The present invention relates to methods and systems that assist with the operation and management of a financial transaction system.
Customers of financial institutions (both individual customers and businesses) typically maintain multiple financial accounts at one or more financial institutions. Financial institutions include, for example, banks, savings and loans, credit unions, mortgage companies, lending companies, and stock brokers. These financial accounts include asset accounts (such as savings accounts, checking accounts, certificates of deposit (CDs), mutual funds, bonds, and equities) and debt accounts (such as credit card accounts, mortgage accounts, home equity loans, overdraft protection, and other types of loans).
It is desirable to provide financial transaction systems that are capable of implementing transactions such as transfers of funds between various financial accounts at one or more financial institutions. Prior to implementing any financial transaction for a particular user or involving a particular account, it is important to authenticate the identity of the user requesting the transaction, authenticate that user's permission to implement the requested transaction, and evaluate any risks involved with the user, the requested transaction, or the accounts involved in the requested transaction.
Further, it is desirable to monitor various financial transactions and make adjustments to transaction limitations and restrictions as needed. This type of monitoring may indicate trends or potential problems for particular accounts or customers.
The systems and methods described herein assist with the handling and monitoring of various financial transactions and other functions performed by a financial transaction system.
The systems and methods described herein assist with processing and monitoring financial transactions and other activities performed by a financial transaction system or a financial transaction service provider. These systems and methods can aggregate various types of data from multiple sources to generate, for example, a display or report that summarizes financial transactions, account information, account status, account holder information, fees collected for various financial transactions, risk profile data and/or other information. Additionally, administrators may be permitted to modify account status information or settings based on the information received. For example, transaction limits for a particular customer may be raised or lowered based on various information and guidelines of a financial institution or other entity. If an administrator for one entity changes limits for a particular customer beyond a threshold value, financial risk for that customer's transactions may pass to the entity making the changes. These systems and methods assist with the management of financial transaction data and the handling of customers and their account privileges.
As used herein, the terms “account holder”, “customer” and “client” are interchangeable. “Account holder” refers to any person having access to an account. A particular account may have multiple account holders (e.g., a joint checking account having husband and wife as account holders or a corporate account identifying several corporate employees as account holders). Various financial account and financial institution examples are provided herein for purposes of explanation. However, it will be appreciated that the systems and procedures described herein can be used with any type of financial account or financial institution. Exemplary financial institutions include banks, savings and loans, credit unions, mortgage companies, mutual fund companies, lending companies and brokerage companies.
A wireless device 112 and a client computer 114 are also coupled to network 108. Wireless device 112 may be a personal digital assistant (PDA), a handheld or portable computer, a cellular phone, a pager, or any other device capable of communicating with other devices via a wireless connection. A financial information provider 116 is coupled between network 108 and client computer 114.
Network 108 may be any type of data communication network using any communication protocol. Further, network 108 may include one or more sub-networks (not shown) which are interconnected with one another.
The communication links shown between the network 108 and the various devices (102-106 and 110-118) shown in
Each of the financial institution servers 102, 104, and 106 are typically associated with a particular financial institution and store data for that financial institution, such as customer account data. In alternate embodiments, each financial institution server may be associated with a different financial institution.
Financial transaction system 118 performs various actions, such as financial analysis, funds transfer, customer authentication and account verification. The financial analysis actions may include analyzing one or more accounts and making recommendations to reduce service charges, reduce interest paid by a customer, or increase interest earned by a customer. Funds transfer actions include transferring funds between two or more accounts registered to the same customer or registered to different customers or entities. Funds can be transferred between two individuals or between an individual and an organization. Customer authentication and account verification actions may include authenticating the identity of an individual requesting a transaction, authenticating the individual's permission to implement the requested transaction, or evaluating risks associated with the requested transaction.
Various techniques are available to authenticate an individual and validate accounts. These techniques include, for example, verifying information provided by an individual, such as the individual's name, address, social security number, or driver's license number. Other techniques include validating address information with the United States Postal Service and validating various information with one or more credit reporting agencies or other data providers. Other data providers include, for example, data providers that collect phone numbers, cellular numbers, addresses, etc. and provide that data to others via a database or other data storage system.
Account information can be authenticated, for example, by having the individual submit a voided check, recent bank statement, or other document related to the account. Account information may also be authenticated by “harvesting” or “scraping” information from one or more web pages based on customer-provided account access information. This method of obtaining information is referred to as “data harvesting” or “screen scraping”. Various other techniques and procedures are available to authenticate a customer's identity and validate account information.
Support server 110 is capable of performing various operations that assist with the operation and management of financial transaction system 118. Additional details regarding support server 110 are discussed below. In a particular embodiment, the functions of support server 110 and financial transaction system 118 are merged into a single system. In other embodiments, a particular network environment may contain any number of support servers 110 and any number of financial transaction systems 118.
Wireless device 112 and client computer 114 allow a customer to access information via the network 108. For example, the customer can access account information from one of the financial institution servers 102, 104, or 106, or send a request for an analysis of the customer's financial accounts to financial transaction system 118. Financial information provider 116 acts as an intermediary between client computer 114 and other devices coupled to network 108. For example, client computer 114 generates a request for data or account analysis and communicates the request to the financial information provider 116. The financial information provider 116 then retrieves the requested data or initiates the requested account analysis on behalf of the user of client computer 114.
Computer 180 includes at least one processor 182 coupled to a bus 184 that couples together various system components. Bus 184 represents one or more of any of several types of bus structures, such as a memory bus or memory controller, a peripheral bus, and a processor or local bus using any of a variety of bus architectures. A random access memory (RAM) 186 and a read only memory (ROM) 188 are coupled to bus 184. Additionally, a network interface 190 and a removable storage device 192, such as a floppy disk or a CD-ROM, are coupled to bus 184. Network interface 190 provides an interface to a data communication network such as a local area network (LAN) or a wide area network (WAN) for exchanging data with other computers and devices. A disk storage 194, such as a hard disk, is coupled to bus 184 and provides for the non-volatile storage of data (e.g., computer-readable instructions, data structures, program modules and other data used by computer 180). Although computer 180 illustrates a removable storage 192 and a disk storage 194, it will be appreciated that other types of computer-readable media which can store data that is accessible by a computer, such as magnetic cassettes, flash memory cards, digital video disks, and the like, may also be used in the exemplary computer.
Various peripheral interfaces 196 are coupled to bus 184 and provide an interface between the computer 180 and the individual peripheral devices. Exemplary peripheral devices include a display device 198, a keyboard 200, a mouse 202, a modem 204, and a printer 206. Modem 204 can be used to access other computer systems and devices directly or by connecting to a data communication network such as the Internet.
A variety of program modules can be stored on the disk storage 194, removable storage 192, RAM 186, or ROM 188, including an operating system, one or more application programs, and other program modules and program data. A user can enter commands and other information into computer 180 using the keyboard 200, mouse 202, or other input devices (not shown). Other input devices may include a microphone, joystick, game pad, scanner, satellite dish, or the like.
Computer 180 may operate in a network environment using logical connections to other remote computers. The remote computers may be personal computers, servers, routers, or peer devices. In a networked environment, some or all of the program modules executed by computer 180 may be retrieved from another computing device coupled to the network.
Typically, the computer 180 is programmed using instructions stored at different times in the various computer-readable media of the computer. Programs and operating systems are often distributed, for example, on floppy disks or CD-ROMs. The programs are installed from the distribution media into a storage device within the computer 180. When a program is executed, the program is at least partially loaded into the computer's primary electronic memory. As described herein, the invention includes these and other types of computer-readable media when the media contains instructions or programs for implementing the steps described below in conjunction with a processor. The invention also includes the computer itself when programmed according to the procedures and techniques described herein.
For purposes of illustration, programs and other executable program components are illustrated herein as discrete blocks, although it is understood that such programs and components reside at various times in different storage components of the computer, and are executed by the computer's processor. Alternatively, the systems and procedures described herein can be implemented in hardware or a combination of hardware, software, and/or firmware. For example, one or more application specific integrated circuits (ASICs) can be programmed to carry out the systems and procedures described herein.
Support server 220 also includes a data collection module 224 that locates, identifies and retrieves data from various sources, such as financial institution databases, web pages, credit reporting agencies, driver's license databases and other data sources. The retrieved data is stored in on one or more storage devices in support server 220 or coupled to support server 220. For example, account and transaction data 226, and customer data 228 is stored on a storage device in support server 220. Account and transaction data 226 includes various account information and details regarding financial transactions implemented or handled by one or more financial transaction systems. Customer data 228 includes information such as name, address, phone number and account numbers for a particular individual or entity.
Support server 220 also includes a report generator 230 which is capable of generating reports summarizing various financial information and related data. Additional information regarding the types of data that may be included in these reports is discussed below. A display module 232 creates data that can be used to generate a display containing customer information, financial information and other data as discussed in greater detail herein.
Support server 220 further includes a search module 234, an update module 236 and an analysis module 238. Search module 234 allows a user (or administrator) of support server 220 to search for data based on customer information, account information, financial transaction type, etc. Update module 236 allows an administrator of support server to update information regarding, for example, customers, accounts and privileges. Additional details regarding updating information are discussed below. Analysis module 238 is capable of analyzing financial transactions, authentication and validation information, and other data that is provided to, for example, account holders, financial institutions and financial transaction service providers.
The customer profile screen display 250 includes a first section 252 (also referred to as a “menu bar” or “menu section”) that identifies seven categories of information that can be displayed (Customer Profile, Customer Performance, Identity Authentication, Account Ownership, Service Type, Transaction Summary and Risk Management). Certain categories in section 252 may have one or more sub-categories or sub-menus. In the example of
The next section (section 254) contains identification information about a particular customer, John Smith. Section 254 includes the customer's identification number, social security number and other identifying information. A status section 256 identifies the status of various services and identity authentications, and information regarding the customer's accounts. Status section 256 includes a listing of services enabled for the customer. These services include, for example, standard services (i.e., standard transaction amounts and settlement times), jumbo services (higher transaction amounts and/or more frequent transactions), account-to-account transactions, NDT (next day transfer) outbound and NDT inbound services.
An address section 258 includes the customer's current and former addresses as well as the address associated with the customer's driver's license. An email section 260 identifies the customer's primary and secondary email addresses as well as the validation status of each email address. Finally, a partner name section 262 identifies a partner (e.g., another entity, such as a financial institution) through which the customer implements financial transactions such as the transfer of funds between accounts at the same or different financial institutions. Although not shown in
Although not shown, an administrator of a support server or other system can select a particular customer to view by searching for the customer's name, address, phone number, account number, or various other customer identifiers. If the search criteria selects multiple customers, the administrator may be presented with the list of multiple customers from which the administrator selects the desired customer.
Although not shown in
A menu section 352 shows that the “Identity Authentication” category is selected. A decision section 354 indicates whether ID verification is complete. Additionally, decision section 354 provides an identity of the customer as well as the services that are enabled and how the authentication decision was made (e.g., by “Equifax Key 54321”). An authentication information section 356 identifies the authentication score associated with the customer. This authentication score is based on the results of attempts to authenticate the customer's identity through various sources and methods. The authentication score is used, for example, to set limits on financial transactions that can be executed by the customer and to determine the types of financial transactions that the customer can implement. These limits may include limits on the number of transactions each month, the maximum amount of each transaction, the number of days until the transaction settles, etc.
A code section 358 identifies the reason codes associated with a particular final score. Each reason code has an associated description. An original application information section 360 displays information submitted by the customer on their original application (e.g., an application to utilize the services of the financial transaction system).
Although not shown in
Although not shown in
Although not shown, a service type screen display may be generated to display the service types that are enabled for a particular customer. This screen display may also include various limits associated with each service type and how much of each service type limit has been used by the customer. Additionally, a transaction summary screen display can be generated to display information regarding a customer's financial transactions. This information may include, for each transaction, the type of transaction, the financial accounts involved in the transaction, the transaction status, the service type, the transaction amount and the entity that assumed the financial risk for the transaction. Additional information regarding assumption of financial risk for a transaction is provided below.
A service type section 458 identifies each of the service types available to the customer and the status of each service type. An administrator can modify the status of any of the service types by selecting an appropriate entry from the pull-down menu associated with each service type. Service type section 458 also includes information regarding the date on which the last modification was made.
An account section 460 includes a listing of the customer's accounts and the status of each account. Account section 460 also identifies the verification method used for each account and the service types available for each account. An administrator can modify the settings of each service type for each account using the pull-down menu associated with each account/service type. Account section 460 also includes information regarding the date on which the last modification was made.
Although not shown, additional risk management screen displays allow an administrator to suspend or terminate a customer's financial transaction privileges, reset the customer's password, or modify any other privileges or parameters associated with the customer or the customer's accounts. Other screen displays allow an administrator to override particular limits and restrictions on a customer or a customer's accounts. These changes can be performed in real time such that the changes are implemented within a few seconds, thereby avoiding a delay in entering the changes. Such a delay might prevent a customer from implementing a transaction when desired or might allow a transaction that should have been disallowed.
Various examples discussed herein relate to various user attributes, privileges, and the like. However, these same attributes and privileges may be applied to a group or a role. One or more individuals may be assigned to the group or role, thereby inheriting the attributes and privileges of that group or role. Thus, changes to a single group or role affect all individuals associated with that group or role. Different groups may have different privileges. For example, a member of a “manager” group may be able to override default account access privileges of an account holder. A member of a “product manager” group may be limited to receiving reports and is not permitted to change account access privileges. A member of a “customer service” group may be permitted to make changes within certain guidelines. Any changes outside those guidelines would require manager approval.
At block 504, a financial institution (or other entity) modifies the service level assigned to the account. Thus, the original service level assigned by the financial transaction service provider has been modified by another entity. The procedure determines whether the modification to the service level is within the restrictions imposed by the financial transaction service provider (block 506). If so, the procedure accepts the modification (block 508). However, if the modifications to the service level are not within the restrictions imposed by the financial transaction service provider, the modifications are accepted but financial risk for the account is transferred to the financial institution or other entity making the modification (block 510). Thus, a financial institution can override the restrictions of the financial transaction service provider, but the financial institution must then accept the financial risks associated with that account.
If the financial institution (or other entity) later changes the service level back to a level that is within the restrictions imposed by the financial transaction service provider, the financial risk for the account transfers back to the financial transaction service provider.
The procedure continues by authenticating each of the multiple accounts associated with the account holder (block 554). If one or more of the multiple accounts are not authenticated, information regarding those accounts is not retrieved or displayed. Next, the identity of the account holder is verified (block 556). If the account holder's identity is not verified, data is not displayed to the account holder. If the account holder's identity is verified, the procedure aggregates financial data associated with the multiple accounts (block 558). The aggregated financial data is then displayed (block 560). The aggregated financial data may include any type of information regarding one or more financial accounts, one or more financial institutions, one or more account holders, and the like. The types of financial data displayed include the various types of data discussed herein and illustrated in the accompanying figures.
The various exemplary screens displayed in the accompanying figures and discussed above represent a particular set of data and a particular arrangement of data. The systems and methods described herein can be used to aggregate and display any type of data, from any number of sources.
Although not shown, additional screen displays allow customers and/or administrators to access message boards for exchanging information, questions, etc. Other screen displays include information changes to the customer's address, phone number and email address.
Although the description above uses language that is specific to structural features and/or methodological acts, it is to be understood that the invention defined in the appended claims is not limited to the specific features or acts described. Rather, the specific features and acts are disclosed as exemplary forms of implementing the invention.
This application is a divisional of U.S. application Ser. No. 10/402,855, filed Mar. 28, 2003, which is a continuation-in-part of U.S. application Ser. No. 10/040,929, filed Dec. 31, 2001, now U.S. Pat. No. 8,249,983, issued Aug. 21, 2012, which is a continuation-in-part of U.S. application Ser. No. 09/665,919, filed Sep. 20, 2000, now U.S. Pat. No. 7,383,223, issued Jun. 3, 2008, the contents of which are incorporated herein in their entireties.
Number | Date | Country | |
---|---|---|---|
Parent | 10402855 | Mar 2003 | US |
Child | 14057483 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 10040929 | Dec 2001 | US |
Child | 10402855 | US | |
Parent | 09665919 | Sep 2000 | US |
Child | 10040929 | US |