Claims
- 1. A method of monitoring credit fraud relating to a plurality of merchants, comprising:
on a server computer, collecting transaction information relating to the merchants; electronically evaluating the collected transaction information for potentially fraudulent activities using specific criteria; and flagging merchants having transaction information indicating potentially fraudulent activity.
- 2. The method of claim 1, further comprising receiving at the server computer a request to display at least a partial list of flagged merchants and transmitting the request to a credit fraud investigator.
- 3. The method of claim 1, further comprising receiving a request at the server computer to transmit the structure of a decision tree that facilitates the completion of a credit risk evaluation and transmitting the structure of the decision tree to a credit fraud investigator.
- 4. The method of claim 1, further comprising receiving at the server computer a request from a credit fraud investigator to transmit, for one of the flagged merchants, merchant information from a file relating to the merchant and transmitting the merchant information to the credit fraud investigator.
- 5. The method of claim 4, further comprising receiving at the server computer revised merchant information from the credit fraud investigator and storing the revised merchant information in a database.
- 6. The method of claim 4, further comprising receiving at the server computer a request to add the merchant to a watch list.
- 7. The method of claim 4, further comprising receiving at a server computer a request to transmit the merchant information to a collections officer.
- 8. The method of claim 1, wherein the specified criteria comprises merchants processing at least one transaction involving a personal credit card account owned by the merchant.
- 9. The method of claim 1, wherein the specified criteria comprises merchants processing at least one transaction involving goods or services in a different business from the merchant's business.
- 10. The method of claim 1, wherein the specified criteria comprises merchants having charge back volumes in excess of charge volumes.
- 11. A system for monitoring credit fraud relating to a plurality of merchants, comprising:
a data storage arrangement; and a server computer configured to access the data storage arrangement; wherein the server computer is adapted to communicate with at least one other computer through a network, wherein the server computer is configured to collect transaction information relating to the merchants and electronically evaluate the collected transaction information for potentially fraudulent actives using specified criteria, wherein the server computer is further configured to flag merchants having transaction information indicating potentially fraudulent activity.
- 12. The system of claim 11, wherein the server computer is further configured to receive a request to display at least a partial list of flagged merchants and transmit the list to a credit fraud investigator.
- 13. The system of claim 11, wherein the server computer is further configured to receive a request to transmit the structure of a decision tree that facilitates the completion of a credit risk evaluation and transmit the structure of the decision tree to a credit fraud investigator.
- 14. The system of claim 11, wherein the server computer is further configured to receive a request from a credit fraud investigator to transmit, for a flagged merchant, merchant information from a file relating to the merchant and transmit the merchant information to the credit fraud investigator.
- 15. The system of claim 14, wherein the server computer is further configured to receive revised merchant information from the credit fraud investigator and store the revised merchant information in a database.
- 16. The system of claim 14, wherein the server computer is further configured to add the merchant to a watch list.
- 17. The system of claim 14, wherein the server computer is further configured to transmit the merchant information to a collections officer.
- 18. The system of claim 11, wherein the specified criteria comprises merchants processing at least one transaction involving a personal credit card account owned by the merchant.
- 19. The system of claim 11, wherein the specified criteria comprises merchants processing at least one transaction involving goods or services in a different business from the merchant's business.
- 20. The system of claim 11, wherein the specified criteria comprises merchants having charge back volumes in excess of charge volumes.
- 21. In a computer system having a graphical user interface, including a display and an entry device, a method of monitoring credit fraud relating to a plurality of merchants, the method comprising:
receiving an instruction to request, from a server computer, a list of merchants suspected of fraudulent activity; transmitting the request to the server computer; receiving and displaying the list; receiving an instruction to request, from the server computer, merchant information relating to a first merchant in the list of merchants; transmitting the request to the server computer; receiving and displaying the merchant information relating to the first merchant; receiving an instruction to transmit, to the server computer, revised merchant information; and transmitting the revised merchant information.
- 22. The computer system of claim 21, wherein the revised merchant information includes adding the merchant to a watch list.
- 23. The computer system of claim 21, wherein the revised merchant information includes an instruction to transmit the merchant information to a collections officer.
- 24. The computer system of claim 21, wherein the revised merchant information includes a notation that explains why the merchant activity was not fraudulent.
CROSS-REFERENCES TO RELATED APPLICATIONS
[0001] This application is related to commonly assigned and concurrently filed U.S. patent application Ser. No. ______, entitled “DECISION TREE SYSTEMS AND METHODS” (Attorney Docket No. 020375-008200US), by Mark G. Arthus, et al., and to commonly assigned and concurrently filed U.S. patent application Ser. No. ______, entitled “SYSTEMS AND METHODS FOR MONITORING CREDIT RISK” (Attorney Docket No. 020375-008500US), by Michael L. Sgaraglio, and to commonly assigned and concurrently filed U.S. patent application Ser. No. ______, entitled “MERCHANT APPLICATION AND UNDERWRITING SYSTEMS AND METHODS” (Attorney Docket No. 020375-007100US), by Michael L. Sgaraglio, et al., and to commonly assigned and concurrently filed U.S. patent application Ser. No. ______, entitled “MERCHANT ACTIVATION TRACKING SYSTEMS AND METHODS” (Attorney Docket No. 020375-023900US), by Michael L. Sgaraglio, et al., and to commonly assigned and concurrently filed U.S. patent application Ser. No. ______, entitled “SYSTEMS AND METHODS FOR MANAGING COLLECTIONS RELATING TO MERCHANT ACCOUNTS” (Attorney Docket No. 020375-008300US), by Mark G. Arthus, et al., and to copending, commonly assigned U.S. patent application Ser. No. ______, entitled “METHOD AND SYSTEM FOR IMPROVING FRAUD PREVENTION IN CONNECTION WITH A NEWLY OPENED CREDIT ACCOUNT” (Attorney Docket No. 020375-005800US), by Randy S. Britton, et al., on Mar. 4, 2002, which applications are incorporated herein by reference in their entirety for all purposes.