VERIFYING IDENTITY THROUGH USE OF AN INTEGRATED RISK ASSESSMENT AND MANAGEMENT SYSTEM
First Claim
1. An apparatus for identity verification, the apparatus comprising:
- a computing platform including at least one processor and a memory;
a risk database stored in the memory and configured to receive and store financial institution data, from a plurality of financial institutions, wherein the financial institution data includes transaction data; and
an identity verification routine stored in the memory, executable by the processor and configured to receive an identity verification request, determine if one or more identities associated with the request are verifiable based, at least in part, on the transaction data in the risk database, and communicate an identity verification response.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the present invention relate to systems, apparatus, methods and computer program products for integrated risk management. More specifically, embodiments of the present invention provide for identity verification based, at least in part, on comparing transaction data received from multiple financial institutions to data associated with a current financial transactions, such as type of transaction, transaction amount or the like. The transaction data provides for basing identity verification on how a customer, a counterparty or both previously transacted, in that transaction patterns can be identified to understanding who the transacting customer or counterparty is. In additional embodiments the identity verification may be based, at least in part on other data, such as financial institution relationship data, non-financial institution transaction and/or relationship data, customer/counterparty data or the like.
-
Citations
54 Claims
-
1. An apparatus for identity verification, the apparatus comprising:
-
a computing platform including at least one processor and a memory; a risk database stored in the memory and configured to receive and store financial institution data, from a plurality of financial institutions, wherein the financial institution data includes transaction data; and an identity verification routine stored in the memory, executable by the processor and configured to receive an identity verification request, determine if one or more identities associated with the request are verifiable based, at least in part, on the transaction data in the risk database, and communicate an identity verification response. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method for identity verification, the method comprising:
-
receiving, at a risk database stored in computing device memory, financial institution data from a plurality of financial institutions, including transaction data; receiving, via a computing device, an identity verification request; determining, via a computing device processor, if one or more identities associated with the request are verifiable based, at least in part, on the transaction data in the risk database; and communicating, via a computing device, an identity verification response based on a result of the determination. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. A computer program product comprising:
-
a computer-readable medium comprising; a first set of codes for causing a computer to receive financial institution data from a plurality of financial institutions, including transaction data; a second set of codes for causing a computer to receive an identity verification request; a third set of codes for causing a computer to determine if one or more identities associated with the request are verifiable based, at least in part, on the transaction data in the risk database; and a fourth set of codes for causing a computer to communicate an identity verification response based on a result of the determination. - View Dependent Claims (38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54)
-
Specification