Systems and methods for verifying identities in transactions

ABSTRACT

A computerized method of verifying the identity of an attendant operating a money transfer transaction device includes receiving at the money transfer transaction device a user identification and password from the attendant and receiving at the money transfer transaction device additional information from the attendant. The additional information relates to a security feature that limits access to the transaction device. The method also includes using the additional information, the user identification, and the password to evaluate whether to allow the attendant to operate the transaction device to process a transaction.

CROSS-REFERENCES TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No.13/752,409, filed Jan. 29, 2013, and entitled “SYSTEMS AND METHODS FORVERIFYING IDENTITIES IN TRANSACTIONS,” which is a continuation of U.S.application Ser. No. 10/977,505, filed on Oct. 29, 2004, issued as U.S.Pat. No. 8,386,393, and entitled “SYSTEMS AND METHODS FOR VERIFYINGIDENTITIES IN TRANSACTIONS”, which is a divisional application of U.S.application Ser. No. 10/424,558 filed on Apr. 25, 2003, now abandoned,and entitled “SYSTEMS AND METHODS FOR VERIFYING IDENTITIES INTRANSACTIONS.” The entire disclosures of the above applications areincorporated herein by reference for all purposes.

BACKGROUND OF THE INVENTION

The present invention relates generally to money transfer transactions.More specifically, the present invention relates to verifying theidentity of persons involved in money transfers.

Many people use the services of money transfer service providers to sendfunds to other people. Electronic communication and banking networks nowallow such transactions to have early global reach. Unfortunately, somepeople use the services of money transfer service providers to transfermoney for illegal or unethical purposes. For this and other reasons, itis desirable to provide systems and methods for confirming theidentities of persons involved in money transfers. It is also desirableto provide systems and methods that identify money transfer transactionsthat may be related to one another.

BRIEF SUMMARY OF THE INVENTION

Embodiments of the present invention thus provide a computerized methodof verifying the identity of an attendant operating a money transfertransaction device. The method includes receiving at the money transfertransaction device a user identification and password from the attendantand receiving at the money transfer transaction device additionalinformation from the attendant. The additional information relates to asecurity feature that limits access to the transaction device. Themethod also includes using the additional information, the useridentification, and the password to evaluate whether to allow theattendant to operate the transaction device to process a transaction.

In some embodiments, the step of using the additional information, theuser identification, and the password to evaluate whether to allow theattendant to operate the transaction device to process a transaction mayinclude sending the additional information, the user identification, andthe password to a host computer system and, at the host computer system,comparing the additional information to stored information. The step ofusing the additional information, the user identification, and thepassword to evaluate whether to allow the attendant to operate thetransaction device to process a transaction may occur at the moneytransfer transaction device. The step of receiving additionalinformation may include displaying a stored attendant name together witha question asking the attendant if the stored attendant name is the nameof the attendant and receiving a response to the question from theattendant. The step of receiving additional information may includereceiving information from an identification tool of the attendant. Theidentification tool may be a card encoded with machine-readableinformation. The card may be selected from a group consisting ofproximity card, smart card, identification card, and card having amagnetic stripe. The identification tool may include a tool thatgenerates a code, in which case the step of receiving additionalinformation may include receiving the code from the attendant and thestep of using the additional information, the user identification, andthe password to evaluate whether to allow the attendant to operate thetransaction device to process a transaction may include generating averification code and comparing the verification code to the code.Receiving additional information may include receiving a biometricfeature of the attendant. The biometric feature may be selected from agroup consisting of DNA, fingerprint, retinal image, voice print, andfacial image. Receiving additional information may include receiving abiometric image from an identification card relating to the attendant.The identification card may be selected from a group consisting ofdriver's license, passport, picture identification card, biometric card,and government-issued identification card. The method also may includelimiting the attendant's access based on information specific to atransaction being processed by the attendant.

In another embodiment, a method of obtaining identification informationfrom an individual involved in a transaction includes enteringtransaction-related information into a transaction processing device.The transaction information includes information relating to theidentity of the individual. The method also includes receiving a promptvia the transaction processing device to enter identificationinformation and entering identification information. The identificationinformation may verify the information relating to the identity of theindividual. The method also includes processing the transaction. Themethod may include storing at least a portion of the transaction-relatedinformation and at least a portion of the identification information ina transaction record as transaction information. The method also mayinclude comparing the transaction information to information obtainedfrom a credit reporting agency. The method also may include comparingthe transaction information to information obtained from anidentification information company. The method also may includecomparing the transaction information to similar information in othertransaction records. The method also may include comparing thetransaction information to information in a list provided by lawenforcement authorities. The step of processing the transaction mayinclude aborting the transaction. The identification information mayinclude a biometric feature of the sender. The transaction-relatedinformation may include information relating to a receiver in thefinancial transaction. The identification information may be entered byinputting information into the transaction processing device. Theidentification information may be entered by inputting information intoa peripheral device associated with the transaction processing device.The identification information may include a security code obtained froman identification tool. The method also may include comparing thesecurity code to a verification code generated by the transactionprocessing device.

In still other embodiments, a system for obtaining identificationinformation from an operator of a transaction processing device includesa host computer system and a transaction processing device. Thetransaction processing device is programmed to receive a useridentification and password from the operator and receive additionalinformation from the operator. The additional information may relate toa security feature that limits access to the transaction device. Thetransaction processing device also is programmed to transmit at least aportion of the information to the host computer system. The hostcomputer system is programmed to use the additional information, theuser identification, and the password to evaluate whether to allow theoperator to operate the transaction device to process a transaction.

In yet another embodiment, a system for obtaining identificationinformation from a party to a transaction includes a host computersystem and a transaction processing device. The transaction processingdevice is programmed to receive transaction-related information,including information relating to the identity of the party. Thetransaction processing device also is programmed to receiveidentification information from the party. The identificationinformation may relate to a biometric feature of the party. Thetransaction processing device also is programmed to transmit at least aportion of the information to a host computer system. The host computersystem may be programmed to store the transaction-related informationand the identification information as transaction information andcompare the transaction information to similar information relating toother transactions. The host computer system also may be programmed tocompare the transaction information to information in a list provided bylaw enforcement authorities.

BRIEF DESCRIPTION OF THE DRAWINGS

A further understanding of the nature and advantages of the presentinvention may be realized by reference to the remaining portions of thespecification and the drawings wherein like reference numerals are usedthroughout the several drawings to refer to similar components.

FIG. 1 illustrates a system for processing money transfers according toembodiments of the present invention.

FIG. 2 illustrates a method of verifying identities and identifyingrelated transactions according to the present invention.

DETAILED DESCRIPTION OF THE INVENTION

According to the present invention, money transfer service providersemploy systems and methods to identify individuals involved in moneytransfer transactions and/or to relate transactions that otherwiseappear unrelated. Herein, “provider” or “service provider” will refer toa money transfer service provider. For example, “provider” may refer toan entity such as Western Union of Englewood, Colo., whose moneytransfer service is well known. Additionally, “associate” will refer toentities that a money transfer service provider may enlist to accomplishthe service. For example, third parties, such as merchants, financialinstitutions, and the like may be “associates.” Herein “attendant” willrefer to someone with whom a customer interacts in the transactionprocess. For example, an attendant may be an employee of a provider orassociate. An attendant typically operates a transaction processingdevice, entering information received from the customer and/or relatedto a transaction. Further, although the phrase “money transfer” will beused herein to refer to the type of service provided, that phrase willbe understood to mean any financial transaction involving “value,” whichmay include money, credits, customer loyalty points, other units ofmeasure, and the like.

Although the present invention will be described primarily in thecontext of money transfers, other types of transactions also may benefitfrom the teachings herein. Thus, transactions to which the presentinvention applies may include money order purchases and/or redemptions,traveler's check purchases and/or redemptions, sending money to arecipient, receiving money from a sender, and the like.

The process of “wiring” money is well known. Briefly, a sender presentshimself to a service provider or associate and provides value, usuallycash, to an attendant. Some service providers now even allow senders totransfer money by logging on to a web site and initiating moneytransfers using credit cards or other accounts. In either case,information is entered into a record that is received at a host computersystem. The record includes information that identifies the sender, therecipient, and the amount of money being transferred, among otherthings. The recipient then presents himself to a receive site of aprovider or associate to obtain the money or other value. An attendantat the receive site verifies the identity of the receiver and gives thereceiver the value.

At the sending end of the transaction, the transaction information maybe collected in any number of ways. In some cases, the information iscollected by a point-of-sale device specifically designed for moneytransfer transactions. The device may be operated by an attendantemployed by the provider or an associate. In another case, theinformation may be collected using a computing device runningapplication software specifically designed for money transfertransactions. In yet another case, the information may be collected byphone when an attendant contacts a customer service representative (CSR)of the provider. The attendant is able to verify the sender'sinformation and collect funds while the CSR enters the information intoa transaction record. It also may be the case that the transaction isinitiated by an associate who then must contact a CSR because thetransaction exceeds certain thresholds. In yet another example, thecustomer provides some information to a CSR at a remote location whilealso entering some information into a transaction processing device by,for example, “swiping” a card through a reader on the device. Otherexamples are possible.

For a number of reasons, identity verification is a significant aspectto the money transfer process. For example, in one instance, it isimportant to verify the identity of the sender. In an attempt to thwartillegal or unethical money transfers, it is helpful to confirm theidentity of a sender, especially on transfers over certain valuethresholds. Transfers over the thresholds may require the provider toobtain additional information from the sender. In some cases, theinformation may be compared to a list of known or suspected criminals.If a sender is a known criminal, identifying transactions initiated bythe individual may provide security and law enforcement personnelassistance in stopping criminal activity such as money laundering,criminal activity funding, and tax evasion. Further, some individualsmay attempt to avoid detection by segmenting a single money transferinto multiple smaller transfers below the thresholds. Thus, providersmay employ measures described herein to relate transactions that mightotherwise appear unrelated.

In another instance, it is important to verify the identity of personsperforming the transaction, particularly attendants employed by aprovider or an associate. The equipment used in money transfertransactions may be subject to misuse to perform illegal transactions.For this reason, it is important to verify the identity of those usingthe equipment.

For the foregoing reasons, the present invention provides systems andmethods to identify potentially related transactions and to verify theidentities of those involved in money transfer transactions, both assending parties, receiving parties, and as transaction device operators(e.g., attendants).

Attention is directed to FIG. 1, which illustrates a money transfersystem 100 according to embodiments of the present invention. The system100 includes a host computer system 102 and a network 104. The hostcomputer system 102 may include, for example, server computers, personalcomputers, workstations, web servers, and/or other suitable computingdevices. The host computer system 102 includes application software thatprograms the host computer system 102 to perform one or more functionsaccording to the present invention. For example, application softwareresident on the host computer system 102 may program the host computersystem 102 to process money transfer records according to embodiments ofthe present invention. The host computer system 102 may include one ormore of the aforementioned computing devices, as well as storage devicessuch as databases, disk drives, optical drives, and the like. Thestorage devices may include solid state memory, such as RAM, ROM, PROM,and the like, magnetic memory, such as disc drives, tape storage, andthe like, and/or optical memory, such as DVD. The host computer system102 may be fully located within a single facility or distributedgeographically, in which case a network may be used to integrate thehost computer system 102. Many other examples are possible and apparentto those skilled in the art in light of this disclosure.

The network 104 may be the Internet, an intranet, a wide area network(WAN), a local area network (LAN), a virtual private network, anycombination of the foregoing, or the like. The network 104 may includeboth wired and wireless connections, including optical links. In someembodiments, the network 104 is a transaction processing network.Through the network 104, transaction devices communicate with the hostcomputer system 102.

The system 100 also includes one or more Point-of-Sale (POS) devices106. POS devices are more fully described in U.S. patent applicationSer. No. 09/634,901, filed on Aug. 8, 2000, the entire disclosure ofwhich is incorporated herein by reference for all purposes. Essentially,POS devices are terminals for receiving transaction information andsending the information to a host computer system. For example, a POSmay receive transaction information by capturing it from a card using areader integral to or associated with the POS. A POS also may receiveinformation from an attendant or customer via a keypad, keyboard, and/orother input device. Other examples are possible. POS devices aretypically located at associate or provider locations offering moneytransfer services.

The system 100 also may include one or more computing devices 108programmed to receive money transfer information from customers orattendants. Like the POS devices 106, the computing devices I 08 may belocated at associate locations.

The system also may include one or more Customer Service Representative(CSR) computers 110. The CSR computers 110 may be located, for example,at a call center operated by the service provider or an associate. TheCSR computers 110 function much like the POS devices I 06 and thecomputing devices I 08, except that transaction information is enteredby a CSR who is receiving the information from a customer by phone, forexample. In some examples, a voice response unit may receive some or allof the information.

The system 100 also includes one or more receiving sites 112 from whichcustomers may receive funds. The receive sites 112 may be associatelocations equipped with a POS 106 or computing device 108. The receivesites also may be automated teller machines, kiosks (which are morefully described in U.S. patent application Ser. No. 10/225,410, filed onAug. 20, 2002, the entire disclosure of which is incorporated herein byreference for all purposes), merchant store fronts, bank accounts,stored value accounts, and/or the like.

According to the present invention, a customer presents himself to amoney transfer location. The location may be equipped with either a POSdevice 106, a computing device 108, or other suitable transactiondevice. The location may be operated by the provider or an associate. Anattendant receives information from the customer and verifies itaccording to embodiments of the present invention. The attendant alsoenters the information into the transaction device. In the process, theattendant may need to enter his own identification information to enablethe device. If necessary, the attendant contacts a CSR to complete thetransaction. The attendant also collects the money from the customer.

Once entered into a record, the transaction information may be comparedwith information in other transaction records to attempt to identifypotentially related transactions. Identity information collected in thecourse of identifying the sender may be used for this purpose. Ifpotentially related transactions are identified, they may be flagged forincreased scrutiny.

One specific scenario relating to tracking transactions deserves moredetailed explanation. In this scenario, a customer initiates atransaction by providing an attendant with transaction information. Theattendant enters the information into a transaction device, aspreviously described. When the attendant attempts to complete thetransaction, a message alerts the attendant that the transaction must becompleted by a CSR. This may be because the transaction exceeds certainthresholds or otherwise triggers a flag. Thus, the attendant contacts aCSR who also collects the transaction information from the customer andwho may ask the customer for additional information. If at any time thecustomer elects to abort the transaction, any information collected upto that point may be stored for future use. The theory being that thecustomer may, in the future, attempt to avoid the flag that triggeredthe need for the additional information. For example, the customer mayattempt to initiate several smaller transfers from different moneytransfer locations to avoid a trigger based on the amount of thetransaction. By storing the unprocessed transaction record, the providermay search other transactions for similar information and identify anyfound as being potentially related to the aborted transaction.

Having described a system according to the present invention, theremainder of this description will focus on methods for verifying theidentity of persons operating money transfer equipment and the identityof those sending money.

Confirmation of Identity of Persons Performing a Transaction (e.g.,Associate Personnel)

The identities of persons operating transaction devices (i.e.,attendants) may be confirmed in a number of ways. In a first example,the attendant may be required to use an identification tool that may besupplied by the provider. The identification tool either suppliesinformation that the attendant enters into the transaction device, orthe identification tool itself may be swiped or otherwise interfaced tothe transaction device. This may be combined with entering a user ID andpassword, in some examples. In a basic example, the attendant swipes acard with a magnetic stripe through a reader on the transaction deviceor associated with it. The stripe may include the attendant's user IDand password or other information known only to the user. Thetransaction device then may prompt the attendant to enter a user IDfollowed by a password. If the information is not consistent, is notrecognized, or does not match information on record (e.g., stored at ahost computer system), the attendant may be denied access to the device.Of course, the steps of swiping a card, entering a user ID, andentering-a password may be carried out in other orders than describedabove.

It is not necessary that the identification tool be a card with amagnetic stripe supplied by the provider. In other examples, the toolmay be any card used by the attendant that the attendant elects to useas his identification card for this purpose. During an enrollmentprocess, the attendant elects the card he will use, and his user ID andpassword are associated with information read from the card. Theinformation is then saved in an access file at either the host computersystem or the transaction device for later comparison to informationentered by the attendant at the time access is requested. For example,the card may be one of the attendant's credit cards, his driver'slicense, passport, or the like. In other examples, the identificationtool may be a card with other magnetic encoding properties, such as aproximity card (i.e., a card or other device that transfers informationwhen held in proximity to a reader), or it may be a card with a barcode,a smart card, or the like. In still other examples, the tool is not acard but is a biometric feature of the attendant such as hisfingerprint, retinal image, facial features, voice print, DNA, or thelike. In yet another example, the tool itself generates information thatis either displayed to the attendant or entered into the transactiondevice. The information may be unique each time the attendant attemptsto access the device. The information may be generated by an algorithmand compared to information generated at the host computer system or thetransaction device using the same algorithm. If the information does notmatch, then the attendant is denied access.

The identity verification process may be preceded by a registrationprocess wherein information about an attendant is verified, biometricinformation is obtained, identification cards are selected, and/or thelike. For example, during registration, the provider may verify that theattendant actually works for an associate who has authorized theattendant to process transactions. In some examples, a background checkis performed on the attendant that may include residence and citizenshipverification, criminal background checks, credit verification, and thelike. The registration information may then be saved for later useduring identity verification associated with a transaction. In someexamples, registration includes establishing an attendant'scertification level, as will be described further below.

In order to make the process less cumbersome, attendants may be requiredto provide the information periodically, instead of every day or everytransaction. For example, an attendant may be “audited” only once aweek, after a particular number of transactions, upon demand by theprovider, and/or after a particular dollar volume of transactions. Inthe case of audits performed on demand, the audit may be on allattendants in a state, all attendants in an associate's network, allattendants at a particular location, or on only selected attendants. Inthe case of audits performed periodically, an attendant may be requiredto provide the audit information only after a timeout betweentransactions or a series of transactions. Audits may be locationspecific and may be controlled (i.e., called for) by the provider, anassociate, or other entity. The audit may be prompted by either thetransaction device or the host computer system. In response to an auditprompt, an attendant may be required to provide any of the identifyinginformation explained above. In some examples, the audit may simply be aquestion displayed to the attendant asking, “Are you John Doe?” wherein“John Doe” may be a name stored in an access file and related to theuser ID and/or password entered by the attendant. Other such examplesare possible.

In some examples, the identification tools may enable user-levelprivileges. For example, if an associate issues its employees ID cards,those ID cards may function as an identification tool. However, theassociate of the provider may specify the level of access allowed eachindividual user. Some users may not have access. Others may have accessonly during certain times of the day or for only transactions belowcertain value thresholds. The thresholds may be cumulative during aperiod of time, such as a shift, a day, a week, a pay period, or thelike. Some users may be allowed to process only certain types oftransactions.

Identification systems also may be combined with certification trainingto restrict access to attendants based on their level of training.Training may be accomplished in a number of well known ways, and accessfiles relating to each attendant may be updated as an attendant receivesadditional training. In some embodiments, the certification levels maybe established so as to mirror regulatory training and certificationrequirements. Thus, systems such as the present invention may be used todemonstrate compliance with the regulations.

The verification of attendant information may take place at the hostcomputer system level or at the transaction device level. If at the hostlevel, individual attendant information may be associated with aparticular transaction device or devices. Thus, when the devicetransmits the identification information to the host, it also transmitsits own identification information. If the attendant is not authorizedto use the device, the attendant is denied access. In another example,the transaction device itself performs the identification verificationprocess. This reduces the amount of information that must be transmittedback to the host computer.

In yet another example, the attendant may be asked to enter his fullname and/or an answer to a secret question using an alphanumerickeyboard or a number pad associated with the transaction device. Thismay be used in combination with a user ID and/or password.

In another example, the attendant's facial biometric may be imaged atthe time the attendant registers. The facial biometric may be obtainedfrom the attendant directly or from a document of the attendant, such asa driver's license or passport. The image is then saved 30 in an accessfile at the host or at the transaction device. When the attendantattempts to execute a transaction, the transaction device may obtainanother image of the attendant's facial biometric, either from theattendant directly or from his identification document. The new image iscompared to the image taken during enrollment, and, if dissimilar, theattendant is asked for additional information or is denied access to thetransaction device. In some embodiments, the image comparison may bedone automatically using a software algorithm or the like. In otherexamples, the comparison may be accomplished manually by an individual.A similar process may be employed that uses the attendant's voicepattern as the biometric. A verification voice sample may be obtainedduring registration and stored for comparison to a sample obtainedduring a transaction. A microphone associated with a transaction devicemay receive a voice sample from the attendant during a transaction andcompare the two. Methods for digitizing and comparing voice samples areknown.

Another method for limiting access to transaction devices would bethrough the use of location-specific cards. In a manner similar to theuse of other identification cards, each attendant could be issued a cardspecific to transaction devices at the location at which the attendantworks. The card may be configured using, for example, positiondetermination features, such that the card only works inside thefacility. Transaction devices may be similarly enabled to only functionat a specified location. In another example, the transaction devices mayrequire the entry of a location-specific identification number orcharacter string upon startup. Thus, if the device is stolen, the numbermust be entered before the device will operate.

Confirmation of Identity of a Party to a Transaction

Customers desiring to perform transactions may be identified in a numberof ways, and the type of identification information collected may betriggered by specifics of the transaction. For example, differentidentification information may be collected depending on the type oftransaction, the number and value of transactions originating from thesame sender, even if from different locations or providers, the value ofthe transaction, the origin location of the transaction, the destinationof the transaction, the customer's history of transactions using theprovider, the number and value of transactions sent to the samereceiving party, and the like. Identification information may includebiometric information, such as the customer's fingerprint, retinalimage, facial features, voice print, DNA, or the like. The transactiondevice also may scan a picture identification of the customer, such asthe customer's driver's license or passport photo. The biometric orphoto identification information may be stored at the host computersystem for comparison to future transactions and/or compared to nationalor international databases of suspect individuals.

In another example, identification information supplied by the customermay be compared to identification information relating to the customerfrom a credit reporting agency or other entity that provides identifyinformation. If the information is not consistent, the transaction maybe denied or additional information may be required from the customer.

Attention is now directed to FIG. 2, which illustrates a method 200 ofverifying identities and identifying related transactions according toembodiments of the present invention. The method may be implemented inthe system 100 of FIG. 1 or other suitable system. At block 202, anattendant logs into the transaction device. The transaction device maybe a POS, a computing device, or other suitable transaction device, aspreviously described. Logging on to the device may involve merelypowering up the device. However, logging on also may involve entering alocation identification number, entering a user ID and/or password,answering a secret question, entering biometric information, swiping acard, using a proximity card, and the like, all of which procedures wereexplained previously.

At block 204, any information entered by the attendant is verified,either by the transaction device itself or by sending information to ahost computer system. If the information is accepted, the attendant isgranted access to the transaction device. It may be the case, that thehost computer system or the transaction device itself determines that anaudit of the attendant is necessary, in which case the attendant isasked to provide additional information as previously described.

At block 206, the transaction device may be verified. For instance, thetransaction device itself or the host computer system may verify thatthe transaction device is operating properly and from an authorizedlocation. This may include determining that the device is connected toan authorized network or that the device's physical location is withinan allowed range using a positioning system or the like.

At block 208, the attendant collects transaction information from acustomer. This may include the customer's name and address, the amountof money involved in the transaction, the recipient's name and address,and the like. This operation also may involve obtaining biometricinformation from the customer. In some examples, some or all of theinformation may be provided by the customer via a phone call to a CSR.Thus, a partial transaction record may exist for a transaction when thecustomer presents himself to the provider or associate location.

At block 210, the attendant's authorization to process the transactionis verified. This may involve verifying the attendant's level oftraining, the attendant's level of authorization, the attendant'sidentification information, and/or the like. If not previously obtainedor if sufficient time has passed, this operation may involve collectingidentification information from the attendant, including biometricinformation, as necessary. If the attendant is not authorized to processthe transaction, then a different attendant or a CSR may be required tocomplete the transaction.

At block 212, it is determined whether additional information is neededfrom the customer and the information is collected. Depending on thelocation from which the transaction originates, the purpose or type oftransaction, the destination to which the transaction is directed, theamount of the transaction, and/or other criteria, additional informationmay be required from the customer. The additional information mayinclude the customer's date of birth, social security number and/or taxidentification number, occupation, the type of identification thecustomer has presented to verify his identity, the place theidentification was issued, and/or the like. The additional informationalso may include biometric information as previously described.

At block 214, it is determined whether a CSR is required to complete thetransaction. Again, depending on the type of transaction, the amount ofthe transaction, the originating location of the transaction, thedestination of the transaction, and/or other criteria, a CSR may berequired to complete the transaction.

At block 216, the CSR is contacted and the CSR obtains the necessaryinformation from either the attendant or the customer. At block 218, thetransaction is processed.

Information collected from the customer may be saved into a transactionrecord at any point in the process described above, even if thetransaction is not completed. In fact, if a customer aborts atransaction upon being asked to provide additional information, this maybe an indication that the transaction relates to fraudulent or illegalactivity. Thus, even incomplete transaction records are saved forfurther evaluation according to embodiments of the present invention. Itmay also be the case that the transaction warrants or requires thecompletion of a suspicious activity report that then may be transmittedto security and/or law enforcement authorities. Such reports andprocesses for creating them are more fully described in previouslyincorporated U.S. Patent Application No. 60/465,967.

At block 218, transaction information from various transaction recordsare evaluated and compared. By doing so, providers are able to identifypotentially related transactions. The transactions may be relatedbecause they involve the same sender, the same recipient, the sameorigin and destination, and/or the like. The comparisons may beaccomplished by comparing transaction information, includingidentification information relating to the sender, such as the sender'sname and address, identification numbers, biometric information, and/orthe like. If transactions are found to be related, it may be determinedthat the transactions were specifically crafted by the sender to attemptto avoid detection, which may be an indication of illegal or fraudulentactivity. Thus, upon detection of such related transactions according tothe present invention, providers may alert appropriate authorities.

Upon detection of information that warrants further investigation, anumber of things may happen. For example, the host computer system maysend an alert to the location where the transaction originated, eitherthrough the transaction device or otherwise, that a suspicious activityreport needs to be processes. This alert may be in real time or may bedelayed. In some cases, the host computer system may retain thetransaction information for further comparisons. In some examples, thehost computer system may send a message via the transaction processingdevice that the customer needs to contact the provider to complete thetransaction. In still other examples, the host computer system may alertthe attendant to contact the provider with a transaction number that thehost computer supplies via the transaction device. Thus, while thecustomer is still at the location, the attendant can answer questionsfrom the provider relating to the transaction and the identity of thecustomer. In any of the aforementioned examples, the transaction may bedenied or suspended until other steps are taken, such as verification ofthe sending party's identity.

Identification information relating to parties to transactions also maybe saved for comparison to future transactions and/or may be compared tolists of suspect individuals provided by authorities. Lists of suspectindividuals, may be maintained locally at transaction devices or onservers or computing devices at associate locations. Alternatively,these databases may be located at a host computer system. In eithercase, the lists may be updates periodically, as needed. Block 218 alsoincludes these types of comparisons.

Having described several embodiments, it will be recognized by those ofskill in the art that various modifications, alternative constructions,and equivalents may be used without departing from the spirit of theinvention. Additionally, a number of well known processes and elementshave not been described in order to avoid unnecessarily obscuring thepresent invention. For example, those skilled in the art know how toarrange computers into a network and enable communication among thecomputers. Additionally, those skilled in the art will realize that thepresent invention is not limited to wire transfer transaction. Forexample, the present invention may be used to verify identities in othertransactions, such as money order purchases, value card redemptions,other exchanges, or value, and the like. Accordingly, the abovedescription should not be taken as limiting the scope of the invention,which is defined in the following claims.

What is claimed is:
 1. A method of obtaining identification informationfrom an individual involved in a transaction, the method comprising:receiving, from a transaction processing device, identificationinformation associated with the individual; comparing the receivedidentification information with previously stored identificationinformation to authenticate the received identification information;transmitting, to the transaction processing device, an authenticationmessage indicating authentication of the received identificationinformation; receiving, from the transaction processing device,transaction information associated with the individual; retrieving,based at least in part on the received identification information, otherrelated transaction information of previous transactions; determining,that the received transaction information triggers a flag for exceedinga threshold amount based at least in part on the other relatedtransaction information; in response to determining that the receivedtransaction information triggers the flag, outputting, to thetransaction processing device, a message indicating a need foradditional information for completing the transaction; receiving, fromthe transaction processing device, the additional information;authorizing the transaction based at least in part on a positiveauthentication of the additional information; and processing thetransaction based at least in part on the positive authentication. 2.The method of claim 1, wherein the previously stored identificationinformation comprises information relating to the identity of theindividual to information obtained from a credit reporting agency. 3.The method of claim 1, wherein the previously stored identificationinformation comprises information relating to the identity of theindividual with information obtained from an identification informationcompany.
 4. The method of claim 1, wherein the previously storedidentification information comprises information relating to theidentity of the individual with information in a list provided by lawenforcement authorities.
 5. The method of claim 1, wherein the receivedidentification information comprises a username or password.
 6. Themethod of claim 1, wherein the received identification informationcomprises a code generated by a physical device.
 7. The method of claim1, wherein the received identification information comprises a code thatis generated by a physical device associated with the individual andtransmitted by the transaction processing device.
 8. The method of claim1, wherein the received identification comprises a code generated by aphysical device and the additional information comprises biometricinformation.
 9. A non-transitory computer-readable storage medium havingstored thereon instructions for causing at least one computer system toobtain identification information from an individual involved in atransaction, the instructions comprising: receiving, from a transactionprocessing device, identification information associated with theindividual; comparing the received identification information withpreviously stored identification information to authenticate thereceived identification information; transmitting, to the transactionprocessing device, an authentication message indicating authenticationof the received identification information; receiving, from thetransaction processing device, transaction information associated withthe individual; retrieving, based at least in part on the receivedidentification information, other related transaction information ofprevious transactions; determining, that the received transactioninformation triggers a flag for exceeding a threshold amount based atleast in part on the other related transaction information; in responseto determining that the received transaction information triggers theflag, outputting, to the transaction processing device, a messageindicating a need for additional information for completing thetransaction; receiving, from the transaction processing device, theadditional information; authorizing the transaction based at least inpart on a positive authentication of the additional information; andprocessing the transaction based at least in part on the positiveauthentication.
 10. The non-transitory computer-readable storage mediumof claim 9, wherein the previously stored identification informationcomprises information relating to the identity of the individual toinformation obtained from a credit reporting agency.
 11. Thenon-transitory computer-readable storage medium of claim 9, wherein thepreviously stored identification information comprises informationrelating to the identity of the individual with information obtainedfrom an identification information company.
 12. The non-transitorycomputer-readable storage medium of claim 9, wherein the previouslystored identification information comprises information relating to theidentity of the individual with information in a list provided by lawenforcement authorities.
 13. The non-transitory computer-readablestorage medium of claim 9, wherein the received identificationinformation comprises a username or password.
 14. The non-transitorycomputer-readable storage medium of claim 9, wherein the receivedidentification information comprises a code generated by a physicaldevice.
 15. The non-transitory computer-readable storage medium of claim9, wherein the received identification information comprises a code thatis generated by a physical device associated with the individual andtransmitted by the transaction processing device.
 16. The non-transitorycomputer-readable storage medium of claim 9, wherein the receivedidentification comprises a code generated by a physical device and theadditional information comprises biometric information.
 17. A system forobtaining identification information from an individual involved in atransaction, comprising: one or more processors; and a memory coupledwith the one or more processors, the memory configured to storeinstructions that when executed by the one or more processors cause theone or more processors to: receive, from a transaction processingdevice, identification information associated with the individual;compare the received identification information with previously storedidentification information to authenticate the received identificationinformation; transmit, to the transaction processing device, anauthentication message indicating authentication of the receivedidentification information; receive, from the transaction processingdevice, transaction information associated with the individual;retrieve, based at least in part on the received identificationinformation, other related transaction information of previoustransactions; determine, that the received transaction informationtriggers a flag for exceeding a threshold amount based at least in parton the other related transaction information; in response to determiningthat the received transaction information triggers the flag, output, tothe transaction processing device, a message indicating a need foradditional information for completing the transaction; receive, from thetransaction processing device, the additional information; authorize thetransaction based at least in part on a positive authentication of theadditional information; and process the transaction based at least inpart on the positive authentication.
 18. The system of claim 17, whereinthe previously stored identification information comprises informationrelating to the identity of the individual to information obtained froma credit reporting agency.
 19. The system of claim 17, wherein thepreviously stored identification information comprises informationrelating to the identity of the individual with information obtainedfrom an identification information company.
 20. The system of claim 17,wherein the previously stored identification information comprisesinformation relating to the identity of the individual with informationin a list provided by law enforcement authorities.