FRAUDULENT REQUEST IDENTIFICATION FROM BEHAVIORAL DATA

Various examples described herein are directed to systems, methods, and computer-readable medium for routing distribution requests. A request for distribution of funds is received. The funds are in an account of a user. An activity window is determined. Data from within the activity window is collec...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: BELL, KEVIN, FRASER, TYUA LARSEN, LYMAN, AMI WARREN, PARKS, CHRISTINA ANN, SICORD, ANGELA, BOESEL, KERRY, HINRICHS, PATRICIA, SYKES, KEITH MEADE, WATTS, STEVE, ROSENTHAL, MICHAEL
Format: Patent
Sprache:eng ; fre
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Various examples described herein are directed to systems, methods, and computer-readable medium for routing distribution requests. A request for distribution of funds is received. The funds are in an account of a user. An activity window is determined. Data from within the activity window is collected. A risk score is calculated based on the data. The request is routed to a further verification queue based on the risk score. Additional information needed to verify the request is determined. The additional information is requested and received. The additional information is verified. Approval of the request is determined based on the verification of the additional information.