The present disclosure relates to identification and identity validation and verification. In particular, the present disclosure relates to systems and methods for performing customer identification and customer's identity and address validation and verification services using an account identifier and historical information associated with an individual.
Around the world, businesses and governments daily contend with the need to verify the identity of their customers or other individuals. In part, this is due to the good business practice of knowing the identity of a customer before doing business with them. It also is a regulatory requirement in many jurisdictions. For example, most countries have regulations (often referred to as “know your customer” or “KYC” regulations) that impose due diligence requirements on financial institutions, government agencies and other regulated companies. The due diligence requirements ensure that these businesses and agencies require their customers to provide detailed identity information before providing certain financial services or other products or services to their customers. KYC requirements include due diligence requirements to prevent money laundering (referred to as “Anti Money Laundering” rules) and Combating Financing of Terrorism (CFT).
Other business environments also need similar verification requirements. For example, many businesses have a continuing need to verify bank and payment accounts that are used for either direct debit functionality for recurring payments (such as bill payments, insurance payments, etc.) and external account linking for funds transfer where micro deposit validation is a common practice but takes too much time because of the manual work involved.
Further, as electronic funds transfer (“EFT”) systems mature, they are implement “pull EFT/Direct Deposit” functionality that is aimed at allowing merchants to initiate a payment request directly from consumer bank accounts. This process does require a one—time mandate set up and validation, which could take a week or so, and involves significant logistical costs in manually sighting and validating consumer signature etc. There are also significant costs of archival and retrieval of said data. It would be desirable to reduce the time and cost required for such activities.
Similarly, external bank account linking, which is used for inter-bank funds transfer today uses a micro deposit validation into the external bank account that is manual and time consuming process. It would be desirable to improve this process.
To satisfy many of these KYC requirements, businesses may require that a consumer provide information to prove their identity. Such information may include, for example, a passport or other government-issued identification, one or more items proving their current address, and one or more items proving their date of birth or other information. For example, a consumer who wishes to open a bank account in Singapore may be required to present their passport, their Singapore National ID number, and a copy of one or more items proving their current address. This information is provided to an authorized employee of the bank at which the customer wishes to open an account and the employee enters the information into the banks KYC systems.
If the customer also wishes to purchase a mobile telephone and/or obtain a new SIM card for a mobile telephone, he is again required to provide the same information proving his identity and address. This can become inconvenient and cumbersome for consumers. Further, each merchant, business or other entity that needs to verify the identity of their consumers incurs substantial cost and effort in performing the verification as often such customer identification and verification procedures are manual in nature.
It would be desirable to provide systems and methods that facilitate authenticating a user based on his/her identity and address.
To alleviate problems inherent in the prior art, the present embodiments introduce systems and methods where a user identity may be verified substantially in real-time and in the course of a transaction.
The present embodiments may be associated with a “user” who is seeking to access a product or service in which the user's identity (or information associated with the user) requires validation. As used herein, the term “user” might refer to, for example, a person (or entity) who executes transactions with merchants or service providers. As used herein, the term “user account” might refer to, for example, any financial account associated with or controlled by the user to perform financial transactions. For example, a user account might be a bank account, a credit card account, a debit card account, a prepaid account, a loan account, or the like. These, and other, terms will be used to describe features of the present embodiments by reference to the following detailed description, the appended claims and the drawings provided herewith.
For purposes of illustrating features of the present embodiments, a simple example will now be introduced and referenced throughout the disclosure. In the illustrative example, a customer (named “John Doe”) wishes to sign up for a cellular phone service. John Doe has a bank account at his local bank, and he has a MasterCard branded credit card that is issued by his bank and that he uses frequently for purchases. The cellular phone service that John wishes to sign up for uses the authentication techniques described herein. The cellular phone service provider is called “Phone Co.,” and Phone Co. has engaged the services of an authentication service called “Authentication Co.” which offers authentication services pursuant to the embodiments described herein. Those skilled in the art will recognize that this example is illustrative and not limiting and is provided purely for explanatory purposes.
Turning now in detail to the drawings,
The authentication method 100 of
The user device 210 may comprise, for example, a personal computer (PC), a mobile device (such as a smart phone, a tablet computer, or the like). A user, such as John Doe, may use the user device 210, for example, to register, to access, or to utilize services offered by the merchant, and may also use the user device 210 to complete an authentication process pursuant to embodiments described herein. The user device 210 may transmit information identifying the user (e.g., via a redirect, via an HTTP post, a Web services interaction or the like).
When the user device 210 accesses the merchant's website, as illustrated by flow (1) in
At the identity authentication device 230, John's account identifier may be entered. For example, John Doe may be asked to provide a primary account number (or “PAN”) from his MasterCard®-branded credit card (e.g., the 16-digit number embossed or printed on the face of John's card). This information may be entered into Authentication Co.'s authentication system via a webpage displayed on John's computer that points to Authentication Co.'s authentication system and thus John's PAN will be entered into Authentication Co.'s authentication system for processing.
Referring back to
To authenticate John, the identity authentication device 230 may transmit an account identifier, such as John's MasterCard® credit card primary account number, to a payment card issuer 250 via a payment network 240, as illustrated at flows (3) and (5) of
For example, John's MasterCard credit card primary account number may be transmitted to a device or system associated with the issuer of the payment card (payment card issuer 250) via a payment network (such as the payment network operated by MasterCard or the like). The payment card issuer 250 will be described in more detail with respect to
Referring back to
Authentication Co.'s authentication system may transmit identity verification information comprising (i) government-issued identification information associated with the John and/or (ii) a level of available identity verification information associated with John. For example, the authentication system may transmit John's government-issued identification to Phone Co. The government-issued identification may comprise John's national identification number, such as, but not limited to, a social security number (“SSN”), a birth certificate number or any other similar government issued identification. In another example, the authentication system may transmit a level of available identity verification information associated with John. For example, a level of available identity verification information may indicate that John's identification and John's address has been verified within a predefined time frame.
Each merchant may require a different specific time frame in which a user's identification and address has been verified by an authentication system. In some embodiments, a user's address may be verified by receiving or scanning recent items that indicate the user's address such as, but not limited to, bills that were paid by the user where the bills indicate the user's address. For example, the authentication system may receive a heating oil bill, an electric bill, a telephone bill, etc. where each bill indicates the user's home address. The user's identification may be verified by a government-issued identification such as, but not limited to, a passport, birth certificate and/or driver's license that may also indicate the user's home address. Since some merchants may require verification of a user's identification to have been performed within a specific time frame, the authentication system may also store dates associated with when a government-issued identification was last reviewed. Time frames will be discussed in further detail with respect to
According to some embodiments,
In addition, the identity authentication device 300 may include an authentication engine 340 that may communicate with a processor 350. The processor 350 may also be in communication with a local input device (not shown in
The processor 350 may include or otherwise be associated with dedicated registers, stacks, queues, etc. that are used to execute program code and/or one or more of these elements may be shared there between. In some embodiments, the processor 350 may comprise an integrated circuit. In some embodiments, the processor 350 may comprise circuitry to perform a method such as, but not limited to, the method described with respect to
The processor 350 may also be in communication with a storage device 360. The storage device 360 may comprise any appropriate information storage device, including combinations of magnetic storage devices (e.g., magnetic tape and hard disk drives), optical storage devices, and/or semiconductor memory devices such as Random Access Memory (RAM) devices and Read Only Memory (ROM) devices.
The storage device 360 may comprise a non-transitory computer-readable medium to store a program for controlling the processor 350. The program may be stored in a compressed, un-compiled and/or encrypted format. The program may furthermore include other program elements, such as an operating system, a database management system, and/or device drivers used by the processor 350 to interface with peripheral devices.
The processor 350 may perform instructions of the program, and thereby operates in accordance with the present embodiments. For example, the processor 350 may receive data associated with a user to be authenticated, and then use that data to query a payment card issuer via a payment network, and then present the data to a merchant according to the rules from an authentication rules database.
The authentication engine 340 may operate to execute processor-executable process steps so as to control the identity authentication device 300 to provide desired functionality. The identity authentication device 300 further includes a web engine 320 to provide a user interface for a user device 210 to enter information into the identity authentication device 300. Note that the web engine 320, authentication engine 340, storage 360 and communication device 330 may be co-located with, or remote from, the identity authentication device 300. The identity authentication device 300 may operate in accordance with any of the embodiments described herein.
The payment card issuer device 400 may also include a processor 410, like the processor 350. The processor 410 may be in communication with a storage device, such as storage device 430. The storage device 430 may comprise any appropriate information storage device, including combinations of magnetic storage devices (e.g., magnetic tape and hard disk drives), optical storage devices, and/or semiconductor memory devices such as Random Access Memory (RAM) devices and Read Only Memory (ROM) devices. In some embodiments, storage device 430 may be remote from the payment card issuer device 400 and thus, storage device 430 may be accessible by the identity authentication device 300.
The storage device 430 may store an identity verification database 500 and a customer authentication rules database 600. Now referring to
The account identifier 502 may be, for example, an alphanumeric code associated with a particular payment account (e.g., in the case of a credit card or other payment card, the account identifier may be the PAN associated with the account). The government-issued identification 504 may include a social security number, a birth certificate number, a passport number or any other similar government-issued identification. In some embodiments, the identity verification database 500 may define a field for a type of government-issued identification (not shown in
The merchant identifier 602 may be, for example, an alphanumeric code associated with a particular merchant that seeks to use the authentication service. The time rage 604 may be based on hours, days, months, years, etc. The number of confirmed documents 606 specifies a number of documents that contain address information that must be confirmed for each user. For each document that contains a confirmed address, a recent bill might be used to verify a postal code as well as a street address. In some embodiments, the bill might be issued within the time rage to be considered qualifying address confirming document. Similarly, if indicated in 608 a government-issued identification as well an address may also need to be verified within the time range 604.
Referring to the illustrated example in
Referring to the illustrated example, when John Doe accesses Phone Co.'s website, John may be asked to manually enter information such as his name, address, date of birth, and government-issued identification. John may also have an option to use an identity service as described herein. If John selects the identity service, he may be redirected to an identity service page where John can enter his MasterCard® PAN.
In the user interface 800 of
Referring again to the illustrative example introduced above, John Doe, after providing his MasterCard® payment card login information, as illustrated in
Establishing and adhering to KYC requirements may be a significant cost for most businesses and by using a payment card service to validate identity, such as a MasterCard platform to securely retrieve and validate users identity, businesses & Governments can save on identity validation costs, physical infrastructure and personnel, and have better conversion for their sales processes. Consumers may benefit from having a single service that allows a user to sign up online, without having to enter identity validation data repeatedly. A user can store his identify validation data with a financial institution that they trust, and bank with so that information to be shared securely with other entities that the user does business with.
The network packet 900 may be used to transmit data on the payment network and may be based on an ISO 8583 network packet. The network packet 900 may comprise information derived from a payment card (e.g., an account number), a terminal (e.g., the merchant number) together with other data. Conventional ISO 8583-based network packets are used to either authorize or decline a transaction and generate a response to be delivered back to the terminal. Conventional ISO 8583 packets further define a format that comprises a Message Type Indicator (MTI) 902, one or more bitmaps 904, indicating which data elements are present, and the data of the message 906.
As illustrated in
The present embodiments allow the authentication of a user, substantially in real time, during a registration process. Further, the present embodiments allow such authentication to be performed for an entity (such as a merchant) which has no prior or direct business relationship with the user. The present embodiments may authenticate a user with a minimal amount of information that needs to be provided by the user during the registration process (e.g., in some embodiments, all that is required is an account number). The present authentication system may avoid a need to wait for further authentication, allowing a user to quickly access services, and allowing a merchant (e.g., a service provider) to safely authenticate the user prior to providing access to its services.
Although the present disclosure has been described in connection with specific exemplary embodiments, it should be understood that various changes, substitutions, and alterations apparent to those skilled in the art can be made to the disclosed embodiments without departing from the spirit and scope of the disclosure as set forth in the appended claims.
Number | Name | Date | Kind |
---|---|---|---|
5832464 | Houvener | Nov 1998 | A |
8660955 | Ledbetter | Feb 2014 | B2 |
20010044785 | Stolfo | Nov 2001 | A1 |
20020007345 | Harris | Jan 2002 | A1 |
20030061163 | Durfield | Mar 2003 | A1 |
20040174965 | Brahm | Sep 2004 | A1 |
20050033688 | Peart | Feb 2005 | A1 |
20050038738 | Peck | Feb 2005 | A1 |
20050075985 | Cartmell | Apr 2005 | A1 |
20050097049 | Writer | May 2005 | A1 |
20050125686 | Brandt | Jun 2005 | A1 |
20050154671 | Doan | Jul 2005 | A1 |
20050199708 | Friedman | Sep 2005 | A1 |
20050246278 | Gerber | Nov 2005 | A1 |
20060122943 | Mann, III | Jun 2006 | A1 |
20060206350 | Edwards | Sep 2006 | A1 |
20060212561 | Feng | Sep 2006 | A1 |
20070027816 | Writer | Feb 2007 | A1 |
20070143230 | Narainsamy | Jun 2007 | A1 |
20070220614 | Ellis | Sep 2007 | A1 |
20070244813 | Zhou | Oct 2007 | A1 |
20080109319 | Foss | May 2008 | A1 |
20080217400 | Portano | Sep 2008 | A1 |
20080275748 | John | Nov 2008 | A1 |
20080281737 | Fajardo | Nov 2008 | A1 |
20090265273 | Guntupalli | Oct 2009 | A1 |
20090313129 | Rothschild | Dec 2009 | A1 |
20100293189 | Hammad | Nov 2010 | A1 |
20100312703 | Kulpati | Dec 2010 | A1 |
20110006113 | Uchikura | Jan 2011 | A1 |
20110016051 | Trifiletti | Jan 2011 | A1 |
20110035319 | Brand | Feb 2011 | A1 |
20110119141 | Hoyos | May 2011 | A1 |
20110225090 | Hammad | Sep 2011 | A1 |
20110246359 | O'Brien | Oct 2011 | A1 |
20110271109 | Schilling | Nov 2011 | A1 |
20110307381 | Kim | Dec 2011 | A1 |
20120124656 | Senac | May 2012 | A1 |
20120159647 | Sanin et al. | Jun 2012 | A1 |
20120166334 | Kimberg | Jun 2012 | A1 |
20120173348 | Yoo | Jul 2012 | A1 |
20120221470 | Lyon | Aug 2012 | A1 |
20120226565 | Drozd | Sep 2012 | A1 |
20120278155 | Faith | Nov 2012 | A1 |
20120284187 | Hammad et al. | Nov 2012 | A1 |
20120290421 | Qawami | Nov 2012 | A1 |
20120290482 | Atef | Nov 2012 | A1 |
20120305640 | Long | Dec 2012 | A1 |
20130218765 | Hammad | Aug 2013 | A1 |
20130246203 | Laracey | Sep 2013 | A1 |
20130254049 | Todd | Sep 2013 | A1 |
20140258123 | Fernandes | Sep 2014 | A1 |
20150019443 | Sheets | Jan 2015 | A1 |
20150052064 | Karpenko | Feb 2015 | A1 |
20150161586 | Bailey | Jun 2015 | A1 |
20150178724 | Ngo | Jun 2015 | A1 |
Number | Date | Country |
---|---|---|
2012116912 | Dec 2013 | RU |
Entry |
---|
“PCT International Search Report and Written Opinion” dated Jun. 29, 2015, International Searching Authority for PCT Applidation No. PCT/US2015/022129, 7 pages. |
“Canadian Office Action”, dated Jun. 5, 2017 (dated Jun. 5, 2017), Canadian Intellectual Property Office, Canadian Application No. 2,943,353, 3pgs. |
“Singapore Written Opinion”, IPOS Intellectual Property Office of Singapore, dated Feb. 27, 2017, for Singapore Application No. 11201607479V, 5pgs. |
“Russian Search Report with English-language Translation”, dated Nov. 10, 2017 (dated Nov. 10, 2017), Federal institute of industrial property (FIIP), Russian Application No. 2016141331, 4pgs. |
“Russian Office Action with English-language Translation”, dated Nov. 10, 2017 (dated Nov. 10, 2017), Federal institute of industrial property (FIIP), Russian Application No. 2016141331, 7pgs. |
“Extended European Search Report”, dated Oct. 9, 2017, European Patent Office, EP Application No. 15769689.9, 6 pp. |
“Examiners Report”, dated Jun. 8, 2018, Canadian Patent Office, Canadian Application No. 2,943,353, 3 pp. |
“Colombian Office Action”, dated May 21, 2018, Republica De Colombia Superintendencia De Industria Y Comercio, Colombian Application No. NC2016/0003065, 25 pp. |
“Office Action Paper No. 6”, Intellectual Property Office of the Philippines, dated Apr. 16, 2018, Application No. 2016/501866, 4 pp. |
Number | Date | Country | |
---|---|---|---|
20150269701 A1 | Sep 2015 | US |