Access to reliable and inexpensive banking and payment services is important for the advancement of developing economies and for decreasing the cost of processing payments in the developed world as well. According to the International Monetary Fund's Financial Access Survey, numerous countries in the world have less than a quarter of their gross domestic product matched by outstanding deposits with commercial banks. In many of these countries, available payment processing services are prohibitively expensive for daily commercial life or are completely unavailable due to the lack of payment processing infrastructure. Furthermore, regardless of the presence or absence of adequate infrastructure for traditional payment processing methods, payment processing consumes a percentage of nearly every commercial transaction, and thereby represents a drain on both developed and developing economies alike.
Registering new users is a cost critical endeavor for the administration of a payment service. First, as the number of users increases, the fixed costs of administrating a payment service decreases. Therefore, to the extent a more fluid registration system facilitates an increase in the number of registered users of a payment service, the per user cost of administrating the payment service also decreases. Secondly, registering new users exposes a payment service to the cost of fraudulent registrations. If proper care is not taken to verify the identity of a new user, fraudulent transfers can be made using the payment service that negatively impact payment processors through the direct monetary loss of the fraudulent transfer as well as the indirect costs of a loss of trust in the payment service. Finally, registering new users can be costly to the payment service as verifying new customers generally requires the time and attention of paid employees of the payment service, and costly to potential users of the system as they incur the stress and time consumption associated with navigating the verification and approval process of the payment service.
Traditionally, an account at a financial institution, such as a bank account, has certain fixed limitations on transactions that can be performed on it. Certain accounts, for example, may limit ATM cash withdrawals to $300 total per day. For transactions that fall outside the limitations, the account holder may be required to go through extra verification procedures. For example, for a cash withdrawal greater than $300, the account holder may be required to show a form of photo identification (for example, a driver's license) to a teller at a bank branch.
Typically, the account holder must go through these extra verification procedures every time a transaction falls outside the account's fixed limitations. Moreover, usually the account holder has no control over the fixed limitations—they are pre-set by the financial institution.
A process for facilitating the registration of a user of a payment service is provided. The process includes receiving an intent to register message from a user via an SMS message sent from a user mobile device. The user mobile device is associated with the user. The process also includes sending a query message to the user mobile device. The query message includes a request for a government identification number from the user. The process also includes verifying the government identification number against a collection of data entries provided by a third party. The process also includes sending a temporary validation code to the user mobile device. The process also includes receiving an updated PIN from a known POS terminal. The known POS terminal was previously registered with the payment service. The updated PIN replaces the temporary validation code. The process also includes sending a registration confirmation to the user mobile device.
A process for verifying a user for a payment system is also provided. The process includes receiving an intent to register message from a user mobile device via a text message system. The user mobile device is associated with a user. The process also includes calling the user to obtain know your customer details. The process also includes registering the user using for the payment system using the know your customer details. The process also includes sending a temporary validation code to the user mobile device. The process also includes receiving the temporary validation code from the user via a preapproved point of sale terminal. The process also includes sending at least a portion of the know your customer details to the preapproved point of sale terminal. The process also includes receiving a verification from a terminal operator via the preapproved point of sale terminal. The verification confirms that the user matches the know your customer details.
A process for registering a group of users for a payment service is also provided. The process includes receiving a bulk upload of user identification information for said group of users from a payment service participant financial institution. The user identification information includes a set of mobile phone numbers. The process also includes sending a temporary validation code to said users via a text message using said mobile phone numbers. The process also includes receiving said temporary validation code via a point of sale terminal. The process also includes registering said user for said payment system. The process also includes receiving a permanent identification code for said user to operate said payment system via said point of sale terminal.
The present disclosure relates to accounts used for monetary transactions. In particular, the present disclosure relates to configuring such an account.
Described herein are methods of creation and use of a type of financial transaction account that may be subject to transaction limitations. The financial transaction account can be created using a system having low overhead costs, minimal time commitment from the user, and widely available technology. The transaction limitations can be customized by the account holder, using pre-authorization techniques. This type of financial account may be associated with cash, credit, securities, or the like. In the following description, for purposes of explanation, numerous examples and specific details are set forth in order to provide a thorough understanding of the present disclosure. It will be evident, however, to one skilled in the art that the present disclosure as defined by the claims may include some or all of the features in these examples alone or in combination with other features described below, and may further include modifications and equivalents of the features and concepts described herein.
In this document, various computer-implemented methods, processes and procedures are described. It is to be understood that the various actions (receiving, storing, sending, communicating, displaying, etc.) are performed by a hardware device, even if the action may be authorized, initiated or triggered by a user, or even if the hardware device is controlled by a computer program, software, firmware, etc. Further, it is to be understood that the hardware device is operating on data, even if the data may represent concepts or real-world objects, thus the explicit labeling as “data” as such is omitted. For example, when the hardware device is described as “storing a record”, it is to be understood that the hardware device is storing data that represents the record.
As described above, for a typical account at a financial institution, transactions that fall outside certain limits often require extra levels of identity verification. The account holder must provide this extra verification each time such a transaction is requested. The embodiments described below obviate the need for this extra effort while still maintaining security for both the account holder and the financial institution. Transactions are thus streamlined. Also, the embodiments described below allow the account holder to have some input into the limitations placed on his accounts, while maintaining security for the account holder and the financial institution, and ensuring compliance with all appropriate financial regulations.
In one embodiment, an account has extra verification data associated with it. This data is stored and then keyed to more compact verification information—for example, to a mobile phone number and/or a user-defined personal identification number (PIN). The account holder can then perform transactions that would normally require extra identification procedures simply by providing this compact verification information.
In general, the account described herein is a regular bank account, possibly with added features. The account described herein may also be similar to the MOBI account, described in U.S. Patent Publication No. 2009/0024533 A1 for “Payment Systems and Methods” filed Aug. 29, 2007, or U.S. patent application Ser. No. 13/755,421 for “Self-authenticating peer-to-peer transaction” filed Jan. 31, 2013, both of which are owned by the assignee of the present invention, and both are incorporated by reference herein in their entirety.
The extra verification data provided at account configuration may also be required to satisfy various “know your customer” (KYC) regulations. These are regulations regarding which forms of identification are acceptable for various transactions. For example, these regulations may stipulate that customers wishing to make higher value transactions must present more secure forms of identity verification.
The configuration methods described herein are not limited to new accounts; existing accounts can be reconfigured using the same methods. The account holder may change the extra verification data associated with the account, and/or the limitations associated with the account may change automatically based on account usage data.
In the following descriptions, it is understood that all messages involved can be sent via a number of means; for example, wired or wireless voice or data channels, or the like. These means may be private or explicitly secure communication means; for example, encrypted voice or data channels, or the like. Communication means include (i) messages to and/or from a mobile device such as email messages, voice calls, data messages, text messages, messages sent via other applications (e.g., Facebook, Linked In, Skype and the like) and (ii) the same sort of messages sent to and/or from a stationary device such as a desktop computer or browser running on a television.
There are many examples of limitations 136 that could be associated with the account 135. Such examples include, but are not limited to, a maximum limit on cash withdrawals, or a maximum limit on purchases, or other maximum transaction limits; limitations on currencies in which transactions may be denominated; or limitations on transaction types (for example, on-line purchases may restricted, but point-of-sale purchases may be allowed). Other examples include: maximum deposit limits, limitations on the number of transactions in a given time period (e.g., day, week, or month), restrictions on the location of the transaction, restriction on type of item or service purchased, or a restriction on people to whom cash is sent.
Other identity verification information options may also be presented; for example, biometric information, such as fingerprint or retinal scans. This type of verification information may allow even higher transaction limits, for example, $5000 or $10,000. Different combinations of options may be available for different limitations—for example, both photo ID's and biometric information may be required for transactions involving certain currencies. Also, different levels may be set for different types of transactions; for example, a user may want to configure an account for a $500 purchase limit but a $100 cash withdrawal limit. In this way, an account may be configured with multiple limitations. Other limitation combinations—for example, limitations consistent with KYC regulations—may be available. Transactions on the account may still be subject to some limitations that are not based on the initiator's configuration choices; for example, a total cash withdrawal limit of $1000 per day may be fixed by the financial institution and not be configurable. The account server 130 may also request, in step 220, the initiator's mobile phone number, which may serve as part of the initiator's identification for each later transaction.
In step 230 of
The verification information requested may require specialized hardware to submit; for example, a fingerprint scanner. In this case, the initiator may visit an office, such as a bank branch, to complete the configuration procedure.
In step 240 of
The configuration method described in
The configuration method described in
As another embodiment, existing accounts may be reconfigured based on account usage data; for example, on account transaction history or average daily account balances.
As an example of such a transaction, the initiator may want to make a point-of-sale purchase. The merchant may send part of the transaction data—for example, the purchase amount—to the server. The initiator may then complete the purchase by sending to the server her secure PIN, for example. The server receives both pieces of this transaction data in step 410 of
In step 420 of
In the example illustrated in
For both of the systems depicted in
As set forth above, the present invention provides a multi-step system to pre-configure, and re-configure, accounts to operate with different limitations on transactions. In one specific example, this system may operate in the following manner:
The system as set forth herein also provides methods to verify later transactions with the pre-configured limitations described above. In one specific example, this system may verify transactions in the following manner:
A specific implementation of the account creation method described with reference to
In step 1201, an intent to register message is received from a user via an SMS messaging service. The message could be received by account server 130 via network 120. The user could be initiator 110. The intent to register message could be provided in response to a prompt advertised by the payment service provider. The prompt could have also been provided by a financial institution at which the user is already an account holder. The intent to register message could be as simple as a text including the letters “REG” sent to a given telephone number. The intent to register message could also include the user's mobile phone number or some other kind of personal information from which the user's mobile phone number could be accessed from a mobile operator's database or the database of a financial institution at which the user was already an account holder.
In step 1202, a query message is sent to the user to request verification information from the user. For example, the query message could be a request for a government identification number such as a driver's license number, a tax payer identification number, or a social security number. The query message can be delivered through various channels. For example, the query message could be delivered via a live customer service representative calling the mobile phone from which the user sent the intent to register message. As another example, the query message could be delivered via an automated telephone system that communicates with the user via a touch pad interface on the user's phone or an interactive voice response system.
The information requested by the query message can take on various forms. The query message could request a different kind of personal identification information and is not limited to government identification numbers. For example, the information could be a user's date of birth, mobile telephone number, first and last name, or any other kind of personal information that might be used to identify an individual. The kind of information that is requested by the query message will depend on the implementation. However, it is likely that in situations in which unbanked users are the target of a marketing effort, it will be beneficial to request more sensitive identification information at this early stage in the registration process. There are two reasons why more sensitive information can be requested at this stage in this particular implementation. First, unbanked users are less risk averse to identity theft and are therefore more willing to provide sensitive information when prompted. Secondly, the risk of fraud is greater with users that cannot prove a connection to a financial institution or established credit, and providing more sensitive information can generally provide a greater degree of security to the payment service.
In step 1203, the government identification number or other personal identification information is verified against a collection of data entries provided by a third party. For example, the data entries could be in a government curated database to which the payment service has access. With reference to
Verification step 1203 could also involve pulling additional identification information for a user from a third party database. In embodiments where a government identification number or other personal identification number is verified against a third party database, additional identification information relating to the verified user could be downloaded from the database and stored locally by the payment service. The downloaded personal information could be stored in account server 130 as an entry associated with a particular user's account. For example, after verifying a tax payer registration number against a government database, a picture of the verified user could be downloaded and stored in account server 130. As another example, after verifying a bank account number against a financial institution database, the full name and date of birth of the verified user could be downloaded and stored in account server 130.
In step 1204, a temporary validation code is sent to the user via an SMS messaging service. The temporary validation code can be any alphanumeric code that can be delivered via text messaging. The code could be all numbers or all letters. The temporary validation code may allow the user to conduct a limited set of transactions with their account. For example, the temporary validation code may be used to initiate a deposit into the account or transfer a preset amount from the account that was offered as an inducement to register. However, certain advantages accrue to versions of process 1200 in which the temporary validation code can only be used to initiate a second stage of the registration process from a trusted terminal. The temporary code could be delivered with simple text instructions for completing the registration procedure. As a specific example, the temporary code could be delivered with an address of a point of sale terminal that is operating in accordance with the payment service that is located in the same general location as the one from which the initiation request was sent.
Returning to
The point of sale terminal used in combination with step 1205 can be referred to as a “known” point of sale terminal because it has been preconfigured to operate with the payment service or to be operated in accordance with policies set by the payment service operator. The point of sale terminal could indeed be produced in accordance with specifications set by the operator of the payment service and be provided to merchants, pay centers, or banks to process payments using the payment service. The point of sale terminal could also be a standard point of sale terminal that was specially configured with software to make the terminal compatible with the payment processing service. Finally, the point of sale terminal could be a standard point of sale terminal that has not been specifically modified to work with the payment service, but that is configured to authenticate itself to the payment service such that the specific terminal can be identified and trusted.
The point of sale terminal can take on various forms. For example, the point of sale terminal could be a simple solitary unit having a key pad and small monitor for displaying data to a user. Furthermore, although the point of sale terminal has been referred to using the singular form, this is not meant to exclude systems having two different physical device. For example, a known point of sale terminal could comprise a first interface for a clerk or merchant on one physical housing, and another interface for a user located on another physical housing.
The use of a known point of sale terminals decreases the risk of fraudulent registrations. Since the payment service can have a special relationship with the operator of the point of sale terminal, a higher level of security is provided to the registration process. The operators of the point of sale terminals can be prescreened by the payment service. Furthermore, the payment service may require the point of sale terminal to be used only at a specific physical location to assist in tracking down fraudulent usage of the terminal. The payment service could also mandate certain levels of surveillance at the location in which the terminal is being operated at a condition of offering the payment service to people that bank or shop at that location. The added level of protection afforded by a known point of sale terminal offers additional benefits which become more apparent as the registration procedure is described in more detail below.
In step 1206, personal identification information is sent to the known point of sale terminal. The purpose of delivering this information is to allow the operator of the point of sale terminal to verify the identity of the user in order to move forward with the registration process. The information sent to the terminal could be the information that was collected during the initial portion of the registration procedure in response to the query message sent in step 1202. The information sent to the terminal could be information that was provided directly by the user in response to the query, or it could be information that was accessed based on the information provided by the user during verification step 1203. For example, the user may have provided a driver's license number in response to the query, and the same number could be delivered to the known point of sale terminal in step 1206. As another example, the user may have provided a government identification number which was used to access other personal identification information such as the user's name and date of birth, and that other personal identification information could be delivered to the known point of sale terminal in step 1206. The information could also include a picture of the user, biometric data associated with the user, or identification information already being used by another entity to identify that particular user such as a store affinity account number.
The disassociation of the information provided by the user in the initial phase of the registration procedure and the information provided to the point of sale terminal for the second phase of the registration procedure provides significant benefits. Since the point of sale terminal is secure, the payment service can deliver this personal information for verification without exposing the user to the risk of identity theft. Furthermore, the fact that the government identification number can be used to access less sensitive data will provide the payment system operator with the security of knowing the user had access to that more sensitive information while the operator of the point of sale terminal is not provided access to that information. Thereby, a high degree of security is provided to the payment service provider while also providing a high degree of security to the user because any operator in the network of the payment system is not provided with the more sensitive identification information.
The verification procedure performed by the operator of the point of sale terminal will depend on the kind of information that is delivered to the point of sale terminal. For example, if the information delivered is a driver's license number, the verification procedure will involve the operator physically inspecting the user's license and confirming their identity via an interface presented by the point of sale terminal. If the information delivered is a user's full name and date of birth, the verification procedure will involve the operator physically inspecting any suitable form of identification that can confirm the user is the same person as was identified in the first phase of the registration procedure.
Returning to
A process for registering a user for a payment service in which the initial request for information to the user is sent via a telephonic voice channel can be described with reference to
In step 1302 of process 1300, a live customer service representative will call the user to obtain personal information from the user and continue the registration process. The personal information can comprise KYC details necessary for complying with money laundering or commercial payment processing regulations. An example of this step is show as operation flow line 1405 in
In step 1303, the customer service representative will register the user with the payment system using the personal information obtained from the user via telephone. An example of this step is shown as operation flow line 1407 in
Once the personal information has been entered by the customer service representative, the payment service will send a temporary validation code to the user via text message in step 1304. An example of this step is shown as operational flow line 1408 in which the temporary validation code is sent from payment service platform 1403 to user 1401. Customer service representative 1402 could also receive the temporary validation code information via portal 1406 and convey the information over the telephone to user 1401. However, certain benefits accrue to a process in which the temporary code is sent directly to the user via SMS. First, the temporary authorization code will be sent to the mobile phone of the user which will provide an added degree of certainty to assure that the person that is conducting the registration process is the same person as the person whose name the account is being opened in. Secondly, the customer service representative will not be exposed to the temporary registration code even though they are using the same portal that a user opening an account in their own name would utilize. This provides another degree of security to the potential user and also enhances the utility of using the same web portal for registering users directly and through customer service representative 1402.
Returning to
Process 1300 and 1200 could also include issuing a near field communication (NFC) tag to the user. The NFC tag could be associated with a merchant's promotional program or it could be provided to the operator of the point of sale terminal by the payment service provider. The NFC tag could be encoded at the point of sale terminal such that it stored the permanent PIN provided by the user. The user would then be able to enter their PIN at a point of sale terminal simply by swiping their NFC tag near a reader. In the alternative, the permanent PIN could be an identifier associated with the NFC tag that was not configurable by the user. The NFC tag could, for example, have a number burned into it when it was manufactured or prior to being delivered to an end user. This number would be provided by the operator at the point of sale terminal while the final portion of the registration was being completed such that the number would be associated with the user and stored in a payment service database. This approach could provide certain benefits because the numbers associated with the NFC tag could be locked from access until the registration procedure was completed such that no one would be able to obtain the NFC tag's number before it was issued to the user. For example, the NFC tag identifier would be swiped by the point of sale terminal operator and the associated number would be sent to the payment service in step 1308 without the terminal operator ever seeing the associated identifier.
An implementation of process 1300 can be described with reference to
Processes illustrated by flow diagram 1500 differ most notably from those in flow diagram 1400 because flow lines 1405 and 1407 have been replaced with flow lines 1506 and 1507. Operational flow line 1505 can involve the same intent to register messages that were discussed with reference to flow line 1404. However, operational flow line 1506 involves a call from an automated system controlled by payment service platform 1503 to user 1501 instead of a call from a live customer service representative. The automated system can trigger a phone call immediately after processing the intent to register message or it can place calls according to a specified schedule such as when a cost of air time is at a minimum. Operational flow line 1506 will involve a request for a government identification number or some other form of personal identification information. For example, the request could be for a taxpayer reference number or a social security number. Operational flow line 1507 involves the delivery of the requested information from potential user 1501 to payment service platform 1503. The information could be provide by user 1501 entering the information via a key pad or via an interactive voice response system.
After operational flow line 1507, flow diagram 1500 could move on to various illustrated steps. For example, if the information obtained in step 1507 was safe to transmit directly to a point of sale terminal, the information could be stored for the next phase of the registration process and the procedure could move directly to step 1510 in which a temporary registration code was delivered to user 1501 via payment service platform 1503. The information sent in accordance with this operational flow line could match the information sent in accordance with operational flow line 1408. If the information provide in step 1507 needed to be verified to meet KYC requirements, or it needed to be used to access a database to obtain a different set of personal information, the operational flow could continue with operational flow line 1508. In operational flow line 1508, the information provided in operational flow line 1507 is sent from payment service platform 1503 to outside database 1504. For example, the information obtained in step 1507 could be a taxpayer registration number, and outside database 1504 could be a government curated database. In operational flow line 1509, additional personal information identifying the user could be downloaded from outside database 1504 for the payment service platform 1503. This information could include a full name of a potential user and the user's date of birth. However, additional information does not need to be provided by outside database 1504, and operational flow line 1509 could simply comprise an acknowledgment verifying the data provided in operational flow line 1508. Note that operational flow diagram 1400 could have also included an outside database that would be used by the payment service platform 1404 between operational flow lines 1407 and 1409, but it was omitted in that diagram to emphasize other features of that particular process.
A process 1600 of the bulk registration of potential users of the payment system can be described with reference to
Process 1600 continues with step 1602 in which a temporary validation code is sent to each of the users for which identifying information was provided to the payment service in step 1601. The temporary validation codes could be sent via text message to the users. If mobile phone data was provided in step 1601, that mobile phone data could be used to send the text messages in step 1602. In specific implementations of process 1600, the temporary validation code could be sent to a limited subset of the users for which bulk upload information was provided in step 1601 such as only those users for whom a mobile telephone number was provided.
The temporary validation code could be sent along with an incentive to register for the payment system. The incentive could be sent in the same text message as the temporary validation code. The text message could include an offer for a monetary payment to be redeemed in cash upon providing the temporary validation code at a location having a known point of sale terminal. The text message could also include an offer for a temporary reduction in transaction fees using the payment service. The text message could also include an offer for participation in a lottery in which each new registrant to the payment system in a limited amount of time was a participant in the lottery. The prize in the lottery could be money deposited into the payment service account associated with the winning participant.
Process 1600 will then progress with steps that are largely in accordance with steps 1205, 1206, and 1207 from process 1200 or steps 1305, 1306, 1307, and 1308 from process 1300. These steps are represented collectively by step 1603 in process 1600. Corresponding steps are illustrated by operational flow diagram 1700 in
After the new user is registered with the system, the user may be able to use the payment system in combination with an account held by the financial institution from which their data was provided. For example, any payment using the payment system after registration could involve sending an authorization to the point of sale terminal that confirmed the account with the financial institution had sufficient funds or credit to be able to affect payment. Other kinds of account associated with the payment system could also contain funds or credit as soon as they are registered. For example, a government entity may have provided funds to an account associated with the payment system so that the money would be available to the account holder as soon as they registered with the system. Likewise, any entity providing the bulk upload information could have pre-set accounts with funds or credit for the potential users of the payment system such that the accounts could instantly be used to conduct transactions as soon as a user completed registration. Effecting payment for the transaction could include transferring funds between accounts in real time. Effecting the payment could also include providing an authorization and then transferring funds between accounts at a later time during a batch settlement process involving the terminal operator, the payment service, and the financial institution.
The above description illustrates various embodiments along with examples of how aspects of the present invention may be implemented. For example, direct communication, U.S. mail, phone calls, text messages, data messages or e-mail through wired or wireless voice or data channels, encrypted or not encrypted, and the like may all be considered communication means. A mobile device may be a mobile phone, two-way pager, tablet or notebook computer, and the like. A compact identifier may be a PIN, or a pseudorandom code, or the like. Secure identity verification may be a photograph of one of the transacting parties, or a photograph of identification documents, such as a passport, license, or utility bill, or the like, or biometric information such as a fingerprint or retinal scan.
The above examples and embodiments should not be deemed to be the only embodiments, and are presented to illustrate the flexibility and advantages of the present disclosure as defined by the following claims. Based on the above disclosure and the following claims, other arrangements, embodiments, implementations and equivalents will be evident to those skilled in the art and may be employed without departing from the spirit and scope of the disclosure as defined by the claims.
This application is a continuation-in-part application of application Ser. No. 13/786,408, filed Mar. 5, 2013, which is incorporated herein by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
Parent | 13786408 | Mar 2013 | US |
Child | 13957246 | US |