Applicant screening

ABSTRACT

A method comprising receiving by a screening service, an applicant profile that identifies an applicant and an authorization to provide access to screening results generated by the screening service based on the applicant profile to a screener, associating, using a computer, an identifier with the screening results, and communicating the identifier to the screener.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims benefit of U.S. Non-Provisional patentapplication Ser. No. 13/558,781 entitled “Applicant Screening” and filedJul. 26, 2012, to be issued as U.S. Pat. No. 8,650,407, which claimsbenefit of U.S. Non-Provisional patent application Ser. No. 11/189,024entitled “Screening Using Personal Identification Code” and filed onJul. 25, 2005, now U.S. Pat. No. 8,234,498, issued on Jul. 31, 2012, allof which are incorporated herein by reference in their entirety.

TECHNICAL FIELD

The invention relates generally to applicant screening, and moreparticularly to screening an individual or entity using a personalidentification code.

BACKGROUND

Applicant screening is an important component in many applicantselection processes, including rental applicant screening, accessscreening, employee screening, mortgage applicant screening, universityentrance screening, etc. Existing approaches may include paperapplications and hand-entry of detailed application information by ascreener in order to process the application. In an apartment rentalscenario, for example, an applicant may fill out a paper applicationfrom which the property manager extracts information to submit a creditreport request, a criminal background check, and other screeninginformation requests. Based on the results of these submissions, thescreener makes a decision regarding the application (e.g., accept,decline, etc.).

For larger institutional property managers, lenders, and employmentcompanies, for example, screening software and systems exist tostreamline this screening process. Detailed information extracted fromthe application can be electronically input by a screener through acomputer-based screening service, which can generate a report onrequested information (e.g., a credit report, a criminal backgroundreport, a lease history report, etc.) collected by a data aggregator.With these reports, the screener can make an informed decision aboutwhether to accept or decline the application and under what terms.However, such computer-based screening services often requiresubstantial training of the screener in order to properly install andconfigure an account for a computer-based screening service, to ensurethe proper information is provided to the screening service (e.g., aboutthe individual applicants) for each screening request, and to ensurethat screening results are properly interpreted and applied in thedecision-making process.

These existing screening services are often too complex and expensivefor smaller businesses, property managers, or other smaller screeners.For example, a property manager who manages only a couple of rentalunits would likely benefit from access to a computer-based screeningservice but may not find the training time/costs of using the serviceitself to be cost effective. As such, smaller property owners are likelyto forego the use of such screening services, choosing to screen theirapplicants using other methods (e.g., credit and criminal dataresellers, faxed credit reports, manually calling references & previouslandlords, and manually calling former employers).

Existing methods are also more prone to identity theft. The screeningservices (i.e., those that provide credit reports, criminal backgrounddata, and other consumer data) provide consumer-specific data to ascreening service subscriber for a permissible purpose based onrepresentations made the screening service subscriber. The screeningservices perform certain subscription or membership verifications on therequesters to minimize the chance that consumer data could be illegallyaccessed, but do not normally require consumer confirmation orauthorization for each transaction. This practice may introduce avenuesfor identity thieves to illegitimately access consumer data files.Ideally, a screening service would be required to obtain specificauthorization by the consumer (e.g., the screened individual) beforeproviding any access by a screening service subscriber to the consumer'sdata. However, such a safeguard is not considered viable and so is notemployed in the industry.

SUMMARY

Implementations described and claimed herein address the foregoingproblems by distributing portions of the screening process to multiplesites and multiple participants and providing a personal identificationcode that identifies individual sets of screening results. In thismanner, the applicant (e.g., a consumer) can enter appropriate applicantprofile data into a secure screening account, such as via a screeningkiosk (e.g., a computer with network access, a public computer terminal,etc.). The applicant may be authenticated prior to the issuance of apersonal identification code. Authentication may be performed by variousmethods, including without limitation the use of applicant data on fileat a data aggregator, biometric mechanisms or some other highly reliablemechanism for ensuring that the applicant granting access is actuallythe individual or entity authorized to grant access to the applicant'sinformation.

The applicant can authorize the generation of screening results, whichare associated with a unique personal identification code. This code canthen be communicated to the screener, who can access the screeningresults along with a recommendation, if desired, by sending the code toa screening service provider. Based on the screening results, thescreener can make a decision about the application and communicate to anapplicant which action will be taken on his or her application.Communications among the various participants and components, includingwithout limitation the application, the screener, the screening server,the screening kiosk, and one or more screening services, can take placevia the internet and/or other communications media.

In some implementations, articles of manufacture are provided ascomputer program products. One implementation of a computer programproduct provides a computer program storage medium readable by acomputer system and encoding a computer program. Another implementationof a computer program product may be provided in a computer data signalembodied in a carrier wave by a computing system and encoding thecomputer program.

Other implementations are also described and recited herein.

BRIEF DESCRIPTIONS OF THE DRAWINGS

FIG. 1 illustrates an exemplary system for screening applicants.

FIG. 2 illustrates a “Welcome” screenshot from an exemplary system forscreening applicants.

FIG. 3 illustrates exemplary operations for processing an applicant'suse of an applicant screening system.

FIG. 4 illustrates a screenshot for creating an applicant's account inan exemplary applicant screening system.

FIG. 5 illustrates a screenshot allowing an applicant to selectscreening services in an exemplary applicant screening system.

FIG. 6 illustrates a screenshot allowing an applicant to reviewapplication results and to initiate a new application in an exemplaryapplicant screening system.

FIG. 7 illustrates a screenshot allowing an applicant to view requestsfor screening information in an exemplary applicant screening system.

FIG. 8 illustrates a screenshot allowing an applicant to accessscreening information in an exemplary applicant screening system.

FIG. 9 illustrates a screenshot allowing an applicant to pay forapplicant screening-related services in an exemplary applicant screeningsystem.

FIG. 10 illustrates a “Results” screenshot in an exemplary applicantscreening system.

FIG. 11 illustrates a screenshot displaying criminal record selectionsof an applicant in an exemplary applicant screening system.

FIG. 12 illustrates a screenshot displaying detailed criminal recordinformation of an applicant provided by an exemplary applicant screeningsystem.

FIG. 13 illustrates an exemplary screenshot allowing an applicantcommunicate his or her personal identification code to a landlord.

FIG. 14 illustrates a screenshot indicating a personal identificationcode communication in an exemplary applicant screening system.

FIG. 15 illustrates exemplary operations for processing a screener's useof an applicant screening system.

FIG. 16 illustrates a screenshot for creating a screener's account in anexemplary applicant screening system.

FIG. 17 illustrates a screenshot allowing a screener to log into anexemplary applicant screening system.

FIG. 18 illustrates a screenshot allowing a screener to view screeninginformation in an exemplary applicant screening system.

FIG. 19 illustrates a screenshot allowing a screener to view screeninginformation using a manually entered personal identification code of anapplicant in an exemplary applicant screening system.

FIG. 20 illustrates a screenshot allowing a screener to enterproperty-specific data in an exemplary applicant screening system.

FIG. 21 illustrates a “Results” screenshot for a screener in anexemplary applicant screening system.

FIG. 22 illustrates a screenshot indicating communication by a screenerto the applicant of an application decision in an exemplary applicantscreening system.

FIG. 23 illustrates a screenshot allowing a screener to send screeninginformation to an applicant in an exemplary applicant screening system.

FIG. 24 illustrates a screenshot allowing a screener to pay forapplicant screening-related services in an exemplary applicant screeningsystem.

FIG. 25 illustrates a screenshot indicating communication by a screenerto the applicant of a screening request in an exemplary applicantscreening system.

FIG. 26 illustrates an exemplary system useful in implementations of thedescribed technology.

DETAILED DESCRIPTIONS

Exemplary applicant screening systems and services, which can providescreening results about a consumer, allow consumer applicants andscreeners to securely and efficiently generate and communicateapplication requests, screening parameters, screening results, andapplication results (e.g., screening decisions) via a communicationsnetwork. Such systems and services may be employed in a variety ofscreening contexts, including without limitation criminal, credit, andlease history screening for employment applicants, leasing applicants,and any other consumer applicants or persons of interest

FIG. 1 illustrates an exemplary system 100 for screening applicants. Anapplicant 102 accesses a screening kiosk 104, a web site, or anothersystem access point. Such systems can be implemented on one or morecomputer systems or kiosks, including network-connected personal digitalassistants (PDAs), cell phones, laptop computers, palm-based computers,desktop computers, and servers.

An institutional property manager 106 represents a class of propertymanagers with sufficient volumes of property rentals to justifysophisticated applicant screening systems. Common characteristics ofinstitutional property managers may include specially-trained screeningpersonnel, customized screening procedures and parameters acrossmultiple rental locations, a high-speed internet connection,professional management, a need for management reporting across multiplerental locations, a desire for a dedicated account agent at thescreening service to manage the institutional property manager'saccount, and other characteristics. Typically, the property managers inthis class subscribe to one or more screening services, train screeningpersonnel to use the screening service(s) and to understand screeningresults, and interact closely with the screening service(s) to optimizetheir rental business.

In one scenario with an institutional property manager 106, an applicant102 completes a rental application 108. Screening personnel of theinstitutional property manager 106 receives the rental application 108and inputs relevant data 110 into a screening application, web-basedform, or other form for submission to one or more screening services ordata aggregators. In some circumstances, the data 110 is submitted to ascreening service or data warehouse (e.g., a credit bureau) viafacsimile. In other circumstances, the data 110 is submittedelectronically through a dial-up connection or internet connection.Screening results 114, including possibly recommendations by thescreening service, are returned to the institutional property manager106 and are evaluated by the screener. Recommendations are typicallygenerated based on a screening model and the available screeningresults. Exemplary recommendations may include without limitation“accept”, “decline”, “accept with increased deposit”, “more informationneeded”, etc. Based on this evaluation, the institutional propertymanager 106 can determine and communicate an applicant action 109 (e.g.,a screening decision) to the applicant 102 (e.g., by mail or telephone).Exemplary applicant actions may include without limitation an offer ofacceptance, a declination, a request for more information, or otherresponses.

In an alternative scenario, an institutional property manager 106 mayaccept a personal identification code 118 (e.g., a personalidentification number or PIN) from an applicant 102 in order to obtainscreening results 114 for the applicant 102. In this scenario, theapplicant 102 may obtain the personal identification code 118 from thescreening kiosk 104. If the applicant 102 does not already have anaccount with the system 100, he or she is given the opportunity tocreate a new account by providing applicant profile information, whichmay include without limitation identification information, a login ID, apassword, and other data. The applicant 102 is authenticated by thesystem through the use of one or more authentication mechanisms withinthe screening kiosk 104, which may also including communication with thescreening server/service 112 or other consumer-authenticatinginformation. One method involves use of a fraud management platform thatauthenticates an applicant through a series of questions that only theapplicant would be likely to know. Exemplary questions may includedemographic questions, such as “On which of these streets have you livedpreviously?”, or credit questions, such as “What is the current balanceof your first mortgage?” If an account already exists, the applicant 102is given the opportunity to log into his or her account via thescreening kiosk 104. It should be understood that other system accesspoints may be used for this purpose as well.

Personal identification codes may be limited to a single use or alimited number of uses, for use by a single screener, or for a limitedperiod of time. For example, a screener may have up to three uses of thepersonal identification code over the course of a week to review theapplicant's screening results before the personal identification code isno longer valid.

The screening kiosk 104 communicates the applicant profile to ascreening server 112 via a communications link 105. The screening server112 represents a computer system of a screening service or multiplecomputer systems at multiple screening services. In one implementation,a single server 112 acts as a centralized screening service byrequesting, receiving, and processing screening results from otherscreening services. For example, one screening service may provide arequest, with appropriate applicant data, for a credit report from acredit bureau. The same screening service may also provide a request,with appropriate applicant data, for a criminal background check from acriminal records database service.

Through the screening kiosk 104, the applicant 102 can then select (andpossibly pay for) the types of screening results 114 he or she wishes tobe made available to the property manager 106. In anotherimplementation, the types of screening results may be selected by theproperty manager 106. Based on the applicant profile and the screeningselections made by the applicant 102 and sent to the screening server112 via the communications link 105, the screening server 112 accessesone or more data warehouse sources (e.g., credit bureaus, criminalrecords databases, leasing history databases, etc.) to obtain selectedscreening results 114 and associates a personal identification code 118(e.g., a PIN) with the screening results 114. The personalidentification code 118 is then communicated to the applicant at thescreening kiosk 104 via the communications link 105 after the applicant102 is authenticated via an authentication technique embedded in thesystem 100. Selected results from the screening results may also becommunicated to the applicant via the screening kiosk 104.

The applicant 102 can communicate the personal identification code 118to a property manager 106 via email, via other electronic communicationmeans, or manually. Given the personal identification code 118, theproperty manager 106 can access the selected screening results 114. Insome circumstances, the screening results 114 may also include one ormore recommendations received from the screening service(s). Based onthe screening results, including possibly the recommendation(s), theproperty manager 106 can determine an applicant action 116 andcommunicate it to the applicant 102 electronically or manually.

As discussed previously, some property managers manage propertyportfolios that are smaller than that of what would normally beconsidered an institutional property manager. Nevertheless, suchproperty managers would benefit from professional screening. A personalidentification code implementation of a screening system 100, however,can offer such property managers an attractive alternative access tosuch services.

In one implementation, a property manager 120 or 122 has a dial-up orhigh-speed internet connection, or some other network communicationslink to a screening service or server 112. The property manager 120 usesan Application Service Provider (ASP) configuration to interact with thescreening server 112 through a client computer. ASP-products can beaccessed from a server via a web browser and typically do not requireany other special software to be installed on the client computer. Inthis configuration, the applicant 102 obtains a personal identificationcode 124 after authentication through the system 100 and communicates itto the property manager 120 (e.g., by email or manually). The propertymanager 120 can use the personal identification code 124 to access thescreening server 112 and obtain screening results 128 about theapplicant 102. The screening results 128 may also includerecommendations. The property manager 120 can provide the applicantaction 130 directly to the applicant 102 (e.g., via phone call or email)or can respond through the screening server 112, such that the applicant102 can view the applicant action 130 at his or her next login to thescreening account.

In one implementation, the applicant 102 can direct that the propertymanager 120 to receive the screening results 128 electronically. Forexample, the property manager 120 may receive an email with a link tothe applicant's screening results at the screening server 112. In thisscenario, the property manager 120 may be asked if he or she would liketo create an account on the screening server 112 in order to more easilyaccess other screening results. Alternatively, if the property manager120 already has an account on the screening server 112, the propertymanager 120 may be notified of the screening results 128 both by emailand when they log into the account.

The property manager 122 uses a desktop-installed application (e.g., ascreening-specific software package purchased through a direct or retailchannel, a screening feature integrated into another direct or retailsoftware package, etc.) to interact with the screening server 112through a client computer. This configuration may include, for example,a small business accounting package with an applicant screening featurethat manages communications with the screening server 112 or opens abrowser to allow ASP-type interaction with the screening server 112.

In a manner similar to that of the ASP configuration, the propertymanager 122 receives notification of screening results of an applicant.The property manager 122 access the screening server 112 to access thescreening results (e.g., by submitting the applicant's PIN or followinga link to the screening server). One advantage of the “installed”configuration is bundling the PIN-based screening feature with otherbusiness packages can provide more effective marketing channels. Inaddition, integration with such packages can also allow the variousbusiness features to work together. Finally, an “installed” softwarepackage may be sold in retail settings, thereby providing an alternativemarketing platform as compared to an online ASP configuration.

FIG. 2 illustrates a “Welcome” screenshot 200 from an exemplary systemfor screening applicants. An applicant (e.g., a renter) has a choice ofcreating an account (“Begin”) or logging into an existing account at ascreening kiosk or other access point. A property manager (e.g., alandlord) has a choice of creating an account (“Sign Up”) or logginginto an existing account at a web site or application screen. Exemplarysystem flows for both applicants and property managers are describedwith regard to the following figures.

FIG. 3 illustrates exemplary operations 300 for processing anapplicant's use of an applicant screening system. In an account creationoperation 304, if the applicant selects the Begin option 302 at theWelcome screen, the applicant can enter relevant identification, login,and password information, and any other information (collectively,“application profile information”) useful in screening applicants. Anexemplary Create Applicant Account screen 400 is illustrated in FIG. 4.In one implementation, the applicant may terminate the process aftercreating an account, so that he or she may return at a later time to usethe service.

If the applicant selects the Login option 306, an applicant is given theopportunity to log into the screening kiosk (e.g., is prompted for alogin identifier and a password) in a login operation 308. If the loginfails, as judged by a decision block 310, the applicant is directed tothe account creation operation 304. After the applicant has created anaccount, he or she will not have any requests from landlords yet so theapplicant is directed to a service selection operation 316 (seescreenshot 500 in FIG. 5).

After login, a Renter Welcome screen (see screenshot 600 in FIG. 6) isdisplayed to the applicant in a display operation 312, which presents alist of application requests (e.g., from landlords) and availableresults of application requests (e.g., also from landlords). Anapplication request may include without limitation a request from alandlord, loan officer, etc. requesting that the applicant providecertain background data (e.g., credit data, leasing history, criminalbackground data, etc.). A result typically includes the response to theapplication, such as “accepted”, “declined” or “more information isrequired”, although other responses are also contemplated. In addition,if the applicant is declined, the screening results on which thedeclination is based is available for viewing by the applicant (e.g.,via hyperlinks to the corresponding reports).

If the applicant wishes to view a new request from a landlord, a respondoperation 314 may be activated through the Renter Welcome screen. Theapplicant can choose to view reports from previously processed requestsin a viewing operation 318, or by selecting “View Request”, theapplicant can view the screening information requested by a new landlord(see screenshot 600 in FIG. 6). Based on the information provided in a“View Request” screen (see screenshot 700 in FIG. 7), the applicant canchoose to send a personal identification code to the landlord toauthorize the landlord's access to the requested information or theapplicant can choose to decline the landlord's request. To provide therequested information, the system directs processing from the ViewRequest screen to a service selection operation 316.

If the applicant wishes to respond to a new request or otherwise obtaina new personal identification code, the service selection operation 316allows the user to select the types of screening services desired. Whilethe screenshot 500 of FIG. 5 show only two options, any number of screenoptions and combinations thereof are contemplated. Services may be paidfor by the applicant or by the landlord. The consumer may pay for theservice, the landlord could pay for the service, or the two partiescould share the costs. Such choices may be made available to theconsumer during be available during enrollment. In one implementation,for example, the consumer may choose to pay for the data upfront andreduce the cost of making multiple applications. In addition, theapplicant may choose to purchase and view his or her own screeningresults (see screenshot 800 of FIG. 8).

In one implementation, the applicant is authenticated for each grant ofaccess (e.g., each transaction sending a personal identification code toa screener). Accordingly, in authentication operation 320, the screeningserver authenticates the applicant. Authentication may be performedaccording to a variety of techniques. An exemplary authentication mayinclude a series of questions to which only the consumer wouldpresumably know, such as specific information about their credit file.Other authentication methods may include without limitation biometrictests at the kiosk (e.g., fingerprint or retinal verification) andcredit card or driver's license scanning. If the consumer fails theauthentication for any reason, the service may be altered or terminated.For example, a personal identification code would only be issued via theU.S. Mail to the address held by the data warehouse for the requestingapplicant.

If the applicant is paying for screening service(s), a processingoperation 322 accepts payment information (e.g., credit cardinformation) to process the purchase. (See screenshot 900 of FIG. 9.)Alternatively, the kiosk could support one or more currency acceptorsthat can receive and validate cash from the applicant. If only thelandlord is paying or has paid for screening service(s), then theprocessing operation 322 may be skipped. A submission operation 324submits the applicant profile information and service selections to thescreening server via a communications channel, such as the internet. Thescreening server receives the application information and serviceselections (e.g., leasing history screening results, criminal backgroundscreening results, etc.) and performs the selected screening operations.

In one implementation, as shown in the Results screenshot 1000 of FIG.10, a personal identification code is displayed to the applicant. Theapplicant is also given choices of viewing various screening reports(e.g., credit report, criminal records, leasing history, employmenthistory, etc.) and sending the personal identification code or “PIN” toa landlord. The PIN and other results options are displayed in a displayoperation 328. If the user selects “Send PIN” from the ResultsScreenshot 1000 of FIG. 10, then the applicant is offered theopportunity in a decision operation 330 to send the PIN to a landlord byentering an email address, or to send the PIN to the landlord manually(e.g., by phone, mail, facsimile, in person, etc.). If the applicantchooses to send the PIN by email, the PIN is sent to the email addressspecified by the application (see screenshot 1300 of FIG. 13) and a sendnotice is displayed in a display operation 332 (see screenshot 1400 ofFIG. 14). Before or after operation 330 and/or operation 332, theapplicant can view the returned screening reports in the displayoperation 318. Exemplary screening reports are displayed in screenshots1100 and 1200 of FIGS. 11 and 12, respectively.

FIG. 15 illustrates exemplary operations 1500 for processing ascreener's use of an applicant screening system. If the screener selectsthe Sign Up option 1502 at the Welcome screen, the screener can create anew account in an account creation operation 1504. The screener canenter relevant identification, login, and password information, and anyother information (collectively, “screener account information”). Anexemplary Create Landlord Account screen 1600 is illustrated in FIG. 16.If the screener selects the Login operation 1506 at the Welcome screen,a login operation 1508 authenticates the screener as a valid user of thesystem. See Login screenshot 1700 in FIG. 17.

After a screener is logged into the system, he or she is presented withvarious options and records of current and historical actions in Displayand Selection operation 1510. See Home screenshot 1800 in FIG. 18. Newlyreceived screening results (e.g., which have not yet been reviewedand/or acted upon by the screener) may be accessed through the “New PINsreceived” section. Previously viewed results may be accessed through the“Previous Applicants” section, which also shows the decisions made bythe screener for each applicant. An “Enter Pin” option allows a screenerto manually enter a personal identification code provided by anapplicant. A Request option allows a screener to request a personalidentification code and, thus, screening results from an individualapplicant.

If the screener elects to request screening results for a potentialapplicant, a Request Services operation 1514 will present the screenerwith a New Request screen (see New Request screenshot 23 of FIG. 23),where the screener can specify the email address of the potentialapplicant. The screener also identifies the screening reports he or sherequires for an application and indicates whether the renter or thelandlord will pay for the screening services. A Payment screenshot 2400is shown in FIG. 24 to process landlord payments. A Request Confirmationscreenshot 2500 is shown in FIG. 25, indicating that the screener'srequest was sent to the applicant associated with the provided emailaddress.

If the screener elects to view results/decisions of previous applicants(e.g., by selecting the hyperlink associated with the applicant's PIN),a screening results page is displayed in review operation 1512 (see, forexample, Results screenshot 2100 in FIG. 21, although the decision isfixed when reviewing results for previous applicants).

If the screener elects to view a newly received PIN, which may have beensubmitted by an applicant on the applicant's own accord or in responseto a request by the landlord, the Screen Applicant operation 1516processes the screener's selection. If the selection was based on amanually entered PIN, the screener can enter the PIN through a screensuch as that shown in Enter PIN # screenshot 1900 of FIG. 19. In themanual-PIN-entry portion of the Screen Applicant operation 1516, thescreener can select whether he or she wants the screening service toprovide a recommendation based on the screening results.

If a recommendation is requested, as determined by a decision operation1518, the screener provides information about that which is applied for,such as an apartment, in a data entry operation 1520. (See the ApartmentInformation screenshot 2000 in FIG. 20.) In an alternative example, theapplicant may be applying for a loan, so the screener may enterinformation about the desired loan or the system may be preconfiguredwith appropriate loan information. Other scenarios may involve jobdescriptions, university entrance requirements, etc.

A modeling operation 1522 applies the screening model to the propertydata and the applicant's screening results. In one implementation, theproperty data is sent to a screening server, which applies aserver-based screening model to the property data and the screeningresults. In another implementation, the screening model is resident onthe screener's computer system, where the model is applied to the data.In addition, this application could occur elsewhere, including atthird-party servers. The modeling operation 1522 generates arecommendation, which is displayed to the screener in display operation1524. See Results screenshot 2100 in FIG. 21.

The screener may select whether to view the screening result reports indecision operation 1526. Report viewing is performed in displayoperation 1528. Otherwise, or after report viewing, the screener entersa decision in decision operation 1530, and the decision is sent to theapplicant in transmission operation 1532 (e.g., by email). See theconfirmation screenshot 2200 in FIG. 22.

FIG. 26 illustrates an exemplary system useful in implementations of thedescribed technology. A general purpose computer system 2600 is capableof executing a computer program product to execute a computer process.Data and program files may be input to the computer system 2600, whichreads the files and executes the programs therein. Some of the elementsof a general purpose computer system 2600 are shown in FIG. 26 wherein aprocessor 2602 is shown having an input/output (I/O) section 2604, aCentral Processing Unit (CPU) 2606, and a memory section 2608. There maybe one or more processors 2602, such that the processor 2602 of thecomputer system 2600 comprises a single central-processing unit 2606, ora plurality of processing units, commonly referred to as a parallelprocessing environment. The computer system 2600 may be a conventionalcomputer, a distributed computer, or any other type of computer. Thedescribed technology is optionally implemented in software devicesloaded in memory 2608, stored on a configured DVD/CD-ROM 2610 or storageunit 2612, and/or communicated via a wired or wireless network link 2614on a carrier signal, thereby transforming the computer system 2600 inFIG. 26 to a special purpose machine for implementing the describedoperations.

The I/O section 2604 is connected to one or more user-interface devices(e.g., a keyboard 2616 and a display unit 2618), a disk storage unit2612, and a disk drive unit 2620. Generally, in contemporary systems,the disk drive unit 2620 is a DVD/CD-ROM drive unit capable of readingthe DVD/CD-ROM medium 2610, which typically contains programs and data2622. Computer program products containing mechanisms to effectuate thesystems and methods in accordance with the described technology mayreside in the memory section 2604, on a disk storage unit 2612, or onthe DVD/CD-ROM medium 2610 of such a system 2600. Alternatively, a diskdrive unit 2620 may be replaced or supplemented by a floppy drive unit,a tape drive unit, or other storage medium drive unit. The networkadapter 2624 is capable of connecting the computer system to a networkvia the network link 2614, through which the computer system can receiveinstructions and data embodied in a carrier wave. Examples of suchsystems include SPARC systems offered by Sun Microsystems, Inc.,personal computers offered by Dell Corporation and by othermanufacturers of Intel-compatible personal computers, PowerPC-basedcomputing systems, ARM-based computing systems and other systems runninga UNIX-based or other operating system. It should be understood thatcomputing systems may also embody devices such as Personal DigitalAssistants (PDAs), mobile phones, gaming consoles, set top boxes, etc.

When used in a LAN-networking environment, the computer system 2600 isconnected (by wired connection or wirelessly) to a local network throughthe network interface or adapter 2624, which is one type ofcommunications device. When used in a WAN-networking environment, thecomputer system 2600 typically includes a modem, a network adapter, orany other type of communications device for establishing communicationsover the wide area network. In a networked environment, program modulesdepicted relative to the computer system 2600 or portions thereof, maybe stored in a remote memory storage device. It is appreciated that thenetwork connections shown are exemplary and other means of andcommunications devices for establishing a communications link betweenthe computers may be used.

In an exemplary implementation, screening kiosk software modules,screener client software modules, screening server software modules, andother modules may be incorporated as part of the operating system,application programs, or other program modules. Screening results,personal identification codes, account information, propertyinformation, decision data, and other data may be stored as programdata.

The embodiments of the invention described herein are implemented aslogical steps in one or more computer systems. The logical operations ofthe present invention are implemented (1) as a sequence ofprocessor-implemented steps executing in one or more computer systemsand (2) as interconnected machine or circuit modules within one or morecomputer systems. The implementation is a matter of choice, dependent onthe performance requirements of the computer system implementing theinvention. Accordingly, the logical operations making up the embodimentsof the invention described herein are referred to variously asoperations, steps, objects, or modules. Furthermore, it should beunderstood that logical operations may be performed in any order, unlessexplicitly claimed otherwise or a specific order is inherentlynecessitated by the claim language.

The above specification, examples and data provide a completedescription of the structure and use of exemplary embodiments of theinvention. Since many embodiments of the invention can be made withoutdeparting from the spirit and scope of the invention, the inventionresides in the claims hereinafter appended.

What is claimed is:
 1. A method comprising: receiving by a screeningservice, an applicant profile that identifies an applicant and anauthorization to provide access to screening results generated by thescreening service based on the applicant profile to a screener;associating, using a computer, an identifier with the screening results;and communicating the identifier to the screener.
 2. The method of claim1, wherein the authorization and the applicant profile are submitted bythe applicant.
 3. The method of claim 1, wherein the screening resultscan be retrieved using the identifier.
 4. The method of claim 1, furthercomprising communicating the identifier to the applicant, wherein theapplicant can access the screening results using the identifier.
 5. Themethod of claim 4, further comprising authenticating an identity of theapplicant prior to communicating the identifier to the applicant.
 6. Themethod of claim 1, further comprising authenticating an identity of theapplicant prior to generating the screening results.
 7. The method ofclaim 1, further comprising generating the screening results based on ascreening selection by the applicant.
 8. A non-transitorycomputer-readable storage medium having computer-executable instructionscomprising: receiving an applicant profile that identifies an applicantand an authorization to provide access to screening results generatedbased on the applicant profile to a screener; associating an identifierwith the screening results; and communicating the identifier to thescreener.
 9. The non-transitory computer-readable storage medium ofclaim 8, wherein the computer-executable instructions further comprisingcommunicating the identifier to the screener in response to receivingthe authorization.
 10. The non-transitory computer-readable storagemedium of claim 8, wherein the computer-executable instructions furthercomprising sending a communication to the applicant in response togenerating the screening results.
 11. The non-transitorycomputer-readable storage medium of claim 8, wherein receiving theapplicant profile further comprises receiving a screening selection froma plurality of screening selections presented to the applicant.
 12. Thenon-transitory computer-readable storage medium of claim 8, wherein thecomputer-executable instructions further comprising generating theidentifier by a screening service.
 13. The non-transitorycomputer-readable storage medium of claim 12, wherein thecomputer-executable instructions further comprising communicating theidentifier to the applicant.
 14. The non-transitory computer-readablestorage medium of claim 8, wherein the computer-executable instructionsfurther comprising authenticating an identity of the applicant beforegenerating the screening results.
 15. A method comprising: receiving bya screening service, a request for screening results and an applicantprofile that identifies an applicant; generating by the screeningservice, the screening results based on the applicant profile; andsending a communication to a screener in response to receiving anauthorization from the applicant, wherein the screening results can beretrieved upon receiving the communication.
 16. The method of claim 15,wherein receiving the request for the screening results furthercomprising receiving a screening selection from a plurality of screeningselections identified by the screener.
 17. The method of claim 15,further comprising authenticating the applicant before generating thescreening results.
 18. The method of claim 15, further comprisingauthenticating the applicant before sending the communication to thescreener.
 19. The method of claim 15, further comprising generating anidentifier and associating the identifier with the communication. 20.The method of claim 19, wherein the screener retrieves the screeningresults using the identifier.