Systems and methods to store and manage entity verification information to reduce redundant entity information and redundant submission of requests

ABSTRACT

Systems and methods to store and manage entity verification information to reduce redundant entity information and redundant submission of requests are disclosed. Exemplary implementations may: obtain user profiles associated with users; obtain requests to verify the users by compliance organizations; in response to the user profiles identified by the requests being part of one or more profile hierarchies, access content of subordinate user profiles; generate user interface information defining a user interface through which the content of the user profiles is accessed by the compliance organizations; effectuate communication of the user interface information to computing platforms associated with the compliance organizations to cause the computing platforms to present the user interface displaying the content of the user profiles that satisfy the request criteria; and/or perform other operations.

FIELD OF THE DISCLOSURE

The present disclosure relates to systems and methods to store and manage entity verification information to reduce redundant entity information and redundant submission of requests.

BACKGROUND

Financial and other institutions are regulated by strict due diligence procedures. By way of non-limiting illustration, a due diligence procedure referred to as Know Your Customer (“KYC”) is a process that financial companies use to verify customer identity and assess and monitor risk factors for fraud and other financial crimes. KYC ensures a customer is who they say they are. For business customers, institutions follow Know Your Business (“KYB”) procedures which allow companies to adhere to regulatory obligations with respect to verifying the identity of business customers and monitoring their risk. In the United States and elsewhere, these procedures are required for any financial institution that deals with customers while opening and maintaining financial accounts. Compliance with regulations helps prevent money laundering, terrorism financing, fraud schemes, and other crimes. By verifying a customer's identity and intentions when the account is opened, financial and other institutions can more accurately pinpoint suspicious clients and their activities.

SUMMARY

One or more aspects of the present disclosure address problems associated with current technology used by platforms that facilitate verification and/or risk assessment of potential customers by organizations that must comply with due diligence procedures. For the sake of this disclosure, an organization subject to obligatory compliance with one or more regulations (government or other) may be referred to as a “compliance organization.”

Web-based platforms existing today may facilitate identification verification based on potential customers supplying official identification documents (e.g., driver's license, passport, etc.) which are electronically analyzed for authenticity. Verifying business entities may involve going through the business structure, and verifying its constituents (e.g., directors, shareholders, partners, etc.). Traditionally, verifying constituents requires requests to be submitted for each constituent, where they would each then be directed to provide documentation for individualized verification. This process would then need to be repeated should the constituent need to be verified again either individually or as part of another business entity. Thus, problems of redundant provision of information and redundant submission of requests exist in these systems. These problems lead to increased processor and data storage requirements, as well as overall user dissatisfaction with traditional platforms.

One aspect of the present disclosure relates to a system configured to facilitate store and manage entity verification information to reduce redundant entity information and redundant submission of requests. One or more implementations of the system may address one or more of the problems described herein, and may include benefits and advantages that will become apparent to a person of ordinary skill in the art. In particular, one or more implementations of the systems and methods described herein solve one or more problems of existing technological solutions by leveraging secure centralized database(s) as a single source of truth, where user profiles are defined and organized with respect to hierarchies that represent various business structures. The system may form a platform (e.g., a customer due diligence platform) through which users are verified/screened and/or assessed for risk by organizations that abide by, or otherwise must comply with, jurisdictional regulations and/or organizational standards (“compliance organizations”).

Users (e.g., individual persons and business entities) may create profiles within the platform by supplying personal information, confidential information, and/or documentation which may be verified for authenticity through one or more automated procedures. User profiles for business entities may define profile hierarchies that represent the structure of those entities. By way of non-limiting illustration, a profile hierarchy may represent a business entity as a superior or root node in a hierarchy, with one or more subordinate nodes representing individual persons and/or other business entities that are the constituents of the business entity (e.g., one or more of corporate officers, directors, members, partners, shareholders, and/or other entities holding title within a business entity).

Organizations may submit requests for documentation and/or other information about users as part of performing verification and/or risk assessments. The system may be configured to provide the organizations with requested authenticated documentation by accessing a database and securely passing that information/documentation to client devices associated with the organizations for display and review. By virtue of the hierarchical relationships between user profiles, a request submitted to verify a business entity may allow content from subordinate nodes to be automatically accessed such that it is passed up through the hierarchy to the superior node. This eliminates the need for the user profile of the business entity itself to redundantly store information about its constituents, because that information may simply persist in the user profiles of the users who are those constituents. Further, the hierarchies provide a mechanism to verify entities holding title within a business entity through single requests submitted to the business entity itself, thereby eliminating any redundant request submissions to verify each of those entities separately.

One or more implementations of a system to store and manage entity verification information to reduce redundant entity information and redundant submission of requests may include one or more of non-transitory electronic storage, one or more hardware processors configured by machine-readable instructions, and/or other components.

The non-transitory electronic storage may be configured to store one or more of profiles, and/or other information. The profiles may include one or more of user profiles, organization profiles, and/or other profiles. User profiles may be associated with users of the system who are being assessed for risk. Organization profiles may be associated with compliance organizations who are assessing users for risk because the compliance organizations abide by, or otherwise must comply with, jurisdictional regulations and/or organizational standards. In some implementations, a compliance organization may be a financial institution, such as a bank, while a user may be an individual or business entity who wishes to do business with the financial institution.

The individual user profiles may include one or more of user verification information (sometimes simply referred to as “user information”) describing individual users, one or more content items associated with individual users, one or more authenticated content items associated with individual users, and/or other information. In some implementations, individual users may be described based on attribute values of a hierarchy attribute and/or other attributes. The attribute values of the hierarchy attribute may specify profile hierarchies for sets of the user profiles. An individual profile hierarchy may identify one or more of the user profiles that belong to the individual profile hierarchy. The individual profile hierarchy may specify position of the individual user profiles within the individual profile hierarchy (e.g., node position). By way of non-limiting illustration, position may include one or more of superior (e.g., a superior or root node), subordinate, intermediate, and/or other position. By way of non-limiting illustration, the individual profile hierarchy may specify that an individual user profile is superior to one or more other user profiles in the individual set of the user profiles. The individual profile hierarchy may denote relationships between individual user profiles in the individual set of the user profiles.

By way of non-limiting illustration, a first user profile may be associated with a first user. The first user profile may include one or more of first user verification information, a first authenticated content item associated with the first user, and/or other content. The first user verification information may include a first attribute value of the hierarchy attribute and/or other information. A second user profile may be associated with a second user. The second user profile may include one or more of second user verification information, a second authenticated content item associated with the second user, and/or other content. In some implementations, the first attribute value of the hierarchy attribute of the first user profile may specify or define a first profile hierarchy. The first profile hierarchy may identify one or more of the first user profile, the second user profile, and/or other user profiles that are part of the first profile hierarchy. The first profile hierarchy may specify that the first user profile is superior to the second user profile in accordance with a first relationship between the first user profile and the second user profile.

The processor(s) may be configured to obtain requests to verify and/or assess risk of users by compliance organizations. Individual ones of the request may be associated with individual ones of the compliance organizations. Individual ones of the requests may include information identifying individual ones of the user profiles, request criteria, and/or other information. The request criteria may indicate content of the user profiles that may be required as part of verification and/or risk assessment by compliance organizations. By way of non-limiting illustration, the requests may include a first request by a first compliance organization, and/or other requests. The first request may identify the first user profile and/or other user profiles. The first request may include a first request criterion and/or other criteria.

The processor(s) may be configured to access content of user profiles to determine if content of the user profiles satisfies the request criteria of the requests. The processor(s) may be configured to identify the content of the user profiles that satisfy the request criteria of the requests. In response to the user profiles identified by the requests being part of one or more of the profile hierarchies, the processor(s) may be configured to access the content of one or more subordinate user profiles within the profile hierarchies to identify content of one or more subordinate user profiles that satisfy the request criteria of the requests identifying superior user profiles. By way of non-limiting illustration, responsive to the first request identifying the first user profile, the processor(s) may be configured to access the content of the second user profile to identify content of the second user profile that satisfies the first request criterion by virtue of the first profile hierarchy specifying the second user profile as subordinate to the first user profile and denoting the first relationship between the first user profile and the second user profile.

The processor(s) may be configured to generate user interface information defining a user interface through which content of the user profiles are accessed by compliance organizations. The user interface may be configured to display one or more of user information, instances of content items, and/or other information from the user profiles. In some implementations, the user interface may display, on computing platforms associated with compliance organizations, the content within the user profiles that satisfy the request criteria of the requests. By way of non-limiting illustration, the user interface information may define an instance of the user interface so that content of the second user profile satisfying the first request may be accessed by the first compliance organization. By way of non-limiting illustration, the content satisfying the first request may include one or more of the second user information, the second authenticated content item, and/or other content from the second user profile.

The processor(s) may be configured to effectuate communication of the user interface information to computing platforms associated with the compliance organizations. Reception of the user interface information at the computing platforms may cause the computing platforms to present the user interface displaying content of the user profiles that satisfies the request criteria of the requests. By way of non-limiting illustration, the user interface information may be communicated to a first computing platform associated with the first compliance organization to cause the first computing platform to present the instance of the user interface displaying the content of first user profile and/or the second user profile that satisfies the criteria of the first request.

As used herein, any association (or relation, or reflection, or indication, or correspondence) involving servers, processors, client computing platforms, and/or another entity or object that interacts with any part of the system and/or plays a part in the operation of the system, may be a one-to-one association, a one-to-many association, a many-to-one association, and/or a many-to-many association or N-to-M association (note that N and M may be different numbers greater than 1).

As used herein, the term “obtain” (and derivatives thereof) may include active and/or passive retrieval, determination, derivation, transfer, upload, download, submission, and/or exchange of information, and/or any combination thereof. As used herein, the term “effectuate” (and derivatives thereof) may include active and/or passive causation of any effect. As used herein, the term “determine” (and derivatives thereof) may include measure, calculate, compute, estimate, approximate, generate, and/or otherwise derive, and/or any combination thereof.

These and other features, and characteristics of the present technology, as well as the methods of operation and functions of the related elements of structure and the combination of parts and economies of manufacture, will become more apparent upon consideration of the following description and the appended claims with reference to the accompanying drawings, all of which form a part of this specification, wherein like reference numerals designate corresponding parts in the various figures. It is to be expressly understood, however, that the drawings are for the purpose of illustration and description only and are not intended as a definition of the limits of the invention. As used in the specification and in the claims, the singular form of “a”, “an”, and “the” include plural referents unless the context clearly dictates otherwise.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a system configured to store and manage entity verification information to reduce redundant entity information and redundant submission of requests, in accordance with one or more implementations.

FIG. 2 illustrates a method to store and manage entity verification information to reduce redundant entity information and redundant submission of requests, in accordance with one or more implementation.

FIG. 3 illustrates a user interface comprising a profile page through which a user manages a user profile, in accordance with one or more implementations.

FIG. 4 illustrates a user interface comprising a document status page through which a user views status of content item(s) shared as part of request(s), in accordance with one or more implementations.

FIG. 5 illustrates a user interface comprising a request status page through which a user views status of request(s), in accordance with one or more implementations.

FIG. 6 illustrates a user interface comprising a request profile page through which a compliance organization specifies request criteria of a request, in accordance with one or more implementations.

FIG. 7 illustrates a user interface comprising a request status page through which a compliance organization views status of request(s), in accordance with one or more implementations.

FIG. 8 illustrates a user interface comprising a risk assessment page showing results of automated risk assessment of a user and providing access to content of a user profile of the user that satisfies a request, in accordance with one or more implementations.

FIG. 9 illustrates a user interface comprising a hierarchy management page, in accordance with one or more implementations.

DETAILED DESCRIPTION

FIG. 1 illustrates a system 100 configured to store and manage entity verification information to reduce redundant entity information and redundant submission of requests, in accordance with one or more implementations. Users of the system 100 who are compliance organizations may submit requests for documentation and/or other information about other users of the system that are the subject of identity verification and/or risk assessment. The system 100 may be configured to provide the organizations with requested authenticated documentation by accessing a database and securely passing that information/documentation to the organizations for display and review at client devices. The system 100 may be configured to maintain a highly encrypted database of user profiles including underlying user data and authenticated documentation. User profiles for business entities may define profile hierarchies that represent corporate structure of those entities, e.g., to represent a business entity itself as a superior or root node in a hierarchy, with one or more subordinate nodes representing individual persons and/or other business entities that comprise one or more of corporate officers, directors, members, partners, shareholders, and/or other entities holding title within a business entity. By virtue of the hierarchical relationships between user profiles, a request submitted to verify a business entity may allow content from subordinate nodes to be automatically accessed such that it is passed up through the hierarchy to the superior node. This eliminates the need for the user profile of the business entity itself to redundantly store information about its officers, shareholders, and the like, because that information may simply persist in the user profiles of the users who are those officers, shareholders, and the like. Further, hierarchies provide a mechanism to verify corporate officers, directors, members, partners, shareholders, and/or other entities holding title within a business entity through single requests submitted to the business entity itself, thereby eliminating any redundant request submissions to verify each of those users separately.

In some implementations, system 100 may include one or more of one or more servers 102, one or more client computing platforms 104, external resources 126, and/or other components. Server(s) 102 may be configured to communicate with one or more client computing platforms 104 according to a client/server architecture and/or other architectures. Client computing platform(s) 104 may be configured to communicate with other client computing platforms via server(s) 102 and/or according to a peer-to-peer architecture and/or other architectures. Users may access system 100 via client computing platform(s) 104. It is noted that while both compliance organizations and entities subject to identity verification and/or risk assessment are both “users” of the system 100 (e.g., both may interact with the system 100 and/or each other, and/or impact aspects of the system 100), in some implementations the term “users” may be used refer to the entities subject to identity verification and/or risk assessment, while the compliance organizations may be referred to as “compliance organizations” or “organizations.”

Server(s) 102 may include one or more of non-transitory electronic storage 128, one or more processors 130 configured by machine-readable instructions 106, and/or other components. The non-transitory electronic storage 128 may be configured to store one or more profiles 129. The profile(s) 129 may include one or more of user profiles, organization profiles, and/or other information. User profiles may be associated with users of the system 100 who are being assessed for risk. Organization profiles may be associated with compliance organizations who are verifying users and/or assessing users for risk because the compliance organizations abide by, or otherwise must comply with, jurisdictional regulations and/or organizational rules standards.

In some implementations, a compliance organization may be a financial institution and/or other institution or organization subject to jurisdictional regulation and/or organizational rules and standards (self-imposed or otherwise). By way of non-limiting illustration, a compliance organization may comprise a bank. A user may be an individual or business entity who wishes to do business with a compliance organization (e.g., employ the services of the compliance organization) and will thereafter be the subject of the compliance organization's compliance procedure. By way of non-limiting illustration, a user may be a potential customer. The user may comprise an individual entity (e.g., a person) or a business entity. A business entity may comprise an organization formed to conduct business (e.g., sole proprietorships, partnerships, corporations, limited liability companies (LLCs), etc.). A business entity may itself be made up of individuals including, but not limited to, corporate officers, directors, members, partners, shareholders, and/or other entities holding title within a business entity, as well as other business entities (e.g., a business which itself is a shareholder in another business). A business entity may create a user profile representing the business entity as a whole, while users making up a business entity may individually create user profiles.

Individual user profiles may include one or more of user verification information (sometimes referred to simply as “user information”) describing individual users, one or more authenticated content items associated with individual users, and/or other information.

The user information may define values (e.g., attribute values) of user attributes and/or other information. The values of the user attributes may describe characteristics of the users and/or authentication requests associated with the users. The user attributes describing characteristics of the users may include one or more of a name attribute, a demographics attribute, a location attribute, a contact attribute, a hierarchy attribute, and/or other attributes. The user attributes describing authentication requests associated with the users may include one or more of a requestor attribute, a document attribute, a status attribute, a timing attribute, and/or other attributes.

A value of a name attribute may define a name characteristic of a user. A name characteristic of an individual may include one or more of a legal name, a preferred name, a nickname, alias(es), and/or other information. A name characteristic of a business entity may include one or more of full business name, a stock listing name/symbol, and/or other information.

A value of a demographics attribute may define demographic characteristics of a user. A demographic characteristic of an individual may include one or more of age, sex, occupation, cultural background, family status, and/or other information. A demographics characteristic of a business entity may include one or more of entity type (e.g., sole proprietorship, LLC, etc.) and/or other information.

A value of a location attribute may define a location characteristic of a user. A location characteristic of an individual may include one or more addresses, legal jurisdictions, and/or other information. By way of non-limiting illustration, addresses may include one or more of a home address, a work address, a zip code, a city, a state, and/or other information. A legal jurisdiction may include an identification of a country, state, and/or region having jurisdiction over the individual. A location characteristic of a business entity may include one or more address(es), legal jurisdiction, and/or other information. By way of non-limiting illustration, addresses may include one or more of address of principle place of business, address of one or more hubs or centers, address of corporate officer(s), and/or other information. A legal jurisdiction may include an identification of a country, state, and/or region having jurisdiction over the business entity.

A value of a contact attribute may define a contact information for a user. Contact information may include one or more of a name of a business agent (for business entities), a telephone number, an email, a social media handle, and/or other information.

A value of a hierarchy attribute may define hierarchical information and/or other information. The hierarchical information may specify profile hierarchies for sets of the user profiles. An individual profile hierarchy may identify one or more of the user profiles that belong to the individual profile hierarchy. The individual profile hierarchy may specify position of the individual user profiles within the individual profile hierarchy. By way of non-limiting illustration, position may include one or more of superior, subordinate, intermediate, and/or other position. By way of non-limiting illustration, the individual profile hierarchy may specify that an individual user profile is superior to one or more other user profiles in the individual set of the user profiles. The individual profile hierarchy may denote relationships between individual user profiles in the individual set of the user profiles. The relationships may include the business relationships between the user profiles, e.g., one or more of officer, director, member, partner, shareholder, and/or other specified relationship.

In some implementations, a profile hierarchy may be comprised of a set of user profiles forming nodes, with edges connected between the nodes representing the relationships between the user profiles. A superior user profile may comprise a superior or root node, and may be a profile for a business entity. One or more subordinate user profiles may comprise subordinate nodes that are connected, through edges, to the superior or root node. A subordinate user profile forming a subordinate node may comprise a profile for an individual person or another business entity. In some implementations, a profile hierarchy may include one or more superior user profiles and one or more subordinate user profiles. In some implementations, a profile hierarchy may include one superior user profile and one or more subordinate user profiles.

The user attributes describing authentication requests associated with the users may include one or more of a requestor attribute, a document attribute, a status attribute, a timing attribute, and/or other attributes.

A value of a requestor attribute may include information identifying individual compliance organizations who have submitted request(s) associated with individual users. Compliance organizations may be identified by name, username, and/or other identifying information.

A value of a document attribute may include information identifying and/or describing content items provided by a user, content items that have been authenticated, and/or other content. Individual content items may be identified by one or more document name, content item type, unique IDs, and/or other information. Authenticated content items associated with individual users may refer to documents and/or other content that a user has provided in order to verify their identify and/or otherwise comply with one or more requirements of a risk assessment by a compliance organization. By way of non-limiting illustration, content items may include documents such documents proving residence, ownership of assets, employment, and/or other documents. Users may supply (e.g., upload, scan, etc.) content items for storage. The content items may thereafter be authenticated for accuracy and completeness so that they may become classified as authenticated content items. Authentication may be performed by the system 100 and/or sent to a third-party authentication system (see, e.g., authentication component 112).

A value of a status attribute may describe status of individual requests and/or status of individual authenticated content items. Status of individual requests may characterize current state of the individual requests. State of individual requests may be characterized by one or more of timing information (e.g., when a request was received, when information from a user profile was accessed, when a request ends, and/or other information), completion information (e.g., is the request pending, canceled, expired, incomplete, partially complete, or complete), and/or other information. Status of individual authenticated content items may characterize current state of the individual authenticated content items. State of individual authenticated content items may be characterized by one or more of timing information (e.g., when a content item was uploaded, when a content item was accessed by a user or compliance organization, when a content item was updated or changed, when a content item will expire, when a content item was removed, and/or other information), review status (e.g., was the content item reviewed, is the content item under review, is the content item slated to be removed, was a request to update or change the content item made, and/or other information), and/or other information. In some implementations, expiration may be defined with respect to stated expirations on the documents themselves, and/or based on a specified passage of time. By way of non-limiting illustration, a driver's license may expire on an expiration date specified on the license; while a document proving a home address (e.g., utilities invoice) may expire after a specified period of time (e.g., the document is considered appropriate for address verification for up to one year).

By way of non-limiting illustration, a first user profile may be associated with a first user. The first user profile may include one or more of first user verification information, a first authenticated content item associated with the first user, and/or other content. The first user verification information may include a first attribute value of the hierarchy attribute and/or other information. A second user profile may be associated with a second user. The second user profile may include one or more of second user verification information, a second authenticated content item associated with the second user, and/or other content. In some implementations, the first attribute value of the hierarchy attribute of the first user profile may specify or define a first profile hierarchy. The first profile hierarchy may identify one or more of the first user profile, the second user profile, and/or other user profiles that are part of the first profile hierarchy. The first profile hierarchy may specify that the first user profile is superior to the second user profile in accordance with a first relationship between the first user profile and the second user profile. By way of non-limiting illustration, the first user information may further include information input by the first user into a user interface (e.g., name, age, sex, address, etc.) and/or derived from one or more content items (e.g., via character recognition); and the first authenticated content item may include a scan or copy of an identification document (e.g., passport, driver's license, etc.) and/or other documentation (e.g., proof of ownership of one or more assets).

The individual compliance organization profiles may include one or more of organization information describing individual compliance organizations, request information, request profiles, risk profiles, and/or other information.

The organization information describing individual compliance organizations may define values of organization attributes and/or other information. The organization attributes describing characteristics of the compliance organizations may include one or more of a name attribute, a location attribute, a contact attribute, and/or other attributes. The one or more of the name attribute, location attribute, contact attribute, and/or other attributes making up the organization attributes may characterize the same or similar information as they do for users who are business entities.

The request information may include values of the request attributes describing characteristics of requests submitted by the compliance organizations. The request attributes describing characteristics of requests may include one or more of a subject attribute, a status attribute, a timing attribute, and/or other attributes.

A value of a subject attribute may include information identifying users who are subjects of requests submitted by compliance organizations. Users may be identified by name, username, full business name (for business entities), and/or other identifying information.

A value of a status attribute associated with compliance organizations may describe status of individual requests submitted by the compliance organizations and/or status of individual authenticated content items associated with the individual requests. Status of individual requests may characterize current state of the individual requests from the perspective of the compliance organizations. State of individual requests may be characterized by one or more of timing information (e.g., when a request was generated, when a request was submitted, when and what information from a user profile was retrieved as part of a request, when a request ends or expires, and/or other information), completion information (e.g., is the request pending, canceled, expired, incomplete, partially complete, under review, and/or complete), and/or other information. Status of individual authenticated content items may characterize current state of the individual authenticated content items requested as part of a request. State of individual authenticated content items may be characterized by one or more of timing information (e.g., when a content item was uploaded by a user, when a content item was accessed by a user or compliance organization, when a content item was updated or changed, when a content item will expire, when a content item was removed, and/or other information), review status (e.g., was the content item reviewed, is the content item under review, is the content item slated to be reviewed, was a request to update or change the content item made, and/or other information), authentication status (e.g., is the content item indicated as authenticated, is the content item under review for authentication), and/or other information.

An individual request profile may include an individual set of request criteria. Individual compliance organizations may be associated with multiple request profiles that each include a customized set of request criteria. Compliance organizations may associate a given request profile with a given type of potential customer, such that they may select and deploy a given request profile on an as-needed basis without having to redefine the request criteria for subsequent requests. The request criteria may indicate a set of criteria that specify content item types and/or other information that may be required as part of assessment by compliance organizations. Content item types may be characterized by document type, document name, and/or other information. Document types may include address verification type, employment verification type, asset ownership type, entity verification type, and/or other types.

In some implementations, request criteria of the requests identify relationships between the individual user profiles in order to identify subordinate user profiles that may be required to be assessed as part of a request. By way of non-limiting illustration, in assessing business entities, a compliance organization may specify that corporate officers, shareholders, and/or other users having other relationships are part of the requests associated with the business entities.

Address verification type documents may include documents that show or prove stated residence or address of users. By way of non-limiting illustration, address verification type documents may include one or more of lease agreements, utility bills, and/or other documents.

Employment verification type documents may include documents that show or prove stated employment status and/or income of users. By way of non-limiting illustration, employment verification type documents may include one or more of tax returns, W-2 forms, 1090 forms, and/or other documents.

Asset ownership type documents may include documents that show or prove stated asset ownerships of users. By way of non-limiting illustration, asset ownership type documents may include one or more of deeds, trusts, wills, pink slips, purchase agreements, and/or other documents.

Entity verification type documents may include documents that show or prove stated asset business formations of users who are business entities. By way of non-limiting illustration, entity verification type documents may include one or more of certificates of formation, IRS form K-1, and/or other business records.

In some implementations, content item types may be characterized by specific document names (e.g., a specific deed, IRS form, and/or other specified document).

An individual risk profile may include an individual set of risk assessment criteria. Individual compliance organizations may be associated with multiple risk profiles that each include a customized set of risk assessment criteria. Compliance organizations may select and deploy a given risk profile on an as-needed basis without having to redefine the risk assessment criteria for subsequent risk assessments. Risk assessment criteria may include one or more of risk values that are assigned to particular information and/or weighting information describing weights that are applied to each risk value. In performing risk assessment (see, e.g., assessment component 115), information collected from user profiles may be assigned values, weighted, and aggregated to produce aggregate risk values.

It noted that the above descriptions of user profiles and compliance organization profiles are for illustrative purposes only and are not to be considered limiting. Instead, it is to be understood that the profiles may include other information and/or may define users and compliance organizations in other ways. For example, a compliance organization has the ability to custom-define risk assessment criteria, and compile sets of criteria into risk profiles through the system 100, which may allow the compliance organization to assess risk in any way they deem fit as needed to comply with the particular regulations they may be subject to. Thus, while one or more descriptions herein may provide discrete examples of risk assessment criteria and the content item types that may fit into this criteria, this is for illustrative purposes only and not to be considered limiting. Instead, those skilled in the art may appreciate that this criteria may include other criteria depending on the particular needs of a compliance organization, their industry, and the ever-changing landscape of government regulations.

In FIG. 1 , machine-readable instructions 106 of one or more processors 130 of server(s) 102 may include one or more instruction components. The instruction components may include computer program components. Executing the machine-readable instructions 106 may cause server(s) 102 to facilitate store and manage entity verification information to reduce redundant entity information and redundant submission of requests. The instruction components may include one or more of a profile component 108, a user interface component 110, an authentication component 112, a request component 114, an assessment component 115, and/or other instruction components.

The profile component 108 may be configured to obtain, manage, and/or access user profiles and/or compliance organization profiles stored by electronic storage 128. Managing profiles may include one or more of generating profiles, changing profiles, updating existing information within profiles, and/or other features and/or functionality.

The electronic storage 128 may include a secure database that stores and encrypts content making up profiles. As information is provided to system 100, it may be encrypted and stored in association with public and private keys. Private keys may be stored in user profiles and made available to users of the user profiles when accessing user profiles (e.g., after a user logs in). Thus, the system 100 itself may not have access to the substantive content of the user profiles, other than the encrypted version of the data. Generating and presenting user interfaces to display content of user profiles and/or other information stored in electronic storage 128 may be based on being granted access to the database. Relationships between user profiles and organization profiles may be established and authorized. For example, a request submitted by compliance organization with respect to a user may have to be accepted and/or otherwise indicated as authorized by the user before information is shared from a user profile. The private keys held in user profiles may then be passed to organization profiles so that content of user profiles satisfying requests can be accessed and displayed at computing platforms of the compliance organizations.

User interface component 110 may be configured to effectuate presentation of individual user interfaces on individual client computing platforms of one or more client computing platforms 104. User interface component 110 may be configured to establish one or more network connections between the server(s) 102 and individual client computing platforms. User interface component 110 may be configured to effectuate communication of user interface information to the individual client computing platforms over the one or more network connections to cause the individual client computing platforms to present one or more user interfaces.

User interface component 110 may be configured to generate user interface information defining one or more user interfaces through which users and/or compliance organizations interact with the system 100 and/or each other. A given user interface may be configured to facilitate one or more of defining and/or updating profiles, submitting and/or displaying requests, and/or other features and/or functionality described herein. An instance of a user interface may include one or more user interface portions. By way of non-limiting illustration, a user interface may include one or more of an input portion, a display portion, and/or other portions. Individual portions may include one or more user interface elements configured to facilitate user interaction with the user interface. By way of non-limiting illustration, user interface elements may include one or more of text input fields, drop down menus, check boxes, display windows, virtual buttons, file drag-and-drop elements, file upload buttons, and/or other elements configured to facilitate user interaction.

An input portion of a user interface may be configured to obtain user input. User input may include one or more of input to generate a profile, input to modify a profile, input to update a profile, input to navigate between pages, input to create and/or modify a profile hierarchy, and/or other input. The user input may include one or more of entering text, selecting user interface elements, uploading digital content items (e.g., electronic files), and/or other user input. A display portion may be configured to display information.

In some implementations, users may be provided a user interface through which the users manage the user profiles. Managing may include one or more of creating, editing (e.g., adding information and/or documents, modifying information and/or documents), and/or other actions that may impact the content of user profiles. In some implementations, managing a user profile may include managing one or more profile hierarchies associated with the user profile. In some implementations, users who manage profile hierarchies may be limited to user profiles that are the superior profiles in the hierarchies. This may prevent unauthorized changes to the hierarchies by lower level profiles.

By way of non-limiting illustration, the user interface may be configured to receive user entry and/or selection of user profiles to be included in a profile hierarchy, definition of relationship between user profiles, and/or other user input. By way of non-limiting illustration, user interface component 110 may be configured to generate user interface information that defines a user interface through which the first user manages the first profile hierarchy.

User interface component 110 may be configured to effectuate communication of user interface information to computing platforms associated with the users to cause the computing platforms associated with the users to present the user interface through which the users manage the user profiles. By way of non-limiting illustration, user interface component 110 may be configured to effectuate communication of user interface information to the computing platform associated with the first user to cause the computing platform to present an instance of the user interface so that the user may manage the first profile hierarchy.

In some implementations, a user interface through which users manage the user profiles may include one or more user interface pages (sometimes referred to simply as “pages”). Pages may be expressed as individual portions of a user interface, windows of a user interface, and/or other user interfaces altogether. Users may navigate between pages through one or more of a navigation button, selection of tabs, and/or other user input. The user interface information may further define individual pages of the user interface. An individual page may be dedicated to, and/or otherwise associated with, presenting particular sets of information. By way of non-limiting illustration, pages may include one or more of profile pages through which the users access the user profiles, hierarchy management pages through which the users manage profile hierarchies, request status pages displaying status of the requests, document status pages displaying status of individual authenticated content items, and/or other pages.

Profile pages may provide users with access to view, edit, update, and/or otherwise interact with content of their user profiles (see, e.g., FIG. 3 ).

Hierarchy management pages may include one or more user interface elements to allow users to manage one or more profile hierarchies. User input to manage profile hierarchies may include one or more of entry and/or selection of user profiles to be included in individual profile hierarchies, input of definitions of the relationships between user profiles, and/or other input. By way of non-limiting illustration, a hierarchy management page may include a set of text-input fields, drop down menus, check boxes, and/or other user interface elements that users interact with to define and/or update a profile hierarchy.

In some implementations, a hierarchy management page may include a window or pane forming a virtual space upon which users may drag and drop user interface elements representing user profiles to define one or more profile hierarchies. Upon instantiation of a user interface element representing a user profile into the window or pane (through drag and drop, or other interaction), the user profile may be included in a profile hierarchy. The user may then connect user interface elements representing user profiles with lines to establish a relationship between the user profiles which may then be defined accordingly. By way of non-limiting illustration, a user may start with adding a user interface element representing their own user profile into the window or pane, then add one or more other user interface element representing other user profiles into the window or pane. The window or pane may be configured to receive user input to add (e.g., draw) lines between user interface elements to establish that a relationship exists. A drop down menu or text input box may appear which allows the relationship to be particularly specified. Superiority between user profiles may be established based on one or more relative positions between user interface elements (e.g., user interface elements positioned at the top being superior to ones below), the relationships as defined, and/or other information.

Request status pages may display status of one or more requests from the perspective of users (see, e.g., FIG. 5 ). In some implementations, an individual request status page may display status of an individual request. In some implementations, an individual request status page may display status of one or more requests. By way of non-limiting illustration, a request status page may display one or more values of a status attribute describing status of individual requests.

The document status pages may display status of one or more content items and/or authenticated content items (see, e.g., FIG. 4 ). In some implementations, an individual document status page may display status of a content item as being authenticated, under review for authentication, and/or denied authentication. In some implementations, an individual document status page may display status of an individual authenticated content item. In some implementations, an individual documentation status page may display status of one or more authenticated content items. In some implementations, an individual documentation status page may display status of one or more authenticated content items associated with one or more requests. By way of non-limiting illustration, a document status page may display one or more values of a status attribute describing status of individual authenticated content items.

In some implementations, an individual page may include grid, and/or other display arrangements. A grid may include one or more of a set of attribute-named columns, a set of rows, individual cells at intersections of individual attribute-named columns and individual rows, and/or other content. An individual attribute-named column may represent an individual attribute. An individual row may represent an individual content item or request. The individual cells may include individual values of the individual attributes represented in the attribute-named columns.

In some implementations, compliance organizations may be provided a user interface that may be configured to obtain user entry and/or selection of requests by compliance organizations to verify and assess risk of one or more users. The entry and/or selection of a request may include one or more of entry and/or selection of a user or user profile, request criteria, and/or other information. Individual ones of the requests may identify individual ones of the user profiles and may include request criteria and/or other information.

In some implementations, a user interface provided to compliance organizations may be configured to receive entry and/or selection of request criteria through a set of user interface elements of the user interface. The set of user interface elements may correspond to potential content item types that are available to be included in the requests. The entry and/or selection of a user interface element in the set of user interface elements may cause a corresponding potential content item type to be included as a content item type required by a request. In some implementations, one or more user interface elements may allow compliance organizations to custom-define request criteria including, but not limited to, custom-defined content item types.

In some implementations, upon entry and/or selection of request criteria, the compliance organizations may be provided an option to save the request criteria into a request profile. In some implementations, entry and/or selection of request criteria may be accomplished through selection of a previously defined request profile.

In some implementations, a user interface provided to compliance organizations may be configured to receive entry and/or selection to submit a request. By way of non-limiting illustration, the user interface may include a virtual button labeled “submit” that causes a request to be executed.

It is noted that while submission of requests is described with respect to entry and/or selection within a user interface of the system 100, this is for illustrative purposes only and not to be considered limiting. Instead, in some implementations, requests may be generated and/or submitted through input into an external resource 126. Compliance organizations and/or users may link external accounts, such as email, social media, message applications, and/or other external accounts. External accounts may be part of external resource(s) 126 in FIG. 1 . One or more external accounts may communicate with the server(s) 102. User input into an external account may cause a request to be generated and/or submitted by the system 100. By way of non-limiting illustration, a compliance organization may link an external email account where sending of emails to certain recipients and/or including certain key words may provide the basis for submitting requests.

In some implementations, compliance organizations may be provided a user interface that may be configured to obtain user entry and/or selection of risk assessment criteria of risk profiles. A user interface provided to compliance organizations may be configured to receive entry and/or selection of risk assessment criteria through a set of user interface elements of the user interface. The set of user interface elements may be configured to receive user input to perform one or more of identify user information and/or content item types, assign risk values to the user information and/or content item types, assign weights to the risk values, and/or specify other information making up risk profiles. In some implementations, risk values may include numerical values that make up a sliding scale of risk (e.g., a value being an integer between zero and five, with zero being very low risk of criminal activity and five being high risk). Weights may be defined by decimal values between zero and one, with zero being no weight is given and one being full weight is given.

The user interface component 110 may be configured to generate user interface information defining a user interface through which content of user profiles is provided to compliance organizations in response to submission of request. The user interface may be configured to display one or more of user information, instances of authenticated content items, and/or other information in the user profiles. In some implementations, the user interface through which content of the user profiles are accessed by compliance organizations may be limited to content within user profiles that satisfy the request criteria of the requests submitted by the compliance organizations. Accordingly, the compliance organizations may be limited to only viewing and/or accessing a record of the documentation and/or information they requested, while other information in user profiles not satisfying requests is maintained securely in storage. By way of non-limiting illustration, the user interface information may define a user interface through which content of first user profile, second user profile, and/or other user profiles is accessed by one or more compliance organizations.

The user interface component 110 may be configured to provide functionality of automated translation of documents to a specified language. By way of non-limiting illustration, the system 100 may include and/or may have access to machine translation functionality that may be performed on user-provided information and/or characters that are recognized from uploaded documents (e.g., performing OCR and machine translation). In some implementations, a machine translation service may be provided through an external resource.

In some implementations, a user interface through which content of user profiles is accessed by compliance organizations may include one or more pages. The user interface information may further define individual pages of the user interface. An individual page may be dedicated to, and/or otherwise associated with, presenting particular sets of information regarding a request. By way of non-limiting illustration, pages may include one or more of a request profile page, a request status page, a risk assessment page, and/or other pages.

Request profile pages may provide compliance organizations with access to view, edit, create, update, and/or otherwise interact with request profiles (see, e.g., FIG. 6 ). The request profile pages may be configured to receive entry and/or selection of request criteria through a set of user interface elements of the user interface. Individual user interface elements may correspond to potential content item type to be included as a content item type required by a request. Potential content item types may be categorized by entity type. User interface elements (e.g., check boxes) may be selected to specify content item type that may be required as part of requests.

Request status pages of a user interface provided to compliance organizations may display status of one or more requests from the perspective of the compliance organizations (see, e.g., FIG. 7 ). In some implementations, an individual request status page may display status of an individual request. In some implementations, an individual request status page may display status of one or more requests. By way of non-limiting illustration, a request status page may display one or more values of a status attribute of an organization profile describing status of individual requests. By way of non-limiting illustration, a request status page may indicate if a request is one or more of active, expired, pending, and/or other has other statuses.

Risk assessment pages may comprise pages where compliance organizations define risk assessment criteria (and/or define risk profiles) and/or view the results of automated risk assessments of users based on the risk assessment criteria and content of the user profiles that satisfy the requests (see, e.g., FIG. 8 ). By way of non-limiting illustration, a risk assessment page may include a risk indicator which displays an aggregated risk value (see, e.g., assessment component 115). By way of non-limiting illustration, a risk indicator may comprise a visual display of a sliding scale with one end being very low risk and the other end being very high risk, and a slider positioned in the scale to represent a determined aggregate risk value.

The authentication component 112 may be configured to authenticate content items provided by users. Authentication by authentication component 112 may include processing of content items such as one or more of Optical Character Recognition (OCR), comparing content items against reference content items (e.g., comparing a driver's license photo to an image of a user uploaded by the user, comparing address listed on driver's license to address listed on utility bill, etc.), digital data forensics (e.g., document tamper detection, falsification detection, identifying official insignia or indicia, identifying signatures, etc.), and/or other processors. Those skilled in the art may recognize that document authentication is a technology in and of itself that may be included as part of the system 100 and/or provided through one or more external resources 126. Thus, while not described at length herein, those skilled in the art may appreciate the technical steps and/or procedures that may be required to authenticate user-provided documentation in accordance with one or more features and/or functionality presented herein.

The request component 114 may be configured to obtain and/or generate individual requests based on user input by the compliance organizations into one or more user interfaces. The request component 114 may be configured to obtain and/or generate individual requests based on user input by the compliance organizations into one or more external resources 126. By way of non-limiting illustration, the requests may include one or more of a first request by a first compliance organization, and/or other requests. The first request may identify the first user profile and specify a first request criterion and/or other criteria. The first request criterion may specify the content that may be required as part of verification and/or assessment by the first compliance organization. By way of non-limiting illustration, the first request criterion may specify that content of a first content item type is required as part of verification and assessment by the first compliance organization. The first request criterion may identify the first relationship to denote that the second user profile may be accessed as part of assessment of the first user profile.

The request component 114 may be configured to, in response to obtaining individual requests, identify the user profiles associated with the requests, and/or perform other operations. The request component 114 may be configured to, in response to identifying the user profiles, identify content within the user profiles that satisfies the request criteria of the individual ones of the requests, and/or perform other operations. The request component 114 may be configured to, in response to obtaining individual requests, identify the user profiles associated with the requests and identify content within the user profiles that satisfies the request criteria of the individual ones of the requests. In some implementations, satisfaction of requests may be determined based on content of the user profiles being of the content item type(s) specified in the request criteria. In some implementations, request component 114 may be configured to generate and deliver onboarding invites to computing platforms of consumers who have yet to create user profiles within system. The invites may be sent via external messaging, such as email, which may include instructions on creating a user profile within the system 100.

The request component 114 may be configured to access content of user profiles to determine if content of the user profiles satisfies the request criteria of the requests. In some implementations, leveraging the profile hierarchies, in response to the user profiles identified by the requests being part of one or more of the profile hierarchies, request component 114 may be configured to access the content of one or more subordinate user profiles within the profile hierarchies. This may be required if a request is made to a business entity, which itself may require verification and/or assessment of users having relationships with the business entity (e.g., individuals as corporate officers, other business entities as shareholders, etc.). The request component 114 may be configured to identify content of one or more subordinate user profiles that satisfy the request criteria of the requests identifying superior user profiles.

By way of non-limiting illustration, the first user profile may be identified from the first request. The request component 114 may be configured to determine if content of the first user profile satisfies the first request criterion and/or other criteria of the first request. By way of non-limiting illustration, responsive to the first authenticated content item being of the first content item type, the first authenticated content item may be identified as satisfying the first request. Responsive to the first authenticated content item not being of the first content item type, the first request may be determined to be unsatisfied, unfulfilled, and/or still pending.

In some implementations, responsive to the first request identifying the first user profile, request component 114 may be configured to access the content of the second user profile to identify content of the second user profile that satisfies the first request criterion and/or other criteria of the first request by virtue of the first profile hierarchy specifying the second user profile as subordinate to the first user profile and denoting the first relationship between the first user profile and the second user profile. By way of non-limiting illustration, responsive to the second authenticated content item being of the first content item type, the second authenticated content item may be identified as satisfying the first request.

In some implementations, the presence of profile hierarchies may make it so that subordinate user profiles being accessed as part of request for superior user profiles may themselves comprise superior user profiles within other profile hierarchies. That is, access to content of profiles may branch through multiple hierarchies in order to identify content that satisfies one or more requests.

By way of non-limiting illustration, the second user profile may be for another business entity that itself is associated with a second profile hierarchy. By way of non-limiting illustration, the second user verification information in the second user profile may include one or more of a second attribute value of the hierarchy attribute, a third attribute value of the hierarchy attribute, and/or other information. The second attribute value may specify that the second user profile is subordinate to the first user profile within the first profile hierarchy (as conforming with the first attribute value of the first user profile). The third attribute value may specify a second profile hierarchy. The second profile hierarchy may identify one or more of the second user profile, a third user profile, and/or other user profiles. The second profile hierarchy may specify that the second user profile is superior to the third user profile in accordance with a second relationship between the second user profile and the third user profile.

In some implementations, in response to accessing the content of the subordinate user profiles, and the subordinate user profiles being superior to other ones of the user profiles as part of other ones of the profile hierarchies, request component 114 may be configured to access the content of sub-subordinate user profiles within the profile hierarchies to identify the content of the sub-subordinate user profiles that satisfy the request criteria of the requests. By way of non-limiting illustration, responsive to accessing the content of the second user profile to identify content of the second user profile that satisfies the first request criterion, request component 114 may be configured to further access the content of the third user profile to identify content of the third user profile that satisfies the first request criterion by virtue of the second profile hierarchy specifying the third user profile as subordinate to the second user profile (the third user profile being a sub-subordinate user profile with respect to the first user profile) and denoting the second relationship between the second user profile and the third user profile.

In some implementations, the presence of profile hierarchies may also make it so that subordinate user profiles may comprise subordinate user profiles within other profile hierarchies. That is, access to content of profiles may be provided through separate distinct hierarchies in order to identify content that satisfies one or more requests all while having singular user profiles existing within multiple hierarchies.

By way of non-limiting illustration, consider the second profile hierarchy specified by the third attribute value specifying that the second user profile is subordinate to the third user profile in accordance with a relationship between the second user profile and the third user profile, making the third user profile the superior profile in the second profile hierarchy. With this arrangement, consider a second request submitted by a second compliance organization that identifies the third user profile for verification and/or assessment, and includes a second request criterion. Responsive to the second request identifying the third user profile, request component 114 may be configured to access the content of the second user profile to identify the content of the second user profile that satisfies the second request criterion by virtue of the second profile hierarchy in this scenario specifying the second user profile as subordinate to the third user profile and denoting the relationship between the third user profile and the second user profile.

The above examples illustrate that profile hierarchies can achieve a wide variety of interconnectedness and relatedness of user profiles, where single request submissions can achieve access to multiple user profiles.

In some implementations, request component 114 may be configured to generate and deliver user requests to computing platforms associated with the users in response to the request criteria of the individual ones of the requests not being satisfied by content within user profiles. The user requests may comprise notifications or alerts communicated to computing platforms of the users for presentation within a user interface of the system and/or an external resource (e.g., email). The user requests may notify the users of the content item types that are missing from the user profiles but are required as part of the requests and/or may include other information.

By way of non-limiting illustration, responsive to the content of the first user profile and/or second user profile not satisfying the first request, request component 114 may be configured to generate and deliver a first user request to a computing platform associated with the first user and/or a computing platform associated with the second user. The first user request may indicate that content (e.g., authenticated content items of the first content item type) is missing from the first user profile, the second user profile, and/or other user profiles within the first profile hierarchy but are required as part of the first request.

The user interface component 110 may be configured to, in response to content of the first user profile and/or second user profile satisfying the first request criterion and/or other criteria of the first request, effectuate communication of the user interface information to a first computing platform associated with the first compliance organization to cause the first computing platform to present the user interface displaying content of the first user profile and/or second user profile satisfying the first request.

The profile component 108 may be configured to obtain updates to the user profiles. Updates may be provided and/or generated through user input by the users through a user interface used to manage the user profiles. The user interface component 110 may be configured to automatically update the user interface information defining one or more user interfaces based on updates to the user profiles and/or other information. The updated user interface information may cause the instances of the content displayed in, and/or otherwise accessed through, a user interface provided to compliance organizations to reflect the updates to the user profiles associated with their requests. Such updates may be carried out synchronously so that all requesting compliance organizations are automatically kept up to date without having to manually request and/or retrieve this information.

The request component 114 may be configured to manage requests by monitoring and/or determining status and/or status changes of the requests and/or authenticated content items. The status of the requests may be made current in user and compliance organization profiles. The request component 114 may be configured to determine expired status by querying dates, e.g., stated expiration dates, determining amount of time that has passed since an initial date (e.g., date of request, date of upload, and/or other dates). By way of non-limiting illustration, request component 114 may be configured to determine a status of a document is an expired state by querying any stated expiration on a document itself. By way of non-limiting illustration, request component 114 may be configured to determine a status of request is expired by determining a specified amount of time has passed without a user providing requisite information.

The user interface component 108 may be configured to generate and/or deliver user requests to computing platforms associated with the users. The user interface component 108 may be configured to generate and/or deliver user requests responsive to the status of the requests being an expired status. The user requests may indicate that additional and/or updated content is required to be uploaded to their user profiles in order to satisfy pending request(s) and/or requests that are resubmitted after expiration.

In some implementations, user requests may include authorization requests for users of the user profiles selected to be included in one or more profile hierarchies. An authorization request may convey to a user that their user profile was selected for inclusion in a profile hierarchy. The authorization requests may request authorization to include the user profiles in the profile hierarchies. The authorization request may include options (e.g., responsive buttons) to grant (e.g., proceed with inclusion in a profile hierarchy), deny (e.g., prevent inclusion in a profile hierarchy), contact a requestor (e.g., the user creating the profile hierarchy), and/or provide other input. Responsive to selection of the user profiles to be included in the profile hierarchies and definitions of the relationships between the individual user profiles, user interface component 108 may be configured to generate authorization requests for the user profiles selected to be included in the profile hierarchies. By way of non-limiting illustration, responsive to the first user input by the first user to create the first profile hierarchy, the user interface component 108 may be configured to generate a first authorization request for the second user profile requesting authorization to include the second user profile in the first profile hierarchy in accordance with the first relationship.

The user interface component 108 may be configured to effectuate communication of the authorization requests to computing platforms of the users.

In some implementations, the profile component 108 may be configured to generate the hierarchical information defining the profile hierarchies responsive to granting the authorization to include the user profiles in the profile hierarchies. By way of non-limiting illustration, responsive to granting authorization to include the second user profile in the first profile hierarchy, the profile component 108 may generate the hierarchical information defining the first profile hierarchy within the first user profile, second user profile, and/or other user profiles.

The assessment component 115 may be configured to perform automated risk assessments. In some implementations, the automated risk assessments may be based on risk assessment criteria defined by compliance organizations, such as risk assessment criteria making up one or more risk profiles created by the compliance organizations. The risk assessment criteria may be compared against the content of the user profiles that satisfy the request criteria. Risk values may be assigned to certain user information and/or content item types, applied to the content of the user profiles that satisfy requests, weighted based on custom-defined weights, and aggregated to provide aggregate risk values. The aggregate risk values may convey overall risk of doing business with a given user. Aggregating may include one or more of summing the weighted risk values, averaging the weighted risk values, and/or other operations. The risk values may include numerical values that make up a sliding scale of risk (e.g., a value being an integer between zero and five, with zero being very low risk of criminally activity and five being very high risk). Weights may be defined by decimal values between zero and one, with zero being no weight is given and one being full weight is given. The outcome of aggregating a set of risk values may be the aggregate risk value which itself may include a numerical value within a range of values making up sliding scale of overall risk. With this final value, a risk indicator may be generated as a visual display of the aggregated risk value shown in relation to the sliding scale. By way of non-limiting illustration, a visual display may include a horizontal bar representing a sliding scale, with one end being very low risk and the other end being very high risk, and a slider element positioned in the scale to represent an aggregate risk value. In some implementations the sliding scale may be color-coded to provide a more user-friendly visual of the level of risk. By way of non-limiting illustration, a zero-risk side of the scale may be shaded green, the high-risk side of the scale may be shaded red, and a middle of the scale may be shaded yellow.

It is noted that the description of a sliding scale as a visual representation of a risk indicator is for illustrative purposes only and not to be considered limiting. Instead, those skilled in the art may appreciate other ways to visually represent the outcome of a risk assessment. By way of non-limiting illustration, a visual representation may include qualitative description of risk, e.g., a display of the words “high risk,” “low risk,” “moderate risk,” “acceptable risk,” and/or other descriptions may be provided.

FIG. 3 illustrates a user interface 300 comprising a profile page 302 through which a user manages a user profile, in accordance with one or more implementations. The user interface 300 may be configured to obtain user entry and/or selection of user information and/or content items. The user interface 300 may include a set of user interface elements. Individual user interface elements may correspond to individual user information and/or content items. Individual user interface elements may include, for example, display and/or text-entry fields. By way of non-limiting illustration, a first element 304 may display identifying information input by a user and/or content of an identification document (e.g., driver's license). A second element 306 may display identifying information input by a user and/or content of an identification document (e.g., driver's license). A third element 310 may be configured to receive user input to provide (e.g., upload) one or more content items (e.g., via drag-and-drop input of electronic files). In some implementations, the profile page 302 may include a status bar 308 displaying status of user input to generate their user profile.

FIG. 4 illustrates a user interface 400 comprising a document status page 402 through which a user views status of content item(s) shared as part of request(s), in accordance with one or more implementations. The user interface 400 may include a grid comprising a set of attribute-named columns, a set of rows, individual cells at intersections of individual attribute-named columns and individual rows, and/or other content. An individual attribute-named column may represent an individual attribute. By way of non-limiting illustration, the attributes may include a document name or type attribute 404, a status attribute 406, a date attribute 408 (e.g., timing information), and/or other attributes. An individual row may represent an individual content item or request. The individual cells may include individual values of the individual attributes represented in the attribute-named columns.

FIG. 5 illustrates a user interface 500 comprising a request status page 502 through which a user views status of request(s), in accordance with one or more implementations. The user interface 500 may include a grid comprising a set of attribute-named columns, a set of rows, individual cells at intersections of individual attribute-named columns and individual rows, and/or other content. An individual attribute-named column may represent an individual attribute. By way of non-limiting illustration, the attributes may include a requestor attribute 504, a status attribute 506, a date attribute 508 (e.g., timing information), and/or other attributes. An individual row may represent an individual content item or request. The individual cells may include individual values of the individual attributes represented in the attribute-named columns.

FIG. 6 illustrates a user interface 600 comprising a request profile page 602 through which a compliance organization specifies request criteria of a request, in accordance with one or more implementations. The user interface 600 may include a grid comprising a set of attribute-named columns, a set of rows, individual cells at intersections of individual attribute-named columns and individual rows, and/or other content. An individual attribute-named column may represent an individual attribute. An individual row may represent an individual content item or request. By way of non-limiting illustration, the attributes may include a document name or type attribute 604, a demographics attribute 606 (e.g., entity type), a column to specify whether the document type is to be included as part of request criteria of a request (e.g., check boxes), and/or other attributes. The individual cells may include individual values of the individual attributes represented in the attribute-named columns.

FIG. 7 illustrates a user interface 700 comprising a request status page 702 through which a compliance organization views status of request(s), in accordance with one or more implementations. The user interface 700 may include a grid comprising a set of attribute-named columns, a set of rows, individual cells at intersections of individual attribute-named columns and individual rows, and/or other content. An individual attribute-named column may represent an individual attribute. By way of non-limiting illustration, the attributes may include a subject attribute 704, a status attribute 706, a date attribute 708 (e.g., timing information), and/or other attributes. An individual row may represent an individual content item or request. The individual cells may include individual values of the individual attributes represented in the attribute-named columns.

FIG. 8 illustrates a user interface 800 comprising a risk assessment page 802 showing results of automated risk assessment of a user and providing access to content of a user profile of the user that satisfies a request, in accordance with one or more implementations. By way of non-limiting illustration, a first element 804 may display identifying information input by a user and/or content of an identification document (e.g., driver's license) that is part of the user profile. A second element 806 may display authenticated content items that satisfy criteria of a request and/or document status of the authenticated content items. Compliance organizations may access the authenticated content items by, for example, clicking on a document name which may cause a corresponding authenticated content item to be presented in a window and/or downloaded. The risk assessment page 802 may include a risk indicator which displays an aggregated risk value. By way of non-limiting illustration, the risk indicator may comprise a visual display of a sliding scale 814 with one end being very low risk and the other end being very high risk, and a slider 812 positioned in the scale 814 to represent a determined aggregate risk value.

FIG. 9 illustrates a user interface 900 comprising a hierarchy management page 902 through which a user manages one or more profile hierarchies. The hierarchy management page 902 may include a pane 904 through which a user provides input to define a profile hierarchy 906. The profile hierarchy may represent a business entity (illustrated as “XYZ Inc.”) as a superior or root node 908, with one or more subordinate nodes representing individual persons and/or other business entities that are the constituents of the business entity. By way of non-limiting illustration, a first subordinate node 910 may represent a first user profile, and a second subordinate node 912 for a second user profile. The names of the users may be presented at the respective nodes (e.g., Ben E. is the user of the first user profile; KLM Corp. is the user of the second user profile). Edges between nodes (e.g., lines connecting the nodes) may define relationships. By way of non-limiting illustration, a first edge 914 may specify that the first user profile is for a user who is “CEO” of XYZ Inc.; and a second edge 916 may specify that the second user profile is for a user that is a “shareholder” of XYZ Inc. The titles of the relationships may be presented alongside the edges, as shown.

In some implementations, the second user profile may be a profile for another business entity, e.g., a corporation. Thus, the second user profile may also be part of another profile hierarchy (not shown) that defines the second user profile as the superior or root node of that hierarchy. In some implementations, the first user profile may concurrently be part of yet another profile hierarchy (not shown). By way of non-limiting illustration, the first user profile may be a subordinate profile to another superior profile of the other profile hierarchy.

Returning to FIG. 1 , in some implementations, server(s) 102, client computing platform(s) 104, and/or external resources 126 may be operatively linked via one or more electronic communication links. For example, such electronic communication links may be established, at least in part, via a network 116 such as the Internet and/or other networks. It will be appreciated that this is not intended to be limiting, and that the scope of this disclosure includes implementations in which server(s) 102, client computing platform(s) 104, and/or external resources 126 may be operatively linked via some other communication media.

A given client computing platform 104 may include one or more processors configured to execute computer program components. The computer program components may be configured to enable an expert or user associated with the given client computing platform 104 to interface with system 100 and/or external resources 126, and/or provide other functionality attributed herein to client computing platform(s) 104. By way of non-limiting example, the given client computing platform 104 may include one or more of a desktop computer, a laptop computer, a handheld computer, a tablet computing platform, a NetBook, a Smartphone, a gaming console, and/or other computing platforms.

External resources 126 may include sources of information outside of system 100, external entities participating with system 100, and/or other resources. In some implementations, some or all of the functionality attributed herein to external resources 126 may be provided by resources included in system 100. By way of non-limiting illustration, an external entity may include a document authentication service, and/or other entities.

Server(s) 102 may include electronic storage 128, one or more processors 130, and/or other components. Server(s) 102 may include communication lines, or ports to enable the exchange of information with a network 116 and/or other computing platforms. Illustration of server(s) 102 in FIG. 1 is not intended to be limiting. Server(s) 102 may include a plurality of hardware, software, and/or firmware components operating together to provide the functionality attributed herein to server(s) 102. For example, server(s) 102 may be implemented by a cloud of computing platforms operating together as server(s) 102.

Electronic storage 128 may comprise non-transitory storage media that electronically stores information. The electronic storage media of electronic storage 128 may include one or both of system storage that is provided integrally (i.e., substantially non-removable) with server(s) 102 and/or removable storage that is removably connectable to server(s) 102 via, for example, a port (e.g., a USB port, a firewire port, etc.) or a drive (e.g., a disk drive, etc.). Electronic storage 128 may include one or more of optically readable storage media (e.g., optical disks, etc.), magnetically readable storage media (e.g., magnetic tape, magnetic hard drive, floppy drive, etc.), electrical charge-based storage media (e.g., EEPROM, RAM, etc.), solid-state storage media (e.g., flash drive, etc.), and/or other electronically readable storage media. Electronic storage 128 may include one or more virtual storage resources (e.g., cloud storage, a virtual private network, and/or other virtual storage resources). Electronic storage 128 may store software algorithms, information determined by processor(s) 130, information received from server(s) 102, information received from client computing platform(s) 104, and/or other information that enables server(s) 102 to function as described herein.

Processor(s) 130 may be configured to provide information processing capabilities in server(s) 102. As such, processor(s) 130 may include one or more of a digital processor, an analog processor, a digital circuit designed to process information, an analog circuit designed to process information, a state machine, and/or other mechanisms for electronically processing information. Although processor(s) 130 is shown in FIG. 1 as a single entity, this is for illustrative purposes only. In some implementations, processor(s) 130 may include a plurality of processing units. These processing units may be physically located within the same device, or processor(s) 130 may represent processing functionality of a plurality of devices operating in coordination. Processor(s) 130 may be configured to execute components 108, 110, 112, 114, 115, and/or other components. Processor(s) 130 may be configured to execute components 108, 110, 112, 114, 115, and/or other components by software; hardware; firmware; some combination of software, hardware, and/or firmware; and/or other mechanisms for configuring processing capabilities on processor(s) 130. As used herein, the term “component” may refer to any component or set of components that perform the functionality attributed to the component. This may include one or more physical processors during execution of processor readable instructions, the processor readable instructions, circuitry, hardware, storage media, or any other components.

It should be appreciated that although components 108, 110, 112, 114, and/or 115 are illustrated in FIG. 1 as being implemented within a single processing unit, in implementations in which processor(s) 130 includes multiple processing units, one or more of components 108, 110, 112, 114, and/or 115 may be implemented remotely from the other components. The description of the functionality provided by the different components 108, 110, 112, 114, and/or 115 described below is for illustrative purposes, and is not intended to be limiting, as any of components 108, 110, 112, 114, and/or 115 may provide more or less functionality than is described. For example, one or more of components 108, 110, 112, 114, and/or 115 may be eliminated, and some or all of its functionality may be provided by other ones of components 108, 110, 112, 114, and/or 115. As another example, processor(s) 130 may be configured to execute one or more additional components that may perform some or all of the functionality attributed below to one of components 108, 110, 112, 114, and/or 115.

FIG. 2 illustrates a method 200 to store and manage entity verification information to reduce redundant entity information and redundant submission of requests, in accordance with one or more implementations. The operations of method 200 presented below are intended to be illustrative. In some implementations, method 200 may be accomplished with one or more additional operations not described, and/or without one or more of the operations discussed. Additionally, the order in which the operations of method 200 are illustrated in FIG. 2 and described below is not intended to be limiting.

In some implementations, method 200 may be implemented in one or more processing devices (e.g., a digital processor, an analog processor, a digital circuit designed to process information, an analog circuit designed to process information, a state machine, and/or other mechanisms for electronically processing information). The one or more processing devices may include one or more devices executing some or all of the operations of method 200 in response to instructions stored electronically on an electronic storage medium. The one or more processing devices may include one or more devices configured through hardware, firmware, and/or software to be specifically designed for execution of one or more of the operations of method 200.

An operation 202 may include obtaining profiles, and/or other information. The profiles may include user profiles, organization profiles, and/or other profiles. User profiles may be associated with users of the system who are being assessed for risk. Organization profiles may be associated with compliance organizations who are assessing users for risk because the compliance organizations abide by, or otherwise must comply with, jurisdictional regulations and/or organizational standards. The individual user profiles may include one or more of user verification information (sometimes simply referred to as “user information”) describing individual users, one or more content items associated with individual users, one or more authenticated content items associated with individual users, and/or other information. In some implementations, individual users may be described based on attribute values of a hierarchy attribute and/or other attributes. The attribute values of the hierarchy attribute may specify profile hierarchies for sets of the user profiles. An individual profile hierarchy may identify one or more of the user profiles that belong to the individual profile hierarchy. The individual profile hierarchy may specify position of the individual user profiles within the individual profile hierarchy (e.g., node position). By way of non-limiting illustration, position may include one or more of superior (e.g., a superior or root node), subordinate, intermediate, and/or other position. By way of non-limiting illustration, the individual profile hierarchy may specify that an individual user profile is superior to one or more other user profiles in the individual set of the user profiles. The individual profile hierarchy may denote relationships between individual user profiles in the individual set of the user profiles. Operation 202 may be performed by one or more hardware processors configured by machine-readable instructions including a component that is the same as or similar to profile component 108, in accordance with one or more implementations.

An operation 204 may include obtaining requests to verify and/or assess risk of users by compliance organizations. Individual ones of the requests may be associated with individual ones of the compliance organizations. Individual ones of the requests may include information identifying individual ones of the user profiles, request criteria, and/or other information. The request criteria may indicate content of the user profiles that may be required as part of verification and/or risk assessment by compliance organizations. Operation 204 may be performed by one or more hardware processors configured by machine-readable instructions including a component that is the same as or similar to request component 114, in accordance with one or more implementations.

An operation 206 may include accessing content of user profiles to determine if content of the user profiles satisfies the request criteria of the requests. The processor(s) may be configured to identify the content of the user profiles that satisfy the request criteria of the requests. In response to the user profiles identified by the requests being part of one or more of the profile hierarchies, the processor(s) may be configured to access the content of one or more subordinate user profiles within the profile hierarchies to identify content of one or more subordinate user profiles that satisfy the request criteria of the requests identifying superior user profiles. Operation 206 may be performed by one or more hardware processors configured by machine-readable instructions including a component that is the same as or similar to request component 114 in accordance with one or more implementations.

An operation 208 may include generating user interface information defining a user interface through which content of the user profiles are accessed by compliance organizations. The user interface may be configured to display one or more of user information, instances of content items, and/or other information from the user profiles. In some implementations, the user interface may display, on computing platforms associated with compliance organizations, the content within the user profiles that satisfy the request criteria of the requests. Operation 208 may be performed by one or more hardware processors configured by machine-readable instructions including a component that is the same as or similar to user interface component 110, in accordance with one or more implementations.

An operation 210 may include effectuating communication of the user interface information to computing platforms associated with the compliance organizations. Reception of the user interface information at the computing platforms may cause the computing platforms to present the user interface displaying content of the user profiles that satisfies the request criteria of the requests. Operation 210 may be performed by one or more hardware processors configured by machine-readable instructions including a component that is the same as or similar to user interface component 110, in accordance with one or more implementations.

Although the present technology has been described in detail for the purpose of illustration based on what is currently considered to be the most practical and preferred implementations, it is to be understood that such detail is solely for that purpose and that the technology is not limited to the disclosed implementations, but, on the contrary, is intended to cover modifications and equivalent arrangements that are within the spirit and scope of the appended claims. For example, it is to be understood that the present technology contemplates that, to the extent possible, one or more features of any implementation can be combined with one or more features of any other implementation. 

What is claimed is:
 1. A system configured to store and manage entity verification information to reduce redundant entity information and redundant submission of requests, the system comprising: non-transitory electronic storage that stores: user profiles associated with users, wherein individual user profiles include user verification information, the user verification information within the individual user profiles describing individual users and including one or more authenticated content items associated with the individual users, wherein the individual users are described based on attribute values of a hierarchy attribute, the attribute values of the hierarchy attribute specifying profile hierarchies for sets of the user profiles, an individual profile hierarchy identifying the individual user profiles that belong to the individual profile hierarchy and specifying position of the individual user profiles within the individual profile hierarchy, the individual profile hierarchy denoting relationships between the individual user profiles, wherein the individual profile hierarchy specifies that an individual user profile is superior to one or more other user profiles, such that the user profiles include: a first user profile associated with a first user, the first user profile including first user verification information and a first authenticated content item associated with the first user, the first user verification information including a first attribute value of the hierarchy attribute; a second user profile associated with a second user, the second user profile including second user verification information and a second authenticated content item associated with the second user; and wherein the first attribute value specifies a first profile hierarchy, the first profile hierarchy identifying the first user profile and the second user profile, and specifying that the first user profile is superior to the second user profile in accordance with a first relationship between the first user profile and the second user profile; and one or more physical processors configured by machine-readable instructions to: obtain requests to verify the users by compliance organizations, individual ones of the requests identifying individual ones of the user profiles and including request criteria indicating content of the user profiles that is required as part of the requests, the requests including a first request by a first compliance organization, the first request identifying the first user profile and including a first request criterion; in response to the user profiles identified by the requests being part of one or more of the profile hierarchies, access the content of subordinate user profiles within the profile hierarchies to identify the content of the subordinate user profiles that satisfy the request criteria of the requests identifying superior user profiles, such that responsive to the first request identifying the first user profile, access the content of the second user profile to identify the content of the second user profile that satisfies the first request criterion by virtue of the first profile hierarchy specifying the second user profile as subordinate to the first user profile and denoting the first relationship between the first user profile and the second user profile; generate user interface information defining a user interface through which the content of the user profiles is accessed by the compliance organizations, such that the user interface information defines an instance of the user interface through which the content of the second user profile is accessed; effectuate communication of the user interface information to computing platforms associated with the compliance organizations to cause the computing platforms to present the user interface displaying the content of the user profiles that satisfy the request criteria, such that the user interface information is communicated to a first computing platform associated with the first compliance organization to cause the first computing platform to present the instance of user interface displaying the content of the second user profile that satisfies the first request criterion of the first request; and wherein the second user verification information includes a second attribute value and a third attribute value of the hierarchy attribute, the second attribute value specifies the second user profile is subordinate to the first user profile within the first profile hierarchy, and the third attribute value specifies a second profile hierarchy, the second profile hierarchy identifies the second user profile and a third user profile, and specifies that the second user profile is superior to the third user profile in accordance with a second relationship between the second user profile and the third user profile.
 2. The system of claim 1, wherein the request criteria of the requests identify the relationships between the individual user profiles, such that the first request criterion identifies the first relationship between the first user profile and the second user profile.
 3. The system of claim 1, wherein the one or more physical processors are further configured by the machine-readable instructions to: in response to accessing the content of the subordinate user profiles and the subordinate user profiles being superior to other ones of the user profiles as part of other ones of the profile hierarchies, access the content of sub-subordinate user profiles within the profile hierarchies to identify the content of the sub-subordinate user profiles that satisfy the request criteria of the requests, such that responsive to accessing the content of the second user profile to identify the content of the second user profile that satisfies the first request criterion, further access the content of the third user profile to identify the content of the third user profile that satisfies the first request criterion by virtue of the second profile hierarchy specifying the third user profile as subordinate to the second user profile and denoting the second relationship between the second user profile and the third user profile.
 4. A system configured to store and manage entity verification information to reduce redundant entity information and redundant submission of requests, the system comprising: non-transitory electronic storage that stores: user profiles associated with users, wherein individual user profiles include user verification information, the user verification information within the individual user profiles describing individual users and including one or more authenticated content items associated with the individual users, wherein the individual users are described based on attribute values of a hierarchy attribute, the attribute values of the hierarchy attribute specifying profile hierarchies for sets of the user profiles, an individual profile hierarchy identifying the individual user profiles that belong to the individual profile hierarchy and specifying position of the individual user profiles within the individual profile hierarchy, the individual profile hierarchy denoting relationships between the individual user profiles, wherein the individual profile hierarchy specifies that an individual user profile is superior to one or more other user profiles, such that the user profiles include: a first user profile associated with a first user, the first user profile including first user verification information and a first authenticated content item associated with the first user, the first user verification information including a first attribute value of the hierarchy attribute; a second user profile associated with a second user, the second user profile including second user verification information and a second authenticated content item associated with the second user; and wherein the first attribute value specifies a first profile hierarchy, the first profile hierarchy identifying the first user profile and the second user profile, and specifying that the first user profile is superior to the second user profile in accordance with a first relationship between the first user profile and the second user profile; and one or more physical processors configured by machine-readable instructions to: obtain requests to verify the users by compliance organizations, individual ones of the requests identifying individual ones of the user profiles and including request criteria indicating content of the user profiles that is required as part of the requests, the requests including a first request by a first compliance organization, the first request identifying the first user profile and including a first request criterion; in response to the user profiles identified by the requests being part of one or more of the profile hierarchies, access the content of subordinate user profiles within the profile hierarchies to identify the content of the subordinate user profiles that satisfy the request criteria of the requests identifying superior user profiles, such that responsive to the first request identifying the first user profile, access the content of the second user profile to identify the content of the second user profile that satisfies the first request criterion by virtue of the first profile hierarchy specifying the second user profile as subordinate to the first user profile and denoting the first relationship between the first user profile and the second user profile; generate user interface information defining a user interface through which the content of the user profiles is accessed by the compliance organizations, such that the user interface information defines an instance of the user interface through which the content of the second user profile is accessed; effectuate communication of the user interface information to computing platforms associated with the compliance organizations to cause the computing platforms to present the user interface displaying the content of the user profiles that satisfy the request criteria, such that the user interface information is communicated to a first computing platform associated with the first compliance organization to cause the first computing platform to present the instance of user interface displaying the content of the second user profile that satisfies the first request criterion of the first request; and wherein the second user verification information includes a second attribute value and a third attribute value of the hierarchy attribute, the second attribute value specifies the second user profile is subordinate to the first user profile within the first profile hierarchy, and the third attribute value specifies a second profile hierarchy, the second profile hierarchy identifies the second user profile and a third user profile, and specifies that the second user profile is subordinate to the third user profile in accordance with a second relationship between the second user profile and the third user profile.
 5. The system of claim 4, wherein the one or more physical processors are further configured by the machine-readable instructions to: obtain a second request by a second compliance organization, the second request identifying the third user profile and including a second request criterion; and responsive to the second request identifying the third user profile, access the content of the second user profile to identify the content of the second user profile that satisfies the second request criterion by virtue of the second profile hierarchy specifying the second user profile as subordinate to the third user profile and denoting the second relationship between the third user profile and the second user profile.
 6. A system configured to store and manage entity verification information to reduce redundant entity information and redundant submission of requests, the system comprising: non-transitory electronic storage that stores: user profiles associated with users, wherein individual user profiles include user verification information, the user verification information within the individual user profiles describing individual users and including one or more authenticated content items associated with the individual users, wherein the individual users are described based on attribute values of a hierarchy attribute, the attribute values of the hierarchy attribute specifying profile hierarchies for sets of the user profiles, an individual profile hierarchy identifying the individual user profiles that belong to the individual profile hierarchy and specifying position of the individual user profiles within the individual profile hierarchy, the individual profile hierarchy denoting relationships between the individual user profiles, wherein the individual profile hierarchy specifies that an individual user profile is superior to one or more other user profiles, such that the user profiles include: a first user profile associated with a first user, the first user profile including first user verification information and a first authenticated content item associated with the first user, the first user verification information including a first attribute value of the hierarchy attribute; a second user profile associated with a second user, the second user profile including second user verification information and a second authenticated content item associated with the second user; and wherein the first attribute value specifies a first profile hierarchy, the first profile hierarchy identifying the first user profile and the second user profile, and specifying that the first user profile is superior to the second user profile in accordance with a first relationship between the first user profile and the second user profile; and one or more physical processors configured by machine-readable instructions to: obtain requests to verify the users by compliance organizations, individual ones of the requests identifying individual ones of the user profiles and including request criteria indicating content of the user profiles that is required as part of the requests, the requests including a first request by a first compliance organization, the first request identifying the first user profile and including a first request criterion; in response to the user profiles identified by the requests being part of one or more of the profile hierarchies, access the content of subordinate user profiles within the profile hierarchies to identify the content of the subordinate user profiles that satisfy the request criteria of the requests identifying superior user profiles, such that responsive to the first request identifying the first user profile, access the content of the second user profile to identify the content of the second user profile that satisfies the first request criterion by virtue of the first profile hierarchy specifying the second user profile as subordinate to the first user profile and denoting the first relationship between the first user profile and the second user profile; generate user interface information defining a user interface through which the content of the user profiles is accessed by the compliance organizations, such that the user interface information defines an instance of the user interface through which the content of the second user profile is accessed; effectuate communication of the user interface information to computing platforms associated with the compliance organizations to cause the computing platforms to present the user interface displaying the content of the user profiles that satisfy the request criteria, such that the user interface information is communicated to a first computing platform associated with the first compliance organization to cause the first computing platform to present the instance of user interface displaying the content of the second user profile that satisfies the first request criterion of the first request; generate second user interface information defining a second user interface through which the users manage the profile hierarchies, such that the second user interface information defines an instance of the second user interface through which the first user manages the first profile hierarchy; effectuate communication of the second user interface information to computing platforms associated with the users to cause the computing platforms associated with the users to present the second user interface, such that the second user interface information is communicated to a second computing platform associated with the first user to cause the second computing platform to present the instance of the second user interface; obtain user input information conveying user input into the second user interface, the user input including entry and/or selection of the user profiles to be included in the profile hierarchies and definitions of the relationships between the individual user profiles, such that the user input information conveys first user input by the first user identifying the first user profile and the second user profile as part of the first profile hierarchy, and a definition of the first relationship between the first user profile and the second user profile; and responsive to selection of the user profiles to be included in the profile hierarchies and definitions of the relationships between the individual user profiles, generate authorization requests for the user profiles selected to be included in the profile hierarchies, the authorization requests requesting authorization to include the user profiles in the profile hierarchies, such that: responsive to the first user input by the first user, generate a first authorization request for the second user profile requesting authorization to include the second user profile in the first profile hierarchy in accordance with the first relationship.
 7. The system of claim 6, wherein the one or more physical processors are further configured by the machine-readable instructions to: responsive to granting the authorization to include the user profiles in the profile hierarchies, generate hierarchical information defining the profile hierarchies, such that responsive to granting the authorization to include the second user profile in the first profile hierarchy, generate the hierarchical information defining the first profile hierarchy.
 8. A computer-implemented method to store and manage entity verification information to reduce redundant entity information and redundant submission of requests, the method being implemented in a computer system comprising non-transitory electronic storage and one or more physical processors, the method comprising: obtaining, by the one or more physical processors from the non-transitory electronic storage, user profiles associated with users, wherein individual user profiles include user verification information, the user verification information within the individual user profiles describing individual users and including one or more authenticated content items associated with the individual users, wherein the individual users are described based on attribute values of a hierarchy attribute, the attribute values of the hierarchy attribute specifying profile hierarchies for sets of the user profiles, an individual profile hierarchy identifying the individual user profiles that belong to the individual profile hierarchy and specifying position of the individual user profiles within the individual profile hierarchy, the individual profile hierarchy denoting relationships between the individual user profiles, wherein the individual profile hierarchy specifies that an individual user profile is superior to one or more other user profiles, the user profiles including: a first user profile associated with a first user, the first user profile including first user verification information and a first authenticated content item associated with the first user, the first user verification information including a first attribute value of the hierarchy attribute; a second user profile associated with a second user, the second user profile including second user verification information and a second authenticated content item associated with the second user; and wherein the first attribute value specifies a first profile hierarchy, the first profile hierarchy identifying the first user profile and the second user profile, and specifying that the first user profile is superior to the second user profile in accordance with a first relationship between the first user profile and the second user profile; obtaining, by the one or more physical processors, requests to verify the users by compliance organizations, individual ones of the requests identifying individual ones of the user profiles and including request criteria indicating content of the user profiles that is required as part of the requests, including obtaining a first request by a first compliance organization, the first request identifying the first user profile and including a first request criterion; in response to the user profiles identified by the requests being part of one or more of the profile hierarchies, accessing, by the one or more physical processors, the content of subordinate user profiles within the profile hierarchies to identify the content of the subordinate user profiles that satisfy the request criteria of the requests identifying superior user profiles, including responsive to the first request identifying the first user profile, accessing the content of the second user profile to identify the content of the second user profile that satisfies the first request criterion by virtue of the first profile hierarchy specifying the second user profile as subordinate to the first user profile and denoting the first relationship between the first user profile and the second user profile; generating, by the one or more physical processors, user interface information defining a user interface through which the content of the user profiles is accessed by the compliance organizations, including generating the user interface information defining an instance of the user interface through which the content of the second user profile is accessed; effectuating communication of the user interface information from the one or more physical processors to computing platforms associated with the compliance organizations over one or more network connections to cause the computing platforms to present the user interface displaying the content of the user profiles that satisfy the request criteria, including effectuating communication of the user interface information to a first computing platform associated with the first compliance organization to cause the first computing platform to present the instance of user interface displaying the content of the second user profile that satisfies the first request criterion of the first request; and wherein the second user verification information includes a second attribute value and a third attribute value of the hierarchy attribute, the second attribute value specifies the second user profile is subordinate to the first user profile within the first profile hierarchy, and the third attribute value specifies a second profile hierarchy, the second profile hierarchy identifies the second user profile and a third user profile, and specifies that the second user profile is superior to the third user profile in accordance with a second relationship between the second user profile and the third user profile.
 9. The method of claim 8, wherein the request criteria of the requests identify the relationships between the individual user profiles, such that the first request criterion identifies the first relationship between the first user profile and the second user profile.
 10. The method of claim 8, further comprising: in response to accessing the content of the subordinate user profiles and the subordinate user profiles being superior to other ones of the user profiles as part of other ones of the profile hierarchies, accessing the content of sub-subordinate user profiles within the profile hierarchies to identify the content of the sub-subordinate user profiles that satisfy the request criteria of the requests, including responsive to accessing the content of the second user profile to identify the content of the second user profile that satisfies the first request criterion, further accessing the content of the third user profile to identify the content of the third user profile that satisfies the first request criterion by virtue of the second profile hierarchy specifying the third user profile as subordinate to the second user profile and denoting the second relationship between the second user profile and the third user profile.
 11. A computer-implemented method to store and manage entity verification information to reduce redundant entity information and redundant submission of requests, the method being implemented in a computer system comprising non-transitory electronic storage and one or more physical processors, the method comprising: obtaining, by the one or more physical processors from the non-transitory electronic storage, user profiles associated with users, wherein individual user profiles include user verification information, the user verification information within the individual user profiles describing individual users and including one or more authenticated content items associated with the individual users, wherein the individual users are described based on attribute values of a hierarchy attribute, the attribute values of the hierarchy attribute specifying profile hierarchies for sets of the user profiles, an individual profile hierarchy identifying the individual user profiles that belong to the individual profile hierarchy and specifying position of the individual user profiles within the individual profile hierarchy, the individual profile hierarchy denoting relationships between the individual user profiles, wherein the individual profile hierarchy specifies that an individual user profile is superior to one or more other user profiles, the user profiles including: a first user profile associated with a first user, the first user profile including first user verification information and a first authenticated content item associated with the first user, the first user verification information including a first attribute value of the hierarchy attribute; a second user profile associated with a second user, the second user profile including second user verification information and a second authenticated content item associated with the second user; and wherein the first attribute value specifies a first profile hierarchy, the first profile hierarchy identifying the first user profile and the second user profile, and specifying that the first user profile is superior to the second user profile in accordance with a first relationship between the first user profile and the second user profile; obtaining, by the one or more physical processors, requests to verify the users by compliance organizations, individual ones of the requests identifying individual ones of the user profiles and including request criteria indicating content of the user profiles that is required as part of the requests, including obtaining a first request by a first compliance organization, the first request identifying the first user profile and including a first request criterion; in response to the user profiles identified by the requests being part of one or more of the profile hierarchies, accessing, by the one or more physical processors, the content of subordinate user profiles within the profile hierarchies to identify the content of the subordinate user profiles that satisfy the request criteria of the requests identifying superior user profiles, including responsive to the first request identifying the first user profile, accessing the content of the second user profile to identify the content of the second user profile that satisfies the first request criterion by virtue of the first profile hierarchy specifying the second user profile as subordinate to the first user profile and denoting the first relationship between the first user profile and the second user profile; generating, by the one or more physical processors, user interface information defining a user interface through which the content of the user profiles is accessed by the compliance organizations, including generating the user interface information defining an instance of the user interface through which the content of the second user profile is accessed; effectuating communication of the user interface information from the one or more physical processors to computing platforms associated with the compliance organizations over one or more network connections to cause the computing platforms to present the user interface displaying the content of the user profiles that satisfy the request criteria, including effectuating communication of the user interface information to a first computing platform associated with the first compliance organization to cause the first computing platform to present the instance of user interface displaying the content of the second user profile that satisfies the first request criterion of the first request; and wherein the second user verification information includes a second attribute value and a third attribute value of the hierarchy attribute, the second attribute value specifies the second user profile is subordinate to the first user profile within the first profile hierarchy, and the third attribute value specifies a second profile hierarchy, the second profile hierarchy identifies the second user profile and a third user profile, and specifies that the second user profile is subordinate to the third user profile in accordance with a second relationship between the second user profile and the third user profile.
 12. The method of claim 11, further comprising: obtaining a second request by a second compliance organization, the second request identifying the third user profile and including a second request criterion; and responsive to the second request identifying the third user profile, accessing the content of the second user profile to identify the content of the second user profile that satisfies the second request criterion by virtue of the second profile hierarchy specifying the second user profile as subordinate to the third user profile and denoting the second relationship between the third user profile and the second user profile.
 13. A computer-implemented method to store and manage entity verification information to reduce redundant entity information and redundant submission of requests, the method being implemented in a computer system comprising non-transitory electronic storage and one or more physical processors, the method comprising: obtaining, by the one or more physical processors from the non-transitory electronic storage, user profiles associated with users, wherein individual user profiles include user verification information, the user verification information within the individual user profiles describing individual users and including one or more authenticated content items associated with the individual users, wherein the individual users are described based on attribute values of a hierarchy attribute, the attribute values of the hierarchy attribute specifying profile hierarchies for sets of the user profiles, an individual profile hierarchy identifying the individual user profiles that belong to the individual profile hierarchy and specifying position of the individual user profiles within the individual profile hierarchy, the individual profile hierarchy denoting relationships between the individual user profiles, wherein the individual profile hierarchy specifies that an individual user profile is superior to one or more other user profiles, the user profiles including: a first user profile associated with a first user, the first user profile including first user verification information and a first authenticated content item associated with the first user, the first user verification information including a first attribute value of the hierarchy attribute; a second user profile associated with a second user, the second user profile including second user verification information and a second authenticated content item associated with the second user; and wherein the first attribute value specifies a first profile hierarchy, the first profile hierarchy identifying the first user profile and the second user profile, and specifying that the first user profile is superior to the second user profile in accordance with a first relationship between the first user profile and the second user profile; obtaining, by the one or more physical processors, requests to verify the users by compliance organizations, individual ones of the requests identifying individual ones of the user profiles and including request criteria indicating content of the user profiles that is required as part of the requests, including obtaining a first request by a first compliance organization, the first request identifying the first user profile and including a first request criterion; in response to the user profiles identified by the requests being part of one or more of the profile hierarchies, accessing, by the one or more physical processors, the content of subordinate user profiles within the profile hierarchies to identify the content of the subordinate user profiles that satisfy the request criteria of the requests identifying superior user profiles, including responsive to the first request identifying the first user profile, accessing the content of the second user profile to identify the content of the second user profile that satisfies the first request criterion by virtue of the first profile hierarchy specifying the second user profile as subordinate to the first user profile and denoting the first relationship between the first user profile and the second user profile; generating, by the one or more physical processors, user interface information defining a user interface through which the content of the user profiles is accessed by the compliance organizations, including generating the user interface information defining an instance of the user interface through which the content of the second user profile is accessed; effectuating communication of the user interface information from the one or more physical processors to computing platforms associated with the compliance organizations over one or more network connections to cause the computing platforms to present the user interface displaying the content of the user profiles that satisfy the request criteria, including effectuating communication of the user interface information to a first computing platform associated with the first compliance organization to cause the first computing platform to present the instance of user interface displaying the content of the second user profile that satisfies the first request criterion of the first request; generating second user interface information defining a second user interface through which the users manage the profile hierarchies, including generating the second user interface information defining an instance of the second user interface through which the first user manages the first profile hierarchy; effectuating communication of the second user interface information to computing platforms associated with the users to cause the computing platforms associated with the users to present the second user interface, including effectuating communication of the second user interface information to a second computing platform associated with the first user to cause the second computing platform to present the instance of the second user interface; obtaining user input information conveying user input into the second user interface, the user input including entry and/or selection of the user profiles to be included in the profile hierarchies and definitions of the relationships between the individual user profiles, including obtaining the user input information conveying first user input by the first user identifying the first user profile and the second user profile as part of the first profile hierarchy, and a definition of the first relationship between the first user profile and the second user profile; and responsive to selection of the user profiles to be included in the profile hierarchies and definitions of the relationships between the individual user profiles, generating authorization requests for the user profiles selected to be included in the profile hierarchies, the authorization requests requesting authorization to include the user profiles in the profile hierarchies, including: responsive to the first user input by the first user, generating a first authorization request for the second user profile requesting authorization to include the second user profile in the first profile hierarchy in accordance with the first relationship.
 14. The method of claim 13, further comprising: responsive to granting the authorization to include the user profiles in the profile hierarchies, generating hierarchical information defining the profile hierarchies, including responsive to granting the authorization to include the second user profile in the first profile hierarchy, generating the hierarchical information defining the first profile hierarchy. 