US20110131125A1 - Correspondent Bank Registry - Google Patents

Correspondent Bank Registry Download PDF

Info

Publication number
US20110131125A1
US20110131125A1 US13/020,709 US201113020709A US2011131125A1 US 20110131125 A1 US20110131125 A1 US 20110131125A1 US 201113020709 A US201113020709 A US 201113020709A US 2011131125 A1 US2011131125 A1 US 2011131125A1
Authority
US
United States
Prior art keywords
certification
information
risk management
additionally
receiving
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/020,709
Inventor
David Lawrence
Carl Young
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Regulatory DataCorp Inc
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US09/812,627 external-priority patent/US8140415B2/en
Priority claimed from US10/074,583 external-priority patent/US7287280B2/en
Application filed by Individual filed Critical Individual
Priority to US13/020,709 priority Critical patent/US20110131125A1/en
Publication of US20110131125A1 publication Critical patent/US20110131125A1/en
Assigned to REGULATORY DATACORP, INC. reassignment REGULATORY DATACORP, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: GOLDMAN SACHS & CO.
Assigned to GOLDMAN SACHS PRIVATE MIDDLE MARKET CREDIT LLC, AS COLLATERAL AGENT reassignment GOLDMAN SACHS PRIVATE MIDDLE MARKET CREDIT LLC, AS COLLATERAL AGENT SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: REGULATORY DATACORP, INC.
Assigned to ANTARES CAPITAL LP, AS COLLATERAL AGENT reassignment ANTARES CAPITAL LP, AS COLLATERAL AGENT FIRST LIEN PATENT SECURITY AGREEMENT Assignors: REGULATORY DATACORP, INC.
Assigned to REGULATORY DATACORP, INC. reassignment REGULATORY DATACORP, INC. CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNOR NAME PREVIOUSLY RECORDED AT REEL: 040054 FRAME: 0122. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT. Assignors: GOLDMAN, SACHS & CO.
Assigned to REGULATORY DATACORP, INC. reassignment REGULATORY DATACORP, INC. MERGER (SEE DOCUMENT FOR DETAILS). Assignors: REGULATORY DATACORP, INTL LLC
Assigned to REGULATORY DATACORP, INC. reassignment REGULATORY DATACORP, INC. RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: GOLDMAN SACHS PRIVATE MIDDLE MARKET CREDIT LLC
Assigned to REGULATORY DATACORP, INC. reassignment REGULATORY DATACORP, INC. RELEASE OF SECURITY INTEREST IN PATENT COLLATERAL Assignors: ANTARES CAPITAL LP
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/06Asset management; Financial planning or analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/10Tax strategies

Definitions

  • This invention relates generally to a method and system for facilitating the identification, investigation, assessment and management of legal, regulatory, financial and reputational risks (“Risks”).
  • the present invention relates to a computerized system and method for banks and non-bank financial institution to comply with “know your customer” requirements associated with a correspondent bank.
  • Government regulations authorize a broad regime of record-keeping and regulatory reporting obligations on covered financial institutions as a tool for the federal government to use to fight drug trafficking, money laundering, and other crimes.
  • the regulations may require financial institutions to file currency and monetary instrument reports and to maintain certain records for possible use in tax, criminal and regulatory proceedings.
  • Such a body of regulation is designed chiefly to assist law enforcement authorities in detecting when criminals arc using banks and other financial institution as an intermediary for, or to hide the transfer of funds derived from criminal activity.
  • sections 313 and 319(b) of the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001 prohibit certain financial institutions from providing correspondent accounts to a foreign Shell Bank and requires financial institutions to take reasonable steps to ensure that a correspondent account provided to a foreign bank is not being used to indirectly provide banking services to foreign Shell Banks.
  • section 319(b) of the USA PATRIOT Act adds a new subsection (k) to 31 U.S.C. 5318 which requires certain financial institutions that provide correspondent accounts to a foreign bank to maintain records of the foreign bank's owners and agent in the United States designated to accept service of legal process.
  • the USA PATRIOT Act provides that a covered financial institution shall not establish, maintain, administer, or manage a correspondent account in the United States for, or on behalf of, a foreign bank that does not have a physical presence in any country (Shell Bank).
  • the USA PATRIOT Act requires a covered financial institution to take reasonable steps to ensure that any correspondent account established, maintained, administered, or managed by the covered financial institution in the United States for a foreign bank is not being used by that foreign bank to indirectly provide banking services to a foreign Shell Bank that is not a regulated affiliate.
  • Current regulations can require that a certification be established and maintained on a two year cycle.
  • Bank and non-bank financial institutions including: an investment bank; a merchant bank; a securities firm, any insured bank (as defined in section 3(h) of the Federal Deposit Insurance Act (12 U.S.C. 1813(h)); a commercial bank or trust company; a private banker; a credit union; a thrill institution; broker dealers securities and commodities trading firms; asset management companies, hedge funds, mutual funds, credit rating funds, securities exchanges and bourses, institutional and individual investors, law firms, accounting firms, auditing firms, or any institution the business of which is engaging in financial activities as described in section 4(k) of the Bank Holding Act of 1956; may be subject to legal and regulatory obligations associated with the USA PATRIOT Act, hereinafter collectively referred to as “Financial Institution.” Financial Institutions typically have few resources available to them to assist in establishing and maintaining necessary records.
  • PATRIOT ACT Establishing and maintaining certifications required under the USA PATRIOT ACT can be onerous to both a Financial Institution and to a foreign counterpart seeking to provide required information. Uncertainty can surround what the certification requirements are and how to properly fulfill them. Directions given by the U.S. Treasury Department estimate that a qualified person may take approximately twenty hours to properly generate a certification. This amount of work may need to be duplicated for each request from each respondent bank. In addition, there exists an increased likelihood of confusion, redundancy, inaccuracy and contradiction if different entities acting on behalf of a single correspondent bank provide certification to multiple respondent institutions.
  • the present invention provides methods and systems for managing Risk related to a certification process through the utilization of a risk management clearinghouse (RMC).
  • RMC risk management clearinghouse
  • the present invention provides for a certification, such as the certification of a foreign correspondent bank addressing the USA PATRIOT Act, to be accomplished by receiving risk management certification information from a foreign bank and storing the information in a computer server.
  • a request for particular certification information can be received and particular certification information can be transmitted according to the direction of the requestor and/or the provider of the information.
  • Information transmitted can include, for example, certification materials.
  • a RMC can receive a request to register certification information from an interested party or institution. Requests and information received can be docketed, if desired.
  • a RMC can receive a request for guidance relating to providing certification and responding to the request.
  • guidance can include ascertaining the completeness of certification information received or notifying appropriate parties of administrative obligations.
  • Still another aspect can include receiving updated information relating to the certification and transmitting the updated information to appropriate parties.
  • embodiments can also include requesting authorization to convey information supplied by a party, such as, for example, certification information, prior to conveying such information. Records of any conveyance of information, or other action taken can also be archived.
  • Embodiments can also include receiving information descriptive of a risk management certification from an entity, such as a foreign bank, and a network address of a resource storing a risk management certification relating to the entity.
  • the network address of the resource storing the risk management certification can be conveyed responsive to a request for information relating to the foreign bank, or other entity described by the risk management certification.
  • Some embodiments can include receiving authorization from the entity to convey the network address.
  • Embodiments can also include receiving notice of an updated risk management certification and a network address of a resource containing an updated risk management certification.
  • Notice of the updated risk management certification and a network address of a resource containing the updated risk management certification can be transmitted or otherwise conveyed to one or more recipients.
  • Notification of a renewal date can also be transmitted to one or more appropriate parties.
  • inventions of the present invention can include a computerized system, executable software, or a data signal implementing the inventive methods of the present invention.
  • the computer server can he accessed via a network access device, such as a computer.
  • the data signal can be operative with a computing device, and computer code can be embodied on a computer readable medium.
  • FIGS. 1 and 1 b illustrate block diagrams of some embodiments of the present invention.
  • FIG. 2 illustrates a network of computer systems that can embody a correspondent bank registry.
  • FIG. 3 illustrates a flow of exemplary steps that can be executed while implementing some embodiments of the present invention.
  • FIG. 4 illustrates a flow of exemplary steps that can be executed while implementing other embodiments the present invention.
  • FIG. 5 illustrates a flow of exemplary steps that can be executed while implementing updates in some embodiments the present invention.
  • FIG. 6 illustrates a flow of exemplary steps that can be executed while implementing embodiments the present invention utilizing a designated network address to locate a resource.
  • FIG. 7 illustrates a flow of additional exemplary steps that can be executed while implementing embodiments the present invention utilizing a designated network address to locate a resource.
  • FIG. 8 illustrates an exemplary graphical user interface that can implement various aspects of the present invention.
  • FIG. 9 illustrates an exemplary data structure that can be utilized to implement certain aspects of the present invention.
  • the present invention includes a method and system for facilitating the transfer of information relating to risk management, such as, for example, information directed towards compliance with the USA PATRIOT Act and certification of a foreign correspondent bank.
  • information relating to risk management such as, for example, information directed towards compliance with the USA PATRIOT Act and certification of a foreign correspondent bank.
  • a foreign bank or other entity can provide a RMC with information relating to compliance with government requirements, or other information, and allow the RMC to convey to information in whole or in part to interested parties.
  • Centralized distribution of certification related information can facilitate consistent and accurate compliance with government related requirements.
  • an RMC system 106 can facilitate an exchange of information required to manage risk associated with a foreign bank 101 - 103 and regulated affiliate 104 .
  • an RMC system 106 can act as a registry of information required for certification of a foreign correspondent bank according to risk management procedures, such as, for example, procedures required to meet obligations set forth by the USA PATRIOT Act.
  • the RMC system 106 can receive and maintain certifications 105 responsive to the risk management procedures and make the certifications 105 available to one or more Financial Institutions 107 , government entities, or other Subscriber 108 or interested party.
  • the certifications 105 can he useful to manage risk by fulfilling obligations set forth in the USA PATRIOT Act for a Financial Institution 107 acting as a respondent bank to a foreign correspondent bank.
  • a “Shell Bank” can include a foreign hank 101 - 103 without a physical presence in any country.
  • a physical presence can be a place of business that is maintained by a foreign bank 101 - 103 and is located at a fixed address, other than solely an electronic address, in a country in which the foreign bank 101 - 103 is authorized to conduct banking activities.
  • a “Correspondent Account”, with respect to a Financial Institution 107 can be an account established to receive deposits from, make payments on behalf of a foreign Financial Institution 107 , or handle other financial transactions related to such institution.
  • a “Certification” 105 may be a compilation of information utilized by a Financial Institution 107 to assist the institution to manage risk related to dealing with a foreign Shell Bank.
  • Certification 105 can include, among other things, documentation indicating that any Financial Institution 107 that maintains one or more correspondent accounts in the United States for a foreign bank 101 - 103 maintain records in the United States identifying the owner(s) of such foreign bank 101 - 103 and the name and address of a person who resides in the United States and is authorized to accept service of legal process for records regarding the correspondent account.
  • a Certification 105 established with the RMC system 106 can state that a foreign hank 101 - 103 that maintains a correspondent account with a covered Financial Institution 107 certifies either that it is not a Shell Bank; that it is a Shell Bank that it is a regulated affiliate of a non-Shell Bank; or that it is a Shell Bank that is not a regulated affiliate. In the case that a Shell Bank is not a regulated affiliate, prevailing law may prohibit a covered Financial Institution 107 from establishing or maintaining a correspondent account with that foreign bank 101 - 102 .
  • a RMC 106 can gather and collect information relating to a Financial institution's or other Financial Institution's procurement of information, for certification or otherwise.
  • Information can be collected, for example, from public sources, such as government lists. Non-public information gathered by a subscriber 107 - 108 can also be collected and stored in a manner that will not violate prevailing law, such as, for example, in a Proprietary Risk Management Server 211 . In some cases, the information may support or contradict information provided by a certification, such as whether a bank 101 - 102 is a Shell Bank.
  • a Financial Institution 107 may manage risk relating to correspondent accounts by ascertaining certain minimum information relating to the Financial Institution's 107 customers.
  • a Financial Institution 107 may manage risk relating to correspondent accounts by certifying that it is not providing correspondent accounts to foreign Shell Banks and taking reasonable steps to ensure that a correspondent account provided to a foreign bank 101 - 103 is not being used to indirectly provide banking services to a foreign Shell Bank.
  • Risk management procedures for a Financial Institution 107 that provides a correspondent account to a foreign bank 101 - 103 can include maintaining records relating to the foreign bank's 101 - 103 owners as well as records of an agent in the United States designated to accept service of legal process.
  • Risk management procedures implemented by a Financial Institution 107 may dictate, for example, that the Financial Institution 107 should not establish, maintain, administer, or manage a correspondent account in the United States for, or on behalf of Shell Bank.
  • the risk management procedures may include taking reasonable steps to ensure that any correspondent account established, maintained, administered, or managed by a covered Financial Institution 107 in the United States for a foreign bank 101 - 103 is not being used by that foreign hank 101 - 103 to indirectly provide banking services to a foreign Shell Bank that is not a regulated affiliate.
  • a foreign bank 101 - 103 can certify, such as, for example, to the RMC 106 , that it is not a Shell Bank. Risk management procedures can require that the RMC receive certification specifying a physical address for the foreign bank 101 - 103 and a regulator for the foreign bank 101 - 103 . If a foreign bank 101 - 103 certifies that it is a regulated affiliate, the foreign bank 101 - 103 can be required to specify a name and address of a non-Shell Bank with which the foreign bank 101 - 103 is affiliated and a regulator for the non-Shell Bank and the regulated affiliate. Certification information received by the RMC 106 can be stored and organized for expeditious delivery to an interested party authorized by parties involved to receive the information.
  • a foreign hank 101 - 103 can also certify either that it does not provide banking services to any foreign Shell Bank, other than a regulated affiliate; or that it provides banking services to a foreign Shell Bank but will not use any of the correspondent accounts with a U.S. Financial Institution 107 to provide banking services to any foreign Shell Bank, other than a regulated affiliate.
  • a foreign bank 101 - 103 can certify the identity of its owner(s) and include street addresses, as well as the identity and address of its agent for service of legal process in the United States.
  • a foreign bank 101 - 103 can also certify that it will notify each Financial Institution 107 in the United States at which it maintains a correspondent account in writing within 30 calendar days of any change in facts or circumstances previously certified or contained in the annexes to the Certification 105 .
  • the RMC system 106 can be utilized to effect notice, of any change in facts or circumstances previously certified or contained in the annexes to the Certification 105 .
  • notice can be accomplished via delivery of an electronic document, printing remotely, facsimile, or hardcopy generated and physically delivered.
  • a RMC system 106 can also be utilized to notify appropriate parties of administrative obligations such as, for example, notice of a change in facts contained in a Certification 105 .
  • Embodiments can also include providing a copy of any certifications 105 to the Secretary of the Treasury and the Attorney General of the United States, or their delegates.
  • Risk management procedures can establish that reporting information required for Certification 105 is voluntary for a foreign banking institution 101 - 103 ; however, failure to provide information necessary to complete Certification 105 may preclude the establishment or continuation of correspondent accounts with the U.S. Financial Institution 107 .
  • a subscriber 107 - 108 can include a Respondent Financial Institution 107 or other subscribing entity 108 , including, for example: a regulator, a money transfer agency, bourse, an institutional or individual investor, an auditing firm, a law firm, any institution the business of which is engaging in financial activities or other entity or institution who may be involved with a financial transaction or other business transaction or any entity subject to legal and regulatory compliance obligations with respect to money laundering, fraud, corruption, terrorism, organized crime, regulatory and suspicious activity reporting, sanctions, embargoes and other regulatory risks and associated obligations.
  • a Respondent Financial Institution 107 or other subscribing entity 108 including, for example: a regulator, a money transfer agency, bourse, an institutional or individual investor, an auditing firm, a law firm, any institution the business of which is engaging in financial activities or other entity or institution who may be involved with a financial transaction or other business transaction or any entity subject to legal and regulatory compliance obligations with respect to money laundering, fraud, corruption, terrorism, organized crime, regulatory and
  • Financial investments can include investment and merchant banking, public and private financing, commodities and a securities trading, commercial and consumer lending, asset management, rating of corporations and securities, public and private equity investment, public and private fixed income investment, listing to companies on a securities exchange and bourse, employee screening, auditing of corporate or other entities, legal opinions relating to a corporate or other entity, or other business related transactions.
  • FIG. 1A illustrates a scenario wherein a respondent Financial Institution 107 or other subscriber 108 can receive a Certification 105 from one or more foreign banks or affiliates 101 - 104 via an RMC 106 .
  • Certifications 105 registered with the RMC system 106 can be readily accessible to the respondent Financial Institution 107 or other subscriber 108 thereby facilitating collection of certifications 105 , wherein the respondent Financial Institution 107 is relieved of having to ascertain a correct person to contact within each foreign bank 101 - 104 from which it requires Certification 105 and coordinate receipt of each Certification 105 .
  • the present invention can make it possible for the respondent Financial Institution 107 to only have to complete a single access to the RMC system 106 in order to receive multiple certifications 105 , each from a separate foreign hank 101 - 102 or from a non-shell Foreign Bank 103 and/or a regulated affiliate 104 .
  • the Certification 105 can contain, information to assist a U.S. Financial Institution 107 comply with prevailing law regarding correspondent accounts and other regulations.
  • Embodiments can include information that is received from a foreign bank 101 - 104 in any form that can accurately convey information necessary to complete the Certification 105 .
  • information can he input into a graphical user interface (GUI), submitted via hard copy, facsimile, scanned image, or any other form of information conveyance.
  • GUI graphical user interface
  • the RMC system 106 can store the Certification 105 and convey it upon request.
  • Certification 105 information can be retrieved by a respondent Financial Institution 107 or other subscriber 108 using any available mechanism for conveying information, including, but not limited to: scanned image, database record retrieval, text file, facsimile, hard copy, data stored on a computer readable medium, or other mechanism.
  • FIG. 1B is related to FIG. 1A and more clearly illustrates a scenario wherein a correspondent Foreign Bank 101 seeking to open a correspondent account can convey a Certification 105 to one or more respondent Financial Institutions 107 and 109 or other subscriber 108 .
  • the correspondent Foreign Bank 101 can transmit information relating to the certification 105 to the RMC system 106 .
  • the RMC system 106 can store the information and generate a certification 105 and convey it to a respondent Financial Institution 107 and 109 or other subscriber 108 upon request of the correspondent Foreign Bank 101 or the Financial Institution 107 and 109 or other subscriber 108 .
  • Embodiments can also include transmission of a completed certification 105 to the RMC system 106 , such as an image documents comprising the certification 105 .
  • the completed certification 105 can then be transmitted by the RMC system 106 to a Financial Institution 107 and 109 or other subscriber 108 .
  • An automated RMC system 106 can include a computerized RMC server 210 accessible via a distributed network 201 such as the Internet, or a private network.
  • a user 206 - 209 can use a computerized system or network access device 202 - 205 to receive, input, transmit or view information processed in the RMC server 210 .
  • a protocol such as, for example, the transmission control protocol internet protocol (TCP/IP) can be utilized to provide consistency and reliability.
  • TCP/IP transmission control protocol internet protocol
  • a proprietary risk management (PRM) server 211 can access the RMC server 210 via the network 201 or via a direct link 213 , such as a T1 line, digital subscriber line (DSL), or other high speed pipe.
  • the PRM server 211 can in turn be accessed by an affiliated user via a system access device 202 - 205 and a communications network 201 , such as a local area network, or other private network, or even the Internet, if desired.
  • any function or reference to an RMC server 210 can also include a PRM server 211 , except that the PRM server 211 may be more appropriate to store and access proprietary information that will not be shared outside of an organization except as allowed by prevailing applicable law.
  • a PRM server 211 may he utilized to calculate risk quotients or other subjective valuations which an RMC server 210 may be limited from doing by an RMC 106 provider.
  • a system access device 202 - 205 used to access the RMC server 210 can include a processor, memory and a user input device, such as a keyboard and/or mouse, and a user output device, such as a display screen and/or printer.
  • the system access devices 202 - 205 can communicate with the RMC server 210 to access data and programs stored at the respective RMC server 210 .
  • a system access device 202 - 205 may interact with the RMC server 210 as if the RMC server 210 were a single entity in the network 200 .
  • the RMC server 210 may include multiple processing and database sub-systems, such as cooperative or redundant processing and/or database servers that can be geographically dispersed throughout the network 200 .
  • the RMC server 210 can include one or more databases 212 storing data relating to risk management, and in particular to certification of a foreign bank 101 - 103 or affiliate 104 , including, for example, docketing information and programming capable of tracking relative dates and entities involved. Information relating to and included in gathered certifications can be aggregated into a searchable data storage structure. Gathering data into an aggregate data structure 212 , such as a data warehouse, allows a RMC system 106 to have the data readily available for processing a risk management search associated with a Correspondent Bank 101 - 104 certification. Aggregated data 212 can also be scrubbed or otherwise enhanced to aid in searching.
  • data scrubbing can be utilized to implement a data warehouse comprising the aggregate data structure 212 .
  • Data scrubbing can be utilized to store information in a manner that gives efficient access to pertinent data. Scrubbing can facilitate expedient access to data commensurate with business decisions that will be based upon Risk management assessment provided.
  • Various data scrubbing routines can be utilized to facilitate aggregation of Risk variable related information.
  • the routines can include programs capable of correcting a specific type of mistake, such as an incomprehensible address, or clean up a full spectrum of commonly found database flaws, such as field alignment or misplaced data and move it to a correct field, or removing inconsistencies and inaccuracies from like data.
  • Other scrubbing routines can be directed directly towards specific legal issues, such as money laundering or terrorist tracking activities.
  • a scrubbing routine can be used to facilitate various different spelling of one name.
  • spelling of names can be important when names have been translated from a foreign language into English.
  • a data scrubbing routine can facilitate risk variable searching for multiple spellings of an equivalent name or other important information.
  • Such a routine can help correct database flaws. Accordingly, scrubbing routines can improve and expand data quality more efficiently than manual mending and also allow a subscriber 107 - 109 to quantify best practices for regulatory purposes.
  • a user 206 - 209 will access the RMC server 210 using client software executed at a system access device 202 - 205 .
  • the client software may include a generic hypertext markup language (HTML) browser, such as Netscape Navigator or Microsoft Internet Explorer, (a “WEB browser”).
  • HTML hypertext markup language
  • WEB browser a generic hypertext markup language
  • the client software may also be a proprietary browser, and/or other host access software.
  • an executable program such as a JavaTM program, may be downloaded from the RMC server 210 to the system access device 202 - 205 and executed at the system access device 202 - 205 as part of RMC risk management software.
  • Other implementations include proprietary software installed from a computer readable medium, such as a CD ROM.
  • the invention may therefore be implemented in digital electronic circuitry, computer hardware, firmware, software, or in combinations of the above.
  • Apparatus of the invention may be implemented in a computer program product tangibly embodied in a machine-readable storage device for execution by a programmable processor; and method steps of the invention may be performed by a programmable processor executing a program of instructions to perform functions of the invention by operating on input data and generating output.
  • a request to register a risk management certification with the RMC system 106 can be received, such as, for example, via an electronic communication, facsimile, hardcopy, or voice call.
  • the RMC system 106 can convey the certification materials to the entity that wishes to register or the entity's agent.
  • the materials can be conveyed, for example, via electronic file transfer, e-mail, facsimile, hardcopy, voice communication or other communications vehicle.
  • An exemplary certification that may currently be useful to address obligations incurred under the USA PATRIOT Act is attached hereto as Appendix A.
  • an RMC system 106 may receive a request for guidance in providing the certification materials.
  • Guidance may be necessary, for example, to interpret obligations relating to what needs to be certified in order to comply with various regulatory requirements, such as those set forth in the USA PATRIOT Act and the relative complexity of some information that may need interpretation.
  • An owner can mean any person who is a large direct owner, an indirect owner, and certain small direct owners.
  • a person can mean any individual, bank, corporation, partnership, limited liability company, or any other legal entity, except that members of the same family shall be considered one person; and voting shares or other voting interests means shares or other interests that entitle the holder to vote for or select directors (or individuals exercising similar functions).
  • the USA PATRIOT Act indicates that a small direct owner may or may not need to be reported depending on whether two or more small direct owners in the aggregate own 25 percent or more of the voting securities or interests of the foreign bank and are owned by the same indirect owner.
  • a large direct owner of a foreign bank can be a person who owns, controls, or has power to vote 25 percent or more of any class of voting securities or other voting interests of the foreign bank; or controls in any manner the election of a majority of the directors (or individuals exercising similar functions) of the foreign bank. The identity of each large direct owner is subject to reporting.
  • an indirect owner is any person in the ownership chain of any large direct owner who is not majority-owned by another person. If any two or more small direct owners of a foreign bank in the aggregate own, control, or have power to vote twenty five percent or more of any class of voting securities or other voting interests of the foreign bank and are majority-owned by the same person, or by the same chain of majority-owned persons, the indirect owner can be any person in the ownership chain of the small direct owners who is not majority-owned by another person. Each indirect owner may be subject to reporting.
  • Guidance relating to interpretation and compliance may be needed as each foreign institution attempts to properly and consistently provide certification to each U.S. Financial Institution with which the foreign institution has a correspondent banking relationship.
  • Guidance and centralization offered by an RMC 106 can facilitate a cohesive certification and minimize confusion, redundancy, inaccuracy and contradictions that may result from multiple parties each interpreting and translating such guidelines on their own.
  • the amount of resources and administration overhead associated with maintaining such records can be lessened by a centralized approach.
  • guidance may be provided by the RMC system 106 via online documentation, artificial intelligence programs, online question and answer materials, live administrative assistance, referral to a third party or other manner of responding to the request for guidance.
  • Some embodiments can include guidance that ascertains the completeness of certification information conveyed by a foreign bank 101 - 104 , such as, for example guidance as to whether entries have been set forth for all required inputs and a document has been properly executed where required. Electronic signatures may be sufficient in some embodiments to complete execution.
  • Embodiments can also include a verification step which can independently research the veracity of information put forth in a certification.
  • Other embodiments can convey any information put forth with no value judgment, research or other indication relating to the veracity or completeness of any information conveyed in a certification.
  • the RMC system 106 can also receive a risk management certification and at 315 the certification can be stored in a retrievable data storage device.
  • the information descriptive of or relating to the certification, as well as information descriptive of the entities involved can be docketed.
  • the docket can be utilized to track critical dates, entities involved, contact information and the like.
  • docketing can include parsing information contained in a Certification 105 and storing the parsed information in a database in order to facilitate analysis and docketing of the information.
  • data can be configured to track dates relating to the certification, dates relating to actions taken, contact information, requests, authorizations and other pertinent information.
  • Other embodiments can include docketing information descriptive of a Certification 105 .
  • the RMC system 106 can notify interested parties of administrative obligations, such as the obligation to re-certify every two years for compliance with the USA PATRIOT Act.
  • the RMC system 106 can receive updated information, such as information related to or otherwise comprising a certificate renewal and at 319 the updated certification information can be transmitted to interested parties.
  • a RMC system 106 can login an RMC subscriber and at 411 the RMC system 106 can receive a request for a particular certification.
  • the login can be accomplished in any manner that serves to identify the subscriber and allow for communication between the RMC system 106 and the subscriber, such as via login at a website or other electronic interface.
  • the RMC system 106 can request authorization to convey the certification from a party designated to grant such authorization, such as a compliance officer for the foreign bank 101 - 104 for which the certification is requested.
  • the RMC system 106 may receive a response to the request for authorization to convey the certification. At 413 a denial of required authorization can be received. Accordingly, at 415 the RMC system 106 can transmit a denial for the request of certification authorization. Alternatively, at 414 , the RMC system 106 may receive an approval for the request for authorization and at 416 transmit the certification to the requestor.
  • a request for a certification can be archived, along with a related response.
  • the RMC system 106 can also be utilized to generate one or more reports relating to a request for certification and associated action resultant to the request.
  • Risk management information which can be updated can include certification information utilized to comply with the USA PATRIOT Act.
  • a RMC system 106 can receive updated information, such as a change in contact information, change in ownership, change in agent to receive service of a subpoena or other change.
  • the received updates can be docketed to facilitate in processing and at 512 , a list of recipients who are to receive the updates can be compiled.
  • Recipients can include, for example, financial institutions or other subscribers 107 - 109 that have received a previous certification.
  • updates can be transmitted or otherwise conveyed to the members included on the list of recipients.
  • some embodiments of the present invention can include an RMC system 106 which does not actually receive risk management certification information, such as a certification to comply with the USA PATRIOT Act, but instead, at 610 receives a description of a certification 105 and a designated network address at which the certification can be accessed.
  • a designated network address can include, for example, a TCP/IP address, a uniform resource locator, or any other identifying mechanism that can direct access to a particular network resource.
  • the RMC system 106 can receive a request to convey a particular certification and at 612 the RMC system 106 can request authorization to convey the designated network address containing the particular certification.
  • a denial or authorization of the request to convey the designated network address can be received.
  • a denial of authorization is received and accordingly, at 615 the RMC can transmit a denial of the request for the certification.
  • an approval granting authorization is received, and accordingly, at 616 the RMC system 106 can transmit or otherwise convey the designated network address at which the certification information can be accessed.
  • a subscriber such as a respondent Financial Institution or other entity 107 - 109
  • a respondent Financial Institution or other entity 107 - 109 can access a network resource located at the address conveyed by the RMC system 106 and at 713 receive the certification information.
  • a portion of a display 801 can display information that relates to a respondent Financial institution, such as a U.S. Bank.
  • Another portion of the display 802 can include information descriptive of a correspondent Foreign Bank 101 - 103 and any regulated subsidiaries 104 .
  • Still another portion 803 can contain certification information.
  • a portion 804 can also display instructions relating to how to obtain a certification 105 .
  • the database 900 can include a field containing data descriptive of a respondent Financial Institution 901 as well as a field containing data descriptive of a correspondent institution 902 . Another field can hold data descriptive of a related certification 903 .
  • certified hard copy documents can be gathered and scanned into the RMC system 106 such that the scanned image can be forwarded to a subscriber as appropriate.
  • certification data stored with the RMC 106 can indicate an agent for legal service which can be utilized in conjunction with an electronic subpoena service to serve a subpoena.

Abstract

Methods and systems are provided for facilitating the transfer of information relating to risk management, such as, for example information directed towards compliance with the USA PATRIOT Act and certification of a foreign correspondent bank. Generally, the a foreign bank or other entity can provide a risk management clearinghouse with information relating to compliance with government requirements, or other information, and allow the risk management clearinghouse to convey to information in whole or in part to interested parties. Centralized distribution of certification related information can facilitate consistent and accurate compliance with government related requirements.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • This application claims priority to U.S. Ser. No. 60/390,937 filed Jun. 24, 2002 and entitled “Correspondent Bank Registry”. This application is a continuation-in-part of a prior application entitled “Risk Management Clearinghouse” filed Apr. 4, 2002 and bearing the Ser. No. 10/074,583, as well as being a continuation-in-part of a prior application entitled “Risk Management Clearinghouse” filed Oct. 30, 2001, and bearing the Ser. No. 10/021,124, which is also a continuation-in-part of a prior application entitled “Automated Global Risk Management” filed Mar. 20, 2001; and bearing the Ser. No. 09/812,627, all of which are relied upon and incorporated by reference.
  • BACKGROUND
  • This invention relates generally to a method and system for facilitating the identification, investigation, assessment and management of legal, regulatory, financial and reputational risks (“Risks”). In particular, the present invention relates to a computerized system and method for banks and non-bank financial institution to comply with “know your customer” requirements associated with a correspondent bank.
  • As money-laundering and related concerns have become increasingly important public policy concerns, regulators have attempted to address these issues by imposing increasing formal and informal obligations upon financial institutions. Government regulations authorize a broad regime of record-keeping and regulatory reporting obligations on covered financial institutions as a tool for the federal government to use to fight drug trafficking, money laundering, and other crimes. The regulations may require financial institutions to file currency and monetary instrument reports and to maintain certain records for possible use in tax, criminal and regulatory proceedings. Such a body of regulation is designed chiefly to assist law enforcement authorities in detecting when criminals arc using banks and other financial institution as an intermediary for, or to hide the transfer of funds derived from criminal activity.
  • Amongst other obligations, sections 313 and 319(b) of the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001 prohibit certain financial institutions from providing correspondent accounts to a foreign Shell Bank and requires financial institutions to take reasonable steps to ensure that a correspondent account provided to a foreign bank is not being used to indirectly provide banking services to foreign Shell Banks. In addition, section 319(b) of the USA PATRIOT Act adds a new subsection (k) to 31 U.S.C. 5318 which requires certain financial institutions that provide correspondent accounts to a foreign bank to maintain records of the foreign bank's owners and agent in the United States designated to accept service of legal process.
  • The USA PATRIOT Act, provides that a covered financial institution shall not establish, maintain, administer, or manage a correspondent account in the United States for, or on behalf of, a foreign bank that does not have a physical presence in any country (Shell Bank). In addition, the USA PATRIOT Act requires a covered financial institution to take reasonable steps to ensure that any correspondent account established, maintained, administered, or managed by the covered financial institution in the United States for a foreign bank is not being used by that foreign bank to indirectly provide banking services to a foreign Shell Bank that is not a regulated affiliate. Current regulations can require that a certification be established and maintained on a two year cycle.
  • Bank and non-bank financial institutions, including: an investment bank; a merchant bank; a securities firm, any insured bank (as defined in section 3(h) of the Federal Deposit Insurance Act (12 U.S.C. 1813(h)); a commercial bank or trust company; a private banker; a credit union; a thrill institution; broker dealers securities and commodities trading firms; asset management companies, hedge funds, mutual funds, credit rating funds, securities exchanges and bourses, institutional and individual investors, law firms, accounting firms, auditing firms, or any institution the business of which is engaging in financial activities as described in section 4(k) of the Bank Holding Act of 1956; may be subject to legal and regulatory obligations associated with the USA PATRIOT Act, hereinafter collectively referred to as “Financial Institution.” Financial Institutions typically have few resources available to them to assist in establishing and maintaining necessary records.
  • Establishing and maintaining certifications required under the USA PATRIOT ACT can be onerous to both a Financial Institution and to a foreign counterpart seeking to provide required information. Uncertainty can surround what the certification requirements are and how to properly fulfill them. Directions given by the U.S. Treasury Department estimate that a qualified person may take approximately twenty hours to properly generate a certification. This amount of work may need to be duplicated for each request from each respondent bank. In addition, there exists an increased likelihood of confusion, redundancy, inaccuracy and contradiction if different entities acting on behalf of a single correspondent bank provide certification to multiple respondent institutions.
  • What is needed is a method and system to coordinate and administer the certification process. Compiled certification information should be situated in a known resource from which it can be conveyed to a compliance department or government entity and also be able to demonstrate to regulators that a Financial Institution has met standards relating to risk containment.
  • SUMMARY
  • Accordingly, the present invention provides methods and systems for managing Risk related to a certification process through the utilization of a risk management clearinghouse (RMC). The present invention provides for a certification, such as the certification of a foreign correspondent bank addressing the USA PATRIOT Act, to be accomplished by receiving risk management certification information from a foreign bank and storing the information in a computer server. A request for particular certification information can be received and particular certification information can be transmitted according to the direction of the requestor and/or the provider of the information. Information transmitted can include, for example, certification materials.
  • In facilitating the risk management process, a RMC can receive a request to register certification information from an interested party or institution. Requests and information received can be docketed, if desired.
  • In another aspect, a RMC can receive a request for guidance relating to providing certification and responding to the request. For example, in some embodiments, guidance can include ascertaining the completeness of certification information received or notifying appropriate parties of administrative obligations.
  • Still another aspect can include receiving updated information relating to the certification and transmitting the updated information to appropriate parties. In addition, embodiments can also include requesting authorization to convey information supplied by a party, such as, for example, certification information, prior to conveying such information. Records of any conveyance of information, or other action taken can also be archived.
  • Embodiments can also include receiving information descriptive of a risk management certification from an entity, such as a foreign bank, and a network address of a resource storing a risk management certification relating to the entity. The network address of the resource storing the risk management certification can be conveyed responsive to a request for information relating to the foreign bank, or other entity described by the risk management certification. Some embodiments can include receiving authorization from the entity to convey the network address.
  • Embodiments can also include receiving notice of an updated risk management certification and a network address of a resource containing an updated risk management certification. Notice of the updated risk management certification and a network address of a resource containing the updated risk management certification can be transmitted or otherwise conveyed to one or more recipients. Notification of a renewal date can also be transmitted to one or more appropriate parties.
  • Other embodiments of the present invention can include a computerized system, executable software, or a data signal implementing the inventive methods of the present invention. The computer server can he accessed via a network access device, such as a computer. Similarly, the data signal can be operative with a computing device, and computer code can be embodied on a computer readable medium.
  • Various features and embodiments are further described in the following figures, drawings and claims.
  • DESCRIPTION OF THE DRAWINGS
  • FIGS. 1 and 1 b illustrate block diagrams of some embodiments of the present invention.
  • FIG. 2 illustrates a network of computer systems that can embody a correspondent bank registry.
  • FIG. 3 illustrates a flow of exemplary steps that can be executed while implementing some embodiments of the present invention.
  • FIG. 4 illustrates a flow of exemplary steps that can be executed while implementing other embodiments the present invention.
  • FIG. 5 illustrates a flow of exemplary steps that can be executed while implementing updates in some embodiments the present invention.
  • FIG. 6 illustrates a flow of exemplary steps that can be executed while implementing embodiments the present invention utilizing a designated network address to locate a resource.
  • FIG. 7 illustrates a flow of additional exemplary steps that can be executed while implementing embodiments the present invention utilizing a designated network address to locate a resource.
  • FIG. 8 illustrates an exemplary graphical user interface that can implement various aspects of the present invention.
  • FIG. 9 illustrates an exemplary data structure that can be utilized to implement certain aspects of the present invention.
  • DETAILED DESCRIPTION
  • The present invention includes a method and system for facilitating the transfer of information relating to risk management, such as, for example, information directed towards compliance with the USA PATRIOT Act and certification of a foreign correspondent bank. Generally, a foreign bank or other entity can provide a RMC with information relating to compliance with government requirements, or other information, and allow the RMC to convey to information in whole or in part to interested parties. Centralized distribution of certification related information can facilitate consistent and accurate compliance with government related requirements.
  • Referring now to FIG. 1 a block diagram of one embodiment of the present invention is illustrated. In addition to other services that an RMC system 106 may provide, such as those described in related documents, an RMC system 106 can facilitate an exchange of information required to manage risk associated with a foreign bank 101-103 and regulated affiliate 104. In some embodiments, an RMC system 106 can act as a registry of information required for certification of a foreign correspondent bank according to risk management procedures, such as, for example, procedures required to meet obligations set forth by the USA PATRIOT Act. The RMC system 106 can receive and maintain certifications 105 responsive to the risk management procedures and make the certifications 105 available to one or more Financial Institutions 107, government entities, or other Subscriber 108 or interested party. In particular, the certifications 105 can he useful to manage risk by fulfilling obligations set forth in the USA PATRIOT Act for a Financial Institution 107 acting as a respondent bank to a foreign correspondent bank.
  • For the purposes of this application, a “Shell Bank” can include a foreign hank 101-103 without a physical presence in any country. A physical presence can be a place of business that is maintained by a foreign bank 101-103 and is located at a fixed address, other than solely an electronic address, in a country in which the foreign bank 101-103 is authorized to conduct banking activities.
  • A “Correspondent Account”, with respect to a Financial Institution 107, can be an account established to receive deposits from, make payments on behalf of a foreign Financial Institution 107, or handle other financial transactions related to such institution.
  • A “Certification” 105 may be a compilation of information utilized by a Financial Institution 107 to assist the institution to manage risk related to dealing with a foreign Shell Bank. Certification 105 can include, among other things, documentation indicating that any Financial Institution 107 that maintains one or more correspondent accounts in the United States for a foreign bank 101-103 maintain records in the United States identifying the owner(s) of such foreign bank 101-103 and the name and address of a person who resides in the United States and is authorized to accept service of legal process for records regarding the correspondent account.
  • A Certification 105 established with the RMC system 106 can state that a foreign hank 101-103 that maintains a correspondent account with a covered Financial Institution 107 certifies either that it is not a Shell Bank; that it is a Shell Bank that it is a regulated affiliate of a non-Shell Bank; or that it is a Shell Bank that is not a regulated affiliate. In the case that a Shell Bank is not a regulated affiliate, prevailing law may prohibit a covered Financial Institution 107 from establishing or maintaining a correspondent account with that foreign bank 101-102.
  • Independent of a bank's or other Financial Institution's procurement of information, for certification or otherwise, a RMC 106 can gather and collect information relating to a Financial
  • Institution. Information can be collected, for example, from public sources, such as government lists. Non-public information gathered by a subscriber 107-108 can also be collected and stored in a manner that will not violate prevailing law, such as, for example, in a Proprietary Risk Management Server 211. In some cases, the information may support or contradict information provided by a certification, such as whether a bank 101-102 is a Shell Bank.
  • Amendments to the anti-money laundering provisions of the Bank Secrecy Act (BSA), which are included in the USA PATRIOT Act may require that a Financial Institution 107 manage risk relating to correspondent accounts by ascertaining certain minimum information relating to the Financial Institution's 107 customers. In particular, a Financial Institution 107 may manage risk relating to correspondent accounts by certifying that it is not providing correspondent accounts to foreign Shell Banks and taking reasonable steps to ensure that a correspondent account provided to a foreign bank 101-103 is not being used to indirectly provide banking services to a foreign Shell Bank. Risk management procedures for a Financial Institution 107 that provides a correspondent account to a foreign bank 101-103 can include maintaining records relating to the foreign bank's 101-103 owners as well as records of an agent in the United States designated to accept service of legal process.
  • Risk management procedures implemented by a Financial Institution 107 may dictate, for example, that the Financial Institution 107 should not establish, maintain, administer, or manage a correspondent account in the United States for, or on behalf of Shell Bank. In addition, the risk management procedures may include taking reasonable steps to ensure that any correspondent account established, maintained, administered, or managed by a covered Financial Institution 107 in the United States for a foreign bank 101-103 is not being used by that foreign hank 101-103 to indirectly provide banking services to a foreign Shell Bank that is not a regulated affiliate.
  • A foreign bank 101-103 can certify, such as, for example, to the RMC 106, that it is not a Shell Bank. Risk management procedures can require that the RMC receive certification specifying a physical address for the foreign bank 101-103 and a regulator for the foreign bank 101-103. If a foreign bank 101-103 certifies that it is a regulated affiliate, the foreign bank 101-103 can be required to specify a name and address of a non-Shell Bank with which the foreign bank 101-103 is affiliated and a regulator for the non-Shell Bank and the regulated affiliate. Certification information received by the RMC 106 can be stored and organized for expeditious delivery to an interested party authorized by parties involved to receive the information.
  • A foreign hank 101-103 can also certify either that it does not provide banking services to any foreign Shell Bank, other than a regulated affiliate; or that it provides banking services to a foreign Shell Bank but will not use any of the correspondent accounts with a U.S. Financial Institution 107 to provide banking services to any foreign Shell Bank, other than a regulated affiliate.
  • In another aspect, a foreign bank 101-103 can certify the identity of its owner(s) and include street addresses, as well as the identity and address of its agent for service of legal process in the United States.
  • A foreign bank 101-103 can also certify that it will notify each Financial Institution 107 in the United States at which it maintains a correspondent account in writing within 30 calendar days of any change in facts or circumstances previously certified or contained in the annexes to the Certification 105.
  • In some embodiments, the RMC system 106 can be utilized to effect notice, of any change in facts or circumstances previously certified or contained in the annexes to the Certification 105. For those Financial Institutions 107 on record with RMC system 106 notice can be accomplished via delivery of an electronic document, printing remotely, facsimile, or hardcopy generated and physically delivered. A RMC system 106 can also be utilized to notify appropriate parties of administrative obligations such as, for example, notice of a change in facts contained in a Certification 105.
  • Embodiments can also include providing a copy of any certifications 105 to the Secretary of the Treasury and the Attorney General of the United States, or their delegates.
  • Risk management procedures can establish that reporting information required for Certification 105 is voluntary for a foreign banking institution 101-103; however, failure to provide information necessary to complete Certification 105 may preclude the establishment or continuation of correspondent accounts with the U.S. Financial Institution 107.
  • A subscriber 107-108 can include a Respondent Financial Institution 107 or other subscribing entity 108, including, for example: a regulator, a money transfer agency, bourse, an institutional or individual investor, an auditing firm, a law firm, any institution the business of which is engaging in financial activities or other entity or institution who may be involved with a financial transaction or other business transaction or any entity subject to legal and regulatory compliance obligations with respect to money laundering, fraud, corruption, terrorism, organized crime, regulatory and suspicious activity reporting, sanctions, embargoes and other regulatory risks and associated obligations.
  • Financial investments can include investment and merchant banking, public and private financing, commodities and a securities trading, commercial and consumer lending, asset management, rating of corporations and securities, public and private equity investment, public and private fixed income investment, listing to companies on a securities exchange and bourse, employee screening, auditing of corporate or other entities, legal opinions relating to a corporate or other entity, or other business related transactions.
  • FIG. 1A illustrates a scenario wherein a respondent Financial Institution 107 or other subscriber 108 can receive a Certification 105 from one or more foreign banks or affiliates 101-104 via an RMC 106. Certifications 105 registered with the RMC system 106 can be readily accessible to the respondent Financial Institution 107 or other subscriber 108 thereby facilitating collection of certifications 105, wherein the respondent Financial Institution 107 is relieved of having to ascertain a correct person to contact within each foreign bank 101-104 from which it requires Certification 105 and coordinate receipt of each Certification 105. As illustrated, the present invention can make it possible for the respondent Financial Institution 107 to only have to complete a single access to the RMC system 106 in order to receive multiple certifications 105, each from a separate foreign hank 101-102 or from a non-shell Foreign Bank 103 and/or a regulated affiliate 104. The Certification 105 can contain, information to assist a U.S. Financial Institution 107 comply with prevailing law regarding correspondent accounts and other regulations.
  • Embodiments can include information that is received from a foreign bank 101-104 in any form that can accurately convey information necessary to complete the Certification 105. For example, information can he input into a graphical user interface (GUI), submitted via hard copy, facsimile, scanned image, or any other form of information conveyance. The RMC system 106 can store the Certification 105 and convey it upon request.
  • Similarly, Certification 105 information can be retrieved by a respondent Financial Institution 107 or other subscriber 108 using any available mechanism for conveying information, including, but not limited to: scanned image, database record retrieval, text file, facsimile, hard copy, data stored on a computer readable medium, or other mechanism.
  • FIG. 1B is related to FIG. 1A and more clearly illustrates a scenario wherein a correspondent Foreign Bank 101 seeking to open a correspondent account can convey a Certification 105 to one or more respondent Financial Institutions 107 and 109 or other subscriber 108. In some embodiments, the correspondent Foreign Bank 101 can transmit information relating to the certification 105 to the RMC system 106. The RMC system 106 can store the information and generate a certification 105 and convey it to a respondent Financial Institution 107 and 109 or other subscriber 108 upon request of the correspondent Foreign Bank 101 or the Financial Institution 107 and 109 or other subscriber 108. Embodiments can also include transmission of a completed certification 105 to the RMC system 106, such as an image documents comprising the certification 105. The completed certification 105 can then be transmitted by the RMC system 106 to a Financial Institution 107 and 109 or other subscriber 108.
  • Referring now to FIG. 2, a network diagram illustrating one embodiment of the present invention is shown 200. An automated RMC system 106 can include a computerized RMC server 210 accessible via a distributed network 201 such as the Internet, or a private network. A user 206-209, can use a computerized system or network access device 202-205 to receive, input, transmit or view information processed in the RMC server 210. A protocol, such as, for example, the transmission control protocol internet protocol (TCP/IP) can be utilized to provide consistency and reliability.
  • In addition, a proprietary risk management (PRM) server 211 can access the RMC server 210 via the network 201 or via a direct link 213, such as a T1 line, digital subscriber line (DSL), or other high speed pipe. The PRM server 211 can in turn be accessed by an affiliated user via a system access device 202-205 and a communications network 201, such as a local area network, or other private network, or even the Internet, if desired. For the purposes of this application, any function or reference to an RMC server 210 can also include a PRM server 211, except that the PRM server 211 may be more appropriate to store and access proprietary information that will not be shared outside of an organization except as allowed by prevailing applicable law. In addition, in some embodiments, a PRM server 211 may he utilized to calculate risk quotients or other subjective valuations which an RMC server 210 may be limited from doing by an RMC 106 provider.
  • A system access device 202-205 used to access the RMC server 210 can include a processor, memory and a user input device, such as a keyboard and/or mouse, and a user output device, such as a display screen and/or printer. The system access devices 202-205 can communicate with the RMC server 210 to access data and programs stored at the respective RMC server 210. A system access device 202-205 may interact with the RMC server 210 as if the RMC server 210 were a single entity in the network 200. However, the RMC server 210 may include multiple processing and database sub-systems, such as cooperative or redundant processing and/or database servers that can be geographically dispersed throughout the network 200.
  • The RMC server 210 can include one or more databases 212 storing data relating to risk management, and in particular to certification of a foreign bank 101-103 or affiliate 104, including, for example, docketing information and programming capable of tracking relative dates and entities involved. Information relating to and included in gathered certifications can be aggregated into a searchable data storage structure. Gathering data into an aggregate data structure 212, such as a data warehouse, allows a RMC system 106 to have the data readily available for processing a risk management search associated with a Correspondent Bank 101-104 certification. Aggregated data 212 can also be scrubbed or otherwise enhanced to aid in searching.
  • In one embodiment of enhancing data, data scrubbing can be utilized to implement a data warehouse comprising the aggregate data structure 212. Data scrubbing can be utilized to store information in a manner that gives efficient access to pertinent data. Scrubbing can facilitate expedient access to data commensurate with business decisions that will be based upon Risk management assessment provided.
  • Various data scrubbing routines can be utilized to facilitate aggregation of Risk variable related information. The routines can include programs capable of correcting a specific type of mistake, such as an incomprehensible address, or clean up a full spectrum of commonly found database flaws, such as field alignment or misplaced data and move it to a correct field, or removing inconsistencies and inaccuracies from like data. Other scrubbing routines can be directed directly towards specific legal issues, such as money laundering or terrorist tracking activities.
  • For example, a scrubbing routine can be used to facilitate various different spelling of one name. In particular, spelling of names can be important when names have been translated from a foreign language into English. A data scrubbing routine can facilitate risk variable searching for multiple spellings of an equivalent name or other important information. Such a routine can help correct database flaws. Accordingly, scrubbing routines can improve and expand data quality more efficiently than manual mending and also allow a subscriber 107-109 to quantify best practices for regulatory purposes.
  • Typically a user 206-209 will access the RMC server 210 using client software executed at a system access device 202-205. The client software may include a generic hypertext markup language (HTML) browser, such as Netscape Navigator or Microsoft Internet Explorer, (a “WEB browser”). The client software may also be a proprietary browser, and/or other host access software. In some cases, an executable program, such as a Java™ program, may be downloaded from the RMC server 210 to the system access device 202-205 and executed at the system access device 202-205 as part of RMC risk management software. Other implementations include proprietary software installed from a computer readable medium, such as a CD ROM. The invention may therefore be implemented in digital electronic circuitry, computer hardware, firmware, software, or in combinations of the above. Apparatus of the invention may be implemented in a computer program product tangibly embodied in a machine-readable storage device for execution by a programmable processor; and method steps of the invention may be performed by a programmable processor executing a program of instructions to perform functions of the invention by operating on input data and generating output.
  • Referring now to FIG. 3, steps that can be performed while practicing the present invention are illustrated. From the perspective of an RMC system 106 or RMC provider, at 310 a request to register a risk management certification with the RMC system 106 can be received, such as, for example, via an electronic communication, facsimile, hardcopy, or voice call. At 311, the RMC system 106 can convey the certification materials to the entity that wishes to register or the entity's agent. The materials can be conveyed, for example, via electronic file transfer, e-mail, facsimile, hardcopy, voice communication or other communications vehicle. An exemplary certification that may currently be useful to address obligations incurred under the USA PATRIOT Act is attached hereto as Appendix A.
  • At 312, an RMC system 106 may receive a request for guidance in providing the certification materials. Guidance may be necessary, for example, to interpret obligations relating to what needs to be certified in order to comply with various regulatory requirements, such as those set forth in the USA PATRIOT Act and the relative complexity of some information that may need interpretation.
  • For example, in complying with the USA PATRIOT Act the task of ascertaining who constitutes an “owner” that should be reported can be subject to a fair amount of work and interpretation. An owner can mean any person who is a large direct owner, an indirect owner, and certain small direct owners. A person can mean any individual, bank, corporation, partnership, limited liability company, or any other legal entity, except that members of the same family shall be considered one person; and voting shares or other voting interests means shares or other interests that entitle the holder to vote for or select directors (or individuals exercising similar functions).
  • The USA PATRIOT Act indicates that a small direct owner may or may not need to be reported depending on whether two or more small direct owners in the aggregate own 25 percent or more of the voting securities or interests of the foreign bank and are owned by the same indirect owner. A large direct owner of a foreign bank can be a person who owns, controls, or has power to vote 25 percent or more of any class of voting securities or other voting interests of the foreign bank; or controls in any manner the election of a majority of the directors (or individuals exercising similar functions) of the foreign bank. The identity of each large direct owner is subject to reporting. If any large direct owner of a foreign bank 101-103 is majority-owned by another person, or by a chain of majority-owned persons, an indirect owner is any person in the ownership chain of any large direct owner who is not majority-owned by another person. If any two or more small direct owners of a foreign bank in the aggregate own, control, or have power to vote twenty five percent or more of any class of voting securities or other voting interests of the foreign bank and are majority-owned by the same person, or by the same chain of majority-owned persons, the indirect owner can be any person in the ownership chain of the small direct owners who is not majority-owned by another person. Each indirect owner may be subject to reporting.
  • Guidance relating to interpretation and compliance may be needed as each foreign institution attempts to properly and consistently provide certification to each U.S. Financial Institution with which the foreign institution has a correspondent banking relationship. Guidance and centralization offered by an RMC 106 can facilitate a cohesive certification and minimize confusion, redundancy, inaccuracy and contradictions that may result from multiple parties each interpreting and translating such guidelines on their own. In addition, the amount of resources and administration overhead associated with maintaining such records can be lessened by a centralized approach.
  • At 313, guidance may be provided by the RMC system 106 via online documentation, artificial intelligence programs, online question and answer materials, live administrative assistance, referral to a third party or other manner of responding to the request for guidance. Some embodiments can include guidance that ascertains the completeness of certification information conveyed by a foreign bank 101-104, such as, for example guidance as to whether entries have been set forth for all required inputs and a document has been properly executed where required. Electronic signatures may be sufficient in some embodiments to complete execution.
  • Embodiments can also include a verification step which can independently research the veracity of information put forth in a certification. Other embodiments can convey any information put forth with no value judgment, research or other indication relating to the veracity or completeness of any information conveyed in a certification.
  • At 314, the RMC system 106 can also receive a risk management certification and at 315 the certification can be stored in a retrievable data storage device. In addition, at 316 the information descriptive of or relating to the certification, as well as information descriptive of the entities involved, can be docketed. The docket can be utilized to track critical dates, entities involved, contact information and the like. In some embodiments, docketing can include parsing information contained in a Certification 105 and storing the parsed information in a database in order to facilitate analysis and docketing of the information. For example, data can be configured to track dates relating to the certification, dates relating to actions taken, contact information, requests, authorizations and other pertinent information. Other embodiments can include docketing information descriptive of a Certification 105.
  • At 317, the RMC system 106 can notify interested parties of administrative obligations, such as the obligation to re-certify every two years for compliance with the USA PATRIOT Act. At 318, the RMC system 106 can receive updated information, such as information related to or otherwise comprising a certificate renewal and at 319 the updated certification information can be transmitted to interested parties.
  • Referring now to FIG. 4, additional steps that can be performed while implementing some embodiments of the present invention are illustrated. At 410, a RMC system 106 can login an RMC subscriber and at 411 the RMC system 106 can receive a request for a particular certification. The login can be accomplished in any manner that serves to identify the subscriber and allow for communication between the RMC system 106 and the subscriber, such as via login at a website or other electronic interface. At 412, responsive to a request for a certification, the RMC system 106 can request authorization to convey the certification from a party designated to grant such authorization, such as a compliance officer for the foreign bank 101-104 for which the certification is requested.
  • At 413 and 414 the RMC system 106 may receive a response to the request for authorization to convey the certification. At 413 a denial of required authorization can be received. Accordingly, at 415 the RMC system 106 can transmit a denial for the request of certification authorization. Alternatively, at 414, the RMC system 106 may receive an approval for the request for authorization and at 416 transmit the certification to the requestor.
  • At 417, a request for a certification can be archived, along with a related response. At 418, the RMC system 106 can also be utilized to generate one or more reports relating to a request for certification and associated action resultant to the request.
  • Referring now to FIG. 5, steps relating to updating risk management information according to some embodiments of the present invention arc illustrated. Risk management information which can be updated can include certification information utilized to comply with the USA PATRIOT Act. At 510, a RMC system 106 can receive updated information, such as a change in contact information, change in ownership, change in agent to receive service of a subpoena or other change. At 511, the received updates can be docketed to facilitate in processing and at 512, a list of recipients who are to receive the updates can be compiled. Recipients can include, for example, financial institutions or other subscribers 107-109 that have received a previous certification. At 513, updates can be transmitted or otherwise conveyed to the members included on the list of recipients.
  • Referring now to FIG. 6, some embodiments of the present invention can include an RMC system 106 which does not actually receive risk management certification information, such as a certification to comply with the USA PATRIOT Act, but instead, at 610 receives a description of a certification 105 and a designated network address at which the certification can be accessed. A designated network address can include, for example, a TCP/IP address, a uniform resource locator, or any other identifying mechanism that can direct access to a particular network resource. At 611, the RMC system 106 can receive a request to convey a particular certification and at 612 the RMC system 106 can request authorization to convey the designated network address containing the particular certification. At 613 and 614 a denial or authorization of the request to convey the designated network address can be received. At 613 a denial of authorization is received and accordingly, at 615 the RMC can transmit a denial of the request for the certification. At 614 an approval granting authorization is received, and accordingly, at 616 the RMC system 106 can transmit or otherwise convey the designated network address at which the certification information can be accessed.
  • Relatedly, as illustrated in FIG. 7, in some embodiments, at 710, a subscriber, such as a respondent Financial Institution or other entity 107-109, can request certification information from the RMC system 106 and at 711 receive a designated network address of a resource that contains a related certification 105 which is available via the network 201. At 712, a respondent Financial Institution or other entity 107-109 can access a network resource located at the address conveyed by the RMC system 106 and at 713 receive the certification information.
  • Referring now to FIG. 8, an exemplary GUI 800 that can be utilized while practicing the present invention is illustrated. A portion of a display 801 can display information that relates to a respondent Financial institution, such as a U.S. Bank. Another portion of the display 802 can include information descriptive of a correspondent Foreign Bank 101-103 and any regulated subsidiaries 104. Still another portion 803 can contain certification information. A portion 804 can also display instructions relating to how to obtain a certification 105.
  • Referring now to FIG. 9, a portion of a design of a database that can be utilized while implementing the present invention is illustrated. The database 900 can include a field containing data descriptive of a respondent Financial Institution 901 as well as a field containing data descriptive of a correspondent institution 902. Another field can hold data descriptive of a related certification 903.
  • A number of embodiments of the present invention have been described. Nevertheless, it will be understood that various modifications may be made without departing from the spirit and scope of the invention. For example, certified hard copy documents can be gathered and scanned into the RMC system 106 such that the scanned image can be forwarded to a subscriber as appropriate. In addition, certification data stored with the RMC 106 can indicate an agent for legal service which can be utilized in conjunction with an electronic subpoena service to serve a subpoena. Still other embodiments include certification data and/or documents that will expire and be locked, such as with encryption after a set period of time has elapsed, such as, for example a period for which the data will remain current. Accordingly, other embodiments are within the scope of the following claims.

Claims (21)

1. A method for managing risk associated with a correspondent account, the method comprising:
receiving risk management certification information from a foreign bank;
storing the information in a computer server;
receiving a request for particular certification information; and
transmitting the particular certification information.
2. The method of claim 1 additionally comprising the step of receiving a request to register certification information.
3. The method of claim 1 additionally comprising the step of transmitting certification registration materials.
4. The method of claim 1 additionally comprising the steps of receiving a request for guidance relating to providing certification and responding to the request.
5. The method of claim 1 additionally comprising the step of docketing information relating to the certification information received.
6. The method of claim 1 additionally comprising the step of ascertaining the completeness of the certification information received.
7. The method of claim 1 additionally comprising the step of notifying appropriate of administrative obligations.
8. The method of claim 1 additionally comprising the steps of receiving updated information relating to the certification and transmitting the updated information to appropriate parties.
9. The method of claim 1 additionally comprising the step of requesting authorization to convey certification information.
10. The method of claim 1 additionally comprising the step of archiving actions taken relating to certification.
11. A method for managing risk associated with a correspondent account, the method comprising:
receiving information descriptive of a risk management certification from an entity, wherein the information received comprises a designated network address of a resource storing a risk management certification described by the information;
receiving a request for information relating to the entity described by the risk management certification; and
conveying the designated network address of the network resource storing the risk management certification responsive to the request for information.
12. The method of claim 11 additionally comprising the step of receiving authorization
from the entity to convey the designated network address.
13. The method of claim 11 additionally comprising the steps of:
receiving a notice of an updated risk management certification and a designated network address of a network resource containing the updated risk management certification;
and transmitting the notice of an updated risk management certification and a designated network address of a network resource containing the updated risk management certification to one or more recipients.
14. The method of claim 11 additionally comprising the step of transmitting a notification comprising a renewal date.
15. A computerized system for managing risk associated with a correspondent account, the system comprising:
a computer server accessible with a system access device via a communications network; and
executable software stored on the server and executable on demand, the software operative with the server to cause the server to:
receive risk management certification information from a foreign bank;
store the information in a computer server;
receive a request for particular certification information; and
transmit the particular certification information.
16. The computerized system of claim 15 wherein the server comprises a proprietary risk management server.
17. Computer executable program code residing on a computer-readable medium, the program code comprising instructions for causing the computer to:
receive risk management certification information from a foreign bank;
store the information in a computer server;
receive a request for particular certification information; and
transmit the particular certification information.
18. A computer data signal embodied in a digital data stream comprising data relating to a correspondent account, wherein the computer data signal is generated by a method comprising the steps of:
receiving risk management certification information from a foreign bank;
storing the information in a computer server;
receiving a request for particular certification information; and
transmitting the particular certification information.
19. A method of interacting with a network access device so as to manage risk relating to a correspondent account, the method comprising the steps of:
initiating interaction with a risk management server via a communications network;
requesting a risk management certification for a particular foreign bank; and receiving a copy of a risk management certification.
20. The method of claim 19 additionally comprising the step of receiving an update to the risk management certification.
21. The method of claim 19 wherein the risk management certification comprises information asserting compliance with the USA PATRIOT Act.
US13/020,709 2001-03-20 2011-02-03 Correspondent Bank Registry Abandoned US20110131125A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US13/020,709 US20110131125A1 (en) 2001-03-20 2011-02-03 Correspondent Bank Registry

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US09/812,627 US8140415B2 (en) 2001-03-20 2001-03-20 Automated global risk management
US2112401A 2001-10-30 2001-10-30
US10/074,583 US7287280B2 (en) 2002-02-12 2002-02-12 Automated security management
US10/278,380 US7899722B1 (en) 2001-03-20 2002-10-23 Correspondent bank registry
US13/020,709 US20110131125A1 (en) 2001-03-20 2011-02-03 Correspondent Bank Registry

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US10/278,380 Continuation US7899722B1 (en) 2001-03-20 2002-10-23 Correspondent bank registry

Publications (1)

Publication Number Publication Date
US20110131125A1 true US20110131125A1 (en) 2011-06-02

Family

ID=43617377

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/278,380 Expired - Fee Related US7899722B1 (en) 2001-03-20 2002-10-23 Correspondent bank registry
US13/020,709 Abandoned US20110131125A1 (en) 2001-03-20 2011-02-03 Correspondent Bank Registry

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US10/278,380 Expired - Fee Related US7899722B1 (en) 2001-03-20 2002-10-23 Correspondent bank registry

Country Status (1)

Country Link
US (2) US7899722B1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150339651A1 (en) * 2014-05-21 2015-11-26 International Business Machines Corporation Cash flow analytics driven correspondent bank network optimization
US9886707B1 (en) 2014-12-18 2018-02-06 Jpmorgan Chase Bank, N.A. System and method for building dynamic hierarchy for products
US9906413B1 (en) 2014-12-18 2018-02-27 Jpmorgan Chase Bank, N.A. System and method for implementing a dynamic hierarchy for devices
US10769722B1 (en) 2016-05-12 2020-09-08 State Farm Mutual Automobile Insurance Company Heuristic credit risk assessment engine
US11030579B1 (en) 2013-07-15 2021-06-08 Jpmorgan Chase Bank, N.A. Method and system for incident communication
US11544783B1 (en) 2016-05-12 2023-01-03 State Farm Mutual Automobile Insurance Company Heuristic credit risk assessment engine

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030233319A1 (en) * 2001-03-20 2003-12-18 David Lawrence Electronic fund transfer participant risk management clearing
US7958027B2 (en) * 2001-03-20 2011-06-07 Goldman, Sachs & Co. Systems and methods for managing risk associated with a geo-political area
US8121937B2 (en) 2001-03-20 2012-02-21 Goldman Sachs & Co. Gaming industry risk management clearinghouse
US8996481B2 (en) 2004-07-02 2015-03-31 Goldman, Sach & Co. Method, system, apparatus, program code and means for identifying and extracting information
US8762191B2 (en) 2004-07-02 2014-06-24 Goldman, Sachs & Co. Systems, methods, apparatus, and schema for storing, managing and retrieving information
US8442953B2 (en) 2004-07-02 2013-05-14 Goldman, Sachs & Co. Method, system, apparatus, program code and means for determining a redundancy of information
US8510300B2 (en) 2004-07-02 2013-08-13 Goldman, Sachs & Co. Systems and methods for managing information associated with legal, compliance and regulatory risk
EP2740094A4 (en) * 2011-09-06 2015-03-25 Mastercard International Inc Apparatus, method, and computer program product for data cleansing and/or biller scrubbing
US11816682B1 (en) 2023-03-29 2023-11-14 Simur, Inc. Systems and methods to facilitate synchronized sharing of centralized authentication information to facilitate entity verification and risk assessment
US11799869B1 (en) 2023-04-10 2023-10-24 Simur, Inc. Systems and methods to store and manage entity verification information to reduce redundant entity information and redundant submission of requests
US11949777B1 (en) 2023-07-31 2024-04-02 Simur, Inc. Systems and methods to encrypt centralized information associated with users of a customer due diligence platform based on a modified key expansion schedule

Citations (113)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4376978A (en) * 1980-07-29 1983-03-15 Merrill Lynch Pierce, Fenner & Smith Securities brokerage-cash management system
US4718009A (en) * 1984-02-27 1988-01-05 Default Proof Credit Card System, Inc. Default proof credit card method system
US4727243A (en) * 1984-10-24 1988-02-23 Telenet Communications Corporation Financial transaction system
US4734564A (en) * 1985-05-02 1988-03-29 Visa International Service Association Transaction system with off-line risk assessment
US4799156A (en) * 1986-10-01 1989-01-17 Strategic Processing Corporation Interactive market management system
US4812628A (en) * 1985-05-02 1989-03-14 Visa International Service Association Transaction system with off-line risk assessment
US4989141A (en) * 1987-06-01 1991-01-29 Corporate Class Software Computer system for financial analyses and reporting
US5177342A (en) * 1990-11-09 1993-01-05 Visa International Service Association Transaction approval system
US5398300A (en) * 1990-07-27 1995-03-14 Hnc, Inc. Neural network having expert system functionality
US5502637A (en) * 1994-06-15 1996-03-26 Thomson Shared Services, Inc. Investment research delivery system
US5615109A (en) * 1995-05-24 1997-03-25 Eder; Jeff Method of and system for generating feasible, profit maximizing requisition sets
US5717923A (en) * 1994-11-03 1998-02-10 Intel Corporation Method and apparatus for dynamically customizing electronic information to individual end users
US5720026A (en) * 1995-10-06 1998-02-17 Mitsubishi Denki Kabushiki Kaisha Incremental backup system
US5732400A (en) * 1995-01-04 1998-03-24 Citibank N.A. System and method for a risk-based purchase of goods
US5732397A (en) * 1992-03-16 1998-03-24 Lincoln National Risk Management, Inc. Automated decision-making arrangement
US5864828A (en) * 1987-04-15 1999-01-26 Proprietary Financial Products, Inc. Personal financial management system for creation of a client portfolio of investment and credit facilities where funds are distributed based on a preferred allocation
US5875431A (en) * 1996-03-15 1999-02-23 Heckman; Frank Legal strategic analysis planning and evaluation control system and method
US5878400A (en) * 1996-06-17 1999-03-02 Trilogy Development Group, Inc. Method and apparatus for pricing products in multi-level product and organizational groups
US5884289A (en) * 1995-06-16 1999-03-16 Card Alert Services, Inc. Debit card fraud detection and control system
US5903882A (en) * 1996-12-13 1999-05-11 Certco, Llc Reliance server for electronic transaction system
US5991743A (en) * 1997-06-30 1999-11-23 General Electric Company System and method for proactively monitoring risk exposure
US6014228A (en) * 1991-02-05 2000-01-11 International Integrated Communications, Ltd. Method and apparatus for delivering secured hard-copy facsimile documents
US6016963A (en) * 1998-01-23 2000-01-25 Mondex International Limited Integrated circuit card with means for performing risk management
US6018723A (en) * 1997-05-27 2000-01-25 Visa International Service Association Method and apparatus for pattern generation
US6018715A (en) * 1996-02-29 2000-01-25 Electronic Data Systems Corporation Automated travel planning system
US6021397A (en) * 1997-12-02 2000-02-01 Financial Engines, Inc. Financial advisory system
US6055636A (en) * 1998-01-27 2000-04-25 Entrust Technologies, Limited Method and apparatus for centralizing processing of key and certificate life cycle management
US6119103A (en) * 1997-05-27 2000-09-12 Visa International Service Association Financial risk prediction systems and methods therefor
US6182095B1 (en) * 1998-04-30 2001-01-30 General Electric Capital Corporation Document generator
US6199073B1 (en) * 1997-04-21 2001-03-06 Ricoh Company, Ltd. Automatic archiving of documents during their transfer between a peripheral device and a processing device
US6202053B1 (en) * 1998-01-23 2001-03-13 First Usa Bank, Na Method and apparatus for generating segmentation scorecards for evaluating credit risk of bank card applicants
US6205433B1 (en) * 1996-06-14 2001-03-20 Cybercash, Inc. System and method for multi-currency transactions
US6253322B1 (en) * 1997-05-21 2001-06-26 Hitachi, Ltd. Electronic certification authentication method and system
US6304915B1 (en) * 1996-09-26 2001-10-16 Hewlett-Packard Company System, method and article of manufacture for a gateway system architecture with system administration information accessible from a browser
US20020004725A1 (en) * 1999-03-23 2002-01-10 Dental Medicine International, L.L.C. Method and system for healthcare treatment planning and assessment
US6341267B1 (en) * 1997-07-02 2002-01-22 Enhancement Of Human Potential, Inc. Methods, systems and apparatuses for matching individuals with behavioral requirements and for managing providers of services to evaluate or increase individuals' behavioral capabilities
US20020010784A1 (en) * 2000-01-06 2002-01-24 Clayton Gary E. Policy notice method and system
US20020016854A1 (en) * 1996-12-13 2002-02-07 Shigeki Hirasawa Method of sending and receiving information and system using such method
US6347307B1 (en) * 1999-06-14 2002-02-12 Integral Development Corp. System and method for conducting web-based financial transactions in capital markets
US20020019804A1 (en) * 2000-06-29 2002-02-14 Sutton Robert E. Method for providing financial and risk management
US6349290B1 (en) * 1998-06-30 2002-02-19 Citibank, N.A. Automated system and method for customized and personalized presentation of products and services of a financial institution
US20020023053A1 (en) * 2000-04-05 2002-02-21 Szoc Ronald Z. System, method and apparatus for international financial transactions
US20020023109A1 (en) * 1999-12-30 2002-02-21 Lederer Donald A. System and method for ensuring compliance with regulations
US20020029249A1 (en) * 2000-03-17 2002-03-07 Campbell Leo J. Methods and systems for providing an electronic account to a customer
US20020032626A1 (en) * 1999-12-17 2002-03-14 Dewolf Frederik M. Global asset information registry
US20020032646A1 (en) * 2000-09-08 2002-03-14 Francis Sweeney System and method of automated brokerage for risk management services and products
US20020032635A1 (en) * 2000-01-06 2002-03-14 Stewart Harris Systems and methods for monitoring credit of trading couterparties
US20020032665A1 (en) * 2000-07-17 2002-03-14 Neal Creighton Methods and systems for authenticating business partners for secured electronic transactions
US20020035685A1 (en) * 2000-09-11 2002-03-21 Masahiro Ono Client-server system with security function intermediary
US20020035520A1 (en) * 2000-08-02 2002-03-21 Weiss Allan N. Property rating and ranking system and method
US20020035543A1 (en) * 1998-04-27 2002-03-21 Aurora Wireless Technologies, Ltd. System and method for detecting high credit risk customers
US20020073237A1 (en) * 2000-07-27 2002-06-13 George Nancy Fox Methods of managing data over a networked system of computers
US20020184068A1 (en) * 2001-06-04 2002-12-05 Krishnan Krish R. Communications network-enabled system and method for determining and providing solutions to meet compliance and operational risk management standards and requirements
US20030004954A1 (en) * 2001-06-27 2003-01-02 Clark Mark A. Conflict assessment system tool
US20030009419A1 (en) * 2001-06-11 2003-01-09 Chavez R. Martin Risk management system and trade engine with automatic trade feed and market data feed
US20030009418A1 (en) * 2000-12-08 2003-01-09 Green Gerald M. Systems and methods for electronically verifying and processing information
US20030018549A1 (en) * 2001-06-07 2003-01-23 Huchen Fei System and method for rapid updating of credit information
US20030018522A1 (en) * 2001-07-20 2003-01-23 Psc Scanning, Inc. Biometric system and method for identifying a customer upon entering a retail establishment
US20030018483A1 (en) * 2001-07-17 2003-01-23 Pickover Clifford A. System to manage electronic data
US6513018B1 (en) * 1994-05-05 2003-01-28 Fair, Isaac And Company, Inc. Method and apparatus for scoring the likelihood of a desired performance result
US6513020B1 (en) * 1997-10-30 2003-01-28 Macro Securities Research, Llc Proxy asset data processor
US20030023543A1 (en) * 2001-04-30 2003-01-30 Mel Gunewardena Method, software program, and system for ranking relative risk of a plurality of transactions
US6516056B1 (en) * 2000-01-07 2003-02-04 Vesta Corporation Fraud prevention system and method
US20030026268A1 (en) * 2000-11-28 2003-02-06 Siemens Technology-To-Business Center, Llc Characteristic routing
US6523027B1 (en) * 1999-07-30 2003-02-18 Accenture Llp Interfacing servers in a Java based e-commerce architecture
US20030046114A1 (en) * 2001-08-28 2003-03-06 Davies Richard J. System, method, and apparatus for storing, retrieving, and integrating clinical, diagnostic, genomic, and therapeutic data
US20030050718A1 (en) * 2000-08-09 2003-03-13 Tracy Richard P. Enhanced system, method and medium for certifying and accrediting requirements compliance
US20030061201A1 (en) * 2001-08-13 2003-03-27 Xerox Corporation System for propagating enrichment between documents
US20030097451A1 (en) * 2001-11-16 2003-05-22 Nokia, Inc. Personal data repository
US6591252B1 (en) * 1999-03-04 2003-07-08 Steven R. Young Method and apparatus for authenticating unique items
US20030145223A1 (en) * 2002-01-28 2003-07-31 Intel Corporation Controlled access to credential information of delegators in delegation relationships
US6651240B1 (en) * 1999-02-17 2003-11-18 Fujitsu Limited Object-oriented software development support apparatus and development support method
US20030233258A1 (en) * 2002-06-18 2003-12-18 Cottrell Matthew D. Methods and systems for tracking and accounting for the disclosure of record information
US20040006532A1 (en) * 2001-03-20 2004-01-08 David Lawrence Network access risk management
US20040015376A1 (en) * 2002-07-03 2004-01-22 Conoco Inc. Method and system to value projects taking into account political risks
US6684190B1 (en) * 1997-01-07 2004-01-27 Financial Profiles, Inc. Apparatus and method for exposing, evaluating and re-balancing risk for decision-making in financial planning
US20040024693A1 (en) * 2001-03-20 2004-02-05 David Lawrence Proprietary risk management clearinghouse
US20040039704A1 (en) * 2001-01-17 2004-02-26 Contentguard Holdings, Inc. System and method for supplying and managing usage rights of users and suppliers of items
US20040044505A1 (en) * 2002-09-04 2004-03-04 Richard Horwitz Method and system for identifying risk factors
US20040044617A1 (en) * 2002-09-03 2004-03-04 Duojia Lu Methods and systems for enterprise risk auditing and management
US20040054563A1 (en) * 2002-09-17 2004-03-18 Douglas William J. Method for managing enterprise risk
US6714918B2 (en) * 2000-03-24 2004-03-30 Access Business Group International Llc System and method for detecting fraudulent transactions
US6714894B1 (en) * 2001-06-29 2004-03-30 Merritt Applications, Inc. System and method for collecting, processing, and distributing information to promote safe driving
US6839682B1 (en) * 1999-05-06 2005-01-04 Fair Isaac Corporation Predictive modeling of consumer financial behavior using supervised segmentation and nearest-neighbor matching
US6842737B1 (en) * 2000-07-19 2005-01-11 Ijet Travel Intelligence, Inc. Travel information method and associated system
US20050033849A1 (en) * 2002-06-20 2005-02-10 Bellsouth Intellectual Property Corporation Content blocking
US6868408B1 (en) * 1994-04-28 2005-03-15 Citibank, N.A. Security systems and methods applicable to an electronic monetary system
US20050065872A1 (en) * 2003-09-12 2005-03-24 Moebs G. Michael Risk identification system and methods
US6895393B1 (en) * 1998-10-01 2005-05-17 Hitachi, Ltd. Electronic book distributing system by use of purchase certificate and devices therefor
US6983266B1 (en) * 1999-04-07 2006-01-03 Alert-Km Pty Ltd Compliance monitoring for anomaly detection
US20060004878A1 (en) * 2004-07-02 2006-01-05 David Lawrence Method, system, apparatus, program code and means for determining a redundancy of information
US20060004719A1 (en) * 2004-07-02 2006-01-05 David Lawrence Systems and methods for managing information associated with legal, compliance and regulatory risk
US6985886B1 (en) * 2000-03-14 2006-01-10 Everbank Method and apparatus for a mortgage loan management system
US20060010063A1 (en) * 1996-11-27 2006-01-12 Diebold, Incorporated Automated banking machine system with multiple browsers
US7003661B2 (en) * 2001-10-12 2006-02-21 Geotrust, Inc. Methods and systems for automated authentication, processing and issuance of digital certificates
US7006992B1 (en) * 2000-04-06 2006-02-28 Union State Bank Risk assessment and management system
US7013291B1 (en) * 1998-09-04 2006-03-14 Green Paul T Financial instrument filtering system and method therefor
US20070005496A1 (en) * 2000-11-06 2007-01-04 Cataline Glen R System and method for selectable funding of electronic transactions
US7161465B2 (en) * 2003-04-08 2007-01-09 Richard Glee Wood Enhancing security for facilities and authorizing providers
US7165045B1 (en) * 1999-05-19 2007-01-16 Miral Kim-E Network-based trading system and method
US7167844B1 (en) * 1999-12-22 2007-01-23 Accenture Llp Electronic menu document creator in a virtual financial environment
US20070038544A1 (en) * 1999-12-23 2007-02-15 Bill Snow Method and apparatus for financial investment advice available to a host of users over a public network
US7181428B2 (en) * 2001-01-30 2007-02-20 Goldman, Sachs & Co. Automated political risk management
US7209889B1 (en) * 1998-12-24 2007-04-24 Henry Whitfield Secure system for the issuance, acquisition, and redemption of certificates in a transaction network
US7317546B2 (en) * 2000-07-27 2008-01-08 Hitachi, Ltd. Certification method and device and certificate issuer system
US7319971B2 (en) * 2001-01-31 2008-01-15 Corprofit Systems Pty Ltd System for managing risk
US20080021835A1 (en) * 1995-02-13 2008-01-24 Intertrust Technologies Corp. Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management
US20080027749A1 (en) * 2000-07-19 2008-01-31 Ijet Travel International, Inc. Global asset risk management systems and methods
US20090024500A1 (en) * 1999-07-30 2009-01-22 Alan Kay System and Method of Transaction Settlement Using Trade Credit
US20090043687A1 (en) * 2000-11-01 2009-02-12 Van Soestbergen Mark Method and System for Banking and Exchanging Emission Reduction Credits
US7650496B2 (en) * 2003-08-15 2010-01-19 Venafi, Inc. Renewal product for digital certificates
US7657482B1 (en) * 2002-07-15 2010-02-02 Paymentech, L.P. System and apparatus for transaction fraud processing
US8090734B2 (en) * 2002-05-31 2012-01-03 American Express Travel Related Services Company, Inc. System and method for assessing risk

Family Cites Families (113)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US593882A (en) * 1897-11-16 Samuel t
US1222816A (en) * 1914-12-12 1917-04-17 Allis Chalmers Mfg Co Pumping-engine.
US4326259A (en) 1980-03-27 1982-04-20 Nestor Associates Self organizing general pattern class separator and identifier
US4597046A (en) 1980-10-22 1986-06-24 Merrill Lynch, Pierce Fenner & Smith Securities brokerage-cash management system obviating float costs by anticipatory liquidation of short term assets
US4346442A (en) 1980-07-29 1982-08-24 Merrill Lynch, Pierce, Fenner & Smith Incorporated Securities brokerage-cash management system
US4774663A (en) 1980-07-29 1988-09-27 Merrill Lynch, Pierce, Fenner & Smith Incorporated Securities brokerage-cash management system with short term investment proceeds allotted among multiple accounts
US5025138A (en) 1984-02-27 1991-06-18 Vincent Cuervo Method and system for providing verifiable line of credit information
US4868866A (en) 1984-12-28 1989-09-19 Mcgraw-Hill Inc. Broadcast data distribution system
US4736294A (en) 1985-01-11 1988-04-05 The Royal Bank Of Canada Data processing methods and apparatus for managing vehicle financing
US4774664A (en) 1985-07-01 1988-09-27 Chrysler First Information Technologies Inc. Financial data processing system and method
US5210687A (en) 1987-04-16 1993-05-11 L & C Family Partnership Business transaction and investment growth monitoring data processing system
US5038284A (en) 1988-02-17 1991-08-06 Kramer Robert M Method and apparatus relating to conducting trading transactions with portable trading stations
JPH0219963A (en) 1988-07-08 1990-01-23 Hitachi Ltd Method and system for monitoring real time state
CA1337132C (en) 1988-07-15 1995-09-26 Robert Filepp Reception system for an interactive computer network and method of operation
US5068888A (en) 1989-08-11 1991-11-26 Afd Systems, Inc. Interactive facsimile information retrieval system and method
US5274547A (en) 1991-01-03 1993-12-28 Credco Of Washington, Inc. System for generating and transmitting credit reports
US5323315A (en) 1991-08-02 1994-06-21 Vintek, Inc. Computer system for monitoring the status of individual items of personal property which serve as collateral for securing financing
US5557518A (en) 1994-04-28 1996-09-17 Citibank, N.A. Trusted agents for open electronic commerce
US5453601A (en) * 1991-11-15 1995-09-26 Citibank, N.A. Electronic-monetary system
US5239462A (en) 1992-02-25 1993-08-24 Creative Solutions Groups, Inc. Method and apparatus for automatically determining the approval status of a potential borrower
JPH05342191A (en) 1992-06-08 1993-12-24 Mitsubishi Electric Corp System for predicting and analyzing economic time sequential data
US5819226A (en) 1992-09-08 1998-10-06 Hnc Software Inc. Fraud detection using predictive modeling
WO1994010649A1 (en) 1992-10-30 1994-05-11 Microbilt Corporation Multi-reader transaction terminal
US5940811A (en) * 1993-08-27 1999-08-17 Affinity Technology Group, Inc. Closed loop financial transaction method and apparatus
US5457305A (en) 1994-03-31 1995-10-10 Akel; William S. Distributed on-line money access card transaction processing system
US5799087A (en) * 1994-04-28 1998-08-25 Citibank, N.A. Electronic-monetary system
US5797133A (en) 1994-08-31 1998-08-18 Strategic Solutions Group, Inc Method for automatically determining the approval status of a potential borrower
US5826241A (en) 1994-09-16 1998-10-20 First Virtual Holdings Incorporated Computerized system for making payments and authenticating transactions over the internet
US5627886A (en) 1994-09-22 1997-05-06 Electronic Data Systems Corporation System and method for detecting fraudulent network usage patterns using real-time network monitoring
US5679938A (en) 1994-12-02 1997-10-21 Telecheck International, Inc. Methods and systems for interactive check authorizations
US5704045A (en) * 1995-01-09 1997-12-30 King; Douglas L. System and method of risk transfer and risk diversification including means to assure with assurance of timely payment and segregation of the interests of capital
US5696907A (en) 1995-02-27 1997-12-09 General Electric Company System and method for performing risk and credit analysis of financial service applications
US5649116A (en) 1995-03-30 1997-07-15 Servantis Systems, Inc. Integrated decision management system
US5819236A (en) 1995-06-12 1998-10-06 Carreker-Antinori, Inc. System and method for providing advance notification of potential presentment returns due to account restrictions
US5852812A (en) 1995-08-23 1998-12-22 Microsoft Corporation Billing system for a network
US5671279A (en) * 1995-11-13 1997-09-23 Netscape Communications Corporation Electronic commerce using a secure courier system
US5787402A (en) 1996-05-15 1998-07-28 Crossmar, Inc. Method and system for performing automated financial transactions involving foreign currencies
AU713316B2 (en) * 1996-05-23 1999-11-25 Citibank, N.A. Global financial services integration system and process
US5933816A (en) * 1996-10-31 1999-08-03 Citicorp Development Center, Inc. System and method for delivering financial services
US5963923A (en) 1996-11-12 1999-10-05 Garber; Howard B. System and method for trading having a principal market maker
US6289320B1 (en) 1998-07-07 2001-09-11 Diebold, Incorporated Automated banking machine apparatus and system
US5790639A (en) 1997-02-10 1998-08-04 Unifi Communications, Inc. Method and apparatus for automatically sending and receiving modifiable action reports via e-mail
US6105010A (en) * 1997-05-09 2000-08-15 Gte Service Corporation Biometric certifying authorities
US5974146A (en) * 1997-07-30 1999-10-26 Huntington Bancshares Incorporated Real time bank-centric universal payment system
US5940843A (en) 1997-10-08 1999-08-17 Multex Systems, Inc. Information delivery system and method including restriction processing
US6421653B1 (en) 1997-10-14 2002-07-16 Blackbird Holdings, Inc. Systems, methods and computer program products for electronic trading of financial instruments
US6249770B1 (en) 1998-01-30 2001-06-19 Citibank, N.A. Method and system of financial spreading and forecasting
US6078904A (en) * 1998-03-16 2000-06-20 Saddle Peak Systems Risk direct asset allocation and risk resolved CAPM for optimally allocating investment assets in an investment portfolio
US6078905A (en) 1998-03-27 2000-06-20 Pich-Lewinter; Eva Method for optimizing risk management
US6148297A (en) * 1998-06-01 2000-11-14 Surgical Safety Products, Inc. Health care information and data tracking system and method
US6148301A (en) 1998-07-02 2000-11-14 First Data Corporation Information distribution system
US6085175A (en) * 1998-07-02 2000-07-04 Axiom Software Laboratories, Inc. System and method for determining value at risk of a financial portfolio
US6374358B1 (en) 1998-08-05 2002-04-16 Sun Microsystems, Inc. Adaptive countermeasure selection method and apparatus
US6304973B1 (en) 1998-08-06 2001-10-16 Cryptek Secure Communications, Llc Multi-level security network system
US6947908B1 (en) * 1998-08-27 2005-09-20 Citibank, N.A. System and use for correspondent banking
US20020129255A1 (en) * 1998-08-31 2002-09-12 Chikako Tsuchiyama Digital signature or electronic seal authentication system and recognized mark management program
EP0999489A2 (en) 1998-11-06 2000-05-10 Citibank, N.A. Method and system for evaluating information security
US6278983B1 (en) 1999-01-11 2001-08-21 Owen Edward Ball Automated resource allocation and management system
US7451114B1 (en) 1999-02-19 2008-11-11 Visa International Service Association Conducting commerce between individuals
US6542993B1 (en) 1999-03-12 2003-04-01 Lucent Technologies Inc. Security management system and method
US6393423B1 (en) 1999-04-08 2002-05-21 James Francis Goedken Apparatus and methods for electronic information exchange
CA2910997A1 (en) * 1999-04-30 2000-11-09 Paypal, Inc. System and method for electronically exchanging value among distributed users
US6456984B1 (en) 1999-05-28 2002-09-24 Qwest Communications International Inc. Method and system for providing temporary credit authorizations
AU5377900A (en) 1999-06-02 2000-12-28 Algorithmics International Corp. Risk management system, distributed framework and method
US6321212B1 (en) 1999-07-21 2001-11-20 Longitude, Inc. Financial products having a demand-based, adjustable return, and trading exchange therefor
US7225153B2 (en) 1999-07-21 2007-05-29 Longitude Llc Digital options having demand-based, adjustable returns, and trading exchange therefor
US7461250B1 (en) * 1999-07-22 2008-12-02 Rsa Security, Inc. System and method for certificate exchange
JP4084914B2 (en) 1999-09-29 2008-04-30 株式会社日立製作所 Security evaluation method and apparatus, security measure creation support method and apparatus
US7401040B2 (en) 1999-11-01 2008-07-15 Accenture Llp Financial modeling and counseling system
WO2001033522A1 (en) 1999-11-05 2001-05-10 American Express Travel Related Services Company, Inc. Systems and methods for facilitating commercial transactions between parties residing at remote locations
US7124101B1 (en) * 1999-11-22 2006-10-17 Accenture Llp Asset tracking in a network-based supply chain environment
US6671818B1 (en) * 1999-11-22 2003-12-30 Accenture Llp Problem isolation through translating and filtering events into a standard object format in a network based supply chain
US6842863B1 (en) * 1999-11-23 2005-01-11 Microsoft Corporation Certificate reissuance for checking the status of a certificate in financial transactions
US7231327B1 (en) 1999-12-03 2007-06-12 Digital Sandbox Method and apparatus for risk management
US7069234B1 (en) * 1999-12-22 2006-06-27 Accenture Llp Initiating an agreement in an e-commerce environment
BR0108476A (en) 2000-02-11 2003-04-22 Marcio Marc Abreu System and method for communicating product recall information, product-related warnings, or other information related to product users.
US7283977B1 (en) * 2000-02-25 2007-10-16 Kathleen Tyson-Quah System for reducing risk payment-based transactions wherein a risk filter routine returns instructions authorizing payment to a payment queue for later re-evaluation
EP1137209A3 (en) 2000-03-13 2005-06-01 Texas Instruments Incorporated Method and receiver for receiving digital broadcast signals
AU2001247789A1 (en) 2000-03-22 2001-10-03 Sidestep, Inc. Method and apparatus for dynamic information connection engine
US6738760B1 (en) 2000-03-23 2004-05-18 Albert Krachman Method and system for providing electronic discovery on computer databases and archives using artificial intelligence to recover legally relevant data
US7437310B1 (en) * 2000-03-27 2008-10-14 International Business Machines Corporation Third party contract depository for E-commerce transactions
CA2342490A1 (en) 2000-04-05 2001-10-05 John M. Bader Method for insolvency claims resolution
JP2001297206A (en) * 2000-04-14 2001-10-26 Nec Corp On-line shopping method and mail-order system using network
US20010049651A1 (en) 2000-04-28 2001-12-06 Selleck Mark N. Global trading system and method
JP2002056176A (en) 2000-06-01 2002-02-20 Asgent Inc Method and device for structuring security policy and method and device for supporting security policy structuring
US20020046053A1 (en) 2000-09-01 2002-04-18 Nuservice Corporation Web based risk management system and method
US20020091706A1 (en) 2000-09-06 2002-07-11 Johnson Controls Technology Company Vehicle history and personalization information management system and method
US7383223B1 (en) 2000-09-20 2008-06-03 Cashedge, Inc. Method and apparatus for managing multiple accounts
US7415607B2 (en) * 2000-12-22 2008-08-19 Oracle International Corporation Obtaining and maintaining real time certificate status
US8311911B2 (en) * 2000-12-30 2012-11-13 E*Trade Financial Corporation Global foreign exchange system
US20020087454A1 (en) 2000-12-30 2002-07-04 Bea Calo Global trading system
US20020103852A1 (en) * 2001-01-26 2002-08-01 Pushka Wayne L. System for optimizing investment performance
US20020120477A1 (en) * 2001-02-09 2002-08-29 Robert Jefferson Jinnett System and method for supporting legally-compliant automated regulated services and/or products in connection with multi-jurisdictional transactions
US20020120582A1 (en) * 2001-02-26 2002-08-29 Stephen Elston Method for establishing an electronic commerce account
US20020128964A1 (en) * 2001-03-08 2002-09-12 Dewayne Baker Electronic exchange and settlement system for cash letter adjustments for financial institutions
US20030074272A1 (en) 2001-03-16 2003-04-17 Knegendorf William A. System and method for distributing product hazard information
US8140415B2 (en) 2001-03-20 2012-03-20 Goldman Sachs & Co. Automated global risk management
US20020138371A1 (en) 2001-03-20 2002-09-26 David Lawrence Online transaction risk management
US20020138417A1 (en) * 2001-03-20 2002-09-26 David Lawrence Risk management clearinghouse
US8527400B2 (en) 2001-03-20 2013-09-03 Goldman, Sachs & Co. Automated account risk management
US20030167177A1 (en) 2001-03-27 2003-09-04 Donald Branch Transaction derived charitable contribution system
US7464057B2 (en) * 2001-03-30 2008-12-09 Citibank, N.A. Method and system for multi-currency escrow service for web-based transactions
US20020143562A1 (en) 2001-04-02 2002-10-03 David Lawrence Automated legal action risk management
CA2350445A1 (en) * 2001-06-12 2002-07-31 Bob Van Leeuwen Programmable joint payment guarantee financial instrument set
US20030069894A1 (en) 2001-09-17 2003-04-10 Darlene Cotter Computer-based system for assessing compliance with governmental regulations
US20030065942A1 (en) 2001-09-28 2003-04-03 Lineman David J. Method and apparatus for actively managing security policies for users and computers in a network
US6975996B2 (en) 2001-10-09 2005-12-13 Goldman, Sachs & Co. Electronic subpoena service
US9076134B2 (en) 2001-10-15 2015-07-07 Chequepoint Franchise Corporation Computerized money transfer system and method
US7231395B2 (en) * 2002-05-24 2007-06-12 Overture Services, Inc. Method and apparatus for categorizing and presenting documents of a distributed database
US7428756B2 (en) * 2003-05-12 2008-09-23 Sun Microsystems, Inc. Access control over dynamic intellectual capital content
US7698557B2 (en) * 2003-12-22 2010-04-13 Guardtime As System and method for generating a digital certificate
US20050187864A1 (en) * 2004-02-24 2005-08-25 First Data Corporation System for maintaining presentation instrument data
US7694135B2 (en) * 2004-07-16 2010-04-06 Geotrust, Inc. Security systems and services to provide identity and uniform resource identifier verification

Patent Citations (116)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4376978A (en) * 1980-07-29 1983-03-15 Merrill Lynch Pierce, Fenner & Smith Securities brokerage-cash management system
US4718009A (en) * 1984-02-27 1988-01-05 Default Proof Credit Card System, Inc. Default proof credit card method system
US4727243A (en) * 1984-10-24 1988-02-23 Telenet Communications Corporation Financial transaction system
US4734564A (en) * 1985-05-02 1988-03-29 Visa International Service Association Transaction system with off-line risk assessment
US4812628A (en) * 1985-05-02 1989-03-14 Visa International Service Association Transaction system with off-line risk assessment
US4799156A (en) * 1986-10-01 1989-01-17 Strategic Processing Corporation Interactive market management system
US5864828A (en) * 1987-04-15 1999-01-26 Proprietary Financial Products, Inc. Personal financial management system for creation of a client portfolio of investment and credit facilities where funds are distributed based on a preferred allocation
US4989141A (en) * 1987-06-01 1991-01-29 Corporate Class Software Computer system for financial analyses and reporting
US5398300A (en) * 1990-07-27 1995-03-14 Hnc, Inc. Neural network having expert system functionality
US5177342A (en) * 1990-11-09 1993-01-05 Visa International Service Association Transaction approval system
US6014228A (en) * 1991-02-05 2000-01-11 International Integrated Communications, Ltd. Method and apparatus for delivering secured hard-copy facsimile documents
US5732397A (en) * 1992-03-16 1998-03-24 Lincoln National Risk Management, Inc. Automated decision-making arrangement
US6868408B1 (en) * 1994-04-28 2005-03-15 Citibank, N.A. Security systems and methods applicable to an electronic monetary system
US6513018B1 (en) * 1994-05-05 2003-01-28 Fair, Isaac And Company, Inc. Method and apparatus for scoring the likelihood of a desired performance result
US5502637A (en) * 1994-06-15 1996-03-26 Thomson Shared Services, Inc. Investment research delivery system
US5717923A (en) * 1994-11-03 1998-02-10 Intel Corporation Method and apparatus for dynamically customizing electronic information to individual end users
US5732400A (en) * 1995-01-04 1998-03-24 Citibank N.A. System and method for a risk-based purchase of goods
US20080021835A1 (en) * 1995-02-13 2008-01-24 Intertrust Technologies Corp. Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management
US5615109A (en) * 1995-05-24 1997-03-25 Eder; Jeff Method of and system for generating feasible, profit maximizing requisition sets
US5884289A (en) * 1995-06-16 1999-03-16 Card Alert Services, Inc. Debit card fraud detection and control system
US5720026A (en) * 1995-10-06 1998-02-17 Mitsubishi Denki Kabushiki Kaisha Incremental backup system
US6018715A (en) * 1996-02-29 2000-01-25 Electronic Data Systems Corporation Automated travel planning system
US5875431A (en) * 1996-03-15 1999-02-23 Heckman; Frank Legal strategic analysis planning and evaluation control system and method
US6205433B1 (en) * 1996-06-14 2001-03-20 Cybercash, Inc. System and method for multi-currency transactions
US5878400A (en) * 1996-06-17 1999-03-02 Trilogy Development Group, Inc. Method and apparatus for pricing products in multi-level product and organizational groups
US6304915B1 (en) * 1996-09-26 2001-10-16 Hewlett-Packard Company System, method and article of manufacture for a gateway system architecture with system administration information accessible from a browser
US20060010063A1 (en) * 1996-11-27 2006-01-12 Diebold, Incorporated Automated banking machine system with multiple browsers
US5903882A (en) * 1996-12-13 1999-05-11 Certco, Llc Reliance server for electronic transaction system
US20020016854A1 (en) * 1996-12-13 2002-02-07 Shigeki Hirasawa Method of sending and receiving information and system using such method
US6684190B1 (en) * 1997-01-07 2004-01-27 Financial Profiles, Inc. Apparatus and method for exposing, evaluating and re-balancing risk for decision-making in financial planning
US6199073B1 (en) * 1997-04-21 2001-03-06 Ricoh Company, Ltd. Automatic archiving of documents during their transfer between a peripheral device and a processing device
US6253322B1 (en) * 1997-05-21 2001-06-26 Hitachi, Ltd. Electronic certification authentication method and system
US6018723A (en) * 1997-05-27 2000-01-25 Visa International Service Association Method and apparatus for pattern generation
US6119103A (en) * 1997-05-27 2000-09-12 Visa International Service Association Financial risk prediction systems and methods therefor
US5991743A (en) * 1997-06-30 1999-11-23 General Electric Company System and method for proactively monitoring risk exposure
US6341267B1 (en) * 1997-07-02 2002-01-22 Enhancement Of Human Potential, Inc. Methods, systems and apparatuses for matching individuals with behavioral requirements and for managing providers of services to evaluate or increase individuals' behavioral capabilities
US6513020B1 (en) * 1997-10-30 2003-01-28 Macro Securities Research, Llc Proxy asset data processor
US6021397A (en) * 1997-12-02 2000-02-01 Financial Engines, Inc. Financial advisory system
US6202053B1 (en) * 1998-01-23 2001-03-13 First Usa Bank, Na Method and apparatus for generating segmentation scorecards for evaluating credit risk of bank card applicants
US6016963A (en) * 1998-01-23 2000-01-25 Mondex International Limited Integrated circuit card with means for performing risk management
US6055636A (en) * 1998-01-27 2000-04-25 Entrust Technologies, Limited Method and apparatus for centralizing processing of key and certificate life cycle management
US20020035543A1 (en) * 1998-04-27 2002-03-21 Aurora Wireless Technologies, Ltd. System and method for detecting high credit risk customers
US6182095B1 (en) * 1998-04-30 2001-01-30 General Electric Capital Corporation Document generator
US6349290B1 (en) * 1998-06-30 2002-02-19 Citibank, N.A. Automated system and method for customized and personalized presentation of products and services of a financial institution
US7013291B1 (en) * 1998-09-04 2006-03-14 Green Paul T Financial instrument filtering system and method therefor
US6895393B1 (en) * 1998-10-01 2005-05-17 Hitachi, Ltd. Electronic book distributing system by use of purchase certificate and devices therefor
US7209889B1 (en) * 1998-12-24 2007-04-24 Henry Whitfield Secure system for the issuance, acquisition, and redemption of certificates in a transaction network
US6651240B1 (en) * 1999-02-17 2003-11-18 Fujitsu Limited Object-oriented software development support apparatus and development support method
US6591252B1 (en) * 1999-03-04 2003-07-08 Steven R. Young Method and apparatus for authenticating unique items
US20020004725A1 (en) * 1999-03-23 2002-01-10 Dental Medicine International, L.L.C. Method and system for healthcare treatment planning and assessment
US6983266B1 (en) * 1999-04-07 2006-01-03 Alert-Km Pty Ltd Compliance monitoring for anomaly detection
US6839682B1 (en) * 1999-05-06 2005-01-04 Fair Isaac Corporation Predictive modeling of consumer financial behavior using supervised segmentation and nearest-neighbor matching
US7165045B1 (en) * 1999-05-19 2007-01-16 Miral Kim-E Network-based trading system and method
US6347307B1 (en) * 1999-06-14 2002-02-12 Integral Development Corp. System and method for conducting web-based financial transactions in capital markets
US20090024500A1 (en) * 1999-07-30 2009-01-22 Alan Kay System and Method of Transaction Settlement Using Trade Credit
US6523027B1 (en) * 1999-07-30 2003-02-18 Accenture Llp Interfacing servers in a Java based e-commerce architecture
US20020032626A1 (en) * 1999-12-17 2002-03-14 Dewolf Frederik M. Global asset information registry
US7167844B1 (en) * 1999-12-22 2007-01-23 Accenture Llp Electronic menu document creator in a virtual financial environment
US20070038544A1 (en) * 1999-12-23 2007-02-15 Bill Snow Method and apparatus for financial investment advice available to a host of users over a public network
US20020023109A1 (en) * 1999-12-30 2002-02-21 Lederer Donald A. System and method for ensuring compliance with regulations
US20020010784A1 (en) * 2000-01-06 2002-01-24 Clayton Gary E. Policy notice method and system
US20020032635A1 (en) * 2000-01-06 2002-03-14 Stewart Harris Systems and methods for monitoring credit of trading couterparties
US6516056B1 (en) * 2000-01-07 2003-02-04 Vesta Corporation Fraud prevention system and method
US6985886B1 (en) * 2000-03-14 2006-01-10 Everbank Method and apparatus for a mortgage loan management system
US20020029249A1 (en) * 2000-03-17 2002-03-07 Campbell Leo J. Methods and systems for providing an electronic account to a customer
US20090031127A1 (en) * 2000-03-17 2009-01-29 United States Postal Service Methods and systems for proofing identities using a certificate authority
US6714918B2 (en) * 2000-03-24 2004-03-30 Access Business Group International Llc System and method for detecting fraudulent transactions
US20020023053A1 (en) * 2000-04-05 2002-02-21 Szoc Ronald Z. System, method and apparatus for international financial transactions
US7006992B1 (en) * 2000-04-06 2006-02-28 Union State Bank Risk assessment and management system
US20020019804A1 (en) * 2000-06-29 2002-02-14 Sutton Robert E. Method for providing financial and risk management
US20020032665A1 (en) * 2000-07-17 2002-03-14 Neal Creighton Methods and systems for authenticating business partners for secured electronic transactions
US20080027749A1 (en) * 2000-07-19 2008-01-31 Ijet Travel International, Inc. Global asset risk management systems and methods
US6842737B1 (en) * 2000-07-19 2005-01-11 Ijet Travel Intelligence, Inc. Travel information method and associated system
US20020073237A1 (en) * 2000-07-27 2002-06-13 George Nancy Fox Methods of managing data over a networked system of computers
US7317546B2 (en) * 2000-07-27 2008-01-08 Hitachi, Ltd. Certification method and device and certificate issuer system
US20020035520A1 (en) * 2000-08-02 2002-03-21 Weiss Allan N. Property rating and ranking system and method
US20030050718A1 (en) * 2000-08-09 2003-03-13 Tracy Richard P. Enhanced system, method and medium for certifying and accrediting requirements compliance
US7380270B2 (en) * 2000-08-09 2008-05-27 Telos Corporation Enhanced system, method and medium for certifying and accrediting requirements compliance
US20020032646A1 (en) * 2000-09-08 2002-03-14 Francis Sweeney System and method of automated brokerage for risk management services and products
US20020035685A1 (en) * 2000-09-11 2002-03-21 Masahiro Ono Client-server system with security function intermediary
US20090043687A1 (en) * 2000-11-01 2009-02-12 Van Soestbergen Mark Method and System for Banking and Exchanging Emission Reduction Credits
US20070005496A1 (en) * 2000-11-06 2007-01-04 Cataline Glen R System and method for selectable funding of electronic transactions
US20030026268A1 (en) * 2000-11-28 2003-02-06 Siemens Technology-To-Business Center, Llc Characteristic routing
US20030009418A1 (en) * 2000-12-08 2003-01-09 Green Gerald M. Systems and methods for electronically verifying and processing information
US20040039704A1 (en) * 2001-01-17 2004-02-26 Contentguard Holdings, Inc. System and method for supplying and managing usage rights of users and suppliers of items
US7181428B2 (en) * 2001-01-30 2007-02-20 Goldman, Sachs & Co. Automated political risk management
US7319971B2 (en) * 2001-01-31 2008-01-15 Corprofit Systems Pty Ltd System for managing risk
US20040024693A1 (en) * 2001-03-20 2004-02-05 David Lawrence Proprietary risk management clearinghouse
US20040006532A1 (en) * 2001-03-20 2004-01-08 David Lawrence Network access risk management
US20030023543A1 (en) * 2001-04-30 2003-01-30 Mel Gunewardena Method, software program, and system for ranking relative risk of a plurality of transactions
US20020184068A1 (en) * 2001-06-04 2002-12-05 Krishnan Krish R. Communications network-enabled system and method for determining and providing solutions to meet compliance and operational risk management standards and requirements
US20030018549A1 (en) * 2001-06-07 2003-01-23 Huchen Fei System and method for rapid updating of credit information
US20030009419A1 (en) * 2001-06-11 2003-01-09 Chavez R. Martin Risk management system and trade engine with automatic trade feed and market data feed
US20030004954A1 (en) * 2001-06-27 2003-01-02 Clark Mark A. Conflict assessment system tool
US6714894B1 (en) * 2001-06-29 2004-03-30 Merritt Applications, Inc. System and method for collecting, processing, and distributing information to promote safe driving
US20030018483A1 (en) * 2001-07-17 2003-01-23 Pickover Clifford A. System to manage electronic data
US20030018522A1 (en) * 2001-07-20 2003-01-23 Psc Scanning, Inc. Biometric system and method for identifying a customer upon entering a retail establishment
US20030061201A1 (en) * 2001-08-13 2003-03-27 Xerox Corporation System for propagating enrichment between documents
US20030046114A1 (en) * 2001-08-28 2003-03-06 Davies Richard J. System, method, and apparatus for storing, retrieving, and integrating clinical, diagnostic, genomic, and therapeutic data
US7003661B2 (en) * 2001-10-12 2006-02-21 Geotrust, Inc. Methods and systems for automated authentication, processing and issuance of digital certificates
US20030097451A1 (en) * 2001-11-16 2003-05-22 Nokia, Inc. Personal data repository
US20030145223A1 (en) * 2002-01-28 2003-07-31 Intel Corporation Controlled access to credential information of delegators in delegation relationships
US8090734B2 (en) * 2002-05-31 2012-01-03 American Express Travel Related Services Company, Inc. System and method for assessing risk
US20030233258A1 (en) * 2002-06-18 2003-12-18 Cottrell Matthew D. Methods and systems for tracking and accounting for the disclosure of record information
US20050033849A1 (en) * 2002-06-20 2005-02-10 Bellsouth Intellectual Property Corporation Content blocking
US20040015376A1 (en) * 2002-07-03 2004-01-22 Conoco Inc. Method and system to value projects taking into account political risks
US7657482B1 (en) * 2002-07-15 2010-02-02 Paymentech, L.P. System and apparatus for transaction fraud processing
US20040044617A1 (en) * 2002-09-03 2004-03-04 Duojia Lu Methods and systems for enterprise risk auditing and management
US20040044505A1 (en) * 2002-09-04 2004-03-04 Richard Horwitz Method and system for identifying risk factors
US20040054563A1 (en) * 2002-09-17 2004-03-18 Douglas William J. Method for managing enterprise risk
US7161465B2 (en) * 2003-04-08 2007-01-09 Richard Glee Wood Enhancing security for facilities and authorizing providers
US7650496B2 (en) * 2003-08-15 2010-01-19 Venafi, Inc. Renewal product for digital certificates
US7653810B2 (en) * 2003-08-15 2010-01-26 Venafi, Inc. Method to automate the renewal of digital certificates
US20050065872A1 (en) * 2003-09-12 2005-03-24 Moebs G. Michael Risk identification system and methods
US20060004719A1 (en) * 2004-07-02 2006-01-05 David Lawrence Systems and methods for managing information associated with legal, compliance and regulatory risk
US20060004878A1 (en) * 2004-07-02 2006-01-05 David Lawrence Method, system, apparatus, program code and means for determining a redundancy of information

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"Commentary: Foreign Assets Control Regulations: The Countries Aren't Enough", Letter of Credit Update, March 1996, pp 23- 27 *
"OFAC Compliance: A Perspective for Community Banks", ABA Bank Compliance November/december 1998, pp 39-48 *
"Specially designated Who? A Primer on OFAC Compliance" ABA Bank Compliance March/April 1996, pp 29-36 *

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11030579B1 (en) 2013-07-15 2021-06-08 Jpmorgan Chase Bank, N.A. Method and system for incident communication
US20150339651A1 (en) * 2014-05-21 2015-11-26 International Business Machines Corporation Cash flow analytics driven correspondent bank network optimization
US9886707B1 (en) 2014-12-18 2018-02-06 Jpmorgan Chase Bank, N.A. System and method for building dynamic hierarchy for products
US9906413B1 (en) 2014-12-18 2018-02-27 Jpmorgan Chase Bank, N.A. System and method for implementing a dynamic hierarchy for devices
US11032422B1 (en) 2016-05-12 2021-06-08 State Farm Mutual Automobile Insurance Company Heuristic sales agent training assistant
US10810593B1 (en) 2016-05-12 2020-10-20 State Farm Mutual Automobile Insurance Company Heuristic account fraud detection engine
US10832249B1 (en) * 2016-05-12 2020-11-10 State Farm Mutual Automobile Insurance Company Heuristic money laundering detection engine
US10970641B1 (en) 2016-05-12 2021-04-06 State Farm Mutual Automobile Insurance Company Heuristic context prediction engine
US10810663B1 (en) 2016-05-12 2020-10-20 State Farm Mutual Automobile Insurance Company Heuristic document verification and real time deposit engine
US10769722B1 (en) 2016-05-12 2020-09-08 State Farm Mutual Automobile Insurance Company Heuristic credit risk assessment engine
US11164238B1 (en) 2016-05-12 2021-11-02 State Farm Mutual Automobile Insurance Company Cross selling recommendation engine
US11164091B1 (en) 2016-05-12 2021-11-02 State Farm Mutual Automobile Insurance Company Natural language troubleshooting engine
US11461840B1 (en) 2016-05-12 2022-10-04 State Farm Mutual Automobile Insurance Company Heuristic document verification and real time deposit engine
US11544783B1 (en) 2016-05-12 2023-01-03 State Farm Mutual Automobile Insurance Company Heuristic credit risk assessment engine
US11556934B1 (en) 2016-05-12 2023-01-17 State Farm Mutual Automobile Insurance Company Heuristic account fraud detection engine
US11734690B1 (en) 2016-05-12 2023-08-22 State Farm Mutual Automobile Insurance Company Heuristic money laundering detection engine

Also Published As

Publication number Publication date
US7899722B1 (en) 2011-03-01

Similar Documents

Publication Publication Date Title
US20110131125A1 (en) Correspondent Bank Registry
US7904361B2 (en) Risk management customer registry
US8266051B2 (en) Biometric risk management
US8311933B2 (en) Hedge fund risk management
US7548883B2 (en) Construction industry risk management clearinghouse
US20020138417A1 (en) Risk management clearinghouse
US8209246B2 (en) Proprietary risk management clearinghouse
US7958027B2 (en) Systems and methods for managing risk associated with a geo-political area
US20040006532A1 (en) Network access risk management
US8843411B2 (en) Gaming industry risk management clearinghouse
US20030033241A1 (en) Methods and systems for automated loan origination, processing and approval
US20030233319A1 (en) Electronic fund transfer participant risk management clearing
US20040193532A1 (en) Insider trading risk management
US20040143446A1 (en) Long term care risk management clearinghouse
US8285615B2 (en) Construction industry risk management clearinghouse
US20110131136A1 (en) Risk Management Customer Registry
CA2478898A1 (en) Network access risk management
WO2004072803A2 (en) Insider trading risk management
WO2004003811A1 (en) Risk management customer registry
WO2004001538A2 (en) Hedge fund risk management
EP1376439A1 (en) Correspondent bank registry
WO2004001544A2 (en) Biometric risk management
WO2006110121A1 (en) Construction industry risk management clearinghouse
WO2004021102A2 (en) Gaming industry risk management clearinghouse
WO2003104938A2 (en) Electronic fund transfer participant risk management clearing

Legal Events

Date Code Title Description
AS Assignment

Owner name: REGULATORY DATACORP, INC., PENNSYLVANIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GOLDMAN SACHS & CO.;REEL/FRAME:040054/0122

Effective date: 20160422

AS Assignment

Owner name: GOLDMAN SACHS PRIVATE MIDDLE MARKET CREDIT LLC, AS

Free format text: SECURITY INTEREST;ASSIGNOR:REGULATORY DATACORP, INC.;REEL/FRAME:039816/0190

Effective date: 20160921

Owner name: ANTARES CAPITAL LP, AS COLLATERAL AGENT, ILLINOIS

Free format text: FIRST LIEN PATENT SECURITY AGREEMENT;ASSIGNOR:REGULATORY DATACORP, INC.;REEL/FRAME:040095/0272

Effective date: 20160921

AS Assignment

Owner name: REGULATORY DATACORP, INC., PENNSYLVANIA

Free format text: MERGER;ASSIGNOR:REGULATORY DATACORP, INTL LLC;REEL/FRAME:040483/0506

Effective date: 20070727

Owner name: REGULATORY DATACORP, INC., PENNSYLVANIA

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNOR NAME PREVIOUSLY RECORDED AT REEL: 040054 FRAME: 0122. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNOR:GOLDMAN, SACHS & CO.;REEL/FRAME:040479/0394

Effective date: 20160422

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: REGULATORY DATACORP, INC., PENNSYLVANIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:GOLDMAN SACHS PRIVATE MIDDLE MARKET CREDIT LLC;REEL/FRAME:045795/0795

Effective date: 20180514

AS Assignment

Owner name: REGULATORY DATACORP, INC., PENNSYLVANIA

Free format text: RELEASE OF SECURITY INTEREST IN PATENT COLLATERAL;ASSIGNOR:ANTARES CAPITAL LP;REEL/FRAME:051931/0397

Effective date: 20200213