This application relates to transactions involving ACH addenda records.
An ACH transmission typically includes a certain amount of information. The transmission itself includes a portion of the information and an ACH addenda, preferably associated with the transmission, includes additional information.
Some of the information incorporated in the ACH transmission may be confidential information. Some of the information included in the ACH transmission may be non-confidential information.
While it may be important to disclose some of the information to relevant, and authorized parties, nevertheless certain rules and regulations may require that at least a portion of the information remain confidential. Such rules and regulations may include privacy rules and regulations that prevent disclosure of certain personal information. For example, to the extent that financial institutions provide clearinghouse services to health care businesses, the financial institutions may be covered by the Health Insurance Portability and Accountability Act (“HIPPA”).
Methods and systems for removal of information from an Automated Clearing House (“ACH”) addenda record are provided. One such method may include receiving ACH information and receiving ACH addenda information associated with the ACH information. The method may further include analyzing the ACH addenda information. The analysis may result in flagging at least one field from the ACH addenda information as sensitive information. The method may further include removing the field comprising sensitive information from the ACH addenda information and identifying remaining ACH addenda information. The method may then include cropping a subset of the remaining ACH addenda information to harvest a portion of the remaining information. The portion may include core fields. The harvested information may be displayed, transmitted or exported to provide a response to a client inquiry or for any other suitable purpose.
The objects and advantages of the invention will be apparent upon consideration of the following detailed description, taken in conjunction with the accompanying drawings, in which like reference characters refer to like parts throughout, and in which:
Apparatus, methods and media (collectively referred to herein as a “system”) for removal of information from an Automated Clearing House (“ACH”) addenda record are provided.
For the sake of illustration, the invention will be described as being performed by a “system.” The “system” may include one or more of the features of the apparatus and methods that are shown or described herein and/or any other suitable device or approach. The “system” may be provided by an entity. The entity may be an individual, an organization or any other suitable entity.
The system may receive information. The information may include ACH information.
The system may receive addenda information. The addenda information may be ACH addenda information. The ACH addenda information may be associated with the ACH information.
The addenda information may be recorded in a record that includes a suitable number of characters. In some embodiments, a suitable number of characters may be 80 characters.
In certain embodiments, the system may flag a field. The field may be a field from the ACH addenda information. The field may be flagged as sensitive information. The field may be flagged as containing sensitive information.
The system may remove the field. The system may remove the field containing sensitive information. The system may remove the sensitive information. The field and/or sensitive information may be removed from the ACH addenda information.
The system may identify remaining information. The remaining information may include remaining ACH addenda information.
The system may crop information. The cropping may include removing one or more fields from a data set. The system may crop a subset of remaining ACH addenda information. The subset of information may be cropped to harvest a portion of information. The portion of information may include a portion of the remaining information.
The portion of remaining information may include core fields. Such core fields may include invoice number, date and amount of ACH transmission or a subset of the transmission. In certain embodiments, such transmissions may only show certain information in code form. For example, certain information such as client names may be encoded.
The system may transmit the harvested information. The harvested information may be transmitted for further ACH processing. In certain embodiments, the harvested information may be transmitted to ACX, which is the United States ACH processing platform. Some embodiments may also apply to international transmissions processed through SWIFT.
In response to a client request for information regarding the ACH, certain embodiments may enable only predetermined information to be transmitted.
The removed ACH field may be stored in memory. The memory may include computer memory.
The identified remaining ACH addenda information may include non-sensitive ACH information. The remaining ACH addenda information may include non-sensitive ACH addenda fields.
The harvested portion of information may be a first portion. The first portion may include a first portion of the remaining information. The first portion of information may be transmitted for further ACH processing or to respond to a client inquiry. The harvested portion of information may be a second portion. The second portion may include a second portion of remaining information. The second portion of information may not be transmitted for further ACH processing.
The system may flag at least one field. The field may be flagged for containing sensitive information. The field may be flagged as containing sensitive information. The field may be flagged using an algorithm. The algorithm may include a selection algorithm. The algorithm may be a pre-configured algorithm. In some embodiments, the algorithm could determine sensitive information based on criteria such as SEC code and/or source of transmission (originator/receiver or region/country). The algorithm could also apply to both memo (soft-posted) and hard-posted transactions.
Such an algorithm may determine which fields are sensitive based on the nature of the characters in the field. For example, certain algorithms may determine whether an account number appears in the addenda. Such an algorithm may review the addenda to determine whether eight numbers appear in a row between the beginning and the end of a field. Similarly, an algorithm may review the addenda to determine whether, in the case of a social security number determination, nine numbers appear between the beginning and the end of a field. Such algorithms may preferably be used to identify confidential information appearing in fields.
In certain embodiments, upon a determination that a field contains confidential and/or sensitive information, the field containing sensitive information may be removed. The field containing sensitive information may be flagged for removal. The field that is flagged for removal may be removed. The system may remove the field to satisfy one or more rules. The one or more rules may include laws, by-laws or compliance rules. Such rules may include, for example, HIPPA rules.
The ACH addenda field may be one of a plurality of ACH addenda fields.
The plurality of ACH addenda fields may include an invoice number, date, amount, entry detail record, file header record, batch header record, batch control, total, priority code, origin, destination, account number or any other suitable ACH addenda field.
The system may remove the ACH addenda field containing sensitive information from the ACH addenda information. The removed field containing sensitive information may be prevented from further display, transmission or export.
In certain embodiments, following removal of the field(s) containing sensitive information, the addenda may be cropped down. The cropping down may preferably show what looks like a complete addenda, but, in fact only shows non-sensitive information.
Illustrative embodiments of apparatus and methods in accordance with the principles of the invention will now be described with reference to the accompanying drawings, which form a part hereof. It is to be understood that other embodiments may be utilized and structural, functional and procedural modifications may be made without departing from the scope and spirit of the present invention.
The memory 115 may be comprised of any suitable permanent storage technology—e.g., a hard drive. The memory 115 stores software including the operating system 117 any application(s) 119 along with any data 111 needed for the operation of the system 100. Alternatively, some or all of computer executable instructions may be embodied in hardware or firmware (not shown). The computer 101 executes the instructions embodied by the software to perform various functions.
Input/output (“I/O”) module may include connectivity to a microphone, keyboard, touch screen, and/or stylus through which a user of computer 101 may provide input, and may also include one or more speakers for providing audio output and a video display device for providing textual, audiovisual and/or graphical output.
System 100 may be connected to other systems via a LAN interface 113.
System 100 may operate in a networked environment supporting connections to one or more remote computers, such as terminals 141 and 151. Terminals 141 and 151 may be personal computers or servers that include many or all of the elements described above relative to system 100. The network connections depicted in
It will be appreciated that the network connections shown are illustrative and other means of establishing a communications link between the computers may be used. The existence of any of various well-known protocols such as TCP/IP, Ethernet, FTP, HTTP and the like is presumed, and the system can be operated in a client-server configuration to permit a user to retrieve web pages from a web-based server. Any of various conventional web browsers can be used to display and manipulate data on web pages.
Additionally, application program(s) 119, which may be used by computer 101, may include computer executable instructions for invoking user functionality related to communication, such as email, Short Message Service (SMS), and voice input and speech recognition applications.
Computer 101 and/or terminals 141 or 151 may also be devices including various other components, such as a battery, speaker, and antennas (not shown).
Terminal 151 and/or terminal 141 may be portable devices such as a laptop, cell phone, Blackberry™, or any other suitable device for storing, transmitting and/or transporting relevant information. Terminals 151 and/or terminal 141 may be other devices. These devices may be identical to system 100 or different. The differences may be related to hardware components and/or software components.
Apparatus 200 may include one or more of the following components: I/O circuitry 204, which may include a transmitter device and a receiver device and may interface with fiber optic cable, coaxial cable, telephone lines, wireless devices, PHY layer hardware, a keypad/display control device or any other suitable encoded media or devices; peripheral devices 206, which may include counter timers, real-time timers, power-on reset generators or any other suitable peripheral devices; logical processing device 208, which may compute data structural information, structural parameters of the data and/or field locations determinants and/or contents and machine-readable memory 210.
Machine-readable memory 210 may be configured to store in machine-readable data structures: information pertaining to a ACH addenda, information pertaining to classification of confidential information, updated rules and regulations, current transactions and/or any other suitable information or data structures.
Components 202, 204, 206, 208 and 210 may be coupled together by a system bus or other interconnections 212 and may be present on one or more circuit boards such as 220. In some embodiments, the components may be integrated into a single chip. The chip may be silicon-based.
Step 307 shows analyzing the ACH addenda information. Preferably pursuant to the analysis, step 309 shows flagging at least one field from the ACH addenda information as sensitive information.
Step 311 shows removing the field comprising sensitive information from the ACH addenda information. Step 313 shows identifying remaining ACH addenda information.
The method may then, as shown in step 315, crop a subset of the remaining ACH addenda information to harvest a portion of the remaining information. The portion may preferably include core fields.
Once the core fields have been prepared, the method may include transmitting the harvested information for further ACH processing. In one embodiment, transmitting the harvested information may include transmitting the cropped addenda.
The process may also include step 407 which illustrates cropping a second harvested portion of the remaining ACH addenda information. The remaining ACH addenda information preferably remains for display, transmission or export.
Step 409 shows preventing transmittal of the second harvested portion for further use. The preventing may be based, for example, on security concerns associated with client or employee visibility with respect to the second harvested portion of the ACH addenda information.
Thus, methods and apparatus for removal of information from an automated clearing house (“ACH”) addenda record are provided. Persons skilled in the art will appreciate that the present invention can be practiced by other than the described embodiments, which are presented for purposes of illustration rather than of limitation, and that the present invention is limited only by the claims that follow.