The present invention relates to computer systems and methods for supporting secure computer program and file set-up and management.
In some embodiments, a universal filtering and verification hub server is accessible over the Internet from a sponsor computer. A filtering module automatically determines a level of identity verification depending on the sponsor and the type of arrangement desired to be sponsored. An identity module and/or compliance module is activated depending on the sponsor and an automated workflow is executed. Upon completion, an arrangement program ID is generated, and is correlated with a sponsor ID.
In some embodiments, the arrangement is for the secure storage of data. The data can be confidential or sensitive documents, proprietary software or data, or an account. In addition to, or instead of, the filtering module, a compliance module can be provided to automatically determine a level of regulatory compliance depending on the sponsor and the type of arrangement desired to be sponsored. The compliance module is activated depending on the sponsor and an automated workflow is executed. In one embodiment, the sponsor ID is a routing ID used to route to a sponsor system over a data interchange network. The communications are encrypted, and a high level of encryption is used for storing an arrangement program ID.
In some embodiments, users, sponsors and owners communicate over a first network with the filtering and verification hub server using a first encryption method. A second encryption method is used for back-end communication over a data interchange network between the filtering and verification module and owner, sponsor and arrangement processors.
In some embodiments, a URL corresponding to the arrangement program ID is generated and provided to the sponsor. The URL provides a link to a custom opening webpage maintained by the filtering and verification hub server or a companion server. The custom webpage collects information about the type of arrangement selected to be opened, and information about the user. A user identity/compliance module automatically performs appropriate background checking of the user depending upon the type of arrangement.
In some embodiments, the filtering and verification hub is a universal account hub server is accessible over the Internet from a sponsor computer which can be a bank, an owner computer which can be a merchant computer, or user computer. Upon completion of the automated workflow, the arrangement created includes an account, and an account program ID is generated, and is correlated with the sponsor bank BIN (Bank Identification Number) or, for a merchant or other user, an account hub bank BIN is used. A BIN (Bank Identification Number) from a sponsor bank 124 can be used to route through a payment network 118. For a merchant or other user, a BIN from an account hub bank 122 is used.
In one embodiment, the filter module, or an intervening GUI (Graphical User Interface), provides a variety of options to the sponsor, which may include some or all of the following:
Type of arrangement (confidential or sensitive documents storage and access, proprietary software or data, or an account such as a gift card, General Purpose Reloadable (GPR) card, debit account, credit account, loan, etc.).
Type of sponsor (escrow agent, secure storage facility, bank, merchant, individual, charity, etc.). Address and other information identifying the sponsor.
Depending on the answers, more questions are presented. If the arrangement or account is to include a physical card, options for card design will be presented. If the sponsor has previously registered, sponsor identification information can be pulled up and displayed for confirmation, such as current address, tax ID number, etc. The identity verification can be skipped for existing registered sponsors, unless, for example, there is a change in information or the registration is too stale.
If certain instruments are selected, such as a gift card, among the further options is an allowable velocity—how many gift cards can one user obtain in a period of time? If the maximum velocity desired exceeds regulatory limits with respect to money laundering detection, the sponsor will be prompted to confirm, giving that a higher level of compliance checking will be required. If the sponsor still wants to proceed, the same compliance workflow as for a GPR card can be used.
In one embodiment, an instrument ID is tokenized for security. SSL or other encryption techniques can be used for communicating with the filtering and verification hub.
The instrument ID is only stored in an encrypted form. In one embodiment, the storage of the instrument ID at the filtering and verification hub, and at other storage points, is one of AES (128 bits and higher), TDES/TDEA (triple-length keys), RSA (2048 bits and higher), ECC (224 bits and higher), and DSA/D-H (2048/224 bits and higher). In one embodiment, end-to-end encryption is used. The encryption may be symmetric encryption using a single key to both encrypt and decrypt, or may be asymmetric encryption using a public and private key. In one embodiment, for online access, page encryption may be used. In one embodiment, hashing is used.
In one embodiment, an instrument is provided with a multi-digit code for verification in addition to the instrument ID. In one embodiment, the multi-digit code is dynamic.
If the Sponsor is a bank (step 206), an abbreviated identification process for a bank is initiated, such as requesting a Dunn & Bradstreet (D&B) report (step 208). A URL for the D&B site is invoked, and the account hub registration information is auto-filled. The sponsor name is then filled in for the request. The response is examined to determine if there is more than one match. If there are additional matches, additional information is requested of the sponsor to determine which match is correct (step 212). For example, the multiple names from the multiple matches can be provided to the sponsor to select the correct match.
If the Sponsor is not a bank, such as an owner, a merchant, individual or charity, additional information is collected from the sponsor and provided to an Identity and Fraud confirmation service, such as Dunn & Bradstreet (step 210). Additional details are requested from the sponsor as needed (step 212). If the sponsor is identified satisfactorily, a sponsor hub ID is assigned (step 218). If there are still issues with verifying the sponsor, an error message is displayed and/or a human operator is contacted (step 216).
A program ID is assigned in step 220. If the sponsor is a bank, the sponsor bank can elect to use its own BIN, or use the hub bank BIN (step 222). For merchants, individuals and charities, the hub bank BIN is the default. The assigned IDs and BIN are stored in a program database (step 224) for later use when issuing accounts/cards to end users.
Once a sponsor's identity has been verified, an automated regulatory compliance workflow is executed, as illustrated in
If a sponsor elects to change any of the documents (306), other than filling in information requested, information is retrieved from the document database on the range of time required for regulatory approval. That amount of time is modified depending on the number of documents elected to be changed. A message is displayed on the GUI for the sponsor informing the sponsor of the delay entailed, and asking for confirmation that the sponsor desires to proceed. If the sponsor desires to proceed, the documents are routed to the appropriate regulatory agencies for review and approval (308). In one embodiment, changes from the pre-approved documents are marked to expedite the review process. The routing is accomplished by invoking a URL with a submission form, or an API, for each relevant regulatory agency. The hub program manager ID and other information is auto-populated, along with the new program ID and sponsor information as required. The changed documents are uploaded.
Upon receiving approvals, any changes are presented to the sponsor for acceptance, or for another round of approval if the sponsor desires further changes. The sponsor is then prompted for electronic signatures on the documents as required (310). The signed documents, along with the approval messages, are then stored in a database, associated with the program ID (312), for later audit purposes.
For a merchant, the number of documents and the approval process may vary depending on the merchant category. For example, merchants in the massage or gambling business will be subject to greater scrutiny.
The URL can be posted in a variety of places, such as on social media 414, on the sponsor's own website 416, or can be provided to an email or text message server 418 to push out to a list of customers or other mailing list. The sponsor is given an option to tag the program as available to 3rd party marketers. The URL can then be provided to a 3rd party marketer 412, which can display them, like the sponsor, on social media 414, on the marketer's own website 416, or can be provided to an email or text message server 418. Each 3rd party marketer is assigned an ID tag that goes along with the URL, so that when the end user clicks on the URL, the marketer tag will be sent to the account hub server and/or sponsor for attribution to the 3rd party marketer.
The custom webpage collects information about the type of account selected to be opened, and information about the user. A user identity/compliance module automatically performs appropriate background checking of the user depending upon the type of account. For a gift card, no checking may be needed, simply a valid payment instrument for loading the card/account, and verification that the address, etc. matches the card owner. For a GPR card, for example, an OFAC (Office of Foreign Assets Control) list can be checked. In additional, historical data about the user can be checked for fraud indications. The user information can be cross-referenced with other data by a fraud checking service. The account hub server can maintain its own database of transactions, which can track users and data aggregated across multiple sponsors, giving sponsors more security than with the sponsor's own data.
Customer usage, Tracking Offers
The end users can use the cards or accounts in physical stores or online just like other cards and accounts. Referring back to
The partners can use the partner portal for a variety of functions. Candidate partners can review available services and requirements. Candidates can apply to become a Program Manager or Card Marketer (Prepaid, Credit). Accounting can be performed as needed. The partner database 606 can store details of each partner, along with reports (from billing, logging extract, etc.). In addition, it can contain a link to a “Compliance Binder” showing the compliance documents and approvals, and updated as needed. The configuration database 608 is an operational database used by the API Proxy (
The API proxy 806 is linked to a variety of other modules. A card processor 814 processes transactions, and can link with a bill pay module 816. A compliance processing module 818 compares users to an OFAC list and/or a KYC (Know Your Customer) compliance data. An optional underwriting module 820 allows a 3rd party to perform underwriting. A printer 822 can print physical plastic gift or other cards. A check guarantor module 824 allows processing of check photos. A core processor 826 is the system (other than a card) that manages other banking services. For example, the managed services could be deposit products, loan Products etc. A module 828 links to valued added partner services, such as a loyalty platform (e.g., points bank), a check printing services (for DDA), etc. A payment provider module 830 enables the acceptance of online and mobile payments. 3rd parties can be enlisted to publish APIs through a publishing module 832. Future expansion is provided for with configurable module 834.
As described, the inventive service may involve implementing one or more functions, processes, operations or method steps. In some embodiments, the functions, processes, operations or method steps may be implemented as a result of the execution of a set of instructions or software code by a suitably-programmed computing device, microprocessor, data processor, or the like. The set of instructions or software code may be stored in a memory or other form of data storage element which is accessed by the computing device, microprocessor, etc. In other embodiments, the functions, processes, operations or method steps may be implemented by firmware or a dedicated processor, integrated circuit, etc.
It should be understood that the present invention as described above can be implemented in the form of control logic using computer software in a modular or integrated manner. Based on the disclosure and teachings provided herein, a person of ordinary skill in the art will know and appreciate other ways and/or methods to implement the present invention using hardware and a combination of hardware and software.
Any of the software components or functions described in this application may be implemented as software code to be executed by a processor using any suitable computer language such as, for example, Java, C++ or Perl using, for example, conventional or object-oriented techniques. The software code may be stored as a series of instructions, or commands on a computer-readable medium, such as a random access memory (RAM), a read-only memory (ROM), a magnetic medium such as a hard-drive or a floppy disk, or an optical medium such as a CD-ROM. Any such computer-readable medium may reside on or within a single computational apparatus, and may be present on or within different computational apparatuses within a system or network.
While certain exemplary embodiments have been described in detail and shown in the accompanying drawings, it is to be understood that such embodiments are merely illustrative of and not intended to be restrictive of the broad invention, and that this invention is not to be limited to the specific arrangements and constructions shown and described, since various other modifications may occur to those with ordinary skill in the art.
This application claims the benefit of U.S. Provisional Patent Application No. 62/367,913 filed Jul. 28, 2016, entitled “Account Hub”, the disclosure of which is hereby incorporated herein by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
62367913 | Jul 2016 | US |