主权项 |
1. A method for managing the use of biometric information for fraud risk monitoring, the method comprising:
maintaining, at each of a plurality of financial institutions, biometric information associated with individuals, including biometric information corresponding to a specified individual that has been marked as suspicious based on a pattern of transactions, the biometric information and its marking as suspicious being stored at a local data store associated with each of the financial institutions; receiving, at one or more of the processors at a biometric switch, from a requesting party, biometric information for an individual transaction being conducted, the biometric switch comprising a data store at the biometric switch maintaining data used to implement the routing of the received biometric information to any of the plurality of the financial institutions maintaining the stored biometric information corresponding to the specified individual; identifying with the biometric switch which of one or more of the plurality of financial institutions maintains biometric information at its local data store corresponding to the received biometric information for the individual transaction being conducted; routing the received biometric information for the individual transaction from the biometric switch to the identified one or more financial institutions, the routing based on the identified financial institutions maintaining the corresponding biometric information rather than a financial account used for the individual transaction determining, at one or more of the processors at the identified one or more of the plurality of financial institutions, that the biometric information for the individual transaction is associated with the specified individual, so that fraud risk monitoring includes a determination based on the biometric information and activity associated with the biometric information, separate from data associated with the financial account used for the transaction; issuing an alert for the requesting party when the biometric information for the individual transaction being conducted is determined, at the one or more processors at the identified one or more financial institutions, as associated with the specified individual; and separately using the received biometric information, at the one or more processors at the identified one or more financial institutions, to access the financial account to verify adequate funds in the financial account used in support of the individual transaction by an enrolled customer that has accounts associated with the biometric information; wherein the biometric information received for conducting the individual transaction from the requesting party is processed in a two-pronged path, wherein one prong of the two-pronged path processes the transaction by accessing the financial account at one of the financial institutions of the enrolled customer to verify adequate funds for support of the individual transaction and the other prong of the two-pronged path processes the transaction to determine at the identified one or more financial institutions whether the biometric information is associated with the specified individual that has been marked as suspicious. |