US20120330819A1 - System and method for locating and accessing account data - Google Patents

System and method for locating and accessing account data Download PDF

Info

Publication number
US20120330819A1
US20120330819A1 US13/213,975 US201113213975A US2012330819A1 US 20120330819 A1 US20120330819 A1 US 20120330819A1 US 201113213975 A US201113213975 A US 201113213975A US 2012330819 A1 US2012330819 A1 US 2012330819A1
Authority
US
United States
Prior art keywords
account
data
accounts
database
benefits
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/213,975
Inventor
Laura Weinflash
Dawn Melvin
Tom McLaughlin
Janis E. Simm
Christopher E. Swecker
Lucius L. Lockwood
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Early Warning Services LLC
Original Assignee
Early Warning Services LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Early Warning Services LLC filed Critical Early Warning Services LLC
Priority to US13/213,975 priority Critical patent/US20120330819A1/en
Assigned to EARLY WARNING SERVICES, LLC reassignment EARLY WARNING SERVICES, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MCLAUGHLIN, TOM, LOCKWOOD, LUCIUS L., MELVIN, Dawn, SIMM, JANIS E., SWECKER, Christopher E., WEINFLASH, LAURA
Priority to PCT/US2012/043380 priority patent/WO2012177786A1/en
Priority to CA2840182A priority patent/CA2840182A1/en
Publication of US20120330819A1 publication Critical patent/US20120330819A1/en
Priority to US14/959,881 priority patent/US20160086263A1/en
Priority to US14/970,212 priority patent/US10607284B2/en
Priority to US15/069,186 priority patent/US10504174B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance

Definitions

  • Account balance and other information for accounts held by an account owner are often needed by third parties for various reasons. For example, when applying for a mortgage, an applicant is typically required to provide information on all of the applicant's accounts to ensure there is sufficient cash attributable to the applicant (e.g., to use as a down payment). As another example, when applying for government benefits, such as supplemental security income (SSI) or other cash or services programs, a beneficiary's accounts must be located to ensure available assets have not been illegally transferred or do not otherwise exceed any qualification amount limits.
  • SSI supplemental security income
  • verifying account balances may involve sending written requests to a number of different institutions, and each institution conducting a manual look-up for each specified account. Further, the applicant may not have complete account numbers or may not remember or provide information on all accounts.
  • the applicant may not provide the correct bank name or ID (such as a routing and transit number) to enable convenient and timely verification.
  • the applicant may not provide the correct bank name or ID (such as a routing and transit number) to enable convenient and timely verification.
  • that balance may not be legitimate. That is, an applicant may have received or borrowed funds from another person (such as a relative) to temporarily show an account balance larger that what is actually owned by the account holder, to fraudulently qualify for a mortgage, loan, or government benefit.
  • an applicant may not disclose accounts, or income reflected in those accounts that would result in disqualification under the benefits program, or may have made transfers out of accounts to conceal assets.
  • Embodiments of the present invention provide systems and methods for locating and accessing assets, such as accounts.
  • accounts may include, but are not limited to, deposit accounts such as checking, savings, CDs, money market accounts in the United States, or International accounts.
  • Accounts may also include (i) reward or loyalty accounts providing merchant reward points, such as in the exemplary case of retail sales; (ii) online financial accounts such as PayPal accounts; (iii) online gaming such as Farmville or SecondLife; or (iv) frequent flyer programs or stored value accounts.
  • accounts may include credit or loan accounts, credit card accounts, debit accounts, prepaid accounts, or any account regarding any desired type of financial information.
  • a system and method for locating an account.
  • the system and method provides a database for storing account data for accounts maintained at a plurality of institutions.
  • the account data for each account includes at least a personal identifier for an account holder.
  • a request to locate an account is received, with the request including a submitted personal identifier.
  • the account is located by matching the submitted personal identifier to the personal identifier stored in the database, and at least some of the account data for the located account is retrieved.
  • a system and method for locating and accessing an account of an account holder without having to contact one or more institutions where the account might be maintained.
  • the system and method provides a database populated with account data for a plurality of accounts from a plurality of institutions maintaining the accounts.
  • Account data is initially transferred from each of the institutions.
  • the account data represents a plurality of account characteristics associated with each of the accounts.
  • the account characteristics comprise an account identifier assigned to each account by the maintaining institution, a personal identifier for the account holder that is assigned by an entity independently of the institutions, and a balance of funds in the account.
  • Updated account data is also periodically transferred from each of the institutions.
  • the account data is stored in the database.
  • a personal identifier (such as a social security number) for an account holder may be used to locate and retrieve at least some of the account data.
  • a government or law enforcement agency may provide one or more personal identifier(s) corresponding to an individual or an entity named in a subpoena (or an instrument such as a National Security Letter or Writ of Execution) for financial or accounting records access, and the provided personal identifier(s) is/are used to determine which institutions, if any, have account or financial information for the individual or an entity named in the subpoena. If one or more of such institutions are found to have such account or financial information for the individual or an entity named in the subpoena, the names of the matching institutions are provided to the government or law enforcement agency with sufficient information (account number or identification information, for example) so that the subpoena may be efficiently served on the one or more matching institutions.
  • indicia showing no match found may be returned to the government or law enforcement agency.
  • a preferred embodiment provides the account identification information for subpoenas to government or law enforcement agencies, it is understood by those of skill in the art that a service could be provided to non-government entities or persons to locate bank accounts corresponding to the identified parties. As described more completely below, additional embodiments may perform analysis to provide additional information to the querying agency.
  • FIG. 1 is a block diagram of a system for locating and accessing account information in accordance with embodiments of the invention.
  • FIG. 2 illustrates exemplary data provided to and stored in the database system of FIG. 1 .
  • FIGS. 3-5 are flow diagrams illustrating several processes used within the database system of FIG. 1 , for locating and accessing account data.
  • FIG. 6 is a block diagram of one suitable scoring model and process for use in one embodiment of the invention.
  • FIG. 7 is a flow diagram illustrating a process used within the database system of FIG. 1 , in accordance with an alternative embodiment.
  • FIG. 8 is a block diagram of a computer system upon which various devices, systems, and processes described in conjunction with FIGS. 1-7 may be implemented.
  • Described embodiments of the present invention provide means for enabling assets (such as financial accounts owned by an account holder) to be located and accessed, even when maintained at a number of different institutions.
  • assets such as financial accounts owned by an account holder
  • accounts are located using a personal identifier associated with the account holder, rather than an account number.
  • the personal identifier is a social security number (SSN).
  • a system for locating assets may receive two different types of requests to locate assets (such as financial accounts).
  • One such request may be an asset search request, and the other may be an asset verification request.
  • an asset search request might be used by a government entity to locate accounts of a person applying for welfare benefits or some other form of government assistance.
  • Government programs providing benefits often have criteria that permit applicants/beneficiaries to qualify only as long as their assets (such as checking, savings and other financial accounts) have balances below a specified threshold.
  • a beneficiary must have no more than $2000 in assets in order to qualify for Medicaid nursing home benefits.
  • the systems and methods described herein permit an asset search for any accounts held by the beneficiary in order to confirm that balances in accounts held by the beneficiary are in fact below the required threshold.
  • transaction data in an identified account may be evaluated to determine or verify benefits eligibility.
  • a system and method could additionally provide account data relevant to the risk that a beneficiary is receiving income (e.g., deposited into an account) that would make the beneficiary ineligible for benefits.
  • income e.g., deposited into an account
  • transaction data in an identified account could be evaluated to provide risk scores and/or indicators pertaining to whether there might be employment income deposited to an account that would make the account holder ineligible for receiving or continuing to receive unemployment benefits.
  • Data reflecting the likelihood of employment income could be based on data provided for ACH transactions posted to the account (e.g., ACH data indicating payroll deposits), or for non-ACH deposits (e.g., check deposits), based on the payor name or account, the check amount, or other check deposit information (e.g., by comparing that information to prior employment data provided by the beneficiary or by comparing that information to transaction patterns or history).
  • the periodicity or timing of deposit transactions might be relevant and could be evaluated.
  • An asset verification request might be used by an entity (such as a mortgage company) to verify account balances.
  • a mortgage applicant may state that the applicant has sufficient funds saved in one or more accounts to make a down payment (or sufficient funds saved to supplement income as needed to make mortgage payments).
  • a mortgage company needs to verify that balances in the applicant's accounts are adequate to meet the applicant's financial needs after the mortgage has been granted.
  • Embodiments of the present invention support alternative asset search and verification queries or requests.
  • systems and methods as described herein may be used in various situations where account information (such as balances) may be needed, such as to qualify or comply with certain government programs, to obtain consumer/commercial loans, or to initiate legal or other actions.
  • account information such as balances
  • SNAP Supplemental Nutrition Assistance Program
  • SSI Supplemental Security Income
  • child support requests e.g., confirming financial means or needs
  • Housing Subsidies e.g., Earned Income Tax Credits (EITC)
  • EITC Earned Income Tax Credits
  • corporate audit verifications small business loans, student loans, student financial assistance, credit checks, and delinquent tax collections.
  • Other embodiments may support asset search and verification requests for various kinds of accounts or account information beyond those maintained at financial institutions.
  • government agencies may contribute benefits data, including details relating to those benefits and relating to the beneficiary, such as name, address, social security number (SSN), date of birth, employer (if any), date benefits applied for, type or amount of benefits, date benefits began, agency or agency location, and so forth.
  • benefits data including details relating to those benefits and relating to the beneficiary, such as name, address, social security number (SSN), date of birth, employer (if any), date benefits applied for, type or amount of benefits, date benefits began, agency or agency location, and so forth.
  • SSN social security number
  • systems and methods of the present invention permit account information from a large number of banking and other institutions as well as from government agencies to be stored in a single database system so that accounts across all of those institutions or agencies may be searched or verified with one request. Not only does this eliminate the need for contacting multiple institutions and agencies, but it also permits the data from individual accounts (or multiple accounts) to be analyzed for risk-related factors (e.g., in the case of mortgage applications, factors indicating savings patterns, suspicious deposits, and possible links to known fraudsters/con artists; and in the case of government benefits, factors indicating suspicious transfers to third parties or benefits received across multiple jurisdictions or agencies).
  • risk-related factors e.g., in the case of mortgage applications, factors indicating savings patterns, suspicious deposits, and possible links to known fraudsters/con artists; and in the case of government benefits, factors indicating suspicious transfers to third parties or benefits received across multiple jurisdictions or agencies.
  • search or verification requests may be batched and sent daily.
  • an individual search or verification request can be sent electronically (on-line and in real-time), and an immediate response can be returned by the system.
  • the located account information sent in the response can be immediately reviewed, perhaps in the presence of the applicant (e.g., while a mortgage applicant is in the presence of a mortgage officer), thus permitting the applicant to explain discrepancies and provide further information that can be used to refine subsequent requests, if appropriate.
  • Such an exchange of information in real time may significantly reduce the time and cost of mortgage qualification, cash and services benefits applications and other processes requiring a search or verification of accounts.
  • FIG. 1 there is shown an exemplary system 100 for locating and accessing account information.
  • the account information is stored and processed at a central account database system 110 having a database device 120 for storing account information and an account database management system (DBMS) 130 for managing the data in database 120 (e.g., the DBMS stores, retrieves, arranges, sorts and processes the data in the database).
  • DBMS account database management system
  • the data used to populate the database 120 is obtained from a number of financial institutions 140 .
  • requests to access the account data stored in database system 110 may be received from government agencies 150 (e.g., to establish qualification for benefits), from mortgage companies 160 (e.g., to verify account balances) and from other entities 170 (e.g., needing to locate and access account data for various reasons, such as creditworthiness, ability to supply funds, or debt or asset verification).
  • government agencies 150 e.g., to establish qualification for benefits
  • mortgage companies 160 e.g., to verify account balances
  • other entities 170 e.g., needing to locate and access account data for various reasons, such as creditworthiness, ability to supply funds, or debt or asset verification.
  • the financial institutions 140 maintain financial accounts, and include banks, savings and loan associations, investment firms and similar institutions.
  • the accounts for which data is provided may include checking accounts, savings accounts, certificates of deposit, brokerage accounts, money market accounts, and other financial accounts (in the United States or elsewhere).
  • Accounts may also include (i) reward or loyalty accounts providing merchant reward points, such as in the exemplary case of retail sales; (ii) online financial accounts such as PayPal accounts; (iii) online gaming accounts, such as Farmville or SecondLife accounts; or (iv) frequent flyer programs or stored value accounts.
  • accounts may include credit or loan accounts, credit card accounts, debit accounts, prepaid accounts, or any account regarding any desired type of financial information.
  • financial institutions 140 may also access account data in system 110 (e.g., as part of a loan application) and government agencies 150 , mortgage companies 160 and other entities 170 may contribute account data (e.g., benefits accounts and mortgage accounts).
  • financial institutions 140 may represent any kind of institution or other entity maintaining an account or asset (financial or otherwise)
  • government agencies 150 , mortgage companies 160 and other entities 170 may represent any kind of entity (governmental, commercial or otherwise) wanting to locate and/or verify accounts or assets that are maintained at various institutions.
  • FIG. 2 illustrates exemplary data provided to (and stored in) the database system 110 by each of the financial institutions 140 .
  • the data comprises account data for a bank account, and thus includes the following data fields (collectively designated as 202 in FIG. 2 ):
  • Account Type e.g., checking, savings, certificate of deposit, investment account
  • Account Status (open/present, closed, deceased, non-sufficient funds, etc.)
  • Average Balance (e.g., average balance over the past 30 days)
  • Maturity Date (e.g., maturity date for a certificate of deposit)
  • FIG. 2 shows data for only one account, and in practice there would be many accounts from many institutions stored in database system 110 .
  • the data includes an initial transfer 210 for each of the data fields (current and historical information at the time of the initial transfer), and subsequent periodic transfers 212 - 1 through 212 - n for most of the same data fields (to keep the data updated).
  • the illustrated periodic data transfers 212 - 1 through 212 - n are each transferred and stored daily (Day 1, Day 2, Day 3, etc., up to the current day). Such a frequent updating is generally preferred, although is some embodiments and applications a less frequent updating might be acceptable.
  • the updated data fields are illustrated as including the same data as the initial transfer, other than the RTN, Account Number and Account Type fields, since it is assumed, for purposes of the described embodiment, that these three data fields will remain unchanged over the life of the account.
  • FIG. 2 shows each updated daily transfer of data ( 212 - 1 through 212 - n ) having all fields 202 in database system 110 populated with data (other than RTN, Account Number and Account Type).
  • data other than RTN, Account Number and Account Type.
  • database system 110 may be managed so that only the changed data in a daily transfer will be stored (in such case, especially if updates are daily, many of the data fields illustrated in FIG. 2 would in fact not be populated in order to efficiently mange storage space and minimize unnecessary data processing).
  • This filtering of unnecessary data could be implemented in one embodiment by database system 110 being programmed to review data fields as they are received from the financial institutions 140 and to remove data that has not changed since the day before.
  • the financial institutions 140 may have systems on-site and programmed to remove unchanged data before it is transmitted.
  • the account data could be processed in a number of ways by system 110 , in addition to being available to a requester making an account search or verification request.
  • the data could be processed to provide balance information in various forms (e.g., a single, current 30 day average balance, or average balances over 6 months, over 1 year or longer).
  • the needs of the requester can thus be met by processing data in a way that is useful to the requester (e.g., a governmental entity is likely to need different information than a mortgage company).
  • the data associated with any account can be filtered, processed and stored in a way to provide only the information on the account that is most useful to the requester.
  • the data associated with an account can be analyzed (and, in some cases, compared to data from other, external sources) to provide risk scores or other risk-related data pertinent to the request.
  • the database system 110 may respond to a mortgage company request with not only basic account information (current status, current account balance, and average balance), but also with alerts and flags if critical data has recently changed (new signers, new account holder names, significant changes in balances, etc.). Also, patterns for deposits and withdrawals (e.g., as reflected in daily balances) can indicate if the account holder is a consistently good saver, or has relied on a single or a few large deposits in order to reach the current balance.
  • data stored in the database could also include a risk marker 216 (stored in a “Risk Flag” field as seen in FIG. 2 ) that indicates risk factors have been identified for the account.
  • the risk marker could be as simple as a “yes” or “no,” and in other embodiments could be a code to indicate whether the risk is relevant to specific categories of requesters, such a government benefits program, a mortgage company, a creditor, or some other request category. It should be appreciated that some factors (e.g., recent patterns of transfers out) would be relevant to a request from a government benefits program, and the same factors may have little or no relevance to a mortgage company.
  • risk-related data in addition to the risk marker itself
  • such data could be stored in a separate table of data (to be described later), and would only be accessed if the risk is relevant to the purpose of the request.
  • FIGS. 3 , 4 and 5 illustrate processes for responding to requests received at the database system 110 .
  • a request to the system 110 may have a standard format and include information pertinent to the person (for whom the account data is sought), such as account holder SSN, name, address, and bank name(s) and account numbers (if any).
  • information needed to identify any accounts for the person could be minimal and, in one embodiment, might only be an SSN.
  • the SSN may be the only identifier provided and used to locate accounts.
  • account verification request e.g., by a mortgage company wanting to verify balance information supplied by an applicant
  • account numbers would typically be provided (for redundancy) as identifiers in addition to an SSN, to make sure that any account identified by an applicant is considered in verifying account balances.
  • the system 110 could process and return account information based on a social security number.
  • the requester may only provide a social security number as an identifier, and information can be returned by system 100 based only on that identifier and not relying on account numbers or other data concerning the account holder.
  • a request for an account search (e.g., locating for a government agency any account at any institution belonging to a person that is the subject of the search) is received by system 110 (step 310 ).
  • the system determines if the request is valid (step 312 ).
  • Such a determination could be based on several possible factors, such as whether the requester is authorized (e.g., the requester has, in advance, been properly authorized as an entity or individual), whether the request has been properly formatted (e.g., a personal identifier, such as a provided SSN, has the correct number of digits or is recognized as a valid SSN), and whether the device transmitting the request is recognized (e.g., from previous transactions or has been authorized in advance by the requester). If the request is not valid, the requester is notified (and the request is not processed further). If the request is valid, the system next determines whether there is an account in the database system 110 that matches the provided personal identifier (step 314 ).
  • the requester is notified and the process ends (as indicated in FIG. 3 ).
  • other steps can be taken (point “A” in the drawings) to identify accounts without using a social security number (such steps will be described shortly in conjunction with FIG. 4 ).
  • the system looks for matches with other data (if any) provided by the requester (step 320 ). For example, a name or address provided in the request is compared to the data stored in system 110 for the identified account, and if there is no match the requester is notified and the search may end (at least temporarily). Alternatively, the process could continue, but with the understanding that the account data may not be relevant to the person that is the subject of the request. If the data matches at step 320 , then the data for the identified account is retrieved, step 322 . If risk data is also to be provided (if available and requested, step 324 ), then the risk data is retrieved (step 326 ) and the retrieved data is provided to the requester as part of the response (step 330 ).
  • the system 110 can be programmed to locate accounts using other personal information of the person in question. This is illustrated in FIG. 4 , where the system 100 first looks for other matches of personal information (e.g., names, addresses, phone numbers), and if there is match (step 412 ), the system may also analyze the match to verify that the information is for same account holder (step 414 ). As an example, this last step can be based on the amount of information matched, so that with two or more pieces of personal information being the same (both name and address for an account are the same as the name and address in the request) a match is indicated.
  • personal information e.g., names, addresses, phone numbers
  • the system 100 if there is there is no match, the system 100 notifies the requester and the search ends.
  • the system 100 may also further review any account where a match is made and verified at steps 412 and 414 , identify the personal identifier such as an SSN for that verified account, and then also identify any other accounts in the database (at any institution) having the same personal identifier as the verified account (step 416 ). This process then returns to the process in FIG. 3 , with any retrieved data provided back to the requester.
  • FIG. 5 illustrates a process similar to that of FIG. 3 , but rather than an account search request, this process is used to respond to an account verification request (e.g., from a mortgage company).
  • An account verification request is received by the system 110 (step 510 ) and the system determines if the request is valid (step 512 ). The system then determines if any accounts stored in the system are identified by the provided personal identifier such as an SSN, step 514 . Since many account verification requests will also include account numbers provided by an applicant, the system determines if any accounts are identified by provided account numbers (step 516 ). The accounts that are identified (either at step 514 or step 516 ) are retrieved (step 522 ).
  • the system notifies the requester as to the nature of the matches (step 520 ). If there is no match of any accounts (no match of either the personal identifier or the account number), the requester is so notified and the process may end with that notification at step 520 (as indicated in FIG. 5 ). Alternatively, additional steps can be taken (point “A” in the drawings) to identify accounts (such additional steps are shown in, and were earlier described in conjunction with, FIG. 4 ). If, at step 520 , there has been a match of only one of the personal identifier or account number, the requester is so notified (as to what identifier or information resulted in the match) and the process continues to the earlier described step 522 (account data for the identified account is retrieved).
  • risk data is also to be provided (if available and requested, step 524 )
  • the risk data is retrieved (step 526 ) and the retrieved data is provided to the requester as part of the response (step 530 ).
  • FIGS. 3 , 4 and 5 illustrate the search or verification process ending when no accounts are indentified or found within system 110 (e.g., at steps 314 , 412 , and 520 ), it should be appreciated that other methods could be employed to respond to a search or verification request, in the event of an account not being found within system 110 .
  • the system 110 could be configured to forward those account numbers to the institution(s) where they are maintained (e.g., using an RTN or bank name provided with the request), and then to respond to the requestor with any information supplied directly by the institution.
  • information supplied directly by the financial institution may supplement the account data retrieved from database 120 and, in those cases, both the information from the financial institution and account data retrieved from database may be provided in a response to the requestor (e.g., at steps 330 and 530 ).
  • the methods just described could be accomplished automatically (on a batched basis or in real-time) in response an account number not being found in system 110 or, alternatively, could be accomplished with the assistance of personnel involved in operating system 110 .
  • system 110 could be electronically linked to the systems at various financial institutions 140 and configured to remotely search account databases at those institutions, so that as the system 110 searches its own database 120 it could likewise search (simultaneously or otherwise) the databases of the linked financial institutions and combine any located data in a response to a requester.
  • risk-related data may be generated based on the account data provided to and stored database system 110 .
  • the scoring logic which could be implemented within the database management system 130 or a separate processing system (not shown) within central account database system 110 , may use a statistical or rules-based analysis (other forms of analysis, such as artificial neural networks, could also be used) to develop a score (examples of analysis used by scoring logic 610 will be given shortly).
  • the account data may not be sufficient to generate a score (e.g., the account has recently been opened, or there has been very little or no account activity).
  • the account data may be stored in a hold account queue 612 until sufficient data is available.
  • the account data and resulting risk score may be stored in a scored account queue 614 , which includes a risk score table 620 .
  • the process of FIG. 6 also illustrates that the scoring process may be continuous.
  • the account data is reapplied to the scoring logic 610 .
  • the additional data is also used in association with already scored accounts in scored account queue 614 to make fresh calculations of risk data for those accounts. That is, the scoring logic 610 is periodically re-run using updated account data (along with previous data in the scored account queue 614 ), and the table 620 is updated with new scores as they are generated. Over time, most of the accounts represented in the hold account queue 612 should migrate to the scored account queue 614 . Eventually, most active accounts will have risk scores in table 620 .
  • risk scores 622 in table 620 are illustrated as numerical (from 1 to 100), with “100” representing the highest risk and “1” representing the lowest. Of course other, simpler forms of risk data could be generated, such as only three risk levels (“low,” “medium,” and “high”). Also, risk reasons 624 are illustrated in table 620 . Such reasons (or codes for such reasons) could be based on risk factors described below.
  • the following tables illustrate scoring analysis (exemplary risk factors and corresponding risk impact) that could be used in scoring logic 610 , for both an account search request (involving government benefits) and an asset verification request (involving a mortgage application).
  • the risk scores could be calculated by initially assigning a neutral score (e.g., 50), and then increasing or decreasing the initial score based on the risk impact identified in the tables.
  • individual risk factors could be weighted differently, e.g., depending on desires of the requester or based on experiential data collected by the operator of the system 110 .
  • some risk factors require comparing account data to relevant data in separate, external databases (as an example, such databases might store names, addresses, email addresses, phone numbers and account numbers of suspected fraudsters). The system 110 would access those external databases as necessary in performing various risk analysis steps.
  • Risk Score Analysis Account Search-Government Benefits Factors Risk Impact Transfer In/Out Patterns Frequent deposits and withdrawals - (money flow in and out increased risk (likely attempt to keep of account) balances low) Infrequent transactions - decreased risk Dates of Withdrawals (in Withdrawals within 6 months of begin date - relation to program increased risk (likely attempt to conceal requirements specifying assets) a begin date for balances Withdrawals more than 6 moths prior to to be below program begin date - decreased risk threshold amount) Amount of Withdrawals At least one withdrawal - increased risk (e.g.
  • Risk Score Analysis Mortgage Application Factors Risk Impact Saving Pattern Infrequent deposits during each month (not a likely consistent “saver”) - increased risk Frequent and consistent deposits - decreased risk Added Signer Signer address same as applicant - decreased risk Signer address at zip code distant from applicant - increased risk Name or SSN of new signer matches suspected fraudsters - increased risk No matches with suspected fraudsters - decreased risk Recent deposits Large Amount(s) - increased risk Small amount(s) - decreased risk
  • the system 100 will likely store account information across most (if not all) financial institutions, additional data (not directly related to the account at hand) can be collected to provide additional forms of risk analysis. For example, if account data for an account is accessed and it reveals a large deposit (or a series of recent deposits that total a large amount), all other accounts in the system could be checked to see if a corresponding and identical withdrawal amount (or series of withdrawals) can be matched, thus linking another account (as a source account) to the account at hand. The system 110 could then check external databases to see if the source account is associated with a fraudster.
  • Embodiments of the invention also support other useful ways to tap the extensive and rich source of information maintained in the system 110 .
  • the account data (including the risk scores) maintained in the system 110 may be used to assess creditworthiness. Not only could stored risk data be used in such an assessment, but loan or other credit accounts could be accessed (e.g., using only a SSN) to locate outstanding balances or credit limits (when stored in association with such accounts), and thus determine either the general creditworthiness of a person or entity (e.g., a person applying additional credit), but also verify representations made by an applicant in connection with the applicant's existing accounts.
  • a government or law enforcement agency may provide one or more personal identifier(s) corresponding to an individual or an entity named in a subpoena (or an instrument such as a National Security Letter or Writ of Execution) for financial or accounting records access, and the provided personal identifier(s) is/are used to determine which institutions, if any, have account or financial information for the individual or an entity named in the subpoena.
  • the names of the matching institutions are provided to the government or law enforcement agency with sufficient information (account number or identification information, for example) so that the subpoena may be efficiently served on the one or more matching institutions. If no matching institutions are found, indicia showing no match found may be returned to the government or law enforcement agency. As described more completely below, additional embodiments may perform analysis to provide additional information to the querying agency.
  • the personal identifier for the individual or entity named in the subpoena may comprise any desired identification element, including, but not limited to, an SSN, a personal name, a mailing address, a physical address, the name of a corporate entity, a driver's license number, a prisoner number, an immigration number, a Matricula Consular number, or any other desired indicia.
  • personal identifiers may constitute a plurality of information designed to either narrow or broaden the search criteria depending on the desired result. Requiring more than one match for a plurality of provided identifiers might produce fewer results and would narrow the search. A match for any one of a plurality of provided identifiers might produce more results and would broaden the search.
  • furnishing a plurality of personal identifiers such as an SSN and name and address may further refine the search results and limit false positives, but depending on the amount of information returned, submissions of multiple identifiers, if a multiple match is required, could return too little information to be useful.
  • the submitting agency may specify which of the submitted personal identifiers are required, and which may be optional, or which may be required in combination. For example, the submitting agency may specify that both a last name and an SSN must match the submission.
  • personal identifiers may comprise a list of related information for a suspect individual, for instance, a list of personal identifiers corresponding to known associates of the individual, and accounts of the known associates may be identified (along with the accounts of the suspect individual).
  • additional analysis techniques which may include link analysis or network analysis, account information corresponding to known associates and to others linked to the individual or entity identified in the subpoena may be returned to the submitting agency.
  • FIG. 7 A simplified illustration of one such process is seen in FIG. 7 .
  • the process of FIG. 7 is similar to (and has steps corresponding to those of) of FIG. 3 , but more specifically involves a search request (step 710 ) from a government agency for an individual or entity contemplated as the subject of a subpoena.
  • the system 110 determines whether the request is valid, step 712 , and whether any accounts associated with a personal identifier of the subject (such as a social security number) can be identified, step 714 .
  • a personal identifier of the subject such as a social security number
  • step 720 other account data (e.g., name and address, if any, provided with the request) may be used to provide additional confirmation that the identified account is matched to the person that is the subject of the search. While not illustrated in FIG. 7 , linking and network analysis can optionally be used to identify additional accounts and provide other information that may have some association with the subject of the contemplated subpoena, as will be described in connection with a specific example to follow shortly.
  • account data e.g., name and address, if any, provided with the request
  • linking and network analysis can optionally be used to identify additional accounts and provide other information that may have some association with the subject of the contemplated subpoena, as will be described in connection with a specific example to follow shortly.
  • Account data for any identified account is retrieved at step 722 .
  • risk data associated with an identified account may also be retrieved (step 726 ).
  • risk data may be used to determine the need for quickly executing a subpoena and then seizing an account that has a high risk of being involved in fraudulent activity (and that may be likely to have its balance quickly depleted/transferred by the fraudster/account holder).
  • the retrieved data is provided (step 730 ), and a subpoena is prepared and executed at step 732 by the government agency.
  • the law enforcement agencies may be provided indicia regarding which institutions have accounts related to Vito Corleone with a matching SSN, and optionally, account indentifying information corresponding to accounts for which Vito is a signatory.
  • Vito's last known address was known by the submitting law enforcement agency (123 Genco Way, Long Island N.Y.), and a list of known associates: P. Clemenza, S. Tessio, L. Brasi, D. Tommasino, and T. Hagen.
  • a query could then be submitted to systems of the present invention to find accounts matching his address and any of his known associates, and such accounts may then be scrutinized to determine whether they are associated with Vito Corleone.
  • Those of skill in the relevant arts also realize that other cross-matching information (for example Vito's middle name “Andolini”) might be utilized with or without his SSN, and with or without other identifying information such as known associates.
  • Vito's middle name “Andolini” might be utilized with or without his SSN, and with or without other identifying information such as known associates.
  • Vito Corleone's social or financial transaction history may be analyzed to determine possible accounts that have some association with Vito.
  • Types of ancillary information provided about Vito may include checking account records of any kind (bank statements, cancelled checks, etc.), loan information (loan applications, ledgers, etc.), savings account and securities records (certificates of deposit, investments, etc.), records of any safe deposit boxes at a bank, supporting financial documents (copies of tax returns, credit reports, etc.), current or present addresses associated with an account, hot files, accounts closed for cause, mobile or land line phone numbers associated with Vito or his present or prior addresses, and the like.
  • requests for subpoena/NSL account identification may be made by the requesting agency individually in a real-time, or in a single or grouped batch mode submittal that is executed at a predetermined time interval (for example, overnight). Additionally, further analysis could produce information that may be provided to the requesting government or law enforcement agency regarding identity information for other individual signatories on joint accounts that correspond to the individual or entity named in the subpoena; prior transactions indicating financial fraud related to the individual or entity named in the subpoena, and through network analysis, identifications of or risk indicia regarding any potential fraud rings associated with the individual or entity that is named in the subpoena.
  • additional related investigatory leads may be provided to the government or law enforcement agency as a result of social or transactional associations with other entities.
  • the requesting agency or an entity, broker, or processor acting on the agency's behalf
  • the requesting entity/broker/processor may process the response on the institution's behalf directly to the law enforcement agency.
  • the requesting government agency may specify to a processor/broker the relevant laws, statutes, rules, or orders under which it has acting authority to submit the subpoena/NSL, and the processor/broker pursues obtaining the information for the agency on its behalf.
  • the processor/broker may utilize the specified listing of laws, statutes, rules or orders furnished by the government agency to tailor the information request to one or more institutions that have been determined to possess information about the subject of the subpoena/NSL, and may optionally filter or redact any information that is received from the relevant institutions that is not permitted to be provided under a legal framework of identified statutes, laws, or rules.
  • FIG. 8 is a block diagram illustrating an exemplary computer system upon which embodiments of the present invention may be implemented.
  • This example illustrates a computer system 800 such as may be used, in whole, in part, or with various modifications, to provide the functions of the central database system 110 , including the DBMS 130 and the scoring logic 610 , as well as other components and functions of the invention described herein.
  • the computer system 800 is shown comprising hardware elements that may be electrically coupled via a bus 890 .
  • the hardware elements may include one or more central processing units 810 , one or more input devices 820 (e.g., a mouse, a keyboard, etc.), and one or more output devices 830 (e.g., a display device, a printer, etc.).
  • the computer system 800 may also include one or more storage devices 840 , representing remote, local, fixed, and/or removable storage devices and storage media for temporarily and/or more permanently containing computer-readable information, and one or more storage media reader(s) 850 for accessing the storage device(s) 840 .
  • storage device(s) 840 may be disk drives, optical storage devices, solid-state storage device such as a random access memory (“RAM”) and/or a read-only memory (“ROM”), which can be programmable, flash-updateable or the like.
  • RAM random access memory
  • ROM read-only memory
  • the computer system 800 may additionally include a communications system 860 (e.g., a modem, a network card—wireless or wired, an infra-red communication device, a BluetoothTM device, a near field communications (NFC) device, a cellular communication device, etc.)
  • the communications system 860 may permit data to be exchanged with a network, system, computer, mobile device and/or other component as described earlier.
  • the system 800 also includes working memory 880 , which may include RAM and ROM devices as described above.
  • the computer system 800 may also include a processing acceleration unit 870 , which can include a digital signal processor, a special-purpose processor and/or the like.
  • the computer system 800 may also comprise software elements, shown as being located within a working memory 880 , including an operating system 884 and/or other code 888 .
  • Software code 888 may be used for implementing functions of various elements of the architecture as described herein.
  • software stored on and/or executed by a computer system, such as system 800 can be used in implementing the processes seen in FIGS. 3-7 .
  • a computer system 800 may have numerous variations from that described above. For example, customized hardware might also be used and/or particular elements might be implemented in hardware, software (including portable software, such as applets), or both. Furthermore, there may be connection to other computing devices such as network input/output and data acquisition devices (not shown).
  • the central account database system 110 system may be implemented by a single system having one or more storage device and processing elements.
  • the central account database system 110 system may be implemented by plural systems, with their respective functions distributed across different systems either in one location or across a plurality of linked locations.

Abstract

Account data (e.g., balance information) for accounts at a plurality of financial institutions (or government agencies) is stored (and updated) in a central database system and accessed using a personal identifier, such as a social security number. Risk data may be generated for accounts based on the account data. The account data and risk data are accessed in response to either an account search request (e.g., from a government entity and relating to a benefits program or a subpoena) or an account verification request (e.g. from a mortgage company and relating to a mortgage application).

Description

    CROSS-REFERENCES TO RELATED APPLICATIONS
  • This patent application claims priority to U.S. Provisional Patent Application No. 61/499,599 entitled, “Systems and Methods for Fraud Detection/Prevention for a Benefits Program,” filed Jun. 21, 2011, the complete disclosure of which is fully incorporated by reference herein for all purposes.
  • BACKGROUND OF THE INVENTION
  • Account balance and other information for accounts held by an account owner are often needed by third parties for various reasons. For example, when applying for a mortgage, an applicant is typically required to provide information on all of the applicant's accounts to ensure there is sufficient cash attributable to the applicant (e.g., to use as a down payment). As another example, when applying for government benefits, such as supplemental security income (SSI) or other cash or services programs, a beneficiary's accounts must be located to ensure available assets have not been illegally transferred or do not otherwise exceed any qualification amount limits.
  • Searching for and verifying account balances can be difficult and time consuming. For example, in the case of a mortgage application, where an applicant has a number of accounts at different banks or other institutions (as used herein, “institutions” may include any type of financial service organizations, such as banks, credit unions, third-party payment services such as PayPal or the like, online banking services, online virtual money account systems, investment firms, brokerages, credit card companies, loan companies, check cashing services, payday loan services, government institutions, or any other entity providing financial services or information), verifying account balances may involve sending written requests to a number of different institutions, and each institution conducting a manual look-up for each specified account. Further, the applicant may not have complete account numbers or may not remember or provide information on all accounts. Even if the applicant has account numbers, the applicant may not provide the correct bank name or ID (such as a routing and transit number) to enable convenient and timely verification. In other cases, when the applicant has all the necessary account information, and even if a current balance has been confirmed by a bank, that balance may not be legitimate. That is, an applicant may have received or borrowed funds from another person (such as a relative) to temporarily show an account balance larger that what is actually owned by the account holder, to fraudulently qualify for a mortgage, loan, or government benefit.
  • In the case of an application for government benefits, an applicant may not disclose accounts, or income reflected in those accounts that would result in disqualification under the benefits program, or may have made transfers out of accounts to conceal assets.
  • Further, government and law enforcement agencies may from time to time have need to execute and serve subpoenas or National Security Letters (“NSLs”) pursuant to 18 U.S.C. §2709 (or other applicable statutes) to institutions to gain access to financial accounts or information for individuals or entities (such as corporations) named in such subpoenas. However, it is time consuming and expensive for such government and law enforcement agencies to locate which institutions may have information regarding an individual or entity named in a subpoena, and the institutions waste significant resources and expense responding to such subpoenas especially when there is no account or financial information for the named individual or entity that is accessible by the particular institution. The problem is magnified by the current approach of law enforcement to take a “shotgun” approach by delivering subpoenas or NSLs to a large number of major institutions in an attempt to find any applicable accounts for a person or entity of investigatory interest.
  • Thus, there is a need for systems and methods to locate, verify and/or access account information, especially for accounts that are maintained across a number of different institutions.
  • BRIEF SUMMARY OF THE INVENTION
  • Embodiments of the present invention provide systems and methods for locating and accessing assets, such as accounts. For purposes of the present disclosure, accounts may include, but are not limited to, deposit accounts such as checking, savings, CDs, money market accounts in the United States, or International accounts. Accounts may also include (i) reward or loyalty accounts providing merchant reward points, such as in the exemplary case of retail sales; (ii) online financial accounts such as PayPal accounts; (iii) online gaming such as Farmville or SecondLife; or (iv) frequent flyer programs or stored value accounts. Further, accounts may include credit or loan accounts, credit card accounts, debit accounts, prepaid accounts, or any account regarding any desired type of financial information.
  • In one embodiment, a system and method is provided for locating an account. The system and method provides a database for storing account data for accounts maintained at a plurality of institutions. The account data for each account includes at least a personal identifier for an account holder. A request to locate an account is received, with the request including a submitted personal identifier. The account is located by matching the submitted personal identifier to the personal identifier stored in the database, and at least some of the account data for the located account is retrieved.
  • In another embodiment, a system and method is provided for locating and accessing an account of an account holder without having to contact one or more institutions where the account might be maintained. The system and method provides a database populated with account data for a plurality of accounts from a plurality of institutions maintaining the accounts. Account data is initially transferred from each of the institutions. The account data represents a plurality of account characteristics associated with each of the accounts. The account characteristics comprise an account identifier assigned to each account by the maintaining institution, a personal identifier for the account holder that is assigned by an entity independently of the institutions, and a balance of funds in the account. Updated account data is also periodically transferred from each of the institutions. The account data is stored in the database. A personal identifier (such as a social security number) for an account holder may be used to locate and retrieve at least some of the account data.
  • In an additional aspect, a government or law enforcement agency may provide one or more personal identifier(s) corresponding to an individual or an entity named in a subpoena (or an instrument such as a National Security Letter or Writ of Execution) for financial or accounting records access, and the provided personal identifier(s) is/are used to determine which institutions, if any, have account or financial information for the individual or an entity named in the subpoena. If one or more of such institutions are found to have such account or financial information for the individual or an entity named in the subpoena, the names of the matching institutions are provided to the government or law enforcement agency with sufficient information (account number or identification information, for example) so that the subpoena may be efficiently served on the one or more matching institutions. If no matching institutions are found, indicia showing no match found may be returned to the government or law enforcement agency. Although a preferred embodiment provides the account identification information for subpoenas to government or law enforcement agencies, it is understood by those of skill in the art that a service could be provided to non-government entities or persons to locate bank accounts corresponding to the identified parties. As described more completely below, additional embodiments may perform analysis to provide additional information to the querying agency.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a block diagram of a system for locating and accessing account information in accordance with embodiments of the invention.
  • FIG. 2 illustrates exemplary data provided to and stored in the database system of FIG. 1.
  • FIGS. 3-5 are flow diagrams illustrating several processes used within the database system of FIG. 1, for locating and accessing account data.
  • FIG. 6 is a block diagram of one suitable scoring model and process for use in one embodiment of the invention.
  • FIG. 7 is a flow diagram illustrating a process used within the database system of FIG. 1, in accordance with an alternative embodiment.
  • FIG. 8 is a block diagram of a computer system upon which various devices, systems, and processes described in conjunction with FIGS. 1-7 may be implemented.
  • DETAILED DESCRIPTION OF THE INVENTION
  • Described embodiments of the present invention provide means for enabling assets (such as financial accounts owned by an account holder) to be located and accessed, even when maintained at a number of different institutions. In some embodiments, accounts are located using a personal identifier associated with the account holder, rather than an account number. In one specific embodiment, the personal identifier is a social security number (SSN).
  • In certain described embodiments, a system for locating assets may receive two different types of requests to locate assets (such as financial accounts). One such request may be an asset search request, and the other may be an asset verification request.
  • Briefly, as examples, an asset search request might be used by a government entity to locate accounts of a person applying for welfare benefits or some other form of government assistance. Government programs providing benefits (particularly welfare benefits) often have criteria that permit applicants/beneficiaries to qualify only as long as their assets (such as checking, savings and other financial accounts) have balances below a specified threshold. As an example, in many states, a beneficiary must have no more than $2000 in assets in order to qualify for Medicaid nursing home benefits. The systems and methods described herein permit an asset search for any accounts held by the beneficiary in order to confirm that balances in accounts held by the beneficiary are in fact below the required threshold. In other embodiments, transaction data in an identified account may be evaluated to determine or verify benefits eligibility. For example, where benefits eligibility is based on or related to income, a system and method could additionally provide account data relevant to the risk that a beneficiary is receiving income (e.g., deposited into an account) that would make the beneficiary ineligible for benefits. As a more specific example, in the case of unemployment insurance benefits paid by a government agency, transaction data in an identified account could be evaluated to provide risk scores and/or indicators pertaining to whether there might be employment income deposited to an account that would make the account holder ineligible for receiving or continuing to receive unemployment benefits. Data reflecting the likelihood of employment income could be based on data provided for ACH transactions posted to the account (e.g., ACH data indicating payroll deposits), or for non-ACH deposits (e.g., check deposits), based on the payor name or account, the check amount, or other check deposit information (e.g., by comparing that information to prior employment data provided by the beneficiary or by comparing that information to transaction patterns or history). In some embodiments, the periodicity or timing of deposit transactions might be relevant and could be evaluated.
  • An asset verification request, on the other hand, might be used by an entity (such as a mortgage company) to verify account balances. For example, a mortgage applicant may state that the applicant has sufficient funds saved in one or more accounts to make a down payment (or sufficient funds saved to supplement income as needed to make mortgage payments). In this example, a mortgage company needs to verify that balances in the applicant's accounts are adequate to meet the applicant's financial needs after the mortgage has been granted.
  • Embodiments of the present invention support alternative asset search and verification queries or requests. For example, systems and methods as described herein may be used in various situations where account information (such as balances) may be needed, such as to qualify or comply with certain government programs, to obtain consumer/commercial loans, or to initiate legal or other actions. These other situations include (but are not limited to) programs involving cash or noncash welfare payments, health care assistance, Supplemental Nutrition Assistance Program (SNAP), Supplemental Security Income (SSI), child support requests (e.g., confirming financial means or needs), Housing Subsidies, Earned Income Tax Credits (EITC), corporate audit verifications, small business loans, student loans, student financial assistance, credit checks, and delinquent tax collections.
  • Other embodiments may support asset search and verification requests for various kinds of accounts or account information beyond those maintained at financial institutions. For example, government agencies may contribute benefits data, including details relating to those benefits and relating to the beneficiary, such as name, address, social security number (SSN), date of birth, employer (if any), date benefits applied for, type or amount of benefits, date benefits began, agency or agency location, and so forth. As should be appreciated, such information (particularly when accessible by using a personal identifier or SSN of the beneficiary), can be used to identify and assess the risk of fraud when processing a beneficiary's request for benefits.
  • In addition, systems and methods of the present invention permit account information from a large number of banking and other institutions as well as from government agencies to be stored in a single database system so that accounts across all of those institutions or agencies may be searched or verified with one request. Not only does this eliminate the need for contacting multiple institutions and agencies, but it also permits the data from individual accounts (or multiple accounts) to be analyzed for risk-related factors (e.g., in the case of mortgage applications, factors indicating savings patterns, suspicious deposits, and possible links to known fraudsters/con artists; and in the case of government benefits, factors indicating suspicious transfers to third parties or benefits received across multiple jurisdictions or agencies). In some embodiments, search or verification requests may be batched and sent daily. In other embodiments, an individual search or verification request can be sent electronically (on-line and in real-time), and an immediate response can be returned by the system. In one implementation, the located account information sent in the response can be immediately reviewed, perhaps in the presence of the applicant (e.g., while a mortgage applicant is in the presence of a mortgage officer), thus permitting the applicant to explain discrepancies and provide further information that can be used to refine subsequent requests, if appropriate. Such an exchange of information in real time may significantly reduce the time and cost of mortgage qualification, cash and services benefits applications and other processes requiring a search or verification of accounts.
  • Turning now to FIG. 1, there is shown an exemplary system 100 for locating and accessing account information. The account information is stored and processed at a central account database system 110 having a database device 120 for storing account information and an account database management system (DBMS) 130 for managing the data in database 120 (e.g., the DBMS stores, retrieves, arranges, sorts and processes the data in the database). As illustrated, the data used to populate the database 120 is obtained from a number of financial institutions 140. In addition, requests to access the account data stored in database system 110 may be received from government agencies 150 (e.g., to establish qualification for benefits), from mortgage companies 160 (e.g., to verify account balances) and from other entities 170 (e.g., needing to locate and access account data for various reasons, such as creditworthiness, ability to supply funds, or debt or asset verification).
  • The financial institutions 140 maintain financial accounts, and include banks, savings and loan associations, investment firms and similar institutions. The accounts for which data is provided may include checking accounts, savings accounts, certificates of deposit, brokerage accounts, money market accounts, and other financial accounts (in the United States or elsewhere). Accounts may also include (i) reward or loyalty accounts providing merchant reward points, such as in the exemplary case of retail sales; (ii) online financial accounts such as PayPal accounts; (iii) online gaming accounts, such as Farmville or SecondLife accounts; or (iv) frequent flyer programs or stored value accounts. Further, accounts may include credit or loan accounts, credit card accounts, debit accounts, prepaid accounts, or any account regarding any desired type of financial information.
  • It should be appreciated that, while the embodiment illustrated in FIG. 1 assumes financial institutions will contribute data, and that government agencies, mortgage companies and other entities will access the data, in some cases the financial institutions 140 may also access account data in system 110 (e.g., as part of a loan application) and government agencies 150, mortgage companies 160 and other entities 170 may contribute account data (e.g., benefits accounts and mortgage accounts). Thus, in their broadest sense, financial institutions 140 may represent any kind of institution or other entity maintaining an account or asset (financial or otherwise), and government agencies 150, mortgage companies 160 and other entities 170 may represent any kind of entity (governmental, commercial or otherwise) wanting to locate and/or verify accounts or assets that are maintained at various institutions.
  • FIG. 2 illustrates exemplary data provided to (and stored in) the database system 110 by each of the financial institutions 140. In this particular example, the data comprises account data for a bank account, and thus includes the following data fields (collectively designated as 202 in FIG. 2):
  • Routing and Transit Number (RTN) Account Number
  • Account Type (e.g., checking, savings, certificate of deposit, investment account)
  • Social Security Number (SSN)/Tax ID Number
  • Account Status (open/present, closed, deceased, non-sufficient funds, etc.)
  • Name of Account Holder(s) Authorized Signor(s) of Account Address(es) of Account Holder Email Address(es) of Account Holder Phone Number
  • Date of Birth (DOB) of Account holder
    Data date (date of receipt by system 110)
  • Current Balance
  • Average Balance (e.g., average balance over the past 30 days)
  • Interest Paid
  • Maturity Date (e.g., maturity date for a certificate of deposit)
  • As should be appreciated, FIG. 2 shows data for only one account, and in practice there would be many accounts from many institutions stored in database system 110.
  • As seen in FIG. 2, the data includes an initial transfer 210 for each of the data fields (current and historical information at the time of the initial transfer), and subsequent periodic transfers 212-1 through 212-n for most of the same data fields (to keep the data updated). In FIG. 2, the illustrated periodic data transfers 212-1 through 212-n are each transferred and stored daily (Day 1, Day 2, Day 3, etc., up to the current day). Such a frequent updating is generally preferred, although is some embodiments and applications a less frequent updating might be acceptable. The updated data fields are illustrated as including the same data as the initial transfer, other than the RTN, Account Number and Account Type fields, since it is assumed, for purposes of the described embodiment, that these three data fields will remain unchanged over the life of the account.
  • Also, FIG. 2 shows each updated daily transfer of data (212-1 through 212-n) having all fields 202 in database system 110 populated with data (other than RTN, Account Number and Account Type). However, in practice, much of that data will not change between transfers, and so database system 110 may be managed so that only the changed data in a daily transfer will be stored (in such case, especially if updates are daily, many of the data fields illustrated in FIG. 2 would in fact not be populated in order to efficiently mange storage space and minimize unnecessary data processing). This filtering of unnecessary data could be implemented in one embodiment by database system 110 being programmed to review data fields as they are received from the financial institutions 140 and to remove data that has not changed since the day before. In another embodiment, the financial institutions 140 may have systems on-site and programmed to remove unchanged data before it is transmitted.
  • It should be appreciated that, since the data stored in database system 110 is likely to be extensive for any given account, the account data could be processed in a number of ways by system 110, in addition to being available to a requester making an account search or verification request. For example, the data could be processed to provide balance information in various forms (e.g., a single, current 30 day average balance, or average balances over 6 months, over 1 year or longer). The needs of the requester can thus be met by processing data in a way that is useful to the requester (e.g., a governmental entity is likely to need different information than a mortgage company). In a response the data associated with any account can be filtered, processed and stored in a way to provide only the information on the account that is most useful to the requester.
  • In addition, and as will be described in more detailed later, the data associated with an account can be analyzed (and, in some cases, compared to data from other, external sources) to provide risk scores or other risk-related data pertinent to the request. For example, the database system 110 may respond to a mortgage company request with not only basic account information (current status, current account balance, and average balance), but also with alerts and flags if critical data has recently changed (new signers, new account holder names, significant changes in balances, etc.). Also, patterns for deposits and withdrawals (e.g., as reflected in daily balances) can indicate if the account holder is a consistently good saver, or has relied on a single or a few large deposits in order to reach the current balance. If the entity managing the database system 110 provides risk-related data, then data stored in the database could also include a risk marker 216 (stored in a “Risk Flag” field as seen in FIG. 2) that indicates risk factors have been identified for the account. The risk marker could be as simple as a “yes” or “no,” and in other embodiments could be a code to indicate whether the risk is relevant to specific categories of requesters, such a government benefits program, a mortgage company, a creditor, or some other request category. It should be appreciated that some factors (e.g., recent patterns of transfers out) would be relevant to a request from a government benefits program, and the same factors may have little or no relevance to a mortgage company. In embodiments where the system has collected risk-related data (in addition to the risk marker itself), such data could be stored in a separate table of data (to be described later), and would only be accessed if the risk is relevant to the purpose of the request.
  • FIGS. 3, 4 and 5 illustrate processes for responding to requests received at the database system 110. Before proceeding with descriptions of such Figures, it should be noted that a request to the system 110 may have a standard format and include information pertinent to the person (for whom the account data is sought), such as account holder SSN, name, address, and bank name(s) and account numbers (if any). However, information needed to identify any accounts for the person could be minimal and, in one embodiment, might only be an SSN. For example, in the case of an account search request (e.g., by a government agency doing a search for accounts), the SSN may be the only identifier provided and used to locate accounts. Other relevant data can be provided, if desired, to provide more accuracy and confirm matches (name, address, and even bank account numbers—if supplied by the person), and generally more information will be returned and its accuracy improved when more personal information is provided. In the case of an account verification request (e.g., by a mortgage company wanting to verify balance information supplied by an applicant), account numbers would typically be provided (for redundancy) as identifiers in addition to an SSN, to make sure that any account identified by an applicant is considered in verifying account balances. But even in that example, the system 110 could process and return account information based on a social security number. However, with either type of request, it should be appreciated that in some embodiments the requester may only provide a social security number as an identifier, and information can be returned by system 100 based only on that identifier and not relying on account numbers or other data concerning the account holder.
  • Turning now to FIG. 3, a request for an account search (e.g., locating for a government agency any account at any institution belonging to a person that is the subject of the search) is received by system 110 (step 310). The system determines if the request is valid (step 312). Such a determination could be based on several possible factors, such as whether the requester is authorized (e.g., the requester has, in advance, been properly authorized as an entity or individual), whether the request has been properly formatted (e.g., a personal identifier, such as a provided SSN, has the correct number of digits or is recognized as a valid SSN), and whether the device transmitting the request is recognized (e.g., from previous transactions or has been authorized in advance by the requester). If the request is not valid, the requester is notified (and the request is not processed further). If the request is valid, the system next determines whether there is an account in the database system 110 that matches the provided personal identifier (step 314). If the personal identifier does not identify any account, the requester is notified and the process ends (as indicated in FIG. 3). Alternatively, other steps can be taken (point “A” in the drawings) to identify accounts without using a social security number (such steps will be described shortly in conjunction with FIG. 4).
  • If accounts are identified with the provided personal identifier, the system looks for matches with other data (if any) provided by the requester (step 320). For example, a name or address provided in the request is compared to the data stored in system 110 for the identified account, and if there is no match the requester is notified and the search may end (at least temporarily). Alternatively, the process could continue, but with the understanding that the account data may not be relevant to the person that is the subject of the request. If the data matches at step 320, then the data for the identified account is retrieved, step 322. If risk data is also to be provided (if available and requested, step 324), then the risk data is retrieved (step 326) and the retrieved data is provided to the requester as part of the response (step 330).
  • As mentioned above, in some cases, even if an account is not identified with a personal identifier such as an SSN (step 314), the system 110 can be programmed to locate accounts using other personal information of the person in question. This is illustrated in FIG. 4, where the system 100 first looks for other matches of personal information (e.g., names, addresses, phone numbers), and if there is match (step 412), the system may also analyze the match to verify that the information is for same account holder (step 414). As an example, this last step can be based on the amount of information matched, so that with two or more pieces of personal information being the same (both name and address for an account are the same as the name and address in the request) a match is indicated. In this example, if there is there is no match, the system 100 notifies the requester and the search ends. As an additional step, the system 100 may also further review any account where a match is made and verified at steps 412 and 414, identify the personal identifier such as an SSN for that verified account, and then also identify any other accounts in the database (at any institution) having the same personal identifier as the verified account (step 416). This process then returns to the process in FIG. 3, with any retrieved data provided back to the requester.
  • FIG. 5 illustrates a process similar to that of FIG. 3, but rather than an account search request, this process is used to respond to an account verification request (e.g., from a mortgage company). An account verification request is received by the system 110 (step 510) and the system determines if the request is valid (step 512). The system then determines if any accounts stored in the system are identified by the provided personal identifier such as an SSN, step 514. Since many account verification requests will also include account numbers provided by an applicant, the system determines if any accounts are identified by provided account numbers (step 516). The accounts that are identified (either at step 514 or step 516) are retrieved (step 522).
  • The system notifies the requester as to the nature of the matches (step 520). If there is no match of any accounts (no match of either the personal identifier or the account number), the requester is so notified and the process may end with that notification at step 520 (as indicated in FIG. 5). Alternatively, additional steps can be taken (point “A” in the drawings) to identify accounts (such additional steps are shown in, and were earlier described in conjunction with, FIG. 4). If, at step 520, there has been a match of only one of the personal identifier or account number, the requester is so notified (as to what identifier or information resulted in the match) and the process continues to the earlier described step 522 (account data for the identified account is retrieved).
  • If risk data is also to be provided (if available and requested, step 524), then the risk data is retrieved (step 526) and the retrieved data is provided to the requester as part of the response (step 530).
  • While FIGS. 3, 4 and 5 illustrate the search or verification process ending when no accounts are indentified or found within system 110 (e.g., at steps 314, 412, and 520), it should be appreciated that other methods could be employed to respond to a search or verification request, in the event of an account not being found within system 110. For example, in one embodiment, when a requester provides account numbers and one or more of those account numbers are not found in the system 110, the system 110 could be configured to forward those account numbers to the institution(s) where they are maintained (e.g., using an RTN or bank name provided with the request), and then to respond to the requestor with any information supplied directly by the institution. In some cases, information supplied directly by the financial institution may supplement the account data retrieved from database 120 and, in those cases, both the information from the financial institution and account data retrieved from database may be provided in a response to the requestor (e.g., at steps 330 and 530). The methods just described could be accomplished automatically (on a batched basis or in real-time) in response an account number not being found in system 110 or, alternatively, could be accomplished with the assistance of personnel involved in operating system 110. In yet another embodiment, the system 110 could be electronically linked to the systems at various financial institutions 140 and configured to remotely search account databases at those institutions, so that as the system 110 searches its own database 120 it could likewise search (simultaneously or otherwise) the databases of the linked financial institutions and combine any located data in a response to a requester.
  • In some embodiments risk-related data (e.g., a risk score) may be generated based on the account data provided to and stored database system 110. This is illustrated by the scoring model and process of FIG. 6, where the account data for any given account is provided to scoring logic 610. The scoring logic, which could be implemented within the database management system 130 or a separate processing system (not shown) within central account database system 110, may use a statistical or rules-based analysis (other forms of analysis, such as artificial neural networks, could also be used) to develop a score (examples of analysis used by scoring logic 610 will be given shortly). In some instances, the account data may not be sufficient to generate a score (e.g., the account has recently been opened, or there has been very little or no account activity). In such case, the account data may be stored in a hold account queue 612 until sufficient data is available. In other cases, where there is sufficient data, the account data and resulting risk score may be stored in a scored account queue 614, which includes a risk score table 620.
  • The process of FIG. 6 also illustrates that the scoring process may be continuous. As additional new account data arrives for any accounts represented in the hold account queue 612, the account data is reapplied to the scoring logic 610. The additional data is also used in association with already scored accounts in scored account queue 614 to make fresh calculations of risk data for those accounts. That is, the scoring logic 610 is periodically re-run using updated account data (along with previous data in the scored account queue 614), and the table 620 is updated with new scores as they are generated. Over time, most of the accounts represented in the hold account queue 612 should migrate to the scored account queue 614. Eventually, most active accounts will have risk scores in table 620.
  • In FIG. 6, risk scores 622 in table 620 are illustrated as numerical (from 1 to 100), with “100” representing the highest risk and “1” representing the lowest. Of course other, simpler forms of risk data could be generated, such as only three risk levels (“low,” “medium,” and “high”). Also, risk reasons 624 are illustrated in table 620. Such reasons (or codes for such reasons) could be based on risk factors described below.
  • The following tables illustrate scoring analysis (exemplary risk factors and corresponding risk impact) that could be used in scoring logic 610, for both an account search request (involving government benefits) and an asset verification request (involving a mortgage application). In one embodiment, the risk scores could be calculated by initially assigning a neutral score (e.g., 50), and then increasing or decreasing the initial score based on the risk impact identified in the tables. Also, individual risk factors could be weighted differently, e.g., depending on desires of the requester or based on experiential data collected by the operator of the system 110. Further, some risk factors require comparing account data to relevant data in separate, external databases (as an example, such databases might store names, addresses, email addresses, phone numbers and account numbers of suspected fraudsters). The system 110 would access those external databases as necessary in performing various risk analysis steps.
  • Risk Score Analysis
    Account Search-Government Benefits
    Factors Risk Impact
    Transfer In/Out Patterns Frequent deposits and withdrawals -
    (money flow in and out increased risk (likely attempt to keep
    of account) balances low)
    Infrequent transactions - decreased risk
    Dates of Withdrawals (in Withdrawals within 6 months of begin date -
    relation to program increased risk (likely attempt to conceal
    requirements specifying assets)
    a begin date for balances Withdrawals more than 6 moths prior to
    to be below program begin date - decreased risk
    threshold amount)
    Amount of Withdrawals At least one withdrawal - increased risk
    (e.g. total withdrawals of No withdrawals - decreased risk
    $1000 during past 5 years)
    Number/Nature of Located 5 or more located accounts (likely attempt to
    Accounts spread assets) - increased risk
    Less than 5 located accounts - decreased risk
    Accounts located but not identified by
    beneficiary - increased risk
    Names, addresses, phone Matches with suspected fraudsters -
    numbers on account (in increased risk
    addition to those of No matches with suspected fraudsters -
    beneficiary) decreased risk
    Account SSN/Name Match SSN or name for account do not match those
    provided in request - increased risk
    Both SSN and name for account match those
    provided in request - decreased risk
  • Risk Score Analysis
    Mortgage Application
    Factors Risk Impact
    Saving Pattern Infrequent deposits during each month (not a
    likely consistent “saver”) - increased risk
    Frequent and consistent deposits - decreased
    risk
    Added Signer Signer address same as applicant - decreased
    risk
    Signer address at zip code distant from
    applicant - increased risk
    Name or SSN of new signer matches
    suspected fraudsters - increased risk
    No matches with suspected fraudsters -
    decreased risk
    Recent deposits Large Amount(s) - increased risk
    Small amount(s) - decreased risk
  • Also, because the system 100 will likely store account information across most (if not all) financial institutions, additional data (not directly related to the account at hand) can be collected to provide additional forms of risk analysis. For example, if account data for an account is accessed and it reveals a large deposit (or a series of recent deposits that total a large amount), all other accounts in the system could be checked to see if a corresponding and identical withdrawal amount (or series of withdrawals) can be matched, thus linking another account (as a source account) to the account at hand. The system 110 could then check external databases to see if the source account is associated with a fraudster.
  • Embodiments of the invention also support other useful ways to tap the extensive and rich source of information maintained in the system 110. For example, the account data (including the risk scores) maintained in the system 110 may be used to assess creditworthiness. Not only could stored risk data be used in such an assessment, but loan or other credit accounts could be accessed (e.g., using only a SSN) to locate outstanding balances or credit limits (when stored in association with such accounts), and thus determine either the general creditworthiness of a person or entity (e.g., a person applying additional credit), but also verify representations made by an applicant in connection with the applicant's existing accounts.
  • As a further aspect of the present invention, a government or law enforcement agency may provide one or more personal identifier(s) corresponding to an individual or an entity named in a subpoena (or an instrument such as a National Security Letter or Writ of Execution) for financial or accounting records access, and the provided personal identifier(s) is/are used to determine which institutions, if any, have account or financial information for the individual or an entity named in the subpoena. If one or more of such institutions are found to have such account or financial information for the individual or an entity named in the subpoena, the names of the matching institutions are provided to the government or law enforcement agency with sufficient information (account number or identification information, for example) so that the subpoena may be efficiently served on the one or more matching institutions. If no matching institutions are found, indicia showing no match found may be returned to the government or law enforcement agency. As described more completely below, additional embodiments may perform analysis to provide additional information to the querying agency. The personal identifier for the individual or entity named in the subpoena may comprise any desired identification element, including, but not limited to, an SSN, a personal name, a mailing address, a physical address, the name of a corporate entity, a driver's license number, a prisoner number, an immigration number, a Matricula Consular number, or any other desired indicia. Further, personal identifiers may constitute a plurality of information designed to either narrow or broaden the search criteria depending on the desired result. Requiring more than one match for a plurality of provided identifiers might produce fewer results and would narrow the search. A match for any one of a plurality of provided identifiers might produce more results and would broaden the search.
  • For example, furnishing a plurality of personal identifiers such as an SSN and name and address (and requiring that an indentified account have a match for each of the SSN, name and address) may further refine the search results and limit false positives, but depending on the amount of information returned, submissions of multiple identifiers, if a multiple match is required, could return too little information to be useful. Optionally, and to further refine results, the submitting agency may specify which of the submitted personal identifiers are required, and which may be optional, or which may be required in combination. For example, the submitting agency may specify that both a last name and an SSN must match the submission. In some embodiments, personal identifiers may comprise a list of related information for a suspect individual, for instance, a list of personal identifiers corresponding to known associates of the individual, and accounts of the known associates may be identified (along with the accounts of the suspect individual). Using additional analysis techniques, which may include link analysis or network analysis, account information corresponding to known associates and to others linked to the individual or entity identified in the subpoena may be returned to the submitting agency.
  • A simplified illustration of one such process is seen in FIG. 7. The process of FIG. 7 is similar to (and has steps corresponding to those of) of FIG. 3, but more specifically involves a search request (step 710) from a government agency for an individual or entity contemplated as the subject of a subpoena. As described in conjunction with FIG. 3, the system 110 determines whether the request is valid, step 712, and whether any accounts associated with a personal identifier of the subject (such as a social security number) can be identified, step 714. If there is no SSN match, then the requester is notified (and the process may end), but optionally, other steps can be undertaken to identify accounts without using a social security number (steps proceeding from point “A” in the drawings, using a process similar to that described earlier in conjunction with FIGS. 3 and 4). At step 720 other account data (e.g., name and address, if any, provided with the request) may be used to provide additional confirmation that the identified account is matched to the person that is the subject of the search. While not illustrated in FIG. 7, linking and network analysis can optionally be used to identify additional accounts and provide other information that may have some association with the subject of the contemplated subpoena, as will be described in connection with a specific example to follow shortly. Account data for any identified account is retrieved at step 722. As in FIG. 3, if risk data associated with an identified account is available (step 724), it may also be retrieved (step 726). Among other things, risk data may be used to determine the need for quickly executing a subpoena and then seizing an account that has a high risk of being involved in fraudulent activity (and that may be likely to have its balance quickly depleted/transferred by the fraudster/account holder). The retrieved data is provided (step 730), and a subpoena is prepared and executed at step 732 by the government agency.
  • As a specific example addressing an embodiment of the present invention, consider a hypothetical subpoena that is planned to be issued so that a law enforcement agency may find and obtain financial account information (and possibly related information) for an individual named Vito A. Corleone who has an SSN of 123-45-6789. Prior to embodiments of the present invention being available, difficulties immediately arise in trying to determine which financial institutions may have accounts for Vito Corleone; prior practices may have involved serving subpoenas or NSLs on a large number of financial institutions hoping that one or more of them have an account for Vito Corleone. In the process, much time and expense was wasted serving the subpoenas or NSLs to the institutions not having accounts for Vito, as well as the wasted time and expense borne by the financial accounts in responding to such “blind guess” subpoenas. However, in embodiments of the present invention, the law enforcement agencies may be provided indicia regarding which institutions have accounts related to Vito Corleone with a matching SSN, and optionally, account indentifying information corresponding to accounts for which Vito is a signatory.
  • In a modification of the previous example, consider the case where no hits were found for Vito Corleone, with or without his SSN, at any institution's records stored in the database system (110) of the present invention. It may be likely that accounts may have been opened at various institutions by Vito's known associates to attempt to conceal Vito's financial transaction information. In an embodiment of the present invention, Vito's last known address was known by the submitting law enforcement agency (123 Genco Way, Long Island N.Y.), and a list of known associates: P. Clemenza, S. Tessio, L. Brasi, D. Tommasino, and T. Hagen. A query could then be submitted to systems of the present invention to find accounts matching his address and any of his known associates, and such accounts may then be scrutinized to determine whether they are associated with Vito Corleone. Those of skill in the relevant arts also realize that other cross-matching information (for example Vito's middle name “Andolini”) might be utilized with or without his SSN, and with or without other identifying information such as known associates. Further, through analyzing a network of Vito's associations created through linking and network analysis techniques as more completely described in U.S. Provisional Patent Application No. 61/448,156 filed Mar. 1, 2011 entitled, “System and Method for Suspect Entity Detection and Mitigation,” the disclosure of which is hereby fully incorporated by reference for all purposes, ancillary information regarding Vito Corleone's social or financial transaction history may be analyzed to determine possible accounts that have some association with Vito. Types of ancillary information provided about Vito may include checking account records of any kind (bank statements, cancelled checks, etc.), loan information (loan applications, ledgers, etc.), savings account and securities records (certificates of deposit, investments, etc.), records of any safe deposit boxes at a bank, supporting financial documents (copies of tax returns, credit reports, etc.), current or present addresses associated with an account, hot files, accounts closed for cause, mobile or land line phone numbers associated with Vito or his present or prior addresses, and the like. Once a network has been constructed with Vito's identifying information, related accounts (or other information) and the institutions that host them, may be provided to the querying law enforcement agency.
  • Submissions of requests for subpoena/NSL account identification may be made by the requesting agency individually in a real-time, or in a single or grouped batch mode submittal that is executed at a predetermined time interval (for example, overnight). Additionally, further analysis could produce information that may be provided to the requesting government or law enforcement agency regarding identity information for other individual signatories on joint accounts that correspond to the individual or entity named in the subpoena; prior transactions indicating financial fraud related to the individual or entity named in the subpoena, and through network analysis, identifications of or risk indicia regarding any potential fraud rings associated with the individual or entity that is named in the subpoena. As such, additional related investigatory leads may be provided to the government or law enforcement agency as a result of social or transactional associations with other entities. In an additional aspect, the requesting agency (or an entity, broker, or processor acting on the agency's behalf), after determining which institutions possess information about the subject of the subpoena/NSL, may send to the relevant institutions a formatted request for information that allows the possessing institutions to “fill in the blanks” for any missing data that is pertinent to the subject of the subpoena/NSL, and the requesting entity/broker/processor may process the response on the institution's behalf directly to the law enforcement agency. In a further aspect of the present invention, the requesting government agency may specify to a processor/broker the relevant laws, statutes, rules, or orders under which it has acting authority to submit the subpoena/NSL, and the processor/broker pursues obtaining the information for the agency on its behalf. Further, the processor/broker may utilize the specified listing of laws, statutes, rules or orders furnished by the government agency to tailor the information request to one or more institutions that have been determined to possess information about the subject of the subpoena/NSL, and may optionally filter or redact any information that is received from the relevant institutions that is not permitted to be provided under a legal framework of identified statutes, laws, or rules.
  • FIG. 8 is a block diagram illustrating an exemplary computer system upon which embodiments of the present invention may be implemented. This example illustrates a computer system 800 such as may be used, in whole, in part, or with various modifications, to provide the functions of the central database system 110, including the DBMS 130 and the scoring logic 610, as well as other components and functions of the invention described herein.
  • The computer system 800 is shown comprising hardware elements that may be electrically coupled via a bus 890. The hardware elements may include one or more central processing units 810, one or more input devices 820 (e.g., a mouse, a keyboard, etc.), and one or more output devices 830 (e.g., a display device, a printer, etc.). The computer system 800 may also include one or more storage devices 840, representing remote, local, fixed, and/or removable storage devices and storage media for temporarily and/or more permanently containing computer-readable information, and one or more storage media reader(s) 850 for accessing the storage device(s) 840. By way of example, storage device(s) 840 may be disk drives, optical storage devices, solid-state storage device such as a random access memory (“RAM”) and/or a read-only memory (“ROM”), which can be programmable, flash-updateable or the like.
  • The computer system 800 may additionally include a communications system 860 (e.g., a modem, a network card—wireless or wired, an infra-red communication device, a Bluetooth™ device, a near field communications (NFC) device, a cellular communication device, etc.) The communications system 860 may permit data to be exchanged with a network, system, computer, mobile device and/or other component as described earlier. The system 800 also includes working memory 880, which may include RAM and ROM devices as described above. In some embodiments, the computer system 800 may also include a processing acceleration unit 870, which can include a digital signal processor, a special-purpose processor and/or the like.
  • The computer system 800 may also comprise software elements, shown as being located within a working memory 880, including an operating system 884 and/or other code 888. Software code 888 may be used for implementing functions of various elements of the architecture as described herein. For example, software stored on and/or executed by a computer system, such as system 800, can be used in implementing the processes seen in FIGS. 3-7.
  • It should be appreciated that alternative embodiments of a computer system 800 may have numerous variations from that described above. For example, customized hardware might also be used and/or particular elements might be implemented in hardware, software (including portable software, such as applets), or both. Furthermore, there may be connection to other computing devices such as network input/output and data acquisition devices (not shown).
  • While various methods and processes described herein may be described with respect to particular structural and/or functional components for ease of description, methods of the invention are not limited to any particular structural and/or functional architecture but instead can be implemented on any suitable hardware, firmware, and/or software configuration. Similarly, while various functionalities are ascribed to certain individual system components, unless the context dictates otherwise, this functionality can be distributed or combined among various other system components in accordance with different embodiments of the invention. As one example, the central account database system 110 system may be implemented by a single system having one or more storage device and processing elements. As another example, the central account database system 110 system may be implemented by plural systems, with their respective functions distributed across different systems either in one location or across a plurality of linked locations.
  • Moreover, while the various flows and processes described herein (e.g., those illustrated in FIG. 3-7) are described in a particular order for ease of description, unless the context dictates otherwise, various procedures may be reordered, added, and/or omitted in accordance with various embodiments of the invention. Moreover, the procedures described with respect to one method or process may be incorporated within other described methods or processes; likewise, system components described according to a particular structural architecture and/or with respect to one system may be organized in alternative structural architectures and/or incorporated within other described systems. Hence, while various embodiments may be described with (or without) certain features for ease of description and to illustrate exemplary features, the various components and/or features described herein with respect to a particular embodiment can be substituted, added, and/or subtracted to provide other embodiments, unless the context dictates otherwise. Consequently, although the invention has been described with respect to exemplary embodiments, it will be appreciated that the invention is intended to cover all modifications and equivalents within the scope of the following claims.

Claims (58)

1. A computer-implemented method, comprising:
providing a database;
storing, in the database, account data for accounts maintained at a plurality of institutions, the account data for each respective account comprising at least a personal identifier for an account holder of that respective account;
receiving a request to locate an account, the request including a submitted personal identifier;
locating an account by matching the submitted personal identifier to the personal identifier stored in the database for the located account; and
retrieving at least some of the account data for the located account.
2. The method of claim 1, further comprising:
providing a response to the request to locate an account, the response comprising the retrieved account data.
3. The method of claim 1, wherein the personal identifier is assigned by an entity independent of the institution maintaining the account.
4. The method of claim 1, wherein the personal identifier comprises a social security number.
5. The method of claim 1, wherein the plurality of accounts are financial accounts and wherein the database is populated with account data from financial institutions.
6. The method of claim 1, wherein the account data for each account further comprises an account balance for such account, and wherein the step of retrieving at least some of the account data comprises retrieving the account balance for the located account.
7. The method of claim 6, wherein the account data for each account further comprises at least one or more of an account type, a name of the account holder, an identity of designated signers for the account, an average balance over a predetermined period of time, interest paid on the account during a predetermined period of time, a physical address associated with the account holder, an email address associated with the account holder, a phone number associated with the account holder, and a date of birth associated with the account holder.
8. The method of claim 1, wherein the plurality of accounts comprises benefits accounts relating to benefits provided to the account holder as a beneficiary under a benefits program, and wherein at least one of the institutions maintaining the accounts comprises an entity managing the benefits program.
9. The method of claim 8, wherein the entity managing the benefits program comprises a governmental agency.
10. The method of claim 8, wherein the account data for each account further comprises benefits data relating the scope of benefits being provided to the account holder.
11. The method of claim 8, wherein the benefits comprise cash payments to the beneficiary.
12. The method of claim 8, wherein the benefits comprise services provided to the beneficiary.
13. The method of claim 8, wherein the account data for each account further comprises at least one or more of a beneficiary name, a beneficiary address, a beneficiary date of birth, a beneficiary employer, a date benefits were applied for, a benefits type, a benefits amount, a date benefits began, an identification of an agency administering the benefits, and a location of the agency.
14. The method of claim 1, wherein the account data further comprises, for each account, both initially transferred account data from each of the institutions and periodically updated account data from each of the institutions.
15. The method of claim 1, wherein the account data further comprises risk data associated with one or more of the accounts.
16. The method of claim 15, further comprising:
inputting the account data for one or more of the accounts to scoring logic;
generating, at the scoring logic, risk data for one or more of the accounts based on the inputted account data; and
storing the risk data in the database as account data.
17. The method of claim 16, wherein the risk data generated at the scoring logic comprises a risk score associated with the one or more of the accounts.
18. The method of claim 16, wherein the risk data generated at the scoring logic reflects whether the account howler is a consistent saver, based on a pattern of deposits and withdrawals at the 1 one or more accounts.
19. The method of claim 16, wherein the risk data generated at the scoring logic reflects recent transfers of amounts from the one or more of the accounts.
20. The method of claim 16, wherein the step of generating risk data comprises comparing account data populating the database for the one or more of the accounts to data associated with suspected fraudsters.
21. The method of claim 16, wherein the risk data generated at the scoring logic reflects whether an authorized signer has changed for the one or more of the accounts.
22. The method of claim 1, wherein the request to locate an account is made in response to an application for a loan, wherein an applicant has represented a balance for an applicant account, wherein the retrieved account data includes an account balance for a located account corresponding to the applicant account, and wherein the method further comprises:
verifying that the represented balance from the applicant is consistent with the balance for the located account.
23. The method of claim 1, wherein the request to locate an account is made in response to an application for benefits, wherein the benefits program requires a specified level of assets available to the applicant, wherein the step of locating an account comprises:
searching for all accounts in the database having stored account data with a personal identifier that matches the submitted personal identifier.
24. The method of claim 23, wherein the retrieved account data comprises an account balance for any located account, and wherein the method further comprises:
verifying that a total of account balances for all located accounts meets the required specified level of assets.
25. The method of claim 1, wherein the plurality of accounts comprise one or more of a checking account, savings account, certificate of deposit account, money market account, stored value account, credit account, loan account, credit card account, debit account, prepaid account, reward account, loyalty account, online payment service account, and on-line gaming account.
26. The method of claim 1, wherein the plurality of accounts comprise loan accounts and the account holder is the obligor for the loan underlying each loan account, and wherein the account data further comprises an outstanding balance or a credit limit for such loan account.
27. The method of claim 1, wherein the account data populating the database further comprises an account identifier for each of the accounts, wherein the step for receiving a request to locate an account further includes a submitted account identifier in the request.
28. The method of claim 27, further comprising:
locating an account by matching the submitted account identifier to the account identifier stored in the database for the account.
29. The method of claim 28, wherein the step of retrieving at least some of the account data comprises both retrieving account data for any account located using the submitted personal identifier and retrieving account data for any account located using the submitted account identifier.
30. The method of claim 28, further comprising:
retrieving account data for any account located using the submitted account identifier when that same account is not located by matching the submitted personal identifier to the personal identifier stored in the database for the account.
31. The method of claim 28, wherein the account identifier comprises an institution identifier and an account number, and wherein the method further comprises:
transmitting a request to an institution identified by the institution identifier in the account identifier, when no account is located in the database using the submitted account identifier;
receiving account data from the identified institution for the account associated with the submitted account identifier; and
providing a response to the request to locate an account, the response including the account data received from the identified institution.
32. The method of claim 1, wherein the step of locating an account comprises:
comparing the submitted personal identifier to the personal identifier stored in the database for each of the accounts; and
identifying an account as a located account if the submitted personal identifier matches the personal identifier stored in the database for the located account.
33. The method of claim 1, further comprising:
providing a response to the request to locate an account when no account located, the response including notification that no account has located by matching the submitted personal identifier to the personal identifier stored in the database.
34. The method of claim 1, wherein the account data for each account populating the database further comprises personal data for the account holder, the personal data including at least one or more of a name of the account holder, a physical address associated with the account holder, an email address associated with the account holder, a phone number associated with the account holder, and a data of birth associated with the account holder, wherein the request to locate further comprises submitted personal data, and wherein the method further comprises:
providing a response to the request to locate an account when there is no match between submitted personal data and the personal data populating the database for any account that is located, the response including notification that there is no match of personal data for the located account.
35. The method of claim 1, wherein the submitted personal identifier is associated with a subject of a writ issued by a governmental entity, and wherein the located account is associated with the subject of the writ.
36. The method of claim 35, wherein the writ is one of a subpoena and a writ of execution, and a National Security Letter.
37. The method of claim 35, wherein the submitted personal identifier is related to known associates of the subject of the writ.
38. The method of claim 35, further comprising locating ancillary information related to the subject of the writ, by applying linking analysis to the submitted personal identifier to find associations between the submitted personal identifier and the ancillary information.
39. The method of claim 38, wherein the ancillary information comprises records relating to one or more of open accounts, loans, securities, safe deposit boxes, financial documents, past and present addresses, hot files, accounts closed for cause, and past and present phone numbers.
40. The method of claim 35 further comprising:
receiving the writ from the governmental entity by a processor/broker,
determining, by the processor/broker, at least one institution that possesses information about a subject of the writ;
requesting, from the at least one financial institution, information identified in the writ; and
returning the information by the processor/broker to the governmental entity.
41. The method of claim 40 wherein prior to returning the information to the governmental entity, the processor/broker filters the information to remove any information not permitted to be furnished to the governmental entity under a legal framework.
42. A system, comprising:
a database storing data for accounts from a plurality of institutions, the stored data for each respective account comprising at least a personal identifier for an account holder of that respective account; and
a processor configured to:
receive a request to locate an account, the request including a submitted personal identifier;
locate an account by matching the submitted personal identifier to a personal identifier stored in the database for that account; and
retrieve from the database stored data associated with any located account.
43. The system of claim 42, wherein the processor is further configured to:
provide a response to the request to locate an account, the response including the retrieved account data when an account is located using the submitted personal identifier.
44. The system of claim 42, wherein the personal identifier is assigned by an entity independent of the institution maintaining the account.
45. The system of claim 42, wherein the personal identifier comprises a social security number.
46. The system of claim 42, wherein the plurality of accounts are financial accounts and wherein the database is populated with account data from financial institutions.
47. The system of claim 42, wherein the plurality of accounts comprises benefits accounts relating to benefits provided to the account holder as a beneficiary under a benefits program, and wherein at least one of the institutions maintaining the accounts comprises an entity managing the benefits program.
48. The system of claim 47, wherein the entity managing the benefits program comprises a governmental agency.
49. A computer-implemented method, comprising:
providing a searchable database;
populating the database with account data associated with accounts from a plurality of institutions, each of the accounts having an account holder identified by a personal identifier;
in response to a request to locate an account, searching the database using a submitted personal identifier;
locating an account when the submitted personal identifier matches a personal identifier associated with an account holder of one of the accounts; and
retrieving at least some of the account data associated with any account that is located.
50. A computer-implemented method, comprising:
providing a database;
storing in the database account data for accounts from a plurality of institutions, wherein each of the respective accounts is a loan account having an associated account identifier;
in response to a request to locate an account in the database, searching the database using a submitted account identifier included with the request;
locating an account by matching the submitted account identifier to the account identifier associated with one of the accounts; and
retrieving at least some of the account data for any account that is located.
51. The method of claim 50, wherein the retrieved account data comprises an outstanding account balance for the located account.
52. The method of claim 51, wherein the retrieved account data comprises a credit limit for the located account.
53. A computer-implemented method, comprising:
providing a database to be populated with account data for a plurality of accounts from a plurality of financial institutions maintaining the accounts;
initially receiving, from each of the plurality of financial institutions and for storing in the database, account data representing a plurality of account characteristics respectively associated with each of the plurality of accounts, wherein the account characteristics for each respective account comprise (a) an account identifier assigned to that respective account by the maintaining financial institution, (b) a personal identifier for an account holder of that respective account, and (c) a balance of funds in that respective account;
periodically receiving updated account data from each of the financial institutions;
storing in the database the initially received account data and the updated account data;
receiving a submitted personal identifier for an account holder to locate any accounts at any of the financial institutions associated with that account holder; and
retrieving at least some of the account data associated with any account that is located using the submitted personal identifier.
54. The method of claim 53, wherein the personal identifier is common to accounts of the account holder at more than one financial institution.
55. The method of claim 54, wherein the personal identifier comprises a social security number.
56. A computer-implemented method, comprising:
providing a database for being populated with benefits data, the benefits data associated within benefits provided to beneficiaries under benefit programs administered by a plurality of governmental agencies;
initially receiving benefits data respectively associated with each of the beneficiaries, wherein the benefits data for each respective beneficiary comprises (a) a personal identifier for the respective beneficiary, and (b) the scope of benefits being provided to the respective beneficiary under any of the benefits programs;
periodically receiving updated benefits data associated with each of the respective beneficiaries;
storing in the database the initially received benefits data and the updated benefits data;
receiving a submitted personal identifier to locate any benefits data stored in the database and associated with one of the beneficiaries; and
retrieving at least some of the located benefits data.
57. The method of claim 56, wherein the personal identifier is common to beneficiaries under more than one of the benefits programs.
58. The method of claim 57, wherein the personal identifier comprises a social security number.
US13/213,975 2011-06-21 2011-08-19 System and method for locating and accessing account data Abandoned US20120330819A1 (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
US13/213,975 US20120330819A1 (en) 2011-06-21 2011-08-19 System and method for locating and accessing account data
PCT/US2012/043380 WO2012177786A1 (en) 2011-06-21 2012-06-20 System and method for locating and accessing account data
CA2840182A CA2840182A1 (en) 2011-06-21 2012-06-20 System and method for locating and accessing account data
US14/959,881 US20160086263A1 (en) 2011-06-21 2015-12-04 System and method for locating and accessing account data to verify income
US14/970,212 US10607284B2 (en) 2011-06-21 2015-12-15 System and method to search and verify borrower information using banking and investment account data and process to systematically share information with lenders and government sponsored agencies for underwriting and securitization phases of the lending cycle
US15/069,186 US10504174B2 (en) 2011-06-21 2016-03-14 System and method to search and verify borrower information using banking and investment account data and process to systematically share information with lenders and government sponsored agencies for underwriting and securitization phases of the lending cycle

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201161499599P 2011-06-21 2011-06-21
US13/213,975 US20120330819A1 (en) 2011-06-21 2011-08-19 System and method for locating and accessing account data

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/959,881 Continuation-In-Part US20160086263A1 (en) 2011-06-21 2015-12-04 System and method for locating and accessing account data to verify income

Publications (1)

Publication Number Publication Date
US20120330819A1 true US20120330819A1 (en) 2012-12-27

Family

ID=47362684

Family Applications (2)

Application Number Title Priority Date Filing Date
US13/213,975 Abandoned US20120330819A1 (en) 2011-06-21 2011-08-19 System and method for locating and accessing account data
US13/529,028 Active US8676611B2 (en) 2011-06-21 2012-06-21 System and methods for fraud detection/prevention for a benefits program

Family Applications After (1)

Application Number Title Priority Date Filing Date
US13/529,028 Active US8676611B2 (en) 2011-06-21 2012-06-21 System and methods for fraud detection/prevention for a benefits program

Country Status (3)

Country Link
US (2) US20120330819A1 (en)
CA (1) CA2840182A1 (en)
WO (1) WO2012177786A1 (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130204783A1 (en) * 2012-01-09 2013-08-08 Ace Cash Express, Inc. System and method for performing remote check presentment (rcp) transactions by a check cashing company
US20130304634A1 (en) * 2012-05-08 2013-11-14 Vantiv, Llc Systems and Methods for Performing Funds Freeze and/or Funds Seizure with Respect to Prepaid Payment Cards
US8799155B2 (en) 2009-07-01 2014-08-05 Jpmorgan Chase Bank, N.A. Mortgage matching system and method
US20140280261A1 (en) * 2013-03-15 2014-09-18 PathAR, LLC Method and apparatus for substitution scheme for anonymizing personally identifiable information
US20150199645A1 (en) * 2014-01-15 2015-07-16 Bank Of America Corporation Customer Profile View of Consolidated Customer Attributes
US20160086263A1 (en) * 2011-06-21 2016-03-24 Early Warning Services, Llc System and method for locating and accessing account data to verify income
US20160104238A1 (en) * 2011-06-21 2016-04-14 Early Warning Services, Llc System and method to search and verify borrower information using banking and investment account data and process to systematically share information with lenders and government sponsored agencies for underwriting and securitization phases of the lending cycle
CN110033151A (en) * 2018-11-09 2019-07-19 阿里巴巴集团控股有限公司 Relational risk evaluation method, device, electronic equipment and computer storage medium
US10891690B1 (en) 2014-11-07 2021-01-12 Intuit Inc. Method and system for providing an interactive spending analysis display
US20210097549A1 (en) * 2019-09-26 2021-04-01 Mastercard International Incorporated Methods, systems and computer program products for optimizing electronic direct benefit transfers
US11146548B2 (en) * 2019-01-10 2021-10-12 Capital One Services, Llc Techniques for peer entity account management
US11227332B1 (en) * 2016-04-14 2022-01-18 Wells Fargo Bank, N.A. Automated lending data collection and verification system and methods
US20220101330A1 (en) * 2014-07-02 2022-03-31 Blackhawk Network, Inc. Systems and methods for dynamically detecting and preventing consumer fraud
US11416863B2 (en) 2018-04-11 2022-08-16 Wells Fargo Bank, N.A. System and methods for assessing risk of fraud in an electronic transaction

Families Citing this family (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8732004B1 (en) 2004-09-22 2014-05-20 Experian Information Solutions, Inc. Automated analysis of data to generate prospect notifications based on trigger events
US7711636B2 (en) 2006-03-10 2010-05-04 Experian Information Solutions, Inc. Systems and methods for analyzing data
US9690820B1 (en) 2007-09-27 2017-06-27 Experian Information Solutions, Inc. Database system for triggering event notifications based on updates to database records
US9990674B1 (en) 2007-12-14 2018-06-05 Consumerinfo.Com, Inc. Card registry systems and methods
US8312033B1 (en) 2008-06-26 2012-11-13 Experian Marketing Solutions, Inc. Systems and methods for providing an integrated identifier
US20100174638A1 (en) 2009-01-06 2010-07-08 ConsumerInfo.com Report existence monitoring
US9558519B1 (en) 2011-04-29 2017-01-31 Consumerinfo.Com, Inc. Exposing reporting cycle information
US9483606B1 (en) 2011-07-08 2016-11-01 Consumerinfo.Com, Inc. Lifescore
US9106691B1 (en) 2011-09-16 2015-08-11 Consumerinfo.Com, Inc. Systems and methods of identity protection and management
US8738516B1 (en) 2011-10-13 2014-05-27 Consumerinfo.Com, Inc. Debt services candidate locator
US9853959B1 (en) 2012-05-07 2017-12-26 Consumerinfo.Com, Inc. Storage and maintenance of personal data
US9654541B1 (en) 2012-11-12 2017-05-16 Consumerinfo.Com, Inc. Aggregating user web browsing data
US9916621B1 (en) 2012-11-30 2018-03-13 Consumerinfo.Com, Inc. Presentation of credit score factors
US9406085B1 (en) 2013-03-14 2016-08-02 Consumerinfo.Com, Inc. System and methods for credit dispute processing, resolution, and reporting
US10102570B1 (en) 2013-03-14 2018-10-16 Consumerinfo.Com, Inc. Account vulnerability alerts
US9098852B1 (en) 2013-03-14 2015-08-04 Jpmorgan Chase Bank, N.A. Method and system for monitoring and detecting fraud in targeted benefits
US10475033B2 (en) * 2013-08-13 2019-11-12 Citibank, N.A. Methods and systems for transactional risk management
US20150081549A1 (en) * 2013-09-18 2015-03-19 Mastercard International Incorporated Methods and systems for screening electronic money transfer transactions
US9477737B1 (en) 2013-11-20 2016-10-25 Consumerinfo.Com, Inc. Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules
US20150161611A1 (en) * 2013-12-10 2015-06-11 Sas Institute Inc. Systems and Methods for Self-Similarity Measure
US9449346B1 (en) 2014-05-21 2016-09-20 Plaid Technologies, Inc. System and method for programmatically accessing financial data
US9595023B1 (en) 2014-05-21 2017-03-14 Plaid Technologies, Inc. System and method for facilitating programmatic verification of transactions
EP4006755A1 (en) 2015-09-08 2022-06-01 Plaid Inc. Secure permissioning of access to user accounts, including secure deauthorization of access to user accounts
US11410230B1 (en) 2015-11-17 2022-08-09 Consumerinfo.Com, Inc. Realtime access and control of secure regulated data
US10757154B1 (en) 2015-11-24 2020-08-25 Experian Information Solutions, Inc. Real-time event-based notification system
US10726491B1 (en) 2015-12-28 2020-07-28 Plaid Inc. Parameter-based computer evaluation of user accounts based on user account data stored in one or more databases
US10984468B1 (en) 2016-01-06 2021-04-20 Plaid Inc. Systems and methods for estimating past and prospective attribute values associated with a user account
US11468085B2 (en) 2017-07-22 2022-10-11 Plaid Inc. Browser-based aggregation
US10878421B2 (en) 2017-07-22 2020-12-29 Plaid Inc. Data verified deposits
US10880313B2 (en) 2018-09-05 2020-12-29 Consumerinfo.Com, Inc. Database platform for realtime updating of user data from third party sources
US11316862B1 (en) 2018-09-14 2022-04-26 Plaid Inc. Secure authorization of access to user accounts by one or more authorization mechanisms
US11315179B1 (en) 2018-11-16 2022-04-26 Consumerinfo.Com, Inc. Methods and apparatuses for customized card recommendations
US11238656B1 (en) 2019-02-22 2022-02-01 Consumerinfo.Com, Inc. System and method for an augmented reality experience via an artificial intelligence bot
US11941065B1 (en) 2019-09-13 2024-03-26 Experian Information Solutions, Inc. Single identifier platform for storing entity data
US10796380B1 (en) * 2020-01-30 2020-10-06 Capital One Services, Llc Employment status detection based on transaction information
US11887069B2 (en) 2020-05-05 2024-01-30 Plaid Inc. Secure updating of allocations to user accounts
CN111626739B (en) * 2020-05-14 2023-09-01 网银在线(北京)科技有限公司 Payment method, device, equipment and computer readable storage medium
US11327960B1 (en) 2020-10-16 2022-05-10 Plaid Inc. Systems and methods for data parsing

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030149646A1 (en) * 2002-02-01 2003-08-07 Ubs Painewebber Inc. Method and system for providing an aggregated stock options report
US6658393B1 (en) * 1997-05-27 2003-12-02 Visa Internation Service Association Financial risk prediction systems and methods therefor
US20040153650A1 (en) * 2002-12-12 2004-08-05 Hillmer James M. System and method for storing and accessing secure data
US20050289058A1 (en) * 1994-11-28 2005-12-29 Ned Hoffman System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse
US20060080197A1 (en) * 2000-02-11 2006-04-13 Ecardworld.Com, Llc, A Massachusetts Corporation Financial account management
US20060191995A1 (en) * 2005-02-01 2006-08-31 Source, Inc. Secure transaction system
US20060259766A1 (en) * 2005-05-16 2006-11-16 Rasti Mehran R System and method to protect personal identity identifiers
US20070022008A1 (en) * 2005-07-25 2007-01-25 Blackhawk Marketing Services, Inc. Payment program for use in point-of-sale transactions
US20080243715A1 (en) * 2007-04-02 2008-10-02 Bank Of America Corporation Financial Account Information Management and Auditing
US20100185656A1 (en) * 2009-01-20 2010-07-22 Pollard Stephen M Personal data manager systems and methods
US20100332390A1 (en) * 2009-03-24 2010-12-30 The Western Union Company Transactions with imaging analysis

Family Cites Families (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6173272B1 (en) 1998-04-27 2001-01-09 The Clearing House Service Company L.L.C. Electronic funds transfer method and system and bill presentment method and system
US7383223B1 (en) 2000-09-20 2008-06-03 Cashedge, Inc. Method and apparatus for managing multiple accounts
US20030187826A1 (en) 2002-03-28 2003-10-02 Ontario Corporation Collection system database architecture
WO2004051399A2 (en) 2002-10-10 2004-06-17 Household International, Inc. Quality control for loan processing
US7139734B2 (en) 2002-12-04 2006-11-21 Nathans Michael G Preferred credit information data collection method
US7337953B2 (en) 2004-02-06 2008-03-04 Early Warning Services, Llc. Negotiable instrument authentication systems and methods
US7954698B1 (en) * 2004-06-02 2011-06-07 Pliha Robert K System and method for matching customers to financial products, services, and incentives based on bank account transaction activity
US20060031239A1 (en) 2004-07-12 2006-02-09 Koenig Daniel W Methods and apparatus for authenticating names
US20070095899A1 (en) 2005-10-28 2007-05-03 Meade Donald M Global identification authentication system
US20070204033A1 (en) 2006-02-24 2007-08-30 James Bookbinder Methods and systems to detect abuse of network services
US20080040275A1 (en) 2006-04-25 2008-02-14 Uc Group Limited Systems and methods for identifying potentially fraudulent financial transactions and compulsive spending behavior
US20080091591A1 (en) * 2006-04-28 2008-04-17 Rockne Egnatios Methods and systems for opening and funding a financial account online
US20080288382A1 (en) 2007-05-15 2008-11-20 Smith Steven B Methods and Systems for Early Fraud Protection
US7546271B1 (en) * 2007-12-20 2009-06-09 Choicepoint Asset Company Mortgage fraud detection systems and methods
US20100250431A1 (en) 2009-03-30 2010-09-30 Edson Silva Systems, methods, and machine-readable mediums for providing real-time data of commercial and financial activity of a business to a financial institution to guide credit operations and risk management
US8380569B2 (en) * 2009-04-16 2013-02-19 Visa International Service Association, Inc. Method and system for advanced warning alerts using advanced identification system for identifying fraud detection and reporting
US20110131131A1 (en) * 2009-12-01 2011-06-02 Bank Of America Corporation Risk pattern determination and associated risk pattern alerts
US20110295739A1 (en) 2010-05-26 2011-12-01 Bank Of America Corporation Bankruptcy payment and debt tracking
US10395245B2 (en) 2010-11-12 2019-08-27 Yuh-Shen Song Global customer identification network
WO2012082935A2 (en) 2010-12-14 2012-06-21 Early Warning Services, Llc System and method for detecting fraudulent account access and transfers
WO2012119008A2 (en) 2011-03-01 2012-09-07 Early Warning Services, Llc System and method for suspect entity detection and mitigation

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050289058A1 (en) * 1994-11-28 2005-12-29 Ned Hoffman System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse
US6658393B1 (en) * 1997-05-27 2003-12-02 Visa Internation Service Association Financial risk prediction systems and methods therefor
US20060080197A1 (en) * 2000-02-11 2006-04-13 Ecardworld.Com, Llc, A Massachusetts Corporation Financial account management
US20030149646A1 (en) * 2002-02-01 2003-08-07 Ubs Painewebber Inc. Method and system for providing an aggregated stock options report
US20040153650A1 (en) * 2002-12-12 2004-08-05 Hillmer James M. System and method for storing and accessing secure data
US20060191995A1 (en) * 2005-02-01 2006-08-31 Source, Inc. Secure transaction system
US20060259766A1 (en) * 2005-05-16 2006-11-16 Rasti Mehran R System and method to protect personal identity identifiers
US20070022008A1 (en) * 2005-07-25 2007-01-25 Blackhawk Marketing Services, Inc. Payment program for use in point-of-sale transactions
US20080243715A1 (en) * 2007-04-02 2008-10-02 Bank Of America Corporation Financial Account Information Management and Auditing
US8099345B2 (en) * 2007-04-02 2012-01-17 Bank Of America Corporation Financial account information management and auditing
US20100185656A1 (en) * 2009-01-20 2010-07-22 Pollard Stephen M Personal data manager systems and methods
US20100332390A1 (en) * 2009-03-24 2010-12-30 The Western Union Company Transactions with imaging analysis

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8799155B2 (en) 2009-07-01 2014-08-05 Jpmorgan Chase Bank, N.A. Mortgage matching system and method
US10607284B2 (en) * 2011-06-21 2020-03-31 Early Warning Services, Llc System and method to search and verify borrower information using banking and investment account data and process to systematically share information with lenders and government sponsored agencies for underwriting and securitization phases of the lending cycle
US20160196605A1 (en) * 2011-06-21 2016-07-07 Early Warning Services, Llc System And Method To Search And Verify Borrower Information Using Banking And Investment Account Data And Process To Systematically Share Information With Lenders and Government Sponsored Agencies For Underwriting And Securitization Phases Of The Lending Cycle
US20160086263A1 (en) * 2011-06-21 2016-03-24 Early Warning Services, Llc System and method for locating and accessing account data to verify income
US20160104238A1 (en) * 2011-06-21 2016-04-14 Early Warning Services, Llc System and method to search and verify borrower information using banking and investment account data and process to systematically share information with lenders and government sponsored agencies for underwriting and securitization phases of the lending cycle
US10504174B2 (en) * 2011-06-21 2019-12-10 Early Warning Services, Llc System and method to search and verify borrower information using banking and investment account data and process to systematically share information with lenders and government sponsored agencies for underwriting and securitization phases of the lending cycle
US20130204783A1 (en) * 2012-01-09 2013-08-08 Ace Cash Express, Inc. System and method for performing remote check presentment (rcp) transactions by a check cashing company
US20130304634A1 (en) * 2012-05-08 2013-11-14 Vantiv, Llc Systems and Methods for Performing Funds Freeze and/or Funds Seizure with Respect to Prepaid Payment Cards
US11397945B2 (en) 2012-05-08 2022-07-26 Worldpay, Llc Systems and methods for performing funds freeze and/or funds seizure with respect to prepaid payment cards
US11836716B2 (en) 2012-05-08 2023-12-05 Worldpay, Llc Systems and methods for performing funds freeze and/or funds seizure with respect to prepaid payment cards
US8762266B2 (en) * 2012-05-08 2014-06-24 Vantiv, Llc Systems and methods for performing funds freeze and/or funds seizure with respect to prepaid payment cards
US20140280261A1 (en) * 2013-03-15 2014-09-18 PathAR, LLC Method and apparatus for substitution scheme for anonymizing personally identifiable information
US9460310B2 (en) * 2013-03-15 2016-10-04 Pathar, Inc. Method and apparatus for substitution scheme for anonymizing personally identifiable information
US20150199645A1 (en) * 2014-01-15 2015-07-16 Bank Of America Corporation Customer Profile View of Consolidated Customer Attributes
US11887125B2 (en) * 2014-07-02 2024-01-30 Blackhawk Network, Inc. Systems and methods for dynamically detecting and preventing consumer fraud
US20220101330A1 (en) * 2014-07-02 2022-03-31 Blackhawk Network, Inc. Systems and methods for dynamically detecting and preventing consumer fraud
US11810186B2 (en) 2014-11-07 2023-11-07 Intuit Inc. Method and system for providing an interactive spending analysis display
US10891690B1 (en) 2014-11-07 2021-01-12 Intuit Inc. Method and system for providing an interactive spending analysis display
US11741538B1 (en) 2016-04-14 2023-08-29 Wells Fargo Bank, N.A. Automated lending data collection and verification system and methods
US11227332B1 (en) * 2016-04-14 2022-01-18 Wells Fargo Bank, N.A. Automated lending data collection and verification system and methods
US11416863B2 (en) 2018-04-11 2022-08-16 Wells Fargo Bank, N.A. System and methods for assessing risk of fraud in an electronic transaction
CN110033151A (en) * 2018-11-09 2019-07-19 阿里巴巴集团控股有限公司 Relational risk evaluation method, device, electronic equipment and computer storage medium
US11743251B2 (en) * 2019-01-10 2023-08-29 Capital One Services, Llc Techniques for peer entity account management
US20220006807A1 (en) * 2019-01-10 2022-01-06 Capital One Services, Llc Techniques for peer entity account management
US11146548B2 (en) * 2019-01-10 2021-10-12 Capital One Services, Llc Techniques for peer entity account management
US20210097549A1 (en) * 2019-09-26 2021-04-01 Mastercard International Incorporated Methods, systems and computer program products for optimizing electronic direct benefit transfers

Also Published As

Publication number Publication date
US8676611B2 (en) 2014-03-18
US20120330689A1 (en) 2012-12-27
CA2840182A1 (en) 2012-12-27
WO2012177786A1 (en) 2012-12-27

Similar Documents

Publication Publication Date Title
US20120330819A1 (en) System and method for locating and accessing account data
US10504174B2 (en) System and method to search and verify borrower information using banking and investment account data and process to systematically share information with lenders and government sponsored agencies for underwriting and securitization phases of the lending cycle
US20160086263A1 (en) System and method for locating and accessing account data to verify income
US11741473B2 (en) System and method using multiple profiles and scores for assessing financial transaction risk
US9892465B2 (en) System and method for suspect entity detection and mitigation
US20070043661A1 (en) Systems and methods for placing debt
US20040006533A1 (en) Systems and methods for managing risk associated with a geo-political area
US20110231312A1 (en) Payment account monitoring system and method
US20040078323A1 (en) Quality control for loan processing
US20130132248A1 (en) Identification and risk evaluation
US20120143649A1 (en) Method and system for dynamically detecting illegal activity
TW202036442A (en) Intelligent alert system
US20160179806A1 (en) Identity confidence scoring system and method
Hunte Controlling loan default and improving the lending technology in credit institutions
US7873568B1 (en) Loan management account
Clarke Dataveillance by governments: The technique of computer matching
Pohoretskyi et al. The proof of the event of a financial resources fraud in the banking sector: problematic issues
US20220318912A1 (en) Systems and methods for measuring pre-vote outcomes
Muriki Effect of credit risk management on financial performance of Kenyan commercial banks
ADINEW ASSESSMENT OF CREDIT RISK MANAGEMNT PRACTICES; THECASE OF ABAY BANK SC
CN113781198A (en) Enterprise loan application evaluation system
Heckler UMB Foundation Request for Taxpayer Identification Number and Certification
MICROFINANCE CHAPTER FIFTEEN DESIGNING A DISTRIBUTED MICROFINANCE CREDIT BUREAU SYSTEM SUDEEP K. KRISHNAN AND DEBDATTA PAL
No et al. Request for Taxpayer Identification Number and Certification
Sibley et al. The new Ireland social pension: a review of the new Ireland social pension and implications for the Papua New Guinea national social pension

Legal Events

Date Code Title Description
AS Assignment

Owner name: EARLY WARNING SERVICES, LLC, ARIZONA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:WEINFLASH, LAURA;MELVIN, DAWN;MCLAUGHLIN, TOM;AND OTHERS;SIGNING DATES FROM 20120130 TO 20120131;REEL/FRAME:027636/0136

STCV Information on status: appeal procedure

Free format text: ON APPEAL -- AWAITING DECISION BY THE BOARD OF APPEALS

STCV Information on status: appeal procedure

Free format text: BOARD OF APPEALS DECISION RENDERED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION