System, method and computer program product for assessing risk of identity theft
11610278 · 2023-03-21
Assignee
Inventors
Cpc classification
G06Q40/00
PHYSICS
H04M15/00
ELECTRICITY
International classification
H04M15/00
ELECTRICITY
Abstract
In one embodiment, this invention analyzes demographic data that is associated with a specific street address when presented as an address change on an existing account or an address included on a new account application when that address is different from the reference address (e.g., a credit bureau type header data). The old or reference address and the new address, the new account application address or fulfillment address demographic attributes are gathered, analyzed, compared for divergence and scaled to reflect the relative fraud risk.
Claims
1. A computerized method for a client to assess a risk of fraud, comprising: receiving at a server information relating to a first address of one of an account holder or an applicant; receiving at the server information relating to a second address of the account holder or applicant, the server comprising a processor and a memory to store the first address information and the second address information as computer readable media, wherein the processor is configured by an algorithm to: access one or more third party databases to determine data related to each of the first address and the second address, the data comprising at least one of demographic data, United States Postal Service (USPS) data, previous history file data, warm address data, address velocity data and known fraud address data; append the determined data to the first address and the second address; compare the determined data for the first address with the determined data for the second address to determine one or more difference variables; assign a weight to each of the one or more difference variables and calculate a score based on the assigned weight to each of the one or more difference variables using artificial intelligence technology; predict the risk of fraud and calculate a level of risk of fraud based on the calculated score for each of the one or more difference variables; and communicate the level of risk of fraud to the client through (the) a software application user interface by one or more notifications in substantially real time.
2. The method of claim 1, wherein the score is calculated for each of the one or more difference variables by using a mathematical model comprising one or more pre-defined weighing factors for each of the one or more difference variables.
3. A computer-implemented method for a client to assess a risk of identity theft fraud with respect to new applications, comprising: receiving at a server information for a first address corresponding to the new application of an applicant for an account, the server comprising a processor and a memory to store the first address information as computer readable media, wherein the processor is configured by an algorithm to: obtain a reference address from a third party database; assess one or more databases to determine data related to each of the first address and the reference address, the data comprising at least one of demographic data, United States Postal Service (USPS) data, previous history file data, warm address data, address velocity data, high risk address data and known fraud address data; append the determined data to the first address and the reference address; compare the determined data for the first address with the determined data for the reference address to determine one or more difference variables; assign a weight to each of the one or more difference variables and calculate a score based on the assigned weight to each of the one or more difference variables using artificial intelligence technology; predict the risk of fraud and calculates a level of risk of fraud based on the calculated score for each of the one or more difference variables; and communicate the level of risk of fraud to the client through (the) a software application user interface by one or more notifications sent in substantially real time.
4. The method of claim 3, wherein the third party database is a credit bureau database.
5. The method of claim 3, wherein the processor further analyzes a negative data for the first address at an assessment stage.
6. The method of claim 5, wherein the assessment stage includes assessing the risk of the identity theft fraud based on the score and analysis of the negative data.
7. The method of claim 3, wherein the at least one demographic data comprises a demographic data related to income, a demographic census data, a demographic data relating to housing characteristics and a data related to household membership characteristics.
8. The method of claim 3, wherein the high risk address data includes addresses of mail receiving agents, jails, prisons, hotels and motels are the warm address data.
9. The method of claim 3, wherein the one or more difference variables are determined by at least one of: comparing financial make-ups of the first address and the reference address to determine a financial make-up variable; identifying a third party record that matches the first address with a name of the applicant to determine a third party variable; comparing a home values of the first address and the reference address to determine a home value variable; determining a distance between the first address and the reference address to determine a distance variable; comparing a types of housing of the first address and the reference address to determine a housing type variable; comparing the first address and the reference address to a warm address file to determine a warm address variable; comparing an Internet usage data for the first address and the reference address to determine an Internet usage variable; and determining a length of residence for the reference address to determine a length of residence variable.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1)
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
(16)
DETAILED DESCRIPTION
(17) The present invention generally relates to a system and method for detecting or assessing the risk of identity theft fraud. The present invention will be described in the context of detecting or assessing the risk of identity theft fraud in two contexts: new account application fraud and account takeover fraud. However, the present invention is not limited to only detecting these type of fraud schemes.
(18)
(19) One advantage to the present invention's use of address information is that an address is the one element that a criminal cannot manipulate. That is, when a criminal steals an identity, the criminal may be able to obtain identity information relating to the victim. However, the criminal cannot receive mail at the victim's house. Consequently, the criminal needs to use an address where he/she can receive mail (e.g., to obtain media or goods). As such, the present invention compares addresses. The present invention recognizes that there are demographic differences between addresses. For instance, one address may have an upscale socio-economic demographic as compared to the other address that has a more downscale socio-economic demographic. By using street address information as the basis for gathering, comparing and analyzing demographic data, the present invention uses elements that can be independently verified and analyzed to determine a risk of identity theft. Also, in addition to the demographic data, additional data elements such as warm address information or undeliverable address information may be used to assist in assessing the risk of identity theft fraud. Within the context of this document, “Account” as used in this application includes its ordinary meaning and is also intended to cover any business relationship where there is financial risk on part of the product or service provider including but not limited to relationships of credit, debit brokerage, retail, non-face to face fulfillment activities (e.g., on-line sales).
(20) In general, the risk assessment is performed when a business or service user sends/transmits the old or reference address and the new (requested changed) or new account application address with other identifying information for use by the software application embodying the present invention. Input data is matched to address specific demographic data which in turn is delivered to the decision engine to produce a risk score. Data processing can occur in batch, real time online or on customer or processor hosted software application. Communications can occur through telephone, data line, internet or tape/disk or other commercially available method. The application output may be returned to the service user via an internet accessed system, telephone, data line, or other commercially available method.
(21) In general, the present invention uses statistical modeling of negative and demographic/socio-economic data elements associated with a street address to identify suspected identity theft fraud activity when there is a change in address or an address on a new application that is different from a reference address (e.g., one provided by the applicant or one obtained from a third party such as a credit bureau). As such, this invention may be used to detect identity theft fraud in existing accounts, new credit account applications or other business risks associated with address manipulation. The process generally analyzes the differences in demographic data between an old address or reference address and an address on a new application or an address change on an account to a new address. If a reference address is not provided by the new applicant or is not the address that was changed to a new address, then a reference address may be a credit bureau header data or an address secured from a third party database. Additionally, other negative and logical data sources are used in the risk evaluation, such as warm address information, driver's license syntax specific to a state, or the year a social security number is issued is compared to the date of birth for rationality. Analysis may performed through the use of regression models, neural network and expert rules based technology. A score that scales risk is developed to identify the likelihood of identity theft fraud. The score is returned along with supportive investigative data to the customer/business for use in determining the level of risk it is willing to take in entering into a business relationship with the investigated person. Consequently, an embodiment of the present invention provides businesses with the opportunity investigate a potential identity theft fraud and take steps to prevent economic loss. As will be discussed, in the preferred embodiment, the present invention is implemented in software.
(22) Referring to
(23) TABLE-US-00001 New Account Application/Address Change (New Address) data inputs Customer identifier First name Transaction type Middle initial/name Street directional Last name Street name Surname Unit number Account or reference number City name Address type code State name Social Security Number Zip Code plus 4 Date of Birth Driver's license information Loss potential - for takeover only
(24) TABLE-US-00002 New Account Reference Address/Address Change Old Address Customer identifier First name Transaction type Middle initial/name Street directional Last name Street name Surname Unit number Account or reference number City name Address type code State name Social Security Number Zip Code plus 4 Date of Birth Driver's license information
(25) TABLE-US-00003 Account Access Device Requests, Normal or Emergency (Credit/Debit Cards, Checks, 5 PIN) requests input file (Address change process only) Transaction type State name Media type Zip Code plus 4 Request type First name Account number Middle initial/name Street directional Last name Street name Surname Unit number Address type code City name Loss potential - Open to buy/balance Driver's license information
(26) However, depending on the implementation, not all of the data elements need to be sent by the client. In one embodiment, for assessing risk of new account application identity theft fraud, input data includes name and address listed on the new application. In one embodiment, for assessing risk of account takeover identity theft fraud, input data includes name, current address or reference address, and the address to which it was changed.
(27) In general, information that may be provided by a business that wants an assessment of risk of identity theft may provide the type of transaction (e.g., new application, change of address, etc.), information to identify the person that is to be investigated (e.g., name, social security number, date of birth etc.), address information as will be discussed with reference to
(28)
(29) In the account take over situation, usually there is an address change to a new address. The current address prior to the address change may be referred to as the old address, the reference address, or the FROM address. The new address (i.e., the address that the reference address was changed to) is sometimes referred to as the TO address. Similarly, in the new application situation, the reference address is the old address or FROM address. It may be provided by the applicant or it may be obtained from a third party such as a credit bureau. Also, in the new application, address provided on the new application may be referred to as the new address or TO address.
(30) Usually in the takeover situation, because of the address change, the business that is going to have an assessment made of the risk of identity theft fraud has an old address or reference address and a new address. In the new application situation, usually, a business that is going to have assessment made will have the address stated on the application but may not have a reference address. It is more common to use a third party source to obtain a reference address for analysis of a risk of identity theft in a new application situation. However, the present invention may be used when, in a new application situation, a reference address is provided by the business that wants to analyze the applicant for identity theft fraud. Some of the information provided by the business in requesting an analysis for the risk of identity theft is to provide other information such as a social security number to assist in obtaining information a reference address for the person named on the application from a third party source.
(31) An embodiment of the present invention uses an input data stream from the client/customer in a processing scenario or delivers required data inputs to the customer hosted software application. As shown above, data inputs for account takeover may include a customer name, account number and the old or FROM address, and new or TO address. As shown above, new account application input data may include name, institutional reference number, reference address and application addresses. If the reference address is not available, a third party address database will be consulted. Emergency “Over night” replacement” processing inputs may include name, address, account or reference number, account type and open to buy/available credit balance.
(32) As will be described, input data is compared against the warm address, known fraud data, USPS deliverable Address File and the NCOA files. The outcomes of these comparisons are appended to the inquiry record. The inquiry is then matched to the demographic data file and appended to the inquiry record. The inquiry record is written to the inquiry log.
(33) At block 22, a determination is made as to whether a reference address is present. If a reference address is provided in the client data, then such address is also standardized (block 26). Otherwise. a reference address is appended to the data received (block 24). If the reference address is not available, a third party address database may be consulted. For instance, the reference address may be obtained from a credit bureau and appended to the data received. Then, the appended reference address is standardized (block 26).
(34) In one embodiment, if the reference address and the new account application address are the same the inquiry will be logged to an inquiry database and no further action will be taken. In another embodiment, if the reference address and the new account application address are the same, the inquiry will be logged to an inquiry database and the address will be checked to make sure it is not a warm address or that it is not an undeliverable address. Also, when the address on a new application matches the reference address, then the business may not want the analysis conducted.
(35) If there is a difference between the new account application address and the reference address, then additional information such as the information that will be described with respect to blocks 30, 40, 50, 60, 70, and 80 will be appended to both addresses (block 28). All information is appended to both the reference address and to the address provided in the application (block 28). In one embodiment, the information appended includes demographic data (block 30), U.S. postal service data (block 40), other data (50), previous history file data (block 60), client fraud data (block 70) received from a particular client, and address velocity data (block 80).
(36) With respect to
(37) Demographic data may come from a number of national databases. Such data is compiled by companies such as Experian, Equifax, InfoUSA, and Acxiom. These databases include publicly available demographic data from sources such as vehicle registration data, county assessor information, warranty cards, and department of motor vehicle data among other sources. These databases may be accessed to obtain demographic data information. As shown in
(38) TABLE-US-00004 Census/demographic data for reference/application/change address Address type - residence, single family Household income apartment, business Length of residence Owner/renter Number of children Single family/renter Deliverable address Primary and secondary names Longitude/latitude Age, primary and secondary Neighbor wealth Gender, primary and secondary Single family dwelling value Occupation, primary and secondary Relocation velocity Marital status Education Number of adults Vehicles
(39) Further examples of demographic data related to income include:
(40) RESEARCH—INCOME ESTIMATES
(41) EXPENDABLE INCOME RANK
(42) NET WORTH RANK
(43) WEALTHFINDER CODE
(44) POTENTIAL INVESTOR CONSUMER SCORE
(45) REVOLVER MINIMUM PAYMENT MODEL
(46) BUYER BEHAVIOR CLUSTER CODE
(47) INTERNET USAGE MODEL
(48) HIGH TECH HOUSEHOLD INDICATOR
(49) HOUSEHOLD OWNS STOCKS OR BONDS
(50) Examples of demographic data related to housing characteristics include:
(51) LIKELIHOOD HOME IS OWNED OR RENTED ED
(52) DELIVERY UNIT SIZE
(53) HOMEOWNER INDICATOR
(54) AGE OF HOME SOURCE CODE
(55) AGE OF HOME
(56) ESTIMATED HOME VALUE CODE
(57) LOAN-TO-VALUE RATIO RANGE CODE
(58) HOME LOAN AMOUNT
(59) MORTGAGE AMOUNT SOURCE CODE
(60) MORTGAGE BALANCE CODE
(61) HOME EQUITY ESTIMATE
(62) HOMEOWNER SOURCE CODE
(63) HOUSEHOLD HAS MOVED FROM ADDRESS
(64) RESEARCH—ADDRESS VERIFICATION
(65) ADDRESS VERIFIED BY ANY DICTIONARY
(66) PRIMARY SOURCE OF NAME AND ADDRESS
(67) RESEARCH—SOURCE FLAGS/RECENCY
(68) DATE
(69) LENGTH OF RESIDENCE IN YEARS.
(70) Examples of demographic data related to household membership characteristics include:
(71) HEAD OF HOUSEHOLD AGE CODE
(72) HOUSEHOLD MEMBER 1 GENDER CODE
(73) HOUSEHOLD MEMBER 1 TITLE CODE
(74) HOUSEHOLD MEMBER 1 GIVEN NAME
(75) HOUSEHOLD MEMBER 1 MIDDLE INITIAL
(76) HOUSEHOLD MEMBER 1 SURNAME
(77) HOUSEHOLD MEMBER 1 SURNAME SUFFIX
(78) Also, the similar information about other members of the household may be included. Similarly, as shown in
(79) TABLE-US-00005 U.S. Postal Service Deliverable Address File Street number Unit number Street directional City name Street name State Name Zip Code plus 4
(80) TABLE-US-00006 National Change of Address - USPS Street number Unit number Street directional City name Street name State Name Zip Code plus 4 Confirmed change of address by USPS Move date
(81) The following additional information may be gathered from the United States Postal Service data:
(82) STREET DESIGNATOR
(83) POST DIRECTION
(84) UNIT TYPE
(85) UNIT NUMBER
(86) ZIP CODE
(87) ZIP+4 CODE
(88) DELIVERY POINT AND CHECK DIGIT
(89) CARRIER ROUTE
(90) ZIP+4 MATCH LEVEL
(91) PRIMARY NUMBER IS A BOX
(92) ZIP CODE STANDARDIZATION
(93) CITY CHANGE INDICATOR
(94) LOT
(95) STATE CODE
(96) COUNTY CODE
(97) LACS INDICATOR
(98) FINALIST UNIT RETURN CODE
(99) VENDOR SOURCE
(100) CITY TYPE INDICATOR
(101) RECORD TYPE FROM ZIP+4 FILE
(102) Appendage
(103) MATCH LEVEL
(104) MOVE TYPE
(105) EFFECTIVE MOVE DATA (YYYYMM)
(106) UNIT TYPE
(107) UNIT NUMBER
(108) CITY NAME
(109) STATE ABBREVIATION
(110) ZIP CODE
(111) ZIP+4 ADD-ON CODE
(112) DELIVERY POINT AND CHECK DIGIT
(113) CARRIER ROUTE
(114) ZIP+4 MATCH LEVEL
(115) PRIMARY NUMBER IS A BOX
(116) LACS RECORD TYPE
(117) MULTI SOURCE LEVEL
(118) NCOA MATCH FOOTNOTES
(119) INDIVIDUAL MATCH LOGIC REQUIRED
(120) NIXIE MATCH
(121) HOUSE NUMBER MISSING
(122) CLIENT RECORD MISSING BOX
(123) ADDRESSES DO NOT MATCH
(124) STREET NAME DOES NOT MATCH
(125) UNIT NUMBER MISSING IN CLIENT
(126) UNIT NUMBER TRANSPOSITION
(127) UNIT NUMBER MISMATCH
(128) CLIENT MISSING 1ST NAME
(129) 1ST NAME MATCHES 1ST INITIAL
(130) MIDDLE NAME/INITIAL MISMATCH
(131) GENDER MISMATCH
(132) TITLE/SUFFIXES DO NOT MATCH
(133) INDIVIDUAL MOVE AND 1ST NAMES DO NOT MATCH
(134) INDIVIDUAL MATCH LOGIC AND 1ST NAMES DO NOT MATCH
(135) SURNAME MATCH TO GEN. DELIVERY
(136) Appendage
(137) MATCHED TO ZIP+4 FILE
(138) NOT MATCHED TO ZIP+4 FILE
(139) ALL COMPONENTS MATCHED TO DPV
(140) DPV MATCHED BUT SECONDARY NUMBER INVALID
(141) DPV MATCHED HIGHRISE DEFAULT
(142) (MISSING SECONDARY
(143) PRIMARY NUMBER MISSING
(144) PRIMARY NUMBER INVALID
(145) MISSING PO, RR, HC BOX NUMBER
(146) MATCHED TO CMRA AND PMB,
(147) DESIGNATOR PRESENT
(148) MATCHED TO CMRA AND PMB,
(149) DESIGNATOR NOT PRESENT
(150) DPV CONFIRMATION INDICTOR
(151) INVALID ADDRESS PO, RR, OR HC
(152) BOX NUMBER INVALID
(153) FUTURE EXPANSION
(154) ZIP+4 MATCH LEVEL
(155) ADDRESS SORT SEQUENCE NUMBER
(156) VACANT INDICATOR
(157) SEASONAL INDICATOR
(158) RESIDENTIAL/BUSINESS INDICATOR
(159) THROWBACK INDICATOR
(160) DELIVERY TYPE CODE
(161) DELIVERY POINT DROP INDICATOR
(162) NUMBER OF DELIVERIES AT THE DROP
(163) LOCATION ADDRESS CONVERSION
(164) INDICATOR
(165) NO STATISTICS INDICATOR
(166) Appendage
(167) ADDRESS SOURCE CODE
(168) ADDRESS DELIVERY CODES
(169) PANDER CODE
(170) LOCAL ADDRESS LINE
(171) UNIT INFORMATION LINE
(172) SECONDARY ADDRESS LINE/URBANIZATION
(173) CODE
(174) LONG CITY NAME
(175) ZIP CODE
(176) ZIP+4 CODE
(177) MAILABILITY CODE
(178) MILITARY ZIP CODE
(179) OPAC MATCH INDICATOR
(180) NDI AFFIRMED APT INDICATOR
(181) SECONDARY ADDRESS INDICATOR
(182) POSTAL COUNTY CODE
(183) LONG CITY NAME INDICATOR
(184) CARRIER ROUTE CODE
(185) LINE OF TRAVEL INFORMATION
(186) LOT SORTATION NUMBER
(187) PRESTIGE CITY NAME USED
(188) ZIP/ADD-ON/DELIVERY POINT
(189) Appendage
(190) MATCH CODE
(191) Appendage
(192) MATCH CODE
(193) ZIP PLUS FOUR CODE (4 DIGITS)
(194) ZIP+4 MATCH LEVEL
(195) 4 0 ADDRESS DSF GROUP CODE
(196) USPS DELIVERY SERVICE TYPE
(197) CARRIER ROUTE CODE
(198) DELIVERY POINT
(199) 1990 CENSUS CODES
(200) ADDRESS LOCATION TYPE
(201) LOCATION (DWELLING UNIT) ID
(202) ADDRESS TYPE
(203) ROUTE TYPE
(204) ROUTE NUMBER
(205) BOX TYPE
(206) BOX NUMBER
(207) UNIT TYPE
(208) UNIT NUMBER.
(209) Continuing to refer to
(210) TABLE-US-00007 Warm Address File Components Address type: Street directional Mail receiving agent Street name Other high risk Unit number Hotel/Motel City name Street number State Name Zip Code plus 4
(211) Usually, an attempt is made to match the address to an address in the warm address file. If there is a match, then in one embodiment, the type (e.g., a description on the place where the mail would be delivered such as a prison) of address would be appended.
(212) Other data may include non-client fraud address files comprising third party sourced fraud address records (block 60). Other data may further include Department of Justice county level crime statistics that scale the geographic propensity to crime frequency. Other similar information may be appended to the addresses. This information may be search to match an address, and append the information if there is a match.
(213) Also, as shown in
(214) TABLE-US-00008 Customer/Business Maintained Fraud/High Risk Address File First name Street name Middle initial/name Unit number Last name City name Surname State Name Street number Zip Code plus 4 Street directional
(215) These records may be from on-line case management system that have stored accessible addresses for confirmed fraud incidents. This information will be used in the process for determining a risk of fraud, which may be indicated by a score.
(216) Also, information is derived relating to inquiry activity relating to both new address and the reference addresses. This information is stored and updated in an address velocity file. Information is appended to the addresses relating to frequency of inquiries. (block 80). Also, a previous history file is reviewed for information relating to the new application and reference addresses. This information may be appended to the addresses (block 60). This previous history file includes previously scored addresses. This file may include date of scoring, address scored, and the score. This file may be updated to reflect any scoring performed on an address. False positive rates are improved through the use of warm address data, customer maintained known fraud address file coupled with the U.S. Postal Service National Change of Address Database. These data sources will be used in the score development process.
(217) As shown in
(218) The first variable is based on the change in the financial make-up of the two addresses. In one embodiment of this model, this variable is called “Value1.” This variable analyzes the change in the financial make-up of the reference address, the old address (e.g., in address change or account takeover situations), or FROM address (e.g., old address) and new application address, the new address, or the TO address (e.g., the address to which it has been changed). It is a composite of three demographic variables: Income, Net Worth and Home Ownership. In one embodiment, to derive the composite information the following steps are used. First, the difference in income is determined. As described with respect to
(219) Once, a value has been appended to each address for income, then the difference in income between the two addresses is calculated using the following formula:
DF_INCOME=INCOME(FROM)−INCOME(TO)
(220) Where DF_INCOME refers to the difference in income between the two addresses, INCOME(FROM) refers income appended to the reference address or old address, and INCOME(TO) refers to income appended to new application address or the new address.
(221) Next, the difference in net worth ranking is constructed. To determine the difference in net worth, for both addresses, net worth ranking is appended by first trying to match by name and address to the demographic file. If a match is not found, then match by address only is attempted to find net worth ranking. If there is still no match, then a match is made to the Zip+4 of the address and the average net worth ranking for that Zip+4 is appended. If there is still no match, then the mean net worth ranking for all individuals is appended to the address. For instance, as with income, the mean net work ranking for all individuals may be appended when a Zip+4 for a particular address cannot be determined or when demographic data cannot be located for the address of a Zip+4 area.
(222) Once, a net worth value has been appended for both addresses, then the difference in net worth between the two addresses is calculated as follows:
DF_NETWR=NETWR(FROM)−NETWR(TO)
DF_NETWR refers to the difference in net worth. NETWR(FROM) refers to the net worth of the reference address or old address and NETWR(TO) refers to the net worth of the new application address or the new address.
(223) Next, the difference in homeownership is constructed. In order to determine the difference in homeownership, for both addresses, a homeowner indicator is appended to both addresses by matching name and address to the appropriate demographic file. If there is not match, then a homeowner indicator is appended by matching by address only to find homeowner indicator. If there is still no match, the average homeownership percentage for that Zip+4 is appended. If there is still no match, the mean homeowner percentage for all individuals is assigned. For instance, as with income, the mean homeowner percentage for all individuals may be appended, when a Zip+4 for a particular address cannot be determined or when demographic data cannot be located for the address of a Zip+4 area.
(224) Once, we have a value for both the FROM and TO address, we then calculate the difference between the FROM and TO address as follows:
DF_HOMEON=HOMEON(FROM)—HOMEON(TO)
(225) Where DF_HOMEON refers to the difference in homeownership, HOMEON(FROM) refers to homeownership for reference address or old address, and HOMEON(TO) refers to homeownership for the new application address or new address.
(226) Once the three difference for the income, net worth and homeownership have been calculated, then a variable that is a combination of the three is created: IF DF_HOMEON<=−1, THEN—VALUE1=0.00056 IF DF_HOMEON>−1 and DF_HOMEON<=0 AND DF_NETWR<=−4.7 THEN VALUE1=0.00701 IF DF_HOMEON>−1 and DF_HOMEON<=0 AND DF_NETWR>−4.7 and DF_NETWR<=−2.7 THEN VALUE1=0.00131 IF DF_HOMEON>−1 and DF_HOMEON<=0 AND DF_NETWR>−2.7 and DF_NETWR<=−1.7 THEN VALUE1=0.00191 IF DF_HOMEON>−1 and DF_HOMEON<=0 AND DF_NETWR>−1.7 and DF_NETWR<=−0.7 AND DF_INCOM<=−11,000 THEN VALUE1=0.00056 IF DF_HOMEON>−1 and DF_HOMEON<=0 AND DF_NETWR>−1.7 and DF_NETWR<=−0.7 AND DF_INCOM>−11,000 THEN VALUE1=0.00565 IF DF_HOMEON>−1 and DF_HOMEON<=0 AND DF_NETWR>−0.7 and DF_NETWR<=0.3 THEN VALUE1=0.00066 IF DF_HOMEON>−1 and DF_HOMEON<=0 AND DF_NETWR>0.3 and DF_NETWR<=2.3 THEN VALUE1=0.00131 IF DF_HOMEON>−1 and DF_HOMEON<=0 AND DF_NETWR>2.3 THEN VALUEI=0.00297 IF DF_HOMEON>0 AND DF_NETWR<=5.3 THEN VALUE1=0.01894 IF DF_HOMEON>0 AND DF_NETWR>5.3 AND DF_INCOM<=37,000 THEN VALUEI=0.00275 IF DF_HOMEON>0 AND DF_NETWR>5.3 AND DF_INCOM>37,000 THEN VALUE1=0.01095
(227) The numerical values are derived from a statistical analysis using known methods of actual identity theft fraud data, which was used to build this model.
(228) The next variable identifies records that were confirmed through third party data to match the name at a given address. This variable is titled “MATCH.” If a match is found to the third party database (demographics) via name and address, this variable is coded as a value of 1. If it is not confirmed, it is coded as a 0.
(229) The next variable is based on the home value between the two addresses. To determine the value for this variable an analysis of the change in the home value is performed. This variable is named “DF_HOMVL.” In one embodiment, the difference between the home value of the FROM address (e.g., reference address in a new application situation or the old address in takeover situations) and the TO address (e.g., the new application address in a new application or a new address in takeover situations). For both the FROM and TO address, a home value is appended by matching by name and address to the appropriate demographic file. If there is not a match, then the home value is appended based on a match by address only. If there is still no match, then the average home value for that Zip+4 of the address is appended. If there is still no match, then the mean home value for all individuals is appended. Once, we have a value for home value for both the FROM and TO address, we calculate the difference between the FROM and TO address as follows:
DF_HOMVL=HOMEVAL(FROM)−HOMEVAL(TO)
(230) Where DF_HOMVL is the difference in home value, HOMEVAL(FROM) refers to the home value of the address prior in time to the one reflected as the address in a new application or in a change of address, and HOMEVAL(TO) refers to the address on the new application form as the current address or the new address provided in changing the address.
(231) The next variable in the model is based on the distance of the move for the change of address. This variable is named “DF_DISTN.” In one embodiment, this variable measures the distance of the move for the change of address. Using the delivery point for both the FROM and TO address, we then determine the longitude and latitude of the delivery point. We then calculate the distance of the move as follows:
DF_DISTX=69.1*[TO(Latitude)−FROM(Latitude)]
DF_DISTY=69.1*[TO(Longitude)−FROM(longitude)]*COS[FROM(latitude)/57.3)
DF_DISTN=SQRT[(DF_DISTX*DF_DISTX)+(DF_DISTY*DF_DISTY)]
(232) Where DF_DISTX refers to the change in latitude from the TO and FROM addresses multiplied by 69.1, DF_DISTY refers to the change in longitude from the TO and FROM addresses multiplied by the cos of the latituted of the FROM address divided by 57.3, all of which is multiplied by 69.1, and DF_DISTN is calculated by the square root of the sum of the squares of DF_DISTX and DF_DISTY. The mathematical calculation is a known formula for converting latitudinal and longitudinal information into a distance.
(233) The next variable is based on whether the type of housing (e.g., apartment, non-apartment, single family home) has changed for the current address in comparison with the reference address or old address. This variable is called “HOMAPT.” In one embodiment, this variable indicates whether or not a person has moved from a non-apartment to an apartment. In one embodiment, if the FROM address is not an apartment and the TO address is an apartment, this variable is coded as a 1. Otherwise this variable is coded as a 0.
(234) The next variable is based on whether the new application address or the new address is a building. This variable is named “BLDNG.” This variable indicates whether or not the TO address is a building. In the model, If the TO Address is a Building, this variable is coded as a 1. Otherwise this variable is coded as a 0.
(235) The next variable is based on whether the new application address, the new address or current address is a warm address. In short, this variable indicates if the second address is “warm”. Warm addresses are addresses that are non-standard delivery addresses. This type of address includes addresses such as UPS Stores, Mail Boxes, Etc., hotels/motels, etc. The variable is named “WARMADD.” In the model, if a match is made by TO the address to the Warm Address file, this variable is coded as a 1. Otherwise this variable is coded as a 0.
(236) The next variable is based on the difference in internet usages for the Zipcode+4 area (sometimes also referred to as Zip+4) for the two addresses. In one embodiment, this variable measures the difference in internet usage for the area defined by Zip+4 for the FROM address to the area defined by the Zip+4 for the TO address. This variable is named “Z4_WEB.” In one embodiment, this information is derived as follows. First, the average internet usage is calculated for the Zip+4 area for both the FROM address and the TO address. This data is resident on the demographic file, where a value of 1 indicates lowest likelihood of internet usage and 9 indicates the highest. Then, the average value for all addresses in the specific Zip+4 area is calculated. Once the value for each the FROM and TO addresses is determined, the difference variable is coded as follows:
Z4_WEB=WEBUSE(FROM)−WEBUSE(TO)
(237) Where Z4 WEB refers to the difference is web usages for the area defined by the Zip+4 for each of the addresses, WEBUSE(FROM) refers to the average internet usage for area defined by the Zip+4 for the FROM address (e.g., the reference address in a new application situation or the old address in a takeover situation), and WEBUSE(TO) refers to the average internet usage for the Zip+4 for the area defined by the TO address (e.g., the new application address or the new address in the takeover situation). While average internet usage is used as the measure, other measures such as median internet usage may be used in the appropriate model.
(238) The last variable used in this embodiment of the model is based on the average length of stay at the residence at the Zip+4 area code for the reference address or the old address (when there is an address change requested). This variable is named “Z4 LORF.” In one embodiment, this variable measures the average length of residence for the area defined by the Zip+4 for the 5 FROM address. In one embodiment, this information is derived as follows. First, the average length of residence for the area defined by the Zip+4 is calculated for the FROM address. This data is resident on the demographic file, where the values indicate the number of years a person has resided at that residence. Then, the average value for all addresses in that Zip+4 area is calculated. The variable then indicates the average length of residence for people living in the area defined by the Zip+4 for the FROM address.
(239) In one embodiment, the model used to predict has nine variables. However, the model used to predict may have any number of variables. Also, the variables used may evolve based on information collected on the characteristics of confirmed fraud accounts. Another factor that may change the variables used relates to the evolution of methods used by the people committing the fraud. As the methods change, the variables may have to be varied. However, the present invention is not limited to the number of factors used on the types of factor used in the model to predict the risk of identity theft fraud.
(240) Once the variables have been analyzed, the values for each of the variables are plugged into the model. The basic formula for the model is generalized as follows:
Y=A+B1*x1+B2*x2+B3*x3 . . . +Bn*xn,
(241) Where Y is the dependent or outcome variable is the result used to predict the risk of identity theft fraud, A is a constant value, B1 . . . Bn are the coefficients or weights assigned to the independent variables, and x1 . . . xn are the independent variables themselves. In the embodiment described above, the independent variables include VALUE1, MATCH, DF_HOMVLDF_DISTN, HOMAPT, BLDNG, WARMADD, Z4WEB, and Z4_LORF.
(242) Using known statistical methods to analyze actual data from confirmed identity theft fraud cases, the following coefficients were determined for the model:
(243) TABLE-US-00009 COMPUTE SCORE = 0.001554+ VALUE1 * 0.93061+ MATCH * −0.00594+ DF_HOMVL * 2.12E−09+ DF_DISTN * 1.53E−06+ HOTVLEAPT * 0.002093+ BLDNG * 0.002334+ WARMADD * 0.078844+ Z4_WEB * −0.00021+ Z4_LORF * 0.000134
(244) Where COMPUTE SCORE refers to the score that will be used, at least in part, to predict a risk of identity fraud. In this method, the coefficients were determined using ordinary least squares regression. However, other known statistical methods such as logistic regression, CHAID, CART, discriminant analysis, neural networks or the like may be used.
(245) In one embodiment the score is between 0 and 1 with 1 being most likely to be fraud. However, the scale may be any range. For instance, the score may be in a range of 1 to 100. Similarly, the score may be converted to a description. So depending on the risk tolerance of the institution making the inquiry, ranges may be provided that would indicate likelihood of identity theft fraud. For instance, on a scale of 0 to 1, a 0.8 or above may be designated as a high risk for fraud and the report to the company making the inquiry may be a descriptive assessment based on a numerical score rather than the score itself. The score itself shows some level of risk of identity theft fraud. Whether the level of risk is acceptable is one that must include input from the business as to its tolerance of this risk. Also, while the score itself may be used to predict whether identity theft is being perpetrated, the score may be used with other data such as, without limitation, warm address files, undeliverable mail addresses, syntax of the drivers license for a particular state to assess a risk of fraud, or the year the social security number was issued is compared to the date of birth for rationality.
(246) The model described for determining a score was developed using confirmed identify theft fraud data. However, while the variables selected are based on an analysis of this confirmed fraud data, other variables may be selected. Because the model described herein is based on a statistical analysis of confirmed fraud data, the model takes what is known about the past and applies it to future events. Over time, however, behaviors and relationships change. This is especially true in the area of identity theft fraud. As fraud models and tools are effectively deployed, the fraud migrates, creating new behaviors and relationships. Because of this, the model may be modified by using the same methods described herein to emphasize certain variables or add other variables from the information sources described herein. The model described herein was tested to understand how well the model “performs” or segments the entire population of applications. The effectiveness of the model described here is shown by the segmentation table and the ROC curve.
(247) In developing the model, the confirmed fraud data is scored. The scored data was categorized into equal sized buckets or categories from lowest to highest. Thus, the identity theft fraud rate present within each bucket is shown by categorizing the worst 5% into the first bucket, the next worst 5% into the second bucket, etc. The following chart shows the performance of the model.
(248) TABLE-US-00010 Percent Indexed Of Fraud Segment Cases Rate 1 5% 908 2 5% 279 3 5% 301 4 5% 93 5 5% 88 6 5% 88 7 5% 76 8 5% 59 9 5% 42 10 5% 17 11 5% 21 12 5% 4 13 5% 8 14 5% 0 15 5% 8 16 5% 4 17 5% 0 18 5% 0 19 5% 0 20 5% 0 TOTAL 100% 100
(249) In this example, segment 1 is the worst 5% of scored records from the test data set. As shown by the chart, this segment has a fraud rate that is over 9 times the average fraud rate for the entire population. (Note: the Indexed fraud rate is calculated by taking the segment level fraud rate divided by the overall population fraud rate*100.)
(250) Another way to look at the performance of the model is to look at a Power of Segmentation summary chart (
(251) For example, this curve indicates that the model is able to identify approximately 60% of the total frauds (y-axis) by only looking at the worst 10% of records as identified by the model (x-axis). Similarly, the curve shows that the worst 5% account for approximately 45% of the total fraud. The top line shows how well the model performs, whereas the lower line shows how a randomly generated model performs (i.e., If one looked at 10% of the records, one would expect to identify about 10% of the fraud.)
(252) Going back to
(253) Also, regardless of the fraud risk information, data relating to undeliverable mailing addresses would be useful information for the customer making the inquiry because sending media (e.g., checks, credit cards or the like) to an undeliverable providing address is expense to the business and creates a risk for fraud to be committed. As such, the customer making the inquiry that the address is an undeliverable mailing address would be useful to the customer and would save the customer the expense of mailing media to an undeliverable mailing address. Also, by not mailing media to an undeliverable address, the customer would reduce the risk of fraud being committed with the media.
(254) Next, at block 88, user defined parameters are applied. That is, the business making the request may have some criteria (e.g., verify syntax of the driver's license). Each may provide information related to score thresholds based on its tolerance for risk. Apply those requirements and append that information with the score and the other information discussed with respect to business rules to create an output for sharing with the business.
(255) At block 90, fraud alerts may be created with reason codes and transmitted to the business entity through a user interface at block 92 or a web server at block 98. The reason codes may be based on user defined criteria or codes based on the variables used in the analysis or data considered in the analysis. At block 91, the previous history file for this account may also be updated. As shown in blocks 94 and 96, a case management system provides display screen functionality for the fraud alerts, management queuing functionality with operator and pending case tracking.
(256) In terms of output to the customer who initiated the inquiry, in one embodiment, the output message content includes the following:
(257) TABLE-US-00011 Output Message Content Score First name One or more reason codes Middle initial/name Account or reference number Last name Surname
(258) However, the output may be provided in a other ways. For instance, the output may be provided by simply stating a level of risk or providing a statement of the level of risk of fraud in addition to the score. Also, while the information related to the level of risk of fraud may be communicated via a data line, the internet, a facsimile or by voice (including an operator simply calling the customer with an oral report of the risk analysis).
(259) Also, the web server (block 98) may be used by the customer to provide confirmed fraud data, which would be used to update the client fraud data file for future use.
(260) In operation, the business/customer makes an inquiry to assess a level of risk of fraud on a new application. Data is appended to the address provided on the new application and the reference address (from a third party source such as a credit report or this information may be on the application). A score is derived using the model described above. The result may be provided real-time or via batch processing. In either case, the results maybe provided to the customer in any commercially practicable method including, but not limited to, a data line, the internet, a facsimile or by voice (electronic or human voice). Customers may establish internal policies and procedures for handling accounts based on the score.
(261) The system described with reference to
(262) As shown in
(263)
(264)
(265) As shown in
(266)
(267) As with the process described with respect to new applications, a numerical score derived from this process may be used to assess risk. However, in other embodiments, the score may be considered along with data analyzed based on the business rules and client-defined parameters to make as assessment of the risk of identity theft. This information may be provided in any number of ways including voice, data line, facsimile. Also, the processing for takeover accounts may be done in batch, real-time, and in a client-server structure where the server is in a remote location or in a structure where the system is hosted at the client site.
(268) There are several purpose for which this invention serves. A purpose of this invention is to prevent fraud losses associated with account takeover. An additional purpose of the invention is to prevent fraud losses that accrue from criminals submitting fraudulent credit account applications to financial institutions where the criminal assumes the credit identity of an unknowing person/victim. If the account is approved, the criminal receives the credit card, debit card, checks or merchandise or services at a street address other than that of the victim.
(269) An additional purpose of this invention is to reduce fraud losses in a form of account takeover that is associated with “over night” emergency requests for the replacement of items such as credit/debit cards, personal checks, traveler check replacements. There is a business and competitive need for financial institutions to provide emergency replacement services. Criminals can affect an account take over by exploiting the Emergency replacement process through requesting that an unauthorized replacement, be sent to an address for which they have access. The criminal receives the replacement and commits unauthorized use fraud. Emergency type credit and debit card replacements are often requested to be sent to an address other than the address of record. A financial institution has a short processing window to establish the legitimacy of these requests. “This invention would help to identify potentially fraudulent requests using the analysis described above.
(270) Another purpose of this invention is to reduce fraud losses where product or service fulfillment or billing activities involve a street address and the effects of fraudulent addresses that would be negative to business interests. This can occur in the retail environment particularly in non-face to face transactions. In addition to reduced direct fraud losses through superior detection, the purpose of this invention is to reduce overhead and infrastructure expenses associated with low false positive rates, reduced infrastructure expenses that are necessary to process fraudulent claims and an improved customer experience.
(271) As can be seen by the above Figures, different factors may be considered depending upon the particular request that is received, and may be dynamically determined as to what factors should be considered for a given request. For instance, some requests may only utilize certain factors, while other requests may involve checks of all factors in providing a score.
(272) Hence, it can be seen that embodiments of the present invention provide various systems and methods that can be used for detecting fraud in account requests.
(273) Embodiments of the invention can be embodied in a computer program product. It will be understood that a computer program product including one or more features or operations of the present invention may be created in a computer usable medium (such as a CD-ROM or other medium) having computer readable code embodied therein. The computer usable medium preferably contains a number of computer readable program code devices configured to cause a computer to affect one or more of the various functions or operations herein described.
(274) While the methods disclosed herein have been described and shown with reference to particular operations performed in a particular order, it will be understood that these operations may be combined, sub-divided, or re-ordered to form equivalent methods without departing from the teachings of the present invention. Accordingly, unless specifically indicated herein, the order and grouping of the operations is not a limitation of the present invention.
(275) While the invention has been particularly shown and described with reference to embodiments thereof, it will be understood by those skilled in the art that various other changes in the form and details may be made without departing from the spirit and scope of the invention.