Approving the use of the source of funds

ABSTRACT

Computer-implemented method and system are provided for verifying a financial instrument. The method comprises receiving identification of a source of funds; generating, using at least one processor, a series of verifying transactions involving the source of funds, transaction details of the series of verifying transactions varying from one transaction to another; storing the variable transaction details; initiating the series of verifying transactions; receiving provided transaction details from a user; comparing the variable transaction details with the provided transaction details; and selectively approving the use of the source of funds by the user, based on a result of the comparison of the variable transaction details with the provided transaction details.

RELATED APPLICATIONS

This patent application is a Continuation of U.S. patent applicationSer. No. 12/198,575 filed Aug. 26, 2008, now U.S. Pat. No. 8,296,204which is a Continuation of U.S. patent application Ser. No. 09/901,594,filed Jul. 10, 2001 now U.S. Pat. No. 7,430,537 (“SYSTEM AND METHOD FORVERIFYING A FINANCIAL INSTRUMENT”), which claims the benefit of thefiling date of U.S. Provisional Application Ser. No. 60/217,202, filedJul. 10, 2000 (“RANDOM ACCOUNT ACTIVITY TO VERIFY A CREDIT CARD”), thecontents of which are incorporated by reference herein in theirentirety.

BACKGROUND

This invention relates to the fields of computer systems and datacommunications. More particularly, a system and method are provided forverifying financial instruments or accounts, such as credit cards, debitcards, bank accounts, etc.

Modern financial systems make it easy to perform financial transactionswithout using physical currency. For example, credit cards and ACH(Automated Clearing House) transactions (i.e., electronic checks) areincreasingly used in place of cash to make purchases, transfer money, orengage in other financial transactions.

These convenient instruments are, however, subject to theft andfraudulent use. A thief may obtain all the information needed to use astolen credit card from the card itself, while all that is needed toconduct an ACH transaction (e.g., to withdraw money from a checkingaccount) are the bank account and routing numbers from a check. It isthen a simple matter for the thief or fraud artist to pose as therightful owner or holder of a credit card or bank account. Existingsafeguards against fraud (e.g., checking a credit card against a list ofstolen cards, checking the name on a checking account before completingan ACH transaction) are often insufficient. It is typically themerchant, vendor, bank or other entity that accepts a credit card orelectronic check transaction that is liable for the amount of money thatis stolen or misappropriated if the rightful owner or holder is not atfault.

DESCRIPTION OF THE FIGURES

FIG. 1 is a block diagram of a system for verifying a potential user'sauthorization to use a financial instrument, in accordance with anembodiment of the present invention.

FIG. 2 is a flowchart illustrating one method of verifying a person'sauthorization to use a financial instrument, in accordance with anembodiment of the invention.

DETAILED DESCRIPTION

The following description is presented to enable any person skilled inthe art to make and use the invention, and is provided in the context ofparticular applications of the invention and their requirements. Variousmodifications to the disclosed embodiments will be readily apparent tothose skilled in the art and the general principles defined herein maybe applied to other embodiments and applications without departing fromthe scope of the present invention. Thus, the present invention is notintended to be limited to the embodiments shown, but is to be accordedthe widest scope consistent with the principles and features disclosedherein.

The program environment in which a present embodiment of the inventionis executed illustratively incorporates a general-purpose computer or aspecial purpose device such as a hand-held computer. Details of suchdevices (e.g., processor, memory, data storage, display) may be omittedfor the sake of clarity.

It should also be understood that the techniques of the presentinvention might be implemented using a variety of technologies. Forexample, the methods described herein may be implemented in softwareexecuting on a computer system, or implemented in hardware utilizingeither a combination of microprocessors or other specially designedapplication specific integrated circuits, programmable logic devices, orvarious combinations thereof. In particular, the methods describedherein may be implemented by a series of computer-executableinstructions residing on a suitable computer-readable medium. Suitablecomputer-readable media may include volatile (e.g., RAM) and/ornon-volatile (e.g., ROM, disk) memory, carrier waves and transmissionmedia (e.g., copper wire, coaxial cable, fiber optic media). Exemplarycarrier waves may take the form of electrical, electromagnetic oroptical signals conveying digital data streams along a local network ora publicly accessible network such as the Internet.

In one embodiment of the invention, a system and method are provided forverifying a financial instrument or account or verifying a user'sauthorization to use a financial instrument or account. A financialinstrument or account may be defined to include credit cards, debitcards, bank accounts, brokerage accounts, money market accounts, and soon—virtually any entity that may be used as a source or destination ofelectronically exchanged value.

More particularly, a system and method of the invention may be appliedto ensure that a financial instrument identified by a user (e.g., as asource of funds) is actually owned or controlled by the user. Thelikelihood or risk that the user has stolen the instrument, and is nowattempting to use it fraudulently, may therefore be determined to belower than if the verification was not performed.

In an embodiment of the invention, a series of transactions areperformed using the instrument identified by the user. The transactionsmay include debits or credits to a credit card, deposits or withdrawalsfrom a bank account, etc. Certain details of the transactions arerecorded (e.g., amount, type of transaction, merchant identity, date ortime of a transaction) and the user is invited to retrieve specifieddetails (e.g., from an account statement, by calling the holder orissuer of the instrument) and identify them to the system. If the usercorrectly identifies the specified details, the verification process issuccessful. If the user is unsuccessful, he or she may be given alimited number of additional opportunities to input the correct detailsand, if still unsuccessful, may be barred from using the instrument. Inthis embodiment, the user is required to pass his or her financialinstitution's own verification/authentication process in order to obtainthe necessary details of the transactions, thereby making it even lesslikely that he or she is a fraudulent user.

An embodiment of the invention may be used or applied for variousreasons or in various situations. For example, a merchant may initiateor implement a verification process when a customer wishes to make apurchase (e.g., if the customer is new or if the cost of the purchase isrelatively large). The customer may be able to rapidly retrieve thenecessary details of the verification transactions by accessing themon-line (e.g., through a web site of her credit card issuer or bank) orby telephone.

Another embodiment of the invention may be applied to prospectivelyverify a user's authority to use a financial instrument. For example, anon-line system may allow users to make fund transfers and/or purchaseson-line. A user may identify a financial instrument that he would liketo use but the on-line system may require the financial instrument, orthe user's authorization to use the instrument, to be verified beforeallowing the user to use it in the system.

FIG. 1 depicts a system for verifying a user's control of orauthorization to use a financial instrument, according to one embodimentof the invention. In this embodiment, system 100 includes user interface102, database 104 and transaction processor 106. User interface 102 mayoperate on a web server, application server, data server or othercomputing device. In an alternative embodiment of the invention a usermay interact with the system via a human agent or representative of thesystem, an interactive voice recorder or other means, in addition to orinstead of user interface 102, Database 104 may be separate from orintegrated with user interface 102 or the computer system on which theuser interface executes. Transaction processor 106 may be configured forinitiating transactions for one or more different types of financialinstruments or, alternatively, system 100 may include multipletransaction processors, in which case the capabilities of each may ormay not overlap.

User interface 102 is configured to receive user connections, such asfrom user 110, and may operate differently (e.g., display different webpages, forms or menus) depending on a user's status. For example, for aconnection from a new user, interface 102 may present the user with aregistration form, information about services offered by the system(e.g., electronic commerce, fund transfers), etc. A registration formmay require the user to identify one or more financial instruments, anyof which may then be verified according to an embodiment of theinvention. For registered or other experienced users, interface 102 maypresent customized pages or displays, electronic commerce opportunities,etc. Such a user may be invited to identify a financial instrument oraccount for immediate or future use as a source or destination of funds.User interface 102 may be configured to accept connections via publiclyavailable networks (e.g., the Internet), private networks and otherdedicated or shared links, which may be wired or wireless.

Transaction processor 106 is coupled to one or more financial systems orentities for processing financial transactions. Thus, financial system120 may comprise an ACH (Automated Clearing House) vendor (e.g., aTreasury Management Service configured to handle ACH transactions suchas electronic checks and deposits), a merchant acquirer or TreasuryManagement Service that handles credit card and/or debit cardtransactions, or some other entity. As specified above, system 100 mayinclude multiple transaction processors. Each transaction processor maybe configured for a different type of financial instrument and mayinteract with a different financial system or entity. Transactionprocessor 106 may be a separate or specialized element of system 100(e.g., a computer server) or may be incorporated into another element ofthe system (e.g., a data server, web server).

Financial system 120 is coupled to the user's financial institutioncorresponding to the financial instrument being verified. Financialinstitution 130 may therefore be the user's bank, credit card issuer,brokerage, investment manager, etc. Financial system 120 may, in anembodiment of the invention, represent a collection of financialinstitutions and entities that communicate with each other by specifiedformats (e.g., for credit card, debit card and/or ACH transactions).Thus, financial system 120 may comprise financial institution 130.

In one method of verifying a user's financial instrument or accountthrough system 100, user 110 connects to system 100 and identifies aninstrument or account that he or she would like to use (e.g., as asource of funds for purchases or money transfers). User interface 102,or the server operating the user interface, passes the identifyinginformation to transaction processor 106. Transaction processor 106initiates one or more transactions, using variable details such as anamount of the transaction, type of transaction (e.g., deposit,withdrawal, debit, credit), different vendor names or identities, orother details that may be reported to or retrieved by a valid user orowner of the instrument. The transaction may be generated or constructedby user interface 102, transaction processor 106 or some other entitywithin system 100 (e.g., an application or data server). The generatingentity also saves selected details of the transaction(s) to database104.

Transaction processor 106 then initiates the series of transactionsthrough appropriate financial systems or entities (e.g., financialsystem 120), which execute the transaction(s) in conjunction with theuser's financial institution 130. Thus, the transaction processor takesinformation regarding the transactions(s), changes it into a form thatfinancial system 120 can understand or use, and then interacts with orotherwise passes it to the financial system.

User 110 obtains details of the transaction(s) from a statement frominstitution 130, from an on-line system provided by the institution, bycalling the institution, etc. User 110 then re-connects to system 100(e.g., through user interface 102) and provides the requested details.The system compares the details provided by user 110 with the storeddetails and, if they match, authorizes or allows the user to use theinstrument or take other desired action that may otherwise be preventedor denied. A more comprehensive method of the invention is describedbelow in conjunction with FIG. 2.

One result of implementing an embodiment of the invention may be toreduce fraud rates, charge-backs, rejections, etc., in order to reducethe cost of business for merchants and other entities. A merchant thataccepts credit cards, debit cards, electronic checks or otherinstruments that can be verified through a method of the invention mayperform such verification for all users, just for users deemed highrisk, or for some other group of users. For example, if the merchantcalculates or otherwise obtains a level of risk presented by a user,that level may determine whether the user presents a low enough riskthat verification is unnecessary, high enough to warrant verification,or so high that the user should be rejected without even attempting toverify the user's selected instrument.

Because the identity of a vendor (e.g., merchant) involved in afinancial transaction is typically reported to a user, the specificvendor account or name used to perform a verifying transaction may beone of the details required of a user in order to verify a financialinstrument. Thus, the entity (e.g., merchant, vendor, on-line service)performing or implementing a method of the invention may establish anumber of vendor accounts with its merchant acquirer, credit card issueror the bank or other institution through which it will initiate ACHand/or other transactions. Alternatively, instead of requiring separateaccounts, the entity's bank, merchant acquirer or other financial systempartner may allow the entity to specify a merchant name, account, orother detail to be part of the transaction.

Advantageously, the use of variable or different merchant namesfacilitates the use of an embodiment of the invention internationally.In particular, even if the verifying transactions are initiated in onecurrency and, at the user's end are converted into another currency, themerchant name or other variable identity can still be used as averifying detail.

If the manner in which verification transactions are handled causes someof the transaction information to be truncated or excised, theverification system (e.g., system 100 of FIG. 1) may structuretransactions accordingly or take that handling into account whencomparing stored transaction details against the details offered by auser. For example, if it is likely that part of a vendor name or accountwill be truncated, then that portion of a transaction may be reported ina way that prevents truncation of disambiguating information (e.g., byusing a vendor name of “2468AcmeCorporation” instead of“AcmeCorporation2468”). Then, as long as the user can provide the“2468Acme” portion, this may be considered to match the account name.

FIG. 2 demonstrates one method of verifying a user's specified financialinstrument or verifying the user's authority to use the instrument,according to one embodiment of the invention. In this embodiment, a userselects a credit card, debit card, bank account or other account thatoffers electronic checking or deposits, to be the source of funds forpurchases, money transfers or other transactions at a merchant (or otherentity).

In order to use variable or different merchant or vendor names/accountsfor verifying transactions (as described above), the merchant may, priorto the illustrated method, establish multiple accounts with its creditcard issuer or ACH vendor.

In state 202 of the method of FIG. 2, a user (or a user's agent)connects to the verification system, which may be implemented as part ofan on-line or traditional merchant or, another entity that acceptspayment in forms other than physical currency. This connection may bethe user's initial contact with the system, in which case he or she may(or may be required to) verify a source of funds as part of aregistration process. Or, this may be just one of many visits, but theuser may be requesting a transaction (e.g., a purchase or fund transfer)that requires verification.

In state 204, the user identifies one or more financial instruments(e.g., credit cards, debit cards, bank accounts, charge cards) or othersources of funds. Such an instrument or source may not be the one thatthe user is attempting, or desires, to use for a particular transaction.In particular, verifying any financial instrument or source of fundsassociated with the user may reduce the risk that he or she is afraudulent user. Illustratively, the user may be required to provide(where applicable) an account name or number, the name of the registeredowner/user, a physical (e.g., street) address associated with theinstrument or account, a telephone number, a password or PIN, etc. Inthis embodiment of the invention, some or all of the electroniccommunications involving the system that contain financial or privatedata may be encrypted or otherwise protected.

In state 206 the system determines whether verification is requiredbefore the user may use an identified financial instrument. Thisdetermination may be made on the basis of various risk factors and fraudprofiles, which may differ in different embodiments of the invention.For example, if any of the information provided by the user does notcorrespond with the identified instrument, this may indicate higher riskand the need for verification. Some other risk factors may include: arecently changed address or telephone number associated with theinstrument, the time of day during which the user has connected, thenumber or amount of transactions the user wants to perform, the user'selectronic address (e.g., IP—Internet Protocol) and whether itcorresponds with his or her asserted physical address, and virtually anyother activity that may be indicative of a risky or fraudulent user.Illustratively, domestic (i.e., United States) credit card users may notbe subjected, in one embodiment of the invention, to verification oftheir credit cards, whereas all international users may requireverification. Similarly, all bank accounts or other sources ofelectronic checks or debits may be deemed to require verification. Ifverification is required, the illustrated method continues at state 208;otherwise, the method ends.

In state 208, the system (e.g., a user interface, web or applicationserver, transaction processor) generates a series of one or moreverifying transactions involving the identified financial instrument.Certain details may vary from one transaction to another, therebydecreasing the likelihood that the user could guess them. Illustrativevariable details include the number of transactions, type of transaction(e.g., deposit or withdrawal, debit or credit), amount of thetransaction, merchant name or account used in the transaction, etc.

In one embodiment of the invention, a typical series of verifyingtransactions may include two deposits (to a bank account) or credits (toa credit card), each of which is between $0.01 and $0.99 in value, andmay involve different merchant identities (e.g., 1234XYZCorporation,5160XYZCorporation). To decrease the cost of performing transactions inthis embodiment, one or both of the deposit/credit amounts may be biasedtoward the lower end of the value range.

In state 210, selected details (e.g., all or a subset of the variabledetails) of the transactions are saved (e.g., stored in a database) andthe transactions are initiated (e.g., through transaction processorscoupled to the appropriate financial systems or entities). The verifyingtransactions may be initiated all at the same time, may be separated intime or sent through different financial systems or entities. Also, theverifying transactions may be joined with other transactions (e.g., averifying deposit may be merged with a subscription fee being charged tothe user), in which case details of the merged transactions would besaved for comparison with the details reported by the user.

In optional state 212, the user may be notified (e.g., via electronicmail) that he or she should wait for or retrieve evidence of thetransactions. The user may be notified when, or shortly after, thetransaction is initiated. Or, the user may be notified after enough timehas passed for the transaction to be completed.

The user's evidence of the transaction(s), which should include all or asubset of the details of the transaction(s), may be in the form of amonthly statement mailed to the user from his or her financialinstitution. Or, the user may take a more proactive approach and accesshis or her instrument or account status on-line or via telephone. Insome manner, the user obtains information regarding the transaction(s).

In state 214 the user (or an agent of the user) connects to the systemand, in state 216, proffers or provides supposed details of theverifying transaction(s). Illustratively, the system (e.g., a userinterface) may prompt the user to enter the amount of each transaction,the merchant name (or the variable part thereof), the type oftransaction, and/or any other detail that was stored.

In this embodiment, the system is configured to communicate with theuser through a user interface. However, in alternative embodiments theuser may be able to interact with human operators for all or any part ofthe verification process.

In state 218 the system compares the stored details to the detailsproffered by the user. If they match (e.g., if the stored detailsinclude the proffered details) the illustrated method continues at state220. Otherwise, the method proceeds to state 222.

In state 220, the system approves the user's use of the identifiedfinancial instrument, or allows some action that was previouslydisallowed due to questionable risk levels, and the method ends.

In state 222, verification failed, in which case the user may be allowedto re-enter supposed details (e.g., up to some maximum number of times)or may have to provide different verification (e.g., by submitting acopy of a statement regarding the instrument—such as a monthly statementfrom the user's financial institution). Or, the system may restart theverification process, restrict the user's activity or use of theinstrument, etc. the method may therefore end or return to a previousstate.

In one embodiment of the invention, if a user for whom a series ofverifying transactions have been initiated does not return to the systemto submit details of the transactions within a predetermined period oftime (e.g., five days, two weeks, one month), he or she may be contacted(e.g., via electronic mail and/or telephone) and prompted to completethe process.

The foregoing descriptions of embodiments of the invention have beenpresented for purposes of illustration and description only. They arenot intended to be exhaustive or to limit the invention to the formsdisclosed. Accordingly, the above disclosure is not intended to limitthe invention; the scope of the invention is defined by the appendedclaims.

What is claimed is:
 1. A method comprising: receiving, using at leastone processor, identification of a source of funds; generating, using atleast one processor, a series of verifying transactions involving thesource of funds, transaction details of the series of verifyingtransactions varying from one transaction to another; storing, using atleast one processor, the variable transaction details; initiating, usingat least one processor, the series of verifying transactions; receiving,using at least one processor, provided transaction details from a user;comparing, using at least one processor, the variable transactiondetails with the provided transaction detail; and selectively approving,using at least one processor, the use of the source of funds by theuser, based on a result of the comparison of the variable transactiondetails with the provided transaction details.
 2. The method of claim 1,wherein the receiving of the identification of the source of funds isfor a transaction at a specific merchant.
 3. The, method of claim 1,comprising selectively restricting use of the source of funds based onthe comparison of the variable transaction details with the providedtransaction details.
 4. The method of claim 1, comprising restarting averification process based on the comparison of the variable transactiondetails with the provider transaction details.
 5. The method of claim 1,comprising notifying a user to retrieve evidence of the series oftransactions, the evidence of the series of transactions comprising thevariable transaction details.
 6. The method of claim 1, comprisingprompting the user to provide the variable transaction details.
 7. Themethod of claim 1, wherein the receiving of the user identification ofthe source of funds comprises receiving at least one of an accountidentifier, a name of the user, a physical address associated with thesource of funds, a communication identifier of the user, a password, ora personal identification number.
 8. The method of claim 1, comprisingdetermining that verification of the source of funds is required basedon a risk factor, the risk factor comprising at least one of ageographic location of the user, a change with respect to informationassociated with the source of funds, or a type of the source of funds.9. The method of claim 1, wherein the varying transaction detailscomprise at least one of a transaction type, transaction amount, or amerchant identifier.
 10. The method of claim 1, wherein transactions inthe series of verifying transactions are initiated contemporaneously.11. The method of claim 1, comprising: joining the series of verifyingtransactions with other transactions to generate merged transactions,and storing transaction details of the merged transactions.
 12. Themethod of claim 1, comprising determining whether the providedtransaction details are received from the user within a predeterminedtime, and prompting the user to provide the provider transaction detailsbased on the determining.
 13. A system comprising: a memory; and atleast one processor coupled to the memory, the at least one processorimplementing a system to receive identification of a source of funds;generate, using at least one processor, a series of verifyingtransactions involving the source of funds, transaction details of theseries of verifying transactions varying from one transaction toanother; store the variable transaction details; initiate the series ofverifying transactions; receive provided transaction details from auser; compare the variable transaction details with the providedtransaction details; and selectively approve the use of the source offunds by the user, based on a result of the comparison, of the variabletransaction details with the provided transaction details.
 14. Thesystem of claim 13, wherein the system is to receive the identificationof the source of funds for a transaction at a specific merchant.
 15. Thesystem of claim 13, wherein the system is to selectively restrict use ofthe source of funds based on the comparison of the variable transactiondetails with the provided transaction details.
 16. The system of claim13, wherein the system is to restart a verification process based on thecomparison of the variable transaction details with the providertransaction details.
 17. The system of claim 13, wherein the system isto notify a user to retrieve evidence of the series of transactions, theevidence of the series of transactions comprising the variabletransaction details.
 18. The system of claim 13, wherein the system isto prompt the user to provide the variable transaction details.
 19. Thesystem of claim 13, wherein the system is to receive at least one of anaccount identifier, a name of the user, a physical address associatedwith the source of funds, a communication identifier of the user, apassword, or a personal identification number,
 20. The system of claim13, wherein the system is to determine that verification of the sourceof funds is required based on a risk factor, the risk factor comprisingat least one of a geographic location of the user, a change with respectto information associated with the source of funds, or a type of thesource of funds.
 21. The system of claim 13, wherein the varyingtransaction details comprise at least one of a transaction type,transaction amount, or a merchant identifier.
 22. The system of claim13, wherein transactions in the series of verifying transactions areinitiated contemporaneously.
 23. The system of claim 13, wherein thesystem is to: join the series of verifying transactions with othertransactions to generate merged transactions, and store transactiondetails of the merged transactions.
 24. The system of claim 13, whereinthe system is to determine whether the provided transaction details arereceived from the user within a predetermined time, and prompting theuser to provide the provider transaction details based on thedetermining.
 25. A machine-readable non-transitory storage medium havinginstruction data to cause a machine to: receive identification of asource of funds; generate, using at least one processor, a series ofverifying transactions involving the source of funds, transactiondetails of the series of verifying transactions varying from onetransaction to another; store the variable transaction details; initiatethe series of verifying transactions; receive provided transactiondetails from a user; compare the variable transaction details with theprovided transaction details; and selectively approve the use of thesource of funds by the user, based on a result of the comparison of thevariable transaction details with the provided transaction details.