The disclosed technology generally relates to detecting fraud, and in particular, to systems and methods for detecting fraud related to a request for a payment or a benefit from a government agency.
Federal and state revenue departments in the United States face a number of problems associated with fraudulent requests for payments, benefits, and/or refunds. Fraudsters can apply for payments, benefits, and/or refunds by misrepresenting their identity, by stealing and using identity information from another individual, or by using an identity of a deceased person. The associated revenue loss to the federal and state government agency can be significant, and the process of verifying the legitimacy of the requester's identity can create costly delays.
Technically well-informed fraud perpetrators with sophisticated deception schemes are likely to continue targeting governmental entities, particularly if fraud detection and prevention mechanisms are not in place. Balancing the threats of identity fraud with efficient service for legitimate requests creates a significant challenge for governmental entities.
Some or all of the above needs may be addressed by certain embodiments of the disclosed technology. Certain embodiments of the disclosed technology may include systems and methods for detecting fraud.
According to an exemplary embodiment of the disclosed technology, a method is provided for detecting fraud related to an identity misrepresentation, identity creation or identity usurpation. The method includes receiving entity-supplied information comprising at least a name, a social security number, and a mailing address associated with a request for a payment or a benefit from a government agency; querying one or more public or private databases with the entity-supplied information; receiving a plurality of independent information in response to the querying, wherein the plurality of independent information includes, as applicable: an indication of whether or not the entity is deceased, and a date of death when the entity is indicated as deceased; independent address information associated with the entity; address validity information associated with the entity-supplied information; one or more records associated with the entity-supplied information; or no information. The method further includes determining, with one or more computer processors in communication with a memory, based at least in part on a comparison of the entity-supplied information with at least a portion of the plurality of independent information, indicators of fraud. The indicators of fraud can include: the entity deceased within a year of the request or died within a timeframe of the year that would indicate a possible non-fraud request for the payment or the benefit; the entity-supplied mailing address does not match with any of the independent address information; the entity-supplied mailing address having no record of association with any independent address information, including addresses of relatives or addresses of associates; and the entity-supplied mailing address includes an entity-supplied zip code having no record of association with one or more zip codes associated with the independent address information. The method further includes outputting, for display, zero or more indicators of fraud, wherein zero indicators of fraud correspond to no fraud determined.
According to an exemplary embodiment of the disclosed technology, another method is provided for detecting fraud related to an identity misrepresentation, identity creation or identity usurpation. The method can include receiving entity-supplied information comprising at least a name and a social security number associated with a request for a payment or a benefit from a government agency; querying one or more public or private databases with the entity-supplied information; receiving, based at least on the querying of the one or more public or private databases, data comprising one or more of a second social security number or a social security number variant associated with the entity-supplied name, a second name associated with the entity-supplied social security number, and a name variant associated with the entity-supplied social security number; querying an accessible Do Not Pay list with one or more combinations or variants of the entity-supplied information and the received public or private data; and outputting a fraud alert when the one or more combinations or variants result in a match with at least one record in the Do Not Pay list.
According to an example implementation of the disclosed technology, a system is provided. The system includes at least one memory for storing data and computer-executable instructions; and at least one processor configured to access the at least one memory and further configured to execute the computer-executable instructions to: receive entity-supplied information comprising at least a name, a social security number, and a mailing address associated with a request for a payment or a benefit from a government agency; query one or more public or private databases with the entity-supplied information; receive a plurality of independent information in response to the querying. The plurality of independent information includes, as applicable: an indication of whether or not the entity is deceased, and a date of death when the entity is indicated as deceased; independent address information associated with the entity; address validity information associated with the entity-supplied information; one or more records associated with the entity-supplied information; and no information. The at least one processor is further configured to execute the computer-executable instructions to determine, with the at least on processor, based at least in part on a comparison of the entity-supplied information with at least a portion of the plurality of independent information, indicators of fraud. The indicators of fraud may include one or more of: (1) the entity deceased within a year of the request or died within a timeframe that would indicate a possible non-fraud request for the payment or the benefit; (2) the entity-supplied mailing address does not match with any of the independent address information; (3) the entity-supplied mailing address having no record of association with any independent address information, including addresses of relatives or addresses of associates; and (4) the entity-supplied mailing address includes an entity-supplied zip code having no record of association with one or more zip codes associated with the independent address information. The at least one processor is further configured to execute the computer-executable instructions to output, for display, zero or more indicators of fraud, wherein zero indicators of fraud correspond to no fraud determined.
According to another exemplary embodiment, a system is provided that includes at least one memory for storing data and computer-executable instructions; and at least one processor configured to access the at least one memory and further configured to execute the computer-executable instructions to: receive entity-supplied information comprising at least a name and a social security number associated with a request for a payment or a benefit from a government agency; query one or more public or private databases with the entity-supplied information; receive, based at least on the querying of the one or more public or private databases, data comprising one or more of a second social security number or a social security number variant associated with the entity-supplied name, a second name associated with the entity-supplied social security number, and a name variant associated with the entity-supplied social security number; query an accessible Do Not Pay list with one or more combinations or variants of the entity-supplied information and the received public or private data; and output a fraud alert when the one or more combinations or variants result in a match with at least one record in the Do Not Pay list.
Exemplary embodiments of the disclosed technology can include one or more computer readable media comprising computer-executable instructions that, when executed by one or more processors, configure the one or more processors to perform a method. The method includes receiving entity-supplied information comprising at least a name, a social security number, and a mailing address associated with a request for a payment or a benefit from a government agency; querying one or more public or private databases with the entity-supplied information; receiving a plurality of independent information in response to the querying, wherein the plurality of independent information includes, as applicable: an indication of whether or not the entity is deceased, and a date of death when the entity is indicated as deceased; independent address information associated with the entity; address validity information associated with the entity-supplied information; one or more records associated with the entity-supplied information; or no information. The method further includes determining, with one or more computer processors in communication with a memory, based at least in part on a comparison of the entity-supplied information with at least a portion of the plurality of independent information, indicators of fraud. The indicators of fraud can include: the entity deceased within a year of the request or died within a timeframe of the year that would indicate a possible non-fraud request for the payment or the benefit; the entity-supplied mailing address does not match with any of the independent address information; the entity-supplied mailing address having no record of association with any independent address information, including addresses of relatives or addresses of associates; and the entity-supplied mailing address includes an entity-supplied zip code having no record of association with one or more zip codes associated with the independent address information. The method further includes outputting, for display, zero or more indicators of fraud, wherein zero indicators of fraud correspond to no fraud determined.
Exemplary embodiments of the disclosed technology can include one or more computer readable media comprising computer-executable instructions that, when executed by one or more processors, configure the one or more processors to perform a method. The method includes receiving entity-supplied information comprising at least a name and a social security number associated with a request for a payment or a benefit from a government agency; querying one or more public or private databases with the entity-supplied information; receiving, based at least on the querying of the one or more public or private databases, data comprising one or more of a second social security number or a social security number variant associated with the entity-supplied name, a second name associated with the entity-supplied social security number, and a name variant associated with the entity-supplied social security number; querying an accessible Do Not Pay list with one or more combinations or variants of the entity-supplied information and the received public or private data; and outputting a fraud alert when the one or more combinations or variants result in a match with at least one record in the Do Not Pay list.
Other embodiments, features, and aspects of the disclosed technology are described in detail herein and are considered a part of the claimed disclosed technologies. Other embodiments, features, and aspects can be understood with reference to the following detailed description, accompanying drawings, and claims.
Reference will now be made to the accompanying figures and flow diagrams, which are not necessarily drawn to scale, and wherein:
Embodiments of the disclosed technology will be described more fully hereinafter with reference to the accompanying drawings, in which embodiments of the disclosed technology are shown. This disclosed technology may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosed technology to those skilled in the art.
In the following description, numerous specific details are set forth. However, it is to be understood that embodiments of the disclosed technology may be practiced without these specific details. In other instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description. The term “exemplary” herein is used synonymous with the term “example” and is not meant to indicate excellent or best. References to “one embodiment,” “an embodiment,” “exemplary embodiment,” “various embodiments,” etc., indicate that the embodiment(s) of the disclosed technology so described may include a particular feature, structure, or characteristic, but not every embodiment necessarily includes the particular feature, structure, or characteristic. Further, repeated use of the phrase “in one embodiment” does not necessarily refer to the same embodiment, although it may.
As used herein, unless otherwise specified the use of the ordinal adjectives “first,” “second,” “third,” etc., to describe a common object, merely indicate that different instances of like objects are being referred to, and are not intended to imply that the objects so described must be in a given sequence, either temporally, spatially, in ranking, or in any other manner.
Certain embodiments of the disclosed technology may enable the detection of possible, probable, and/or actual fraud associated with a request for a payment or a benefit to a governmental agency. Embodiments disclosed herein may provide systems and methods for detecting identity misrepresentation, identity creation or identity usurpation related to the request. According to an example implementation of the disclosed technology, information supplied by a requester, together with information obtained from other sources, such as public or private databases, may be utilized to determine if the request is likely to be fraudulent or legitimate.
Certain embodiments of the disclosed technology may enable detection of various requests for payment, benefit, service, refund, etc. from a government agency or entity. The government agency, as referred to herein, may include any government entity or jurisdiction, including but not limited to federal, state, district, county, city, etc. Embodiments of the disclosed technology may be utilized to detect fraud associated with non-government entities. For example, embodiments of the disclosed technology may be utilized by various businesses, corporations, non-profits, etc., to detect fraud.
In one example application of the disclosed technology, suspect or fraudulent tax returns refund requests may be detected. For example, the disclosed technology may utilize information supplied by the refundee together with information obtained from other sources, such as public or private databases, to determine if the refund request is likely to be fraudulent or legitimate.
Certain example implementations of the disclosed technology may utilize an authentication process in response to the detection of a possible fraudulent request. For example, in response to the detection of one or more indicators of a fraudulent request for payment or benefit, a quiz may be generated and the requester may be required to provide correct answers before receiving the payment or benefit. In one example implementation, the quiz may be utilized to authenticate the person(s) requesting the payment or service.
According to an example implementation, if a payment or service (such as a tax refund, for example) is requested and if the associated request information is analyzed by the system and found to have questionable validity (such as a low score, for example), the quiz may be generated for the requester to complete. According to an example implementation, the quiz may be generated from information derived from one or more databases, and may take the form of a set of questions. In one example implementation, one or more of the questions associated with the generated quiz may be multiple choice. In another example implementation, one or more of the questions associated with the quiz may require specific input. In an example implementation, if the requester passes the quiz, then the requested payment or benefit may be processed so that the requester may receive the payment or benefit. Conversely, if the requester fails the quiz, then the requested payment or benefit may not be processed and the requester may not receive the funds without further authentication. Embodiments utilizing the quiz may help reduce the number requests that have been incorrectly flagged as fraudulent.
Various exemplary embodiments of the disclosed technology will now be described with reference to the accompanying figures.
In one example implementation, the legitimate requester 102 may have a legitimate social security number 104 associated with their name. In certain exemplary embodiments, the legitimate requester 102 may also have a legitimate address 106 associated with their name and/or social security number 104. According to certain exemplary embodiments, one or more databases 138 may be utilized, for example, to verify that the name, social security number 104, and/or address 106 match the identity of the legitimate requester 102. In a typical normal scenario, the legitimate requester 102 may submit the request for payment or benefit, and governmental entity 108 may provide the payment or benefit 112. For example, the payment or benefit, in one example implementation may be a tax refund. Accordingly, in certain example implementation, the payment or benefit 112 may be dispersed to the legitimate requester 102 by one or more of: (1) a check mailed to the legitimate address 106; (2) a debit card 116 mailed to the legitimate address 106; or (3) electronic funds transferred 113 to the legitimate taxpayer's 102 bank account 114. In other example implementations, the payment or benefit 112 may dispersed or provided according to the normal procedures of the providing entity. In such a scenario, the system 100 may work quickly and efficiently to provide payment or service (for example a refund tax overpayment) to the legitimate requester 102.
Unfortunately, there exists other scenarios, as depicted in
In certain scenarios, the fraudster 124 may actually reside at a first address 132, or even in jail 130, but may submit a request for payment or benefit using a second address 128 to avoid being tracked down. In certain scenarios, the fraudster 124 may provide a fabricated social security number 126 in requesting the payment or benefit. In yet another scenario, the fraudster 126 may steal the real social security number 136 associated with a child 134 to obtain payment or benefit.
Exemplary embodiments of the disclosed technology may be utilized to detect a potential fraudulent requests for payment or benefits, and may be utilized to cancel a payment or benefit to a potential fraudster 124. Other exemplary embodiments of the disclosed technology may be utilized to detect false positive situations and allow payment or benefit for scenarios that may otherwise be flagged as being suspicious. For example, a legitimate scenario that can appear as fraudulent involves taxable income from a first job. Typically, such taxpayers in this category may be minors with no public record associated with a residence or prior income. Embodiments of the disclosed technology may utilize social security number patterns, blocks, etc., and/or the age of the requester 102124 to determine legitimacy of the request and/or the legitimacy of the requester's identity.
According to certain exemplary embodiments of the disclosed technology, a requester 102124 may provide certain entity-supplied information with a request for payment or benefit 112 that includes at least a name, social security number, and mailing address. In an exemplary embodiment, one or more databases 138 may be queried with the entity-supplied information. For example, the one or more databases 138 may include public or private databases. In accordance with certain exemplary embodiments, one or more public records may be utilized verify entity-supplied information or retrieve additional information based on the entity-supplied information. According to exemplary embodiments, the public records may include one or more of housing records, vehicular records, marriage records, divorce records, hospital records, death records, court records, property records, incarceration records, or utility records. In exemplary embodiments, the utility records can include one or more of utility hookups, disconnects, and associated service addresses.
According to exemplary embodiments, a plurality of independent information may be received in response to the querying of the public or private database(s). In accordance with exemplary embodiments, the independent information may include, but is not limited to (1) an indication of whether or not the entity is deceased; (2) independent address information associated with the entity; (3) address validity information associated with the entity-supplied information; (3) one or more public records associated with the entity-supplied information; or (4) no information.
Exemplary embodiments of the disclosed technology may make a comparison of the entity-supplied information with the plurality of independent information to determine zero or more indicators of fraud. For example, embodiments of the disclosed technology may compare the entity-supplied information with the plurality of independent information to determine if the entity associated with the request for payment or benefit died within a timeframe that would indicate a possible non-fraud request, but with no record of association between the entity-supplied mailing address and the address information obtained via the independent information. Such a scenario may represent a situation where a fraudster 124 has obtained a name and social security information 120 from a deceased person 118, but where the address provided does not correspond with the known residence address 122 of the deceased person 118, or with any known relatives or associates of the deceased person 118. This scenario may be an indicator of a attempt by a fraudster 124 to have a deceased person's 118 payment or benefit 112 sent to a post office box or other address that can be monitored by the fraudster 124 without any direct tie to the fraudster 124. Exemplary embodiments of the disclosed technology may include a length of time entity has been deceased (if the entity is deceased) in the determination of fraud indicators. For example, a request for payment or benefit listing a person known to be dead for 10 years is very likely a fraudulent refund request.
According to another exemplary embodiment of the disclosed technology, a comparison may be made with the entity-supplied mailing address and the independent information to determine if the entity-supplied mailing address is invalid with no record of association between a zip code of the entity-supplied mailing address and one or more zip codes associated with the independent address information. For example, situations exist where a legitimate taxpayer 102 may abbreviate or include a typographical error their return mailing address, but they may provide a correct zip code that could be verified with the independent information. However, a fraudster 124 may be likely to use a completely different zip code, and in such situations, embodiments of the disclosed technology may utilize the inconsistent zip code information to flag a possible fraudulent tax return request.
According to another exemplary embodiment of the disclosed technology, a comparison may be made with the entity-supplied mailing address and the independent information to determine whether or not there is any record of association between the entity-supplied mailing address and any independent address information, such as the address of a relative, or associate. According to an exemplary embodiment, if there is no association between the entity-supplied mailing address and any independent address information, then there is a high likelihood that the payment or benefit request is fraudulent.
In accordance with certain exemplary embodiments of the disclosed technology, fraud false positive indicators may determined, based at least in part on a comparison of the entity-supplied information with the plurality of independent information. Absent of exemplary embodiments of the disclosed technology, certain situations may be incorrectly flagged as fraudulent, and may create costly and unnecessary delays related to the disbursement of the payment or benefit. In one exemplary embodiment, a fraud false positive indicator may be based on an analysis to detect if the entity-supplied mailing address is invalid, but with a record of association between a zip code of the entity-supplied mailing address and one or more zip codes associated with the independent address information. This represents a situation where a legitimate requester 102 has abbreviated their address or included a typographical error in the address, but the zip code corresponds with one known to be associated with the legitimate requester 102.
According to another exemplary embodiment, a fraud false positive indicator may be based on the entity-supplied social security number when there is no independent information available. For example, in one exemplary embodiment, the entity-supplied social security number may be checked to determine if it is valid and issued within 3 to 15 years, and the independent information can be checked to see if it includes information. If no independent information is available and if the entity-supplied social security number is valid and issued within 3 to 15 years, then this information may provide an indication that the requesting entity is a minor. In another exemplary embodiment, the social security number may be checked to determine if the entity is at least 24 years old with a valid social security number issued within 3 to 15 years, and the obtained independent information includes no information. In this scenario, exemplary embodiments of the disclosed technology may provide an indication that the requesting entity is an immigrant.
According to exemplary embodiments of the disclosed technology, one or more public or private databases 138 may be accessed to receive independent information. For example, one or more public records may be provide housing records, vehicular records, marriage records, divorce records, hospital records, death records, court records, property records, incarceration records, or utility records. In exemplary embodiments, the utility records may include one or more of utility hookups, disconnects, and associated service addresses. According to exemplary embodiments of the disclosed technology, such public records may be searched by social security number and/or name to provide independent information that can be utilized to verify entity-supplied information. For example, entity-supplied address information can be checked to determine if it corresponds to any addresses of relatives or associates of the entity.
According to certain exemplary embodiments of the disclosed technology, fraud associated with a request for payment or benefit may be detected by querying a Do Not Pay list with a combination of entity-supplied information and independent information obtained from one or more public records. For example, a person may be listed on a Do Not Pay list for a number of reasons, including being incarcerated, not paying child support, having liens, etc. Persons on the Do Not Pay list may supply an incorrect social security number or a slight misspelling of a name to avoid being matched with the information on the Do Not Pay list.
An example implementation of the disclosed technology may include receiving entity-supplied information that includes at least a name and a social security number and querying one or more public records with the entity-supplied information. Certain exemplary embodiments of the disclosed technology may receive, based at least on the querying, public data that includes one or more of a second social security number or variant of a social security number associated with entity-supplied name, a second name associated with the entity-supplied social security number, or a name variant associated with the entity-supplied social security number. For example, a variant may include information such as a name, a number, or an address, etc. that approximately matches real or legitimate information. A social security number variant, for example, may be nearly identical to a legitimate social security number, but with one or more numbers changed, transposed, etc.
According to exemplary embodiments of the disclosed technology, a Do Not Pay list may be queried with one or more combinations and/or variants of the entity-supplied information and the received public data, and a fraud alert may be output if the one or more combinations and/or variants result in a match with at least one record in the Do Not Pay list. Thus, in certain example implementations, the entity-supplied information may be compared with variations of information on the Do Not Pay list (and/or other public or private information) to determine a possible match. Conversely, in other example implementations, information obtained from the Do Not Pay list (and/or other public or private sources) may be compared with variations of the entity-supplied information to determine possible matches.
According to certain exemplary embodiments, the Do Not Pay list may be queried with one or more combinations of the entity-supplied name and entity-supplied social security number, the entity-supplied name and a second social security number or a variant of the social security number, the second name or name variant and the entity supplied social security number, or the second name or name variant and the second social security number or variant of the social security number. According to exemplary embodiments, if one of the combinations or variants matches the information on the Do Not Pay list, then a fraud alert may be output.
Various embodiments of the communication systems and methods herein may be embodied in non-transitory computer readable media for execution by a processor. An exemplary embodiment may be used in an application of a mobile computing device, such as a smartphone or tablet, but other computing devices may also be used.
The architecture 300 of
According to an exemplary embodiment, the architecture 300 includes a read-only memory (ROM) 320 where invariant low-level systems code or data for basic system functions such as basic input and output (I/O), startup, or reception of keystrokes from a keyboard are stored in a non-volatile memory device. According to an exemplary embodiment, the architecture 300 includes a storage medium 322 or other suitable type of memory (e.g. such as RAM, ROM, programmable read-only memory (PROM), erasable programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM), magnetic disks, optical disks, floppy disks, hard disks, removable cartridges, flash drives), where the files include an operating system 324, application programs 326 (including, for example, a web browser application, a widget or gadget engine, and or other applications, as necessary) and data files 328 are stored. According to an exemplary embodiment, the architecture 300 includes a power source 330 that provides an appropriate alternating current (AC) or direct current (DC) to power components. According to an exemplary embodiment, the architecture 300 includes and a telephony subsystem 332 that allows the device 300 to transmit and receive sound over a telephone network. The constituent devices and the CPU 302 communicate with each other over a bus 334.
In accordance with exemplary embodiments, the CPU 302 has appropriate structure to be a computer processor. In one arrangement, the computer CPU 302 is more than one processing unit. The RAM 318 interfaces with the computer bus 334 to provide quick RAM storage to the CPU 302 during the execution of software programs such as the operating system application programs, and device drivers. More specifically, the CPU 302 loads computer-executable process steps from the storage medium 322 or other media into a field of the RAM 318 in order to execute software programs. Data is stored in the RAM 318, where the data is accessed by the computer CPU 302 during execution. In one exemplary configuration, the device 300 includes at least 128 MB of RAM, and 256 MB of flash memory.
The storage medium 322 itself may include a number of physical drive units, such as a redundant array of independent disks (RAID), a floppy disk drive, a flash memory, a USB flash drive, an external hard disk drive, thumb drive, pen drive, key drive, a High-Density Digital Versatile Disc (HD-DVD) optical disc drive, an internal hard disk drive, a Blu-Ray optical disc drive, or a Holographic Digital Data Storage (HDDS) optical disc drive, an external mini-dual in-line memory module (DIMM) synchronous dynamic random access memory (SDRAM), or an external micro-DIMM SDRAM. Such computer readable storage media allow the device 300 to access computer-executable process steps, application programs and the like, stored on removable and non-removable memory media, to off-load data from the device 300 or to upload data onto the device 300. A computer program product, such as one utilizing a communication system may be tangibly embodied in storage medium 322, which may comprise a machine-readable storage medium.
An exemplary method 400 will now be described with reference to the flowchart of
According to certain example embodiments, the plurality of independent information can include one or more of (1) an indication of whether or not the entity is deceased, and a date of death when the entity is indicated as deceased; (2) independent address information associated with the entity; (3) address validity information associated with the entity-supplied information; (4) one or more records associated with the entity-supplied information; or (5) no information.
In block 408, the method 400 includes determining, with one or more computer processors in communication with a memory, based at least in part on a comparison of the entity-supplied information with at least a portion of the plurality of independent information, one or more indicators of fraud. For example, the indicators of fraud may include one or more of (1) the entity is indicated as deceased within a year of the request or died within a timeframe of the year that would indicate a possible non-fraud request for the payment or the benefit; (2) the entity-supplied mailing address does not match with any of the independent address information; (3) the entity-supplied mailing address having no record of association with any independent address information, including addresses of relatives or addresses of associates; and (4) the entity-supplied mailing address includes an entity-supplied zip code having no record of association with one or more zip codes associated with the independent address information.
In block 410, the method 400 includes outputting, for display, zero or more indicators of fraud, wherein zero indicators of fraud correspond to no fraud determined.
Another exemplary method 500 for detecting fraud related to an identity misrepresentation, identity creation or identity usurpation will now be described with reference to the flowchart of
According to exemplary embodiments, certain technical effects can be provided, such as creating certain systems and methods that detect fraud related to a request for payment or benefit. Exemplary embodiments of the disclosed technology can provide the further technical effects of providing systems and methods for determining and eliminating false positives with respect to fraud.
Example implementations of the disclosed technology may utilize an authentication quiz process in response to the detection of a possible fraudulent request. For example, in response to the detection of one or more indicators of a fraudulent request for payment or benefit, the requester may be required to provide correct answers to a custom quiz before receiving the payment or benefit.
According to an example implementation, information associated with the request may be analyzed by the system (for example, the computer system architecture or device 300 as shown in
According to an example implementation, the quiz may include one or more questions that are generated from information derived from the one or more databases. In one example implementation, the generated quiz may be multiple choice. In another example implementation, one or more of the questions associated with the quiz may require specific input. In an example implementation, if the requester passes the quiz, then the requested payment or benefit may be processed so that the requester may receive the payment or benefit. Conversely, if the requester fails the quiz, then the requested payment or benefit may not be processed and the requester may not receive the funds without further authentication. Embodiments utilizing the quiz may help reduce the number requests that have been incorrectly flagged as fraudulent
In exemplary embodiments of the disclosed technology, the fraud detection system 200 and/or the fraud detection system architecture 300 may include any number of hardware and/or software applications that are executed to facilitate any of the operations. In exemplary embodiments, one or more I/O interfaces may facilitate communication between the fraud detection system 200 and/or the fraud detection system architecture 300 and one or more input/output devices. For example, a universal serial bus port, a serial port, a disk drive, a CD-ROM drive, and/or one or more user interface devices, such as a display, keyboard, keypad, mouse, control panel, touch screen display, microphone, etc., may facilitate user interaction with the fraud detection system 200 and/or the fraud detection system architecture 300. The one or more I/O interfaces may be utilized to receive or collect data and/or user instructions from a wide variety of input devices. Received data may be processed by one or more computer processors as desired in various embodiments of the disclosed technology and/or stored in one or more memory devices.
One or more network interfaces may facilitate connection of the fraud detection system 200 and/or the fraud detection system architecture 300 inputs and outputs to one or more suitable networks and/or connections; for example, the connections that facilitate communication with any number of sensors associated with the system. The one or more network interfaces may further facilitate connection to one or more suitable networks; for example, a local area network, a wide area network, the Internet, a cellular network, a radio frequency network, a Bluetooth™ enabled network, a Wi-Fi™ enabled network, a satellite-based network any wired network, any wireless network, etc., for communication with external devices and/or systems.
As desired, embodiments of the disclosed technology may include the fraud detection system 200 and/or the fraud detection system architecture 300 with more or less of the components illustrated in
Certain embodiments of the disclosed technology are described above with reference to block and flow diagrams of systems and methods and/or computer program products according to exemplary embodiments of the disclosed technology. It will be understood that one or more blocks of the block diagrams and flow diagrams, and combinations of blocks in the block diagrams and flow diagrams, respectively, can be implemented by computer-executable program instructions. Likewise, some blocks of the block diagrams and flow diagrams may not necessarily need to be performed in the order presented, or may not necessarily need to be performed at all, according to some embodiments of the disclosed technology.
These computer-executable program instructions may be loaded onto a general-purpose computer, a special-purpose computer, a processor, or other programmable data processing apparatus to produce a particular machine, such that the instructions that execute on the computer, processor, or other programmable data processing apparatus create means for implementing one or more functions specified in the flow diagram block or blocks. These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means that implement one or more functions specified in the flow diagram block or blocks. As an example, embodiments of the disclosed technology may provide for a computer program product, comprising a computer-usable medium having a computer-readable program code or program instructions embodied therein, said computer-readable program code adapted to be executed to implement one or more functions specified in the flow diagram block or blocks. The computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational elements or steps to be performed on the computer or other programmable apparatus to produce a computer-implemented process such that the instructions that execute on the computer or other programmable apparatus provide elements or steps for implementing the functions specified in the flow diagram block or blocks.
Accordingly, blocks of the block diagrams and flow diagrams support combinations of means for performing the specified functions, combinations of elements or steps for performing the specified functions and program instruction means for performing the specified functions. It will also be understood that each block of the block diagrams and flow diagrams, and combinations of blocks in the block diagrams and flow diagrams, can be implemented by special-purpose, hardware-based computer systems that perform the specified functions, elements or steps, or combinations of special-purpose hardware and computer instructions.
While certain embodiments of the disclosed technology have been described in connection with what is presently considered to be the most practical and various embodiments, it is to be understood that the disclosed technology is not to be limited to the disclosed embodiments, but on the contrary, is intended to cover various modifications and equivalent arrangements included within the scope of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.
This written description uses examples to disclose certain embodiments of the disclosed technology, including the best mode, and also to enable any person skilled in the art to practice certain embodiments of the disclosed technology, including making and using any devices or systems and performing any incorporated methods. The patentable scope of certain embodiments of the disclosed technology is defined in the claims, and may include other examples that occur to those skilled in the art. Such other examples are intended to be within the scope of the claims if they have structural elements that do not differ from the literal language of the claims, or if they include equivalent structural elements with insubstantial differences from the literal language of the claims.
This application is a continuation of U.S. patent application Ser. No. 13/541,157, filed Jul. 3, 2012, and published as U.S. Patent Publication No. US20140012716, entitled “SYSTEMS AND METHODS FOR DETECTING TAX REFUND FRAUD,” the contents of which are hereby incorporated by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
Parent | 13541157 | Jul 2012 | US |
Child | 14170892 | US |