Search

US-12619991-B2 - Control of network systems for automatic assessment and remediation of processing anomalies

US12619991B2US 12619991 B2US12619991 B2US 12619991B2US-12619991-B2

Abstract

A remote deposit capture (RDC) processing anomaly detection and remediation tool that can communicate with the RDC system over a network, and determine whether a RDC transaction is missing from the RDC system by comparing created and assigned unique identifiers represented in RDC transaction data received at a selected RDC system location or component with unique identifiers represented in RDC transaction data received at a RDC system location or component that is upstream thereof. In response to finding a missing RDC transaction, the tool can determine one or more RDC system remediation actions, execute the one or more RDC system remediation actions on the RDC system, and report the missing RDC transaction and any RDC system remediation actions executed on the RDC system.

Inventors

  • Omganesh Teekaramsingh
  • Louis Allin
  • Jonathan Topp
  • Madhu babu Martheneni
  • Lenin Kumar Pagidipala

Assignees

  • TRUIST BANK

Dates

Publication Date
20260505
Application Date
20240930

Claims (20)

  1. 1 . A computerized tool for detecting and remediating anomalies in a computing system, the computerized tool comprising: a processor; and a memory communicatively coupled to the processor, the memory including instructions that are executable by the processor to cause the processor to perform operations comprising: receiving from the computing system, transaction data for one or more transactions initiated via the computing system; generating a unique identifier comprising a combination of selected items of information extracted from the transaction data received for each transaction, and assigning each unique identifier to a corresponding transaction; identifying a likely location of a computing system anomaly by determining that one or more unique identifiers are missing from a selected computing system layer or component by comparing one or more unique identifiers represented in transaction data received at the selected computing system layer or component with one or more unique identifiers represented in transaction data received at an upstream computing system layer or component; initiating a testing operation comprising transmitting test data from the upstream computing system layer or component to the selected computing system layer or component; analyzing the testing operation and identifying a type of the computing system anomaly as a computing system hardware problem, a computing system application problem, or a corrupted or missing transaction data problem; in response to identifying the computing system anomaly type, assessing, by a first application associated with an assessment and remediation module of the computerized tool, a subset of computing system construction or operational parameters related to the computing system anomaly type to determine one or more computing system anomaly remediation actions; and executing, by a second application associated with the assessment and remediation module, the one or more computing system anomaly remediation actions on the computing system.
  2. 2 . The computerized tool of claim 1 , wherein the operations further comprise: in response to determining that the one or more unique identifiers are missing from the selected computing system layer or component, assessing, by a third application associated with the assessment and remediation module, a subset of communications network construction or operational parameters related to the selected computing system layer or component or the upstream computing system layer or component, to determine one or more communications network remediation actions; and executing, by a fourth application associated with the assessment and remediation module, the one or more communications network remediation actions on the communications network.
  3. 3 . The computerized tool of claim 2 , wherein the operations further comprise executing the one or more communications network remediation actions only after execution of any computing system remediation actions.
  4. 4 . The computerized tool of claim 1 , wherein the operations further comprise executing the one or more computing system remediation actions at one of the selected computing system layer or component or a computing system layer or component that is upstream of the selected computing system layer or component.
  5. 5 . The computerized tool of claim 1 , wherein the one or more computing system anomaly remediation actions further comprise resending, to the selected computing system layer or component from an upstream computing system layer or component, transaction data containing the missing one or more unique identifiers.
  6. 6 . The computerized tool of claim 1 , wherein the operations further comprise determining that the one or more unique identifiers are missing from other layers or components of the computing system that are downstream from the selected computing system layer or component.
  7. 7 . The computerized tool of claim 1 , wherein the computing system is a remote deposit capture computing system and the transaction data includes both alphanumeric deposit data and digitized check image data.
  8. 8 . A non-transitory computer-readable medium comprising instructions that are executable by a processor of a computerized tool for causing the computerized tool to perform operations comprising: receiving from a computing system, transaction data for one or more transactions initiated via the computing system; generating a unique identifier comprising a combination of selected items of information extracted from the transaction data received for each transaction, and assigning each unique identifier to a corresponding transaction; identifying a likely location of a computing system anomaly by determining that one or more unique identifiers are missing from a selected computing system layer or component by comparing one or more unique identifiers represented in transaction data received at the selected computing system layer or component with one or more unique identifiers represented in transaction data received at an upstream computing system layer or component; initiating a testing operation comprising transmitting test data from the upstream computing system layer or component to the selected computing system layer or component; analyzing the testing operation and identifying a type of the computing system anomaly as a computing system hardware problem, a computing system application problem, or a corrupted or missing transaction data problem; in response to identifying the computing system anomaly type, assessing, by a first application associated with an assessment and remediation module of the computerized tool, a subset of computing system construction or operational parameters related to the computing system anomaly type to determine one or more computing system anomaly remediation actions; and executing, by a second application associated with the assessment and remediation module, the one or more computing system anomaly remediation actions on the computing system.
  9. 9 . The non-transitory computer-readable medium of claim 8 , wherein the operations further comprise: in response to determining that the one or more unique identifiers are missing from the selected computing system layer or component, assessing, by a third application associated with the assessment and remediation module, a subset of communications network construction or operational parameters related to the selected computing system layer or component or the upstream computing system layer or component, to determine one or more communications network remediation actions; and executing, by a fourth application associated with the assessment and remediation module, the one or more communications network remediation actions on the communications network.
  10. 10 . The non-transitory computer-readable medium of claim 9 , wherein the operations further comprise executing the one or more communications network remediation actions only after execution of any computing system remediation actions.
  11. 11 . The non-transitory computer-readable medium of claim 8 , wherein the operations further comprise executing the one or more computing system remediation actions at one of the selected computing system layer or component or a computing system layer or component that is upstream of the selected computing system layer or component.
  12. 12 . The non-transitory computer-readable medium of claim 8 , wherein the one or more computing system anomaly remediation actions further comprise resending, to the selected computing system layer or component from an upstream computing system layer or component, transaction data containing the missing one or more unique identifiers.
  13. 13 . The non-transitory computer-readable medium of claim 8 , wherein the operations further comprise determining that the one or more unique identifiers are missing from other layers or components of the computing system that are downstream from the selected computing system layer or component.
  14. 14 . The non-transitory computer-readable medium of claim 8 , wherein the computing system is a remote deposit capture computing system and the transaction data includes both alphanumeric deposit data and digitized check image data.
  15. 15 . A method of detecting and remediating anomalies in a computing system, the method comprising: receiving, at a computerized tool, from the computing system, transaction data for one or more transactions initiated via the computing system; generating, by the computerized tool, a unique identifier comprising a combination of selected items of information extracted from the transaction data received by the computerized tool for each transaction, and assigning each unique identifier to a corresponding transaction; identifying, by the computerized tool, a likely location of a computing system anomaly by determining that one or more unique identifiers are missing from a selected computing system layer or component by comparing one or more unique identifiers represented in transaction data received at the selected computing system layer or component with one or more unique identifiers represented in transaction data received at an upstream computing system layer or component; initiating, by the computerized tool, a testing operation comprising transmitting test data from the upstream computing system layer or component to the selected computing system layer or component; analyzing the testing operation by the computerized tool and identifying a type of the computing system anomaly as a computing system hardware problem, a computing system application problem, or a corrupted or missing transaction data problem; in response to identifying the computing system anomaly type, assessing, by a first application associated with an assessment and remediation module of the computerized tool, a subset of computing system construction or operational parameters related to the computing system anomaly type to determine one or more computing system anomaly remediation actions; and executing, by a second application associated with the assessment and remediation module, the one or more computing system anomaly remediation actions on the computing system.
  16. 16 . The method of claim 15 , further comprising: in response to determining that the one or more unique identifiers are missing from the selected computing system layer or component, assessing, by a third application associated with the assessment and remediation module, a subset of communications network construction or operational parameters related to the selected computing system layer or component or the upstream computing system layer or component, and resultantly determining one or more communications network remediation actions; and executing, by a fourth application associated with the assessment and remediation module, the one or more communications network remediation actions on the communications network.
  17. 17 . The method of claim 16 , wherein the one or more network remediation actions are executed only after any computing system remediation actions have been executed.
  18. 18 . The method of claim 15 , wherein the one or more computing system remediation actions are executed at one of the selected computing system layer or component or a computing system layer or component that is upstream of the selected computing system layer or component.
  19. 19 . The method of claim 15 , wherein the one or more computing system remediation actions further comprise resending, to the selected computing system layer or component from an upstream computing system layer or component, transaction data containing the missing one or more unique identifiers.
  20. 20 . The method of claim 15 , wherein the computing system is a remote deposit capture computing system that receives both alphanumeric deposit data and digitized check image data within the transaction data.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS The present application is a continuation of U.S. patent application Ser. No. 18/065,127, filed Dec. 13, 2022, titled “CONTROL OF NETWORK SYSTEMS FOR AUTOMATIC ASSESSMENT AND REMEDIATION OF PROCESSING ANOMALIES,” the entirety of which is incorporated herein by reference. TECHNICAL FIELD The present disclosure relates generally to network communication and information processing, and more particularly, although not exclusively, to automatically assessing and remediating electronic transaction processing anomalies. BACKGROUND Networks, such as those used for allowing electronic communications or exchanging or processing files, may be complex systems having multiple layers and components that depend on proper interaction to avoid anomalies such as delays, errors, or failures. The various layers or components of network systems may also reside at separate locations, which can introduce additional opportunities for processing anomalies and can complicate the operation of assessing and remediating anomalies that arise. As one example, a network may be used to receive and process data files. Such a network may have multiple layers and various interconnected hardware and software components for performing processing operations. For example, a network may include an intake or input layer via which a data file(s) may be received from a user, a core layer where data in the data file may be analyzed, organized, or converted, and a processing layer where the data is finally processed and output, stored, or transmitted elsewhere. One particular example of such a network is a remote deposit capture (RDC) system. RDC is a process by which a paper check is digitized, and the digitized check image is transmitted along with other deposit data through a network comprising multiple processing layers and components before the transaction associated with the check is completed. Digitization of a check and initiation of a RDC transaction commonly occurs at a location remote from the location of final transaction processing, and there may also be intermediate processing layers and components through which the digitized check image and deposit data must pass before reaching the final destination. As a result, the RDC process is ripe with opportunities for processing anomalies. Assessing and remediating network processing anomalies across complex networks using human operators can be expensive, as human operators must be paid, and also require various computer or other systems to perform assessment and remediation operations. Assessing and remediating network processing anomalies using human operators can also be inefficient, as natural human limitations affect the speed with which anomalies can be addressed and the volume of anomalies that can be investigated and remediated within a given period of time. Moreover, providing human operators with the access necessary to assess and remediate network anomalies may further add to the complexity of already complicated network systems. Networks may also process high volumes of data, which can increase the number of human operators and associated hardware resources required to remediate network anomalies, and may lead to remediation delays. SUMMARY According to one example of the present disclosure, a computerized tool for detecting and remediating electronic transaction processing anomalies in a RDC system may include a database, a processor communicatively coupled to the database, and memory that is communicatively coupled to the processor and includes instructions that are executable by the processor to cause the processor to perform operations. The operations may include communicating with the RDC system over a network, and receiving RDC transaction data for RDC transactions initiated via the RDC system. The operations may also include creating for each RDC transaction a unique identifier comprising selected items of deposit information extracted from the RDC transaction data received for each RDC transaction, and assigning each unique identifier to a corresponding RDC transaction. The operations may also include determining that a RDC transaction is missing from a selected RDC system location or component by comparing the unique identifiers represented in RDC transaction data received at the selected RDC system location or component with the unique identifiers represented in RDC transaction data received at a RDC system location or component that is upstream of the selected RDC system location or component. The operations may additionally include, in response to determining that a RDC transaction is missing from the selected RDC system location or component, creating a missing transaction record that includes at least information identifying the missing RDC transaction and the selected RDC system location or component from which the RDC transaction is missing, and storing the missing transaction record in the database. The operations may further