Embodiments of the present invention relate generally to validating the identity of business entities and individuals engaged in loan transactions and, more particularly, relate to systems and methods for validating the identity of lenders and borrowers for facilitating web-based loan transactions.
Over the years, use of the Internet has grown to touch almost every facet of people's lives. In the business world, the Internet has been used to advertise goods and services, receive orders for products, and facilitate communication within and among businesses. The Internet has also become a place where borrowers and lenders can find each other, agree to the terms of a loan transaction, and transfer funds. Peer-to-peer lending websites have thus developed to facilitate such transactions and to provide a forum for borrowers and lenders to conduct business.
In one type of peer-to-peer lending scenario, typically a potential borrower (e.g., an individual wishing to take out a loan) will post an amount that he wishes to borrow and a maximum interest rate he is willing to pay. In some cases, the potential borrower may include a short description of the purpose of the loan, such as to go to college, start a business, or buy a car. A potential lender (e.g., an individual who is seeking to loan money for interest) can then bid on specific loans by offering to lend the potential borrower some or all of the money requested by the potential borrower in exchange for a minimum interest rate specified by the potential lender. A third party, such as a hosting website or web forum, may then match borrowers with appropriate lenders and facilitate the transaction between the parties.
Because such peer-to-peer loan transactions occur in cyberspace, it can be difficult to fully asses the risks involved in lending money to a particular borrower. Thus, there is a need for validating a party's identity in an efficient and cost-effective manner and providing the information to potential borrowers and lenders so as to facilitate peer-to-peer loan transactions.
In general, embodiments of the present invention provide systems, methods, apparatus, and computer program products for collecting residence information.
In accordance with one aspect, a method for collecting residence information is provided. In one embodiment, the method comprises (1) identifying a delivery route corresponding to the address; (2) incorporating the address to the delivery route; (3) transmitting the delivery route comprising the incorporated address to a delivery driver's computing device, wherein the delivery driver is scheduled to drive the delivery route; (4) receiving the residence information associated with the address, the residence information collected from an in-person visit to the address by the delivery driver; and (5) providing the residence information to the third-party.
In accordance with yet another aspect, an apparatus comprising at least one processor and at least one memory including computer program code is provided. In one embodiment, the at least one memory and the computer program code may be configured to, with the processor, cause the apparatus to at least (1) receive a request from a third-party to collect residence information associated with an address, wherein the residence information is to be collected as part of an in-person visit to the address; (2) identify a delivery route corresponding to the address; (3) incorporate the address to the delivery route; (4) transmit the delivery route comprising the incorporated address to a delivery driver's computing device, wherein the delivery driver is scheduled to drive the delivery route; (5) receive the residence information associated with the address, the residence information collected from an in-person visit to the address by the delivery driver; and (5) provide the residence information to the third-party.
In accordance with yet another aspect, a computer program product for collecting residence information is provided. The computer program product may comprise at least one computer-readable storage medium having computer-readable program code portions stored therein, the computer-readable program code portions comprising executable portions configured to (1) receive a request from a third-party to collect residence information associated with an address, wherein the residence information is to be collected as part of an in-person visit to the address; (2) identify a delivery route corresponding to the address; (3) incorporate the address to the delivery route; (4) transmit the delivery route comprising the incorporated address to a delivery driver's computing device, wherein the delivery driver is scheduled to drive the delivery route; (5) receive the residence information associated with the address, the residence information collected from an in-person visit to the address by the delivery driver; and (5) provide the residence information to the third-party.
Having thus described embodiments of the invention in general terms, reference will now be made to the accompanying drawings, which are not necessarily drawn to scale, and wherein:
Embodiments of the present invention will now be described more fully hereinafter with reference to the accompanying drawings, in which some, but not all embodiments of the invention are shown. Indeed, the invention may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will satisfy applicable legal requirements. Like reference numerals refer to like elements throughout.
Systems, methods, and computer program products of various embodiments of the present invention provide for validating a party's identity for facilitating peer-to-peer loan transactions. In general, fleet vehicle drivers (e.g., drivers of vehicles within a fleet of parcel delivery vehicles associated with a particular common carrier) are used to collect information validating a party's identity. Such information may include driver's license information, visual confirmation of the party's identity, and/or residence information.
The validating information is then made accessible to a peer-to-peer lending facilitator. For example, as described below, the validating information may be stored in a database accessible by servers of a peer-to-peer website, such as Prosper.com or Zopa.com. The peer-to-peer website may, in turn, use the information to determine the risk involved with lending funds to a particular individual and may present the risk assessment to potential borrowers and lenders. By providing an indication of the risk involved with loaning money to a certain individual, the peer-to-peer website can help potential lenders determine the appropriate amount of interest to charge and inform the lender's decision on whether to engage a particular borrower in a loan transaction.
In the past, such websites have assessed the risks (or relied on a third-party's assessment of the risks) of entering into a loan with a particular potential borrower based on the potential borrower's credit history and other financial data. However, when a loan transaction occurs entirely (or almost entirely) in cyberspace, some risk factors may not be easy to identify. For example, a potential borrower may misidentify himself as a different individual in order to qualify for low interest rates, or to fraudulently obtain money that he has no intention of repaying. By providing a validation of the borrower's identity through a face-to-face interaction as described below, the determination of risk may be more complete and may better represent the actual risk involved with entering into a particular loan transaction.
At the same time, a lender may misrepresent his identity for various reasons, such as to obtain personal and/or confidential information from a potential borrower. The validation of a lender's identity may, at the very least, provide a hesitant borrower with some level of assurance that the lender exists and has accurately represented his identity, thereby encouraging the borrower to engage in a loan transaction with a particular lender. Thus, providing a validation of identity based on a face-to-face meeting may provide an additional level of security and allow the peer-to-peer loan facilitator's risk assessment to be more comprehensive.
According to various embodiments of the present invention, the identity of a party is validated by visiting the party or the party's representative (e.g., when the party is a business entity) at an address associated with the party, confirming the party's association with the address (e.g., confirming that the address is the party's residence), and providing an indication of validity to third parties. For example, the party, once validated, may be listed as a “validated party” or the name of the party may be made available to a third party requestor once the party has been validated, as described more fully below. Although it is understood that the identities of both borrowers and lenders may be validated according to the described embodiments, the description that follows refers mostly to the validation of a potential borrower's identity. However, it should be understood that the same or similar techniques could be used for validating a potential lender's identity, or the identity of other individuals or businesses.
With reference to
In some cases, the party whose identity is to be validated may be the consignor or the consignee in a parcel delivery transaction. In a typical parcel delivery transaction, multiple parcel delivery vehicles may be involved in transporting a parcel from the consignor to the consignee. In some cases, the parcel delivery vehicles may be employed by the same common carrier, whereas in other cases more than one common carrier may be involved. Furthermore, a single parcel delivery vehicle may pick up several parcels from several different consignors and/or deliver parcels to several different consignees. In some cases, a particular parcel delivery vehicle may pick up parcels from different consignors and deliver the parcels to a distribution center associated with a common carrier, where the parcels may be sorted and loaded onto other delivery vehicles for transportation to the various consignee locations. Similarly, a particular parcel delivery vehicle may pick up several parcels from the common carrier's distribution center and deliver the parcels to the respective consignees.
In
In some cases, the address of the party 16 may be a planned stop on the driver's route, such that the address becomes part of the route, even though no pick-ups or deliveries are scheduled to take place at that address. For example, a driver of a particular delivery vehicle may have a morning route scheduled by the common carrier that includes various parcel pick-ups and deliveries, as shown in
Although parcels are not being picked up from or delivered to the parties P1 and P2 listed on the route in
It is noted that although the description herein discusses validating a party's identity in person during or in the process of conducting parcel delivery transactions, the common carrier may be able to verify parties' identities remotely by virtue of its extensive databases of information on the people and businesses that it delivers to and picks up from. In other words, a common carrier may not necessarily need to instruct a driver to visit a party's address in order to confirm the existence of some businesses or individuals at the particular address. The common carrier's records may already provide sufficient assurances that the party is at the address indicated on a loan application (for example) by virtue of prior dealings between the common carrier and the party as a consignor or consignee. However, in this situation, the common carrier may need to ask the party if the party is a potential party to a loan transaction. Thus, the common carrier may contact the party by e-mail, telephone, or other form of communication to confirm that the party is indeed a potential party to a loan transaction.
After a fleet vehicle delivery driver has arrived at the address of a party whose identity is to be validated, the party's involvement in a loan transaction and his association with the address may be confirmed. An indication of validity may then be provided to a system accessible by users of a peer-to-peer lending application, as described below.
Confirming the Party's Involvement with a Loan Transaction
As an initial matter, before confirming the party's name and address or otherwise validating the party's identity, the driver may confirm that the party is indeed involved with a loan transaction (e.g., signed up as a potential borrower or lender with a peer-to-peer lending facilitator). Thus, upon arriving at the party's address, the driver may ask for the person at issue. Once the person has identified himself, the driver may then ask whether the person has requested to take out a loan via the peer-to-peer website at issue (or to loan money on the website). Then, if the answer is “yes,” then the driver would proceed to verify the person's identity, as described below. Confirming the party's involvement with a loan transaction may thus serve to protect a lender from a potential identity fraud situation.
Confirming the Party's Association with the Address
Regardless of whether the party is a consignor or consignee of the parcel delivery transaction or is located on or near the delivery route, confirmation of the party's association with the address may occur in a number of ways. For example, the driver of the parcel delivery vehicle may confirm the party's association by requesting to see a form of identification, such as a driver's license, a picture identification card, utility bill, a credit card that includes a picture of the individual, a government distributed picture identification, or other picture identification. In this way, the driver may visually verify that the party standing before him has the same name as the individual represented on the form of identification tendered and has the same appearance as the individual pictured on the identification document. For example, the driver may confirm that the person standing before him looks like the person pictured on the party's driver's license and that the name printed on the driver's license matches the name of the party whose identity is to be validated.
In addition to verifying the party's identity, the driver may also visually verify the party's address using a driver's license, picture ID, utility bill, or credit card, among other documents. For example, the driver may compare the address printed on the party's driver's license with the address provided on a parcel being shipped to the individual or otherwise provided to the driver as part of the instructions to visit the particular party.
In some cases, such as when the party is a consignor or consignee as described above, confirmation of the party's presence may be incidental to an activity related to the party's shipment or receipt of a parcel. For example, the party (who may also happen to be a consignor) may need to pay the cost of shipping a parcel. The party may decide to pay using a credit card, which he may swipe at a point-of-sale device that the driver may be carrying with him. In some cases, the driver may be carrying a handheld device such as a Delivery Information Acquisition Device (DIAD), which may also include or function as a point-of-sale device. In addition to paying the shipping charges, however, swiping the credit card may also serve to validate the consignor's identity. For example, the name and address associated with the credit card may be read by the DIAD and automatically compared with the name and address of the consignor (based on the common carrier's shipment and delivery records). Matching information may serve as an automatic confirmation of the party's association with the address as a result of the credit card transaction, as described in greater detail below.
In some embodiments, information regarding the validity of a party's identity is communicated and stored on a computer system that includes various components communicating via a network, such as the network 22 shown in
The computer system 20 may also include one or more data terminals 28 that are connected to the communications network 22 and are configured to receive and transmit data. The data terminal 28 may, for example, be a computer, such as a desktop or laptop computer, a cellular telephone, a barcode scanner, point-of-sale device, a personal digital assistant (PDA), an electronic signature pad, a handheld device such as a DIAD, or any other device configured to receive input either directly or indirectly from a user. For example, the data terminals 28 may be DIADs that are carried by drivers of a fleet of delivery vehicles of the common carrier and may be used by the common carrier to communicate with each driver, such as to provide information to the drivers regarding consignor/consignee names and addresses.
The common carrier server 26 may include and/or be in communication with one or more processors (not shown) configured to access and manipulate the data in the database 24. The server 26 may therefore be configured to access the database 24 and to provide an indication of the validity of the party's identity to the database based on the input received via the data terminals 28. The common carrier server 26 may include a memory component for storing data entries regarding parcel delivery transactions, as well as an indication of the validity of a party's identity, and/or the common carrier server 26 may communicate the information and indications to the database 24 for storage. In some cases, the database 24 is included in and forms a part of the common carrier server 26.
Each data terminal (e.g., each DIAD) may be configured to receive and transmit input relating to a party's identity. For example, the data terminal 28 may be configured to receive input from a driver indicating that the party's identity is accurate. Referring to
In various embodiments, the data terminal 28 is adapted to allow the driver to respond to the prompt by marking a check box 32 using the keys 34 of the data terminal or other input mechanism to indicate that the party is indeed involved in a loan transaction and that a visual inspection was performed. Furthermore, the data terminal 28 may receive input regarding the method of validation, such as what form of documentation was visually inspected. The data terminal 28 may also prompt the driver to indicate whether the address of the party was verified and which form of documentation was used to validate the party's address, in addition to other items of information regarding the identity of the party.
The DIAD, barcode scanner, or other data terminal 28 may transmit the input received to the database 24 via the network 22. For example, the DIAD may transmit the data wirelessly (e.g., in real time) via a cellular connection or Bluetooth® connection to another device, such as a receiver carried by a vehicle associated with the DIAD (e.g., the driver's vehicle) and/or the common carrier server 26, which may then transmit the data to the database 24. As another example, the driver's vehicle may wirelessly communicate with the DIAD or may include a cradle for docking the DIAD, in which case information received by the DIAD may be uploaded to the common carrier server 26 via the cradle or other transmitter carried by the vehicle. The data may be transmitted any other suitable way, for example, according to the common carrier's preferences.
In any case, the common carrier server 26 or other processor may be configured to receive the data (e.g., the responses of the driver to the prompts displayed on the data terminal) and to provide an indication 40 to the database 24 of the validity of the party's identity. The indication may include a designation of the party's information as “validated,” as shown in
In some cases, the data is transmitted automatically from the data terminal 28 to the common carrier server 26, such as when the data terminal is used as a point of sale device to receive credit card information. In this example, the information read from the credit card may be automatically transmitted to the common carrier server 26 and recorded in the database 24 via the communications network 22 shown in
Referring again to
Once the party's presence at the address has been confirmed (e.g., the party's identity and address have been validated) and the indication 40 of validity has been associated with the validated party (e.g., within a database 24), the information may be accessed for use by third parties. In this regard, in various embodiments, the system 20 (or at least parts of the system 20) shown in
For example, referring to
For example, the peer-to-peer website server 30 may be configured to obtain financial histories and credit scores from other sources, such as a credit information server 36 maintained by a credit bureau, and may use such statistics to give a party a rating. The peer-to-peer website server 30 may also be configured to determine whether the party's identity has been validated (e.g., by communicating with the common carrier server 26). If the identity has been validated, the peer-to-peer website server 30 may modify the risk rating score to reflect less risk associated with entering into a loan transaction with the party. If the identity has not been validated, or, for example, if the validation has shown that the party's information is fraudulent, the peer-to-peer website server 30 may modify the risk rating score to reflect more risk associated with entering into the loan transaction.
For example, the peer-to-peer website server 30 may issue a score of A for Excellent, B for Good, C for Fair, and D for Poor based solely on information acquired regarding the party's credit risk. Upon incorporating the indication of validity 40 recorded in the database 24 and/or transmitted by the common carrier server 26, however, the peer-to-peer website server 30 may modify the risk rating to A+ for those parties with Excellent credit scores and a validated identity, B+ for those parties with Good credit scores and a validated identity, and so on.
The rating, in turn, may be displayed on the peer-to-peer lending website such that prospective borrowers and lenders may be able to view the ratings associated with various parties listed on the website. For example, a prospective lender may operate a user terminal 46 connected (directly or indirectly) to the network 22 to view the ratings associated with various parties looking to secure a loan. By considering the ratings along with other information describing the parties and the respective loans requested, the lender may be able to decide whether she wishes to loan an amount of money to a particular borrower.
In some cases, the common carrier server 26 may be configured to receive requests from the third party server indicating the party to be verified. For example, the peer-to-peer website server 30 may transmit a request to the common carrier server 26 indicating that validation of Mr. John J. Borrower is needed. The request may be the result of an inquiry made by a potential lender who is interested in lending to Mr. Borrower, but who would like to know first if Mr. Borrower's identity is authentic. Similarly, the request may be generated as a result of a new request for a loan initiated by Mr. Borrower. For example, the request may be generated automatically when Mr. Borrower signs up on the peer-to-peer lending website to apply for a loan.
Thus, the common carrier server 26 may be configured to query the database 24 for entries matching the requested party. If the entries are not found, then the common carrier server 26 may be configured to transmit the request for validation to at least one particular DIAD based on the address of the party to be validated and the planned delivery route to be executed by the user of the DIAD.
For example, referring to
The method for validating a party's identity described above is summarized in
The party's association with the address is then confirmed, for example, by the driver of a parcel delivery vehicle. See block 104. The confirmation may include the driver asking the party if the party is involved with a loan transaction and/or visually verifying the party's name and/or address using one or more documents such as the party's driver's license, picture identification, utility bill, or credit card. In some cases, the confirmation may include automatically confirming the party's name and address as a result of a credit card transaction. The party's name and/or address may be compared to information regarding a consignor or consignee of a parcel delivery transaction, such as when information has previously been stored regarding the party as a consignor or consignee as a result of a parcel delivery transaction, as described above.
In block 106, information regarding the party's association is provided to a computer system accessible by a peer-to-peer lending facilitator. For example, the information, which may comprise data transmitted by the driver in the previous example (e.g., via a handheld device, such as a DIAD) to a common carrier server, may be made accessible to a second computer system, such as a server of a peer-to-peer lending website. The information may include an indication of validity, which the peer-to-peer website server may then incorporate into its assessment of the risk involved with entering into a loan transaction with the party, as described above.
In some cases, a request to validate the party's identity may be received, thereby causing a common carrier to instruct a driver to visit the address of the requested party. See block 108. The request may, for example, be initiated by the peer-to-peer lending facilitator. Such a request received by the common carrier server may be relayed to one or more particular drivers in the field based on the address of the party with respect to the driver's route. In this way, the driver may visit the address and validate the party's identity in response to the request without substantially deviating from the driver's scheduled delivery route.
The steps described above need not occur in the order shown in
Many modifications and other embodiments of the invention set forth herein will come to mind to one skilled in the art to which these embodiments pertain having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is to be understood that the invention is not to be limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.
This application is a continuation application of U.S. patent application Ser. No. 12/397,720 filed Mar. 4, 2009, which is hereby incorporated herein in its entirety by reference.
Number | Date | Country | |
---|---|---|---|
Parent | 12397720 | Mar 2009 | US |
Child | 13098682 | US |