Claims
- 1. A computerized method of verifying the identity of an attendant operating a money transfer transaction device, comprising:
receiving at the money transfer transaction device a user identification and password from the attendant; receiving at the money transfer transaction device additional information from the attendant, wherein the additional information relates to a security feature that limits access to the transaction device; and using the additional information, the user identification, and the password to evaluate whether to allow the attendant to operate the transaction device to process a transaction.
- 2. The method of claim 1, wherein the step of using the additional information, the user identification, and the password to evaluate whether to allow the attendant to operate the transaction device to process a transaction comprises:
sending the additional information, the user identification, and the password to a host computer system; and at the host computer system, comparing the additional information to stored information.
- 3. The method of claim 1, wherein the step of using the additional information, the user identification, and the password to evaluate whether to allow the attendant to operate the transaction device to process a transaction occurs at the money transfer transaction device.
- 4. The method of claim 1, wherein the step of receiving additional information comprises:
displaying a stored attendant name together with a question asking the attendant if the stored attendant name is the name of the attendant; and receiving a response to the question from the attendant.
- 5. The method of claim 1, wherein the step of receiving additional information comprises:
receiving information from an identification tool of the attendant.
- 6. The method of claim 5, wherein the identification tool comprises a card encoded with machine-readable information.
- 7. The method of claim 6, wherein the card is selected from a group consisting of proximity card, smart card, identification card, and card having a magnetic stripe.
- 8. The method of claim 5, wherein:
the identification tool comprises a tool that generates a code; the step of receiving additional information further comprises receiving the code from the attendant; and the step of using the additional information, the user identification, and the password to evaluate whether to allow the attendant to operate the transaction device to process a transaction comprises:
generating a verification code; and comparing the verification code to the code.
- 9. The method of claim 1, wherein receiving additional information comprises receiving a biometric feature of the attendant.
- 10. The method of claim 9, wherein the biometric feature is selected from a group consisting of DNA, fingerprint, retinal image, voice print, and facial image.
- 11. The method of claim 1, wherein receiving additional information comprises receiving a biometric image from an identification card relating to the attendant.
- 12. The method of claim 11, wherein the identification card is selected from a group consisting of driver's license, passport, picture identification card, biometric card, and government-issued identification card.
- 13. The method of claim 1, further comprising limiting the attendant's access based on a level of training of the attendant.
- 14. The method of claim 1, further comprising limiting the attendant's access based on information specific to a transaction being processed by the attendant.
- 15. A method of obtaining identification information from an individual involved in a transaction, comprising:
entering transaction-related information into a transaction processing device, including information relating to the identity of the individual; receiving a prompt via the transaction processing device to enter identification information; entering identification information, wherein the identification information verifies the information relating to the identity of the individual; and processing the transaction.
- 16. The method of claim 15, further comprising, storing at least a portion of the transaction-related information and at least a portion of the identification information in a transaction record as transaction information.
- 17. The method of claim 16, further comprising, comparing the transaction information to information obtained from a credit reporting agency.
- 18. The method of claim 16, further comprising, comparing the transaction information to information obtained from an identification information company.
- 19. The method of claim 16, further comprising comparing the transaction information to similar information in other transaction records.
- 20. The method of claim 16, further comprising comparing the transaction information to information in a list provided by law enforcement authorities.
- 21. The method of claim 16, wherein the step of processing the transaction comprises aborting the transaction.
- 22. The method of claim 15, wherein the identification information comprises a biometric feature of the sender.
- 23. The method of claim 15, wherein the transaction-related information also includes information relating to a receiver in the financial transaction.
- 24. The method of claim 15, wherein the identification information is entered by inputting information into the transaction processing device.
- 25. The method of claim 15, wherein the identification information is entered by inputting information into a peripheral device associated with the transaction processing device.
- 26. The method of claim 15, wherein the identification information comprises a security code obtained from an identification tool, and wherein the method further comprises comparing the security code to a verification code generated by the transaction processing device.
- 27. A system for obtaining identification information from an operator of a transaction processing device, comprising:
a host computer system; and a transaction processing device that is programmed to:
receive a user identification and password from the operator; receive additional information from the operator, wherein the additional information relates to a security feature that limits access to the transaction device; and transmit at least a portion of the information to the host computer system; wherein the host computer system is programmed to use the additional information, the user identification, and the password to evaluate whether to allow the operator to operate the transaction device to process a transaction.
- 28. A system for obtaining identification information from a party to a transaction, comprising:
a host computer system; and a transaction processing device programmed to:
receive transaction-related information, including information relating to the identity of the party; receive identification information from the party, wherein the identification information relates to a biometric feature of the party; and transmit at least a portion of the information to a host computer system.
- 29. The system of claim 28, wherein the host computer system is programmed to:
store the transaction-related information and the identification information as transaction information; and compare the transaction information to similar information relating to other transactions.
- 30. The system of claim 29, wherein the host computer system is further programmed to compare the transaction information to information in a list provided by law enforcement authorities.
CROSS-REFERENCES TO RELATED APPLICATIONS
[0001] This application is related to co-pending, commonly assigned and concurrently filed Provisional U.S. Patent Application No. ______ (Attorney Docket No. 02037-038300), entitled “SYSTEMS AND METHODS FOR PRODUCING SUSPICIOUS ACTIVITY REPORTS IN FINANCIAL TRANSACTIONS,” and to co-pending, commonly assigned, and concurrently filed U.S. patent application Ser. No. ______ (Attorney Docket No. 02037-039500), entitled “SYSTEMS AND METHODS FOR VALIDATING IDENTIFICATIONS IN FINANCIAL TRANSACTIONS,” the entire disclosures of which are incorporated herein by reference for all purposes.