions in response to receiving the risk correlation notification 44A. For instance, risk-correlated device 18A may generate control communication 46A, which, in the case of airline customer service, may be an email with a flight voucher to one or more of the passengers on the flight. In this way, notification generation engine 26 may generate risk correlation notification 44A, and risk-correlated device 18A may generate control communication 46A, in such a way as to mitigate future bandwidth wastage and resource wastage that could possibly result from a spike in customer satisfaction complaints.
In this example use-case scenario, risk-correlated device 18B may be operated by a risk owner who is in charge of regulatory compliance. Notification generation engine 26 may generate risk correlation notification 44B to indicate any possible regulatory noncompliance risk to the risk owner operating risk-correlated device 18B. In turn, risk-correlated device 18B may trigger one or more control process actions in response to receiving the risk correlation notification 44B. For instance, risk-correlated device 18B may generate control communication 46B, which, in the case of airline regulatory compliance, may be a request for corrective measures which is sent to a legal department. In this way, notification generation engine 26 may generate risk correlation notification 44B, and risk-correlated device 18B may generate control communication 46B, in such a way as to mitigate future bandwidth wastage and resource wastage that could possibly result from an increase in received regulatory noncompliance warnings and/or complaints.
As shown in
The arrows showing the communication direction of correlation approval requests 39A and 39B illustrate that risk-correlated devices 18A and 18B may output correlation approval requests 39A and 39B to users (e.g., the risk owners who control the respective ones of risk-correlated devices 18A and 18B). In various examples, risk-correlated devices 18A and 18B may output correlation approval requests 39A and 39B directly to the risk owners (e.g., via a GUI or other interface), or indirectly, such as via emails/messages to other devices (e.g., user terminals or mobile devices) operated by the respective risk owners. Based on whether or not the risk-owner approval procedure results in an approval or a denial, risk data modeling device 16 or risk-correlated devices 18 may either maintain the customarily-implemented controls, or may modify the customary control procedures.
In the example illustrated in
Moreover, risk-correlated devices 18A and 18B may communicate the approval/denial status of each correlation request back to risk data modeling device 16. In the example of
Conversely, based on receiving denial communication 43B from risk-correlated device 18B, risk data modeling device 16 may update the current risk data model for input 20A, such that future events similar to the event of input 20A are automatically left decorrelated from the functions of risk-correlated device 18B. As such, risk data modeling device 16 may eliminate future instances of risk correlation engine 24 evaluating data similar to that of input 20A and may eliminate future instances of notification generation engine 26 generating and transmitting notifications similar to risk correlation notification 44B. That is, risk data modeling device 16 may implement machine learning to update the risk data model, thereby avoiding redundant instances of risk correlation engine 24 reevaluating information similar to that of input 20A for risk correlation to the functions of risk-correlated device 18B.
Similarly, in the automatic decorrelation example discussed with respect to risk correlation notification 44B and denial communication 43B, risk data modeling device 16 may thereby avoid redundant instances of notification generation engine 26 generating and transmitting notifications similar to risk correlation notification 44B if a risk correlation has been denied (e.g., via denial communication 43A, 43B) by a risk owner operating risk-correlated device 18B. In this way, risk data modeling device 16 may implement the techniques of this disclosure to conserve computing resources and bandwidth by reducing redundant evaluations of risk correlations and reducing notification generation and transmission, while leveraging the benefits of previously-performed risk correlation evaluations.
In some instances, one or more of risk-correlated devices 18 (e.g., risk-correlated device 18A) may transmit an indication or suggestion of additional risk correlation back to risk data modeling device 16. For instance, the risk owner operating risk-correlated device 18A may input a recommendation to correlate the data of input 20A to the functions of risk-correlated device 18C. Risk-correlated device 18A may transmit the risk owner-provided correlation recommendation 45 to risk data modeling device 16. In turn, risk data modeling device 16 may evaluate whether to update the currently-implemented risk data model to correlate risk information between input 20A and the functionalities implemented by risk-correlated device 18C.
Again, the communication from risk-correlated device 18A to risk data modeling device 16 to relay the risk owner-input recommendation is illustrated as correlation recommendation 45 in
Subject to the risk-correlation recommendation (or correlation recommendation 45) with respect to risk-correlated device 18C being approved for a risk data model update, risk data modeling device 16 may transmit a risk correlation notification to risk-correlated device 18C and/or update the risk data model to correlate future events similar to that of input 20A to the functionalities of risk-correlated device 18C. As shown in this example, risk data modeling device 16 may implement the techniques of this disclosure to crowdsource risk correlation information (e.g., in the form of recommendations) to update the risk data model for a certain type of risk-triggering input. In this way, risk data modeling device 16 may improve the operations of risk-correlated devices using risk-owner input, thereby supplementing the functioning of risk correlation engine 24 and/or notification generation engine 26 without further taxing the computing resources allotted to risk correlation engine 24 and/or notification engine 26
In the example of
For instance, risk correlation engine 24 may correlate the identity-protection risks generally associated with check cashing to the risk of customer dissatisfaction associated with the customary control of escalating identity verification procedures typically triggered in a check-cashing scenario. In some examples, control update engine 25 may modify the escalated identity verification procedures based on a determination that the account number associated with the check being cashed is associated with a threshold number of previously-verified check-cashing events. In turn, control update engine 25 may reduce or potentially eliminate the escalated identity verification procedures (e.g., fingerprint collection, etc.) that the administrator operating check processing hardware 52 would typically instigate at the customer-facing site. That is, based on risk correlation engine 24 correlating risks in response to a detected event, control update engine 25 may make decisions with respect to changing one or more of controls 22. In turn, control update engine 25 may implement the corresponding changes with respect to controls 22, thereby causing risk data modeling device 16 to alter or balance the impact on the correlated business units or entities.
In turn, control update engine 25 may cause notification generation engine 26 to generate and transmit control update 60A to check processing hardware 52. In this particular example, control update 60A may represent a communication informing the administrator that the escalated identity-verification procedures are to be bypassed with respect to check cashing event 54. Additionally, notification generation engine 26 may send control update 60B to customer satisfaction management device 62. Customer satisfaction management device 62 represents one of risk-correlated devices 18 illustrated in
In turn, customer satisfaction management device 62 may generate control communication 64, which may represent a log entry or other tracking information of customer satisfaction-oriented control changes that risk data modeling device 16 has implemented within a certain period of time. Customer satisfaction management device 62 may send control communication 64 to one or more entities, such as a record-keeping department, to maintain a history of correlated risk-based control updates and notifications implemented by risk data modeling device 16 in accordance with the techniques described herein.
In the example of
In turn, risk correlation engine 24 may output normalized risk data 76 to be stored as normalized input data in inputs 20. Risk correlation engine 24 and notification generation engine 26 may use normalized risk data 76 to determine risk correlations and to generate notifications to various devices, such as one or more of risk-correlated devices 18 and/or administrator-facing device 12. Normalization engine 28 may similarly normalize control data for storage in controls 22. In this way, normalization engine 28 and/or language processing engine 74 may implement one or more of keyword matching, AI tools, or machine learning capabilities to normalize one or more of inputs 20 and/or controls 22, to facilitate the performance of risk correlation engine 24.
In turn, risk data modeling device 16 may use communication unit(s) 32 to transmit the notification to risk-correlated device 18A (88). In this example, notification generation engine 26 may generate the notification as a request for administrator approval of the risk correlation. Risk-correlated device 18A may receive the correlation notification 44A transmitted by risk data modeling device 16 (90). Risk-correlated device 18A may determine whether or not the risk correlation included in the notification receives an administrator approval (decision block 92). For instance, risk-correlated device 18A may generate an approval request (e.g., correlation approval request 39A) or other communication that elicits administrator input, or may leverage standing instructions/instruction heuristics from past administrator inputs to determine whether or not the risk correlation is administrator-approved.
If the risk correlation to risk-correlated device 18A does not receive administrator approval (‘NO’ branch of decision block 92), then risk-correlated device 18A may transmit a denial notification to risk data modeling device 16. Based on the denial notice (e.g., denial communication 43) received from risk-correlated device 18A, risk data modeling device 16 may decorrelate any risk associated with the functions of risk-correlated device 18A from the data of the input received from administrator-facing device 12 (94). As such, neither risk data modeling device 16 nor risk-correlated device 18A may modify any of the control procedures associated with the input, based on the input being decorrelated from any risks associated with the risk-ownership of risk-correlated device 18A.
If the risk correlation to risk-correlated device 18A receives administrator approval (YES' branch of decision block 92), then risk-correlated device 18A may modify one or more control procedures associated with the correlated risk (96). It will be appreciated that in various examples, risk-correlated device 18A may modify a locally-implemented control process action, may notify risk data modeling device 16 of a modification to a centrally-implemented control process action, or some combination of these procedures.
As illustrated by process 80 of
Moreover, risk-correlated devices 18A and 18B may communicate the approval/denial status back to risk data modeling device 16. In one example (as shown in
Based on denial communication 43B received from risk-correlated device 18B, risk data modeling device 16 may update the current risk data model for input 20A, such that future events similar to the event of input 20A are automatically left decorrelated from the functions of risk-correlated device 18B. As such, risk data modeling device 16 may eliminate future instances of risk correlation engine 24 evaluating data similar to that of input 20A and may eliminate future instances of notification generation engine 26 generating and transmitting notifications similar to risk correlation notification 44B. That is, risk data modeling device 16 may implement machine learning to update the risk data model, thereby avoiding redundant instances of risk correlation engine 24 reevaluating information similar to that of input 20A for risk correlation to the functions of risk-correlated device 18B. Similarly, risk data modeling device 16 may thereby avoid redundant instances of notification generation engine 26 generating and transmitting notifications similar to risk correlation notification 44B if a risk correlation has been denied by a risk owner operating risk-correlated device 18B. In this way, risk data modeling device 16 may implement the techniques of this disclosure to conserve computing resources and bandwidth by reducing redundant evaluations of risk correlations and reducing notification generation and transmission, while leveraging the benefits of already-performed risk correlation evaluations.
In some instances, one or more of risk-correlated devices 18 (e.g., risk-correlated device 18A) may transmit an indication or suggestion of additional risk correlation back to risk data modeling device 16. For instance, the risk owner operating risk-correlated device 18A may input a recommendation to correlate the data of input 20A to the functions of risk-correlated device 18C. Risk-correlated device 18A may transmit the risk owner-provided indication to risk data modeling device 16. In turn, risk data modeling device 16 may evaluate whether to update the currently-implemented risk data model to correlate risk information between input 20A and the functionalities implemented by risk-correlated device 18C.
Subject to the risk-correlation recommendation with respect to risk-correlated device 18C being approved for a risk data model update, risk data modeling device 16 may transmit a risk correlation notification to risk-correlated device 18C and/or update the risk data model to correlate future events similar to that of input 20A to the functionalities of risk-correlated device 18C. As shown in this example, risk data modeling device 16 may implement the techniques of this disclosure to crowdsource risk correlation information (e.g., in the form of recommendations) to update the risk data model for a certain type of risk-triggering input. In this way, risk data modeling device 16 may improve the operations of risk-correlated devices using risk-owner input, thereby supplementing the functioning of risk correlation engine 24 and/or notification generation engine 26 without further taxing the computing resources allotted to risk correlation engine 24 and/or notification engine 26.
It is to be recognized that depending on the example, certain acts or events of any of the techniques described herein can be performed in a different sequence, may be added, merged, or left out altogether (e.g., not all described acts or events are necessary for the practice of the techniques). Moreover, in certain examples, acts or events may be performed concurrently, e.g., through multi-threaded processing, interrupt processing, or multiple processors, rather than sequentially.
In one or more examples, the functions described may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, the functions may be stored on or transmitted over a computer-readable medium as one or more instructions or code, and executed by a hardware-based processing unit. Computer-readable media may include computer-readable storage media, which corresponds to a tangible medium such as data storage media, or communication media including any medium that facilitates transfer of a computer program from one place to another, e.g., according to a communication protocol. In this manner, computer-readable media generally may correspond to (1) tangible computer-readable storage media which is non-transitory or (2) a communication medium such as a signal or carrier wave. Data storage media may be any available media that can be accessed by one or more computers or one or more processors to retrieve instructions, code and/or data structures for implementation of the techniques described in this disclosure. A computer program product may include a computer-readable medium.
By way of example, and not limitation, such computer-readable storage media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage, or other magnetic storage devices, flash memory, or any other medium that can be used to store desired program code in the form of instructions or data structures and that can be accessed by a computer. Also, any connection is properly termed a computer-readable medium. For example, if instructions are transmitted from a website, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, digital subscriber line (DSL), or wireless technologies such as infrared, radio, and microwave, then the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of medium. It should be understood, however, that computer-readable storage media and data storage media do not include connections, carrier waves, signals, or other transitory media, but are instead directed to non-transitory, tangible storage media. Disk and disc, as used herein, includes compact disc (CD), laser disc, optical disc, digital versatile disc (DVD), floppy disk and Blu-ray disc, where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.
Instructions may be executed by one or more processors, such as one or more digital signal processors (DSPs), general purpose microprocessors, application specific integrated circuits (ASICs), field programmable gate arrays (FPGAs), or other equivalent integrated or discrete logic circuitry, as well as any combination of such components. Accordingly, the term “processor,” as used herein may refer to any of the foregoing structures or any other structure suitable for implementation of the techniques described herein. In addition, in some aspects, the functionality described herein may be provided within dedicated hardware and/or software modules. Also, the techniques could be fully implemented in one or more circuits or logic elements.
The techniques of this disclosure may be implemented in a wide variety of devices or apparatuses, including a wireless communication device or wireless handset, a mobile computing device, a wearable computing device, a microprocessor, an integrated circuit (IC) or a set of ICs (e.g., a chip set). Various components, modules, or units are described in this disclosure to emphasize functional aspects of devices configured to perform the disclosed techniques, but do not necessarily require realization by different hardware units. Rather, as described above, various units may be combined in a hardware unit or provided by a collection of interoperative hardware units, including one or more processors as described above, in conjunction with suitable software and/or firmware.
Various examples have been described. These and other examples are within the scope of the following claims.