U.S. patent application number 14/987052 was filed with the patent office on 2017-07-06 for malfeasance detection based on identification of device signature.
The applicant listed for this patent is Bank of America Corporation. Invention is credited to Matthew Hsieh, Alicia C. Jones-McFadden, Linda Yoon Lentz, Gail Mohr.
Application Number | 20170193718 14/987052 |
Document ID | / |
Family ID | 59009348 |
Filed Date | 2017-07-06 |
United States Patent
Application |
20170193718 |
Kind Code |
A1 |
Jones-McFadden; Alicia C. ;
et al. |
July 6, 2017 |
MALFEASANCE DETECTION BASED ON IDENTIFICATION OF DEVICE
SIGNATURE
Abstract
Systems, methods, and computer program products are described
herein that provide for notifying a malfeasance specialist of a
malfeasance detection based on identification of a device
signature. Monitoring devices may monitor devices in a location for
device signatures that are known to be associated with malfeasance.
Upon detecting the presence of a device signature associated with
malfeasance, a specialist may be notified of the detection so that
the specialist may take appropriate actions in response to the
detection.
Inventors: |
Jones-McFadden; Alicia C.;
(Fort Mill, SC) ; Hsieh; Matthew; (Charlotte,
NC) ; Mohr; Gail; (Menlo Park, CA) ; Lentz;
Linda Yoon; (San Jose, CA) |
|
Applicant: |
Name |
City |
State |
Country |
Type |
Bank of America Corporation |
Charlotte |
NC |
US |
|
|
Family ID: |
59009348 |
Appl. No.: |
14/987052 |
Filed: |
January 4, 2016 |
Current U.S.
Class: |
1/1 |
Current CPC
Class: |
H04W 4/90 20180201; H04B
5/0062 20130101; G07C 9/28 20200101; H04W 4/021 20130101 |
International
Class: |
G07C 9/00 20060101
G07C009/00; H04B 5/00 20060101 H04B005/00; G06K 19/07 20060101
G06K019/07; H04W 4/02 20060101 H04W004/02; H04W 4/22 20060101
H04W004/22 |
Claims
1. A system for notifying a malfeasance specialist of a malfeasance
detection based on identification of a device signature, said
system comprising: one or more memory devices having computer
readable program code stored thereon; a communication device; and
one or more processing devices operatively coupled to the one or
more memory devices, wherein the one or more processing devices are
configured to execute the computer readable program code to:
identify device signatures of a plurality of devices associated
with malfeasance; store the device signatures associated with
malfeasance in a database; monitor a geographical location for the
device signatures associated with malfeasance; detect a presence of
a first device signature in the geographical location, wherein the
first device signature is associated with a first device; compare
the first device signature with the stored device signatures
associated with malfeasance; determine, based on the comparison,
that the first device signature matches at least one of the stored
device signatures associated with malfeasance; and in response to
determining that the first device signature matches at least one of
the stored device signatures associated with malfeasance, provide a
notification to a malfeasance specialist of a presence of the first
device at the geographical location.
2. (canceled)
3. The system of claim 1, wherein monitoring the geographical
location for device signatures comprises pinging the geographical
location to detect mobile device signatures currently present in
the geographical location.
4. The system of claim 1, wherein monitoring the geographical
location for device signatures comprises searching for card
signatures of a plurality of cards located in the geographical
location with one or more NFC readers located in the geographical
location.
5. The system of claim 1, wherein providing the notification to the
malfeasance specialist comprises displaying the notification on a
specialist device associated with the malfeasance specialist.
6. The system of claim 1, wherein providing the notification to the
malfeasance specialist comprises emitting an audible alarm from a
specialist device associated with the malfeasance specialist.
7. The system of claim 1, wherein the one or more processing
devices are configured to execute the computer readable program
code to prompt a user associated with the first device to provide a
higher level of authorization credentials than an ordinary level of
authorization credentials.
8. A computer program product for notifying a malfeasance
specialist of a malfeasance detection based on identification of a
device signature, the computer program product comprising at least
one non-transitory computer readable medium comprising computer
readable instructions, the instructions comprising instructions
for: identifying device signatures of a plurality of devices
associated with malfeasance; storing the device signatures
associated with malfeasance in a database; monitoring a
geographical location for the device signatures associated with
malfeasance; detecting a presence of a first device signature in
the geographical location, wherein the first device signature is
associated with a first device; comparing the first device
signature with the stored device signatures associated with
malfeasance; determining, based on the comparison, that the first
device signature matches at least one of the stored device
signatures associated with malfeasance; and in response to
determining that the first device signature matches at least one of
the stored device signatures associated with malfeasance, providing
a notification to a malfeasance specialist of a presence of the
first device at the geographical location.
9. (canceled)
10. The computer program product of claim 8, wherein monitoring the
geographical location for device signatures comprises pinging the
geographical location to detect mobile device signatures currently
present in the geographical location.
11. The computer program product of claim 8, wherein monitoring the
geographical location for device signatures comprises searching for
card signatures of a plurality of cards located in the geographical
location with one or more NFC readers located in the geographical
location.
12. The computer program product of claim 8, wherein providing the
notification to the malfeasance specialist comprises displaying the
notification on a specialist device associated with the malfeasance
specialist.
13. The computer program product of claim 8, wherein providing the
notification to the malfeasance specialist comprises emitting an
audible alarm from a specialist device associated with the
malfeasance specialist.
14. The computer program product of claim 8, wherein the computer
readable instructions further comprise instructions for prompting a
user associated with the first device to provide a higher level of
authorization credentials than an ordinary level of authorization
credentials.
15. A computer implemented method for notifying a malfeasance
specialist of a malfeasance detection based on identification of a
device signature, said computer implemented method comprising:
providing a computing system comprising a computer processing
device and a non-transitory computer readable medium, where the
computer readable medium comprises configured computer program
instruction code, such that when said instruction code is operated
by said computer processing device, said computer processing device
performs the following operations: identifying device signatures of
a plurality of devices associated with malfeasance; storing the
device signatures associated with malfeasance in a database;
monitoring a geographical location for the device signatures
associated with malfeasance; detecting a presence of a first device
signature in the geographical location associated with a first
device; comparing the first device signature with the stored
plurality of device signatures associated with malfeasance;
determining, based on the comparison, that the first device
signature matches at least one of the stored device signatures
associated with malfeasance; and in response to determining that
the first device signature matches at least one of the stored
device signatures associated with malfeasance, providing a
notification to a malfeasance specialist of a presence of the first
device at the geographical location.
16. (canceled)
17. The computer implemented method of claim 15, wherein monitoring
the geographical location for device signatures comprises pinging
the geographical location to detect mobile device signatures
currently present in the geographical location.
18. The computer implemented method of claim 15, wherein monitoring
the geographical location for device signatures comprises searching
for card signatures of a plurality of cards located in the
geographical location with one or more NFC readers located in the
geographical location.
19. The computer implemented method of claim 15, wherein providing
the notification to the malfeasance specialist comprises displaying
the notification on a specialist device associated with the
malfeasance specialist or emitting an audible alarm from the
specialist device.
20. The computer implemented method of claim 15, further comprising
prompting a user associated with the first device to provide a
higher level of authorization credentials than an ordinary level of
authorization credentials.
Description
FIELD OF THE INVENTION
[0001] This disclosure generally relates to notifying a specialist
of a malfeasance detection based on identification of a device
signature.
BACKGROUND
[0002] Many common smart devices, such as smart phones, smart
watches, and chip-enabled cards by individuals, include device
signatures that provide unique identification information about its
respective device. These device signatures can be monitored within
an area such that a monitoring device may detect the presence of
the device and the content of the device signature. When a device
signature is detected in conjunction with a malfeasance act, an
entity may associate the device signature with the malfeasance for
future monitoring. Therefore, an entity may monitor devices in a
certain area to detect a device signature associated with
malfeasance such that the entity may notify a malfeasance
specialist capable of taking appropriate actions in response to the
detected device signature.
SUMMARY OF INVENTION
[0003] The following presents a summary of certain embodiments of
the present invention. This summary is not intended to be a
comprehensive overview of all contemplated embodiments, and is not
intended to identify key or critical elements of all embodiments
nor delineate the scope of any or all embodiments. Its sole purpose
is to present certain concepts and elements of one or more
embodiments in a summary form as a prelude to the more detailed
description that follows.
[0004] Embodiments of the present invention address the above needs
and/or achieve other advantages by providing apparatuses (e.g., a
system, computer program product and/or other devices) and methods
for notifying a specialist of a malfeasance detection based on
identification of a device signature. The system embodiments may
comprise one or more memory devices having computer readable
program code stored thereon, a communication device, and one or
more processing devices operatively coupled to the one or more
memory devices, wherein the one or more processing devices are
configured to execute the computer readable program code to carry
out the invention. In computer program product embodiments of the
invention, the computer program product comprises at least one
non-transitory computer readable medium comprising computer
readable instructions for carrying out the invention. Computer
implemented method embodiments of the invention comprise providing
a computing system comprising a computer processing device and a
non-transitory computer readable medium, where the computer
readable medium comprises configured computer program instruction
cone, such that when said instruction code operated by said
computer processing device, said computer processing device
performing certain operations to carry out the invention.
[0005] For sample, illustrative purposes, system environments will
be summarized. The system may involve storing a plurality of device
signatures associated with malfeasance. Additionally, the system
may comprise monitoring a first location for device signatures and
detecting a first device signature associated with a first device.
The system may further comprise comparing the first device
signature with the plurality of device signatures associated with
malfeasance to determine that the first device signature matches at
least one of the plurality of device signatures associated with
malfeasance. In some embodiments, the system provides a
notification to a malfeasance specialist of a presence of the first
device at the first location.
[0006] In some embodiments, a device associated with the plurality
of device signatures and the first device signature comprise one or
more mobile devices and one or more cards with
near-field-communication (NFC) capabilities. In some such
embodiments, monitoring a first location for device signatures
comprises pinging a geographical location associated with the first
location to detect mobile device signatures of a plurality of
mobile devices located in the geographical location. In other such
embodiments, monitoring the first location for device signatures
comprises searching for card signatures of a plurality of cards
located in the geographical location with one or more NFC readers
located in the geographical location.
[0007] In some embodiments of the system, providing a notification
to the malfeasance specialist comprises displaying a notification
on a specialist device associated with the malfeasance specialist.
In some embodiments of the system, providing a notification to the
malfeasance specialist comprises emitting an audible alarm from a
specialist device associated with the malfeasance specialist.
[0008] Some embodiments of the system comprise prompting a user
associated with the first device to provide a higher level of
authorization credentials than an ordinary level of authorization
credentials.
[0009] To the accomplishment of the foregoing and related
objectives, the embodiments of the present invention comprise the
function and features hereinafter described. The following
description and the referenced figures set forth a detailed
description of the present invention, including certain
illustrative examples of the one or more embodiments. The functions
and features described herein are indicative, however, of but a few
of the various ways in which the principles of the present
invention may be implemented and used and, thus, this description
is intended to include all such embodiments and their
equivalents.
[0010] The features, functions, and advantages that have been
discussed may be achieved independently in various embodiments of
the invention or may be combined with yet other embodiments,
further details of which can be seen with reference to the
following description and drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
[0011] Having thus described embodiments of the invention in
general terms, reference will now be made to the accompanying
drawings, which are not necessarily drawn to scale, and
wherein:
[0012] FIG. 1 is a block diagram of a system environment for
notifying a specialist of a malfeasance detection based on an
identification of a device signature, in accordance with an
embodiment of the invention;
[0013] FIG. 2 is a general process flow for notifying a specialist
of a malfeasance detection based on an identification of a device
signature, in accordance with an embodiment of the invention;
and
[0014] FIG. 3 is a sample display interface for notifying a
specialist of a malfeasance detection based on an identification of
a device signature, in accordance with embodiments of the present
invention.
DETAILED DESCRIPTION OF EMBODIMENTS OF THE INVENTION
[0015] Embodiments of the present invention will now be described
more fully hereinafter with reference to the accompanying drawings,
in which some, but not all, embodiments of the invention are shown.
Indeed, the invention may be embodied in many different forms and
should not be construed as limited to the embodiments set forth
herein; rather, these embodiments are provided so that this
disclosure will satisfy applicable legal requirements. Like numbers
refer to elements throughout. Where possible, any terms expressed
in the singular form herein are meant to also include the plural
form and vice versa, unless explicitly stated otherwise. Also, as
used herein, the term "a" and/or "an" shall mean "one or more,"
even though the phrase "one or more" is also used herein.
[0016] Various embodiments or features will be presented in terms
of systems that may include a number of devices, components,
modules, and the like. It is to be understood and appreciated that
the various systems may include additional devices, components,
modules, and the like, and/or may not include all of the devices,
components, modules, and the like, discussed in connection with the
figures. A combination of these approaches may also be used.
[0017] A "system environment," as used herein, may refer to any
information technology platform of an enterprise (e.g., a national
or multi-national corporation), and may include a multitude of
servers, machines, mainframes, personal computers, network devices,
front and back end systems, database systems and/or the like.
[0018] As used herein, an "entity" may be any business,
organization, or individual that owns, operates, or is otherwise
associated with a federated authentication system. Although some
embodiments of the invention described herein are generally
described as involving an "entity," other embodiments of the
invention may involve business institutions that take the place of
or work in conjunction with the entity. As used herein, the term
"specialist" or "malfeasance specialist" refers to a person who is
affiliated with an entity herein defined and is specially trained
to handle a particular aspect of a business process of the
entity.
[0019] As used herein, the term "user" refers to an individual
associated with a device. In some embodiments, a user is an
individual that is associated with the entity, such that the entity
provides goods and/or services to the user. In some embodiments,
the user is not associated with the entity, but may still have
access to a location owned or operated by the entity.
[0020] Thus, systems, methods, and computer program products are
described herein that provide for notifying a malfeasance
specialist of a malfeasance detection based on identification of a
device signature.
[0021] Referring now to FIG. 1, a block diagram of a system
environment 100 is provided, which includes an entity system 110, a
specialist device system 120 associated with a specialist 130, a
user device system 140 associated with a user 150, and a network
101. The entity system 110, the specialist device system 120, and
the user device system 140 communicate with one another over the
network 101.
[0022] As shown in FIG. 1, the entity system 110 includes a
communication device 111, at least one processing device 112, and
at least one memory device 113, in communication with the
processing device 112. The memory device 113 contains computer
readable instructions 114 including a malfeasance detection
application 115. Additionally, the memory device 113 includes a
datastore 117 for storing device signature data, user 150
information data, and/or specialist 130 information data.
[0023] The specialist device system 120 includes a communication
device 121 a processing device 122, and at least one memory device
123, in communication with the processing device 122. The memory
device 123 contains computer readable instructions 124 including a
specialist notification application 125. Additionally, the memory
device 123 includes a datastore 127 for storing device signature
data, user 150 information data, and/or specialist 130 information
data. The specialist device system 120 can be one or more personal
computers, electronic notebooks, desktops, mobile device, or any
computing device having network capability and in communication
with the entity system 110 and the user device system 140 through
the network 101. In some embodiments, the computing devices of the
specialist device system 120 may be one or more specialized
computing devices that perform specific functions of the invention
as described herein.
[0024] In some cases, a specialist interface is provided by the
entity and can be installed on the specialist device system 120, as
part of a specialist-side application, which, as shown in FIG. 1,
is the specialist notification application 125, also provided by
the entity. The specialist interface can be launched by running the
specialist notification application 125 that communicates with the
entity system 110 and the user device system 140 via the network
101. In some embodiments, the specialist interface is part of a
server-side specialist notification application 125, built on the
entity system 110, and can be presented to the specialist through a
web browser by invoking the server-side application. A
specialist-side application generally means that the application is
stored and executed on the specialist's computer; while a
server-side application means that the application runs on a
server's computer, which, in the present incident, is the entity
system 110 that communicates with the specialist device system 120
through the network 101.
[0025] The user device system 140 includes a communication device
141 a processing device 142, and at least one memory device 143, in
communication with the processing device 142. The memory device 143
contains computer readable instructions 144 including a device
signature application 145. Additionally, the memory device 143
includes a datastore 147 for storing device signature data, user
150 information data, and/or specialist 130 information data. The
user device system 140 can be one or more personal computers,
electronic notebooks, mobile devices, or any computing device
having network capability. As shown in FIG. 1, the user device
system 140 may be in communication with the entity system 110 and
the user device system 140 through the network 101. However, it
should be noted that in some embodiments, the user device system
140 is not directly in communication with the entity system 110 or
the specialist device system 120, but does emit a signature either
automatically or in response to a ping or request from the entity
system 110.
[0026] As used herein, the processing devices 112, 122, and 142
include circuitry for executing the functions of the entity system
110, the specialist device system 120, and the user device system
140. For example, each of the processing devices 112, 122, and 142
can include a digital signal processor device, a microprocessor
device, and various analog-to-digital converters, digital-to-analog
converters, and other support circuits. Control and signal
processing functions of the entity system 110, the specialist
device system 120, and the user device system 140, in which the
processing devices 112, 122, and 142 reside, may be allocated
between these devices according to their respective capabilities.
The processing devices 112, 122, and 142 also include functionality
to operate one or more software programs based on
computer-executable program code portions thereof, which may be
stored, along with the computer readable instructions 114, 124, in
the memory devices 113, 123 on the entity system 110, the
specialist device system 120, and the user device system 140.
[0027] The memory devices 113, 123, and 143, as described herein,
store the computer readable instructions 114, 124, and 144 and the
datastores 117, 127, and 147. In some embodiments, the memory
devices 113, 123, and 143 may include volatile memory, such as RAM
having a cache area for the temporary storage of information. The
memory devices 113, 123, and 143 may also include non-volatile
memory that may be embedded and/or removable. The non-volatile
memory may additionally or alternatively include an Electrically
Erasable Programmable Read-Only Memory (EEPROM), flash memory,
and/or the like. The memory devices 113, 123, and 143 can store any
information and data that are used and administrated by the entity
system 110, the specialist device system 120, and the user device
system 140 to implement the functions thereof.
[0028] In some embodiments, the malfeasance detection application
115 is configured to use the communication device 111, the
processing device 112, and the datastore 117 of the entity system
110 to send and receive commands and instructions regarding
searching or monitoring an area for device signatures associated
with malfeasance and alerting specialists (e.g., specialist 130) of
the detection of a device associated with malfeasance.
[0029] In some embodiments, the specialist notification application
125 utilizes the communication device 121, the processing device
122, and the datastore 127 of the specialist device system 120 to
send and receive commands and instructions regarding alerting the
specialist 130 of the detection of a device associated with
malfeasance and any subsequent steps necessary to addressing this
detection.
[0030] In some embodiments, the device signature application 145
utilizes the communication device 141, the processing device 142,
and the datastore 147 of the user device system 140 to transmit,
present, or otherwise disclose a device signature associated with a
device of the user 150.
[0031] Turning now to FIG. 2, a general process flow 200 is
provided for notifying a specialist of a malfeasance detection
based on identification of a device signature. The process 200
includes block 202 of storing a plurality of device signatures
associated with malfeasance. As mentioned above, device signatures
are unique identification numbers, codes, and the like, that are
each associated with a specific device such as a mobile device, a
wearable device (e.g., a smart watch, smart implant, smart glasses,
and the like), cards that are enhanced with electronic chips, and
the like. When the entity determines that a device signature has
been used in association with malfeasance, or is associated with a
user that is known or suspected to be associated with malfeasance,
then this device signature is recorded and stored with other device
signatures associated with malfeasance.
[0032] The device signatures associated with malfeasance may be
stored in a datastore such as datastore 117 of the entity system
110 or datastore 127 of the specialist device system 120. The
entity associated with the system may record and accumulate device
signatures as they become associated with malfeasance, thereby
creating a listing of device signatures that are related to
malfeasance in some manner. The stored device signatures may be of
the same data type (e.g., device signatures associated with mobile
phones of users that are associated with malfeasance). However, the
stored device signatures may be comprised of several data types
(e.g., mobile phone device signatures, wearable device signatures,
electronically chipped card device signatures, and the like). As
such, the system may be able to monitor and/or search for device
signatures across a plurality of device types and more effectively
implement the invention.
[0033] The device signatures may be stored with additional device
signature information, such as information for a user associated
with the device signature, the type of malfeasance that is
associated with the device, a number of times that the device
signature and/or the user has been associated with each type of
malfeasance, a last known date of malfeasance associated with the
device signature, and the like. As such, the system may keep
information that is relevant to the malfeasance nature of the
device in an easily accessible location to enable relatively easy
analysis at a later point in time.
[0034] The process 200 may also include block 204, where the system
monitors a first location for device signatures. This first
location may be a physical location such as an office building,
kiosk, property area, and the like. The first location may also be
a location of a device such as a point of sale terminal, an
automated teller machine, a sensor, and the like. Monitoring the
first location for device signatures may involve pinging any device
in a geographical region including at least a part of the first
location and receiving responses from devices that include at least
the device signature. These devices may or may not be known to the
system at the time that the system pings the geographical area. For
example, a user may have a mobile device located in a pocket or
purse such that the device is not visible, but the system may
transmit a ping, or message, over a common network (e.g., the
network 101, and/or a wi-fi network, a local area network (LAN), a
wide area network (WAN), and the like). The device of the user may
receive this message and transmit a response back to the system
that includes the device signature of that device. As such, the
system may include a monitoring device capable of pinging devices
over the network 101, receiving responses from the devices that
include the device signatures, and communicating these device
signatures to the system.
[0035] Monitoring the first location for device signatures may
involve using other wireless communication techniques such as near
field communication (NFC) or radio frequency identification (RFID).
These wireless communication techniques may be used in monitoring
card devices that include integrated chips (e.g., an NFC chip, a
passive RFID chip, an active RFID chip, and the like). Sensors or
point of sale devices may be equipped to monitor a small region for
the presence of such chips, whereby the presence of a card with a
chip causes the sensors or point of sale devices to retrieve device
signature information from the chips of the cards. In some
embodiments, the process of monitoring cards devices with
integrated chips involves the user presenting the card device at a
sensor of point of sale device of the system. In other embodiments,
the sensors or point of sale devices actively monitor for such card
devices without requiring the user to knowingly present the card
device.
[0036] The system may continuously monitor the first location for
device signatures such that any device that enters the area will
immediately be detected by the system. In some embodiments, the
system monitors the location when prompted to by a specialist, a
user, or some other entity associated with the system. The system
may additionally, or alternatively, monitor the first location for
device signatures on a periodic basis (e.g., every second, every
few seconds, every minute, every few minutes, every hour, and the
like).
[0037] In some embodiments, the system monitors multiple regions of
the first location. For example, a first side of a room may be
monitored by a first monitoring device while a second side of the
room may be monitored by a second monitoring device. Furthermore,
different floors of a building may be monitored by different
monitoring devices. The same region may also be monitored by more
than one monitoring device, where each monitoring device utilizes a
different monitoring technique.
[0038] In some embodiments, the process 200 includes block 206,
where the system detects a first device signature associated with a
first device. When a device is present in the monitored location,
the system receives the device signature associated with the device
and may transmit this device signature and any other associated
information for the device to a datastore and/or processor of the
system. The system may transmit and/or store the device signature
information automatically so the system can quickly analyze the
device signature information to determine whether the device
signature is associated with malfeasance. In some embodiments, the
system transmits and/or stores the device signature information on
a periodic basis (e.g., every second, every few seconds, every
minute, and the like), so the system can analyze the device
signature in a timely manner. The system may store all device
signature information for subsequent analysis. For example, device
signatures that are not determined to be associated with
malfeasance may be labeled as cleared and stored in a "cleared"
database for future use.
[0039] The process 200 may also include block 208, where the system
compares the first device signature with the plurality of device
signatures associated with malfeasance. As such, the system may
compare the detected first device signature with each device
signature in a database of device signatures associated with
malfeasance to determine if the first device signature is identical
or substantially similar to one of the device signatures associated
with malfeasance.
[0040] In some embodiments, the process 200 includes block 210,
where the system determines that the first device signature matches
at least one of the plurality of device signatures associated with
malfeasance. As mentioned above, this determination may be based on
a match between the detected first device signature and one of the
stored device signatures associated with malfeasance. However, in
some embodiments, the system may consider a device signature as
potentially being associated with malfeasance based on a failure of
the system to match the device signature with a database of cleared
device signatures. Additionally, a device signature that is not
matched with a cleared device signature may be identified as a
device associated with a user that is not currently a customer of
the entity. As such, the system may determine that one or more
products of the entity should be offered to the user of this
device. In some embodiments, the system may establish an electronic
communication channel with the detected device and prompt a user
interface of the detected device to display one or more offers for
products and/or services of the entity.
[0041] Furthermore, when a device signature of a detected device
does not initially match a device signature on the cleared list,
the system may determine that the detected device is subsequently
associated with a valid transaction with the entity, and therefore
places the detected device signature on the cleared list for future
interactions. Additionally, the system may determine that the
detected device is associated with a user that is in good standing
with the entity, and therefore the system may place the detected
device signature on the cleared list.
[0042] Upon determining that the device signature is associated
with malfeasance, the system may automatically store information
associated with the detection (e.g., the time of detection, the
location of the detection, other device information, information
associated with a user associated the device, and the like) in a
database for immediate or periodic assessment and/or review by a
specialist of the entity. In some embodiments, the system
immediately transmits information associated with the detection of
the device signature associated with malfeasance to the entity
system 110 and/or the specialist device system 120 such that these
systems 110, 120 may take appropriate action.
[0043] Furthermore, the process 200 may include block 212, where
the system provides a notification to a malfeasance specialist
(e.g., specialist 130) of a presence of the first device at the
first location. The notification may comprise an alert along with
pertinent information to aid the specialist in determining an
appropriate action. The alert may comprise displaying a visual
notification (e.g., a pop-up message, emitting a light signal,
changing a color of an icon on a display, and the like) on a device
of the specialist via a specialist device system (e.g., specialist
device system 120). In some embodiments, the system may alert the
specialist by emitting an audible alarm from speakers on a device
of the specialist. The audible alarm may be different for different
malfeasance types (e.g., one beep for a first malfeasance type, two
beeps for a second malfeasance type). The audible alarm may
comprise audible words that alert the specialist to the detection
of a device associated with malfeasance, and possibly any other
information that would be useful to the specialist in determining
an appropriate action.
[0044] The notification to the specialist may include any
additional information related to the device signature associated
with malfeasance (e.g., the type of malfeasance that the device
signature is associated with, information about a user associated
with the device signature, a last known occurrence of the
malfeasance associated with the device signature, and the like)
such that the specialist may determine an appropriate action. In
some embodiments, the system may provide suggested actions based on
the additional information related to the device signature
associated with malfeasance so the specialist has quick guidelines
to follow. Examples of actions that may be taken by the specialist
and/or the system include, but are not limited to intercepting the
user associated with the device signature, alerting employees of
the entity of the detection of the device signatures associated
with malfeasance, requiring the user associated with the device
signature to provide a more stringent level of authorization
credentials than is ordinarily required by the entity, and the
like. In some embodiments, no action is required by the specialist
as the associated malfeasance is not expected at the current
location and/or time.
[0045] In one embodiment, the system and/or the malfeasance
specialist may require every transaction or transfer of personal
information in the surrounding location to have a heightened level
of security. For example, customers of the entity may normally
simply need to input a passcode to make a transaction, access a
wireless network, or the like. Once the system has detected a
device signature associated with malfeasance, the system may
require every customer to input both the passcode and a
predetermined security question before the customers may conduct
the transactions or access the wireless networks. As such, the
system may help protect other customers from the malfeasance
associated with the detected device signature.
[0046] Overall, the process 200 may assist a specialist in
maintaining awareness of any detectable device signatures that are
associated with malfeasance and allow the specialist to take an
appropriate action in a timely manner.
[0047] FIG. 3 illustrates an example of a display 300 of the
specialist device for notifying the specialist of an identification
of a device signature associated with a malfeasance. The display
300 may include a "notification of a malfeasance" 302, a "type of
malfeasance" 304, a "device signature" 306, "device information"
308, "user information" 310, a first action (i.e., Action 1) 312,
and a second action (i.e., Action 2) 314. As mentioned before with
respect to FIG. 2, the specialist device may also comprise hardware
of a speaker and/or a light emitting component such that the
specialist device may emit an audible alert and/or present a visual
alert in conjunction with the rest of the specialist notification
as described herein. Overall, through the display 300, the
specialist will be presented with the information necessary to make
an appropriate action decision in response to the determination
that a device signature associated with malfeasance has been
detected.
[0048] In some embodiments, the notification of a malfeasance 302
is the same notification of the malfeasance as described in block
212 of FIG. 2. This notification of the malfeasance section 302 may
be a simple message stating that a device signature associated with
malfeasance has been detected in a first location. In some
embodiments, the notification of the malfeasance may include an
alert level based on an urgency for the specialist to take an
action due to the detected device signature associated with
malfeasance. For example, the system may present a low level of
urgency for minor malfeasance types and present a high level of
urgency for major malfeasance types. Generally, the notification of
malfeasance 302 is configured to gain the attention of the
specialist and lets the specialist understand basic information
regarding the detected device signature associated with
malfeasance.
[0049] The type of malfeasance 304 provides information about the
type of malfeasance that is associated with the detected device
signature. As mentioned before, multiple types of malfeasance may
be monitored, and each type of malfeasance may require a different
responsive action (or inaction) based on certain factors.
Therefore, presenting the type of malfeasance 304 associated with
the detected device signature is helpful to the specialist in
understanding the situation and what actions may need to be taken.
In some embodiments, multiple types of malfeasance are associated
with the detected device signature. In such embodiments, the type
of malfeasance 304 section of the display 300 may present each type
of malfeasance.
[0050] The device signature 306 section may provide the detected
device signature associated with the notification of malfeasance
302. This information may be useful to the specialist in
identifying which device in the location is has the device
signature associated with malfeasance. Additionally, this
information may allow the specialist to store and/or compare the
device signature with other device signatures associated with the
user and/or malfeasance.
[0051] The device information 308 section may comprise information
associated with a device associated with the detected device
signature. The device information 308 may comprise the type of
device, a name or other identifying information of a user of the
device, the last known time that the device was detected in this
location, the last known time that the device was located in any
location of the entity, and the like.
[0052] The user information 310 section may comprise information
associated with a user that is associated with the detected device
signature. This user may be an owner or possessor of the device
that has the detected device signature. The user information 310
may be any information about the user that would be helpful to the
specialist in identifying the user and/or determining an
appropriate action. For example, the user information 310 may
comprise a name of the user, any aliases of the user, any
malfeasance associated with the user (e.g., malfeasance associated
with the user that is in addition to the malfeasance associated
with the device signature), an address of the user, account
information of the user with the entity, and the like.
[0053] Finally, Action 1 312 and Action 2 314 show actions
available to the specialist with regard to the notification of
malfeasance 302. These actions 312, 314 may be suggested actions,
common actions, or recent actions that the specialist may select or
undertake in response to the notification from the system. Examples
of actions 312 and 314 that may be displayed include, but are not
limited to confronting the user, contacting an authority (e.g., a
higher-level specialist, the police, a regulatory body, and the
like), requiring the user to present a higher level of
authentication credentials than normal, take no action, and the
like. While two action sections 312, 314 are presented on the
current display 300, it should be known that any number of actions
could be presented on the display 300. For example, the system may
identify three suggested actions and therefore presents all three
suggested actions to the specialist on the display 300.
[0054] In some embodiments, the specialist may select one or more
of the actions 312, 314 to initiate an action in response to the
notification display 300. For example, the specialist may press a
button or touchscreen area associated with Action 1 312 to
automatically contact a regulatory body associated with the
malfeasance. In some embodiments, the specialist may select one of
the Actions 312, 314 to log a selected action with the system for
future analysis. For example, the specialist may determine that
confronting the user 150 is the appropriate action and therefore
selects the respective action from the display 300. The system may
then store the action decision of the specialist in a database such
that the selected action may be presented to a specialist if the
device signature is detected by the system again.
[0055] As will be appreciated by one of ordinary skill in the art,
the present invention may be embodied as an apparatus (including,
for example, a system, a machine, a device, a computer program
product, and/or the like), as a method (including, for example, a
business process, a computer-implemented process, and/or the like),
or as any combination of the foregoing. Accordingly, embodiments of
the present invention may take the form of an entirely software
embodiment (including firmware, resident software, micro-code, and
the like), an entirely hardware embodiment, or an embodiment
combining software and hardware aspects that may generally be
referred to herein as a "system." Furthermore, embodiments of the
present invention may take the form of a computer program product
that includes a computer-readable storage medium having
computer-executable program code portions stored therein. As used
herein, a processor may be "configured to" perform a certain
function in a variety of ways, including, for example, by having
one or more special-purpose circuits perform the functions by
executing one or more computer-executable program code portions
embodied in a computer-readable medium, and/or having one or more
application-specific circuits perform the function. As such, once
the software and/or hardware of the claimed invention is
implemented the computer device and application-specific circuits
associated therewith are deemed specialized computer devices
capable of improving technology associated with notifying a
specialist of a malfeasance detection based on identification of a
device signature.
[0056] It will be understood that any suitable computer-readable
medium may be utilized. The computer-readable medium may include,
but is not limited to, a non-transitory computer-readable medium,
such as a tangible electronic, magnetic, optical, infrared,
electromagnetic, and/or semiconductor system, apparatus, and/or
device. For example, in some embodiments, the non-transitory
computer-readable medium includes a tangible medium such as a
portable computer diskette, a hard disk, a random access memory
(RAM), a read-only memory (ROM), an erasable programmable read-only
memory (EPROM or Flash memory), a compact disc read-only memory
(CD-ROM), and/or some other tangible optical and/or magnetic
storage device. In other embodiments of the present invention,
however, the computer-readable medium may be transitory, such as a
propagation signal including computer-executable program code
portions embodied therein.
[0057] It will also be understood that one or more
computer-executable program code portions for carrying out the
specialized operations of the present invention may be required on
the specialized computer include object-oriented, scripted, and/or
unscripted programming languages, such as, for example, Java, Perl,
Smalltalk, C++, SAS, SQL, Python, Objective C, and/or the like. In
some embodiments, the one or more computer-executable program code
portions for carrying out operations of embodiments of the present
invention are written in conventional procedural programming
languages, such as the "C" programming languages and/or similar
programming languages. The computer program code may alternatively
or additionally be written in one or more multi-paradigm
programming languages, such as, for example, F#.
[0058] It will further be understood that some embodiments of the
present invention are described herein with reference to flowchart
illustrations and/or block diagrams of systems, methods, and/or
computer program products. It will be understood that each block
included in the flowchart illustrations and/or block diagrams, and
combinations of blocks included in the flowchart illustrations
and/or block diagrams, may be implemented by one or more
computer-executable program code portions. These one or more
computer-executable program code portions may be provided to a
processor of a special purpose computer for notifying a specialist
of a malfeasance detection based on identification of a device
signature, and/or some other programmable data processing apparatus
in order to produce a particular machine, such that the one or more
computer-executable program code portions, which execute via the
processor of the computer and/or other programmable data processing
apparatus, create mechanisms for implementing the steps and/or
functions represented by the flowchart(s) and/or block diagram
block(s).
[0059] It will also be understood that the one or more
computer-executable program code portions may be stored in a
transitory or non-transitory computer-readable medium (e.g., a
memory, and the like) that can direct a computer and/or other
programmable data processing apparatus to function in a particular
manner, such that the computer-executable program code portions
stored in the computer-readable medium produce an article of
manufacture, including instruction mechanisms which implement the
steps and/or functions specified in the flowchart(s) and/or block
diagram block(s).
[0060] The one or more computer-executable program code portions
may also be loaded onto a computer and/or other programmable data
processing apparatus to cause a series of operational steps to be
performed on the computer and/or other programmable apparatus. In
some embodiments, this produces a computer-implemented process such
that the one or more computer-executable program code portions
which execute on the computer and/or other programmable apparatus
provide operational steps to implement the steps specified in the
flowchart(s) and/or the functions specified in the block diagram
block(s). Alternatively, computer-implemented steps may be combined
with operator and/or human-implemented steps in order to carry out
an embodiment of the present invention.
[0061] While certain exemplary embodiments have been described and
shown in the accompanying drawings, it is to be understood that
such embodiments are merely illustrative of and not restrictive on
the broad invention, and that this invention not be limited to the
specific constructions and arrangements shown and described, since
various other changes, combinations, omissions, modifications and
substitutions, in addition to those set forth in the above
paragraphs, are possible. Those skilled in the art will appreciate
that various adaptations and modifications of the just described
embodiments can be configured without departing from the scope and
spirit of the invention. Therefore, it is to be understood that,
within the scope of the appended claims, the invention may be
practiced other than as specifically described herein.
INCORPORATION BY REFERENCE
[0062] To supplement the present disclosure, this application
further incorporates entirely by reference the following commonly
assigned patent applications:
TABLE-US-00001 U.S. Patent Application Docket Number Ser. No. Title
Filed On 6952US1.014033.2574 To be assigned MOBILE APPLICATION
Concurrently CONFIGURATION BASED ON herewith GEOGRAPHIC AND
TRANSACTION HISTORY CONTEXT 6954US1.014033.2575 To be assigned WORK
FLOW SCHEDULE Concurrently RECONCILIATION AND DATA herewith PUSH
6956US1.014033.2577 To be assigned RECURRING EVENT ANALYSES
Concurrently AND DATA PUSH herewith 6953US1.014033.2578 To be
assigned ALTERNATIVE CHANNEL Concurrently SELECTION BASED ON
herewith PREDICTIVE WORK FLOW
* * * * *