Method and system for remotely verifying identity prior to provisioning a data record for a service

ABSTRACT

A server computer system comprises a communications module; a processor coupled with the communications module; and a memory coupled to the processor and storing processor-executable instructions which, when executed by the processor, configure the processor to receive, via the communications module and from a remote computing device, a signal including a request to provision a data record for a service; select digital identity network verification as a primary verification technique; attempt verification using the primary verification technique; determine that verification using the primary verification technique has failed; responsive to determining that verification using the primary verification technique has failed, attempt verification using a secondary verification technique; determine successful verification using the secondary verification technique; and responsive to successful verification using the secondary verification technique, provision the data record for the service.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.17/197,130, filed on Mar. 10, 2021, the entire contents of which areincorporated herein by reference.

TECHNICAL FIELD

The present application relates to methods and systems for remotelyverifying identity prior to provisioning a data record for a service.

BACKGROUND

Verifying the identity of a user is often done using, for example,government issued identification. Verifying the identity of the usertypically requires that the user be physically present and this processmay be time consuming and inefficient.

Verifying the identity of a user is even more difficult when theverification is to be done remotely.

BRIEF DESCRIPTION OF THE DRAWINGS

Embodiments are described in detail below, with reference to thefollowing drawings:

FIG. 1 is a schematic operation diagram illustrating an operatingenvironment of an example embodiment;

FIG. 2 is a simplified schematic diagram showing components of acomputing device;

FIG. 3 is a high-level schematic diagram of an example computer device;

FIG. 4 shows a simplified organization of software components stored ina memory of the example computer device of FIG. 3 ;

FIG. 5 is a flowchart showing operations performed by a server inremotely verifying identity prior to provisioning a data record for aservice according to an embodiment;

FIG. 6 is an example graphical user interface according to anembodiment;

FIG. 7 is a flowchart showing operations performed by a server inselecting digital identity network verification as a primaryverification technique according to an embodiment;

FIG. 8 is an example graphical user interface according to anembodiment;

FIG. 9 is a flowchart showing operations performed by a server inselecting digital identity network verification as a primaryverification technique according to an embodiment; and

FIG. 10 is an example graphical user interface according to anembodiment.

Like reference numerals are used in the drawings to denote like elementsand features.

DETAILED DESCRIPTION OF VARIOUS EMBODIMENTS

In one aspect there is provided a server computer system comprising acommunications module; a processor coupled with the communicationsmodule; and a memory coupled to the processor and storingprocessor-executable instructions which, when executed by the processor,configure the processor to receive, via the communications module andfrom a remote computing device, a signal including a request toprovision a data record for a service; select digital identity networkverification via a digital identity network as a primary verificationtechnique; attempt verification using the primary verificationtechnique; determine that verification using the primary verificationtechnique has failed; responsive to determining that verification usingthe primary verification technique has failed, attempt verificationusing a secondary verification technique; determine successfulverification using the secondary verification technique; and responsiveto successful verification using the secondary verification technique,provision the data record for the service.

In one or more embodiments, the processor-executable instructions, whenexecuted by the processor, further configure the processor to send, viathe communication module and to the remote computing device, a signalrequesting information associated with a user requesting to provisionthe data record for the service; receive, via the communications moduleand from the remote computing device, a signal including the requestedinformation; determine that the requested information satisfiespredefined criteria; and responsive to determining that the requestedinformation satisfies predefined criteria, select digital identitynetwork verification as the primary verification technique.

In one or more embodiments, the requested information includesinformation relating to one or more other data records of the user.

In one or more embodiments, the processor-executable instructions, whenexecuted by the processor, further configure the processor to send, viathe communication module and to the remote computing device, a signalrequesting confirmation that the user has one or more data recordsassociated with one or more members of the digital identity network;receive, via the communications module and from the remote computingdevice, a signal including confirmation that the user has one or moredata records associated with one or more members of the digital identitynetwork; and select digital identity network verification as the primaryverification technique based on the confirmation.

In one or more embodiments, the digital identity network includes apermissioned blockchain network.

In one or more embodiments, the secondary verification technique doesnot require the digital identity network.

In one or more embodiments, when attempting verification using theprimary verification technique, the processor-executable instructions,when executed by the processor, further configure the processor to send,via the communications module and to a server associated with thedigital identity network, a request for verified identity data of auser.

In one or more embodiments, the processor-executable instructions, whenexecuted by the processor, further configure the processor to receive,via the communications module and from the server associated with thedigital identity network, a signal indicating that the request forverified identity data of the user has failed; and responsive toreceiving the signal indicating that the request for verified identitydata of the user has failed, determine that verification using theprimary verification technique has failed.

In one or more embodiments, when attempting verification using thesecondary technique, the processor-executable instructions, whenexecuted by the processor, further configure the processor to obtain,via the communications module and from the remote computing device,image data including a first image of a user and an image of an identitydocument that includes a second image of the user; analyze the imagedata to determine that the first image of the user and the second imageof the user correspond to a same user; and responsive to determiningthat the first image of the user and the second image of the usercorrespond to the same user, determine successful verification.

In one or more embodiments, when attempting verification using thesecondary technique, the processor-executable instructions, whenexecuted by the processor, further configure the processor to obtain,via the communications module and from the remote computing device, aninternet protocol address of the remote computing device; determine alocation of the remote computing device based at least on the internetprotocol address; and compare the determined location of the remotecomputing device to a known address of the user to determine successfulverification.

In another aspect there is provided a computer-implemented methodcomprising receiving, via a communications module and from a remotecomputing device, a signal including a request to provision a datarecord for a service; selecting digital identity network verificationvia a digital identity network as a primary verification technique;attempting verification using the primary verification technique;determining that verification using the primary verification techniquehas failed; responsive to determining that verification using theprimary verification technique has failed, attempting verification usinga secondary verification technique; determining successful verificationusing the secondary verification technique; and responsive to successfulverification using the secondary verification technique, provisioningthe data record for the service.

In one or more embodiments, the method further comprises sending, viathe communication module and to the remote computing device, a signalrequesting information associated with a user requesting to provisionthe data record for the service; receiving, via the communicationsmodule and from the remote computing device, a signal including therequested information; determining that the requested informationsatisfies predefined criteria; and responsive to determining that therequested information satisfies predefined criteria, selecting digitalidentity network verification as the primary verification technique.

In one or more embodiments, the requested information includesinformation relating to one or more other data records of the user.

In one or more embodiments, the method further comprises sending, viathe communication module and to the remote computing device, a signalrequesting confirmation that a user has one or more data recordsassociated with one or more members of the digital identity network;receiving, via the communications module and from the remote computingdevice, a signal including confirmation that the user has one or moredata records associated with one or more members of the digital identitynetwork; and selecting digital identity network verification as theprimary verification technique based on the confirmation.

In one or more embodiments, the digital identity network includes apermissioned blockchain network.

In one or more embodiments, the secondary verification technique doesnot require the digital identity network.

In one or more embodiments, attempting verification using the primaryverification technique comprises sending, via the communications moduleand to a server associated with the digital identity network, a requestfor verified identity data of a user.

In one or more embodiments, the method further comprises receiving, viathe communications module and from the server associated with thedigital identity network, a signal indicating that the request forverified identity data of the user has failed; and responsive toreceiving the signal indicating that the request for verified identitydata of the user has failed, determining that verification using theprimary verification technique has failed.

In one or more embodiments, attempting verification using the secondarytechnique comprises obtaining, via the communications module and fromthe remote computing device, image data including a first image of auser and an image of an identity document that includes a second imageof the user; analyzing the image data to determine that the first imageof the user and the second image of the user correspond to a same user;and responsive to determining that the first image of the user and thesecond image of the user correspond to the same user, determiningsuccessful verification.

In another aspect there is provided a non-transitory computer readablestorage medium comprising computer-executable instructions which, whenexecuted, configure a processor to receive, via a communications moduleand from a remote computing device, a signal including a request toprovision a data record for a service; select digital identity networkverification via a digital identity network as a primary verificationtechnique; attempt verification using the primary verificationtechnique; determine that verification using the primary verificationtechnique has failed; responsive to determining that verification usingthe primary verification technique has failed, attempt verificationusing a secondary verification technique; determine successfulverification using the secondary verification technique; and responsiveto successful verification using the secondary verification technique,provision the data record for the service.

In the present application, the term “and/or” is intended to cover allpossible combinations and sub-combinations of the listed elements,including any one of the listed elements alone, any sub-combination, orall of the elements, and without necessarily excluding additionalelements.

In the present application, the phrase “at least one of . . . or . . . ”is intended to cover any one or more of the listed elements, includingany one of the listed elements alone, any sub-combination, or all of theelements, without necessarily excluding any additional elements, andwithout necessarily requiring all of the elements.

When a user submits a request to provision a data record for a servicehosted by an institution, the institution may be required to verify theidentity of the user to fulfil, for example, Know Your Customer (KYC)requirements. Most institutions require at least two criteria to becompleted to verify the identity of the user: 1) the institution obtainsidentity information of the user, and 2) the institution verifies theuser's identity. The identity information may be obtained electronicallybut verification may require the user to visit the institution to showidentification verifying their identity. Once the identity of the userhas been verified, the data record may be provisioned for the service.

Some institutions may attempt to remotely verify the identity of theuser by, for example, obtaining credit data of the user. This technique,however, is not always reliable.

In the following, a system is described that allows remote users torequest that the institution provision a data record for a service.Prior to the data record being provisioned for the service, the systemmay attempt to remotely verify the identity of the user through use of aprimary verification technique that may include digital identity networkverification via a digital identity network. In the event that theverification using the primary verification technique fails, the systemmay attempt to verify the identity of the user through use of asecondary verification technique. Responsive to successful verificationof the user using the secondary verification technique, the data recordmay be provisioned for the service.

FIG. 1 is a block diagram illustrating an operating environment of anexample embodiment. Various components cooperate to provide a system 100which may be used, for example, remotely verify identity prior toprovisioning a data record for a service. As shown, the system 100includes a computing device 110, a server computer system 120 and adigital identity network server 130 coupled to one another through anetwork 140, which may include a public network such as the Internetand/or a private network.

The computing device 110 is a computer system. The computing device 110may be, for example, a smartphone as shown. The computing device 110may, however, be a computing device of another type such as for examplea personal computer, a laptop computer, a tablet computer, a notebookcomputer, a hand-held computer, a personal digital assistant, a portablenavigation device, a mobile phone, a smart phone, a wearable computingdevice (e.g. a smart watch, a wearable activity monitor, wearable smartjewelry, a glasses and other optical devices that include opticalhead-mounted displays), and any other type of computing device that maybe configured to store data and software instructions, and executesoftware instructions to perform operations consistent with disclosedembodiments. In certain embodiments, the computing device 110 may beadapted to present a graphical user interface that allows forcommunication with the server computer system 120. The computing device110 is remote from the server computer system 120.

The server computer system 120 may be a financial institution serverwhich may maintain customer bank accounts. That is, the server computersystem 120 may maintain a database that includes various data records. Adata record may be provisioned for a particular service. For example, adata record may be provisioned as a chequing account, a savings account,an investment account or a credit card account. A data record may, forexample, reflect an amount of value stored in a particular account.

Each account maintained by the server computer system 120 may beassociated with authentication information. The authenticationinformation may be or may include any one or more of a token, ausername, a password, a personal identification number (PIN), biometricdata, etc. The authentication information may be used by the servercomputer system 120 to authenticate a device such as for example thecomputing device 110. More specifically, the authentication informationmay be used to determine that the computing device 110 is being operatedby an authorized user and to identify the one or more accounts the useris trying to access.

The server computer system 120 is a computer server system. A computerserver system may, for example, be a mainframe computer, a minicomputer,or the like. In some implementations thereof, a computer server systemmay be formed of or may include one or more computing devices. Acomputer server system may include and/or may communicate with multiplecomputing devices such as, for example, database servers, computeservers, and the like. Multiple computing devices such as these may bein communication using a computer network and may communicate to act incooperation as a computer server system. For example, such computingdevices may communicate using a local-area network (LAN). In someembodiments, a computer server system may include multiple computingdevices organized in a tiered arrangement. For example, a computerserver system may include middle tier and back-end computing devices. Insome embodiments, a computer server system may be a cluster formed of aplurality of interoperating computing devices.

The digital identity network server 130 is a server associated with adigital identity network. Although the digital identity network server130 is illustrated as a single block, it may be a network consisting ofnumerous computer systems. For example, the digital identity network maybe a blockchain network which includes a number of nodes. The blockchainnetwork is a decentralized peer-to-peer network in which nodes maymaintain respective copies of an append-only ledger.

The blockchain network may be a permissioned blockchain network in whichonly authorized nodes are permitted to add blocks to the blockchain. Forexample, only verified nodes may be granted permission to write to theblockchain. The verified nodes may be trusted nodes such as nodesassociated with government organizations or other trusted entities suchas banks. By way of example, the verified nodes may be associated with adriver's license bureau, a credit bureau, a government identity issuingoffice such as an entity registry office, or an office of another type.Given ones of these nodes may maintain identity records of varioustypes. For example, a node associated with a passport office maymaintain digital passport records, a node associated with a driver'slicense bureau may maintain digital licensing records, a node associatedwith a credit bureau may maintain digital credit records, and a nodeassociated with a bank may maintain digital banking records. Variousverified nodes may maintain contact information records which may, forexample, specify an email address, postal address, telephone number, orother types of contact information.

Accordingly, at least some verified nodes may write to the blockchain.At least some of the blocks written to the blockchain may be related toverified identity data. The digital identity network server 130 maystore verified identity data associated with a plurality of users. In atleast some embodiments, verified identity data may not be included inthe blockchain. Instead, the blocks may store a private secret that isrelated to such verified identity data. The private secret may act asproof to the existence of the verified identity data and may be used toverify the authenticity of the verified identity data. For example, inat least some embodiments, the private secret may be a hash of theverified identity data such that, when the verified identity data isprovided to another system (i.e., a system apart from the verified nodemaintaining the identity data), it may be verified from the hash storedin a block on the blockchain.

The blockchain network may, for example, be implemented using Hyperledger Fabric, for example. It will, however, be appreciated that theblockchain network may take other forms.

Within the digital identity network, of which the digital identitynetwork server 130 is associated, trusted partners may act as digitalasset providers and digital asset consumers. In actions as a digitalasset provider, a trusted member of the digital identity network mayprovide information about a particular user or customer to anothertrusted member of the digital identity network (e.g. a digital assetconsumer). The information about the particular user or customer mayinclude verified identity data. The requested information may beprovided through the digital identity network via the digital identitynetwork server 130 in a blind manner such that the digital assetprovider does not know the identity of the digital asset consumer andsuch that the digital asset consumer does not know the identity of thedigital asset provider.

The network 140 is a computer network. In some embodiments, the network140 may be an internetwork such as may be formed of one or moreinterconnected computer networks. For example, the network 140 may be ormay include an Ethernet network, an asynchronous transfer mode (ATM)network, a wireless network, a telecommunications network, or the like.

The system may additionally include one or more third party servers andthe server computer system 120 may communicate with the one or morethird party servers via the network 140.

FIG. 1 illustrates an example representation of components of the system100. The system 100 can, however, be implemented differently than theexample of FIG. 1 . For example, various components that are illustratedas separate systems in FIG. 1 may be implemented on a common system. Byway of further example, the functions of a single component may bedivided into multiple components.

FIG. 2 is a simplified schematic diagram showing component of anexemplary computing device 200. Computing device 110 may be of the sametype as computing device 200. The computing device 200 may includemodules including, as illustrated, for example, one or more displays210, an image capture module 220, a sensor module 230, and a computerdevice 240.

The one or more displays 210 are a display module. The one or moredisplays 210 are used to display screens of a graphical user interfacethat may be used, for example, to communicate with the server computersystem 120 (FIG. 1 ). The one or more displays 210 may be internaldisplays of the computing device 200 (e.g., disposed within a body ofthe computing device).

The image capture module 220 may be or may include a camera. The imagecapture module 220 may be used to obtain image data, such as images. Theimage capture module 220 may be or may include a digital image sensorsystem as, for example, a charge coupled device (CCD) or a complementarymetal-oxide-semiconductor (CMOS) image sensor.

The sensor module 230 may be a sensor that generates sensor data basedon a sensed condition. By way of example, the sensor module 230 may beor include a location subsystem which generates location data indicatinga location of the computing device 200. The location may be the currentgeographic location of the computing device 200. The location subsystemmay be or include any one or more of a global positioning system (GPS),an inertial navigation system (INS), a wireless (e.g., cellular)triangulation system, a beacon-based location system (such as aBluetooth low energy beacon system), or a location subsystem of anothertype.

The computer device 240 is in communication with the one or moredisplays 210, the image capture module 220, and the sensor module 230.The computer device 240 may be or may include a processor which iscoupled to the one or more displays 210, the image capture module 220,and/or the sensor module 230.

Referring now to FIG. 3 , a high-level operation diagram of an examplecomputer device 300 is shown. In some embodiments, the computer device300 may be exemplary of the computer device 240 (FIG. 2 ), the servercomputer system 120, and the digital identity network server 130 (or anode of the digital identity network).

The example computer device 300 includes a variety of modules. Forexample, as illustrated, the example computer device 300 may include aprocessor 310, a memory 320, a communications module 330, and/or astorage module 340. As illustrated, the foregoing example modules of theexample computer device 300 are in communication over a bus 350.

The processor 310 is a hardware processor. The processor 310 may, forexample, be one or more ARM, Intel x86, PowerPC processors or the like.

The memory 320 allows data to be stored and retrieved. The memory 320may include, for example, random access memory, read-only memory, andpersistent storage. Persistent storage may be, for example, flashmemory, a solid-state drive or the like. Read-only memory and persistentstorage are a non-transitory computer-readable storage medium. Acomputer-readable medium may be organized using a file system such asmay be administered by an operating system governing overall operationof the example computer device 300.

The communications module 330 allows the example computer device 300 tocommunicate with other computer or computing devices and/or variouscommunications networks. For example, the communications module 330 mayallow the example computer device 300 to send or receive communicationssignals. Communications signals may be sent or received according to oneor more protocols or according to one or more standards. For example,the communications module 330 may allow the example computer device 300to communicate via a cellular data network, such as for example,according to one or more standards such as, for example, Global Systemfor Mobile Communications (GSM), Code Division Multiple Access (CDMA),Evolution Data Optimized (EVDO), Long-term Evolution (LTE) or the like.Additionally or alternatively, the communications module 330 may allowthe example computer device 300 to communicate using near-fieldcommunication (NFC), via Wi-Fi™, using Bluetooth™ or via somecombination of one or more networks or protocols. In some embodiments,all or a portion of the communications module 330 may be integrated intoa component of the example computer device 300. For example, thecommunications module may be integrated into a communications chipset.In some embodiments, the communications module 330 may be omitted suchas, for example, if sending and receiving communications is not requiredin a particular application.

The storage module 340 allows the example computer device 300 to storeand retrieve data. In some embodiments, the storage module 340 may beformed as a part of the memory 320 and/or may be used to access all or aportion of the memory 320. Additionally or alternatively, the storagemodule 340 may be used to store and retrieve data from persisted storageother than the persisted storage (if any) accessible via the memory 320.In some embodiments, the storage module 340 may be used to store andretrieve data in a database. A database may be stored in persistedstorage. Additionally or alternatively, the storage module 340 mayaccess data stored remotely such as, for example, as may be accessedusing a local area network (LAN), wide area network (WAN), personal areanetwork (PAN), and/or a storage area network (SAN). In some embodiments,the storage module 340 may access data stored remotely using thecommunications module 330. In some embodiments, the storage module 340may be omitted and its function may be performed by the memory 320and/or by the processor 310 in concert with the communications module330 such as, for example, if data is stored remotely. The storage modulemay also be referred to as a data store.

Software comprising instructions is executed by the processor 310 from acomputer-readable medium. For example, software may be loaded intorandom-access memory from persistent storage of the memory 320.Additionally or alternatively, instructions may be executed by theprocessor 310 directly from read-only memory of the memory 320.

FIG. 4 depicts a simplified organization of software components storedin the memory 320 of the example computer device 300 (FIG. 3 ). Asillustrated, these software components include an operating system 400and an application 410.

The operating system 400 is software. The operating system 400 allowsthe application 410 to access the processor 310 (FIG. 3 ), the memory320, and the communications module 330 of the example computer device300 (FIG. 3 ). The operating system 400 may be, for example, Google™Android™, Apple™ iOS™, UNIX™, Linux™, Microsoft™ Windows™, Apple OSX™ orthe like.

The application 410 adapts the example computer device 300, incombination with the operating system 400, to operate as a deviceperforming a particular function. For example, the application 410 maycooperate with the operating system 400 to adapt a suitable embodimentof the example computer device 300 to operate as the computer device 240(FIG. 2 ), the server computer system 120, and/or the digital identitynetwork server 130 (or a node of the digital identity network).

While a single application 410 is illustrated in FIG. 3 , in operationthe memory 320 may include more than one application 410 and differentapplications 410 may perform different operations. For example, in atleast some embodiments in which the computer device 300 is functioningas the computing device 110, the applications 410 may include a bankingapplication. The banking application may be configured for securecommunications with the server computer system 120 and may providevarious banking functions such as, for example, the ability to submit arequest that to provision a data record for a service, display a quantumof value in one or more data records (e.g. display balances), configureor request that operations such as transfers of value (e.g. billpayments and other transfers) be performed, and other account managementfunctions.

By way of further example, in at least some embodiments in which thecomputer device 300 functions as the computing device 110, theapplications 410 may include a web browser, which may also be referredto as an Internet browser. In at least some such embodiments, the servercomputer system 120 may be a web server that may serve one or more ofthe interfaces described herein. The web server may cooperate with theweb browser and may serve as an interface when the interface isrequested through the web browser. For example, the web browser mayserve as a mobile banking interface. The mobile banking interface mayprovide various banking functions such as, for example, the ability tosubmit a request that to provision a data record for a service, displaya quantum of value in one or more data records (e.g. display balances),configure or request that operations such as transfers of value (e.g.bill payments and other transfers) be performed, and other accountmanagement functions.

By way of further example, in at least some embodiments in which thecomputer device 300 functions as the computing device 110, theapplications 410 may include an electronic messaging application. Theelectronic messaging application may be configured to display a receivedelectronic message such as an email message, short messaging service(SMS) message, or a message of another type. In at least someembodiments, the server computer system 120 or digital identity networkserver 130 may be configured, through computer-executable instructions,to send a message to the computing device 110. For example, the servercomputer system 120 may be configured to send a SMS message to a phonenumber associated with a user and an electronic messaging application onthe computing device 110 may be configured to retrieve the message anddisplay the message to the user.

The user may open the mobile banking application or the web browser onthe computing device 110. In response, the server 120 may send a signalto the computing device 110 causing the computing device 110 to displaya graphical user interface (GUI). The GUI may be used to communicatewith the server 120. Where the user has an existing account, the usermay be prompted to authenticate by entering, for example, a username andpassword.

In embodiments where the user is not an existing customer of thefinancial institution associated with the server computer system 120,the user may be required to create an account. For example, the GUIdisplayed on the computing device 110 may include a selectable optionthat, when selected, initiates account creation. Responsive to the userselecting the selectable option by, for example, performing a tapgesture at a location on a display screen of the computing device 110corresponding to a location of the selectable option, the computingdevice 110 may display one or more input fields that may be used toenter information associated with creating an account. Informationassociated with creating an account may include a username, a password,an email address, a phone number, a mailing address, etc.

Responsive to the user submitting the information associated withcreating the account, the server computer system 120 receives, via thecommunication module and from the computing device 110, a signalincluding the information associated with creating the account. Usingthe information associated with creating the account, the servercomputer system 120 may create the account. Once the account has beencreated, the account may be associated with one or more data records.The server computer system 120 may provision each data record for aparticular service and this may be based on a request received from thecomputing device 110.

Prior to provisioning a data record for a particular service, thefinancial institution associated with the server computer system 120 maybe required to verify the identity of the user to fulfill, for example,know-your-customer (KYC) requirements. It will be appreciated thatremotely verifying the identity of the user may only be required wherethe user has not been previously verified by the financial institutionassociated with the server computer system 120. For example, only newcustomers may require identity verification.

FIG. 5 is a flowchart showing operations performed by the servercomputer system 120 in remotely verifying identity prior to provisioninga data record for a service according to an embodiment. The operationsmay be included in a method 500 which may be performed by the servercomputer system 120. For example, computer-executable instructionsstored in memory of the server computer system 120 may, when executed byone or more processors, configure the server computer system 120 toperform the method 500 or a portion thereof.

The server computer system 120 receives, via the communications moduleand from a remote computing device, a signal including a request toprovision a data record for a service (step 510). In this embodiment,the remote computing device may be the computing device 110.

The request may be initiated by the user within the mobile bankingapplication or web browser on the computing device 110. For example,responsive to the user creating an account, the server computer system120 may send, via the communications module and to the computing device110, a signal causing the computing device 110 to display a graphicaluser interface (GUI). The GUI may be used to communicate with the servercomputer system 120.

An example GUI 600 is shown in FIG. 5 . As can be seen, the GUI includesone or more selectable options associated with a request to provision adata record for a service. Specifically, the GUI 600 includes a firstselectable option 610 associated with a request to open a chequingaccount, a second selectable option 620 associated with a request toopen a savings account, a third selectable option 630 associated with arequest to open an investment account, and a fourth selectable option640 associated with a request to open a credit card account. In thisembodiment, each selectable option 610, 620, 630, 640 is in the form ofa checkbox that may be selected or de-selected in response to user inputon a display screen of the computing device 110. For example, the usermay perform a tap gesture on the display screen of the computing device110 at a location corresponding to one of the selectable options andthis may select or de-select the selectable option. Put another way, atap gesture may be used to toggle selection of the selectable option.

Responsive to the user selecting a selectable option, the GUI 600 may beupdated to display a symbol such as for example a check mark indicatingselection of the selectable option. Responsive to the user de-selectinga selectable option, the GUI 600 may be updated to remove the symbol andthis may indicate that the selectable option is not selected. In theexample shown in FIG. 6 , the user may select one or more of theselectable options 610, 620, 630, 640.

The GUI 600 also includes a selectable option 650 that, when selected,sends a signal to the server computer system 120 that includes a requestto provision a data record for a service. It will be appreciated that inembodiments where the user has selected more than one of the selectableoptions 610, 620, 630, 640, the signal includes a request to provision adata record for a service for each selected option. For example, theuser may submit a request to open a chequing account and a savingsaccount and as such the signal includes a request to provision a datarecord for the chequing account and a request to provision a data recordfor the savings account, where the data record for the chequing accountis a different data record than the data record for the savings account.

As mentioned, prior to provisioning the data record for the service, theserver computer system 120 must verify the identity of the user.

The server computer system 120 selects digital identity networkverification as a primary verification technique (step 520). In thisembodiment, the server computer system 120 may select digital identitynetwork verification by default or in response to user input.

FIG. 7 is a flowchart showing operations performed by the servercomputer system 120 in selecting digital identity network verificationas a primary verification technique according to an embodiment. Theoperations may be included in a method 700 which may be performed by theserver computer system 120. For example, computer-executableinstructions stored in memory of the server computer system 120 may,when executed by one or more processors, configure the server computersystem 120 to perform the method 700 or a portion thereof.

The server computer system 120 sends, via the communication module andto the remote computing device, a signal requesting informationassociated with a user requesting to provision the data record for theservice (step 710). The remote computing device may be the computingdevice 110.

In this embodiment, the requested information may include informationrelating to one or more other data records of the user. For example, therequested information may include a request for a name of a third partyentity hosting one or more other data records of the user. In someembodiments, the one or more other data records may include one or morebank accounts of the user and as such the name of the third party entitymay be the name of another financial institution.

The signal requesting information associated with the user may cause thecomputing device 110 to display a GUI 800 shown in FIG. 8 . As can beseen, the GUI 800 includes a request for information (“Do you have abank account with another bank? If so, please enter the name of thebank.”). The GUI 800 includes an input field 810 that may be completedby the user using, for example, a virtual keyboard displayed on adisplay screen of the computing device 110. The GUI 800 includes aselectable option 820 to submit the requested information and aselectable option 830 to indicate that the user does not have a bankaccount with another bank.

The user may complete the input field 810 by entering the name of theother bank and may submit the requested information by selecting theselectable option 820. Responsive to the user selecting the selectableoption 820, the computing device 110 sends a signal to the servercomputer system 120 that includes the requested information.

The server computer system 120 receives, via the communications moduleand from the remote computing device, the signal including the requestedinformation (step 720).

The server computer system 120 determines that the requested informationsatisfies predefined criteria (step 730). The predefined criteria mayinclude whether or not the other bank is a trusted member of the digitalidentity network.

The server computer system 120 may determine that the requestedinformation satisfies predefined criteria by comparing the requestedinformation to a list of trusted partners of the digital identitynetwork. The list of trusted partners of the digital identity networkmay include one or more other banks. Put another way, the list oftrusted partners may include one or more other banks that are associatedwith verified nodes that have been granted permission to write to theblockchain of the digital identity network. When the other bank is foundin the list of trusted partners of the digital identity work thepredefined criteria is satisfied.

Responsive to determining that the requested information satisfiespredefined criteria, the server computer system 120 selects digitalidentity network verification as the primary verification technique(step 740). When it is determined that the user has an account at a bankthat is a trusted partner of the digital identity network, the servercomputer system 120 selects digital identity network verification as theprimary verification technique.

FIG. 9 is a flowchart showing operations performed by the servercomputer system 120 in selecting digital identity network verificationas a primary verification technique according to another embodiment. Theoperations may be included in a method 900 which may be performed by theserver computer system 120. For example, computer-executableinstructions stored in memory of the server computer system 120 may,when executed by one or more processors, configure the server computersystem 120 to perform the method 900 or a portion thereof.

The server computer system 120 sends, via the communication module andto the remote computing device, a signal requesting confirmation thatthe user has one or more data records associated with one or moremembers of the digital identity network (step 910).

In this embodiment, the server computer system 120 requests confirmationthat the user has one or more data records associated with one or moremembers of the digital identity network, that is, one or more trustedmembers. For example, the request may be confirmation that the user hasa bank account at least at one other bank that is a member of thedigital identity network.

The signal requesting confirmation may cause the computing device 110 todisplay a GUI 1000 shown in FIG. 10 . As can be seen, the GUI 1000includes a request for confirmation that the user has one or more datarecords with one or more members of the digital identity network (“Doyou have a bank account with any of the following banks?”). The GUI 1000displays a list of all banks that are members of the digital identitynetwork. The GUI 1000 includes a selectable option 1010 to confirm thatthe user has a bank account at one of the other banks and a selectableoption 1020 to indicate that the user does not have a bank account atone of the other banks.

The user may confirm that they have a bank account at one of the otherbanks by selecting the selectable option 1010. Responsive to the userselecting the selectable option 1010, the computing device sends asignal to the server computer system 120 that includes the confirmation.In this manner, the user is not required to enter the name of their bankbut is simply required to indicate that they have a bank account at abank that is a member of the digital identity network.

The server computer system 120 receives, via the communications moduleand from the remote computing device, the signal including confirmationthat the user has one or more data records associated with one or moremembers of the digital identity network (step 920).

The server computer system 120 selects digital identity networkverification as the primary verification technique based on theconfirmation (step 930). When it is determined that the user has anaccount at a bank that is a trusted partner of the digital identitynetwork, the server computer system 120 selects digital identity networkverification as the primary verification technique.

Through use of one of the methods 700 and 900 described herein, the useris requested to provide information that is not directly related to thedigital identity network. That is, the user may be unaware that they areable to verify their identity via the digital identity network. Bysimply identifying that the user has an account with another trustedmember of the digital identity network, the server computer system 120is able to select digital identity network verification as a primaryverification technique.

The server computer system 120 attempts verification using the primaryverification technique (step 530).

To attempt verification using the primary verification technique, theserver computer system 120 sends, via the communications module and tothe digital identity network server 130, a request for verified identitydata of the user. In this embodiment, the request for verified identitydata includes identity information of the user.

The identity information of the user includes information that may beused to uniquely identify the user. In this embodiment, the identityinformation may include at least some of the information previouslyobtained by the server computer system 120 when creating the account.For example, the identity information may include the email address ofthe user. Other examples include the full legal name and address of theuser, an identity document number of the user (drivers license number,etc.), a social insurance number (SIN), etc.

In response to receiving the request for verified identity data, thedigital identity network server 130 sends a request for verifiedidentity data of the user to the trusted partners within the digitalidentity network. The request includes the identity information of theuser. For example, the request may include a request for verifiedidentity data of the user based on the email address of the user.

Verification using the primary verification technique is determined tobe successful when one of the trusted members of the digital identitynetwork provides verified identity data in response to receiving arequest from the digital identity network server. For example, one ofthe trusted members of the digital identity network may act as a digitalasset provider and thus may provide the requested verified identity dataof the user to the digital identity network server 130. The digitalidentity network server 130 may provide the requested verified identitydata to the server computer system 120. As such, the server computersystem 120 acts as a digital asset consumer. The requested verifiedidentity data is provided through the digital identity network in ablind manner such that the digital asset provider does not know theidentity of the digital asset consumer and such that the digital assetconsumer does not know the identity of the digital asset provider.

It will be appreciated that in some embodiments, the digital identitynetwork server 130 may send a signal to the computing device 110 thatincludes a request to release verified identity data to the servercomputer system 120. The user may grant permission to release verifiedidentity data to the server computer system 120 by selecting aselectable option included with the request. In response to the usergranting permission, the digital identity network server 130 may releasethe requested verified identity data to the server computer system 120.

The verified identity data may include additional identity informationof the user and may include information indicating that the identity ofthe user has been verified or authenticated by the digital assetprovider. In this manner, the verified identity data of the userreceived via the digital identity network is sufficient to provision thedata record for the service. Put another way, the digital asset providerpreviously verified the identity of the user and as such thisverification may be trusted by the financial institution associated withthe server computer system 120.

Verification using the primary verification technique is determined tofail when the digital identity network server 130 does not receiveverified identity data from any of the trusted members of the digitalidentity network. For example, not one of the trusted members of thedigital identity network may have verified identity data of the user andas such the digital identity network server 130 may not receive verifiedidentity data in response to the request. It may be that the user has anaccount with one of the trusted members of the digital identity networkhowever the verified identity data may be out of date and/or may not becomplaint with the requirements of the digital identity network.

The server computer system 120 determines that verification using theprimary verification technique has failed (step 540).

In this embodiment, the digital identity network server 130 may send,via the communications module and to the server computer system 120, asignal indicating that no verified identity data has been received fromany of the trusted members of the digital identity network. Put anotherway, the signal may indicate that the request for verified identity dataof the user has failed. Responsive to receiving the signal, the servercomputer system 120 may determine that verification using the primaryverification technique has failed.

As mentioned, the user may be required to grant permission to releaseverified identity data to the server computer system 120 by selecting aselectable option included with a request that is sent to the computingdevice 110. The user may not wish to release the verified identity datato the server computer system 120 and as such the user may select aselectable option indicating that the user does not agree to releaseverified identity data to the server computer system 120. Responsive tothe user selecting the selectable option indicating that the user doesnot agree to release the verified identity data to the server computersystem 120, a signal may be sent from the computing device 110 to thedigital identity network server 130 indicating that the user does notagree to release the verified identity data. In turn, the digitalidentity network server 130 may send a signal indicating that the userhas not agreed to release the verified identity data. Responsive toreceiving the signal, the server computer system 120 may determine thatverification using the primary verification technique has failed.

Responsive to determining that verification using the primaryverification technique has failed, the server computer system 120attempts verification using a secondary verification technique (step550).

The secondary verification technique is a backup technique and may notrequire the digital identity network. As one example of a secondaryverification technique, the server computer system 120 may send, via thecommunications module and to the computing device 110, a request foridentity data of the user. The requested identity data may be a requestfor an image of an identification card of the user and an image of theuser. Using the camera associated with the computing device 110, theuser may capture an image of their identification card and may capturean image of themselves and send the captured images as image data to theserver computer system 120. The server computer system 120 may analyzethe image data using image processing techniques to ensure that theimage of the user matches the picture on the identification card andthis may be used to verify the identity of the user.

As another example, the secondary verification technique may requireidentity data and this may be obtained from an image of anidentification card of the user. In this example, the server computersystem 120 may send a signal to the computing device 110 requesting animage of an identification card of the user. Using the camera associatedwith the computing device 110, the user may capture an image of theiridentification card and may send the captured image to the servercomputer system 120. The server computer system 120 may analyze thecaptured image to obtain data of the user. The data may include, forexample, a name and an address of the user.

The server computer system 120 may additionally or alternatively verifythe identity of the user using the internet protocol address of thecomputing device 110. For example, the server computer system 120 mayobtain the internet protocol address of the computing device 110 and maydetermine a location of the computing device 110 based at least on theinternet protocol address. For example, the server computer system 120may determine a country, city or approximate address of the computingdevice 110 based on the internet protocol address. The determinedlocation may be compared to a known address of the user and this may beused to verify the identity of the user.

The server computer system 120 may additionally or alternatively verifythe identity of the user using location data received from the computingdevice 110. For example, the server computer system 120 may obtainlocation data from the computing device 110 and may analyze the locationdata to determine a location of the computing device 110. The determinedlocation may be compared to a known address of the user and this may beused to verify the identity of the user.

The server computer system 120 determines successful verification usingthe secondary verification technique (step 560).

As one example, when it is determined that the image of the user matchesthe picture on the identification card, the server computer system 120may determine successful verification using the secondary verificationtechnique. As another example, when it is determined that the locationof the computing device 110 corresponds to the known address of theuser, the server computer system 120 determines successful verificationusing the secondary verification technique.

Responsive to successful verification using the secondary verificationtechnique, the server computer system 120 provisions the data record forthe service (step 570).

The data record may be provisioned for the requested service. Forexample, where the request to provision the data record for the serviceis a request for a chequing account, the server computer system 120 mayprovision the data record as a chequing account. As another example,where the request to provision the data record for the service is arequest for a savings account, the server computer system 120 mayprovision the data record as a savings account.

It will be appreciated that, during step 530 of method 500, the primaryverification technique may be determined to be successful. For example,the server computer system 120 may receive the requested verifiedidentity data from the digital identity network server 130 and as suchverification using the primary verification technique may be determinedto be successful. Responsive to determining that the primaryverification technique is successful, the account is provisioned for therequested service in manners similar to that described herein.

In one or more embodiments, the secondary verification technique may bedetermined to have failed. As such, a third verification technique maybe attempted. For example, the secondary verification technique mayinclude comparing an image of an identification card to an image of theuser. Where the images are determined not to represent the same person,the secondary verification technique may be determined to have failed.As such, a third verification technique may be attempted and may includesending a signal to a third party server requesting credit data. Thecredit data may include a credit score of the user and this may becompared to a credit score threshold to determine if the user has acredit score sufficient to provision the data record for the service.

In one or more embodiments, after a number of verification techniqueshave been attempted and failed, the request to provision the data recordfor the service may not be completed. For example, after threeverification attempts have failed using three different verificationtechniques, the request to provision the data record for the service maynot be completed and the server computer system 120 may send a signalcausing the computing device 110 to display a message indicating thefailure.

Although in embodiments described herein the user is required to createan account prior to submitting a request to provision a data record fora service, in one or more other embodiments the account may be createdafter the request to provision the data record for the service has beencompleted. For example, the server computer system 120 may requestidentifying information of the user and, using the identifyinginformation of the user, may attempt to verify the identity of the userusing techniques described herein. Responsive to successfulverification, the data record may be provisioned for the service and anaccount may be created for the user. The user may then be required tocreate a username and password associated with the account.

As mentioned, the user may submit multiple requests to provision anaccount for a service simultaneously. For example, the user may requestthat a chequing account and a savings account be opened. The systemdescribed herein may only be required to verify the identity data of theuser once and, responsive to successful verification, the servercomputer system 120 may provision the data records for the services. Forexample, the server computer system 120 may provision a first datarecord as a chequing account and a second data record as a savingsaccount.

Although in embodiments, identity verification is described as beingrequired only for new users or customers, identity verification mayadditionally be required for existing customers who have not verifiedtheir identity within a particular time period. For example, an existingcustomer may have a non-compliant profile and as such may be required toverify their identity. A non-compliant profile may occur when an accountwas initially set up prior to a change in regulations.

Example embodiments of the present application are not limited to anyparticular operating system, system architecture, mobile devicearchitecture, server architecture, or computer programming language.

It will be understood that the applications, modules, routines,processes, threads, or other software components implementing thedescribed method/process may be realized using standard computerprogramming techniques and languages. The present application is notlimited to particular processors, computer languages, computerprogramming conventions, data structures, or other such implementationdetails. Those skilled in the art will recognize that the describedprocesses may be implemented as a part of computer-executable codestored in volatile or non-volatile memory, as part of anapplication-specific integrated chip (ASIC), etc.

As noted, certain adaptations and modifications of the describedembodiments can be made. Therefore, the above discussed embodiments areconsidered to be illustrative and not restrictive.

What is claimed is:
 1. A server computer system comprising: acommunications module; a processor coupled with the communicationsmodule; and a memory coupled to the processor and storingprocessor-executable instructions which, when executed by the processor,configure the processor to: select digital identity network verificationvia a digital identity network as a primary type of authentication;determine that verification using the primary type of authentication hasfailed; responsive to determining that verification using the primarytype of authentication has failed, attempt verification using asecondary type of authentication that does not require the digitalidentity network; and determine successful verification using thesecondary type of authentication.
 2. The server computer system of claim1, wherein the processor-executable instructions, when executed by theprocessor, further configure the processor to: receive, via thecommunications module and from a remote computing device, a signalincluding a request to provision a data record for a service; andresponsive to successful verification using the secondary type ofauthentication, provision the data record for the service.
 3. The servercomputer system of claim 1, wherein the processor-executableinstructions, when executed by the processor, further configure theprocessor to: prior to selecting digital identity network verificationas the primary type of authentication, determine that a user has one ormore data records associated with one or more members of a digitalidentity network.
 4. The server computer system of claim 3, wherein theprocessor-executable instructions, when executed by the processor,further configure the processor to: send, via the communications moduleand to a remote computing device, a signal requesting confirmation thatthe user has the one or more data records associated with the one ormore members of the digital identity network; and receive, via thecommunications module and from the remote computing device, a signalincluding confirmation that the user has the one or more data recordsassociated with the one or more members of the digital identity network.5. The server computer system of claim 4, wherein the signal requestingconfirmation that the user has the one or more data records associatedwith the one or more members of the digital identity network causes theremote computing device to display a graphical user interface thatincludes at least one selectable option to confirm that the user has theone or more data records associated with the one or more members of thedigital identity network.
 6. The server computer system of claim 5wherein the graphical user interface displays a list of all members ofthe digital identity network.
 7. The server computer system of claim 1,wherein the processor-executable instructions, when executed by theprocessor, further configure the processor to: send, via thecommunications module and to a server associated with the digitalidentity network, a request for verified identity data of a user.
 8. Theserver computer system of claim 7, wherein the processor-executableinstructions, when executed by the processor, further configure theprocessor to: receive, via the communications module and from the serverassociated with the digital identity network, a signal indicating thatthe request for verified identity data of the user has failed; andresponsive to receiving the signal indicating that the request forverified identity data of the user has failed, determine thatverification using the primary type of authentication has failed.
 9. Theserver computer system of claim 1, wherein when attempting verificationusing the secondary type of authentication, the processor-executableinstructions, when executed by the processor, further configure theprocessor to: obtain, via the communications module and from a remotecomputing device, image data including a first image of a user and animage of an identity document that includes a second image of the user;analyze the image data to determine that the first image of the user andthe second image of the user correspond to a same user; and responsiveto determining that the first image of the user and the second image ofthe user correspond to the same user, determine successful verification.10. The server computer system of claim 1, wherein when attemptingverification using the secondary type of authentication, theprocessor-executable instructions, when executed by the processor,further configure the processor to: obtain, via the communicationsmodule and from a remote computing device, an internet protocol addressof the remote computing device; determine a location of the remotecomputing device based at least on the internet protocol address; andcompare the determined location of the remote computing device to aknown address of a user to determine successful verification.
 11. Acomputer-implemented method comprising: selecting digital identitynetwork verification via a digital identity network as a primary type ofauthentication; determining that verification using the primary type ofauthentication has failed; responsive to determining that verificationusing the primary type of authentication has failed, attemptingverification using a secondary type of authentication that does notrequire the digital identity network; and determining successfulverification using the secondary type of authentication.
 12. Thecomputer-implemented method of claim 11, further comprising: receiving,via a communications module and from a remote computing device, a signalincluding a request to provision a data record for a service; andresponsive to successful verification using the secondary type ofauthentication, provision the data record for the service.
 13. Thecomputer-implemented method of claim 11, further comprising: prior toselecting digital identity network verification as the primary type ofauthentication, determining that a user has one or more data recordsassociated with one or more members of a digital identity network. 14.The computer-implemented method of claim 13, further comprising:sending, via a communications module and to a remote computing device, asignal requesting confirmation that the user has the one or more datarecords associated with the one or more members of the digital identitynetwork; and receiving, via the communications module and from theremote computing device, a signal including confirmation that the userhas the one or more data records associated with the one or more membersof the digital identity network.
 15. The computer-implemented method ofclaim 14, wherein the signal requesting confirmation that the user hasthe one or more data records associated with the one or more members ofthe digital identity network causes the remote computing device todisplay a graphical user interface that includes at least one selectableoption to confirm that the user has the one or more data recordsassociated with the one or more members of the digital identity network.16. The computer-implemented method of claim 15, wherein the graphicaluser interface displays a list of all members of the digital identitynetwork.
 17. The computer-implemented method of claim 11, furthercomprising: sending, via a communications module and to a serverassociated with the digital identity network, a request for verifiedidentity data of a user.
 18. The computer-implemented method of claim17, further comprising: receiving, via the communications module andfrom the server associated with the digital identity network, a signalindicating that the request for verified identity data of the user hasfailed; and responsive to receiving the signal indicating that therequest for verified identity data of the user has failed, determiningthat verification using the primary type of authentication has failed.19. The computer-implemented method of claim 11, wherein attemptingverification using the secondary type of authentication comprises:obtaining, via a communications module and from a remote computingdevice, image data including a first image of a user and an image of anidentity document that includes a second image of the user; analyzingthe image data to determine that the first image of the user and thesecond image of the user correspond to a same user; and responsive todetermining that the first image of the user and the second image of theuser correspond to the same user, determining successful verification.20. A non-transitory computer readable storage medium comprisingcomputer-executable instructions which, when executed, configure aprocessor to: select digital identity network verification via a digitalidentity network as a primary type of authentication; determine thatverification using the primary type of authentication has failed;responsive to determining that verification using the primary type ofauthentication has failed, attempt verification using a secondary typeof authentication that does not require the digital identity network;and determine successful verification using the secondary type ofauthentication.