Data verified deposits

ABSTRACT

A system and method for verifying account ownership using verified deposits. An ACH verification platform may recognize or detect a verification process involving microdeposits. A verification platform may receive and store user login, initiate the deposits, and monitor the user&#39;s account to verify that posting of the deposits was successful. In embodiments, a dedicated web form or portal may be provided for receiving verification information.

INCORPORATION BY REFERENCE TO ANY PRIORITY APPLICATIONS

This application is a continuation of U.S. patent application Ser. No. 16/042,618, filed Jul. 23, 2018 and titled “DATA VERIFIED DEPOSITS,” which application claims priority to U.S. Patent Application No. 62/535,860, filed Jul. 22, 2017 and titled “DATA VALIDATED DEPOSITS,” the contents of which is incorporated by reference in its entirety. Any and all applications for which a foreign or domestic priority claim is identified in the Application Data Sheet as filed with the present application are hereby incorporated by reference under 37 CFR 1.57.

BACKGROUND

NACHA, previously known as the National Automated Clearinghouse Association, recommends that account ownership be verified prior to initiating ACH transfers to or from customer accounts. Trial deposits are widely viewed as the safest and most effective way to verify account ownership, but they provide a poor customer experience and have ongoing limitations.

Traditional trial deposit methods require a customer to submit their account number and routing number to a service provider. The service provider then makes one (or several) small “random” deposits into the customer's account based on the information provided. The customer then checks the amounts of the deposits made by the service provider when they are posted to their account, which typically takes one to two business days. The customer then verifies the amounts back to the service provider, proving that they have access to the account.

However, these trial deposits are often unattractive to consumers, who are required take multiple steps, i.e., initiating the trial deposit, verifying multiple times that the deposit has been made, and then verifying the deposit back to the merchant or financial institution. Multi-step verification can also reduce the success verification rate, which can lead to lost opportunities for service providers.

Accordingly, there is a need for an account verification system that reliably permits verification with a single user action, obviating the need for the user to return to the service provider to verify deposits.

There is a further need for an account verification system that enables verification of an account held by a financial institution that is unable or unwilling to provide account numbers through their client web portals.

BRIEF DESCRIPTION OF THE DRAWINGS

The features and advantages of the present disclosure will be more fully understood with reference to the following detailed description when taken in conjunction with the accompanying figures, wherein:

FIG. 1 is a logical block diagram describing a preferred embodiment of the present invention.

FIG. 2 is a process diagram describing the steps in an exemplary embodiment of the present invention.

FIG. 3 is a block diagram describing an exemplary system architecture that may be used to implement one or more illustrative aspects described herein.

SUMMARY

In embodiments of the invention a method is described comprising the steps of associating a customer account to a third-party service provider; receiving, during associating of the customer account, at least one credential; retrieving, after associating of the customer account, account data for the customer account; initiating a trial deposit to the customer account; retrieving ongoing data about the customer account directly from the financial institution, including the current balance and transactions data; and verifying, upon identifying the trial deposit, the customer account.

In further embodiments of the invention, a non-transitory computer-readable medium is described, having stored thereon, computer-executable instructions that, if executed by a computing device, cause the computing device to perform a method comprising the steps of associating a customer account to a third-party service provider; receiving, during associating of the customer account, at least one account verification credential; retrieving, after associating of the customer account, account data for the customer account; initiating a trial deposit to the customer account; retrieving ongoing data about the customer account directly from the financial institution, including the current balance and transactions data; and verifying, upon identifying the trial deposit, the customer account.

In still further embodiments, a data verification deposit system is described comprising at least one user computing device comprising a processor, memory, and storage, configured to initiate associating a customer account to a third-party service provider, the customer account associated with a financial institution, The data verification system may further include a server computing device configured to receive at least one account verification credential and to retrieve, after associating of the customer account, account data for the customer account directly from the financial institution. In embodiments, the server computing device is further configured to initiate a trial deposit to the customer account, to retrieve ongoing data about the customer account directly from the financial institution, and to verify, upon identifying the trial deposit, the customer account.

In embodiments, the customer account is an account associated with a financial institution, and the account data is retrieved directly from the financial institution. In embodiments, at least one account verification credential includes the customer's account number and routing number or the customer's user ID and password.

In embodiments, the account data for the customer account includes the current balance or transaction data.

DETAILED DESCRIPTION

In embodiments of the invention, a system and method is provided for customer accounts to be verified with a single user action minimizing the need for the customer to return to the service provider to verify the deposit amounts.

Referring to FIG. 1, a logical block diagram is shown describing a preferred embodiment of the present invention. One or more user computing devices 110 a . . . 110 n may be in communication with a verification platform 120 via a wide-area network such as the Internet. A financial institution web site 130 may be associated with a financial institution data store 132 via a network link such as a local area network 140. Financial institution website 130 may similarly be in communication with the verification platform 120 via a wide-area network such as the Internet.

In embodiments, verification platform 120 functions as a bridge or gateway between the user computing devices 110 a . . . 110 n and the financial institution web site 130 (and associated a financial institution data store 132) to facilitate account verification with minimized user involvement.

FIG. 1 illustrates just one example of a logical framework that may be used, and those of skill in the art will appreciate that the specific implementation is secondary to the functionality that the system components provide.

Process Flow

Referring to FIG. 2, a process diagram is shown describing the steps in an exemplary embodiment of the present invention.

In a preferred embodiment, a user initiates (210) a process that requires verifying the user's external account so that the account is associated with the financial services platform. Certain financial services platforms (e.g., PayPal, Venmo, bank bill pay, loan payments, etc.) may permit ACH payments, deposits, or withdrawals to or from an external account, often only after the user verifies the external account. In embodiments, during the verification process the user may be requested to enter their login credentials for the financial services provider holding the account to be associated, along with the account number and routing number.

In embodiments, the user computing device or the verification platform may recognize or detect (220) a verification request that initiates the verification process of the present invention. In embodiments, the financial institution web site may use a specially configured form to initiate the verification process of the present invention. In still further embodiments a browser plugin, system service, web widget, or even a dedicated mobile app may trigger the verification process. In embodiments, an API may be provided to provide a connection between the financial services provider and the verification platform of the present invention.

A user may then log in (230) to the financial institution web site per usual, with the user's normal login credentials. The user's login credentials and/or banking information such as account and routing number may then be transmitted (240) to the verification platform for storage.

The verification platform may then take steps to verify the user's account using the saved login credentials. In embodiments, the verification platform may initiate a trial deposit (250) using the account and routing numbers gathered from the user.

The verification platform may then monitor the user's financial services account by logging in on a periodic basis and verifying (260) the user's transaction history. When the microdeposit made in the prior step is identified as cleared, the verification platform may then verify (270) the account.

The account verification may then be transmitted (280) to the user computing device or financial services provider.

In embodiments, account aggregation may also be used to limit user involvement in the verification process. For example, in some cases a financial institution may permit account and routing numbers to be retrieved upon authenticating user credentials via a financial institution's client web portal. However, for cases where user credentials provide access to financial institution data, but do not permit retrieval of account and routing number information, the verification method described herein may be utilized.

System Architecture

FIG. 3 describes an exemplary system architecture that may be used to implement one or more illustrative aspects described herein. Computer software, hardware, and networks may be utilized in a variety of different system environments, including standalone, networked, remote-access, virtualized, and/or cloud-based environments, among others.

In embodiments, a user may engage with the system via one or more user computing devices connected to the network. Referring to FIG. 3, exemplary computing devices may include personal computer 310. In embodiments other computing devices may be utilized—alternatively or in concert—including tablet computer 312, mobile device 314, and similar devices.

In embodiments, computing device 310 may be a personal computer, a server, a network router, switch or bridge, virtual assistant (e.g., Amazon Alexa, Google Home, Apple HomePod), digital media player (e.g., Amazon Fire, AppleTV, Roku, Google Chromecast, Roku), smartwatch, a set-top box (STB), gaming system, or any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that computing device.

While only a collection of computing devices are illustrated, the term “computing device” should be taken to include any collection of computing devices that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methodologies discussed herein.

In embodiments, the computing device may be connected (e.g., networked) to other machines in a LAN, an intranet, an extranet, a WiFi network, a cellular network, or the Internet (WAN) 470. In embodiments, computing device 310 (and also 312, 314) may be provided with a web browser for facilitating connections over the network.

In embodiments of the present invention, a browser plugin may be provided on computing device 310 to carry out the steps described in FIGS. 2-3. The term “plugin” refers to any software component that extends the functionality of the user's existing system.

In further embodiments, computing device 310 may be provided with an app that implements the methodologies discussed herein. In embodiments of the invention, a software development kit (“SDK”) may be provided to facilitate development of mobile apps (or other software) to run operate with the system of the present invention.

In embodiments, the system of the present invention may include one or more web servers 320, each connected to a financial information database or data storage device 330. In embodiments, the computing device may be connected (e.g., networked) to other machines in the same manner as the computing device 310 (and also 312, 314), namely, in a LAN, an intranet, an extranet, a WiFi network, a cellular network, or the Internet.

In embodiments, the system of the present invention may include a verification platform server 350 and associated cloud storage 360. The verification platform server 350 may contain code that implements the synchronization steps shown in FIG. 2 discussed herein. Cloud storage 360 may be a data storage device, which can be configured as a server computing service, for receiving user data during synchronization. Synchronizations server 360 may be function as an intermediary system between a user and financial institution, and coordinate the steps of accessing, storing, and processing user FI data.

As shown in FIG. 3, various nodes including those associated with a network—including 310, 320, 330, 340—may be interconnected using a wide area network (WAN) 370, such as the Internet. Other networks may also or alternatively be used, including private intranets, corporate networks, LANs, metropolitan area networks (MAN) wireless networks, personal networks (PAN), and the like. Network 370 is for illustration purposes and may be replaced with fewer or additional computer networks. A local area network (LAN) may have one or more of any known LAN topology and may use one or more of a variety of different protocols, such as Ethernet. Devices—including 310, 312, 314—may be connected to one or more of the networks via ethernet cable, coaxial cable, fiber optic cable, wireless communication protocols utilizing radio waves (including, e.g., WiFi and Bluetooth), or other communication media.

It will be understood that the term “network” refers not only to systems in which remote storage devices are coupled together via one or more communication paths, but also to stand-alone devices that may be coupled, from time to time, to such systems that have storage capability. Consequently, the term “network” includes not only a “physical network” but also a “content network,” which is comprised of the data—attributable to a single entity—which resides across all physical networks.

It will be understood by those of ordinary skill in the art that computing devices, server computing devices, and data storage may be combined on the same physical machines, and retain separate virtual or logical addresses, or may reside on separate physical machines. FIG. 3 illustrates just one example of a network architecture that may be used, and those of skill in the art will appreciate that the specific network architecture and data processing devices used may vary, and are secondary to the functionality that they provide, as further described herein. For example, services provided by web server 320 and data server 330 may be combined on a single server.

Each component node on the network may be any type of known computer, server, or data processing device. User computing devices and servers may include a processor controlling overall operation of the computing device or server. These devices may further include random access memory (RAM), read-only memory (ROM), network interface, input/output interfaces (e.g., keyboard, touchscreen, mouse, display, printer, etc.), and memory.

Memory may also store data used in performance of one or more aspects described herein, including the databases associated with the servers discussed herein. Information can be stored in a single database, or separated into different logical, virtual, or physical databases, depending on system design. Those of skill in the art will appreciate that the functionality of user computing devices and servers described herein may be spread across multiple data processing devices, for example, to distribute processing load across multiple computers, to segregate transactions based on geographic location, user access level, quality of service, etc.

One or more aspects may be embodied in computer-usable or readable data and/or computer-executable instructions, such as in one or more program modules, executed by one or more computers or other devices as described herein. Generally, program modules include routines, programs, objects, components, data structures, etc., that perform particular tasks or implement particular abstract data types when executed by a processor in a computer or other device. The modules may be written in a source code programming language that is subsequently compiled for execution, or may be written in a scripting language such as (but not limited to) scripting or markup languages. The computer-executable instructions may be stored on a computer-readable medium such as a nonvolatile storage device. Any suitable computer-readable storage media may be utilized, including hard disks, CD-ROMs, optical storage devices, magnetic storage devices, and/or any combination thereof. In addition, various transmission (non-storage) media representing data or events as described herein may be transferred between a source and a destination in the form of electromagnetic waves traveling through signal-conducting media such as metal wires, optical fibers, and/or wireless transmission media (e.g., air and/or space). Various aspects described herein may be embodied as a method, a data processing system, or a computer program product. Therefore, various functionalities may be embodied in whole or in part in software, firmware and/or hardware or hardware equivalents such as integrated circuits, field programmable gate arrays (FPGA), and the like. Particular data structures may be used to more effectively implement one or more aspects described herein, and such data structures are contemplated within the scope of computer-executable instructions and computer-usable data described herein.

Although the foregoing invention has been described in detail for purposes of clarity of understanding, it will be apparent that certain changes and modifications may be practiced within the scope of the appended claims. Therefore, the described embodiments should be taken as illustrative and not restrictive, and the invention should not be limited to the details given herein but should be defined by the following claims and their full scope of equivalents. 

1. (canceled)
 2. A computer-implemented method comprising: by a financial institution computing device comprising a first one or more processors and first memory storing executable instructions executable by the first one or more processors: receiving, from a user, and storing account login credentials associated with a user account; verifying, using the account login credentials, the user account; and providing the account login credentials to a verification platform computing device; and by the verification platform computing device comprising a second one or more processors and second memory storing executable instructions executable by the second one or more processors: receiving the account login credentials from the financial institution computing device; obtaining, by accessing the user account using the account login credentials and via the financial institution computing device, an account number and a routing number associated with the user account; depositing an amount to the user account using the account number and the routing number; monitoring the user account using the account login credentials and via the financial institution computing device, wherein monitoring the user account comprises periodically accessing the user account and obtaining a transaction history of the user account; identifying, from the transaction history of the user account, the deposit amount; and in response to identifying the deposit amount, verifying the user account.
 3. The computer-implemented method of claim 2, wherein the verifying of the user account comprises verifying the user account via at least one of: a browser plugin, system service, web widget, or mobile application.
 4. The computer-implemented method of claim 2, wherein monitoring the user account is accomplished via an application programming interface.
 5. The computer-implemented method of claim 2 further comprising, by the verification platform computing device: storing the account login credentials.
 6. The computer-implemented method of claim 2 further comprising, by the verification platform computing device: transmitting an indication of verification of the user account to a user computing device or the financial institution computing device. 