Money services system

ABSTRACT

A check cashing system is configured to scan in a check to be cashed and scan a customer ID of a customer cashing the check. Information for the customer, including check cashing history, information for the maker of the check and other information is displayed to verify the authenticity of the check. Also, warnings are displayed if the check is considered fraudulent based on whether criteria are met.

CLAIM FOR PRIORITY

The present application claims the benefit of priority to U.S.Provisional Patent Application Serial No. 60/984,577, filed on Nov. 1,2007, entitled “Money Services Business”, by Dharmesh Mehta, thedisclosure of which is hereby incorporated by reference in its entirety.

BACKGROUND

The check cashing industry has grown considerably over the years. Inaddition to check cashing, other services are typically provided, suchas money orders, wire transfers, etc.

Unfortunately, with the increase of check cashing services, fraud andother crimes have grown considerably. For example, situations may arisewhere an individual makes several copies of a check and attempts to cashthe copies at several check cashing locations in a single day. In othersituations, an individual may attempt to cash another person's check byrepresenting his/her self as that other person.

Many check cashing services may have the ability to verify accountinformation before cashing a check. However, other than relying on priorrelationships with individuals that cash checks periodically, such aspay checks every two weeks, etc., or hand-written notes, these checkcashing services typically lack sophisticated technology to preventfraud, resulting in lost money and wasted time and resources.

Furthermore, many check cashing operations tend to rely on manualmethods for performing many tasks associated with check cashing andother money processing services. These methods are highly susceptible toerror, and may result in lost money or fines for lack of compliance withgovernment regulations.

SUMMARY

According to embodiments, a system and software are provided forproviding money services. The software is operable to provide checkcashing services, compliance reporting, bill payment services, non-billpayment services, inventory control, money order and WESTERN UNIONservices, point-of-sale (POS), payday loan processing and other servicesdescribed in detail below. The software also makes warnings andcompliance decisions and provides automated warnings and alerts whennecessary.

BRIEF DESCRIPTION OF THE DRAWINGS

Embodiments are illustrated by way of example and not limited in thefollowing Figure(s), in which like numerals indicate like elements, inwhich:

FIG. 1 illustrates a system that is operable to provide money services,according to an embodiment;

FIG. 2 illustrates a software architecture of the money services,according to an embodiment;

FIGS. 3A-B illustrate data flow diagrams for money services provided bythe system and software, according to an embodiment;

FIGS. 4A-B illustrate flow charts of a method for payment servicesprocessing, according to an embodiment;

FIGS. 5A-F illustrate flow charts for check cashing processing,according to an embodiment;

FIG. 6 illustrates a computer system, according to an embodiment; and

FIGS. 7-9 illustrate exemplar screen shots, according to embodiments.

DETAILED DESCRIPTION

For simplicity and illustrative purposes, the principles of theembodiments are described by referring mainly to examples thereof. Inthe following description, numerous specific details are set forth inorder to provide a thorough understanding of the embodiments. It will beapparent however, to one of ordinary skill in the art, that theembodiments may be practiced without limitation to these specificdetails. In other instances, well known methods and structures have notbeen described in detail so as not to unnecessarily obscure theembodiments.

FIG. 1 illustrates a system 100 that provide money services, accordingto an embodiment. The system 100 illustrates a client-serverarchitecture by way of example and not limitation. For example, software120 providing the money services may be stored and executed on a server101. Software clients 102 and 103 may run on computers at stores 1 and 2respectively. One or more stations 104-16 running the client software102 and 103 may be provided at each store and communicate over anetwork, such as the Internet 110, with the software on the server 101.Network switches and routers are shown and may be used to connectdevices with other devices via a network, as is known in the art. Inthis embodiment, multiple stores may quickly and easily share data aboutcheck cashing and other services, which may prevent fraudulenttransactions. In another embodiment, the money services software may runon a standalone computer system in a store or in a network local to astore.

FIG. 2 illustrates a software architecture 200 for the check cashingservices and other services, according to an embodiment. The softwarearchitecture 200 may include a check cashing module 201, warningsdetermination module 202, check endorsement module 203, compliancemodule 204, account information verification module 205, and imagecapture module 206.

The check cashing module 201 performs processes for cashing checks, suchas described in the flow charts shown in FIGS. 3 and 4. The imagecapture module 206 may capture and store images of individuals and alsocapture images of checks. Optical character recognition may be used toread information from the checks, and bar code readers may additionallybe used to read information from checks.

The warnings determination module 202 uses information from checks,information stored in a database about individuals and their accountsand other information, all of which may be stored in one or more ofservers 101, to determine whether a transaction may be fraudulent andprovide alerts and warnings accordingly. The check endorsement module203 automatically prints information on checks being cashed. Thecompliance module 204 automatically generates reports and files reportswith government agencies. The account verification module 205 verifiesaccount information electronically with banks before checks are cashed.

The software architecture 200 may include other modules not shown andmay provide other functions. A list of some of the functions performedby the money services software and system running the software is asfollows: verifies social security number and the identity of the personwith OFAC List (OFAC stands for the Office of Foreign Assets Control ofthe U.S. Department of the Treasury and it administers and enforceseconomic and trade sanctions against targeted foreign countries,terrorism sponsoring organizations and international narcoticstraffickers based on U.S. foreign policy and national security goals);system endorsement on checks (e.g., name of the company, company accountinformation, teller ID, date and time check was cashed and the stationnumber are endorsed along with the customer's name); verifies date onthe check (e.g., ensures that the date the check was written is not morethan 30 days old or some other predetermined period of time); and alertsand bold lettered warnings. Alerts (e.g., audio and/or visual) and boldlettered warnings are provided when someone cashes more than one checkin a span of few days or some other predetermined time period; if thereare fraudulent or bad checks; if the customer has a bad history and theinstrument needs to be verified. Other modules and functions includeauto-generated and electronic filing of Currency Transaction Report(CTR) and Suspicious Activity Report (SAR) as per the requirements. Thesystem generates the CTR and SAR whenever it detects that a transactionover $10000 has been done or there is a suspicious transaction. Thesystem provides strong compliance to the requirements of the PatriotAct. The system has capability to capture the image of the personcashing the check, sending WESTERN UNION, buying money orders, etc.Also, signatures of the customers are also captured and stored in thedatabase. A main screen generated by the software has a ticker which hasimportant messages warning and educates all the tellers about variousnew additions to the rules and criminal activity. The software verifiesthe bank and account information of the check that has been presented atthe click of a button. The database is accessible from all storelocations if everything is networked. This reduces the chances ofmultiple fraudulent activities. The system recognizes only genuinestate-issued ID's and drivers licenses of all the 50 states. Money Orderand WESTERN UNION logs are generated automatically to comply with thePatriot Act. The system caters to a wide array of activities—PaydayLoans, Inventory Management, Employee Scheduling and staffing and QUICKBOOK Integration. Also, OFAC Verification is a real time activity andcomplies with the Patriot Act.

FIGS. 3A-B illustrate a data flow diagram of the money services systemand software. The software is operable to provide service transactions,inventory transactions, bank phone, check cashing, quick cashing, cashreceive, other, lookup, CTR/SAR compliance, cash transfer and otherfunctions.

As shown in FIG. 3A, at 301, a user logs in and the system determineswhether the user is a manager at 302. The system stores IDs withdesignations of whether the ID is for a manager or other type of user.If the user is a manager, the manager has options to use many functionsas shown. For example, a manager in a store that logged in to the systemis presented with a graphic user interface (GUI) that includes thefunctions shown in FIG. 3A. Masters 303 includes screen templates that amanager can use to add information into the system, such as adding newaccounts, etc. The employee schedules 304 may also be stored and shownthrough the system.

Backup 305 includes backup of information on a storage device.

The system connects with OFAC to file reports as shown with 306. Thesystem also provides bank verification as part of banking 307. Thesystem connects to an ATM network to determine the status of bankaccounts when check cashing. For example, the bank may mark the accountwith a negative status. The bank verification will notify the user thestatus of the account so the check cashing service will not be provided.Stop payment information may also be determined.

Banking 307 generates the reports for any payment services.

The station report 308 generates reports regarding activity at eachstation in the store.

Activation reports 309 is for activating cell phones. It creates a logfile to send to the cell phone company to activate the cell phone.

Check cashing services and reports 310, compliance reports 311, end ofday reports 316, and store cash status 314 are also generated.

Pay day loan reports 312 are generated. This keeps track of loanedamounts and payment amounts for the loans. The system may connect to aseparate pay day loan system to send and receive information forgenerating reports and providing the services.

The system also provides inventory services and reports 313.

The system also provides a point of sale (POS) terminal 315 for sellinggoods and services.

As described above, in addition to providing check cashing services, thesystem provides many other services that may be used in a store, such asinventory control, point of sale terminals, cash transfers, servicetransactions (money order, WESTERN UNION, etc.), and other functions.This is shown in FIG. 3B. Note that the data flow may continue to FIG.3B through the POS in FIG. 3A or through non-manager transactions. Forexample, a non-manager user at a store, which may include a teller orsome other user, may be presented with the functions described below viaa GUI generated by the system.

In FIG. 3B, service transactions 317 may include money order, WESTERNUNION, etc. The inventory transactions 318 are for inventory control.The bank phone 319 may simply list bank phone numbers. Check cashing 320and other payment process services 323 are described above and withrespect to the payment services process flow shown in FIGS. 4A-B. Quickcashing 321 is for companies that provide many checks for cashing, suchas for payday.

Cash receive 322 and cash transfer 326 may be between registers orbetween stores, etc.

Other 323 may be for closing registers and checking deposits.

Lookup 324 is for customer/maker history or for check information or anyother stored information.

CTR/SAR 325 is used to generate and file reports.

FIGS. 4A-B illustrate a payment services process. The system is operableto generate a unique customer ID and account for each customer. A tagwith the ID and a photo is issued to the customer, and they may use thetag to receive payment services. For example, the tag is scanned tobring up customer information as shown as 401 in FIG. 4A. The tag may beprovided on a plastic card that is given to the customer. The card mayinclude a photograph of the customer, which is taken at the store.

The services shown in FIG. 4A include bill payment services (BPS),non-bill payment services (NPS), services with sales tax (STX) (e.g.,cell phone services), and inventory items (INV). For inventory items,the user scans the UPC code to keep track of inventory.

At 401, the customer's tag is scanned to retrieve the customerinformation. This may be in response to entering a customer searchsection in the GUI at 402.

After the customer information is found, the user may select a serviceat 405. The services that may be selected include BPS 406, NPS 407,service with STX 408, and INV 409. If the service is BPS, then adetermination is made as to whether the service is for a new BPS at 414.If the bill is new, then the bill account information and mount isentered at 415. Otherwise, just the amount is entered at 416. ForWESTERN UNION (WU) service, at 412, the customer status is displayed,and at 413, the receiver is selected. At 403, the SAR is filed for theWU transaction.

For NPS or a service with STX, the amount is entered at 417 and 418,respectively. For INV, the quantity is entered at 419. Amounts and otherinformation may be entered from a displayed number pad at 404. Also, thetransaction for each service is displayed to the user at 410 and theuser finishes at 411. The user may then perform another transaction.

FIG. 4B shows more steps for payment services. The steps include actionsperformed in response to money order and WU transfers exceeding $3000.00at 420 and 424, respectively. For example, the system automaticallygenerates and prints compliance reports for these transactions at 423and 426, respectively. No other systems integrate WU services orautomatically generate these compliance reports. For the money order(MO) service, serial numbers are entered at 421. For the WU service,receiver information for the receiver of the wire transfer is entered at425, and the SAR is filed at 422.

Also, actions are performed in response to transactions over $10,000.00at 427. The system automatically generates and files CTR reports at 428and 429 using the customer information and transaction informationentered and stored in the system. Typically, stores generate thesereports manually, which is highly susceptive to error.

At 430, the tendered amount, if any, is displayed. At 431, the cashreceived from the customer is entered, for example, using a displayednumber pad at 432. At 433-435, the transaction is processed, the amountdue, if any, is paid, and the receipt is printed.

FIGS. 5A-F illustrate a check cashing process, according to anembodiment. A summary of some of the steps in FIGS. 5A-F is providedbelow. The flow charts also provide detail for the steps in the process.In FIG. 5A, once the customers tag is scanned at 436, a lookup isperformed on the customer's account to provide the station with all theinformation for money services processing at 437-439. Also, alerts areshown as needed to prevent fraud.

At 442, the check cashing history of the customer is displayed, and thecustomer ID may be scanned and the picture taken at 440 and 441 asneeded. If the customer ID is already scanned, then this step may not berepeated. If the picture was already taken, the picture may not bere-taken.

From the displayed check cashing history, a check may be selected at 443and an action may be performed on the selected check at 444-448, such asprinting, marking as bad or recovered, returning a deposit item, orsubmitting a bad debt to a collection agency. Other information may beprinted at 449 and the user may perform another check cashing functionat 450.

FIG. 5B shows different processing steps for different types of checks.At 461 and 462, payroll fees are paid. At 463 and 464 personal checkfees are paid. At 465 and 466 money order fees are paid. At 467 and 468,tax refund fees are paid. At 469 and 470, insurance check fees are paid.At 471 and 472, other fees may be paid. At 473, another action may beperformed.

FIG. 5C shows that the check is scanned and displayed at 474 and 475when presented by the customer for cashing. The zoom image of the checkmay be displayed at 476 and 477. Also, a lookup is performed for thecheck maker's information to detect fraudulent checks at 492. If themaker of the check is not in the system, then the maker information isentered and saved in the servers 482 and 483 at 478-481. If the makerinformation is in the system, an image of an old check for the maker isretrieved and displayed so the user can compare the checks at 482 and486. If a warning of a bad check is displayed or the user believes thecheck may be bad, the old check may be viewed again by zooming at 487and 492. Also, bank account verification is performed at 489-491. At 484and 485, check information may be manually entered to retrieve anyimages of other checks from the maker.

FIG. 5D shows steps for checking the check date. The check amount anddate may be entered at 500-502. If the check date is later than thecurrent date a warning is displayed at 503 and 504. If the check date isolder than 15 days (or some other predetermined threshold) from thecurrent date, a warning is displayed at 505 and 506. If an out of stateID is presented, a warning is displayed at 507-508. A manager code maybe required to be entered for the user or the manager to complete thecustomer's transaction at 510, and then at 509, another action may beperformed.

FIG. 5E shows steps which require the station to determine whether thecheck count is more than 10 or if the check amount is greater than 2000.Different thresholds may be set. However, if a threshold is met, than amanager code may be needed to perform the transaction.

At 511-513, the check amount, customer check history and maker historyare displayed. At 514, the check cashing fee is displayed and may bemanually changed. At 516, 517, and 519, if a number of checks cashed bythe same customer exceeds a threshold or the check amount exceeds athreshold, a manager code may be required to complete the transaction.At 518, the transaction is completed and another action may beperformed.

FIG. 5F shows the automatic CTR reporting and report printing if thecheck amount exceeds $10,000.00, at 520-522. Also, check information isstored in the servers at 523 and 524. The amount due for the check isdisplayed to the user, and the check is endorsed at 525 and 526. Theendorsement may be printed at 527. At 528 a receipt is printed.

FIG. 6 illustrates a generic hardware platform that may be used to runthe software. Components may be added or removed from the generalpurpose system 900 to provide the desired functionality.

The system 600 includes a processor 602, providing an execution platformfor executing software. Commands and data from the processor 602 arecommunicated over a communication bus 603. The system 600 also includesa main memory 606, such as a Random Access Memory (RAM), where softwaremay reside during runtime, and a secondary memory 608. The secondarymemory 608 may include, for example, a nonvolatile memory where a copyof software is stored. In one example, the secondary memory 608 alsoincludes ROM (read only memory), EPROM (erasable, programmable ROM),EEPROM (electrically erasable, programmable ROM).

The system 600 includes I/O devices 610. The I/O devices may include adisplay and/or user interfaces comprising one or more I/O devices 610,such as a keyboard, a mouse, a stylus, speaker, and the like. Acommunication interface 613 is provided for communicating with othercomponents. The communication interface 613 may be a wired or a wirelessinterface. The communication interface 613 may be a network interface.The components of the system 600 may communicate over a bus 609.

One or more of the steps of the methods described above and other stepsdescribed herein and software described herein may be implemented assoftware embedded or stored on a computer readable medium. The steps maybe embodied by a computer program, which may exist in a variety of formsboth active and inactive. For example, they may exist as softwareprogram(s) comprised of program instructions in source code, objectcode, executable code or other formats for performing some of the stepswhen executed. Modules include software, such as programs, subroutines,objects, etc. Any of the above may be stored on a computer readablemedium, which include storage devices and signals, in compressed oruncompressed form. Examples of suitable computer readable storagedevices include conventional computer system RAM (random access memory),ROM (read only memory), EPROM (erasable, programmable ROM), EEPROM(electrically erasable, programmable ROM), and magnetic or optical disksor tapes. Examples of computer readable signals, whether modulated usinga carrier or not, are signals that a computer system hosting or runningthe computer program may be configured to access, including signalsdownloaded through the Internet or other networks. Concrete examples ofthe foregoing include distribution of the programs on a CD ROM or viaInternet download. In a sense, the Internet itself, as an abstractentity, is a computer readable medium. The same is true of computernetworks in general. It is therefore to be understood that thosefunctions enumerated herein may be performed by any electronic devicecapable of executing the above-described functions.

As described above, a user of the system shown in FIGS. 1 and 2 may bepresented with a GUI to perform many of the functions of the systemdescribed above. FIG. 7 illustrates an example of a screenshot for thesystem. Sections A and B show the types of services that may beclicked-on by the user. Section C shows where the information for acheck being cashed and/or old checks is displayed. FIG. 8 shows anexample of a screen shot for displayed customer profile information.FIG. 9 shows a screenshot for check cashing where a warning may bedisplayed.

While the embodiments have been described with reference to examples,those skilled in the art will be able to make various modifications tothe described embodiments without departing from the true spirit andscope. The terms and descriptions used herein are set forth by way ofillustration only and are not meant as limitations. In particular,although the methods have been described by examples, steps of themethods may be performed in different orders than illustrated orsimultaneously. Those skilled in the art will recognize that these andother variations are possible within the spirit and scope as defined inthe following claims and their equivalents.

What is claimed is:
 1. A method of check cashing comprising: receiving ascan of a customer tag, wherein the customer tag includes a uniquecustomer identity of a customer presenting a check to be cashed;receiving an input of information about the check to be cashed;verifying a maker of the check to be cashed; performing, utilizing acomputer processor, at least one processing determination based on adate of the check; performing, utilizing the computer processor, atleast one processing determination based on an amount of the check;retrieving customer information from a database using the uniquecustomer identity; performing, utilizing the computer processor, atleast one processing determination based on the unique customeridentity; displaying an alert in response to the date of the check beinglater than a current date; displaying the alert in response to the dateof the check being older than a predetermined age threshold; displayingthe alert in response to the amount of the check exceeding a thresholdcheck amount; displaying the alert in response to the customerattempting to cash the check having cashed at least a predeterminednumber of checks within a first predetermined time period; displayingthe alert in response to the customer attempting to cash the checkhaving cashed at least a predetermined money amount of checks within asecond predetermined time period; automatically endorsing the check tobe cashed responsive to no alerts being generated, wherein the automaticendorsing comprises printing on the check name of customer's company,customer's company account information, information identifying a tellercashing the check or the teller's station number, date and time checkwas cashed, and customer's name; determining if the check amount isgreater than ten thousand dollars; in response to the check amount beinggreater than ten thousand dollars, generating and electronic filing acurrency transaction report and a suspicious activity report; storing animage of the customer in the database; and storing an image of thesignature of the customer in the database, wherein the image of thecustomer and the signature are retrieved from the database and displayedfor a subsequent transaction of the customer to verify the customer'sidentity.
 2. The method of claim 1, wherein the scan of the customer tagis received from a card.
 3. The method of claim 1, wherein the tagincludes the image of the customer.
 4. The method of claim 1, furthercomprising displaying a check cashing history of the customer.
 5. Themethod of claim 4, further comprising selecting a check from the checkcashing history.
 6. The method of claim 5, further comprising performingan action based on the selected check.
 7. The method of claim 6, whereinthe performed action based on the selected check is marking the check asa bad check.
 8. The method of claim 1, wherein verifying the maker ofthe check includes displaying an image of another check by the maker. 9.The method of claim 1, wherein verifying the maker of the check includesperforming a bank account verification including analyzing at least oneof the checking account number and the bank routing number of the check.10. The method of claim 1, wherein verifying the maker of the checkincludes performing a bank account verification including analyzing atleast one of the checking account number and the bank routing number ofthe check.
 11. The method of claim 1, wherein performing at least oneprocessing determination based on the date of the check includesdetermining if the check is dated after the current date.
 12. The methodof claim 1, wherein performing at least one processing determinationbased on the date of the check includes determining if the check isdated more than 15 days prior to the current date.
 13. The method ofclaim 1, wherein performing at least one processing determination basedon the amount of the check includes determining if the check amount isgreater than 10,000 USD.
 14. The method of claim 1, wherein performingat least one processing determination based on the unique customeridentity includes determining if customer presenting a check to becashed has cashed more than 10 checks in a period prior to the currentdate.
 15. The method of claim 1, wherein performing at least oneprocessing determination based on the unique customer identity includesdetermining if customer presenting a check to be cashed has also cashedmore than 2000 USD in a period prior to the current date.
 16. The methodof claim 1, wherein performing at least one processing determinationbased on the unique customer identity includes, if the number of checkscashed in a period prior to the current date exceeds a preselectedthreshold, requiring a receiving of a manager code to complete the checkcashing transaction.
 17. A system performing a method of check cashing,the system comprising: a computer interface to receive a scan of acustomer tag, wherein the customer tag includes a unique customeridentity of a customer presenting a check to be cashed, and receive aninput of information about the check to be cashed; and a computerprocessor to verify a maker of the check to be cashed, perform at leastone processing determination based on a date of the check, perform atleast one processing determination based on an amount of the check,retrieve customer information from a database using the unique customeridentity, perform at least one processing determination based on theunique customer identity, display an alert in response to the date ofthe check being later than a current date; displaying the alert inresponse to the date of the check being older than a predetermined agethreshold, display the alert in response to the amount of the checkexceeding a threshold check amount, display the alert in response to thecustomer attempting to cash the check having cashed at least apredetermined number of checks within a first predetermined time period,display the alert in response to the customer attempting to cash thecheck having cashed at least a predetermined money amount of checkswithin a second predetermined time period; automatically generate anendorsement for the check to be cashed responsive to no alerts beinggenerated, wherein the automatic endorsement comprises the check name ofcustomer's company, customer's company account information, informationidentifying a teller cashing the check or the teller's station number,date and time check was cashed, and customer's name; determining if thecheck amount is greater than ten thousand dollars; in response to thecheck amount being greater than ten thousand dollars, generating andelectronic filing a currency transaction report and a suspiciousactivity report; storing an image of the customer in the database; andstoring an image of the signature of the customer in the database,wherein the image of the customer and the signature are retrieved fromthe database and displayed for a subsequent transaction of the customerto verify the customer's identity.
 18. The system of claim 17, whereinperforming at least one processing determination based on the uniquecustomer identity includes, if the number of checks cashed in a periodprior to the current date exceeds a preselected threshold, requiring areceiving of a manager code to complete the check cashing transaction.19. A non-transitory computer readable medium (CRM) storing computerreadable instructions which, when executed by a computer system,performing a method of check cashing comprising: receiving a scan of acustomer tag, wherein the customer tag includes a unique customeridentity of a customer presenting a check to be cashed; receiving aninput of information about the check to be cashed; verifying a maker ofthe check to be cashed; performing, utilizing a computer processor, atleast one processing determination based on a date of the check;performing, utilizing the computer processor, at least one processingdetermination based on an amount of the check; retrieving customerinformation from a database using the unique customer identity;performing, utilizing the computer processor, at least one processingdetermination based on the unique customer identity; displaying an alertin response to the date of the check being later than a current date;displaying the alert in response to the date of the check being olderthan a predetermined age threshold; displaying the alert in response tothe amount of the check exceeding a threshold check amount; displayingthe alert in response to the customer attempting to cash the checkhaving cashed at least a predetermined number of checks within a firstpredetermined time period; displaying the alert in response to thecustomer attempting to cash the check having cashed at least apredetermined money amount of checks within a second predetermined timeperiod; automatically endorsing the check to be cashed responsive to noalerts being generated, wherein the automatic endorsing comprisesprinting on the check name of customer's company, customer's companyaccount information, information identifying a teller cashing the checkor the teller's station number, date and time check was cashed, andcustomer's name; determining if the check amount is greater than tenthousand dollars; in response to the check amount being greater than tenthousand dollars, generating and electronic filing a currencytransaction report and a suspicious activity report; storing an image ofthe customer in the database; and storing an image of the signature ofthe customer in the database, wherein the image of the customer and thesignature are retrieved from the database and displayed for a subsequenttransaction of the customer to verify the customer's identity.