CROSS-REFERENCE TO RELATED APPLICATIONSThis application claims benefit of U.S. Provisional Application No. 61/644,878, filed May 9, 2012, entitled SYSTEM AND METHOD FOR FORMLESS, SELF-SERVICE REGISTRATION FOR ACCESS TO FINANCIAL SERVICES (Atty. Dkt. No. GNRT-30929), the specification of which is incorporated herein in its entirety.
TECHNICAL FIELDThe following disclosure relates to a system and method for formless registration of an unbanked user for financial and similar services.
BACKGROUNDThe availability of self-service financial technology and devices such as automated teller machines, (ATMs), and similar devices has grown exponentially over the past several years. Such devices typically provide banking, funds transfer, bill payment services and the like to customers of a financial institution. However, the devices and systems used to provide such financial transactions have typically been limited to services provided by a given financial service provider. Some devices do allow for multiple services from a common location, but such service typically requires a dedicated VPN connection between the device and the service provider. In order to utilize such services, a customer must typically have an account with a financial service provider and/or a credit, debit or similar card issued by the service provider. For example, self-service ticket machines are typically limited to dispensing tickets and require the use of a credit card or debit card to complete a purchase. To obtain a credit card or debit card, a user is typically required to fill out one or more forms and submit the completed to form to the bank or other financial institution which processes the form, opens an account for the customer and provides the customer with a card or card that enables the customer to access and utilize the services provided by the financial institution and other entities.
Currently, however, there are significant populations of unbanked or under-banked consumers that do not have access to such services for a number of reasons. Members of such populations may not have a credit or debit card for a variety of reasons; for example, language barriers, cultural factors, or simply a lack of knowledge. Some customers may simply not wish to deal with the paper work required to obtain a credit or debit card. Such customers may also be unwilling to complete on-line forms that are commonly used to register for financial and similar services. Unbanked or under-banked populations may reside in geographic region(s) where financial service providers do not maintain branch offices due to demographic factors. The economics of locating an office or store front such as a branch bank office in such regions may preclude financial service providers from locating store fronts or branch offices in these regions. Additionally, postal services may be limited or non-existent in such regions.
SUMMARYIn one aspect thereof, a method for enabling users to access financial services of subscribing financial services with a central verification system includes creating a verifiable user profile for a given user. The user presents, at a fixed location, a verifiable identification ((ID) with a photo attached that can be verified by a third party as being associated with the photograph on the verifiable ID. One or more biometrics of the given user are input and a photograph of the user is taken proximate to the fixed location at which the verifiable ID and the biometrics are input. The verifiable ID, biometrics and photograph are transmitted to the central verification system which provides a unique code to the given user after receipt of the verifiable ID, the input biometrics and the photograph. A financial transaction may be initiated by presenting, at a financial transactions location, a list of available financial services to the given user in response to the given user being proximate to the location. At least one of the available financial services is from the group of the subscribing financial services. The user selects the subscribing financial service and a photo of the user is taken with a camera disposed at the financial transactions location.
One or more biometrics and the user's unique code are received at the financial transactions location and the code, biometrics and photo are transmitted to the central verification system which verifies that the received biometrics and code are in fact associated with the central verification system. The financial transaction is then allowed to proceed. The method includes completing the transaction after verification. The operation of creating the verifiable user profile is conducted at a physical kiosk having an input device for receiving a verifiable ID with photograph and the biometrics in addition to having a camera associated therewith for taking a photograph.
The physical kiosk includes the capability to take more than one photograph, with at least one being known by the given user taken at the time of inputting the information. The other photographs are capable of being taken at different times proximate to the time of input of the information. Multiple cameras at different angles may be provided, such that at least one of the cameras is known to the user at the time the information is input during the creation operation and the other cameras being hidden from the given user's knowledge and possibly the view of the given user before taking pictures also proximate in time to the time of input of either verifiable IDs or biometrics.
In another aspect, the financial transactions location for conducting a transaction includes at least one additional camera for taking a photograph unknown to the user at the time of initiating the financial transaction. The step of presenting a list of financial services provides an indicator for the subscribing financial service to indicate to the given user the one of the available financial services associated with the verifiable user profile. A display is provided at the fixed location.
In one variation, a system for enabling users to register to use external financial services comprises a central office including an operating platform having a processor and a communication interface. The central office further includes a user database having a plurality of records for individual users stored on a database. The user records each includes a user customer identification number, the user's name and address, an image of an identification card of the user, a verification image of the user and an associated biometric parameter of the user. The central office is operative to communicate via the communication interface with a plurality of formless, self-service registration stations remote from the central office. Each of the formless, self-service registration stations includes a camera operable to create a user verification image, a card scanner operable to create an image of an identification card of the user, a biometric scanner operable to record a biometric parameter of the user and a user interface adapted to enable a user to initiate a registration procedure for registering a user.
In some variations, the user interface is operable to enable a user to enter a customer identification code during the registration process. The user's verifiable customer identification card is then scanned by the user with the card scanner. The customer identification card includes the user's name and address. The self-service formless registration station photographs the user to create a verification image of the user and records a biometric parameter unique to the user. The self-service formless registration station then transmits an image of the verifiable customer identification card, the biometric parameter and the verification image of the user to the central office. The operating platform is operable to translate text from the user's customer identification card including the user's name and address. The operating platform is also operable to create a record for the user including a customer identification number for the user, the verification image of the user, the image of the user's identification card and the translated text from the user's identification card. The operating platform uses the translated text to populate fields in the user record including the user's name and address. The operating platform is further operable to retrieve and display a user record including the user verification image, the image of the user identification card and the user's name and address to an administrator for review of the user record. Thus, the system and method disclosed herein enables a user to register to user financial and similar services without filling out paper or online forms.
BRIEF DESCRIPTION OF THE DRAWINGSFor a more complete understanding, reference is now made to the following description taken in conjunction with the accompanying drawings in which:
FIG. 1A is a schematic representation of a system as disclosed and described herein;
FIG. 1B is a flow chart illustrating the method ofFIG. 1A;
FIG. 1C illustrates a representation of a customer record;
FIG. 2A is diagrammatic illustration of a terminal for use in the system ofFIG. 1A;
FIG. 2B is a block diagram illustrating one possible configuration for the terminal ofFIG. 2A;
FIG. 2C is a block diagram illustrating the manner in which different terminals may be configured in one embodiment according to the disclosure;
FIG. 2D is a schematic representation of a mobile terminal for use in the system ofFIG. 1A;
FIG. 2E illustrates a diagrammatic view of the terminal;
FIGS. 3A and 3B is a flow chart illustrating one method implemented via the system ofFIG. 1A; and
FIGS. 4A and 4B is a flowchart of a second method implemented utilizing the system ofFIG. 1A.
DETAILED DESCRIPTIONReferring now to the drawings, wherein like reference numbers are used herein to designate like elements throughout, the various views and embodiments of a system and method for formless, self-service registration for access to financial services are illustrated and described, and other possible embodiments are described. The figures are not necessarily drawn to scale, and in some instances the drawings have been exaggerated and/or simplified in places for illustrative purposes only. One of ordinary skill in the art will appreciate the many possible applications and variations based on the following examples of possible embodiments.
FIG. 1A is a schematic representation of asystem100 as described herein. In one embodiment,system100 includes a plurality of user terminals orkiosks110. Each of theterminals110 may have a different “character” depending on the service modules (or external resources) available at the terminal110. In different variations,terminals110 may be linked to thecentral office116 by means of anetwork118 such as a local area network, a GSM connection or by means of the public telephone system (POTS).Central office116 interfaces withservice providers112 vianetwork118 which may be utilized to access and/or obtain service modules corresponding to the services offered by the different service providers.Service providers112 may include a variety of financial institutions such as banks, credit card companies and other financial service providers.
As illustrated,central office116 includes afront end processor122 and aback end processor124, which together, may be referred to as the “central office processor.”Databases126 and128 are associated with front andback end processors122 and124, respectively.Database126 may include information regarding the configuration, (i.e., the identity of and the services enabled on different terminals110) along with the information required to interface with the terminals.Central office116 includes a user verification system as operative to verify the identity of a user when the user creates an account and when the user conducts financial transactions as hereinafter described.Database128 may include information required to interface withservice providers112, such as information required to format information for use by a selectedservice provider112, as well as the information required to receive and process information received from the service providers. User profiles with such information as age, gender, biometric parameter data such as a palm vein scan or fingerprint scan, the user's service history and other information may be stored ondatabase126,database128 or both. Additional data such as transaction data, logs, analysis data and results and performance data may also be stored on either or both ofdatabase126 anddatabase128. Each of theprocessors122,124 has an associated data interface (hardware) for communicating withterminals110 andservice providers112.
Each of theterminals110 is configured as an independent interface to a particular user utilizing thatparticular terminal110. Each of theterminals110, as will be more fully described hereinbelow, has associated therewith service modules or external resources that will allow the user to effectively interface with theservice provider112 to both input information to the system for use in the transaction and to receive an output from the transaction, if such is appropriate, this being a transaction-dependent operation. During the transaction, there will be many interactions between the terminal110 and thecentral office116, this interaction allowing less of the transaction to be implemented on the terminal110 and more to be implemented on the central office.System100 may be the same as, or similar to the system described in U.S. Publication No. 2010/0179990, published Jul. 15, 2010, U.S. patent application Ser. No. 12/684,929, to Cacheria, et al., filed Jan. 9, 2010, the disclosure of which is incorporated herein for all purposes.
FIG. 1B is a flow chart illustrating a method of formless, seamless registration for potential customers of service providers such as financial institutions to enable potential customers to access such services with a single registration. The process begins atstep1000 where a potential customer approaches a kiosk orremote terminal110. Atstep1002, the customer's presence is sensed atterminal110 by means of a motion detector, touch screen or similar sensor. Atstep1004, a screen is displayed prompting the customer or potential customer to begin. Atstep1006, the customer selects “Begin” and atstep1008, the customer is prompted to enter a customer identification number (CID). Atstep1010, if the customer enters a CID, the customer may proceed to conduct a financial transaction at1012 after which the process ends atstep1014. If the customer is not registered or authorized for the service that he or she selects, the process jumps to step1064 as described hereafter. If the customer elects not to register, atstep1018, the process loops back to Start at1020.
If the customer elects to register, the customer or potential customer is prompted to scan a photo ID such as a driver's license, passport or similar identification card atstep1024. Preferably, the ID is one that may be verified by accessing a public or private database including records identifying the user. For example, if the customer ID is a driver's license, the ID may be verified by accessing a private or public database containing records of individuals having a driver's license. Such records may include an individual's driver's license number, address, age and a photo of the individual.
If the customer fails to scan a photo ID or if the photo ID is not acceptable, for example if the ID is not legible, the process returns to Start atstep1030. If the photo ID scan is acceptable, the image is captured atstep1034 and the image is processed via optical character recognition (OCR) at1036. Atstep1038, a customer record is created at a central office remote from the kiosk or terminal and the customer record is populated with data from the scanned and processed photo ID atstep1040. Atstep1042, the customer image captured from the photo ID atstep1034 is stored in the customer record.
FIG. 1C is a representation of a customer record. The customer record may include fields for information such as a customer's name, customer identification number (CID), a social security number (SSN), a driver's license number, a driver's license expiration date, a library card number, the customer's address, and other pertinent information. In the case where the scanned photo ID is a passport, for example, the pertinent information may be captured from the passport, OCR'd and used to populate the customer record. The customer record may also include a biometric such as a photograph taken by the kiosk or remote terminal, a palm vein scan, a fingerprint, a retinal scan or a voice print.
Returning toFIG. 1B, atstep1040, the customer record is populated with the data scanned and OCR'd from the customer ID. Atstep1042, the first customer image from the scanned ID is stored in the customer record. Atstep1044, the customer is photographed with a local camera and the photograph may be taken multiple times during the registration process. The second customer image from the local camera is stored in the customer record atstep1046. After the customer image from the scanned ID and the customer photograph have been captured, atstep1048 the customer may be prompted to enter a biometric, e.g., a thumb print, palm vein scan, retinal scan, voice scan, etc. Atstep1050, the customer biometric parameter is captured and subsequently stored atstep1052 in the customer record.
During the creation of the customer record at the central office as hereinafter described, the central office may access available public records using the customer's name or other information acquired from the scanned customer ID in order to populate other fields in the customer record as the information may be available. In some instances, if a user is only interested in accessing certain basic services, such as a bill pay service, a biometric parameter may not be required. In this case the process may skip fromstep1046 to step1054. Other services, for example, funds transfer services may require a biometric parameter and additional personal information. The amount of user information required to access a service may be dictated by the service provider or by governmental regulations.
Atstep1054, a customer identification number or code (CID) is created and stored in the customer record atstep1056. In different variations, the user may be prompted to enter a CID of his or her choice. This may be done, for example in conjunction with the user photo ID scan. If the CID is assigned by the central office, the CID is transmitted to the terminal or kiosk where it is displayed to the customer. The display may include messages such as, “please save this number for a future reference,” or “do not share this number with other people.” A CID assigned by the central office may be temporary, in which case, the user may select a different CID at a later date or stage in the process. If the customer CID has not been stored in the customer record, the customer CID is stored in the customer record atstep1058.
Atstep1060, the kiosk or remote terminal may display a completion message such as, “congratulations, you have completed basic registration,” or a similar message. The display may also include available services or services that are available with a basic registration. The display may also include an instruction such as, “in the future, you may access selected services with your CID and your biometric parameter.” During the registration process, discrete pieces of information may be input at110 and transmitted tocentral office116 as the information is collected. For example, a scan of a photo ID may be captured and transmitted tocentral office116 for record creation before a biometric parameter, zip code, telephone number or other information is collected. In other variations, all required information may be collected at kiosk or terminal110 before being transmitted tocentral office116 as a single data package after which the central office may create a user record.
Some services may require more person information than other services. For example, a bill pay service may require minimal basic information while a funds withdrawal or funds transfer transaction may require additional information, such as a biometric parameter. A user may also wish to add additional information to his or her record, such as a biometric parameter as a further safeguard against unauthorized use of the user's registration. Atstep1062, the customer may be prompted with a display such as “other services require advanced registration. Would you like the convenience and security of advanced registration?” If the customer does not elect advanced registration atstep1064, the customer is prompted atstep1066 to select a service. If the customer elects not to select a service atstep1068, the process ends atstep1070. If the customer selects a service, the service menu is displayed atstep1072 enabling the customer to access the service after which the process ends at1074. If a user attempts to access a service requiring advanced registration, for example, require more personal information or the addition of a biometric parameter, the customer will be prompted atstep1062 to add or update his or her record or profile with the information required to access the service.
Alternatively, if the customer selects advanced registration atstep1064, the customer is prompted to select the desired level atstep1076. The different levels may be designated for example as gold, silver or platinum and the services available for each level of registration may be displayed. If the customer selects an advanced level of registration at steps1078-1082, the customer is prompted at steps1094-1098 to enter the information required for the selected registration level. Such information may include, for example, a driver's license number, a social security number, an address and/or information regarding the customer's credit lines, for example, credit card information. Alternatively, if the customer fails to select a particular advanced registration level, the process ends atstep1086 and loops back atstep1090 toStart1000. Likewise, if the customer fails to enter the required information atstep1100, the process ends and returns to Start1000 atstep1102.
If the customer enters the required information and the entry is confirmed by the central office, a completion display may be displayed to the customer atstep1106 indicating the level of registration that the customer is registered for. The display may include a list of the services that are available to the customer at the selected registration level. Atstep1108, the customer is prompted to select a service for which the customer is registered. Such services may include, for example, funds transfer, cash withdrawal, check cashing, etc. If the customer fails to select a service atstep1110, the process ends atstep1112 and loops back toStart1000. If the customer selects a service atstep1116, the central office confirms whether or not the customer is registered for the selected service. If the customer is not registered for the selected service, the process loops back atstep1118 to step1062 and the customer is prompted to select an appropriate registration level.
If the customer is registered at the appropriate level for the service, a prompt for the service is displayed atstep1120. The display may prompt the customer to enter information required for the transaction, for example, the amount of the transaction or in the case of a funds transfer, the destination of the funds. The customer then enters the information required to conduct the transaction atstep1122 after which the service is accessed atstep1124 by the central office. The transaction is then processed through the central office atstep1126 after which the process loops back toStart1000 atstep1128. If the customer is not registered at the appropriate level for the service, the process loops back tostep1062.
Referring toFIGS. 2A and 2B, each ofterminals110 is provided with a number of user interface devices (physical system or external resources) mounted in ahousing201 to allow a user to interface with the terminal110. In one variation, the devices include akeyboard202, amagnetic card scanner204, anID scanner206, asmart card scanner208 and atouch screen210. Other user interface devices include aproximity sensor212, amotion detector214, acheck scanner216, acurrency reader218, avoice recognition model220 and avideo camera222.Terminal110 may also include a biometric parameter interface device such as apalm vein scanner224 for authentication purposes. Each of the user interface devices may be connected to a CPU244 (terminal processing unit) interminal110. Each of the interface devices may be interfaced withCPU244 via a physicalsystem resource interface203 including hardware and software enabling the physical system resource to communicate withCPU244.
Each ofterminals110 may also include a variety of output interface devices (also external resources) that enable the terminal to provide services to users. Such output devices may include acurrency dispenser226, amagnetic card dispenser228, asmart card dispenser230,ticket printers232 and areceipt printer234. In one embodiment, terminal110 may also include adocument printer236, amedia display device238, amoney order dispenser240 and an audio output device such as aspeaker242. Referring specifically toFIG. 2A, in one variation, themedia display device238 may comprise a large, flat screen monitor for displaying promotional information such as advertisements for different goods and services. As illustrated, each ofterminals110 also includes a data storage device246 (data store) associated withCPU244. In one embodiment,CPU244 interfaces withcentral office116 via a public or private network118 (communications resource).
Referring still toFIGS. 2A and 2B, in one embodiment each of devices202-242 are independently controlled. Thus, if one of devices202-242 fails, for example, ifcheck scanner216 jams, the individual device or module may be disabled along with the services that it supports without affecting the remaining modules and services. An operating system runs on CPU244 (processing platform), which, among other functions, monitors the status of available physical system or external resources via the physical system resources interfaces203. In this manner, terminal110 functions as a resources manager for managing available physical system or external resources. For example, ifticket printer232 fails mechanically, the ticket printing services provided byterminal110 may be disabled while the remaining services provided by the terminal are still available to users. In one embodiment, each ofterminals110 transmits a message tocentral office processor114 at predetermined intervals with the status of each of devices202-242. In the event that a service becomes unavailable due to a hardware failure or similar problem, the particular service may be “grayed out” onscreen210.
FIG. 2C is a block diagram illustrating the manner in whichdifferent terminals110 may be configured insystem100.Service providers112 may provide a wide range of different services. Each of theservice providers112 may have configuration information associated with the provider and/or with a service of the provider. The configuration information may include information defining theprovider112, and/or a service that the provider provides. The configuration may also include a “script,” e.g., an instruction set defining a set of predetermined actions that are to be completed in a defined sequence to enable access to the service provider and/or service of the service provider. A configuration for aservice provider112 and/or for a service may be downloaded from the service provider to thecentral office processor114 and, in turn, downloaded in whole or in part to selected ones ofterminals110 to enable a user to access the service provider of a provider service. The instructions incorporated in the script may be executed by the terminal110 in conjunction withcentral office processor114 to enable a user to access a user-selected service. A given configuration may identify the physical resources required to access aprovider112 and/or service. In many cases, multiple configurations or scripts may require the same physical system resources for execution of an instruction set or script. In some embodiments, the operating system may disable access to aprovider112 or service if a required physical system resource is unavailable.
Referring still toFIG. 2C, company A may provide service s1, company B may provide services s2 and s3 and company C may provide service s4. Such services may include providing tickets for different entertainment events, currency transfers and dispensing a variety of stored value cards such as debit cards, gift cards and telephone cards. However, some services may be more desirable to different population segments at different times due to factors such as demographics, cultural factors, income levels, holidays and the location of aspecific terminal110. Consequently, it may be desirable to configuredifferent terminals110 to provide different services at different locations or to configure a terminal based on a user profile. For example, as illustrated, terminal110A may be configured with service modules to provide service s1 and s4 from companies A and C, respectively. Terminal110B may be configured with service modules to provide services s2 and s4 from companies B and C. Terminal110C may be configured with service modules to provide services s1, s3 and s4 from companies A, B and C, respectively to pay the customer's bills, transfer funds, print receipts, coupons, money orders, tickets or similar documents.
Referring now toFIGS. 2D and 2E, there is illustrated a more detailed diagram of the terminal110 and the manner by which it interfaces with the various physical system or external resources. There is illustrated theprocessor244, which is operable to interface with a plurality ofexternal resources270, which, as described hereinabove, can be any type of hardware resource that allows a user to interface with the various service providers through the central office. In general, the terminal110 does not possess the capability to allow a user to interface with any kind of service to conduct a financial transaction without being connected to the central office. This is not to say that such could not be implemented. However, for example, if a user were provided a code that could be input to a terminal110 through the keypad (one of the external resources270), this would allow the user to retrieve cash from a cash dispenser (another one of the external resources270). However, if the terminal110 did not interface with the central office or the service provider through thecentral office processor114, then that would require the terminal110 to have associated therewith all of the information necessary to authorize a particular user on that terminal110 in addition to preprocessed information about an already in process financial transaction. This would mean that all of theterminals110 would be required to have all of that information. This is not practical for most financial transactions. These are not pay-as-you go type terminals that would allow a user to input value and receive value therefrom with a percentage of the input value retained as a fee and maintained in the system independent of the operation of any external processing system.
Theprocessor244 has associated therewith a light operating system that provides the basic operating parameters to interface with the central office, interface with thestorage database246 containing the various service modules, and also interface with the physical system orexternal resources270. In order to interface with theexternal resources270, there is provided ahardware interface272 associated with eachexternal resource270. This external resource basically is a physical terminal or connector that can receive a connection or cable from theexternal resource270 and this will typically allow bi-directional communication. Data can be transmitted to theexternal resource270 for a printer, for example, and information can be received back from that printer indicating an error. Therefore, there will always be some type of monitor function associated with a particularexternal resource270 in addition to a data transfer path.
The data transfer path is illustrated by apath274 and the monitoring information is represented by apath276. Any type of well-known connection can be used to provide this. In recent years, most external resources in the form of printers, keyboards, and the like, utilized a conventional communication link such as a serial USB connection. These USB interfaces utilize a common driver interface such that plugging the USB cord from theexternal resource270 into the hardware interface will allow theprocessor244 to recognize the device and essentially identify that device. Further, after the hardware interface has been provided, there will then be some type of driver software that will be required for theprocessor244 to effect an interface with theexternal resource270. Even though the hardware interface may be a USB interface or some proprietary interface, there still must be some type of driver software to allow communication with the external resource. For example, a printer may be recognized as a particular printer through a USB interface or other type of serial or parallel port interface, but driver software is required in order to utilize the full functionality of that particular external printer or other external resource. If theexternal resource270 were a display, then a particular cable or interface such as a VGA cable would be required to interface with the display. Appropriate drivers would be required for the display. Sometimes, the operating system itself has predefined drivers for displays, as these are somewhat universal. For some resources, however, special drivers would be required to utilize the full functionality of that particular resource.
Theprocessor244 then manages theresources270 by keeping a table of available resources. If a resource fails, this will be communicated through the hardware interface to theprocessor244 and may, in fact, require the use of the driver software to interface with theexternal resource270 to provide this monitoring function. If the resource fails or if it is not connected, this would be recognized by theprocessor244. For example, when a particular configuration is provided, it may require a cash dispenser, a keyboard input and a display output in addition to a biometric scanner. The particular software script that comprises part of the service module will require all of these resources in order to function. Therefore, there will be a list of available resources that must exist in order for aparticular terminal110 to constitute a fully operating terminal for that service in accordance with the configuration information provided by thecentral office processor114. If one of these resources disappears, this will disable a particular service module and this will be communicated back to thecentral office116 during the “heartbeat.”
Thestorage region246 will be the area where the various service modules “script” is stored. This is the sequence of instructions that must be carried out in order to effect the portion of the transactions that is associated with aparticular terminal110. For example, one of the first transactions that will occur and that constitutes a service module is an authorization module. This authorization module will require authentication of an individual by requiring them to enter certain information, such as name, password, CID information, and even biometric data. This will be utilized to authenticate the individual at thecentral office116, after which the user will then be presented a display of the available services that can be used or, more likely, the services will first be provided in a “grayed-out” format to the user and upon authentication, will be un-grayed-out so that the user knows they now have access, i.e., they have been authenticated. After that, the user can then select one of the service modules and, upon selection thereof, the service module will sequentially access the various external resources to effect the transaction in conjunction with thecentral office116, as will be disclosed hereinbelow. Thus, each of the service modules s1, s2, s3 . . . sn will be stored therein, which each constitute a portion of the script or transaction process required to be executed by the terminal110 for a particular service. This is the configuration information that is downloaded from thecentral office processor114. However, it should also be understood that aparticular terminal110 could have all of the service modules fully loaded therein and all that thecentral office116 would be required to do would be to activate a particular service on aterminal110.
Two of the resource interfaces272 are illustrated as being associated with communication external resources, one being anexternal resource280 labeled COM1 and a second one282 labeled COM2. Each of these is interfaced withseparate networks284 and286, respectively. For example, one communication protocol could be a dial-up modem and the other could be an Ethernet card. Either of these can interface a separate and different network utilizing a separate and different protocol. Both, alternatively, could be the same hardware resource for redundancy purposes. This resource allows theprocessor244 to communicate with thecentral office116.
FIGS. 3A and 3B is a block diagram of a method implemented via a system such assystem100 ofFIG. 1A. The process begins at30 wherecentral office116 receives a message from a terminal110 atstep32 indicating that an unregistered customer is seeking to conduct a transaction or attempting to register. Atstep34, registration script is transmitted fromcentral office116 to the terminal110 if the script is not resident on the terminal. It will be understood that the steps described in connection withFIGS. 3A and 3B will be conducted primarily byfront end processor122 ofcentral office116 except as necessary to interface with aservice provider112.
Atstep36, registration data is received fromterminal110. Such information may include a customer biometric and a scanned image of the customer's verifiable ID. It will be understood that the information may be streamed from the terminal to the central office or transmitted as a single block of data. The information is compared to existing customer records to identify possible duplicate records. If it appears that the data duplicates an existing record atstep38, an error message is transmitted to the terminal atstep40 and the process is terminated atstep42. If no duplicate data is detected, atstep44 the image from the user's ID is compared to the image captured by the terminal camera. Preferably, multiple images are captured by the terminal camera to facilitate the comparison. The comparison may be conducted by a human attendant ofcentral office116 or by an automated system utilizing facial recognition software. If the images do not match atstep46, an error message is transmitted to the terminal atstep40 and the process is terminated atstep42.
If the images match, the image of the user ID is OCR'd atstep48 and a user record is created and a CID is assigned atstep50. The user record is populated with data from the scanned ID atstep52. Atstep54, available databases may be queried to identify data that may be used to populate the user record. Such databases may include bill payment records, telephone listing, address listings, employment records and other commercially available databases. If such records are located atstep56, the information is used to populate the user record atstep58. Information obtained in this manner may also be used to conduct a check for duplicate or erroneous data in the user record. For example, the comparison may identify an individual attempting to register using another individual's identity. At this point, the user has completed basic registration and the terminal prompts the user to select advanced registration. If the user elects not to seek advanced registration atstep60, a registration complete message is transmitted to the terminal at step62, and the process is terminated. If the user elects to proceed with advanced registration, and then fails to complete the registration by providing the required information atstep64, the process is terminated atstep66. If the user information is received, the information is used to populate the user record atstep68 and a registration complete message is transmitted to the terminal at70. If the user then elects to conduct a transaction atstep72, the transaction is conducted atstep74 and the user is prompted to select another transaction atstep76 and if another transaction is selected, the process loops back to74. If no transaction is selected, the process is terminated atstep78.
FIGS. 4A and 4B is a flowchart illustrating amethod utilizing system100 ofFIG. 1A. Atstep400, the process begins with the user initiating a transaction atstep402 by entering the user's CID and biometric parameter. Atstep404, the user's photo and or biometric, obtained by the terminal camera when the transaction is initiated, is compared with the image and/or biometric from the user's record. This check may be done at random, for selected users, or for each transaction. The check may be accomplished by an attendant atcentral office116, or the check may be automated, using for example, facial recognition software. If the compared parameters do not match atstep406, thefront end processor122 may initiate an alert atstep408 and transmit an error message to the terminal atstep410 with the process terminating atstep412. The alert may be displayed on a screen atcentral office116, alerting an attendant of the mismatch. The user record may also be checked at this step for accuracy and completeness. For example, if the record user photo ID is a driver's license, the expiration date may be checked. If the license is expired, the user may be prompted to update his or her record by scanning a current driver's license. Similarly, the address on the driver's license no longer matches other information in the user record, the user may be prompted to update the information or re-register for the user's selected services.
If the user photo and biometric match the user record, a script for the user selected transmission may be transmitted to the terminal atstep414 if the script is not resident on the terminal. If the central office does not receive the information required for the transaction atstep416, an error message is transmitted to the terminal at418 and the process is terminated at412. If the data is received, the transaction and user parameters may be matched based upon preselected criteria atstep420.
Such parameters may include user transaction frequency and type, time, transaction amount, the geographical area where the transaction originated, etc. For example, if a transaction occurs more than, for example100 miles from the user's address of record, the transaction may be denied. Similarly, if a second transaction is attempted at a geographical location remote from the location of a first transaction within a predetermined time window, the second transaction may be denied. For example, if the first transaction occurred in Chicago at10:00 am and a second transaction was attempted in Phoenix at10:20, the second transaction may be denied. Such matching may be used to identify potential fraud, attempts to circumvent federal anti-money laundering regulations and other activity of interest. The results of the match are compared to a threshold value for the selected parameter or parameters atstep422 and if the threshold is exceeded, an alert may be generated atstep424. At step426 a determination is made as to whether or not to allow the transaction to continue based upon preselected criteria. If the criterion indicates that the transaction should not proceed, the process is terminated atstep412.
If the process is allowed to continue, the user data is formatted and/or compiled for the user by the selected service provider at428 and transmitted to the provider at430. The steps of formatting and transmitting the data will be conducted by theback end processor124 ofcentral office116. During the course of the transaction, data may be streamed or multiple data blocks and instructions may be transmitted back and forth between the back end processor and the user selected service provider as illustrated and described in U.S. Publication No. 2010/0179990, published Jul. 15, 2010, U.S. patent application Ser. No. 12/684,929, to Cacheria, et al., filed Jan. 9, 2010, the disclosure of which is incorporated herein for all purposes.
If the data is accepted by the selected service provider atstep432, the transaction is conducted and the user's record updated to reflect the transaction. If the service provider rejects the transmitted data, an error message is transmitted to the terminal atstep434 and the transaction is terminated atstep436. If the user selects another transaction at440, the process loops back to start400, if not, the transaction is terminated atstep444.
It will be appreciated by those skilled in the art having the benefit of this disclosure that this system and method for formless, self-service registration for access to financial services provides a system and method for formless self-service registration for access to financial and other services. It should be understood that the drawings and detailed description herein are to be regarded in an illustrative rather than a restrictive manner, and are not intended to be limiting to the particular forms and examples disclosed. On the contrary, included are any further modifications, changes, rearrangements, substitutions, alternatives, design choices, and embodiments apparent to those of ordinary skill in the art, without departing from the spirit and scope hereof, as defined by the following claims. Thus, it is intended that the following claims be interpreted to embrace all such further modifications, changes, rearrangements, substitutions, alternatives, design choices, and embodiments.