FRAUDULENT REQUEST IDENTIFICATION FROM BEHAVIORAL DATA
Various examples described herein are directed to systems, methods, and computer-readable medium for routing distribution requests. A request for distribution of funds is received. The funds are in an account of a user. An activity window is determined. Data from within the activity window is collec...
Gespeichert in:
Hauptverfasser: | , , , , , , , , , |
---|---|
Format: | Patent |
Sprache: | eng ; fre |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Various examples described herein are directed to systems, methods, and computer-readable medium for routing distribution requests. A request for distribution of funds is received. The funds are in an account of a user. An activity window is determined. Data from within the activity window is collected. A risk score is calculated based on the data. The request is routed to a further verification queue based on the risk score. Additional information needed to verify the request is determined. The additional information is requested and received. The additional information is verified. Approval of the request is determined based on the verification of the additional information. |
---|