WO2009114020A1 - Systèmes et procédés d’authentification biométrique de transfert de fonds monétaire - Google Patents
Systèmes et procédés d’authentification biométrique de transfert de fonds monétaire Download PDFInfo
- Publication number
- WO2009114020A1 WO2009114020A1 PCT/US2008/057139 US2008057139W WO2009114020A1 WO 2009114020 A1 WO2009114020 A1 WO 2009114020A1 US 2008057139 W US2008057139 W US 2008057139W WO 2009114020 A1 WO2009114020 A1 WO 2009114020A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- transfer
- sender
- biometric
- identity
- transfer request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
Definitions
- TMs invention relates to systems and methods for authenticating a monetary fund transfer using biometric data.
- a monetary fund transfer is a process where one individual or entity can transfer money electronically to another individual and/or entity.
- the fund transfer may involve an account at either end-point or actual cash. More particularly, the fund transfer may involve cash, direct account credits and debits, stored value debit cards, phone-based prepaid accounts, and/or other stored-value products at either end of the fund transfer.
- the fund transfer may involve cash, direct account credits and debits, stored value debit cards, phone-based prepaid accounts, and/or other stored-value products at either end of the fund transfer.
- In 2006 about $300 billion was transferred between individuals across national borders and it is estimated that ten times that amount was transferred in intra-national transactions.
- a monetary funds transfer may also occur between accounts of one individual and/or entity, such as stored value products and electronic cash vehicles owned by the same individual. These funds transfers are often termed "me-to-me" transfers. For example, an individual and/or entity may wish to add value to a prepaid account (e.g. mobile phone prepaid account) from another account or may desires to move money between existing accounts (e.g. a brokerage account and a normal demand deposit account).
- a monetary fund transfer service is typically broken down into three components: first-mile, intermediary, and last-mile.
- a first-mile agent provides services at the point of origin.
- a last-mile agent provides services at the destination point for the transfer.
- An intermediary is any agent that provides settlement services to help complete the transaction and provide payment settlement between the first- mile and last-mile services. Multiple intermediaries may be involved in a single transfer,
- Fund transfers especially if the first-mile and last-mile components are in different countries, are more highly regulated than purchase transactions because of the peer-to-peer nature of a fund transfer.
- anyone can transfer funds without clearly indicating the reason for the transfer of funds, such as exchanging money for goods or services.
- fund transfers are a common method for illicit activities such as money laundering, concealing assets, funding illegal activity or terrorism, and committing fraud. Detecting such illicit activities associated with fund transfers requires identifying an individual across multiple transactions, even when the individual does not have and/or is not required to present any form of identification.
- reliable and efficient identification of individuals is particularity problematic for monetary fund transfers.
- An embodiment relates generally to a method of authenticating a monetary fluid transfer.
- the method includes receiving a monetary fund transfer request that includes a declared identity of a sender and an identity of a recipient, retrieving biometric data from the sender, and determining whether or not a biometric template associated with the declared identity is available.
- the method also includes verifying the declared identity by comparing the retrieved biometric data with the biometric template, if the biometric template is available.
- the method further includes determining a compliance status of the transfer request in a governing jurisdiction of the sender based on the retrieved biometric data and/or the verified identity of the sender.
- Another embodiment pertains generally to a system for authenticating a monetary fund transfer.
- the system includes a network configured to provide communication services and a plurality of transfer agents coupled to the network.
- the system also includes a compliance checking service coupled to the network.
- the compliance checking service is configured to receive a monetary fund transfer request from a first transfer agent of the plurality of transfer agents, where the transfer request includes a declared identity of a sender and an identity of a recipient, to retrieve biometric data from the sender, and to determine whether or not a biometric template associated with the declared identity is available.
- the compliance checking service is also configured to verify, if the biometric template is available, the declared identity by comparing the retrieved biometric data with the biometric template, and to determine a compliance status of the transfer request in a governing jurisdiction of the sender by using the retrieved biometric data and/or the verified identity of the sender.
- the apparatus includes a plurality of transfer agents coupled with a communication medium and an internal database configured to store biometric verification information.
- the apparatus also includes a rules database configured to store a plurality of rules, each rule specifying at least one condition for a legal transfer of monetary fund between the transfer agents.
- the apparatus further includes a compliance checking processor configured to receive a monetary fund transfer request from a first transfer agent of the plurality of transfer agents, where the transfer request includes a declared identity of a sender and an identity of a recipient, to retrieve biometric data from the sender, and to determine whether the biometric verification information associated with the declared identity is available.
- the compliance checking service is also configured to verify, based on a determination that the biometric verification information is available, the declared identity by comparing the retrieved biometric data with the biometric verification information, and to determine, based on one of the retrieved biometric data and the verified identity of the sender, the compliance status of the transfer request according to the plurality of rules.
- FIG. 1 depicts an exemplary block diagram of a system for authenticating monetary fund transfers in accordance with various embodiments
- FIG. 2 illustrates an exemplary block diagram of a monetary fund transfer agent in accordance with various embodiments
- FIG. 3 illustrates an exemplary flow diagram for enrollment service in accordance with various embodiments
- FIGS. 4A-C show exemplary flow diagrams in accordance with various embodiments.
- FIG. 5 illustrates an exemplary flow diagram for legal compliance checking service in accordance with various embodiments.
- Embodiments relate generally to systems and methods for authenticating an electronic fund transfer using biometric data. More particularly, a sender of electronic funds from an account (e.g., a bank account, stored value product, electronic cash, etc.) can initiate a fund transfer using a biometric fund transfer system.
- the biometric fund transfer system can comprise an authentication center which is coupled to multiple agent modules.
- the agent modules can be located at distributed physical locations such as kiosks, representative stores, financial institutions, etc.
- the sender can also access the biometric fund transfer system through a variety of other means such as telephone, web access etc.
- Each of these other access methods to the biometric fund transfer system can have a respective biometric input adapted to the means of access. For example, for telephone access, the respective biometric input can be a voice scanner to verify the identity of the caller.
- the biometric fund transfer system can process fund transfers by having the sender self-report his/her identity. For those instances where the sender is at a physical location that provides access to the biometric fund transfer system to request a fund transfer, the sender can provide a pre-established identifier such as login, a password, etc. and a biometric sample to an origin agent module.
- the origin agent module can be configured to request from the authentication center for a biometric template associated with the pre-established identifier. If the authentication center returns the requested biometric template, the agent module can verify the identity of the sender by comparing the biometric template with the sampled biometric data. Subsequently, the origin agent module can indicate the identity of the sender has been biometrically authenticated and can forward the requested transfer to the authentication center for further processing.
- the agent module can store the sampled biometric data of the data to be forwarded to the authentication center to be used in subsequent transactions.
- a service agent can collect and verify the secondary ID of the sender to create a dossier mat is stored at the local agent module along with the transaction history of the sender. The agent module can then return a pre-established identifier to be used in subsequent transactions.
- the biometric fund transfer system can allow a transaction to occur without verification in the event of the amount of money being transferred is below a predetermined threshold amount.
- the requested transfer along with all the transactional information is forwarded to the authentication center.
- the transactional information can include the name of the recipient, destination account (if applicable), address of the recipient, etc.
- a unique transaction ID can be generated for the requested transaction. If the transaction ID is used, the recipient may or may not be required to biometrically authenticate.
- the authentication center can be configured to hold the requested transfer until a biometric verification of the recipient is completed.
- the authentication center may send a request to a destination agent module to obtain the authentication of the recipient. More particularly, the recipient can self-report his identity by providing a pre-established identifier, a password or secondary ID.
- the destination agent module can request a biometric template from the authentication center based on the pre-established identifier and take a biometric data sample of the recipient. If a biometric template is returned from the authentication center, the destination agent module can biometrically verify the identity of the recipient with the biometric template with the sample of biometric data. If there is match, the destination agent module can notify the authentication to finish processing the requested transfer. If there is not a match, the requested transfer can be cancelled.
- a local service agent can collect secondary ID to verify the identity of the user.
- a local dossier file can be created of the secondary ID along with the transaction history for subsequent transactions.
- the sampled biometric data can be forwarded and stored in the authentication center and a pre-established identifier can be returned to the recipient for future transactions.
- the authentication center can be configured to determine whether a requested transfer complies with all applicable regulatory requirements. More particularly, after the sender and the recipient have been authenticated, the authentication center can execute a compliance check on the requested transfer. If the compliance check passes, the authentication center lets the requested transfer to occur.
- origin agent modules and the destination agent modules have complementary roles as origin and destination agent modules.
- an origin agent module would perform the same functions as the destination agent module if the origin agent module were designated as a destination and vice versa.
- FIG. 1 illustrates an exemplary biometric transfer fund system 100
- system for authenticating electronic monetary fund transfers in accordance with various embodiments. It should be readily apparent to those of ordinary skill in the art that the system 100 depicted in FIG. 1 represents a generalized schematic illustration and that other components may be added or existing components may be removed or modified.
- the system 100 can comprise an origin or first mile station 105, a destination or last mile station HO 3 an authentication center 115, and a network 100.
- FIG. 1 depicts a singular instance of the origin station 105 and destination 110, the system 100 can comprise of multiple instances of the respective stations (105, 110).
- the origin and destination stations 105, 110 and the authentication center 115 can be implemented using software components, hardware components or any combination thereof, hi software embodiments, the components of the stations 105 and the authentication center 115 can be implemented using computer languages such as C, C++, object oriented programming languages or other programming languages. In hardware embodiments, the components of the stations 105, 110 and BBC agent module 115 can be implemented using a processor, microcontroller, an application specific integrated circuit, EEPROM or oilier programmable devices. [0024] The stations 105 and 110 have dual roles as sender and a recipient depending on their particular role in a transaction.
- the discussion of the origin station 105 as a sender and recipient station can be equally applied to the destination station 1 10. More particularly, the origin station 105 can comprise a facility 125, which can be a kiosk, a storefront, a terminal in a financial institution, and in some instances users on the Internet. Contained with the facility 125 can be a biometric input module 130 and an agent module 135.
- the biometric input module 130 can be configured to provide input means for sampling biometric data from a sender 140 wishing to electronically transfer funds to an intended recipient 145 at the destination station 110.
- Each facility 125 may not have the same biometric input means.
- a rural facility 125 may only have a voice scanner or fingerprint scanner whereas an urban facility 125 can have multiple mechanisms: voice scanner, retinal scanner, facial recognition, etc.
- the data from the input module 130 can be transferred to the agent module 135 to authenticate the identity of the sender 140 as previously described and in greater detail below.
- the authentication center 115 can comprise a transfer agent module
- the components of the authentication center 115 can be implemented using software components, hardware components or any combination thereof.
- the components of the authentication center 115 can be implemented using computer languages such as C, C-H-, object oriented programming languages or other programming languages.
- the components of the agent module 115 can be implemented using a processor, microcontroller, an application specific integrated circuit, EEPROM or other programmable devices.
- the transfer agent 150 can be configured to vet a requested electronic fund transfer between origin station 105 and destination station 110 as a non-limiting example.
- the transfer agent 150 can ensure that the identity of the sender has been biometrically verified as well as the identity of the recipient 145 biometrically verified.
- the transfer agent 150 can also vet the requested transfer as complying with all applicable regulatory requirements for electronic funds.
- the transfer agent 150 can be further configured to record all transactions between senders, recipients, and amounts in order to provide additional data for data mining for non-compliant electronic fund transfer.
- the transfer agent 150 can be coupled to the account history module
- the account history module 155 which is configured to store the transactions that occur through the authentication center 115.
- the account history module 155 can be implemented in a database, a United list, a table or other similar referencing data structure.
- the transfer agent 150 can also be coupled with a biometric database
- biometric database 160 which is configured to store any biometric data associated with a user of the system 100.
- the biometric database 160 can store information as fingerprints, retinal scans, voice scans, pin numbers, digital images of photo-identification or other means of unique identifiers.
- Each user can have a certain subset of biometric data which can then be indexed by a user identifier such as the user or login ID.
- the search results returned from the biometric database 150 can be referred to as biometric templates.
- the services of the biometric database 160 can be supplied by a third party.
- biometric database 170 can be a located at a third party website, which is coupled to the authentication center 115 by a secure network 175.
- the transfer agent 150 can be configured to forward requests for biometric templates of senders/recipients to the biometric database 170 as messages or callback functions over the network 175 similar to what GOOGLE MAPS does to MAPQUEST when requesting latitude/longitude coordinates. [0031]
- the transfer agent 150 can also be coupled to the compliance module
- the compliance module 165 in conjunction with a rules database (not shown) can be configured to determine whether or not a transfer request is legal or in compliance with regulations and rules for a monetary fund transaction in the governing jurisdictions. Additional information of the compliance module 165 can be found in U.S. Patent Application No. 11/939,932, filed on November 14, 2007, common inventor and common assignee, which is hereby incorporated by reference in its entirety.
- the origin station 105, the destination station, and the authentication center 115 are coupled to network 120 via respective local network connections through respective computer devices as known to those skilled in the art.
- the local network connection can be a local area network (wired or wireless), a wide area network or combinations thereof implementing network protocols such as TCP/IP, ATM, SONET, or other known network protocols.
- the local network connection can also be part of a network that provides access to the network 120, which can be the Internet or some large conglomeration of existing networks.
- the origin station 105 and destination station 105 can each operate as the complementary station depending on the roles of the requested electronic fund transfer. As such, in a sender role, origin station 105 and destination station 110 initiate and execute the same functions. Similarly, in a destination role, origin 105 and destination station 110 initiate and execute the same functions.
- a sender in a sender role, can enter the facility 125 of a station
- a service agent (not shown) can enter the appropriate information for the electronic fund transfer into the agent module 135.
- the information can include name of sender and recipient, respective addresses, respective places of work, respective telephone numbers.
- the service agent can also request that the sender submit biometric samples of herself through the available biometric input means (e.g., facial recognition, finger print scanner, retinal scanner, voice scanner, etc.).
- biometric input means e.g., facial recognition, finger print scanner, retinal scanner, voice scanner, etc.
- the agent module 135 can then request a biometric template from the authentication center 115 based on a user ID. If the query returns a biometric template, the agent module 100 can verify the identity by comparing the sampled biometric data with the received biometric template from the biometric database 160 of the authentication center 115.
- the agent module 135 may require additional proof of identity from the sender through non- biometric means.
- the service agent may require exemplars of paper identification such as social security cards or equivalents, which are entered into the agent module 135.
- the paper identification and any sampled biornetric data can be stored as a biometric template in the biometric database 160.
- the agent module 135 can forward a message to the authentication center 115 that the identity of the sender has been biometrically authenticated and the information associated with the electronic fund transfer.
- the authentication center 115 can store the information related to the request transaction in the account history module 155. The authentication center 115 can also put a hold on the transfer until the identity of the recipient is authenticated. In this regard, the authentication center 115 can be configured to send a message to the destination station 110 for the recipient to authenticate his identity. [0038] In some embodiments, the authentication center 115 can determine that the recipient has previously been authenticated and may let the requested transaction to proceed but still wait for biometric authentication at the destination station 1 10.
- a service agent of the stations can receive the intended recipient 145 in the facility 125.
- the service agent may inform the intended recipient 145 that there is a transfer awaiting his authentication.
- the service agent may then request that the intended recipient 145 provide a user ID and a sample of biometric data through the available biometric input means (e.g., voice exemplar, retinal scan, fingerprint, facial recognition, etc.) to the agent module 135.
- the agent module 135 can query the biometric database 160 for biometric template based on the user ID.
- the agent module 135 can verify the recipient's identity by comparing the sampled biometric data with the received biometric template. Otherwise if the query returns no biometric template, the agent module 135 may require additional proof of identity from the recipient through non- biometric means.
- the service agent would enter the non-biometric data along with any sampled biometric data into the agent module 135.
- the agent module 135 can transmit this information to the biometric database 160 to be used as a subsequent biometric template for that user.
- the agent module 135 can forward the biometric authentication results to the authentication center 115.
- the authentication center 115 can be configured to check the transaction against the compliance module 165 to ensure that the transaction does not run afoul of any existing regulatory restrictions in response to the biometric authentication of the intended recipient 145. Ln the event that the intended recipient 145 had already been verified by previous transactions from the account history module 155, the transfer agent 150 can run the requested transaction against the compliance module 165.
- the transfer agent 150 can inform that agent module 135 at the destination station 110 to release the funds. Otherwise, the authentication center 115 can terminate the transfer request and may notify proper governmental authority if the transfer request appears to run afoul against the compliance module 165.
- the requested information from the sender 140 or the recipient 145 can be inadequate; the authorization center 115 can be configured to utilize third party databases, business information sources, and other electronic databases to search for the missing information.
- the authentication center 115 can also query third party databases, sources, etc., to verify the identity of the sender 140 or recipient 145 of the requested fund transfer in the event that the internal database does not contain the necessary information.
- a transfer request may list a newly created business as a recipient account holder.
- the authentication center 115 can be configured to search third party databases such as state databases for incorporation information, Dun & BradstreetTM, Lexis-NexisTM or other similar- electronic databases for legitimate business entities.
- the authentication center 115 can also access public record databases such as telephone directory databases, public record databases, etc., to verify the identities of individuals in the fund transfer request.
- FIG. 2 illustrates a detailed block diagram of the facility 125 for the origin station 105 and the destination station 110 in accordance with various embodiments. It should be readily apparent to those of ordinary skill in the art that the facility 125 depicted in FIG. 2 represents a generalized schematic illustration and that other components may be added or existing components may be removed or modified. [0046] As shown in FIG. 2, the facility 125 can comprise the biometric input
- the biometric input 130 can comprise a control module 210, which is coupled to biometric data inputs 215-235.
- the control module 210 can also be coupled to the agent module 135.
- controller module 210 can be configured to sample biometric data from either a sender 140 or intended recipient 145 via a retinal scanner 215, facial recognition 220 (which would include a camera, processing platform and appropriate software), Fingerprint scanner 225, voice recognition module 230, keystroke recognition 235, or a similar biometric device coupled to the control module 210.
- the control module 210 can sample the sender's 140 or the intended recipient's 145 biometric data by the respective input means and forward the sampled biometric data to the agent module 135.
- each origin station 105 or destination station 110 can have all or a subset of the biometric input means.
- the distribution of biometric input means 215-235 can based on cost, security, educational level of the customers, the availability of telecommunication resources, etc.
- the agent module 135 can comprise a manager module 255, an identity verifier 26O 3 a biometric templates storage module 265, and an accounts database 270.
- the manager module 255 can be configured to receive the sampled biometric data from the biometric input 130 and cache the sampled biometric data in the identify verifier 260.
- the identify verifier 260 can be configured to compare the sampled biometric data with a requested biometric template.
- the identify verifier 260 can then output the results of authentication to the manager module 255.
- the manager module 255 can then be configured to forward a request transaction along with indication that the sender 140 identity has been biometrically authenticated to the authentication center 115.
- the manager module 255 can be also coupled to the accounts database 270.
- the accounts database 270 provides a local transaction history for a particular station 105 or 110 as well as accounts for the users who use the respective station 105 or 110.
- the accounts of the users can also be used by the manager module
- the manager module 255 can be further coupled to a network interface module 275, which is configured to provide a communication interface to the network 120. The manager module 255 can then use the network interface module 275 to transfer all the appropriate information between the authentication center 115 and itself.
- FIG. 3 shows an exemplary registration flow diagram 300, executed by the agent module 135, in accordance with various embodiments. It should be readily apparent to those of ordinary skill in the art that the flow diagram 300 depicted in FIG. 3 represent a generalized schematic illustration and that other steps may be added or existing steps may be removed or modified.
- a potential new user can enroll in the biometric fund transfer system 100 by accessing the system 100 to create an account in step 305.
- a user can access the system 100 by a variety of means such as web-access, telephone or at physical locations of the agent modules.
- Each access method can be configured witli an appropriate biometric input means.
- web-access may include a camera coupled with facial recognition software to verify the identity of the user.
- a kiosk can use a fingerprint scanner.
- a user can be presented with an option to provide biometric data or user secondary ID ⁇ e.g., drivers license, passport, or other forms of government identification). If a user chooses not to provide biometric data, the user can present the secondary ID to a service agent, in step 315. The service agent can verify the secondary ID.
- biometric data e.g., drivers license, passport, or other forms of government identification.
- the service agent can create a local user file that contains digital images of the secondary ID along with a transaction history, i.e., a local dossier file, which is stored in the local agent module 135.
- the local agent module 135 can generate a user or log-in
- the public transaction ID can be used by the user to inform potential senders of the account to transfer thereto.
- the user can provide a biometric data sample, in step 330.
- the type of biometric data can be dependent on the access method to biometric fund transfer system. If the user is at a store location, the store may only have a voice scanner. A kiosk access may only a fingerprint scanner. Financial institutions may have retinal scanners, hi most instances, the agent module 135 can be used.
- a user or login ID can be generated along with a public transaction ID can be generated. The user can be handed copies of the user ID and public transaction ID to be used in future transactions.
- the biometric data can be uploaded to the authenti cation center 115 to be loaded and stored associated with the user ID in the biometric database 160.
- FIG. 4A shows an exemplary flow diagram 400A executed by the agent module 135 in accordance with various embodiments. It should be readily apparent to those of ordinary skill in the art that the flow diagrams depicted in FIG. 4A represent a generalized schematic illustration and that other steps may be added or existing steps may be removed or modified.
- the manager module 255 of the agent module 135 can be configured to receive a monetary fund transfer request from the sender 140.
- the transfer request can include associated transaction information such a declared identity (e.g., a pre-established identifier, a name, a government-issued identifier, etc.) of the sender 140, an intended recipient 145 or recipient account, an amount to be transferred, the public transaction ID 3 etc.
- a service agent can be presented with an initial set of identification of the sender 140. For example, the user can present the user ID, a password or secondary ID.
- the agent module 135 can be configured to retrieve or sample the biometric data of the sender 140 from the biometric input 130. For example, retinal image data may be used if the sender 140 makes the transfer request in-person, voice biometric data may be used if the sender 140 makes the transfer request over the phone, while fingerprint data may be used if the sender 140 makes the transfer request at a computer kiosk.
- biometric data For example, retinal image data may be used if the sender 140 makes the transfer request in-person, voice biometric data may be used if the sender 140 makes the transfer request over the phone, while fingerprint data may be used if the sender 140 makes the transfer request at a computer kiosk.
- the agent module 135 can be configured request a biometric template for the sender 140 based on a user ID. More specifically, the agent module 135 can forward a message requesting a biometric template with the associated user ID through the network interface module 275 to the authenti cation center 115.
- the authentication center 115 can forward a return message with the results of the request that includes whether or not a biometric template was found. If the authentication center 115 determines that a biometric template is available, the biometric template is retrieved from the biometric template storage 265 to be forwarded to the agent module 135, which temporarily stores the biometric template.
- step 414 the manager module 255 can invoke the identity verifier
- the manager module 255 can be configured to cancel the requested transaction, in step 418. Otherwise, if there is a match, the manager module 255 can be configured to determine the availability of funds from either cash by the sender 140 or in an existing account by searching the local account database 270, in step 420. If there are no funds available, the manager module 255 can be configured to cancel the requested transaction, in step 418. Otherwise, the manager m ⁇ dule 255 can be configured to forward the requested transfer along with transactional information and an authentication of the sender 140 to the authentication center 115, in step 421. The manager module 255 can also generate a unique transaction ID for the requested transfer. The sender can forward the transaction ID to the recipient so as the recipient can identify the requested transaction with or without biometric authentication.
- the manager module 255 can be configured to enroll the sender 140 as previously described with respect to FIG. 3, in step 412.
- the sampled biometric data may be searched against databases to identify possible criminals, terrorism suspects or other people engaged in illicit activities.
- the source of funds can be an account.
- a comparison can be made by the agent module between the identity of the sender 140 and any other party that has debit authorization on the account. If the account requires multiple authorizations, the requested transfer can be placed on hold until all authorizations are completed.
- the authorizations can be accomplished using the biometric techniques previously described and in greater detail below.
- FIG. 4B shows an exemplary flow diagram 400B executed by the agent module 135 in accordance with various embodiments. It should be readily apparent to those of ordinary skill in the art that the flow diagrams depicted in FIG. 4B represent a generalized schematic illustration and that other steps may be added or existing steps may be removed or modified.
- the transfer agent 150 can be configured to receive the requested transfer request from a origin station 105 along with the indication of an authentication sender, in step 422.
- the transfer agent 150 can be configured to determine whether or not the sender 140 is sending monetary funds from an account. If the funds are not from an account(s), then the transfer agent 150 proceeds to step 430 of pending the transfer request. Otherwise, in step 426, the transfer agent can be configured to determine whether or not there is authorization from all the account holder(s) to transfer funds from the account.
- step 428 the transfer agent 150 can be configured to hold and not forward the transfer request until authorization from all of the account holders is received.
- the transfer agent 150 can be configured to receive authorization from account holders using an identity verification process similar to the biometric verification process described herein. Once the transfer agent 150 determines that authorization to transfer funds is received from all the account holders, the transfer agent 150 proceeds to step 430 to hold the transfer request.
- the transfer agent 150 can be configured to hold the transfer request, in step 430. [0072] The transfer agent 150 can then determine whether or not there is a need to verify the identity of the named recipient. In most cases, a fund transfer that involves an account will often not require any action to verify the identity of the individual. However, some account products may not sufficiently identify the account holder for money laundering purposes. Also, in some instances, a fund transfer may require a confirmation of acceptance of the funds. Moreover, a fund transfer that results in providing cash to the recipient 145 almost always requires verification of the identity of the recipient 145.
- step 434 the transfer agent 150 can request the destination station 110 to authenticate the intended recipient 145. The transfer agent 150 can then enter a wait state until the results of the request return.
- step 436 the transfer agent 150 can receive a message that determines the results of the authentication process on the intended recipient 145. If results reveal no authentication, the transfer agent 150 can cancel the requested transfer. Otherwise, if authentication was a success, the transfer agent 150 can be configured to check the pending transaction again the compliance module 165, in step 442.
- the transfer agent 150 can flag the pending transaction as suspicious, in step 444. If the pending transaction is flagged, the transfer agent 150 and the compliance module 165 can perform additional testing to confirm that the requested transfer is non- conforming. If the transfer agent confirms that the requested transfer is non- conforming, the transfer agent 150 can be configured to notify the authorities. In embodiments, if a flagged transaction is later determined to be non-conforming, the transfer agent 150 can report the transaction to an authority whether or not the transaction was completed.
- the transfer agent 150 can be configured to determine whether to proceed with the pending transaction. For example, the transaction can be allowed to proceed to prevent the sender from learning the pending transaction is under investigation. If the transfer agent 150 determines not to proceed, in step 438, the transfer agent 150 can cancel the requested transfer. [0077] Otherwise, the transfer agent 150 logs the completed fund transfer in account history database 125 and releases the funds to the destination station 110 for subsequent distribution to the intended recipient 145, in step 446. Subsequently, the transfer agent 150 can be configured to notify the origin station of the completion of the transfer.
- FIG. 4C shows an exemplary flow diagram 400C executed by the agent module 135 in accordance with various embodiments. It should be readily apparent to those of ordinary skill in the art that the flow diagrams depicted in FIG. 4C represent a generalized schematic illustration and that other steps may be added or existing steps may be removed or modified. [0079] As shown in FIG. 4C, in step 450, the manager module 255 of the agent module 135 can be configured to receive a request to authenticate the intended recipient 145 for a pending transfer request.
- a service agent can be presented with an initial set of identification of the recipient 144.
- the user can present the user ID, a password or secondary ID.
- the intended recipient can also be required to present the transaction ID for the requested transfer.
- the manager module 255 can notify the service agent to have the intended recipient 145 insert an appropriate body part to the available biometric input 130 to obtain a sample of biometric data of the intended recipient 145.
- the manager module 255 can be configured request a biometric template for the intended recipient 145 based on a user ID. More specifically, the agent module 135 can forward a message requesting a biometric template with the associated user ID through the network interface module 275 to the authentication center 115.
- step 458 the authentication center 115 can forward a return message with the results of the request that includes whether or not a biometric template was found. If the agent module 135 has received the biometric template, the biometric template is stored in the biometric template storage 265.
- step 462 the manager module 255 can invoice the identity verifier
- the manager module 255 can be configured to cancel the requested transaction, in step 466. Otherwise, if there is a match, the manager module 255 can be configured to forward the positive results of the authentication of the intended recipient 145 to the authentication center 115.
- the manager module 255 can be configured to enroll the intended recipient 145 as described in FIG. 3 in step 460.
- the destination of funds can be an account.
- a comparison can be made by the agent module between the identity of the recipient 145 and any other party that has credit authorization on the account. If the account requires multiple authorizations, the requested transfer can be placed on hold until all authorizations are completed.
- the authorizations can be accomplished using the biometric techniques previously described and in greater detail below.
- FIG. 5 illustrates an exemplary flow diagram for a legal compliance checking service 500 in accordance with various embodiments.
- the initial step is to retrieve the verified identity or the biometric data of one of the individuals (e.g., the sender 140 or the recipient 145) involved in the transfer request.
- the transfer agent 150 can be configured to run a background check on the individual by searching the external biometric database 170 of known or suspected lawbreakers using either the verified identity or the biometric data of the individual, and to check whether or not the transfer request is legal or in compliance with regulations and rules for a monetary fund transaction in the governing jurisdictions of the individuals involved in the fund transfer.
- step 510 if the transfer agent 150 locates the individual in the external biornetric database 170 or determines that the transfer request violates applicable laws or is not in compliance with applicable regulations and rules, then in step 515, the transfer agent 150 can flag the pending transaction as suspicious.
- the transfer agent 150 can be configured to notify the appropriate governmental authority, terminate the transfer request, and/or log the terminated transfer request in the account history database 155.
- the compliance module 165 can perform additional testing to confirm that the requested transfer is non-conforming. If the transfer agent confirms that the requested transfer is non-conforming, the transfer agent 150 can be configured to notify the authorities.
- the transaction can be allowed to proceed to prevent the sender from learning the transfer request is under investigation, ⁇ 0090]
- the transfer agent 150 does not locate the individual in the external biometric database 170 and determines that the transfer request is legal and in compliance with applicable regulations and rules, then in step 520 and step 525 the transfer agent 150 compares the retrieved biometric data with the biometric template stored in the biometric database 160.
- the transfer agent 150 determines that the retrieved biometric data matches the biometric template of the individual, then in step 530 the transfer agent 150 marks the transfer request as verified and completes the legal compliance checking service 500. Alternatively, if the transfer agent 150 determines that the retrieved biornetric data does not match the biometric template, then in step 535 the transfer agent 150 can be configured to notify the origin station 105 or the destination station 110 that verification of the individual's identity has failed, and to proceed to step 540 to determine whether or not the transfer agent 150 should retry verifying the individual's declared identity. If another attempt is made to authenticate the user, the transfer agent 150 may forward a request to the agent module 135 to authenticate, in step 545. Otherwise, if the there no attempt to verify, the transfer agent 150 can be configured to notify the appropriate governmental authority, terminate the transfer request, and/or log the terminated transfer request in the account history database 125, in step 550.
- the computer program may exist in a variety of forms both active and inactive.
- the computer program can exist as software program(s) comprised of program instructions in source code, object code, executable code or other formats; firmware program(s); or hardware description language (HDL) files.
- Any of the above can be embodied on a computer readable medium, which include storage devices and signals, in compressed or uncompressed form.
- Exemplary computer readable storage devices include conventional computer system RAM (random access memory), ROM (read-only memory), EPROM (erasable, programmable ROM), EEPROM (electrically erasable, programmable ROM), and magnetic or optical disks or tapes.
- Exemplary computer readable signals are signals that a computer system hosting or running the present invention can be configured to access, including signals downloaded through the Internet or other networks.
- Concrete examples of the foregoing include distribution of executable software program(s) of the computer program on a CD-ROM or via Internet download.
- the Internet itself, as an abstract entity, is a computer readable medium.
- the same is true of computer networks in general.
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Finance (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Un mode de réalisation concerne généralement un procédé d'authentification de transfert de fonds monétaire. Le procédé consiste à recevoir une demande de transfert de fonds monétaire comprenant l’identité déclarée d’un expéditeur et l’identité d’un bénéficiaire, à récupérer les données biométriques de l’expéditeur, et à déterminer si oui ou non un modèle biométrique associé à l’identité déclarée est disponible. Le procédé consiste également à vérifier l’identité déclarée en comparant les données biométriques récupérées avec le modèle biométrique, si le modèle biométrique est disponible. Le procédé consiste également à déterminer un statut de conformité de la demande de transfert dans une juridiction compétente de l’expéditeur sur la base des données biométriques récupérées et/ou de l’identité vérifiée de l’expéditeur.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/US2008/057139 WO2009114020A1 (fr) | 2008-03-14 | 2008-03-14 | Systèmes et procédés d’authentification biométrique de transfert de fonds monétaire |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/US2008/057139 WO2009114020A1 (fr) | 2008-03-14 | 2008-03-14 | Systèmes et procédés d’authentification biométrique de transfert de fonds monétaire |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2009114020A1 true WO2009114020A1 (fr) | 2009-09-17 |
Family
ID=41065516
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/US2008/057139 Ceased WO2009114020A1 (fr) | 2008-03-14 | 2008-03-14 | Systèmes et procédés d’authentification biométrique de transfert de fonds monétaire |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2009114020A1 (fr) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2012022928A2 (fr) | 2010-08-20 | 2012-02-23 | Heptares Therapeutic Ltd | Matières biologiques et leurs utilisations |
| WO2013021206A2 (fr) | 2011-08-10 | 2013-02-14 | Heptares Therapeutics Limited | Protéines stables |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5280527A (en) * | 1992-04-14 | 1994-01-18 | Kamahira Safe Co., Inc. | Biometric token for authorizing access to a host system |
| US20060265602A1 (en) * | 2001-09-21 | 2006-11-23 | Robinson Timothy L | System and method for biometric authorization for financial transactions |
| US20070073617A1 (en) * | 2002-03-04 | 2007-03-29 | First Data Corporation | System and method for evaluation of money transfer patterns |
| US20070079136A1 (en) * | 2005-09-30 | 2007-04-05 | Sbc Knowledge Ventures, Lp | Methods and systems for using data processing systems in order to authenticate parties |
-
2008
- 2008-03-14 WO PCT/US2008/057139 patent/WO2009114020A1/fr not_active Ceased
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5280527A (en) * | 1992-04-14 | 1994-01-18 | Kamahira Safe Co., Inc. | Biometric token for authorizing access to a host system |
| US20060265602A1 (en) * | 2001-09-21 | 2006-11-23 | Robinson Timothy L | System and method for biometric authorization for financial transactions |
| US20070073617A1 (en) * | 2002-03-04 | 2007-03-29 | First Data Corporation | System and method for evaluation of money transfer patterns |
| US20070079136A1 (en) * | 2005-09-30 | 2007-04-05 | Sbc Knowledge Ventures, Lp | Methods and systems for using data processing systems in order to authenticate parties |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2012022928A2 (fr) | 2010-08-20 | 2012-02-23 | Heptares Therapeutic Ltd | Matières biologiques et leurs utilisations |
| EP3333185A1 (fr) | 2010-08-20 | 2018-06-13 | Heptares Therapeutics Limited | Gpcrs mutés |
| WO2013021206A2 (fr) | 2011-08-10 | 2013-02-14 | Heptares Therapeutics Limited | Protéines stables |
| US10174101B2 (en) | 2011-08-10 | 2019-01-08 | Heptares Therapeutics Limited | Stable proteins |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20090234764A1 (en) | Systems and methods for biometric authentication of monetary fund transfer | |
| US20200051082A1 (en) | Systems and methods for authenticating user identities in networked computer systems | |
| US8751395B2 (en) | Verification methods for fraud prevention in money transfer receive transactions | |
| US10402824B2 (en) | Systems and methods for verifying identities in transactions | |
| US12056704B2 (en) | Protocol to secure electronic transactions using two-way handshakes | |
| US20130159194A1 (en) | Systems and methods for authenticating benefit recipients | |
| CN107729727B (zh) | 一种帐号的实名认证方法及装置 | |
| CA2675854A1 (fr) | Systemes de transfert d'argent securise et procedes utilisant des cles biometriques associees auxdits systemes | |
| US20200143377A1 (en) | Systems and methods for user identity authentication | |
| CN106209766A (zh) | 一种手机的双向应用平台及方法 | |
| CN112686666A (zh) | 一种针对铁路业务系统的电子钱包交易方法及装置 | |
| US20160342996A1 (en) | Two-factor authentication method | |
| US20150066766A1 (en) | Secure Generation of a User Account in a Service Server | |
| KR102121938B1 (ko) | 법인 계좌의 간편 결제 서비스를 제공하는 장치 및 방법 | |
| US11763278B2 (en) | Deposit token service system, apparatus and method | |
| WO2009114020A1 (fr) | Systèmes et procédés d’authentification biométrique de transfert de fonds monétaire | |
| CN109327814B (zh) | 短消息的处理方法、装置、电子设备及可读存储介质 | |
| KR102082336B1 (ko) | 국외로 송금되는 자금의 처리를 관리하는 전자 장치, 방법 및 컴퓨터 판독 가능한 기록 매체 | |
| KR101152892B1 (ko) | 금융카드에 대한 출금 관리 방법 및 출금 관리 장치 | |
| GB2616145A (en) | Fraud detection device for checking and authenticating person, application fraud detection method, and application fraud detection program | |
| US20230259602A1 (en) | Method for electronic identity verification and management | |
| US9875474B2 (en) | Method for securing a transaction performed by bank card | |
| KR20250161359A (ko) | 거래 증빙을 위한 수취인의 전자서명 기반 전자 자금 이체 방법 | |
| EP4695708A1 (fr) | Procédé pour augmenter la confiance dans la vérification de l'identité d'une personne | |
| KR20230088184A (ko) | 수취인 등록 기반 안전거래를 위한 전자 자금 이체 방법 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08743944 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 08743944 Country of ref document: EP Kind code of ref document: A1 |