[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

US20190325439A1 - Systems and methods for verifying identities in transactions - Google Patents

Systems and methods for verifying identities in transactions Download PDF

Info

Publication number
US20190325439A1
US20190325439A1 US16/458,910 US201916458910A US2019325439A1 US 20190325439 A1 US20190325439 A1 US 20190325439A1 US 201916458910 A US201916458910 A US 201916458910A US 2019325439 A1 US2019325439 A1 US 2019325439A1
Authority
US
United States
Prior art keywords
information
transaction
identification information
individual
processing device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US16/458,910
Inventor
Michael J. Michelsen
Paul Blair
Dean Seifert
Joseph Cachey
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Western Union Co
Original Assignee
Western Union Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Western Union Co filed Critical Western Union Co
Priority to US16/458,910 priority Critical patent/US20190325439A1/en
Assigned to FIRST DATA CORPORATION reassignment FIRST DATA CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BLAIR, PAUL, CACHEY, JOSEPH, MICHELSEN, MICHAEL J., SEIFERT, DEAN
Assigned to THE WESTERN UNION COMPANY reassignment THE WESTERN UNION COMPANY ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: FIRST DATA CORPORATION
Publication of US20190325439A1 publication Critical patent/US20190325439A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions

Definitions

  • the present invention relates generally to money transfer transactions. More specifically, the present invention relates to verifying the identity of persons involved in money transfers.
  • Embodiments of the present invention thus provide a computerized method of verifying the identity of an attendant operating a money transfer transaction device.
  • the method includes receiving at the money transfer transaction device a user identification and password from the attendant and receiving at the money transfer transaction device additional information from the attendant.
  • the additional information relates to a security feature that limits access to the transaction device.
  • the method also includes using the additional information, the user identification, and the password to evaluate whether to allow the attendant to operate the transaction device to process a transaction.
  • the step of using the additional information, the user identification, and the password to evaluate whether to allow the attendant to operate the transaction device to process a transaction may include sending the additional information, the user identification, and the password to a host computer system and, at the host computer system, comparing the additional information to stored information.
  • the step of using the additional information, the user identification, and the password to evaluate whether to allow the attendant to operate the transaction device to process a transaction may occur at the money transfer transaction device.
  • the step of receiving additional information may include displaying a stored attendant name together with a question asking the attendant if the stored attendant name is the name of the attendant and receiving a response to the question from the attendant.
  • the step of receiving additional information may include receiving information from an identification tool of the attendant.
  • the identification tool may be a card encoded with machine-readable information.
  • the card may be selected from a group consisting of proximity card, smart card, identification card, and card having a magnetic stripe.
  • the identification tool may include a tool that generates a code, in which case the step of receiving additional information may include receiving the code from the attendant and the step of using the additional information, the user identification, and the password to evaluate whether to allow the attendant to operate the transaction device to process a transaction may include generating a verification code and comparing the verification code to the code.
  • Receiving additional information may include receiving a biometric feature of the attendant.
  • the biometric feature may be selected from a group consisting of DNA, fingerprint, retinal image, voice print, and facial image.
  • Receiving additional information may include receiving a biometric image from an identification card relating to the attendant.
  • the identification card may be selected from a group consisting of driver's license, passport, picture identification card, biometric card, and government-issued identification card.
  • the method also may include limiting the attendant's access based on information specific to a transaction being processed by the attendant.
  • a method of obtaining identification information from an individual involved in a transaction includes entering transaction-related information into a transaction processing device.
  • the transaction information includes information relating to the identity of the individual.
  • the method also includes receiving a prompt via the transaction processing device to enter identification information and entering identification information.
  • the identification information may verify the information relating to the identity of the individual.
  • the method also includes processing the transaction.
  • the method may include storing at least a portion of the transaction-related information and at least a portion of the identification information in a transaction record as transaction information.
  • the method also may include comparing the transaction information to information obtained from a credit reporting agency.
  • the method also may include comparing the transaction information to information obtained from an identification information company.
  • the method also may include comparing the transaction information to similar information in other transaction records.
  • the method also may include comparing the transaction information to information in a list provided by law enforcement authorities.
  • the step of processing the transaction may include aborting the transaction.
  • the identification information may include a biometric feature of the sender.
  • the transaction-related information may include information relating to a receiver in the financial transaction.
  • the identification information may be entered by inputting information into the transaction processing device.
  • the identification information may be entered by inputting information into a peripheral device associated with the transaction processing device.
  • the identification information may include a security code obtained from an identification tool.
  • the method also may include comparing the security code to a verification code generated by the transaction processing device.
  • a system for obtaining identification information from an operator of a transaction processing device includes a host computer system and a transaction processing device.
  • the transaction processing device is programmed to receive a user identification and password from the operator and receive additional information from the operator.
  • the additional information may relate to a security feature that limits access to the transaction device.
  • the transaction processing device also is programmed to transmit at least a portion of the information to the host computer system.
  • the host computer system is programmed to use the additional information, the user identification, and the password to evaluate whether to allow the operator to operate the transaction device to process a transaction.
  • a system for obtaining identification information from a party to a transaction includes a host computer system and a transaction processing device.
  • the transaction processing device is programmed to receive transaction-related information, including information relating to the identity of the party.
  • the transaction processing device also is programmed to receive identification information from the party.
  • the identification information may relate to a biometric feature of the party.
  • the transaction processing device also is programmed to transmit at least a portion of the information to a host computer system.
  • the host computer system may be programmed to store the transaction-related information and the identification information as transaction information and compare the transaction information to similar information relating to other transactions.
  • the host computer system also may be programmed to compare the transaction information to information in a list provided by law enforcement authorities.
  • FIG. 1 illustrates a system for processing money transfers according to embodiments of the present invention.
  • FIG. 2 illustrates a method of verifying identities and identifying related transactions according to the present invention.
  • money transfer service providers employ systems and methods to identify individuals involved in money transfer transactions and/or to relate transactions that otherwise appear unrelated.
  • provider or “service provider” will refer to a money transfer service provider.
  • provider may refer to an entity such as Western Union of Englewood, Colo., whose money transfer service is well known.
  • associate will refer to entities that a money transfer service provider may enlist to accomplish the service.
  • third parties such as merchants, financial institutions, and the like may be “associates.”
  • attendant will refer to someone with whom a customer interacts in the transaction process.
  • an attendant may be an employee of a provider or associate.
  • An attendant typically operates a transaction processing device, entering information received from the customer and/or related to a transaction.
  • money transfer will be used herein to refer to the type of service provided, that phrase will be understood to mean any financial transaction involving “value,” which may include money, credits, customer loyalty points, other units of measure, and the like.
  • transactions to which the present invention applies may include money order purchases and/or redemptions, traveler's check purchases and/or redemptions, sending money to a recipient, receiving money from a sender, and the like.
  • a sender presents himself to a service provider or associate and provides value, usually cash, to an attendant.
  • value usually cash
  • information is entered into a record that is received at a host computer system.
  • the record includes information that identifies the sender, the recipient, and the amount of money being transferred, among other things.
  • the recipient presents himself to a receive site of a provider or associate to obtain the money or other value.
  • An attendant at the receive site verifies the identity of the receiver and gives the receiver the value.
  • the transaction information may be collected in any number of ways.
  • the information is collected by a point-of-sale device specifically designed for money transfer transactions.
  • the device may be operated by an attendant employed by the provider or an associate.
  • the information may be collected using a computing device running application software specifically designed for money transfer transactions.
  • the information may be collected by phone when an attendant contacts a customer service representative (CSR) of the provider.
  • CSR customer service representative
  • the attendant is able to verify the sender's information and collect funds while the CSR enters the information into a transaction record.
  • the transaction is initiated by an associate who then must contact a CSR because the transaction exceeds certain thresholds.
  • the customer provides some information to a CSR at a remote location while also entering some information into a transaction processing device by, for example, “swiping” a card through a reader on the device.
  • Other examples are possible.
  • identity verification is a significant aspect to the money transfer process. For example, in one instance, it is important to verify the identity of the sender. In an attempt to thwart illegal or unethical money transfers, it is helpful to confirm the identity of a sender, especially on transfers over certain value thresholds. Transfers over the thresholds may require the provider to obtain additional information from the sender. In some cases, the information may be compared to a list of known or suspected criminals. If a sender is a known criminal, identifying transactions initiated by the individual may provide security and law enforcement personnel assistance in stopping criminal activity such as money laundering, criminal activity funding, and tax evasion. Further, some individuals may attempt to avoid detection by segmenting a single money transfer into multiple smaller transfers below the thresholds. Thus, providers may employ measures described herein to relate transactions that might otherwise appear unrelated.
  • the present invention provides systems and methods to identify potentially related transactions and to verify the identities of those involved in money transfer transactions, both as sending parties, receiving parties, and as transaction device operators (e.g., attendants).
  • FIG. 1 illustrates a money transfer system 100 according to embodiments of the present invention.
  • the system 100 includes a host computer system 102 and a network 104 .
  • the host computer system 102 may include, for example, server computers, personal computers, workstations, web servers, and/or other suitable computing devices.
  • the host computer system 102 includes application software that programs the host computer system 102 to perform one or more functions according to the present invention.
  • application software resident on the host computer system 102 may program the host computer system 102 to process money transfer records according to embodiments of the present invention.
  • the host computer system 102 may include one or more of the aforementioned computing devices, as well as storage devices such as databases, disk drives, optical drives, and the like.
  • the storage devices may include solid state memory, such as RAM, ROM, PROM, and the like, magnetic memory, such as disc drives, tape storage, and the like, and/or optical memory, such as DVD.
  • the host computer system 102 may be fully located within a single facility or distributed geographically, in which case a network may be used to integrate the host computer system 102 . Many other examples are possible and apparent to those skilled in the art in light of this disclosure.
  • the network 104 may be the Internet, an intranet, a wide area network (WAN), a local area network (LAN), a virtual private network, any combination of the foregoing, or the like.
  • the network 104 may include both wired and wireless connections, including optical links.
  • the network 104 is a transaction processing network. Through the network 104 , transaction devices communicate with the host computer system 102 .
  • the system 100 also includes one or more Point-of-Sale (POS) devices 106 .
  • POS devices are more fully described in U.S. patent application Ser. No. 09/634,901, filed on Aug. 8, 2000, the entire disclosure of which is incorporated herein by reference for all purposes.
  • POS devices are terminals for receiving transaction information and sending the information to a host computer system.
  • a POS may receive transaction information by capturing it from a card using a reader integral to or associated with the POS.
  • a POS also may receive information from an attendant or customer via a keypad, keyboard, and/or other input device. Other examples are possible.
  • POS devices are typically located at associate or provider locations offering money transfer services.
  • the system 100 also may include one or more computing devices 108 programmed to receive money transfer information from customers or attendants. Like the POS devices 106 , the computing devices I 08 may be located at associate locations.
  • the system also may include one or more Customer Service Representative (CSR) computers 110 .
  • the CSR computers 110 may be located, for example, at a call center operated by the service provider or an associate.
  • the CSR computers 110 function much like the POS devices I 06 and the computing devices I 08 , except that transaction information is entered by a CSR who is receiving the information from a customer by phone, for example.
  • a voice response unit may receive some or all of the information.
  • the system 100 also includes one or more receiving sites 112 from which customers may receive funds.
  • the receive sites 112 may be associate locations equipped with a POS 106 or computing device 108 .
  • the receive sites also may be automated teller machines, kiosks (which are more fully described in U.S. patent application Ser. No. 10/225,410, filed on Aug. 20, 2002, the entire disclosure of which is incorporated herein by reference for all purposes), merchant store fronts, bank accounts, stored value accounts, and/or the like.
  • a customer presents himself to a money transfer location.
  • the location may be equipped with either a POS device 106 , a computing device 108 , or other suitable transaction device.
  • the location may be operated by the provider or an associate.
  • An attendant receives information from the customer and verifies it according to embodiments of the present invention.
  • the attendant also enters the information into the transaction device. In the process, the attendant may need to enter his own identification information to enable the device. If necessary, the attendant contacts a CSR to complete the transaction.
  • the attendant also collects the money from the customer.
  • the transaction information may be compared with information in other transaction records to attempt to identify potentially related transactions.
  • Identity information collected in the course of identifying the sender may be used for this purpose. If potentially related transactions are identified, they may be flagged for increased scrutiny.
  • a customer initiates a transaction by providing an attendant with transaction information.
  • the attendant enters the information into a transaction device, as previously described.
  • a message alerts the attendant that the transaction must be completed by a CSR. This may be because the transaction exceeds certain thresholds or otherwise triggers a flag.
  • the attendant contacts a CSR who also collects the transaction information from the customer and who may ask the customer for additional information. If at any time the customer elects to abort the transaction, any information collected up to that point may be stored for future use.
  • the theory being that the customer may, in the future, attempt to avoid the flag that triggered the need for the additional information.
  • the customer may attempt to initiate several smaller transfers from different money transfer locations to avoid a trigger based on the amount of the transaction.
  • the provider may search other transactions for similar information and identify any found as being potentially related to the aborted transaction.
  • the identities of persons operating transaction devices may be confirmed in a number of ways.
  • the attendant may be required to use an identification tool that may be supplied by the provider.
  • the identification tool either supplies information that the attendant enters into the transaction device, or the identification tool itself may be swiped or otherwise interfaced to the transaction device. This may be combined with entering a user ID and password, in some examples.
  • the attendant swipes a card with a magnetic stripe through a reader on the transaction device or associated with it.
  • the stripe may include the attendant's user ID and password or other information known only to the user.
  • the transaction device then may prompt the attendant to enter a user ID followed by a password.
  • the attendant may be denied access to the device.
  • the steps of swiping a card, entering a user ID, and entering-a password may be carried out in other orders than described above.
  • the identification tool be a card with a magnetic stripe supplied by the provider.
  • the tool may be any card used by the attendant that the attendant elects to use as his identification card for this purpose.
  • the attendant elects the card he will use, and his user ID and password are associated with information read from the card.
  • the information is then saved in an access file at either the host computer system or the transaction device for later comparison to information entered by the attendant at the time access is requested.
  • the card may be one of the attendant's credit cards, his driver's license, passport, or the like.
  • the identification tool may be a card with other magnetic encoding properties, such as a proximity card (i.e., a card or other device that transfers information when held in proximity to a reader), or it may be a card with a barcode, a smart card, or the like.
  • the tool is not a card but is a biometric feature of the attendant such as his fingerprint, retinal image, facial features, voice print, DNA, or the like.
  • the tool itself generates information that is either displayed to the attendant or entered into the transaction device. The information may be unique each time the attendant attempts to access the device. The information may be generated by an algorithm and compared to information generated at the host computer system or the transaction device using the same algorithm. If the information does not match, then the attendant is denied access.
  • the identity verification process may be preceded by a registration process wherein information about an attendant is verified, biometric information is obtained, identification cards are selected, and/or the like.
  • the provider may verify that the attendant actually works for an associate who has authorized the attendant to process transactions.
  • a background check is performed on the attendant that may include residence and citizenship verification, criminal background checks, credit verification, and the like.
  • the registration information may then be saved for later use during identity verification associated with a transaction.
  • registration includes establishing an attendant's certification level, as will be described further below.
  • attendants may be required to provide the information periodically, instead of every day or every transaction. For example, an attendant may be “audited” only once a week, after a particular number of transactions, upon demand by the provider, and/or after a particular dollar volume of transactions. In the case of audits performed on demand, the audit may be on all attendants in a state, all attendants in an associate's network, all attendants at a particular location, or on only selected attendants. In the case of audits performed periodically, an attendant may be required to provide the audit information only after a timeout between transactions or a series of transactions. Audits may be location specific and may be controlled (i.e., called for) by the provider, an associate, or other entity.
  • the audit may be prompted by either the transaction device or the host computer system.
  • an attendant may be required to provide any of the identifying information explained above.
  • the audit may simply be a question displayed to the attendant asking, “Are you John Doe?” wherein “John Doe” may be a name stored in an access file and related to the user ID and/or password entered by the attendant. Other such examples are possible.
  • the identification tools may enable user-level privileges. For example, if an associate issues its employees ID cards, those ID cards may function as an identification tool. However, the associate of the provider may specify the level of access allowed each individual user. Some users may not have access. Others may have access only during certain times of the day or for only transactions below certain value thresholds. The thresholds may be cumulative during a period of time, such as a shift, a day, a week, a pay period, or the like. Some users may be allowed to process only certain types of transactions.
  • Identification systems also may be combined with certification training to restrict access to attendants based on their level of training. Training may be accomplished in a number of well known ways, and access files relating to each attendant may be updated as an attendant receives additional training. In some embodiments, the certification levels may be established so as to mirror regulatory training and certification requirements. Thus, systems such as the present invention may be used to demonstrate compliance with the regulations.
  • the verification of attendant information may take place at the host computer system level or at the transaction device level. If at the host level, individual attendant information may be associated with a particular transaction device or devices. Thus, when the device transmits the identification information to the host, it also transmits its own identification information. If the attendant is not authorized to use the device, the attendant is denied access. In another example, the transaction device itself performs the identification verification process. This reduces the amount of information that must be transmitted back to the host computer.
  • the attendant may be asked to enter his full name and/or an answer to a secret question using an alphanumeric keyboard or a number pad associated with the transaction device. This may be used in combination with a user ID and/or password.
  • the attendant's facial biometric may be imaged at the time the attendant registers.
  • the facial biometric may be obtained from the attendant directly or from a document of the attendant, such as a driver's license or passport.
  • the image is then saved 30 in an access file at the host or at the transaction device.
  • the transaction device may obtain another image of the attendant's facial biometric, either from the attendant directly or from his identification document.
  • the new image is compared to the image taken during enrollment, and, if dissimilar, the attendant is asked for additional information or is denied access to the transaction device.
  • the image comparison may be done automatically using a software algorithm or the like. In other examples, the comparison may be accomplished manually by an individual.
  • a similar process may be employed that uses the attendant's voice pattern as the biometric.
  • a verification voice sample may be obtained during registration and stored for comparison to a sample obtained during a transaction.
  • a microphone associated with a transaction device may receive a voice sample from the attendant during a transaction and compare the two. Methods for digitizing and comparing voice samples are known.
  • each attendant could be issued a card specific to transaction devices at the location at which the attendant works.
  • the card may be configured using, for example, position determination features, such that the card only works inside the facility.
  • Transaction devices may be similarly enabled to only function at a specified location.
  • the transaction devices may require the entry of a location-specific identification number or character string upon startup. Thus, if the device is stolen, the number must be entered before the device will operate.
  • Identification information may include biometric information, such as the customer's fingerprint, retinal image, facial features, voice print, DNA, or the like.
  • the transaction device also may scan a picture identification of the customer, such as the customer's driver's license or passport photo.
  • the biometric or photo identification information may be stored at the host computer system for comparison to future transactions and/or compared to national or international databases of suspect individuals.
  • identification information supplied by the customer may be compared to identification information relating to the customer from a credit reporting agency or other entity that provides identify information. If the information is not consistent, the transaction may be denied or additional information may be required from the customer.
  • FIG. 2 illustrates a method 200 of verifying identities and identifying related transactions according to embodiments of the present invention.
  • the method may be implemented in the system 100 of FIG. 1 or other suitable system.
  • an attendant logs into the transaction device.
  • the transaction device may be a POS, a computing device, or other suitable transaction device, as previously described.
  • Logging on to the device may involve merely powering up the device. However, logging on also may involve entering a location identification number, entering a user ID and/or password, answering a secret question, entering biometric information, swiping a card, using a proximity card, and the like, all of which procedures were explained previously.
  • any information entered by the attendant is verified, either by the transaction device itself or by sending information to a host computer system. If the information is accepted, the attendant is granted access to the transaction device. It may be the case, that the host computer system or the transaction device itself determines that an audit of the attendant is necessary, in which case the attendant is asked to provide additional information as previously described.
  • the transaction device may be verified. For instance, the transaction device itself or the host computer system may verify that the transaction device is operating properly and from an authorized location. This may include determining that the device is connected to an authorized network or that the device's physical location is within an allowed range using a positioning system or the like.
  • the attendant collects transaction information from a customer. This may include the customer's name and address, the amount of money involved in the transaction, the recipient's name and address, and the like. This operation also may involve obtaining biometric information from the customer. In some examples, some or all of the information may be provided by the customer via a phone call to a CSR. Thus, a partial transaction record may exist for a transaction when the customer presents himself to the provider or associate location.
  • the attendant's authorization to process the transaction is verified. This may involve verifying the attendant's level of training, the attendant's level of authorization, the attendant's identification information, and/or the like. If not previously obtained or if sufficient time has passed, this operation may involve collecting identification information from the attendant, including biometric information, as necessary. If the attendant is not authorized to process the transaction, then a different attendant or a CSR may be required to complete the transaction.
  • additional information is needed from the customer and the information is collected. Depending on the location from which the transaction originates, the purpose or type of transaction, the destination to which the transaction is directed, the amount of the transaction, and/or other criteria, additional information may be required from the customer.
  • the additional information may include the customer's date of birth, social security number and/or tax identification number, occupation, the type of identification the customer has presented to verify his identity, the place the identification was issued, and/or the like.
  • the additional information also may include biometric information as previously described.
  • a CSR it is determined whether a CSR is required to complete the transaction. Again, depending on the type of transaction, the amount of the transaction, the originating location of the transaction, the destination of the transaction, and/or other criteria, a CSR may be required to complete the transaction.
  • the CSR is contacted and the CSR obtains the necessary information from either the attendant or the customer.
  • the transaction is processed.
  • Information collected from the customer may be saved into a transaction record at any point in the process described above, even if the transaction is not completed. In fact, if a customer aborts a transaction upon being asked to provide additional information, this may be an indication that the transaction relates to fraudulent or illegal activity. Thus, even incomplete transaction records are saved for further evaluation according to embodiments of the present invention. It may also be the case that the transaction warrants or requires the completion of a suspicious activity report that then may be transmitted to security and/or law enforcement authorities. Such reports and processes for creating them are more fully described in previously incorporated U.S. Patent Application No. 60/465,967.
  • transaction information from various transaction records are evaluated and compared. By doing so, providers are able to identify potentially related transactions.
  • the transactions may be related because they involve the same sender, the same recipient, the same origin and destination, and/or the like.
  • the comparisons may be accomplished by comparing transaction information, including identification information relating to the sender, such as the sender's name and address, identification numbers, biometric information, and/or the like. If transactions are found to be related, it may be determined that the transactions were specifically crafted by the sender to attempt to avoid detection, which may be an indication of illegal or fraudulent activity. Thus, upon detection of such related transactions according to the present invention, providers may alert appropriate authorities.
  • the host computer system may send an alert to the location where the transaction originated, either through the transaction device or otherwise, that a suspicious activity report needs to be processes. This alert may be in real time or may be delayed. In some cases, the host computer system may retain the transaction information for further comparisons. In some examples, the host computer system may send a message via the transaction processing device that the customer needs to contact the provider to complete the transaction. In still other examples, the host computer system may alert the attendant to contact the provider with a transaction number that the host computer supplies via the transaction device. Thus, while the customer is still at the location, the attendant can answer questions from the provider relating to the transaction and the identity of the customer. In any of the aforementioned examples, the transaction may be denied or suspended until other steps are taken, such as verification of the sending party's identity.
  • Identification information relating to parties to transactions also may be saved for comparison to future transactions and/or may be compared to lists of suspect individuals provided by authorities. Lists of suspect individuals, may be maintained locally at transaction devices or on servers or computing devices at associate locations. Alternatively, these databases may be located at a host computer system. In either case, the lists may be updates periodically, as needed. Block 218 also includes these types of comparisons.

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

A computerized method of verifying the identity of an attendant operating a money transfer transaction device includes receiving at the money transfer transaction device a user identification and password from the attendant and receiving at the money transfer transaction device additional information from the attendant. The additional information relates to a security feature that limits access to the transaction device. The method also includes using the additional information, the user identification, and the password to evaluate whether to allow the attendant to operate the transaction device to process a transaction.

Description

    CROSS-REFERENCES TO RELATED APPLICATIONS
  • This application is a continuation of U.S. application Ser. No. 13/752,409, filed Jan. 29, 2013, and entitled “SYSTEMS AND METHODS FOR VERIFYING IDENTITIES IN TRANSACTIONS,” which is a continuation of U.S. application Ser. No. 10/977,505, filed on Oct. 29, 2004, issued as U.S. Pat. No. 8,386,393, and entitled “SYSTEMS AND METHODS FOR VERIFYING IDENTITIES IN TRANSACTIONS”, which is a divisional application of U.S. application Ser. No. 10/424,558 filed on Apr. 25, 2003, now abandoned, and entitled “SYSTEMS AND METHODS FOR VERIFYING IDENTITIES IN TRANSACTIONS.” The entire disclosures of the above applications are incorporated herein by reference for all purposes.
  • BACKGROUND OF THE INVENTION
  • The present invention relates generally to money transfer transactions. More specifically, the present invention relates to verifying the identity of persons involved in money transfers.
  • Many people use the services of money transfer service providers to send funds to other people. Electronic communication and banking networks now allow such transactions to have early global reach. Unfortunately, some people use the services of money transfer service providers to transfer money for illegal or unethical purposes. For this and other reasons, it is desirable to provide systems and methods for confirming the identities of persons involved in money transfers. It is also desirable to provide systems and methods that identify money transfer transactions that may be related to one another.
  • BRIEF SUMMARY OF THE INVENTION
  • Embodiments of the present invention thus provide a computerized method of verifying the identity of an attendant operating a money transfer transaction device. The method includes receiving at the money transfer transaction device a user identification and password from the attendant and receiving at the money transfer transaction device additional information from the attendant. The additional information relates to a security feature that limits access to the transaction device. The method also includes using the additional information, the user identification, and the password to evaluate whether to allow the attendant to operate the transaction device to process a transaction.
  • In some embodiments, the step of using the additional information, the user identification, and the password to evaluate whether to allow the attendant to operate the transaction device to process a transaction may include sending the additional information, the user identification, and the password to a host computer system and, at the host computer system, comparing the additional information to stored information. The step of using the additional information, the user identification, and the password to evaluate whether to allow the attendant to operate the transaction device to process a transaction may occur at the money transfer transaction device. The step of receiving additional information may include displaying a stored attendant name together with a question asking the attendant if the stored attendant name is the name of the attendant and receiving a response to the question from the attendant. The step of receiving additional information may include receiving information from an identification tool of the attendant. The identification tool may be a card encoded with machine-readable information. The card may be selected from a group consisting of proximity card, smart card, identification card, and card having a magnetic stripe. The identification tool may include a tool that generates a code, in which case the step of receiving additional information may include receiving the code from the attendant and the step of using the additional information, the user identification, and the password to evaluate whether to allow the attendant to operate the transaction device to process a transaction may include generating a verification code and comparing the verification code to the code. Receiving additional information may include receiving a biometric feature of the attendant. The biometric feature may be selected from a group consisting of DNA, fingerprint, retinal image, voice print, and facial image. Receiving additional information may include receiving a biometric image from an identification card relating to the attendant. The identification card may be selected from a group consisting of driver's license, passport, picture identification card, biometric card, and government-issued identification card. The method also may include limiting the attendant's access based on information specific to a transaction being processed by the attendant.
  • In another embodiment, a method of obtaining identification information from an individual involved in a transaction includes entering transaction-related information into a transaction processing device. The transaction information includes information relating to the identity of the individual. The method also includes receiving a prompt via the transaction processing device to enter identification information and entering identification information. The identification information may verify the information relating to the identity of the individual. The method also includes processing the transaction. The method may include storing at least a portion of the transaction-related information and at least a portion of the identification information in a transaction record as transaction information. The method also may include comparing the transaction information to information obtained from a credit reporting agency. The method also may include comparing the transaction information to information obtained from an identification information company. The method also may include comparing the transaction information to similar information in other transaction records. The method also may include comparing the transaction information to information in a list provided by law enforcement authorities. The step of processing the transaction may include aborting the transaction. The identification information may include a biometric feature of the sender. The transaction-related information may include information relating to a receiver in the financial transaction. The identification information may be entered by inputting information into the transaction processing device. The identification information may be entered by inputting information into a peripheral device associated with the transaction processing device. The identification information may include a security code obtained from an identification tool. The method also may include comparing the security code to a verification code generated by the transaction processing device.
  • In still other embodiments, a system for obtaining identification information from an operator of a transaction processing device includes a host computer system and a transaction processing device. The transaction processing device is programmed to receive a user identification and password from the operator and receive additional information from the operator. The additional information may relate to a security feature that limits access to the transaction device. The transaction processing device also is programmed to transmit at least a portion of the information to the host computer system. The host computer system is programmed to use the additional information, the user identification, and the password to evaluate whether to allow the operator to operate the transaction device to process a transaction.
  • In yet another embodiment, a system for obtaining identification information from a party to a transaction includes a host computer system and a transaction processing device. The transaction processing device is programmed to receive transaction-related information, including information relating to the identity of the party. The transaction processing device also is programmed to receive identification information from the party. The identification information may relate to a biometric feature of the party. The transaction processing device also is programmed to transmit at least a portion of the information to a host computer system. The host computer system may be programmed to store the transaction-related information and the identification information as transaction information and compare the transaction information to similar information relating to other transactions. The host computer system also may be programmed to compare the transaction information to information in a list provided by law enforcement authorities.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • A further understanding of the nature and advantages of the present invention may be realized by reference to the remaining portions of the specification and the drawings wherein like reference numerals are used throughout the several drawings to refer to similar components.
  • FIG. 1 illustrates a system for processing money transfers according to embodiments of the present invention.
  • FIG. 2 illustrates a method of verifying identities and identifying related transactions according to the present invention.
  • DETAILED DESCRIPTION OF THE INVENTION
  • According to the present invention, money transfer service providers employ systems and methods to identify individuals involved in money transfer transactions and/or to relate transactions that otherwise appear unrelated. Herein, “provider” or “service provider” will refer to a money transfer service provider. For example, “provider” may refer to an entity such as Western Union of Englewood, Colo., whose money transfer service is well known. Additionally, “associate” will refer to entities that a money transfer service provider may enlist to accomplish the service. For example, third parties, such as merchants, financial institutions, and the like may be “associates.” Herein “attendant” will refer to someone with whom a customer interacts in the transaction process. For example, an attendant may be an employee of a provider or associate. An attendant typically operates a transaction processing device, entering information received from the customer and/or related to a transaction. Further, although the phrase “money transfer” will be used herein to refer to the type of service provided, that phrase will be understood to mean any financial transaction involving “value,” which may include money, credits, customer loyalty points, other units of measure, and the like.
  • Although the present invention will be described primarily in the context of money transfers, other types of transactions also may benefit from the teachings herein. Thus, transactions to which the present invention applies may include money order purchases and/or redemptions, traveler's check purchases and/or redemptions, sending money to a recipient, receiving money from a sender, and the like.
  • The process of “wiring” money is well known. Briefly, a sender presents himself to a service provider or associate and provides value, usually cash, to an attendant. Some service providers now even allow senders to transfer money by logging on to a web site and initiating money transfers using credit cards or other accounts. In either case, information is entered into a record that is received at a host computer system. The record includes information that identifies the sender, the recipient, and the amount of money being transferred, among other things. The recipient then presents himself to a receive site of a provider or associate to obtain the money or other value. An attendant at the receive site verifies the identity of the receiver and gives the receiver the value.
  • At the sending end of the transaction, the transaction information may be collected in any number of ways. In some cases, the information is collected by a point-of-sale device specifically designed for money transfer transactions. The device may be operated by an attendant employed by the provider or an associate. In another case, the information may be collected using a computing device running application software specifically designed for money transfer transactions. In yet another case, the information may be collected by phone when an attendant contacts a customer service representative (CSR) of the provider. The attendant is able to verify the sender's information and collect funds while the CSR enters the information into a transaction record. It also may be the case that the transaction is initiated by an associate who then must contact a CSR because the transaction exceeds certain thresholds. In yet another example, the customer provides some information to a CSR at a remote location while also entering some information into a transaction processing device by, for example, “swiping” a card through a reader on the device. Other examples are possible.
  • For a number of reasons, identity verification is a significant aspect to the money transfer process. For example, in one instance, it is important to verify the identity of the sender. In an attempt to thwart illegal or unethical money transfers, it is helpful to confirm the identity of a sender, especially on transfers over certain value thresholds. Transfers over the thresholds may require the provider to obtain additional information from the sender. In some cases, the information may be compared to a list of known or suspected criminals. If a sender is a known criminal, identifying transactions initiated by the individual may provide security and law enforcement personnel assistance in stopping criminal activity such as money laundering, criminal activity funding, and tax evasion. Further, some individuals may attempt to avoid detection by segmenting a single money transfer into multiple smaller transfers below the thresholds. Thus, providers may employ measures described herein to relate transactions that might otherwise appear unrelated.
  • In another instance, it is important to verify the identity of persons performing the transaction, particularly attendants employed by a provider or an associate. The equipment used in money transfer transactions may be subject to misuse to perform illegal transactions. For this reason, it is important to verify the identity of those using the equipment.
  • For the foregoing reasons, the present invention provides systems and methods to identify potentially related transactions and to verify the identities of those involved in money transfer transactions, both as sending parties, receiving parties, and as transaction device operators (e.g., attendants).
  • Attention is directed to FIG. 1, which illustrates a money transfer system 100 according to embodiments of the present invention. The system 100 includes a host computer system 102 and a network 104. The host computer system 102 may include, for example, server computers, personal computers, workstations, web servers, and/or other suitable computing devices. The host computer system 102 includes application software that programs the host computer system 102 to perform one or more functions according to the present invention. For example, application software resident on the host computer system 102 may program the host computer system 102 to process money transfer records according to embodiments of the present invention. The host computer system 102 may include one or more of the aforementioned computing devices, as well as storage devices such as databases, disk drives, optical drives, and the like. The storage devices may include solid state memory, such as RAM, ROM, PROM, and the like, magnetic memory, such as disc drives, tape storage, and the like, and/or optical memory, such as DVD. The host computer system 102 may be fully located within a single facility or distributed geographically, in which case a network may be used to integrate the host computer system 102. Many other examples are possible and apparent to those skilled in the art in light of this disclosure.
  • The network 104 may be the Internet, an intranet, a wide area network (WAN), a local area network (LAN), a virtual private network, any combination of the foregoing, or the like. The network 104 may include both wired and wireless connections, including optical links. In some embodiments, the network 104 is a transaction processing network. Through the network 104, transaction devices communicate with the host computer system 102.
  • The system 100 also includes one or more Point-of-Sale (POS) devices 106. POS devices are more fully described in U.S. patent application Ser. No. 09/634,901, filed on Aug. 8, 2000, the entire disclosure of which is incorporated herein by reference for all purposes. Essentially, POS devices are terminals for receiving transaction information and sending the information to a host computer system. For example, a POS may receive transaction information by capturing it from a card using a reader integral to or associated with the POS. A POS also may receive information from an attendant or customer via a keypad, keyboard, and/or other input device. Other examples are possible. POS devices are typically located at associate or provider locations offering money transfer services.
  • The system 100 also may include one or more computing devices 108 programmed to receive money transfer information from customers or attendants. Like the POS devices 106, the computing devices I 08 may be located at associate locations.
  • The system also may include one or more Customer Service Representative (CSR) computers 110. The CSR computers 110 may be located, for example, at a call center operated by the service provider or an associate. The CSR computers 110 function much like the POS devices I 06 and the computing devices I 08, except that transaction information is entered by a CSR who is receiving the information from a customer by phone, for example. In some examples, a voice response unit may receive some or all of the information.
  • The system 100 also includes one or more receiving sites 112 from which customers may receive funds. The receive sites 112 may be associate locations equipped with a POS 106 or computing device 108. The receive sites also may be automated teller machines, kiosks (which are more fully described in U.S. patent application Ser. No. 10/225,410, filed on Aug. 20, 2002, the entire disclosure of which is incorporated herein by reference for all purposes), merchant store fronts, bank accounts, stored value accounts, and/or the like.
  • According to the present invention, a customer presents himself to a money transfer location. The location may be equipped with either a POS device 106, a computing device 108, or other suitable transaction device. The location may be operated by the provider or an associate. An attendant receives information from the customer and verifies it according to embodiments of the present invention. The attendant also enters the information into the transaction device. In the process, the attendant may need to enter his own identification information to enable the device. If necessary, the attendant contacts a CSR to complete the transaction. The attendant also collects the money from the customer.
  • Once entered into a record, the transaction information may be compared with information in other transaction records to attempt to identify potentially related transactions. Identity information collected in the course of identifying the sender may be used for this purpose. If potentially related transactions are identified, they may be flagged for increased scrutiny.
  • One specific scenario relating to tracking transactions deserves more detailed explanation. In this scenario, a customer initiates a transaction by providing an attendant with transaction information. The attendant enters the information into a transaction device, as previously described. When the attendant attempts to complete the transaction, a message alerts the attendant that the transaction must be completed by a CSR. This may be because the transaction exceeds certain thresholds or otherwise triggers a flag. Thus, the attendant contacts a CSR who also collects the transaction information from the customer and who may ask the customer for additional information. If at any time the customer elects to abort the transaction, any information collected up to that point may be stored for future use. The theory being that the customer may, in the future, attempt to avoid the flag that triggered the need for the additional information. For example, the customer may attempt to initiate several smaller transfers from different money transfer locations to avoid a trigger based on the amount of the transaction. By storing the unprocessed transaction record, the provider may search other transactions for similar information and identify any found as being potentially related to the aborted transaction.
  • Having described a system according to the present invention, the remainder of this description will focus on methods for verifying the identity of persons operating money transfer equipment and the identity of those sending money.
  • Confirmation of Identity of Persons Performing a Transaction (e.g., Associate Personnel)
  • The identities of persons operating transaction devices (i.e., attendants) may be confirmed in a number of ways. In a first example, the attendant may be required to use an identification tool that may be supplied by the provider. The identification tool either supplies information that the attendant enters into the transaction device, or the identification tool itself may be swiped or otherwise interfaced to the transaction device. This may be combined with entering a user ID and password, in some examples. In a basic example, the attendant swipes a card with a magnetic stripe through a reader on the transaction device or associated with it. The stripe may include the attendant's user ID and password or other information known only to the user. The transaction device then may prompt the attendant to enter a user ID followed by a password. If the information is not consistent, is not recognized, or does not match information on record (e.g., stored at a host computer system), the attendant may be denied access to the device. Of course, the steps of swiping a card, entering a user ID, and entering-a password may be carried out in other orders than described above.
  • It is not necessary that the identification tool be a card with a magnetic stripe supplied by the provider. In other examples, the tool may be any card used by the attendant that the attendant elects to use as his identification card for this purpose. During an enrollment process, the attendant elects the card he will use, and his user ID and password are associated with information read from the card. The information is then saved in an access file at either the host computer system or the transaction device for later comparison to information entered by the attendant at the time access is requested. For example, the card may be one of the attendant's credit cards, his driver's license, passport, or the like. In other examples, the identification tool may be a card with other magnetic encoding properties, such as a proximity card (i.e., a card or other device that transfers information when held in proximity to a reader), or it may be a card with a barcode, a smart card, or the like. In still other examples, the tool is not a card but is a biometric feature of the attendant such as his fingerprint, retinal image, facial features, voice print, DNA, or the like. In yet another example, the tool itself generates information that is either displayed to the attendant or entered into the transaction device. The information may be unique each time the attendant attempts to access the device. The information may be generated by an algorithm and compared to information generated at the host computer system or the transaction device using the same algorithm. If the information does not match, then the attendant is denied access.
  • The identity verification process may be preceded by a registration process wherein information about an attendant is verified, biometric information is obtained, identification cards are selected, and/or the like. For example, during registration, the provider may verify that the attendant actually works for an associate who has authorized the attendant to process transactions. In some examples, a background check is performed on the attendant that may include residence and citizenship verification, criminal background checks, credit verification, and the like. The registration information may then be saved for later use during identity verification associated with a transaction. In some examples, registration includes establishing an attendant's certification level, as will be described further below.
  • In order to make the process less cumbersome, attendants may be required to provide the information periodically, instead of every day or every transaction. For example, an attendant may be “audited” only once a week, after a particular number of transactions, upon demand by the provider, and/or after a particular dollar volume of transactions. In the case of audits performed on demand, the audit may be on all attendants in a state, all attendants in an associate's network, all attendants at a particular location, or on only selected attendants. In the case of audits performed periodically, an attendant may be required to provide the audit information only after a timeout between transactions or a series of transactions. Audits may be location specific and may be controlled (i.e., called for) by the provider, an associate, or other entity. The audit may be prompted by either the transaction device or the host computer system. In response to an audit prompt, an attendant may be required to provide any of the identifying information explained above. In some examples, the audit may simply be a question displayed to the attendant asking, “Are you John Doe?” wherein “John Doe” may be a name stored in an access file and related to the user ID and/or password entered by the attendant. Other such examples are possible.
  • In some examples, the identification tools may enable user-level privileges. For example, if an associate issues its employees ID cards, those ID cards may function as an identification tool. However, the associate of the provider may specify the level of access allowed each individual user. Some users may not have access. Others may have access only during certain times of the day or for only transactions below certain value thresholds. The thresholds may be cumulative during a period of time, such as a shift, a day, a week, a pay period, or the like. Some users may be allowed to process only certain types of transactions.
  • Identification systems also may be combined with certification training to restrict access to attendants based on their level of training. Training may be accomplished in a number of well known ways, and access files relating to each attendant may be updated as an attendant receives additional training. In some embodiments, the certification levels may be established so as to mirror regulatory training and certification requirements. Thus, systems such as the present invention may be used to demonstrate compliance with the regulations.
  • The verification of attendant information may take place at the host computer system level or at the transaction device level. If at the host level, individual attendant information may be associated with a particular transaction device or devices. Thus, when the device transmits the identification information to the host, it also transmits its own identification information. If the attendant is not authorized to use the device, the attendant is denied access. In another example, the transaction device itself performs the identification verification process. This reduces the amount of information that must be transmitted back to the host computer.
  • In yet another example, the attendant may be asked to enter his full name and/or an answer to a secret question using an alphanumeric keyboard or a number pad associated with the transaction device. This may be used in combination with a user ID and/or password.
  • In another example, the attendant's facial biometric may be imaged at the time the attendant registers. The facial biometric may be obtained from the attendant directly or from a document of the attendant, such as a driver's license or passport. The image is then saved 30 in an access file at the host or at the transaction device. When the attendant attempts to execute a transaction, the transaction device may obtain another image of the attendant's facial biometric, either from the attendant directly or from his identification document. The new image is compared to the image taken during enrollment, and, if dissimilar, the attendant is asked for additional information or is denied access to the transaction device. In some embodiments, the image comparison may be done automatically using a software algorithm or the like. In other examples, the comparison may be accomplished manually by an individual. A similar process may be employed that uses the attendant's voice pattern as the biometric. A verification voice sample may be obtained during registration and stored for comparison to a sample obtained during a transaction. A microphone associated with a transaction device may receive a voice sample from the attendant during a transaction and compare the two. Methods for digitizing and comparing voice samples are known.
  • Another method for limiting access to transaction devices would be through the use of location-specific cards. In a manner similar to the use of other identification cards, each attendant could be issued a card specific to transaction devices at the location at which the attendant works. The card may be configured using, for example, position determination features, such that the card only works inside the facility. Transaction devices may be similarly enabled to only function at a specified location. In another example, the transaction devices may require the entry of a location-specific identification number or character string upon startup. Thus, if the device is stolen, the number must be entered before the device will operate.
  • Confirmation of Identity of a Party to a Transaction
  • Customers desiring to perform transactions may be identified in a number of ways, and the type of identification information collected may be triggered by specifics of the transaction. For example, different identification information may be collected depending on the type of transaction, the number and value of transactions originating from the same sender, even if from different locations or providers, the value of the transaction, the origin location of the transaction, the destination of the transaction, the customer's history of transactions using the provider, the number and value of transactions sent to the same receiving party, and the like. Identification information may include biometric information, such as the customer's fingerprint, retinal image, facial features, voice print, DNA, or the like. The transaction device also may scan a picture identification of the customer, such as the customer's driver's license or passport photo. The biometric or photo identification information may be stored at the host computer system for comparison to future transactions and/or compared to national or international databases of suspect individuals.
  • In another example, identification information supplied by the customer may be compared to identification information relating to the customer from a credit reporting agency or other entity that provides identify information. If the information is not consistent, the transaction may be denied or additional information may be required from the customer.
  • Attention is now directed to FIG. 2, which illustrates a method 200 of verifying identities and identifying related transactions according to embodiments of the present invention. The method may be implemented in the system 100 of FIG. 1 or other suitable system. At block 202, an attendant logs into the transaction device. The transaction device may be a POS, a computing device, or other suitable transaction device, as previously described. Logging on to the device may involve merely powering up the device. However, logging on also may involve entering a location identification number, entering a user ID and/or password, answering a secret question, entering biometric information, swiping a card, using a proximity card, and the like, all of which procedures were explained previously.
  • At block 204, any information entered by the attendant is verified, either by the transaction device itself or by sending information to a host computer system. If the information is accepted, the attendant is granted access to the transaction device. It may be the case, that the host computer system or the transaction device itself determines that an audit of the attendant is necessary, in which case the attendant is asked to provide additional information as previously described.
  • At block 206, the transaction device may be verified. For instance, the transaction device itself or the host computer system may verify that the transaction device is operating properly and from an authorized location. This may include determining that the device is connected to an authorized network or that the device's physical location is within an allowed range using a positioning system or the like.
  • At block 208, the attendant collects transaction information from a customer. This may include the customer's name and address, the amount of money involved in the transaction, the recipient's name and address, and the like. This operation also may involve obtaining biometric information from the customer. In some examples, some or all of the information may be provided by the customer via a phone call to a CSR. Thus, a partial transaction record may exist for a transaction when the customer presents himself to the provider or associate location.
  • At block 210, the attendant's authorization to process the transaction is verified. This may involve verifying the attendant's level of training, the attendant's level of authorization, the attendant's identification information, and/or the like. If not previously obtained or if sufficient time has passed, this operation may involve collecting identification information from the attendant, including biometric information, as necessary. If the attendant is not authorized to process the transaction, then a different attendant or a CSR may be required to complete the transaction.
  • At block 212, it is determined whether additional information is needed from the customer and the information is collected. Depending on the location from which the transaction originates, the purpose or type of transaction, the destination to which the transaction is directed, the amount of the transaction, and/or other criteria, additional information may be required from the customer. The additional information may include the customer's date of birth, social security number and/or tax identification number, occupation, the type of identification the customer has presented to verify his identity, the place the identification was issued, and/or the like. The additional information also may include biometric information as previously described.
  • At block 214, it is determined whether a CSR is required to complete the transaction. Again, depending on the type of transaction, the amount of the transaction, the originating location of the transaction, the destination of the transaction, and/or other criteria, a CSR may be required to complete the transaction.
  • At block 216, the CSR is contacted and the CSR obtains the necessary information from either the attendant or the customer. At block 218, the transaction is processed.
  • Information collected from the customer may be saved into a transaction record at any point in the process described above, even if the transaction is not completed. In fact, if a customer aborts a transaction upon being asked to provide additional information, this may be an indication that the transaction relates to fraudulent or illegal activity. Thus, even incomplete transaction records are saved for further evaluation according to embodiments of the present invention. It may also be the case that the transaction warrants or requires the completion of a suspicious activity report that then may be transmitted to security and/or law enforcement authorities. Such reports and processes for creating them are more fully described in previously incorporated U.S. Patent Application No. 60/465,967.
  • At block 218, transaction information from various transaction records are evaluated and compared. By doing so, providers are able to identify potentially related transactions. The transactions may be related because they involve the same sender, the same recipient, the same origin and destination, and/or the like. The comparisons may be accomplished by comparing transaction information, including identification information relating to the sender, such as the sender's name and address, identification numbers, biometric information, and/or the like. If transactions are found to be related, it may be determined that the transactions were specifically crafted by the sender to attempt to avoid detection, which may be an indication of illegal or fraudulent activity. Thus, upon detection of such related transactions according to the present invention, providers may alert appropriate authorities.
  • Upon detection of information that warrants further investigation, a number of things may happen. For example, the host computer system may send an alert to the location where the transaction originated, either through the transaction device or otherwise, that a suspicious activity report needs to be processes. This alert may be in real time or may be delayed. In some cases, the host computer system may retain the transaction information for further comparisons. In some examples, the host computer system may send a message via the transaction processing device that the customer needs to contact the provider to complete the transaction. In still other examples, the host computer system may alert the attendant to contact the provider with a transaction number that the host computer supplies via the transaction device. Thus, while the customer is still at the location, the attendant can answer questions from the provider relating to the transaction and the identity of the customer. In any of the aforementioned examples, the transaction may be denied or suspended until other steps are taken, such as verification of the sending party's identity.
  • Identification information relating to parties to transactions also may be saved for comparison to future transactions and/or may be compared to lists of suspect individuals provided by authorities. Lists of suspect individuals, may be maintained locally at transaction devices or on servers or computing devices at associate locations. Alternatively, these databases may be located at a host computer system. In either case, the lists may be updates periodically, as needed. Block 218 also includes these types of comparisons.
  • Having described several embodiments, it will be recognized by those of skill in the art that various modifications, alternative constructions, and equivalents may be used without departing from the spirit of the invention. Additionally, a number of well known processes and elements have not been described in order to avoid unnecessarily obscuring the present invention. For example, those skilled in the art know how to arrange computers into a network and enable communication among the computers. Additionally, those skilled in the art will realize that the present invention is not limited to wire transfer transaction. For example, the present invention may be used to verify identities in other transactions, such as money order purchases, value card redemptions, other exchanges, or value, and the like. Accordingly, the above description should not be taken as limiting the scope of the invention, which is defined in the following claims.

Claims (20)

What is claimed is:
1. A method of obtaining identification information from an individual involved in a transaction, the method comprising:
receiving, from a transaction processing device, identification information associated with the individual;
comparing the received identification information with previously stored identification information to authenticate the received identification information;
transmitting, to the transaction processing device, an authentication message indicating authentication of the received identification information;
receiving, from the transaction processing device, transaction information associated with the individual;
retrieving, based at least in part on the received identification information, other related transaction information of previous transactions;
determining, that the received transaction information triggers a flag for exceeding a threshold amount based at least in part on the other related transaction information;
in response to determining that the received transaction information triggers the flag, outputting, to the transaction processing device, a message indicating a need for additional information for completing the transaction;
receiving, from the transaction processing device, the additional information;
authorizing the transaction based at least in part on a positive authentication of the additional information; and
processing the transaction based at least in part on the positive authentication.
2. The method of claim 1, wherein the previously stored identification information comprises information relating to the identity of the individual to information obtained from a credit reporting agency.
3. The method of claim 1, wherein the previously stored identification information comprises information relating to the identity of the individual with information obtained from an identification information company.
4. The method of claim 1, wherein the previously stored identification information comprises information relating to the identity of the individual with information in a list provided by law enforcement authorities.
5. The method of claim 1, wherein the received identification information comprises a username or password.
6. The method of claim 1, wherein the received identification information comprises a code generated by a physical device.
7. The method of claim 1, wherein the received identification information comprises a code that is generated by a physical device associated with the individual and transmitted by the transaction processing device.
8. The method of claim 1, wherein the received identification comprises a code generated by a physical device and the additional information comprises biometric information.
9. A non-transitory computer-readable storage medium having stored thereon instructions for causing at least one computer system to obtain identification information from an individual involved in a transaction, the instructions comprising:
receiving, from a transaction processing device, identification information associated with the individual;
comparing the received identification information with previously stored identification information to authenticate the received identification information;
transmitting, to the transaction processing device, an authentication message indicating authentication of the received identification information;
receiving, from the transaction processing device, transaction information associated with the individual;
retrieving, based at least in part on the received identification information, other related transaction information of previous transactions;
determining, that the received transaction information triggers a flag for exceeding a threshold amount based at least in part on the other related transaction information;
in response to determining that the received transaction information triggers the flag, outputting, to the transaction processing device, a message indicating a need for additional information for completing the transaction;
receiving, from the transaction processing device, the additional information;
authorizing the transaction based at least in part on a positive authentication of the additional information; and
processing the transaction based at least in part on the positive authentication.
10. The non-transitory computer-readable storage medium of claim 9, wherein the previously stored identification information comprises information relating to the identity of the individual to information obtained from a credit reporting agency.
11. The non-transitory computer-readable storage medium of claim 9, wherein the previously stored identification information comprises information relating to the identity of the individual with information obtained from an identification information company.
12. The non-transitory computer-readable storage medium of claim 9, wherein the previously stored identification information comprises information relating to the identity of the individual with information in a list provided by law enforcement authorities.
13. The non-transitory computer-readable storage medium of claim 9, wherein the received identification information comprises a username or password.
14. The non-transitory computer-readable storage medium of claim 9, wherein the received identification information comprises a code generated by a physical device.
15. The non-transitory computer-readable storage medium of claim 9, wherein the received identification information comprises a code that is generated by a physical device associated with the individual and transmitted by the transaction processing device.
16. The non-transitory computer-readable storage medium of claim 9, wherein the received identification comprises a code generated by a physical device and the additional information comprises biometric information.
17. A system for obtaining identification information from an individual involved in a transaction, comprising:
one or more processors; and
a memory coupled with the one or more processors, the memory configured to store instructions that when executed by the one or more processors cause the one or more processors to:
receive, from a transaction processing device, identification information associated with the individual;
compare the received identification information with previously stored identification information to authenticate the received identification information;
transmit, to the transaction processing device, an authentication message indicating authentication of the received identification information;
receive, from the transaction processing device, transaction information associated with the individual;
retrieve, based at least in part on the received identification information, other related transaction information of previous transactions;
determine, that the received transaction information triggers a flag for exceeding a threshold amount based at least in part on the other related transaction information;
in response to determining that the received transaction information triggers the flag, output, to the transaction processing device, a message indicating a need for additional information for completing the transaction;
receive, from the transaction processing device, the additional information;
authorize the transaction based at least in part on a positive authentication of the additional information; and
process the transaction based at least in part on the positive authentication.
18. The system of claim 17, wherein the previously stored identification information comprises information relating to the identity of the individual to information obtained from a credit reporting agency.
19. The system of claim 17, wherein the previously stored identification information comprises information relating to the identity of the individual with information obtained from an identification information company.
20. The system of claim 17, wherein the previously stored identification information comprises information relating to the identity of the individual with information in a list provided by law enforcement authorities.
US16/458,910 2003-04-25 2019-07-01 Systems and methods for verifying identities in transactions Abandoned US20190325439A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/458,910 US20190325439A1 (en) 2003-04-25 2019-07-01 Systems and methods for verifying identities in transactions

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US10/424,558 US20040215574A1 (en) 2003-04-25 2003-04-25 Systems and methods for verifying identities in transactions
US10/977,505 US8386393B2 (en) 2003-04-25 2004-10-29 Systems and methods for verifying identities in transactions
US13/752,409 US10402824B2 (en) 2003-04-25 2013-01-29 Systems and methods for verifying identities in transactions
US16/458,910 US20190325439A1 (en) 2003-04-25 2019-07-01 Systems and methods for verifying identities in transactions

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US13/752,409 Continuation US10402824B2 (en) 2003-04-25 2013-01-29 Systems and methods for verifying identities in transactions

Publications (1)

Publication Number Publication Date
US20190325439A1 true US20190325439A1 (en) 2019-10-24

Family

ID=33299389

Family Applications (4)

Application Number Title Priority Date Filing Date
US10/424,558 Abandoned US20040215574A1 (en) 2003-04-25 2003-04-25 Systems and methods for verifying identities in transactions
US10/977,505 Active 2028-05-16 US8386393B2 (en) 2003-04-25 2004-10-29 Systems and methods for verifying identities in transactions
US13/752,409 Expired - Fee Related US10402824B2 (en) 2003-04-25 2013-01-29 Systems and methods for verifying identities in transactions
US16/458,910 Abandoned US20190325439A1 (en) 2003-04-25 2019-07-01 Systems and methods for verifying identities in transactions

Family Applications Before (3)

Application Number Title Priority Date Filing Date
US10/424,558 Abandoned US20040215574A1 (en) 2003-04-25 2003-04-25 Systems and methods for verifying identities in transactions
US10/977,505 Active 2028-05-16 US8386393B2 (en) 2003-04-25 2004-10-29 Systems and methods for verifying identities in transactions
US13/752,409 Expired - Fee Related US10402824B2 (en) 2003-04-25 2013-01-29 Systems and methods for verifying identities in transactions

Country Status (6)

Country Link
US (4) US20040215574A1 (en)
EP (1) EP1623304A4 (en)
CN (1) CN1795464A (en)
CA (1) CA2523584A1 (en)
MX (1) MXPA05011481A (en)
WO (1) WO2004097598A2 (en)

Families Citing this family (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6131811A (en) 1998-05-29 2000-10-17 E-Micro Corporation Wallet consolidator
US20040215574A1 (en) 2003-04-25 2004-10-28 First Data Corporation Systems and methods for verifying identities in transactions
CN101073219A (en) * 2003-09-12 2007-11-14 Rsa安全公司 System and method for risk based authentication
US20050102210A1 (en) * 2003-10-02 2005-05-12 Yuh-Shen Song United crimes elimination network
WO2005091145A1 (en) * 2004-03-18 2005-09-29 Sean Hokland Authenticated and distributed transaction processing
US8781975B2 (en) * 2004-05-21 2014-07-15 Emc Corporation System and method of fraud reduction
US7318550B2 (en) * 2004-07-01 2008-01-15 American Express Travel Related Services Company, Inc. Biometric safeguard method for use with a smartcard
US20110029428A1 (en) * 2004-08-30 2011-02-03 Yuh-Shen Song Mobile Remittance Network
US20100044430A1 (en) * 2005-01-03 2010-02-25 Yuh-Shen Song Automated Remittance Network
US20060149656A1 (en) * 2005-01-04 2006-07-06 International Business Machines Corporation System and method for conducting auctions of product sets
US7805369B2 (en) * 2005-03-10 2010-09-28 Yuh-Shen Song Anti-financial crimes business network
US20080021801A1 (en) * 2005-05-31 2008-01-24 Yuh-Shen Song Dynamic multidimensional risk-weighted suspicious activities detector
US8345931B2 (en) 2006-02-10 2013-01-01 The Western Union Company Biometric based authorization systems for electronic fund transfers
US7669758B2 (en) 2006-04-04 2010-03-02 American Express Travel Related Services Company, Inc. Obtaining transaction accounts using identification cards
US7620596B2 (en) 2007-06-01 2009-11-17 The Western Union Company Systems and methods for evaluating financial transaction risk
US7865439B2 (en) * 2007-10-24 2011-01-04 The Western Union Company Systems and methods for verifying identities
US8712888B2 (en) * 2007-12-28 2014-04-29 Mastercard International Incorporated Methods and systems for assessing sales activity of a merchant
JP2009163595A (en) * 2008-01-09 2009-07-23 Sony Corp Information processing system, information processor, information processing method, and computer program
US9842204B2 (en) 2008-04-01 2017-12-12 Nudata Security Inc. Systems and methods for assessing security risk
CA2757290C (en) 2008-04-01 2020-12-15 Leap Marketing Technologies Inc. Systems and methods for implementing and tracking identification tests
US20110145152A1 (en) * 2009-12-15 2011-06-16 Mccown Steven Harvey Systems, apparatus, and methods for identity verification and funds transfer via a payment proxy system
US10453122B2 (en) 2010-08-18 2019-10-22 The Western Union Company Systems and methods for assessing fraud risk
CN101977194B (en) * 2010-10-29 2013-01-30 深圳市宇初网络技术有限公司 Third-party verification code system and third-party verification code provision method
US8988187B2 (en) * 2011-01-13 2015-03-24 Hong Kong Applied Science And Technology Research Institute Co., Ltd. Proximity based biometric identification systems and methods
CN103138921B (en) * 2011-11-22 2016-05-11 阿里巴巴集团控股有限公司 A kind of identity information verification method and system
US9524595B2 (en) * 2012-06-06 2016-12-20 Intelmate Llc System and method for identity verification in a detention environment
US9317670B2 (en) * 2012-05-22 2016-04-19 Verizon Patent And Licensing Inc Security based on usage activity associated with user device
CN102710770A (en) * 2012-06-01 2012-10-03 汪德嘉 Identification method for network access equipment and implementation system for identification method
SG10201408159TA (en) * 2014-12-06 2016-07-28 Vertical Software Asia Pte Ltd Authentication method
EP3345117B1 (en) 2015-09-05 2024-09-18 Mastercard Technologies Canada ULC Systems and methods for detecting and preventing spoofing
US20180150902A1 (en) * 2016-11-30 2018-05-31 Mastercard International Incorporated Systems and Methods for Use in Facilitating Purchase Transactions With Trusted Merchants
US10007776B1 (en) 2017-05-05 2018-06-26 Mastercard Technologies Canada ULC Systems and methods for distinguishing among human users and software robots
US10127373B1 (en) 2017-05-05 2018-11-13 Mastercard Technologies Canada ULC Systems and methods for distinguishing among human users and software robots
US9990487B1 (en) 2017-05-05 2018-06-05 Mastercard Technologies Canada ULC Systems and methods for distinguishing among human users and software robots
WO2019094071A1 (en) * 2017-11-07 2019-05-16 Visa International Service Association Biometric validation process utilizing access device and location determination
US11410153B1 (en) 2018-07-31 2022-08-09 Block, Inc. Enrolling mobile-payment customers after online transactions
US10832244B1 (en) * 2019-11-14 2020-11-10 Capital One Services, Llc Protocol to secure electronic transactions using two way handshakes
US11176557B2 (en) 2020-03-19 2021-11-16 Bank Of America Corporation Neural network host platform for generating automated suspicious activity reports using machine learning
US11818205B2 (en) 2021-03-12 2023-11-14 Bank Of America Corporation System for identity-based exposure detection in peer-to-peer platforms
JP2023045589A (en) * 2021-09-22 2023-04-03 東芝テック株式会社 Settlement device, program thereof, and settlement method

Family Cites Families (134)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3599151A (en) 1969-12-29 1971-08-10 Ibm Character recognition photosensing apparatus having a threshold comparator circuit
US3783755A (en) 1972-06-05 1974-01-08 H Lagin Apparatus for applying indicias to sheets
US3833395A (en) 1972-09-11 1974-09-03 Burroughs Corp Continuous form computer print-out document protection system
EP0076255A1 (en) 1981-04-07 1983-04-13 BENTON, William M. Transaction verification system using optical data communication link
US5021967A (en) 1984-04-03 1991-06-04 Republic Money Orders, Inc. Apparatus for dispensing money orders
US4722554A (en) 1986-08-27 1988-02-02 St. Ives Laboratories, Inc. Alternative-value paper refund form
US4758714A (en) 1986-10-06 1988-07-19 Carlson Steven R Point-of-sale mechanism
US4882475A (en) * 1986-10-31 1989-11-21 Par Microsystems, Inc. Synthesized speech-facilitated product preparation and/or delivery system and method
US4814985A (en) * 1987-03-23 1989-03-21 Irene Swistak Sales limit indicator for an electronic cash register
US4880097A (en) * 1987-04-16 1989-11-14 Pom Incorporated Park card system for electronic parking meter
US4948174A (en) 1988-04-20 1990-08-14 Remittance Technology Corporation Financial data processing system
US5119293A (en) 1988-09-16 1992-06-02 Republic Money Orders, Inc. System and apparatus for dispensing negotiable instruments
US5220501A (en) 1989-12-08 1993-06-15 Online Resources, Ltd. Method and system for remote delivery of retail banking services
US5691525A (en) 1990-08-31 1997-11-25 Matsushita Electric Industrial Co., Ltd. Data transfer system and data transfer terminal device
US5177342A (en) * 1990-11-09 1993-01-05 Visa International Service Association Transaction approval system
US5175682A (en) 1990-12-14 1992-12-29 Verifone, Inc. Check system and method including prioritizing checks for transmission to banks for processing
US5425355A (en) 1991-01-28 1995-06-20 Laserscope Energy discharging surgical probe and surgical process having distal energy application without concomitant proximal movement
US5299295A (en) 1991-03-12 1994-03-29 Balenz, Inc. Method and apparatus for electronically viewing, printing, and registering checks
US5510979A (en) * 1991-07-30 1996-04-23 Restaurant Technology, Inc. Data processing system and method for retail stores
WO1993009506A1 (en) 1991-10-30 1993-05-13 Computer Based Controls, Inc. Financial document dispensing apparatus and method
US5453601A (en) 1991-11-15 1995-09-26 Citibank, N.A. Electronic-monetary system
US5491325A (en) 1992-08-25 1996-02-13 Huang; Dorge O. Method and system for payment and payment verification
US5819226A (en) * 1992-09-08 1998-10-06 Hnc Software Inc. Fraud detection using predictive modeling
US5350906A (en) * 1992-11-25 1994-09-27 Brody Bill E Currency transfer system and method using fixed limit cards
US5426594A (en) 1993-04-02 1995-06-20 Motorola, Inc. Electronic greeting card store and communication system
US5513117A (en) 1993-04-30 1996-04-30 Small; Maynard E. Apparatus and method for electronically dispensing personalized greeting cards and gifts
US5570465A (en) 1993-07-22 1996-10-29 Tsakanikas; Peter J. Apparatus, method and system for printing of legal currency and negotiable instruments
NL9401298A (en) 1993-08-10 1995-03-01 Zwaan Print Productions B V Gift packaging for paper money
US5465206B1 (en) 1993-11-01 1998-04-21 Visa Int Service Ass Electronic bill pay system
US5774879A (en) 1993-12-27 1998-06-30 First Data Corporation Automated financial instrument processing system
US5461217A (en) 1994-02-08 1995-10-24 At&T Ipm Corp. Secure money transfer techniques using smart cards
US5799087A (en) 1994-04-28 1998-08-25 Citibank, N.A. Electronic-monetary system
US5555496A (en) 1994-05-06 1996-09-10 Mary T. Tackbary Method and apparatus for communicating with a card distribution center for management, selection, and delivery of social expression cards
US5577109A (en) 1994-06-06 1996-11-19 Call Processing, Inc. Pre-paid card system and method
US5826241A (en) 1994-09-16 1998-10-20 First Virtual Holdings Incorporated Computerized system for making payments and authenticating transactions over the internet
CN1220747A (en) 1994-09-28 1999-06-23 戈登·T·布朗 Automatic accounting system
US5909673A (en) 1994-09-29 1999-06-01 Gregory; Edward M. Method and system for creating site specific coupons at a plurality of remote locations which are controlled by a central office
US6181837B1 (en) 1994-11-18 2001-01-30 The Chase Manhattan Bank, N.A. Electronic check image storage and retrieval system
US5870723A (en) * 1994-11-28 1999-02-09 Pare, Jr.; David Ferrin Tokenless biometric transaction authorization method and system
US5679938A (en) * 1994-12-02 1997-10-21 Telecheck International, Inc. Methods and systems for interactive check authorizations
US5732136A (en) 1995-01-31 1998-03-24 Realsource Communications, Inc. Merchant specific debit card verification system
US5650604A (en) 1995-02-22 1997-07-22 Electronic Data Systems Corporation System and method for electronic transfer of funds using an automated teller machine to dispense the transferred funds
US5717868A (en) 1995-03-07 1998-02-10 Huntington Bancshares Inc. Electronic payment interchange concentrator
US5622388A (en) 1995-03-23 1997-04-22 Alcordo; Isabelo S. Postcard rank check
US5790793A (en) 1995-04-04 1998-08-04 Higley; Thomas Method and system to create, transmit, receive and process information, including an address to further information
US5677955A (en) 1995-04-07 1997-10-14 Financial Services Technology Consortium Electronic funds transfer instruments
US5546523A (en) * 1995-04-13 1996-08-13 Gatto; James G. Electronic fund transfer system
US5708422A (en) * 1995-05-31 1998-01-13 At&T Transaction authorization and alert system
US5745886A (en) 1995-06-07 1998-04-28 Citibank, N.A. Trusted agents for open distribution of electronic money
US5893080A (en) 1995-07-25 1999-04-06 Bottomline Technologies, Inc. Disbursement system and method
US6223168B1 (en) 1995-07-25 2001-04-24 Bottomline Technologies, Inc. Automatic remittance delivery system
US5699528A (en) 1995-10-31 1997-12-16 Mastercard International, Inc. System and method for bill delivery and payment over a communications network
US5757917A (en) 1995-11-01 1998-05-26 First Virtual Holdings Incorporated Computerized payment system for purchasing goods and services on the internet
US5870718A (en) 1996-02-26 1999-02-09 Spector; Donald Computer-printer terminal for producing composite greeting and gift certificate card
US5832463A (en) 1996-03-28 1998-11-03 Electronic Data Systems Corporation Automated system and method for checkless check transaction
US6044360A (en) 1996-04-16 2000-03-28 Picciallo; Michael J. Third party credit card
US5815657A (en) 1996-04-26 1998-09-29 Verifone, Inc. System, method and article of manufacture for network electronic authorization utilizing an authorization instrument
BR9709338B1 (en) 1996-05-23 2012-05-29 system and process of global service integration.
US6039245A (en) 1996-06-10 2000-03-21 Diebold, Incorporated Financial transaction processing system and method
US5971273A (en) 1996-09-25 1999-10-26 Vallaire; Milton E. Automated florist system allowing direct contact with delivering florist
US6015087A (en) 1996-10-04 2000-01-18 First Data Corporation Apparatus and method for leasing documents of value
US6029150A (en) * 1996-10-04 2000-02-22 Certco, Llc Payment and transactions in electronic commerce system
US5937396A (en) * 1996-12-04 1999-08-10 Konya; Arpad System for ATM/ATM transfers
US6193155B1 (en) 1996-12-09 2001-02-27 Walker Digital, Llc Method and apparatus for issuing and managing gift certificates
US6164528A (en) 1996-12-31 2000-12-26 Chequemark Patent, Inc. Check writing point of sale system
US6149056A (en) 1997-02-06 2000-11-21 Mr. Payroll Corporation Automatic check cashing using biometric identification verification
US6145738A (en) 1997-02-06 2000-11-14 Mr. Payroll Corporation Method and apparatus for automatic check cashing
US6070798A (en) 1997-02-21 2000-06-06 Nethery; Kee Purchaser generated transaction recording and negotiable instrument payment system
US5987439A (en) 1997-05-30 1999-11-16 Capital Security Systems, Inc. Automated banking system for making change on a card or user account
US6012048A (en) * 1997-05-30 2000-01-04 Capital Security Systems, Inc. Automated banking system for dispensing money orders, wire transfer and bill payment
US5949044A (en) 1997-06-13 1999-09-07 Walker Asset Management Limited Partnership Method and apparatus for funds and credit line transfers
US6097834A (en) 1997-06-13 2000-08-01 Paystation America Inc. Financial transaction processing systems and methods
US5896298A (en) 1997-08-08 1999-04-20 Carreker-Antinori, Inc. System and method for providing central notification of issued items
US6292789B1 (en) 1997-08-26 2001-09-18 Citibank, N.A. Method and system for bill presentment and payment
US6030000A (en) 1997-09-12 2000-02-29 Diamond Security, Inc. Negotiable document having enhanced security for deterring fraud by use of a thermochromatic fingerprint image
US6119931A (en) 1997-10-02 2000-09-19 Novogrod; John C. System and method for requesting and dispensing negotiable instruments
US5993047A (en) 1997-10-02 1999-11-30 John C. Novogrod Apparatus and method for requesting and dispensing negotiable instruments
US6422459B1 (en) 1997-10-15 2002-07-23 Citicorp Development Center, Inc. Method and system for off-line loading of stored value cards using a batch-load terminal
US6106020A (en) 1997-10-28 2000-08-22 Kerning Data Systems, Inc. Fraud prevention method and system
US6119106A (en) 1997-11-26 2000-09-12 Mersky; Randy Method and apparatus for facilitating customer payments to creditors from a remote site
KR100853494B1 (en) 1997-12-02 2008-08-22 캐시 테크졸로지 인코포레이티드 Multi-transactional network architecture
US5954194A (en) 1997-12-10 1999-09-21 Simpson; William E. Gemstone gift card with video or audio device carrier
US6098053A (en) 1998-01-28 2000-08-01 Citibank, N.A. System and method for performing an electronic financial transaction
US5953709A (en) 1998-02-19 1999-09-14 Labor Ready, Inc. Automated voucher cash-out system and method
JP2000048108A (en) 1998-03-30 2000-02-18 Citibank Na Method and system to perform electronic value exchange and settlement among heterogeneous payment schemes with heterogeneous currencies
US6064990A (en) 1998-03-31 2000-05-16 International Business Machines Corporation System for electronic notification of account activity
US6011833A (en) 1998-08-11 2000-01-04 Florafax International, Inc Talking bouquet
US7051001B1 (en) 1998-08-27 2006-05-23 Citibank, N.A. System and method for merchant function assumption of internet checking and savings account transactions
US6453300B2 (en) 1998-08-31 2002-09-17 Cd Coupon, Llc Personalized greeting card with electronic storage media and method of personalizing same
US6360254B1 (en) 1998-09-15 2002-03-19 Amazon.Com Holdings, Inc. System and method for providing secure URL-based access to private resources
US6175823B1 (en) 1998-09-15 2001-01-16 Amazon.Com, Inc. Electronic gift certificate system
US6058417A (en) 1998-10-23 2000-05-02 Ebay Inc. Information presentation and management in an online trading environment
US6473500B1 (en) 1998-10-28 2002-10-29 Mastercard International Incorporated System and method for using a prepaid card
WO2000046725A1 (en) 1999-02-05 2000-08-10 Fundsxpress, Inc. System and method for conducting online financial transactions using electronic funds transfer and public communications networks
US6510453B1 (en) 1999-02-26 2003-01-21 Microsoft Corporation System and method for creating and inserting multiple data fragments into an electronic mail message
EP1185973A4 (en) 1999-04-26 2004-11-17 Ronald Katz Point of sale terminal for the visually impaired
CA2369081C (en) 1999-04-30 2012-02-07 X.Com Corporation System and method for electronically exchanging value among distributed users
JP2003530615A (en) 1999-05-12 2003-10-14 ムーア ノース アメリカ インコーポレイテッド Method of supplying greeting card and gift card via global computer network
US6690673B1 (en) * 1999-05-27 2004-02-10 Jeffeerson J. Jarvis Method and apparatus for a biometric transponder based activity management system
US7249097B2 (en) * 1999-06-18 2007-07-24 Echarge Corporation Method for ordering goods, services, and content over an internetwork using a virtual payment account
US6370514B1 (en) 1999-08-02 2002-04-09 Marc A. Messner Method for marketing and redeeming vouchers for use in online purchases
US6321211B1 (en) 1999-07-06 2001-11-20 Richfx, Inc. Methods and systems for electronically accepting and exchanging an online gift
AU6076100A (en) 1999-07-09 2001-01-30 Citicorp Credit Services, Inc. Method and system for managing and conducting a network auction
CN1222900C (en) * 1999-08-09 2005-10-12 第一数据公司 Point of sale payment terminal
EP1077436A3 (en) 1999-08-19 2005-06-22 Citicorp Development Center, Inc. System and method for performing an on-line transaction using a single-use payment instrument
US20040169722A1 (en) 1999-10-16 2004-09-02 Pena Martin Rangel Method and system for computer-aided telecommunication and financial transactions
US6488203B1 (en) 1999-10-26 2002-12-03 First Data Corporation Method and system for performing money transfer transactions
PL356106A1 (en) 1999-11-30 2004-06-14 Citibank, N.A. System and method for performing an electronic transaction using a transaction proxy with an electronic wallet
US7120606B1 (en) 2000-02-10 2006-10-10 Jove Corporation System and method for secure electronic fund transfers
US20010051876A1 (en) 2000-04-03 2001-12-13 Seigel Ronald E. System and method for personalizing, customizing and distributing geographically distinctive products and travel information over the internet
US8046256B2 (en) 2000-04-14 2011-10-25 American Express Travel Related Services Company, Inc. System and method for using loyalty rewards as currency
US20020082993A1 (en) 2000-05-15 2002-06-27 Hector Hoyos Methods and apparatus for executing automated financial transactions
US20020046106A1 (en) 2000-06-28 2002-04-18 Akira Ishibashi Method and system for modeling business card exchanges in a point-to -point value
CA2416130A1 (en) 2000-07-11 2002-01-17 First Data Corporation Wide area network person-to-person payment
US20020099637A1 (en) * 2000-07-26 2002-07-25 Wilkinson William T. Intellectual property investment process
WO2002011028A1 (en) 2000-07-27 2002-02-07 Eft Datalink, Incorporated Value transfer system for unbanked customers
US7721109B1 (en) * 2000-07-28 2010-05-18 Verizon Business Global Llc Secure transaction card using biometrical validation
US7130817B2 (en) 2000-12-15 2006-10-31 First Data Corporation Electronic gift linking
AU2002229071A1 (en) 2000-12-15 2002-06-24 First Data Corporation Electronic gift greeting
AU2002255790A1 (en) * 2001-03-14 2002-09-24 Clubmom, Inc. Systems and methods for conducting a loyalty program
JP2002269350A (en) * 2001-03-14 2002-09-20 Hitachi Ltd Transaction settlement method, transaction settlement system and portable communication terminal used therefor and settlement terminal for member store
US20020138636A1 (en) 2001-03-23 2002-09-26 Mark Buttner Method for automatically mass generating personalized data report outputs
US6914517B2 (en) * 2001-04-17 2005-07-05 Dalton Patrick Enterprises, Inc. Fingerprint sensor with feature authentication
US20030023555A1 (en) * 2001-07-26 2003-01-30 Cashworks, Inc. Method and system for providing financial services
US7433826B2 (en) * 2001-09-19 2008-10-07 Eleytheria, Ltd System and method for identity validation for a regulated transaction
US6712698B2 (en) * 2001-09-20 2004-03-30 Igt Game service interfaces for player tracking touch screen display
US6883709B2 (en) * 2002-02-12 2005-04-26 Famous Horse, Inc. Biometric identification and security system associated with cash register
US6847393B2 (en) * 2002-04-19 2005-01-25 Wren Technology Group Method and system for monitoring point of sale exceptions
US20040010458A1 (en) * 2002-07-10 2004-01-15 First Data Corporation Methods and systems for organizing information from multiple sources
US10395484B2 (en) * 2002-08-20 2019-08-27 The Western Union Company Multi-purpose kiosk and methods
US7475038B2 (en) * 2003-03-21 2009-01-06 The Western Union Company System and methods for disclosing transaction information to customers
US20040215574A1 (en) 2003-04-25 2004-10-28 First Data Corporation Systems and methods for verifying identities in transactions
US7844545B2 (en) * 2003-04-25 2010-11-30 The Western Union Company Systems and methods for validating identifications in financial transactions
US7945959B2 (en) * 2007-06-18 2011-05-17 International Business Machines Corporation Secure physical distribution of a security token through a mobile telephony provider's infrastructure

Also Published As

Publication number Publication date
CA2523584A1 (en) 2004-11-11
US8386393B2 (en) 2013-02-26
EP1623304A2 (en) 2006-02-08
WO2004097598A3 (en) 2005-09-01
WO2004097598A2 (en) 2004-11-11
US20130138567A1 (en) 2013-05-30
US20040215574A1 (en) 2004-10-28
US20050119968A1 (en) 2005-06-02
CN1795464A (en) 2006-06-28
EP1623304A4 (en) 2007-01-10
MXPA05011481A (en) 2006-05-25
US10402824B2 (en) 2019-09-03

Similar Documents

Publication Publication Date Title
US20190325439A1 (en) Systems and methods for verifying identities in transactions
US11263691B2 (en) System and method for secure transactions at a mobile device
US7844545B2 (en) Systems and methods for validating identifications in financial transactions
US7707108B2 (en) Detection of unauthorized account transactions
US9406067B1 (en) System and method for verifying identity
US8645275B2 (en) Systems and methods for verifying identities
US6070141A (en) System and method of assessing the quality of an identification transaction using an identificaion quality score
US7383988B2 (en) System and method for locking and unlocking a financial account card
US20160171493A1 (en) System and Method of Secure Payment Transactions
US20030161503A1 (en) Method and system for authorizing a commercial transaction
US20030046237A1 (en) Method and system for enabling the issuance of biometrically secured online credit or other online payment transactions without tokens
US9251514B2 (en) Systems and methods for identifying biometric information as trusted and authenticating persons using trusted biometric information
WO2006101684A2 (en) User authentication and secure transaction system
US7389269B1 (en) System and method for activating financial cards via biometric recognition
US20140244510A1 (en) Privacy protection system and method
WO2016083987A1 (en) Method of and system for obtaining proof of authorisation of a transaction
US7690563B2 (en) Transaction security system
JP7542076B2 (en) Apparatus, method and program for detecting fraudulent applications for identity verification and authentication
WO2014182801A9 (en) Privacy protection system and method

Legal Events

Date Code Title Description
AS Assignment

Owner name: FIRST DATA CORPORATION, COLORADO

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MICHELSEN, MICHAEL J.;BLAIR, PAUL;SEIFERT, DEAN;AND OTHERS;REEL/FRAME:049644/0743

Effective date: 20030609

Owner name: THE WESTERN UNION COMPANY, COLORADO

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FIRST DATA CORPORATION;REEL/FRAME:049644/0888

Effective date: 20061019

STPP Information on status: patent application and granting procedure in general

Free format text: APPLICATION DISPATCHED FROM PREEXAM, NOT YET DOCKETED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION