Distributed Identity Proofing for Vendor Master and Bank Account Validation Workflows
Keywords:
Vendor Master Data, Distributed Identity Proofing, Bank Account Verification, Payment Security, Data GovernanceAbstract
Ensuring the authenticity and integrity of vendor master data is essential for preventing payment fraud, reducing exception handling, and improving financial control reliability in enterprise procurement and accounts payable environments. Traditional vendor onboarding workflows rely heavily on vendor-provided documentation and manual review, which introduces inconsistency, delays, and elevated risk of misdirected payments. This study presents a distributed identity proofing and bank account ownership verification model that validates vendor legal identity, tax credentials, registered address, and banking information against authoritative external data sources. The approach incorporates confidence scoring, verification provenance, and lifecycle revalidation to ensure ongoing accuracy of vendor records. Experimental results demonstrate significant reductions in onboarding processing times, decreased payment exception rates, and strengthened audit traceability. The findings highlight the operational and governance advantages of integrating verification logic into vendor master data management as organizations increasingly digitize financial workflows.
References
Batini, Carlo, et al. "Methodologies for data quality assessment and improvement." ACM computing surveys (CSUR) 41.3 (2009): 1-52.
Chen, Hsinchun, Roger HL Chiang, and Veda C. Storey. "Business intelligence and analytics: From big data to big impact." MIS quarterly (2012): 1165-1188.
Wan, Yi. Managing enterprise resource planning and multi-organisational enterprise governance: a new contingency framework for the enterprisation of operations. Diss. Aston University, 2016.
Bonnet, Pierre. Enterprise data governance: Reference and master data management semantic modeling. John Wiley & Sons, 2013.
Lacity, Mary, and Leslie Willcocks. "Paper 16/01 Robotic Process Automation: The Next Transformation Lever for Shared Services." Retrieved from The Outsourcing Unit, LSE: http://www. umsl. edu/lacitym (2016).
Bănărescu, Adrian. "Detecting and preventing fraud with data analytics." Procedia economics and finance 32 (2015): 1827-1836.
Mohammed, Ishaq Azhar. "Analysis of Identity and Access Management alternatives for a multinational information-sharing environment." International Journal of Advanced and Innovative Research 1.8 (2012): 1-7.
Broeder, Daan, et al. Federated identity management for research collaborations. No. CERN-OPEN-2012-006. 2012.
Kohli, Manu, and Edgardo Suarez. "Centralized solution to securely transfer payment information electronically to banks from multiple enterprise resource planning (ERP) systems." 2016 International Conference on Information Technology (ICIT). IEEE, 2016.
Ebert, Christof. "Supplier performance management: risk mitigation and industry benchmarks." 2017 IEEE 12th International Conference on Global Software Engineering (ICGSE). IEEE, 2017.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 International Journal of communication and computer Technologies

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.



The articles in Worldwide Medicine are open access articles licensed under the terms of the