The present invention relates generally to information gathering and providing, and more specifically, to systems and methods for gathering identity information for account applications.
Financial institutions, such as banks, are regulated by many complex laws in America and internationally. In particular, financial institutions must meet the legal requirements to know your customer (KYC). KYC requires financial institutions to perform a certain amount of customer identification verification, which varies from country-to-country and region-by-region, before conducting financial business with their customers. KYC generally requires financial institutions to collect basic identity information, and may include more stringent requirements, such as determining a customer's risk in terms of their propensity to commit money laundering or identity theft. The extent of the identification and background checking depends on a country's KYC laws.
The KYC requirements may generate several problems for individuals, corporations, and financial institutions. As discussed above, KYC laws vary from country to country, and also vary across political divisions within a country. For example, the KYC requirements of one state in the United States may be different than the KYC requirements of another state in the United States. The KYC laws also get interpreted by regulators to generate rules and regulations, or “practicalities.” Financial Institutions also interpret the laws to create KYC business processes in order to comply the KYC laws and practicalities. As with any law, KYC laws and practicalities are subject to change, and a financial institution must remain constantly abreast to changes to the KYC laws and practicalities. Reviewing and remaining informed of KYC laws may be difficult and time consuming for a financial institution.
As KYC laws may vary greatly across political divisions, financial institutions may elect to try to comply with as many nations' KYC requirements as possible with a single KYC business practice. Rather than generating dozens of different KYC processes for each of the regions that a financial institution operates within, a financial institution may elect to implement one, very extensive KYC process that meets the requirements of as many of the different laws as possible. If a first financial institution employs an extensive KYC business process, a customer may find that the first financial institution requires much more documentation and private information than another financial institution. Not only is a customer likely to be confused as to why the first financial institution is requiring so much information, but the customer may also lose trust in the first financial institution for its lack of transparency in explaining the law and process.
While a financial institution must receive some personal/private information to comply with KYC, an individual likely does not want to provide the financial institution with any more personal/private information than is necessary to receive the financial service. The same approach likely applies to a corporation. As part of a corporate financial service application, a corporation may need to provide individual identity information (like a passport or a social security number) of a high-ranking employee, such as a treasurer or a president. A corporation likely prefers to limit the number of employees who must give up personal/private information because the private information may be difficult to quickly obtain and the corporation has an incentive to protect its employees. Without knowing the laws and practicalities, a corporation may be willingly, unknowingly, and needlessly giving up more personal/private employee information than is necessary. It benefits the corporation and its employees to avoid such a needless transmission of private information.
Further still, international corporations do not like repeatedly performing similar KYC processes for the same or similar financial services provided in a different nation or region. A multi-national corporation may need dozens of bank accounts in a plurality of different countries and regions, and each application process may require the gathering and transmitting of both corporate and individual identification information. A company may be able to file all of this information in a secure location, but each time a new financial service is desired, copies must be made, application forms must be completed, and the information must be sent to another financial institution. As a result, the KYC laws and regulations create a burden for the corporations providing identification information.
In view of all of the above discussed limitations and problems, a method for secure, fast, and convenient KYC and financial services information transmission and provision is desired for individuals, corporations, and financial institutions.
The systems and methods described herein attempt to overcome the drawbacks discussed above by providing a know your customer (KYC) exchange system and method that allows for easy transmission of corporate and individual identification information to a selected financial institution. The KYC exchange system, which may be implemented by a bank, a corporation, or other party, receives as an input the laws and practicalities of a plurality of nations and regions, as well as KYC business policies of a plurality of financial institutions located across the plurality of nations and regions. Using the collected input information, the system is able to provide feedback to individuals and corporations using the exchange system regarding whether the individual or corporation has provided all of the requested and necessary identification and financial services information.
In one embodiment, a computer implemented method for initiating a financial service at a financial institution comprises receiving, by a computer, a request from a client computer for a financial service associated with a financial institution, wherein the request comprises a selection of a country and a selection of the financial institution; determining, by the computer, one or more know your customer (KYC) requirements associated with the selected financial institution; determining, by the computer, one or more country requirements that are associated with the selected country; determining, by the computer, whether a set at least one documents stored in a corporate vault memory satisfies the one or more KYC requirements, and whether the set of at least one documents satisfies the one or more country requirements; calculating, by the computer, an extent to which the set of at least one documents satisfies the one or more KYC requirements and the one or more country requirements; and presenting, by the computer, for each selected financial institution in each selected country, an indicator of the extent to which the at least one documents satisfies the one or more KYC requirements and the one or more country requirements.
In another embodiment, a system for preparing documents for a financial service comprises a know your customer (KYC) requirements repository storing one or more KYC requirements associated one or more financial institutions; a country requirements repository storing one or more country requirements associated with one or more countries; a corporate vault memory storing one or more packages and one or more documents, wherein each package comprises a set of one or more documents selected from the one or more documents stored in the corporate vault memory; a client computer transmitting a request for a financial service associated with a package, wherein the request comprises a selection of a country and a selection of a financial institution; an exchange server processor receiving the request and configured to calculate a completion score based on an extent to which the package satisfies the one or more KYC requirements associated with the selected financial institution and the one or more country requirements associated with the selected country, wherein the package is a complete package when the completion score indicates that the package satisfies all requirements.
Additional features and advantages of an embodiment will be set forth in the description which follows, and in part will be apparent from the description. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the exemplary embodiments in the written description and claims hereof as well as the appended drawings.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory and are intended to provide further explanation of the invention as claimed.
The accompanying drawings constitute a part of this specification and illustrate an embodiment of the invention and together with the specification, explain the invention.
Reference will now be made in detail to the preferred embodiments, examples of which are illustrated in the accompanying drawings. The embodiments described above are intended to be exemplary. One skilled in the art recognizes that numerous alternative components and embodiments that may be substituted for the particular examples described herein and still fall within the scope of the invention.
Referring to
The client computer 104 of a customer, such as an individual or corporation, or a financial institution 106, may implement the use of the KYC exchange server 102 capabilities in their KYC processes. The KYC exchange server 102 may be any type of server capable of receiving and responding to requests from a plurality of client devices over a network, such as a LAN, WAN, WLAN, or the like.
In the exemplary embodiment, the KYC exchange server 102 is a web server that receives requests and sends messages over the Internet. The KYC exchange server 102 can transmit information to be displayed on a graphical user interface (GUI), such as information transmitted over the internet to be displayed on a web browser of the client computer 104. The database 108 may store information sent from the financial institution 106 and the client computer 104. Non-limiting examples of a database 108 may include an SQL, an OQL, or an XQuery, database. The database may store the KYC business practices of the financial institution 106 and identification documents sent from the client computer 104. Further still, the database 108 may store KYC laws, rules, and regulations 110 of a plurality of countries. The rules and regulations may be created by government agencies interpreting and enforcing KYC laws within a certain country. The database 108 may be periodically updated as laws and practicalities change and as financial institutions and client computers provide new and updated information.
The database 108 may be implemented as a software as a service model that stores all personal and corporate identification information, and the database 108 allows a company or to an individual to access, update, create, and delete identification information on the database 108. Because some users may be apprehensive about supplying their identification information on an unknown sever, some users may be given the option to store their identification on at a local computer device, for example, a server under the control of a corporation where the user is employed.
The financial institution 106 may be connected to the KYC exchange server 102 through a client computer device or a server owned and operated by the financial institution 106. The financial institution 106 may provide the KYC exchange server 102 with its KYC business practices as an input, and the KYC business practices may be updated whenever the financial institution 106 changes their KYC policies.
Alternatively, the KYC exchange server 102 may upload the KYC business practices of the financial institution 106 by determining the financial institution's practices through alternative methods. For example, a company that hosts the KYC exchange server 102 may receive the financial institution's 106 KYC business practices through an agreement between the company hosting the KYC exchange server 102 and the financial institution 106.
Alternatively, the company may collect data by interviewing customers of the financial institution 106. The financial institution's 106 KYC business practices may be attained by a plurality of different ways, but no matter how the information is collected, the financial institution's 106 business practices can be used as an input to the KYC exchange server 102. The KYC exchange 102 server can use the KYC business practices to provide feedback to customers about whether the customers have provided a complete KYC package according to the business practices of the financial institution 106.
The client computer 104 may be a personal computer, a mobile phone, a tablet, or any other computer device capable of securely connecting to the KYC exchange server 102 and may be used by a potential customer who wishes to open an account with the financial institution 106. While the client computer 104 is described as a client computer, it should be noted that the computer 104 may be any computer device capable of networked communication including host computers and servers.
The client computer 104 may be controlled by an individual seeking to open a personal account or by an employee at a corporation seeking to open a corporate account on behalf of the corporation. In either situation, the user controlling the client computer 104 uploads identification information to the KYC exchange server 102 to be saved on the database 108. The user of the client computer 104 may upload personal identification information and corporate identification information. The user of the client computer 104 also uses the uploaded identification information to create a KYC package to send to the financial institution 106.
The communication connection, which may be a network or Internet connection, between the KYC exchange server 102 and the client computer 104 and the communication connection between the KYC exchange server 102 and the financial institution 106 may be a very secure connection protocol, such as HTTPS, (SSH), FTPS, SCP or any other secure network protocol. In addition, connecting to the KYC exchange server from the financial institution 106 or the client computer 104 may require very strong user credentials, such as a digital smart card based digital certificate, a USB based digital token, or any other secure credentials. The strong credentials may be implemented in addition to a user name, a password, and a PIN. Strong credentials and strong data security are required because personal identification information is being sent through the network.
While one financial institution 106 and one client computer are illustrated as being connected to the KYC exchange server 102, the KYC exchange server 102 is capable of communicating with a plurality of financial institutions and a plurality of client computer devices. Since the KYC exchange server 102 is intended to store KYC requirements for financial institutions located around the world, many financial institutions and client computers from around the world may be connected to the KYC exchange server 102.
Referring now to
After the user is logged in, in step 202, the KYC exchange server may display available countries, financial institutions, and financial institution branches. The KYC exchange server may first illustrate all of the supported countries, which may be similar to
On the main page, if the user is part of a corporation, the corporation's logo 302 or the company's name may be listed on of the screen 302. Also, the user's name 304 who is accessing the KYC server may be listed and welcomed. As shown in
The home page may provide links 306 for Laws 306A, Practicalities 306B, and KYC Package creation 306C. These three links 306 interact with the world map 308 and the list of countries 310. To view any laws 306A or practicalities 306B, the user must also select a country 310US either before or after selecting the laws 306A or practicalities 306B. Also, direct links 314 for a corporate vault and reports are provided.
If the user clicks the laws link 306A, and also selects a country, for example, Argentina 306AG, the KYC exchange server provides a webpage showing applicable laws for the selected country.
The laws webpage for Argentina 400 is illustrated in
If the user clicks the practicalities link 306B and also selects a country (e.g., Argentina 306AG), the KYC exchange server provides a webpage showing applicable rules and regulations for the selected country, show in
The practicalities webpage 500 for Argentina is illustrated in
Returning to
The corporate vault is a secure location on the database where all of the personal identification information about the individual or corporation is stored. The corporate vault may be stored on a database within a datacenter of a company running the KYC exchange server. All of the personal and corporate identification information may be stored on the database and accessed through the corporate vault.
The corporate vault 601 can be configured so that not all users can see every document listed 602 in the corporate vault 601 based upon privileges assigned to the users. For example,
More documents may be uploaded by clicking the upload document button 614. Clicking the upload document button 614 may open a file directory manager so that the user can find the file path and upload the document to the database. Uploaded documents can be clicked on and previewed if the user has the necessary privileges.
If a document is out of date, the user may request an update 616 from the person holding the document. For example, in
Returning again to
Returning to
As shown in
Additional information may be presented to the user, such as whether a preexisting relationship 706 with the financial institution has been established. Also, documents status indicator 710 displays an indication (e.g., as a percentage) that can inform the user if the user currently has all or just a portion of the branch's required documents in the corporate vault. The KYC server may reference the KYC requirements for each branch and compare the required documents with the documents uploaded to the corporate vault. If all of the required documents are included in the corporate vault, the KYC exchange server reports that one-hundred percent of the documents have been uploaded. If less than one-hundred percent of the required documents are in the corporate vault, the KYC exchange server reports the percentage of required documents that are included in the corporate vault. If less than one-hundred percent are included, the user may continue, and upload additional documents to meet the requirements of the branch later, or the user may submit less than the required amount according to the financial institution's KYC policies.
Due to political, geographic, or other boundary divisions, a first branch of a first financial institution in a first region may have different KYC requirements than a second branch of the first financial institution in a second region. Also, due to different interpretations of the laws of the country, the first financial institution may have different KYC requirements than a second financial institution. These differences are reflected in the percentage bars 712 displayed to the user. Thus, the user may use the information presented in choosing one financial institution or one branch over another.
After the user selects a branch 702A from the list of branches 702, the user selects the documents to be included in a KYC package. The documents selection web page 800 is illustrated in
As shown in
After the user selects which documents to include, the KYC exchange server retrieves existing documents from the corporate vault, which is stored on the database, in step 210. After retrieving all of the documents in the corporate vault from the database, the KYC exchange server pre-populates existing documents and identifies missing documents in step 212.
In step 212, the KYC exchange server identifies all of the documents specified by the user in step 208 and compares these documents to the documents already uploaded to the corporate vault. Any documents in the corporate vault that match a category selected by the user are flagged for inclusion in the KYC package, and missing documents are notified to the user. This process can be illustrated by
As shown in
As shown in
In step 214, missing documents are populated and the package creation is completed. Once all of the files are populated and uploaded to the database, the user can create the KYC package by selecting the “Create Package” button 1004.
As shown in
After creating a package, the user can select a reviewer from a list of reviewers to review the KYC package in step 216 before it is submitted to the branch. Because the KYC package includes private information about individuals and corporations, an internal review is performed before submitting the KYC package to any third parties. Reviewers may be high level employees at a corporation. If the user is an individual, the reviewer is also the user, so the reviewer selection step may be omitted in the case of an individual applying for an account at the branch.
The reviewer selection step 216 is illustrated further in
Returning to
In step 222, the KYC exchange server monitors for approval status waiting for the KYC package creator to grant access to the branch.
As shown in
If the KYC package has been approved, the KYC exchange server presents a “Grant Access” button 1416 to the user. Pressing the grant access button 1416 grants a branch access to the approved KYC package. Pending packages 1404 that have not been approved may be recalled if the user or the corporation decides to no longer pursue a relationship with a certain branch.
As shown in
Returning to
While the financial institution reviews the documents in the KYC package through the KYC exchange server, the user can monitor the financial institution's access in step 232.
Through the systems and methods described above, a corporation or an individual does not need to replicate documents every time they wish to create another financial relationship with a financial institution. The documents are also securely processed and submitted to a branch. Finally, the documents actually required for a country's KYC laws can be easily ascertained using the tools available through the KYC exchange server. With all of these advantages, individuals and corporations can more easily create financial relationships with financial institutions while still complying with KYC requirements.
Although the exemplary embodiment recites the use of financial information, it is intended that the exchange system described herein can be implemented in other industries that do not require KYC laws. For example, the exchange can be used for information involving pharmaceutical trials and exchanging documents during a trial review process. The exchange can be used in any instance where various types of information are stored in a secure location for access by multiple parties for varying reasons.
The above method can be implemented on a computer-implemented graphical user interface, whereby the user can interact with a server over a communication network, such as the internet. Although the exemplary embodiment uses a web browser with hyperlinks and linked buttons that can be selected by the user, it is intended that the graphical user interface can have any form with any type of selection mechanism for the user, including touch screen, menus, radio buttons, etc.
The exemplary embodiments can include one or more computer programs that embody the functions described herein and illustrated in the appended flow charts. However, it should be apparent that there could be many different ways of implementing aspects of the exemplary embodiments in computer programming, and these aspects should not be construed as limited to one set of computer instructions. Further, those skilled in the art will appreciate that one or more acts described herein may be performed by hardware, software, or a combination thereof, as may be embodied in one or more computing systems.
The functionality described herein can be implemented by numerous modules or components that can perform one or multiple functions. Each module or component can be executed by a computer, such as a server, having a non-transitory computer-readable medium and processor. In one alternative, multiple computers may be necessary to implement the functionality of one module or component.
Unless specifically stated otherwise as apparent from the following discussion, it is appreciated that throughout the description, discussions utilizing terms such as “processing” or “computing” or “calculating” or “determining” or “displaying” or “generating” or “synchronizing” or “outputting” or the like, can refer to the action and processes of a data processing system, or similar electronic device, that manipulates and transforms data represented as physical (electronic) quantities within the system's registers and memories into other data similarly represented as physical quantities within the system's memories or registers or other such information storage, transmission or display devices.
The exemplary embodiments can relate to an apparatus for performing one or more of the functions described herein. This apparatus may be specially constructed for the required purposes, or it may comprise a general purpose computer selectively activated or reconfigured by a computer program stored in the computer. Such a computer program may be stored in a machine (e.g. computer) readable storage medium, such as, but is not limited to, any type of disk including floppy disks, optical disks, CD-ROMs and magnetic-optical disks, read only memories (ROMs), random access memories (RAMs) erasable programmable ROMs (EPROMs), electrically erasable programmable ROMs (EEPROMs), magnetic or optical cards, or any type of media suitable for storing electronic instructions, and each coupled to a bus.
The exemplary embodiments described herein are described as software executed on at least one server, though it is understood that embodiments can be configured in other ways and retain functionality. The embodiments can be implemented on known devices such as a personal computer, a special purpose computer, cellular telephone, personal digital assistant (“PDA”), a digital camera, a digital tablet, an electronic gaming system, a programmed microprocessor or microcontroller and peripheral integrated circuit element(s), and ASIC or other integrated circuit, a digital signal processor, a hard-wired electronic or logic circuit such as a discrete element circuit, a programmable logic device such as a PLD, PLA, FPGA, PAL, or the like. In general, any device capable of implementing the processes described herein can be used to implement the systems and techniques according to this invention.
It is to be appreciated that the various components of the technology can be located at distant portions of a distributed network and/or the Internet, or within a dedicated secure, unsecured and/or encrypted system. Thus, it should be appreciated that the components of the system can be combined into one or more devices or co-located on a particular node of a distributed network, such as a telecommunications network. As will be appreciated from the description, and for reasons of computational efficiency, the components of the system can be arranged at any location within a distributed network without affecting the operation of the system. Moreover, the components could be embedded in a dedicated machine.
Furthermore, it should be appreciated that the various links connecting the elements can be wired or wireless links, or any combination thereof, or any other known or later developed element(s) that is capable of supplying and/or communicating data to and from the connected elements. The term module as used herein can refer to any known or later developed hardware, software, firmware, or combination thereof that is capable of performing the functionality associated with that element. The terms determine, calculate and compute, and variations thereof, as used herein are used interchangeably and include any type of methodology, process, mathematical operation or technique.
The embodiments described above are intended to be exemplary. One skilled in the art recognizes that numerous alternative components and embodiments that may be substituted for the particular examples described herein and still fall within the scope of the invention.
The subject matter disclosed herein claims priority to U.S. Provisional Application Ser. No. 61/746,803, filed Dec. 28, 2012, entitled “Know Your Customer Exchange System and Method,” which is incorporated by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
61746803 | Dec 2012 | US |