WO2021180284A1 - Kyc analysing system - Google Patents

Kyc analysing system Download PDF

Info

Publication number
WO2021180284A1
WO2021180284A1 PCT/DK2021/050072 DK2021050072W WO2021180284A1 WO 2021180284 A1 WO2021180284 A1 WO 2021180284A1 DK 2021050072 W DK2021050072 W DK 2021050072W WO 2021180284 A1 WO2021180284 A1 WO 2021180284A1
Authority
WO
WIPO (PCT)
Prior art keywords
kyc
customer
dataset
information
user
Prior art date
Application number
PCT/DK2021/050072
Other languages
French (fr)
Other versions
WO2021180284A8 (en
Inventor
Mathias Bjerg KOBBERUP
Ronni Holmberg BASLUND
Peter Miro Hauge JENSEN
Original Assignee
Creditro A/S
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Creditro A/S filed Critical Creditro A/S
Publication of WO2021180284A1 publication Critical patent/WO2021180284A1/en
Publication of WO2021180284A8 publication Critical patent/WO2021180284A8/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance

Definitions

  • the present invention relates to a KYC system and a method for a KYC handling pro cess.
  • Know Your Customer, KYC is the process of verifying the identity of a clients and assessing their suitability, along with the potential risks of illegal intentions towards a relationship.
  • Know your client processes are also employed by companies of all sizes for the purpose of ensuring that their proposed customers, agents, consultants, or dis tributors are anti-bribery compliant and are actually who they claim to be.
  • Banks, in surers, export creditors, lawyers, accountants and other financial institutions are in creasingly demanding that customers provide detailed due diligence information.
  • KYC The objective of KYC is to prevent businesses (financial and non-fmancial) from be ing used, intentionally or unintentionally, by criminal elements for money laundering activities. Related procedures also enable businesses to better understand their cus tomers and their financial dealings. Today not only the banks but also different busi nesses can implement KYC.
  • the present invention addresses this by providing a computer-implemented method of KYC real-time handling process in a KYC system, comprising acts of: a) receiving a request from a user via a user interface provided on a user computing device, b) generating a customer ID case file comprising a customer ID related to said request, from said user, saving the customer ID case file in the KYC in at least one KYC data base, c) retrieving at least one information dataset related to said customer ID from one or more information databases, connecting said information dataset to said customer ID, d) processing at least one KYC analysing sequence in said KYC system, wherein the KYC analysing sequence is processing at least one of said information dataset in rela tion to the customer ID, e) generating at least one KYC documentation file comprising at least one KYC cus tomer ID dataset and said information dataset, and saving the KYC documentation file in said at least one KYC database on at least one KYC computer-readable storage me dium, f) monitoring said customer ID and said information dataset in the KYC
  • the KYC stands for Know Your Customer. It is a procedure that takes place online to verify an individual’s and/or company’s identity. Fulfilling the KYC identification requirement may be mandatory for anyone who wishes to be part of cooperation with a company, which performs the KYC process.
  • the KYC process minimizes the risk of fraud, by identifying suspicious elements earlier on in the customer-business relation ship lifecycle.
  • a customer/user may be defined as for example a person or entity that maintains an account and/or has a business rela- tionship with the reporting entity, such as a bank or a business.
  • the KYC system may be a KYC real-time handling processing system, which com prises a processing unit.
  • the KYC system is in communication with a user via a user interface and/or other users of the KYC system.
  • the KYC system is configured to access a plurality of information databases.
  • the KYC system is configured continually to monitor the information databases.
  • the information databases are monitored in a real time process.
  • the KYC system is configured to change data rapidly and then pro vides output instantaneously such that the change over time can be seen very quickly.
  • the KYC real-time handling processing is a method that is used when data input re- quests need to be dealt with quickly.
  • the KYC system is provided as a real-time KYC system, comprising a KYC real-time handling process.
  • the KYC system receives a request from a user via a user interface provided on a computing device, such as a mobile device, ipad, personal computer etc.
  • the request automatically generates a customer ID and a customer ID case file related to the user’s request.
  • the customer ID case file is stored in the KYC system’s data base or databases.
  • the user enters data information regarding a person and/or a com pany, who requests the cooperation.
  • the data information related to the person and/or company is provided in at least one basic customer ID dataset related to the customer ID.
  • the basic customer ID dataset is stored in said customer ID case file in at least one KYC database on a KYC computer-readable storage medium.
  • the data information related to the person and/or company may be a company name and ID number, an address, phone number and an e-mail etc.
  • the data fetching process starts retrieving at least one customer ID information dataset, which is relevant in rela tion to the customer ID.
  • the data fetching refers to the process of automatically re trieving the customer ID information dataset related to the customer ID through inter nal and/or external information databases.
  • the data fetching process is a part of the KYC analysing sequence.
  • the information databases may comprise information, such as governmental information, company information, credit information and/or person al information etc.
  • the information databases may be one or more of following data bases: Governmental, Social Media, Public, Personal, Corporative, Documental, Black listed, Watch listed, News Media, Banking, and temples etc.
  • the customer ID infor mation dataset may be an array of information datasets comprising varying infor mation regarding the customer ID, since the data information is retrieved from a varie ty of different information databases on one or more information computer-readable storage medium.
  • the customer ID information dataset or datasets related to the customer ID is stored in the customer ID case file in said KYC database on a KYC computer-readable storage medium.
  • the basic customer ID dataset and/or the customer ID information dataset or datasets is at least one customer ID questionary file related to the customer ID gener- ated.
  • the user provides the customer ID questionary file with information.
  • the KYC real-time handling process identifies at least one key user related to said customer ID from the basic customer ID dataset and/or customer ID information da taset or datasets.
  • the key user dataset related to the key user is stored in the customer ID case file.
  • the key user may be the user, who initially provided the request. Alterna tively, the key user may not be the user, who did initially provide the request or the user may be one of a plurality of key users.
  • the KYC real-time handling process sends the customer ID questionary file to the key user, and the KYC real-time handling process may authorize the key user and/or pro vide the key user with a login, which directs the key user directly to the customer ID questionary file.
  • the key user may enter the customer ID questionary file from a com puting device, such as a mobile device, notebook, personal computer etc.
  • a com puting device such as a mobile device, notebook, personal computer etc.
  • the questionary can only be accessed and completed by the key user who is granted the liability for the company. If more key users are to be contacted, each has access to a questionary related to the specific key user.
  • the KYC handling process may re trieve the completed customer ID questionary file.
  • the completed customer ID ques tionary file comprises at least one collected information dataset related to the customer ID.
  • the customer ID questionary file and the completed customer ID questionary file may be stored in the KYC database in relation to the customer ID and/or the cus tomer ID case file.
  • a KYC analysing se quence related to the customer ID is activated.
  • the analysing sequence may be based on collected information dataset, but also the basic customer ID dataset and the basic information dataset.
  • the KYC customer ID dataset or datasets comprise data infor mation in relation to the customer ID in the aspects of: financial information, fraud information, risk assessment and/or anti-money laundry etc.
  • KYC documentation file is stored in said KYC database on a KYC com puter-readable storage medium.
  • the KYC documentation file may be accessible for the end user through an end user interface provided on the end user’s computing de- vice.
  • the KYC documentation file may be sent to the end user through an end user program, such as a finance program, a customer management program or a customer portal etc.
  • the KYC handling process monitors the activity related to the customer ID, both in the customer ID case file and the external databases, by starting at least one surveillance sequence.
  • the surveillance sequence may search for any changes in the dataset related to the customer ID and/or the key user or key users. For example, by monitoring of the basic customer ID dataset and the customer ID information dataset in the databases, searching for dataset variation in the datasets is provided in a real-time surveillance process.
  • the surveillance sequence may detect one or more dataset variation in the basic customer ID dataset and/or the customer ID information dataset in the databases in relation to the basic customer ID dataset and the customer ID information dataset received and stored in the customer ID case file.
  • the KYC real-time handling process evaluates if there is a need to provide a new KYC documentation file.
  • the KYC real-time handling process may provide information to the end users, when the end user may need to apply for a new updated KYC documentation file.
  • One act of the KYC real-time handling process after generating a customer ID related to said request may for example be creating a customer ID case file and retrieving at least one basic customer ID dataset related to said customer ID and storing said basic customer ID dataset in said customer ID case file in at least one KYC database.
  • a further act follows retrieving at least one information da taset related to said customer ID from one or more information database.
  • the infor mation dataset may be related to a customer ID information dataset.
  • An act may follow thereafter, for example generating at least one customer ID ques- tionary file related to said basic customer ID dataset and/or said customer ID infor mation dataset. Both the basic customer ID dataset and/or customer ID information dataset may be included in the information dataset.
  • a further act may be identifying at least one key user related to said customer ID and sending said customer ID question ary file to said key user, where the key user assesses said customer ID questionary file using a key user computing device.
  • the KYC real-time handling process may comprise an act of retrieving at least one completed customer ID questionary file from the key user comprising at least one collected information dataset related to said customer ID.
  • the collected in- formation dataset may also be included in the information dataset.
  • KYC real-time handling process may comprise an act of generating a KYC documentation file comprising at least one KYC customer ID da taset using said analysing sequence.
  • the KYC documentation file is sent to the end user.
  • the KYC real-time handling process comprises an act of monitoring said customer ID case file using at least one surveillance sequence, where the surveillance sequence is searching for at least one dataset variation when comparing at least one retrieved in formation dataset in relation to at least one of said information dataset in the infor mation databases.
  • the KYC real-time handling process may provide the end user that the customer ID comprises new information and a KYC documentation file or part of a KYC documentation file may be required by the end user.
  • the invention comprises following act of retrieving at least one key user profile dataset related to a key user, and storing said key user profile dataset in the customer ID case file, and retrieving an identification information of said key user by means for identification, wherein said key user profile dataset and/or the identification information is capable of identifying said key user.
  • the key user may provide data infor mation regarding the key user’s profile for verification purpose.
  • At least one key user profile dataset is related to the key user.
  • the key user profile dataset may be generated when the basic customer ID dataset related to the customer ID case is requested by the user or provided from the customer ID information dataset.
  • the invention comprises following act:
  • the KYC real-time handling process retrieves at least one document dataset and at least one image dataset from an image capturing device.
  • the image dataset may be provided in the key user profile dataset.
  • the KYC handling process may verify the identity of said key user from the document dataset and said image dataset in relation to said key user profile dataset.
  • the document dataset may comprise for example name and address etc. related to the key user, where the image dataset may be an im age related to a physiologically / biometrics expression of the key user.
  • the key user may enclose evidence based on information, identity and documents, which belong to the key user.
  • the key user may provide one or more of following biometrics Decision- tions, such as speech sample to be analysed in speech recognition, DNA sample for DNA-matching, an image of the face to be analysed in face recognition etc.
  • the key user may use the microphone provided in the key user’s computing device in order to provide a speech sample.
  • the key user may use the camera provided in the key user’s computing device in order to provide an image / picture of the key user’s face.
  • a key user profile file may comprise document dataset and/or key user profile dataset.
  • the key user profile file may be stored in the KYC database.
  • the KYC real-time handling process may perform a reliability check that the infor- mation, identity and documents are correct and match the key user.
  • the key user may also be verified based on second information dataset and key user profile dataset.
  • the validity of the key user may also be provided through matching the data information retrieved from relevant authorities.
  • the invention comprises fol lowing act of accessing the KYC documentation file provided in a KYC database, using an end user access via a user interface provided on an end user’s computing device.
  • the end user may access the KYC database on the KYC computer-readable storage medium, where the KYC documentation file is located. Only the KYC documentation file may be accessible for the end user through an end user interface provided on the end user’s computing device.
  • the documentation file may be sent to the end user through an end user program, such as a finance program, a customer man agement program or a customer portal or an e-mail etc.
  • the invention comprises following act of a feedback loop sequence, where the feedback loop sequence is activated when the surveillance sequence detects dataset variation in at least one of said information dataset, where the feedback loop sequence activates said KYC analysing sequence.
  • the KYC surveillance process is monitoring amendments in the basic customer ID dataset and the customer ID information dataset in the databases. If one or more of the customer ID information dataset in the databases are amended in relation to the basic customer ID dataset and the customer ID information dataset stored in the customer ID case file, the customer ID may be analysed again accordant to the new information available.
  • the KYC system may also be configured to handle a feedback sequence comprising a feedback loop process.
  • the monitoring of the basic customer ID dataset and the customer ID information dataset in the databases are provided in a real-time surveillance process, which may activate the feedback sequence, when dataset chang es in the customer ID case occur.
  • a company may change many information regarding the company, for example the address of the company, the company name, the board of directors, the director, the chief executive officer, or other highest-ranking person in a company etc.
  • a threshold may be arranged. For example, if an amendment is made, and detected dur- ing monitoring the customer ID, the feedback loop processes may have a “build in” delay to ensure all the changes are made before starting a process of identifying, au thorizing, verifying and/or analysing the customer ID.
  • the KYC may also comprise a screening feature, such as politically exposed persons, PEP, and/or relatives and close associates, RCA, screenings.
  • a screening feature such as politically exposed persons, PEP, and/or relatives and close associates, RCA, screenings.
  • PEP personal electronic property
  • RCA relatives and close associates
  • a RCA screening may also comprise a screening in relations to the social and eco nomic situation of relatives and close associates. Financial institutions often monitor RCAs as part of a screening process. The tendency for friends and family to be in- volved in, or drawn into, financial crimes may be perpetrated by others.
  • the KYC system may also be provided with means for reporting crimes or other issues to the authorities.
  • the KYC system may access the authorities’ system directly, wherein the KYC system is providing a report file.
  • a KYC real-time handling processing system comprising means for carrying out one or more KYC real-time handling processing acts, using
  • At least one customer ID case file related to a customer ID requested by a user - at least one KYC database on at least one KYC computer-readable storage medium to store customer ID case file comprising at least a customer ID and at least one basic customer ID dataset related to said customer ID,
  • At least one information database on at least one information computer-readable stor age medium comprises customer ID information dataset related to the customer ID, - a processing unit configured to process the basic customer ID dataset and/or custom er ID information dataset using an analysing sequence.
  • the KYC real-time handling processing system is in data communication with the KYC database on the KYC computer-readable storage medium and the information database on the information computer-readable storage medium.
  • the processing means may be capable of accessing files comprising dataset or datasets located in at least one KYC computer-readable storage medium.
  • the processing means may be capable of accessing files comprising dataset or datasets related to the customer ID located in at least one information computer-readable storage medium.
  • the processing means may be capable of storing customer ID case file comprising at least a customer ID and at least one basic customer ID dataset related to the customer ID in the KYC database on a KYC computer-readable storage medium.
  • the KYC real-time handling processing system is in data communication with at least one information computer-readable storage medium, where the information computer- readable storage medium may comprise files having customer ID information dataset related to the customer ID.
  • the processing means may retrieve the customer ID in- formation data sets and store the customer ID information dataset in the customer ID case file located in the KYC database.
  • the processing unit may be configured to process the basic customer ID dataset and/or customer ID information dataset using an analysing sequence, providing KYC customer ID dataset or datasets, which is stored in a KYC documentation file in the KYC database.
  • the KYC real-time handling processing means may be in wired or wireless data communication with the KYC computer-readable storage medium means, so the data processing means have access to the customer ID, basic customer ID dataset, first in formation dataset and the second information dataset located customer ID case file in the KYC computer-readable storage medium.
  • the data processing means have also access to the document dataset and the key user profile dataset which may also be located in a customer ID case file or a key user profile file in the KYC computer- readable storage medium.
  • the data processing means have access to customer ID questionary file and the completed customer ID questionary file in the KYC comput er-readable storage medium.
  • the data processing means may be in wired or wireless data communication with the KYC computer-readable storage medium means, so the data processing means have access to the KYC customer ID dataset or datasets located KYC documentation file in KYC computer-readable storage medium.
  • the processing means may also be in data communication with at least one user inter face provided on a user computing device and an end user interface provided on an end user computing device.
  • the data communication may be wired or wireless.
  • the processing unit monitors the basic customer ID dataset and/or customer ID information dataset using a surveil lance sequence.
  • the processing unit may be configured to process the basic customer ID dataset and/or customer ID information dataset using a surveillance sequence, where the pro cessing unit processing the customer ID, basic customer ID dataset, customer ID in formation dataset located customer ID case file in KYC computer-readable storage medium, relative to the customer ID information dataset in the information computer- readable storage medium, to search for dataset variation.
  • the processing unit de tects at least one dataset variation in the basic customer ID dataset and/or customer ID information dataset activating a feedback loop sequence.
  • the processing unit may be configured to process a feedback loop sequence.
  • the feedback loop sequence is processed when at least one dataset variation is detected in the surveillance sequence.
  • the processing unit repeats predefined KYC real-time handling processing acts related to the altered or new dataset or datasets provided in the customer ID information datasets.
  • Computer program product comprising instructions for generating at least one KYC documentation file which, when said computer program product is executed by a computer, causes the computer to carry out acts of:
  • the computer program product may further comprise instructions, when detecting an amendment in the basic customer ID dataset and/or customer ID information dataset causes the computer to carry out acts of activating a feedback loop sequence.
  • the computer program product may still further comprise instructions, where said computer program product is a sub product of another computer program product, such as being an application or a module to a main computer program product.
  • the computer program product may further comprise instructions, where one or more executable computer program products is in data communication with said data pro cessing means, computer-readable storage medium and at least one user interface, where said computer program product controls the data communication between a customer ID case file related to said customer ID to and from said user interface, by using data processing means, where said computer program product is in data com munication with at least one remote computer product.
  • a computer-readable storage medium contains instructions to generate at least one dataset or datasets, when the instructions are executed in a KYC real-time handling processing system to perform the acts.
  • a computer-readable storage medium may contain instructions to configure a readable and writable KYC database on a computer-readable storage medium, comprising in structions, where said readable and writable KYC database provides a storage for at least one customer ID case file, where at least customer ID case file contains at least one basic customer ID dataset related to said customer ID, where an key user using an key user interface to access to said customer ID case file.
  • the computer-readable storage medium may also comprise instructions for processing at least one analysing sequence.
  • the computer-readable storage medium may also comprise instructions for processing at least one surveillance sequence.
  • the computer- readable storage medium may also comprise instructions for processing a feedback loop sequence.
  • Computer readable storage medium having stored thereon dataset or datasets provided by a readable KYC real-time handling processing system according to one or more of claims 6 to 8 provided by the acts.
  • a computer-readable storage medium where said readable and writable KYC data base provides a storage for at least one KYC documentation file, where said KYC documentation file contains at least one KYC customer ID dataset related to the cus- tomer ID, where an end user using an end user interface to access said KYC documen tation file.
  • the KYC database may be an allocated database on a computer-readable storage me- dium.
  • the computer-readable storage medium may be provided as a cloud solution or an external or internal storage solution.
  • the information database or databases may be eternal storage solutions or cloud solutions.
  • a rigorous and robust KYC real-time handling process seeks to verify and validate the customer's identity and test the customer's profile, business and account activity.
  • the KYC real-time handling process identifies relevant adverse information and risk, as sesses the potential for money laundering and/or terrorist financing to support action able decisions to mitigate against financial, regulatory and reputational risk and ensure regulatory compliance.
  • the KYC real-time handling process is fast and agile, provid- ing always the customers’ status in a given moment in time.
  • Fig. 1. A block diagram illustrating an overview of a KYC real-time handling process
  • Fig. 2. A block diagram illustrating an overview of the KYC data flow.
  • Fig 3. A block diagram illustrating request from a user and retrieving information from a plurality of databases.
  • Fig. 4. A block diagram of the main KYC process.
  • Fig. 5. A block diagram of the questionary process.
  • Fig. 6. A block diagram of the verification process.
  • Fig. 7. A block diagram of the analytics process.
  • Fig. 8. A block diagram of the feedback loop process.
  • Fig 9 A block diagram illustrating the entire KYC processes. Detailed Description of the Invention
  • Fig. 1 is a block diagram illustrating an overview of a KYC real-time handling pro cess.
  • the present invention addresses this by providing a computer-implemented method of KYC real-time handling process using a KYC real-time handling system.
  • the KYC real-time handling processing system comprises means for carrying out one or more KYC real-time handling processing acts.
  • the KYC real-time handling system com prises a KYC database on at least one KYC computer-readable storage medium.
  • the KYC real-time handling processing system is capable of retrieving and transmitting data to and from user, key users and/or end user through interfaces.
  • the KYC real time handling processing system is in communication with a plurality of information databases, which comprise information regarding the users.
  • the KYC system is a real-time operating system intended to serve real-time applica- tions that process data as it comes in, preferably without too much buffer delays.
  • the information database which is stored on at least one information computer- readable storage medium comprises customer ID information dataset related to the customer ID.
  • the KYC system is in data communication with the information data base.
  • the processing unit in the KYC system is configured to process the customer ID dataset and/or customer ID information dataset using the KYC analysing sequence, when executed on the computer.
  • the processing unit is configured to monitor the basic customer ID dataset and/or said customer ID information dataset using a KYC surveillance sequence.
  • the processing unit is also configured to detect at least one dataset variation in the basic customer ID dataset and/or said customer ID information dataset.
  • the processing unit is also configured to activate a feedback loop sequence, such that the monitoring is repeated continually.
  • the KYC real-time handling process is based on following acts:
  • the KYC real-time handling system receives a request from a user via a user interface provided on a user computing device.
  • the KYC real-time handling process medially generates a customer ID related to said request required.
  • the KYC real-time handling process retrieves at least one information dataset related to said customer ID from one or more information databases, for example #1, #2 and #3.
  • the KYC system is configured to process a KYC analysing sequence.
  • the KYC real time handling process system processes at least one KYC analysing sequence related to the customer ID, based on at least one of said information dataset retrieved from the information databases and from the user.
  • the result of the KYC analysing sequence is to provide a KYC documentation file comprising data information in relation to the customer ID in the aspects of: financial information, fraud information, risk assess ment and/or anti-money laundry etc.
  • the KYC documentation file is sent to the end user.
  • the KYC real-time handling process comprises an act of monitoring said customer ID using at least one KYC surveillance sequence, to detect any dataset variations between the retrieved information dataset, which is used in the analysing sequence, and infor- mation dataset registered in the information databases. If an available information dataset is changed in the information database the surveillance sequence will detect a data variation.
  • the KYC system is configured to process a KYC surveillance sequence and/or a feedback loop sequence.
  • the KYC surveillance sequence is searching for at least one dataset variation in a continuing real-time process.
  • the KYC surveillance sequence will activate a feedback loop sequence.
  • the feedback loop sequence will start a process of retrieving new infor- mation datasets from the databases and/or activates the analysing sequence.
  • the pur pose of activating the feedback loop sequence is to provide the end user with the up dated information in the aspects of: financial information, fraud information, risk as sessment and/or anti -money laundry etc.
  • the feedback may also loop back to other acts, such as the acts of receiving information.
  • the feedback may also loop back to acts which include new or partly new or amended questionary file, which the key user must access to handle the outstanding issues.
  • Fig. 2 shows a block diagram illustrating an overview of the KYC real-time handling processes.
  • the KYC system receives a request from a new and probably a not known user via a user interface provided on a computing device, such as a mobile device, ipad, personal computer etc.
  • the request automatically generates a customer ID and a customer ID case file related to the user’s request where the case is created 1.
  • the user fills out a form wherein the basic data from the form is stored as a basic customer ID dataset in the customer ID case file.
  • the customer ID case file is stored in the KYC database.
  • the data fetching 2 retrieves the customer ID information dataset from the extern in formation databases 3.
  • the customer ID information dataset is stored with reference to the customer ID.
  • Person/owner identification 4 is an identification of the user logging into the KYC system.
  • the user preferably a key user, is provided access using a se cure login 5, where the key user may require access to the customer ID questionary file 6.
  • the key user may receive the customer ID questionary file 6.
  • the key user may complete a completed customer ID questionary file.
  • the customer ID questionary file and the completed customer ID questionary file are stored in the KYC database with reference to customer ID.
  • the key user is re quired to provide documentation for identification and verification 7 of the key user.
  • the key user provides documentation such as an image of the face, for example using a picture from a pass port or driver licence or other similar identifications which can be used to identify a person such as a key user .
  • a document dataset comprises text information and a key user pro file dataset comprises physiologically / biometrics information.
  • the document dataset and key user profile dataset are located in a key user profile file.
  • the key user profile file is stored in the KYC database with reference to customer ID.
  • an analysing sequence 8 related to the customer ID is activated.
  • the analysing sequence 8 is based on collected information dataset, which comprises all the data information retrieved earlier in the KYC process, also the basic customer ID dataset and the basic information dataset.
  • the analysing sequence 8 pro vides KYC customer ID dataset or datasets, which is located in a KYC documentation file.
  • the KYC documentation file is stored in the KYC database with reference to customer ID.
  • the KYC documentation file can be accessed by the end user using an end user computing device.
  • the surveillance sequence 9 has access to all the datasets located in all the files stored in the KYC database.
  • the feedback loop sequence 9a is activated by the surveillance sequence 9, and is substantially similar to a pointer of the looping process.
  • the pointer indicates were to restart the KYC real-time handling process when a dataset variation occurs.
  • Fig 3 shows a block diagram illustrating request from a user and retrieving infor mation from a plurality of databases.
  • the KYC system is in data communication with a plurality of databases, and configured to retrieve information from the databases.
  • the KYC system is also in data communication with a user’s using of the KYC sys tem through a user interface.
  • the KYC system is configured to receive a request from a user.
  • a customer ID case is created when requested from a user related to customer ID.
  • the customer ID case may be created based on information regarding a person and/or a company.
  • the person and/or company’s basic information is entered into the form giving access to create a case.
  • the user uses a user interface to apply for an approval in an end user company.
  • the user who applies for an approval may or may not be a key user or company to be in vestigated. If a person is to be investigated, the person may be the key user. If a com pany is to be investigated, the key user may be one or more key users to be investigat ed, such as one or more of following: the company itself, the board of directors, the director, the chief executive officer, or other highest-ranking person in a company or other institution, ultimately responsible for taking managerial decisions etc.
  • Data fetching refers to the process of automatically retrieving at least one basic customer ID dataset related to the customer ID through internal and external databases.
  • a case is created by the KYC real-time handling process based on a request from a user, a customer ID case and a customer ID is provided. Then the data fetching process starts retrieving the customer ID information dataset, which is rele vant for the customer ID.
  • the customer ID information dataset is retrieved from different information databases having different types of information regarding the customer ID.
  • the infor mation databases may comprise information, such as governmental information, com pany information, credit information and/or personal information etc.
  • the databases may be one or more of following databases: Governmental, Social Media, Public, Per sonal, Corporative, Documental, Black listed, Watch listed, News Media, Banking, Telephone and temples etc. Furthermore, databases comprising risk assessment within countries, industries and/or companies etc.
  • the data information is stored in a customer ID information dataset in the customer ID case file.
  • Fig. 4 illustrates a block diagram of the main KYC process.
  • the main KYC process refers to following blocks:
  • the key user must be identified and authorized before a questionary related to the customer ID can be accessed.
  • the questions in the questionary are provided in relation to the basic customer ID dataset and/or the customer ID information dataset.
  • the questionary can only be accessed and completed by the key user in a company or an owner. If more key users are to be contacted, each has access to a questionary re lated to the specific key user.
  • the key user or key users are verified accordant to the customer ID. The key user or key users must by authenticated using identification to be able to access the questionary, for example using a national, international and/or a personal login meth od.
  • the questionary will automatically be sent out to an email or the questionary is accessible on a computer-readable storage medium in a database.
  • the database will be accessible for the key user through a key user interface, such as for example a mobile device or a computer device or similar.
  • the questionary is then completed by the key user.
  • a verification of the key user must enclose information, identity and docu ments, which belong to the key user and that the information, identity and documents are correct.
  • the key user may be identified by using one or more of following biomet rics verifications, such as speech recognition, DNA-match, face recognition etc.
  • the key user may also be identified using an identification comprising an image of the face, for example a pass port or driver licence, if comprising an image.
  • the validity of the key user is provided through matching the data information retrieved from relevant authorities. If the data information does not match an error will be detected and notifi cation will be sent to the key user, end user and/or a supporting unit. If the verification tion of the key user is approved the process will continue.
  • the KYC handling process comprises an analytics process comprising an analysing sequence, where all the information retrieved is analysed in relation to the aspects of: financial information, fraud information, risk assessment and/or anti money laundry etc.
  • the KYC documentation file may be accessible for the end user through an end user interface. Alternatively, the documentation file may be sent to the end user through an end user program, such as a finance program, a customer management program or a customer portal etc.
  • the KYC documentation file provided for the end user may be available in a format with is easy to handle.
  • a pdf-file or similar is easy for the end user to retrieve and print. Also if the file is retrievable through a link to a website or other download options. 9)
  • the surveillance process is monitoring amendments in the basic customer ID dataset and the customer ID information dataset in the databases.
  • the key user must be investigated again accordant to the new information available.
  • the monitoring of the basic customer ID dataset and the customer ID in formation dataset in the databases is provided in a real-time surveillance process.
  • Fig. 5 illustrates a block diagram of the key user questionary process.
  • the KYC sys tem automatically generates the questionary, which is dedicated the key user.
  • the KYC system may generate the questionary only accessible for the key user through a key user interface.
  • the questions in the questionary are provided in relation to the basic customer ID dataset and/or the customer ID information dataset.
  • the question ary can only be accessed and completed by the key user.
  • the questionary is generated and stored on a dedicated computer-readable storage medium.
  • the questionary is re- lated to the customer ID case file with the customer ID related to the key user.
  • a mes sage may be sent to the key user, informing the key user that the questionary is availa ble for the key user to complete.
  • the questionary can only be accessed and completed by the key user.
  • the questionary is generated and stored on a dedicated computer-readable storage medium.
  • the ques tionary is related to the customer ID case file with the customer ID related to the key user.
  • a message may be sent to the key user, informing the key user that the question ary is available for the key user to complete. If more key users are to be contacted, each has access to a questionary related to the specific key user.
  • a key user interface such as a mobile application 6B, desktop application 6C, e-mail 6D, system to system data communication 6E and/or text messing 6F etc.
  • the KYC process will move on to next step of the process, which is verification of the key user.
  • Fig. 6 illustrates a block diagram of the key user verification process. A verification of the key user must enclose information, identity and documents, which belong to the key user and that the information, identity and documents are correct.
  • the key user may be identified by using means of identification.
  • the means of identi- fication may be one or more of following biometrics verifications 7 A, such as finger printing, speech recognition, face and/or body recognition, DNA analyses, behaviour al biometric etc.
  • the key user may also be identified by using one or more of following documents available, and linking the documents to the key user and to the basic customer ID da taset of the customer ID.
  • the key user may also be identified using an identification 7C comprising an image of the face, for example a pass port or driver licence, if com prising an image.
  • the validity of the key user is provided through matching the data information re trieved from relevant authorities. If the data information does not match an error will be detected and notification will be sent to the key user, end user and/or a supporting unit. If the verification of the key user is approved the process will continue.
  • Fig. 7 illustrates a block diagram of the KYC analytic process.
  • the KYC analytics is the process, where all the information retrieved is analysed in relation to the aspects of: financial information 8A, fraud information 8B, risk assessment 8C and/or anti money laundry 8D etc.
  • KYC analytics process Once KYC analytics process is completed, all the information will be collected in or der to provide a KYC documentation file for the end user.
  • the KYC documentation will cover the aspect of the KYC status of the customer ID.
  • the KYC documentation file may be accessible for the end user through an end user interface. Alternatively, the KYC documentation file may be sent to the end user through an end user program, such as a finance program, a customer management program or a customer portal etc.
  • Fig. 8 illustrates a block diagram of the feedback loop process 9A.
  • the basic customer ID dataset and/or customer ID infor mation dataset may be altered.
  • the monitoring of the basic customer ID dataset and the customer ID information dataset in the databases is provided in a real-time surveil lance process.
  • the surveillance sequence will detect changes in the available basic customer ID dataset and the customer ID information dataset in the databases in rela- tion to the basic customer ID dataset and the customer ID information dataset received and stored in the customer ID case file. If one or more of the customer ID information dataset in the databases are amended in relation to the basic customer ID dataset and the customer ID information dataset stored in the customer ID case file, the key user must be investigated again accordant to the new information available.
  • Fig. 9 illustrates a block diagram illustrating the entire KYC real-time handling pro Waits’ acts in a KYC system.
  • Fig. 3 to fig. 8 are presented in the fig. 9, and provide an total overview.

Abstract

The present invention relates to a method for a KYC process. Consequently, it is an object of the invention to provide a KYC system and method for KYC handling pro- cess, which makes the KYC system more agile and fast, and always provided with updated and the newest KYC information accessible. At the same time the invention reduces the costs of providing the KYC information in a format easy for the end user to access. The present invention addresses this by providing a computer-implemented method of KYC real-time handling process, comprising acts of: a) receiving a request from a user via a user interface provided on a user computing device, b) generating a customer ID related to said request, c) retrieving at least one information dataset related to said customer ID from one or more information databases, d) processing at least one KYC analysing sequence related to the customer ID, based on at least one of said information dataset, e) generating at least one KYC documentation file comprising at least one KYC cus- tomer ID dataset using said analysing sequence, f) monitoring said customer ID using at least one surveillance sequence, where the surveillance sequence is searching for at least one dataset variation when comparing at least one of said information dataset in relation to at least one available 20 information dataset in said information database.

Description

[KYC ANALYSING SYSTEM]
Field of the Invention
The present invention relates to a KYC system and a method for a KYC handling pro cess.
Background of the Invention
Know Your Customer, KYC, is the process of verifying the identity of a clients and assessing their suitability, along with the potential risks of illegal intentions towards a relationship. Know your client processes are also employed by companies of all sizes for the purpose of ensuring that their proposed customers, agents, consultants, or dis tributors are anti-bribery compliant and are actually who they claim to be. Banks, in surers, export creditors, lawyers, accountants and other financial institutions are in creasingly demanding that customers provide detailed due diligence information.
The objective of KYC is to prevent businesses (financial and non-fmancial) from be ing used, intentionally or unintentionally, by criminal elements for money laundering activities. Related procedures also enable businesses to better understand their cus tomers and their financial dealings. Today not only the banks but also different busi nesses can implement KYC.
But issues occur when considering implementing a KYC process in a company. The costs of providing and managing the information needed is very high, due to the ac cessibility and manpower needed. Especially smaller and medium size companies do not have access to the same information as banks and insurers companies do. The costs are simply too high, so the smaller and medium size companies do not engage a KYC strategy. The companies without a KYC process are then open to fraud, bribery, money laundering etc.
Object of the Invention
Consequently, it is an object of the invention to provide a KYC system and method for KYC handling process, which makes the KYC system more agile, reliable and fast, and always provided with updated and the newest KYC information accessible. At the same time the invention reduces the costs of providing the KYC information in a for mat easy for the end user to access.
Description of the Invention
The present invention addresses this by providing a computer-implemented method of KYC real-time handling process in a KYC system, comprising acts of: a) receiving a request from a user via a user interface provided on a user computing device, b) generating a customer ID case file comprising a customer ID related to said request, from said user, saving the customer ID case file in the KYC in at least one KYC data base, c) retrieving at least one information dataset related to said customer ID from one or more information databases, connecting said information dataset to said customer ID, d) processing at least one KYC analysing sequence in said KYC system, wherein the KYC analysing sequence is processing at least one of said information dataset in rela tion to the customer ID, e) generating at least one KYC documentation file comprising at least one KYC cus tomer ID dataset and said information dataset, and saving the KYC documentation file in said at least one KYC database on at least one KYC computer-readable storage me dium, f) monitoring said customer ID and said information dataset in the KYC documenta tion file using at least one KYC surveillance sequence, wherein the KYC surveillance sequence is searching for at least one dataset variation, when comparing at least one of said information dataset in said KYC documentation file in relation to at least one available information dataset information database.
The KYC stands for Know Your Customer. It is a procedure that takes place online to verify an individual’s and/or company’s identity. Fulfilling the KYC identification requirement may be mandatory for anyone who wishes to be part of cooperation with a company, which performs the KYC process. The KYC process minimizes the risk of fraud, by identifying suspicious elements earlier on in the customer-business relation ship lifecycle. For the purposes of a KYC policy, a customer/user may be defined as for example a person or entity that maintains an account and/or has a business rela- tionship with the reporting entity, such as a bank or a business. Or a key user on whose behalf the account is maintained, or any person or entity connected with a fi nancial transaction which can pose significant reputational or other risks to the busi ness, for example, a wire transfer or issue of a high-value demand draft as a single transaction etc.
The KYC system may be a KYC real-time handling processing system, which com prises a processing unit. The KYC system is in communication with a user via a user interface and/or other users of the KYC system. The KYC system is configured to access a plurality of information databases. The KYC system is configured continually to monitor the information databases. The information databases are monitored in a real time process. The KYC system is configured to change data rapidly and then pro vides output instantaneously such that the change over time can be seen very quickly. The KYC real-time handling processing is a method that is used when data input re- quests need to be dealt with quickly.
The KYC system is provided as a real-time KYC system, comprising a KYC real-time handling process. The KYC system receives a request from a user via a user interface provided on a computing device, such as a mobile device, ipad, personal computer etc. The request automatically generates a customer ID and a customer ID case file related to the user’s request. The customer ID case file is stored in the KYC system’s data base or databases. The user enters data information regarding a person and/or a com pany, who requests the cooperation. The data information related to the person and/or company is provided in at least one basic customer ID dataset related to the customer ID. The basic customer ID dataset is stored in said customer ID case file in at least one KYC database on a KYC computer-readable storage medium. The data information related to the person and/or company may be a company name and ID number, an address, phone number and an e-mail etc. When the data information from the user is retrieved, then the data fetching process starts retrieving at least one customer ID information dataset, which is relevant in rela tion to the customer ID. The data fetching refers to the process of automatically re trieving the customer ID information dataset related to the customer ID through inter nal and/or external information databases. The data fetching process is a part of the KYC analysing sequence. The information databases may comprise information, such as governmental information, company information, credit information and/or person al information etc. The information databases may be one or more of following data bases: Governmental, Social Media, Public, Personal, Corporative, Documental, Black listed, Watch listed, News Media, Banking, and temples etc. The customer ID infor mation dataset may be an array of information datasets comprising varying infor mation regarding the customer ID, since the data information is retrieved from a varie ty of different information databases on one or more information computer-readable storage medium.
The customer ID information dataset or datasets related to the customer ID is stored in the customer ID case file in said KYC database on a KYC computer-readable storage medium. The basic customer ID dataset and/or the customer ID information dataset or datasets is at least one customer ID questionary file related to the customer ID gener- ated. The user provides the customer ID questionary file with information.
The KYC real-time handling process identifies at least one key user related to said customer ID from the basic customer ID dataset and/or customer ID information da taset or datasets. The key user dataset related to the key user is stored in the customer ID case file. The key user may be the user, who initially provided the request. Alterna tively, the key user may not be the user, who did initially provide the request or the user may be one of a plurality of key users.
The KYC real-time handling process sends the customer ID questionary file to the key user, and the KYC real-time handling process may authorize the key user and/or pro vide the key user with a login, which directs the key user directly to the customer ID questionary file. The key user may enter the customer ID questionary file from a com puting device, such as a mobile device, notebook, personal computer etc. When the key user uses the login the key user must be identified and verified that the user is the correct key user who is permitted to access the customer ID questionary file. The questionary can only be accessed and completed by the key user who is granted the liability for the company. If more key users are to be contacted, each has access to a questionary related to the specific key user. After the key user has completed the questionary the KYC handling process may re trieve the completed customer ID questionary file. The completed customer ID ques tionary file comprises at least one collected information dataset related to the customer ID. Also, the customer ID questionary file and the completed customer ID questionary file may be stored in the KYC database in relation to the customer ID and/or the cus tomer ID case file.
After receiving the completed customer ID questionary file a KYC analysing se quence related to the customer ID is activated. The analysing sequence may be based on collected information dataset, but also the basic customer ID dataset and the basic information dataset. The KYC customer ID dataset or datasets comprise data infor mation in relation to the customer ID in the aspects of: financial information, fraud information, risk assessment and/or anti-money laundry etc. Once the KYC analysing process is completed, all the KYC customer ID dataset or data sets will be collected in order to provide a KYC documentation file accessible for the end user. KYC documentation file is stored in said KYC database on a KYC com puter-readable storage medium. The KYC documentation file may be accessible for the end user through an end user interface provided on the end user’s computing de- vice. Alternatively, the KYC documentation file may be sent to the end user through an end user program, such as a finance program, a customer management program or a customer portal etc.
After analysing the retrieved data information regarding the customer ID, the KYC handling process monitors the activity related to the customer ID, both in the customer ID case file and the external databases, by starting at least one surveillance sequence. The surveillance sequence may search for any changes in the dataset related to the customer ID and/or the key user or key users. For example, by monitoring of the basic customer ID dataset and the customer ID information dataset in the databases, searching for dataset variation in the datasets is provided in a real-time surveillance process. The surveillance sequence may detect one or more dataset variation in the basic customer ID dataset and/or the customer ID information dataset in the databases in relation to the basic customer ID dataset and the customer ID information dataset received and stored in the customer ID case file. If one or more of the customer ID information dataset in the databases are changed or variated in relation to the basic customer ID dataset and the customer ID information dataset stored in the customer ID case file, the customer ID must be investigated again accordant to the new information available. Depending on the dataset variation related to the customer ID, the KYC real-time handling process evaluates if there is a need to provide a new KYC documentation file. The KYC real-time handling process may provide information to the end users, when the end user may need to apply for a new updated KYC documentation file.
One act of the KYC real-time handling process after generating a customer ID related to said request, may for example be creating a customer ID case file and retrieving at least one basic customer ID dataset related to said customer ID and storing said basic customer ID dataset in said customer ID case file in at least one KYC database. After the act mentioned above, a further act follows retrieving at least one information da taset related to said customer ID from one or more information database. The infor mation dataset may be related to a customer ID information dataset.
An act may follow thereafter, for example generating at least one customer ID ques- tionary file related to said basic customer ID dataset and/or said customer ID infor mation dataset. Both the basic customer ID dataset and/or customer ID information dataset may be included in the information dataset. A further act may be identifying at least one key user related to said customer ID and sending said customer ID question ary file to said key user, where the key user assesses said customer ID questionary file using a key user computing device.
Thereafter the KYC real-time handling process may comprise an act of retrieving at least one completed customer ID questionary file from the key user comprising at least one collected information dataset related to said customer ID. The collected in- formation dataset may also be included in the information dataset.
Thereafter processing at least one analysing sequence related to the customer ID, based on said information dataset. At least one KYC customer ID dataset is generated using the analysing sequence. KYC real-time handling process may comprise an act of generating a KYC documentation file comprising at least one KYC customer ID da taset using said analysing sequence. The KYC documentation file is sent to the end user. The KYC real-time handling process comprises an act of monitoring said customer ID case file using at least one surveillance sequence, where the surveillance sequence is searching for at least one dataset variation when comparing at least one retrieved in formation dataset in relation to at least one of said information dataset in the infor mation databases. The KYC real-time handling process may provide the end user that the customer ID comprises new information and a KYC documentation file or part of a KYC documentation file may be required by the end user.
In an advantageous method of the invention, the invention comprises following act of retrieving at least one key user profile dataset related to a key user, and storing said key user profile dataset in the customer ID case file, and retrieving an identification information of said key user by means for identification, wherein said key user profile dataset and/or the identification information is capable of identifying said key user.
After receiving the completed customer ID questionary file and before the analysing sequence related to the customer ID is activated, the key user may provide data infor mation regarding the key user’s profile for verification purpose. At least one key user profile dataset is related to the key user. The key user profile dataset may be generated when the basic customer ID dataset related to the customer ID case is requested by the user or provided from the customer ID information dataset.
In a further advantageous method of the invention, the invention comprises following act:
- retrieving at least one document dataset and at least one image dataset from said means for identification, wherein the means for identification is an image capturing device,
- verifying the identity of said key user from said document dataset and said image dataset in relation to said key user profile dataset. The KYC real-time handling process retrieves at least one document dataset and at least one image dataset from an image capturing device. The image dataset may be provided in the key user profile dataset. The KYC handling process may verify the identity of said key user from the document dataset and said image dataset in relation to said key user profile dataset. The document dataset may comprise for example name and address etc. related to the key user, where the image dataset may be an im age related to a physiologically / biometrics expression of the key user. The key user may enclose evidence based on information, identity and documents, which belong to the key user. The key user may provide one or more of following biometrics verifica- tions, such as speech sample to be analysed in speech recognition, DNA sample for DNA-matching, an image of the face to be analysed in face recognition etc. The key user may use the microphone provided in the key user’s computing device in order to provide a speech sample. The key user may use the camera provided in the key user’s computing device in order to provide an image / picture of the key user’s face. Alter- native send a picture stored on the computing device, or from a pass port or driver licence. A key user profile file may comprise document dataset and/or key user profile dataset. The key user profile file may be stored in the KYC database.
The KYC real-time handling process may perform a reliability check that the infor- mation, identity and documents are correct and match the key user. The key user may also be verified based on second information dataset and key user profile dataset. The validity of the key user may also be provided through matching the data information retrieved from relevant authorities. In a still further advantageous method of the invention, the invention comprises fol lowing act of accessing the KYC documentation file provided in a KYC database, using an end user access via a user interface provided on an end user’s computing device. The end user may access the KYC database on the KYC computer-readable storage medium, where the KYC documentation file is located. Only the KYC documentation file may be accessible for the end user through an end user interface provided on the end user’s computing device. Alternatively, the documentation file may be sent to the end user through an end user program, such as a finance program, a customer man agement program or a customer portal or an e-mail etc.
In a further advantageous method of the invention, the invention comprises following act of a feedback loop sequence, where the feedback loop sequence is activated when the surveillance sequence detects dataset variation in at least one of said information dataset, where the feedback loop sequence activates said KYC analysing sequence.
The KYC surveillance process is monitoring amendments in the basic customer ID dataset and the customer ID information dataset in the databases. If one or more of the customer ID information dataset in the databases are amended in relation to the basic customer ID dataset and the customer ID information dataset stored in the customer ID case file, the customer ID may be analysed again accordant to the new information available. The KYC system may also be configured to handle a feedback sequence comprising a feedback loop process. The monitoring of the basic customer ID dataset and the customer ID information dataset in the databases are provided in a real-time surveillance process, which may activate the feedback sequence, when dataset chang es in the customer ID case occur. A company may change many information regarding the company, for example the address of the company, the company name, the board of directors, the director, the chief executive officer, or other highest-ranking person in a company etc. In order to limit the numbers of activation of feedback loop processes due to amendments, a threshold may be arranged. For example, if an amendment is made, and detected dur- ing monitoring the customer ID, the feedback loop processes may have a “build in” delay to ensure all the changes are made before starting a process of identifying, au thorizing, verifying and/or analysing the customer ID.
The KYC may also comprise a screening feature, such as politically exposed persons, PEP, and/or relatives and close associates, RCA, screenings. As part of a custom er/client relationship, the banks and financial institutions must establish whether their customer/clients are politically exposed persons and at risk of being involved in finan cial crimes, like money laundering. The politically exposed persons fall into several categories and while many are politicians, or hold governmental positions, others may qualify for PEP status because of their connection or proximity with another individu al. A RCA screening may also comprise a screening in relations to the social and eco nomic situation of relatives and close associates. Financial institutions often monitor RCAs as part of a screening process. The tendency for friends and family to be in- volved in, or drawn into, financial crimes may be perpetrated by others. Monitoring in real time is important such that the financial institutions can react quickly should the risk exposure of a PEP or RCA change. The KYC system may also be provided with means for reporting crimes or other issues to the authorities. The KYC system may access the authorities’ system directly, wherein the KYC system is providing a report file.
A KYC real-time handling processing system comprising means for carrying out one or more KYC real-time handling processing acts, using
- at least one customer ID case file related to a customer ID requested by a user, - at least one KYC database on at least one KYC computer-readable storage medium to store customer ID case file comprising at least a customer ID and at least one basic customer ID dataset related to said customer ID,
- at least one information database on at least one information computer-readable stor age medium comprises customer ID information dataset related to the customer ID, - a processing unit configured to process the basic customer ID dataset and/or custom er ID information dataset using an analysing sequence.
The KYC real-time handling processing system is in data communication with the KYC database on the KYC computer-readable storage medium and the information database on the information computer-readable storage medium. The processing means may be capable of accessing files comprising dataset or datasets located in at least one KYC computer-readable storage medium. The processing means may be capable of accessing files comprising dataset or datasets related to the customer ID located in at least one information computer-readable storage medium. The processing means may be capable of storing customer ID case file comprising at least a customer ID and at least one basic customer ID dataset related to the customer ID in the KYC database on a KYC computer-readable storage medium. The KYC real-time handling processing system is in data communication with at least one information computer-readable storage medium, where the information computer- readable storage medium may comprise files having customer ID information dataset related to the customer ID. The processing means may retrieve the customer ID in- formation data sets and store the customer ID information dataset in the customer ID case file located in the KYC database.
The processing unit may be configured to process the basic customer ID dataset and/or customer ID information dataset using an analysing sequence, providing KYC customer ID dataset or datasets, which is stored in a KYC documentation file in the KYC database.
The KYC real-time handling processing means may be in wired or wireless data communication with the KYC computer-readable storage medium means, so the data processing means have access to the customer ID, basic customer ID dataset, first in formation dataset and the second information dataset located customer ID case file in the KYC computer-readable storage medium. The data processing means have also access to the document dataset and the key user profile dataset which may also be located in a customer ID case file or a key user profile file in the KYC computer- readable storage medium. The data processing means have access to customer ID questionary file and the completed customer ID questionary file in the KYC comput er-readable storage medium. The data processing means may be in wired or wireless data communication with the KYC computer-readable storage medium means, so the data processing means have access to the KYC customer ID dataset or datasets located KYC documentation file in KYC computer-readable storage medium.
The processing means may also be in data communication with at least one user inter face provided on a user computing device and an end user interface provided on an end user computing device. The data communication may be wired or wireless.
In a further advantageous embodiment of the invention, the processing unit monitors the basic customer ID dataset and/or customer ID information dataset using a surveil lance sequence. The processing unit may be configured to process the basic customer ID dataset and/or customer ID information dataset using a surveillance sequence, where the pro cessing unit processing the customer ID, basic customer ID dataset, customer ID in formation dataset located customer ID case file in KYC computer-readable storage medium, relative to the customer ID information dataset in the information computer- readable storage medium, to search for dataset variation.
In a still further advantageous embodiment of the invention, the processing unit de tects at least one dataset variation in the basic customer ID dataset and/or customer ID information dataset activating a feedback loop sequence.
The processing unit may be configured to process a feedback loop sequence. The feedback loop sequence is processed when at least one dataset variation is detected in the surveillance sequence. Depending on which dataset is altered the processing unit repeats predefined KYC real-time handling processing acts related to the altered or new dataset or datasets provided in the customer ID information datasets.
Computer program product comprising instructions for generating at least one KYC documentation file which, when said computer program product is executed by a computer, causes the computer to carry out acts of:
- generating at least one KYC customer ID dataset in a KYC documentation file using an analysing sequence,
- monitoring at least one customer ID using at least one surveillance sequence, search ing at least one dataset variation in at least one information dataset in relation to at least one information dataset related to said customer ID in at least one available in formation database.
The computer program product may further comprise instructions, when detecting an amendment in the basic customer ID dataset and/or customer ID information dataset causes the computer to carry out acts of activating a feedback loop sequence.
The computer program product may still further comprise instructions, where said computer program product is a sub product of another computer program product, such as being an application or a module to a main computer program product. The computer program product may further comprise instructions, where one or more executable computer program products is in data communication with said data pro cessing means, computer-readable storage medium and at least one user interface, where said computer program product controls the data communication between a customer ID case file related to said customer ID to and from said user interface, by using data processing means, where said computer program product is in data com munication with at least one remote computer product. A computer-readable storage medium contains instructions to generate at least one dataset or datasets, when the instructions are executed in a KYC real-time handling processing system to perform the acts.
A computer-readable storage medium may contain instructions to configure a readable and writable KYC database on a computer-readable storage medium, comprising in structions, where said readable and writable KYC database provides a storage for at least one customer ID case file, where at least customer ID case file contains at least one basic customer ID dataset related to said customer ID, where an key user using an key user interface to access to said customer ID case file.
The computer-readable storage medium may also comprise instructions for processing at least one analysing sequence. The computer-readable storage medium may also comprise instructions for processing at least one surveillance sequence. The computer- readable storage medium may also comprise instructions for processing a feedback loop sequence.
Computer readable storage medium having stored thereon dataset or datasets provided by a readable KYC real-time handling processing system according to one or more of claims 6 to 8 provided by the acts.
A computer-readable storage medium, where said readable and writable KYC data base provides a storage for at least one KYC documentation file, where said KYC documentation file contains at least one KYC customer ID dataset related to the cus- tomer ID, where an end user using an end user interface to access said KYC documen tation file.
The KYC database may be an allocated database on a computer-readable storage me- dium. The computer-readable storage medium may be provided as a cloud solution or an external or internal storage solution. The information database or databases may be eternal storage solutions or cloud solutions.
A rigorous and robust KYC real-time handling process seeks to verify and validate the customer's identity and test the customer's profile, business and account activity. The KYC real-time handling process identifies relevant adverse information and risk, as sesses the potential for money laundering and/or terrorist financing to support action able decisions to mitigate against financial, regulatory and reputational risk and ensure regulatory compliance. The KYC real-time handling process is fast and agile, provid- ing always the customers’ status in a given moment in time.
The invention has now been explained with reference to a few examples which have only been discussed in order to illustrate the many possibilities and varying design possibilities achievable with the computer implemented KYC system according to the present invention.
Description of the Drawing
The embodiments of the invention are described in the following with reference to:
Fig. 1.: A block diagram illustrating an overview of a KYC real-time handling process Fig. 2.: A block diagram illustrating an overview of the KYC data flow. Fig 3.: A block diagram illustrating request from a user and retrieving information from a plurality of databases.
Fig. 4.: A block diagram of the main KYC process.
Fig. 5.: A block diagram of the questionary process.
Fig. 6.: A block diagram of the verification process. Fig. 7.: A block diagram of the analytics process.
Fig. 8.: A block diagram of the feedback loop process.
Fig 9: A block diagram illustrating the entire KYC processes. Detailed Description of the Invention
An embodiment of the invention is explained in the following detailed description. It is to be understood that the invention is not limited in its scope to the following de scription or illustrated in the drawings. The invention is capable of other embodiments and of being practiced or carried out in various ways.
Fig. 1 is a block diagram illustrating an overview of a KYC real-time handling pro cess.
The present invention addresses this by providing a computer-implemented method of KYC real-time handling process using a KYC real-time handling system. The KYC real-time handling processing system comprises means for carrying out one or more KYC real-time handling processing acts. The KYC real-time handling system com prises a KYC database on at least one KYC computer-readable storage medium. The KYC real-time handling processing system is capable of retrieving and transmitting data to and from user, key users and/or end user through interfaces. The KYC real time handling processing system is in communication with a plurality of information databases, which comprise information regarding the users.
The KYC system is a real-time operating system intended to serve real-time applica- tions that process data as it comes in, preferably without too much buffer delays.
The information database, which is stored on at least one information computer- readable storage medium comprises customer ID information dataset related to the customer ID. The KYC system is in data communication with the information data base. The processing unit in the KYC system is configured to process the customer ID dataset and/or customer ID information dataset using the KYC analysing sequence, when executed on the computer. The processing unit is configured to monitor the basic customer ID dataset and/or said customer ID information dataset using a KYC surveillance sequence. The processing unit is also configured to detect at least one dataset variation in the basic customer ID dataset and/or said customer ID information dataset. The processing unit is also configured to activate a feedback loop sequence, such that the monitoring is repeated continually. The KYC real-time handling process is based on following acts:
The KYC real-time handling system receives a request from a user via a user interface provided on a user computing device. The KYC real-time handling process medially generates a customer ID related to said request required. The KYC real-time handling process retrieves at least one information dataset related to said customer ID from one or more information databases, for example #1, #2 and #3.
The KYC system is configured to process a KYC analysing sequence. The KYC real time handling process system processes at least one KYC analysing sequence related to the customer ID, based on at least one of said information dataset retrieved from the information databases and from the user. The result of the KYC analysing sequence is to provide a KYC documentation file comprising data information in relation to the customer ID in the aspects of: financial information, fraud information, risk assess ment and/or anti-money laundry etc. The KYC documentation file is sent to the end user.
The KYC real-time handling process comprises an act of monitoring said customer ID using at least one KYC surveillance sequence, to detect any dataset variations between the retrieved information dataset, which is used in the analysing sequence, and infor- mation dataset registered in the information databases. If an available information dataset is changed in the information database the surveillance sequence will detect a data variation.
The KYC system is configured to process a KYC surveillance sequence and/or a feedback loop sequence. The KYC surveillance sequence is searching for at least one dataset variation in a continuing real-time process. When comparing at least one re trieved information dataset in relation to at least one of said information dataset in the information databases. The KYC surveillance sequence will activate a feedback loop sequence. The feedback loop sequence will start a process of retrieving new infor- mation datasets from the databases and/or activates the analysing sequence. The pur pose of activating the feedback loop sequence is to provide the end user with the up dated information in the aspects of: financial information, fraud information, risk as sessment and/or anti -money laundry etc. After an automatic activation of the feedback loop sequence has provided an updated KYC documentation file or part of a KYC documentation file, said file is made available for the end user when completed. The feedback may also loop back to other acts, such as the acts of receiving information. The feedback may also loop back to acts which include new or partly new or amended questionary file, which the key user must access to handle the outstanding issues.
Fig. 2 shows a block diagram illustrating an overview of the KYC real-time handling processes. The KYC system receives a request from a new and probably a not known user via a user interface provided on a computing device, such as a mobile device, ipad, personal computer etc. The request automatically generates a customer ID and a customer ID case file related to the user’s request where the case is created 1. The user fills out a form wherein the basic data from the form is stored as a basic customer ID dataset in the customer ID case file. The customer ID case file is stored in the KYC database. The data fetching 2 retrieves the customer ID information dataset from the extern in formation databases 3. The customer ID information dataset is stored with reference to the customer ID. Person/owner identification 4 is an identification of the user logging into the KYC system. The user, preferably a key user, is provided access using a se cure login 5, where the key user may require access to the customer ID questionary file 6. The key user may receive the customer ID questionary file 6. The key user may complete a completed customer ID questionary file. The customer ID questionary file and the completed customer ID questionary file are stored in the KYC database with reference to customer ID. After the key user has completed the customer ID questionary file, the key user is re quired to provide documentation for identification and verification 7 of the key user. The key user provides documentation such as an image of the face, for example using a picture from a pass port or driver licence or other similar identifications which can be used to identify a person such as a key user . Other type of documentation may be provided as well. A document dataset comprises text information and a key user pro file dataset comprises physiologically / biometrics information. The document dataset and key user profile dataset are located in a key user profile file. The key user profile file is stored in the KYC database with reference to customer ID. After receiving the completed customer ID questionary file and receiving the docu mentation from the key user, an analysing sequence 8 related to the customer ID is activated. The analysing sequence 8 is based on collected information dataset, which comprises all the data information retrieved earlier in the KYC process, also the basic customer ID dataset and the basic information dataset. The analysing sequence 8 pro vides KYC customer ID dataset or datasets, which is located in a KYC documentation file. The KYC documentation file is stored in the KYC database with reference to customer ID. The KYC documentation file can be accessed by the end user using an end user computing device.
The surveillance sequence 9 has access to all the datasets located in all the files stored in the KYC database. The feedback loop sequence 9a is activated by the surveillance sequence 9, and is substantially similar to a pointer of the looping process. The pointer indicates were to restart the KYC real-time handling process when a dataset variation occurs.
Fig 3 shows a block diagram illustrating request from a user and retrieving infor mation from a plurality of databases. The KYC system is in data communication with a plurality of databases, and configured to retrieve information from the databases. The KYC system is also in data communication with a user’s using of the KYC sys tem through a user interface. The KYC system is configured to receive a request from a user.
1) A customer ID case is created when requested from a user related to customer ID. The customer ID case may be created based on information regarding a person and/or a company. The person and/or company’s basic information is entered into the form giving access to create a case.
The user uses a user interface to apply for an approval in an end user company. The user who applies for an approval, may or may not be a key user or company to be in vestigated. If a person is to be investigated, the person may be the key user. If a com pany is to be investigated, the key user may be one or more key users to be investigat ed, such as one or more of following: the company itself, the board of directors, the director, the chief executive officer, or other highest-ranking person in a company or other institution, ultimately responsible for taking managerial decisions etc.
2) Data fetching refers to the process of automatically retrieving at least one basic customer ID dataset related to the customer ID through internal and external databases. When a case is created by the KYC real-time handling process based on a request from a user, a customer ID case and a customer ID is provided. Then the data fetching process starts retrieving the customer ID information dataset, which is rele vant for the customer ID.
3) The customer ID information dataset is retrieved from different information databases having different types of information regarding the customer ID. The infor mation databases may comprise information, such as governmental information, com pany information, credit information and/or personal information etc. The databases may be one or more of following databases: Governmental, Social Media, Public, Per sonal, Corporative, Documental, Black listed, Watch listed, News Media, Banking, Telephone and temples etc. Furthermore, databases comprising risk assessment within Countries, industries and/or companies etc.
When all the relevant data information is retrieved from the information databases, the data information is stored in a customer ID information dataset in the customer ID case file.
Fig. 4 illustrates a block diagram of the main KYC process. The main KYC process refers to following blocks:
4) The key user must be identified and authorized before a questionary related to the customer ID can be accessed. The questions in the questionary are provided in relation to the basic customer ID dataset and/or the customer ID information dataset. The questionary can only be accessed and completed by the key user in a company or an owner. If more key users are to be contacted, each has access to a questionary re lated to the specific key user. 5) The key user or key users are verified accordant to the customer ID. The key user or key users must by authenticated using identification to be able to access the questionary, for example using a national, international and/or a personal login meth od.
6) Once identity is confirmed, and the authorization has been given to the key user, the questionary will automatically be sent out to an email or the questionary is accessible on a computer-readable storage medium in a database. The database will be accessible for the key user through a key user interface, such as for example a mobile device or a computer device or similar. The questionary is then completed by the key user.
7) A verification of the key user must enclose information, identity and docu ments, which belong to the key user and that the information, identity and documents are correct. The key user may be identified by using one or more of following biomet rics verifications, such as speech recognition, DNA-match, face recognition etc. The key user may also be identified using an identification comprising an image of the face, for example a pass port or driver licence, if comprising an image. The validity of the key user is provided through matching the data information retrieved from relevant authorities. If the data information does not match an error will be detected and notifi cation will be sent to the key user, end user and/or a supporting unit. If the verifica tion of the key user is approved the process will continue.
8) The KYC handling process comprises an analytics process comprising an analysing sequence, where all the information retrieved is analysed in relation to the aspects of: financial information, fraud information, risk assessment and/or anti money laundry etc.
Once the KYC analysing sequence is completed, all the information will be collected in order to provide a KYC documentation file provided for the end user. The KYC documentation file may be accessible for the end user through an end user interface. Alternatively, the documentation file may be sent to the end user through an end user program, such as a finance program, a customer management program or a customer portal etc. The KYC documentation file provided for the end user may be available in a format with is easy to handle. A pdf-file or similar is easy for the end user to retrieve and print. Also if the file is retrievable through a link to a website or other download options. 9) The surveillance process is monitoring amendments in the basic customer ID dataset and the customer ID information dataset in the databases. If one or more of the customer ID information dataset in the databases are amended in relation to the basic customer ID dataset and the customer ID information dataset stored in the customer ID case file, the key user must be investigated again accordant to the new information available. The monitoring of the basic customer ID dataset and the customer ID in formation dataset in the databases is provided in a real-time surveillance process.
Fig. 5 illustrates a block diagram of the key user questionary process. The KYC sys tem automatically generates the questionary, which is dedicated the key user. The KYC system may generate the questionary only accessible for the key user through a key user interface. The questions in the questionary are provided in relation to the basic customer ID dataset and/or the customer ID information dataset. The question ary can only be accessed and completed by the key user. The questionary is generated and stored on a dedicated computer-readable storage medium. The questionary is re- lated to the customer ID case file with the customer ID related to the key user. A mes sage may be sent to the key user, informing the key user that the questionary is availa ble for the key user to complete. If more key users are to be contacted, each has access to a questionary related to the specific key user. The questionary can only be accessed and completed by the key user. The questionary is generated and stored on a dedicated computer-readable storage medium. The ques tionary is related to the customer ID case file with the customer ID related to the key user. A message may be sent to the key user, informing the key user that the question ary is available for the key user to complete. If more key users are to be contacted, each has access to a questionary related to the specific key user.
When the questionary is generated and accessible for the key user 6A, the key user may access the questionary using a key user interface, such as a mobile application 6B, desktop application 6C, e-mail 6D, system to system data communication 6E and/or text messing 6F etc. When the questionary is completed by the key user, the KYC process will move on to next step of the process, which is verification of the key user. Fig. 6 illustrates a block diagram of the key user verification process. A verification of the key user must enclose information, identity and documents, which belong to the key user and that the information, identity and documents are correct.
The key user may be identified by using means of identification. The means of identi- fication may be one or more of following biometrics verifications 7 A, such as finger printing, speech recognition, face and/or body recognition, DNA analyses, behaviour al biometric etc.
The key user may also be identified by using one or more of following documents available, and linking the documents to the key user and to the basic customer ID da taset of the customer ID. The key user may also be identified using an identification 7C comprising an image of the face, for example a pass port or driver licence, if com prising an image. The validity of the key user is provided through matching the data information re trieved from relevant authorities. If the data information does not match an error will be detected and notification will be sent to the key user, end user and/or a supporting unit. If the verification of the key user is approved the process will continue. Fig. 7 illustrates a block diagram of the KYC analytic process. The KYC analytics is the process, where all the information retrieved is analysed in relation to the aspects of: financial information 8A, fraud information 8B, risk assessment 8C and/or anti money laundry 8D etc. Once KYC analytics process is completed, all the information will be collected in or der to provide a KYC documentation file for the end user. The KYC documentation will cover the aspect of the KYC status of the customer ID. The KYC documentation file may be accessible for the end user through an end user interface. Alternatively, the KYC documentation file may be sent to the end user through an end user program, such as a finance program, a customer management program or a customer portal etc.
Fig. 8 illustrates a block diagram of the feedback loop process 9A. After the end user has received the KYC report, the basic customer ID dataset and/or customer ID infor mation dataset may be altered. The monitoring of the basic customer ID dataset and the customer ID information dataset in the databases is provided in a real-time surveil lance process. The surveillance sequence will detect changes in the available basic customer ID dataset and the customer ID information dataset in the databases in rela- tion to the basic customer ID dataset and the customer ID information dataset received and stored in the customer ID case file. If one or more of the customer ID information dataset in the databases are amended in relation to the basic customer ID dataset and the customer ID information dataset stored in the customer ID case file, the key user must be investigated again accordant to the new information available.
After an automatic activation of the feedback loop process, identifying, authorizing, verifying and/or analysing the customer ID will result in a new KYC-report, which will be made available for the end user when completed. Fig. 9 illustrates a block diagram illustrating the entire KYC real-time handling pro cesses’ acts in a KYC system. Fig. 3 to fig. 8 are presented in the fig. 9, and provide an total overview.

Claims

1. A computer-implemented method of KYC real-time handling process in a KYC system, comprising acts of: a) receiving a request from a user via a user interface provided on a user computing device, b) generating a customer ID case file comprising a customer ID related to said request from said user, saving the customer ID case file in the KYC in at least one KYC data base, c) retrieving at least one information dataset related to said customer ID from one or more information databases, connecting said information dataset to said customer ID, d) processing at least one KYC analysing sequence in said KYC system, wherein the KYC analysing sequence is processing at least one of said information dataset in rela tion to the customer ID, e) generating at least one KYC documentation file comprising at least one KYC cus tomer ID dataset and said information dataset and saving the KYC documentation file in said at least one KYC database on at least one KYC computer-readable storage me dium, f) monitoring said customer ID and said information dataset in the KYC documenta- tion file using at least one KYC surveillance sequence, wherein the KYC surveillance sequence is searching for at least one dataset variation when comparing at least one of said information dataset in said KYC documentation file in relation to at least one available information dataset in said information data base.
2. Method according to claim 1, further comprising following act:
- retrieving at least one key user profile dataset related to a key user, and storing said key user profile dataset in the customer ID case file, and
- retrieving an identification information of said key user by means for identification, wherein said key user profile dataset and/or the identification information is capable of identifying said key user.
3. Method according to claim 2, further comprising following act: - retrieving at least one document dataset and at least one image dataset from said means for identification, wherein the means for identification is an image capturing device,
- verifying the identity of said key user from said document dataset and said image dataset in relation to said key user profile dataset.
4. Method according to any one of the preceding claims, further comprising an act of accessing the KYC documentation file provided in a KYC database using an end user access via a user interface provided on an end user's computing device.
5. Method according to any one of the preceding claims, further comprising an act of a feedback loop sequence, where the feedback loop sequence is activated when the sur veillance sequence detects said dataset variation in at least one of said basic customer ID dataset information dataset, where the feedback loop sequence activates said KYC analysing sequence.
6. KYC real-time handling processing system comprising means for carrying out one or more KYC real-time handling processing acts, using
- at least one customer ID case file related to a customer ID requested by a user, - at least one KYC database on at least one KYC computer-readable storage medium to store customer ID case file comprising at least a customer ID and at least one basic customer ID dataset related to said customer ID,
- at least one information database on at least one information computer-readable stor age medium comprises customer ID information dataset related to the customer ID, - a processing unit configured to process the basic customer ID dataset and/or custom er ID information dataset using an KYC analysing sequence.
7. KYC real-time handling processing system according to claim 6, where the pro cessing unit monitoring the basic customer ID dataset and/or said customer ID infor- mation dataset using a KYC surveillance sequence.
8. KYC real-time handling processing system according to claim 6 or 7, where the processing unit detecting at least one dataset variation in the basic customer ID dataset and/or said customer ID information dataset activating a feedback loop sequence.
9. Computer program product comprising instructions for generating at least one KYC documentation file which, when said computer program product is executed by a computer, causes the computer to carry out acts of: - generating at least one KYC customer ID dataset in a KYC documentation file using an analysing sequence,
- monitoring at least one customer ID using at least one surveillance sequence, search ing at least one dataset variation in at least one information dataset in relation to at least one available information dataset related to said customer ID in at least one in- formation database.
10. Computer program product according to claim 9, further comprising instructions when detecting an amendment in the basic customer ID dataset and/or said customer ID information dataset, causes the computer to carry out acts of activating a feedback loop sequence.
11. Computer program product according to claim 9 or 10 further comprising instruc tions where said computer program product is a sub product of another computer pro gram product, such as being an application or a module to a main computer program product.
12. Computer program product according to claim 9, 10 or 11, where one or more executable computer program products is in data communication with said data pro cessing means, computer-readable storage medium and at least one user interface, where said computer program product controls the data communication between a customer ID case file related to said customer ID to and from said user interface, by using data processing means, where said computer program product is in data com munication with at least one remote computer product.
13. A computer-readable storage medium containing instructions to generate at least one dataset or datasets, when executed in a KYC real-time handling processing system according to one or more of claims 6 to 8, to perform the acts of one or more of claims 1 to 5.
14. A computer-readable storage medium having stored thereon dataset or datasets provided by a KYC real-time handling processing system according to one or more of claims 6 to 8 when performing the acts of one or more of claims 1 to 5.
PCT/DK2021/050072 2020-03-09 2021-03-09 Kyc analysing system WO2021180284A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DKPA202070154 2020-03-09
DKPA202070154 2020-03-09

Publications (2)

Publication Number Publication Date
WO2021180284A1 true WO2021180284A1 (en) 2021-09-16
WO2021180284A8 WO2021180284A8 (en) 2022-04-21

Family

ID=75659744

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/DK2021/050072 WO2021180284A1 (en) 2020-03-09 2021-03-09 Kyc analysing system

Country Status (1)

Country Link
WO (1) WO2021180284A1 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020138407A1 (en) * 2001-03-20 2002-09-26 David Lawrence Automated global risk management
WO2003077054A2 (en) * 2001-11-28 2003-09-18 Goldman, Sachs & Co. Transaction surveillance
US20100106635A1 (en) * 2008-10-23 2010-04-29 Bank Of America Corporation Client relationship profile
EP2555153A1 (en) * 2011-08-02 2013-02-06 Tata Consultancy Services Limited Financial activity monitoring system
US20140188677A1 (en) * 2012-12-28 2014-07-03 Identrust, Inc. Know your customer exchange system and method
US20150269701A1 (en) * 2014-03-24 2015-09-24 Mastercard International Incorporated Systems and methods for identity validation and verification

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020138407A1 (en) * 2001-03-20 2002-09-26 David Lawrence Automated global risk management
WO2003077054A2 (en) * 2001-11-28 2003-09-18 Goldman, Sachs & Co. Transaction surveillance
US20100106635A1 (en) * 2008-10-23 2010-04-29 Bank Of America Corporation Client relationship profile
EP2555153A1 (en) * 2011-08-02 2013-02-06 Tata Consultancy Services Limited Financial activity monitoring system
US20140188677A1 (en) * 2012-12-28 2014-07-03 Identrust, Inc. Know your customer exchange system and method
US20150269701A1 (en) * 2014-03-24 2015-09-24 Mastercard International Incorporated Systems and methods for identity validation and verification

Also Published As

Publication number Publication date
WO2021180284A8 (en) 2022-04-21

Similar Documents

Publication Publication Date Title
US10832317B1 (en) Systems, methods, and program products for performing deposit sweep transactions
US9536107B2 (en) System and method enabling multiparty and multi level authorizations for accessing confidential information
US20190087825A1 (en) Systems and methods for provisioning biometric templates to biometric devices
TW202042141A (en) Consumer protection system
US20210133706A1 (en) Automatic generation and population of digital interfaces based on adaptively processed image data
US9785949B2 (en) Customer communication analysis tool
US20230134651A1 (en) Synchronized Identity, Document, and Transaction Management
US20170004577A1 (en) Apparatus, system and method for enabling account opening
US20200167860A1 (en) Automated Anti-Money Laundering Compliance SaaS
US11676147B1 (en) Systems and methods for account ownership verification
WO2016122424A1 (en) Arrangement and management system for an electronic letter of guarantee and a method thereof
US9646343B2 (en) Systems and methods for interactively disambiguating entities
WO2021180284A1 (en) Kyc analysing system
US20150347518A1 (en) Associate communication analysis tool
US20210295452A1 (en) Systems and methods of pending transaction augmentation and automatic attachment to settled transactions
US20230125814A1 (en) Credit score management apparatus, credit score management method, and computer readable recording medium
KR20070109378A (en) Method for paperless electronic contract based on certified electronic document repository
TWM573866U (en) Dual verification system for over-the-counter banking transactions
US11640608B2 (en) Automated teller machine (“ATM”) with forensic card reader identification validation
KR102341214B1 (en) Financial payment system based on enterprise resource planning
US20020147921A1 (en) Method and system for migrating dynamic master templates in a biometric verification system
TWM607235U (en) Incomplete due diligence and high-risk customer transaction control system
JP2020135773A (en) Customer information management device and customer information management method
CN112053051A (en) Due diligence application system and information processing method thereof

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21720985

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM XXXX DATED 07/12/2022)

122 Ep: pct application non-entry in european phase

Ref document number: 21720985

Country of ref document: EP

Kind code of ref document: A1