US20030099379A1 - Validation and verification apparatus and method - Google Patents

Validation and verification apparatus and method Download PDF

Info

Publication number
US20030099379A1
US20030099379A1 US09/994,399 US99439901A US2003099379A1 US 20030099379 A1 US20030099379 A1 US 20030099379A1 US 99439901 A US99439901 A US 99439901A US 2003099379 A1 US2003099379 A1 US 2003099379A1
Authority
US
United States
Prior art keywords
document
documents
group
comparing
counterfeit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US09/994,399
Inventor
Bruce Monk
Theodore Kuklinski
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
AssureTec Systems Inc
Original Assignee
AssureTec Systems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by AssureTec Systems Inc filed Critical AssureTec Systems Inc
Priority to US09/994,399 priority Critical patent/US20030099379A1/en
Assigned to ASSURETEC SYSTEMS INC. reassignment ASSURETEC SYSTEMS INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: KUKLINSKI, THEODORE T., MONK, BRUCE C.
Priority to US10/487,824 priority patent/US20040239732A1/en
Priority to PCT/US2002/037740 priority patent/WO2003046815A1/en
Priority to CA2467861A priority patent/CA2467861C/en
Priority to CNB028234375A priority patent/CN1295642C/en
Priority to EP02804055A priority patent/EP1449155A4/en
Priority to AU2002365578A priority patent/AU2002365578A1/en
Publication of US20030099379A1 publication Critical patent/US20030099379A1/en
Priority to US11/156,885 priority patent/US7110573B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V30/00Character recognition; Recognising digital ink; Document-oriented image-based pattern recognition
    • G06V30/40Document-oriented image-based pattern recognition

Definitions

  • This invention relates to apparatus and a method for automatically identifying and validating a document, for validating the identity of a bearer of a document, for verifying that the bearer has authorization to participate in an activity represented by the document, and for comparing information on the document against information databases to determine if there are known concerns about the document or its bearer.
  • micro-miniature smart chips and memory chips are embedded in such documents, just as they are in smart cards, and may be used to identify, read and validate documents in which they are embedded, and to identify and validate the bearer of such documents.
  • a security laminating material used for anti-counterfeiting of passports is 3M's Confirm® security laminate described in U.S. Pat. No. 5,658,41 1.
  • Another example of a 3M security laminating material used for anti-counterfeiting of passports is described in U.S. Pat. No. 5,631,064 and utilizes retro-reflective glass microspheres.
  • An example of an identity card using smart-card technology has recently been introduced in Malaysia where an embedded computer chip and memory allows the card to be used as a combination identity card, driver's license, cash card, national health service card, and passport.
  • the present invention provides new apparatus and a method-for automatically identifying and validating documents, for validating the identity of a bearer of a document, for verifying that the bearer has authorization to participate in an activity represented by the document, and for comparing information on the document against information databases to determine if there are concerns about the document or its bearer.
  • the new apparatus and method automatically identifies and authenticates existing, issued documents of different kinds, by checking the intrinsic characteristics of the document and its security features to verify that the documents are not counterfeited and have not been altered.
  • the document's properties may also be used to query the authority that issued the document to confirm its validity.
  • information contained in the document may be retrieved and used to validate the identity of a bearer of the document. Also, the current status of a bearer's authorization to engage in a particular activity indicated by the document may be verified, such as to cross a border, check-in to a flight, cash a check, rent a car, purchase a controlled substance, buy hazardous materials, or to enter a secure area. Further, a photo on the document may be captured with sufficient quality to be used for facial matching by machine or human. A picture, signature, fingerprint, iris scan or other biometric information stored on the document may be compared to biometric information received directly from the bearer of the document, and/or compared to biometric information retrieved from a central database.
  • the information obtained from the document and the bearer of the document may be checked against information stored in other local or distributed databases, such as “watch” lists, “wanted” lists, and prohibited entry lists. In this manner, both false identities and identity theft are detected. The certainty of detection then becomes a major deterrent to such crimes.
  • the first critical step is to identify the type of document presented.
  • documents that can be identified are passports, visas, driver licenses, alien residence cards, and INSPASS cards.
  • the first step in the process uses an image of the presented document to determine the physical size of the document. All documents that may be processed are classified into a plurality of physical size ranges. Upon determining the size of the document from the first image the document type is thereby narrowed down to a smaller set of documents. To further narrow the search the presence of information at specific locations, i.e. test regions, on the document is looked for. For example, the presence of a certain pattern of colors in the test regions is looked for. Using the information found in the test regions on the document the type of document is identified with a high degree of probability.
  • reference information for the document are retrieved.
  • This criterion includes document layout, security features and intrinsic characteristics (documetric) for the identified document type.
  • data and images are collected from test regions on the document. Some of the data collected will be obtained using optical/intelligent character reading technology and bar-code reading technology. Data and images collected from the document are from areas intended for machine-readability; from human readable areas protected from forgery and tampering and not intended for machine readability; and from areas that are covert and not visible to the unaided human eye.
  • Images are collected from documents using a variety of excitation sources, including infrared, visible and ultraviolet light sources, and polarized light based on the known properties for the specific document type as found in the reference information.
  • excitation sources including infrared, visible and ultraviolet light sources, and polarized light based on the known properties for the specific document type as found in the reference information.
  • Other information may be collected using devices such as ultrasonic, RF or magnetic sensors.
  • the information and images collected from a document are analyzed and compared with known characteristics for the identified document type in the reference information. Images are processed to check the composition of the document, characteristics of the materials, and evidence of any alteration or counterfeiting. Also, classes of documents with known forgery characteristics are specifically examined for the forgery characteristics. At the conclusion of this third step, certain conclusions can be made as to the authenticity of the presented document and a “score” representing the quality of the match between the document and the known properties for that document is calculated.
  • a predetermined “score” the document is considered to be a real document in view of the level of analysis performed. Below a predetermined “score” it can conclusively be determined that the document is not valid. Between these scores there is questionable authenticity, and the document bearer and document may be subjected to closer examination.
  • the data and image information captured from each document may be used to query relevant databases controlled by the issuing authority of the document, or by agencies with lists of known stolen documents, watch lists of wanted or suspected individuals, biometric data for identity matching, data combinations such as arrival and departure locations, suspected combinations of travelers and travel patterns, known issued valid documents, and other pertinent information.
  • identity verification of the bearer is accomplished linking the bearer to the document. This is done by matching biometric information contained on the document with information measured from the bearer of the document. If the quality of a biometric on the document (such as a photo) and a biometric obtained directly from the bearer at the apparatus are sufficient for matching with a high degree of confidence, then no further examination is required. Should the biometric not match with sufficient confidence, a further match could be made by using the biometric information captured to query the authority that issued the document for their assessment of the match.
  • FIG. 1 is a block diagram of the novel validation and verification apparatus used to identify, read and verify documents and their bearers;
  • FIGS. 2A & 2B are a block diagram showing the steps involved in determining a document type
  • FIG. 3 is a block diagram showing the steps involved in reading and capturing data from a document and determining if the document is counterfeit or has been altered;
  • FIG. 4 is a block diagram showing the steps involved in comparing data on a document with reference data and data in databases, and determining if the document bearer is on a watchlist;
  • FIG. 5 is a block diagram showing the steps involved in retrieving and comparing biometric data on a document, in a database and directly from the document bearer.
  • a photograph On the inside of a passport 11 is located a photograph, bibliographic and possibly other information about the bearer of the passport. This is called the “personalization page.”
  • the information on this page includes passport number, issuance and expiration dates, issuing authority, possibly biometric information about the person to whom the passport 11 is issued, and other information.
  • a piece of thin plastic is laminated to the surface of the personalization page of passport 11 to seal the photograph and information recorded thereon.
  • This plastic laminating material may contain security features such as holograms or retro-reflective materials to provide a measure of security. Laminating, with or without such security features, is done to make it very difficult to alter a passport or to produce counterfeit passports, but passports are still altered and counterfeited despite security measures being taken.
  • Other security measures include affixing holographic seals to the document under the laminating layer, using laminating material that has invisible images therein, use of special inks, use of special paper and imbedded threads, and using paper with a subdued background pattern that is damaged by attempts to alter the passport.
  • FIG. 1 a block diagram of our novel validation and verification apparatus 10 .
  • Apparatus 10 has a glass platen 12 onto which a document 11 , such as a passport, is placed.
  • the size and shape of platen 12 is chosen according to the intended use of apparatus 10 to accommodate a variety of different types of identity cards, travel documents, resident alien green cards, and other similar documents, such as drivers licenses, passports, identification cards, ingress/egress passes; and documents of value, such as bonds, certificates and negotiable instruments.
  • the CPU 14 and associated peripheral devices illustrate a fully integrated embodiment of the apparatus.
  • the physical apparatus may be constructed including only the elements associated with the camera 18 , controller 15 , lights 16 , optics 17 , display 21 and platen 12 . In this configuration the apparatus serves as a peripheral to a processor. However, all of the functionality and process steps remain the same.
  • Lights 16 comprise a plurality of visible and invisible light sources or other excitation means of different wavelengths. These sources include, but are not limited to, visible light, near infrared (IR), long and short wave ultraviolet (UV), from arrays of light emitting diodes (LEDs), RF and ultrasonic, solid-state emitters, transducers, gas discharge, incandescent, and/or fluorescent sources. The emission from each of which may pass through a diffuser medium or focusing mechanism (not shown) to illuminate the page of document 11 on platen 12 .
  • IR near-infrared
  • UV ultraviolet
  • Camera 18 has an operational frequency range that is able to image 400 nanometer to 1 micron, visible to near-IR. It can also be enhanced with transluminance materials to shift the response range to detect frequencies outside this range. The capabilities of camera 18 , as shown, may also be extended to add filters or include transducers sensitive to frequencies in any range.
  • all light sources have programmable output intensities and LED sources may be pulsed to achieve higher peak power levels that provide greater illumination of the document and to help to expose security markings and unauthorized alterations at different levels within the passport.
  • the frequency of pulsing the IR and blue light LEDs is high enough that the pulsing cannot be detected by camera 18 .
  • the light from the sequentially energized multiple light sources 16 is reflected from the laminated page of passport 11 on platen 12 and impinges on optics 17 which focuses the image for camera 18 .
  • the optics 17 can also be used to split the optical path to support multiple cameras/detectors and/or provide filtering to band limit the spectral content reaching the camera.
  • camera 18 is a high-resolution, color, solid-state camera that is controlled by CPU 14 , and produces a digitized color picture.
  • Camera 18 and near-IR light 16 are continuously operating while apparatus 10 is powered up and awaiting detection of a document.
  • Link 27 is a high-speed, digital interface such as conforms to the IEEE 1394 standard, high-speed Ethernet, or a universal serial bus (USB), or other future protocols.
  • the color picture is in a digitized format and CPU 14 stores it in a memory queue. In some instances gray scale pictures may be utilized. In other applications where color is not needed a monochrome camera may be utilized.
  • a local high capacity storage device 25 may store information such as document reference information files and image reference files, and a program run by CPU 14 to control the operation of validation and verification apparatus 10 .
  • document reference information files and image reference files and other material may be filed in and accessed from a remote server.
  • memory 20 that comprises static and dynamic memory and it functions with CPU 14 in a well-known manner.
  • network port 22 can be used to connect apparatus 10 to a server on a local area network (LAN) or wide area network (WAN) to record the time and date that the bearer of a passport is entering or leaving a country, and transfer other information retrieved from a document, and to communicate with authorities responsible for databases used for verifying and validating the document and its bearer, and to check if the bearer of the document is on a prohibited entry or wanted list (“watch list”).
  • LAN local area network
  • WAN wide area network
  • Apparatus 10 also includes a display 21 , which may include a touch-screen for response, to provide indications to the either the operator of apparatus 10 or to a person whose document is being checked, such as the validity or invalidity of document 11 , validating or invalidating the identity of a bearer of the document, verifying or not verifying that the bearer has authorization to travel using the document, and indicating detection of an altered or counterfeit document.
  • a separate display may also be provided for persons whose documents are being checked.
  • There is also a display monitor 24 that may be used for a number of purposes including displaying to an operator more detailed information generated by apparatus 10 , and pictures and other information retrieved from a remote network of computers via network port 22 .
  • apparatus 10 is in a stand-alone operation, such as at a point of ingress or egress, and a bearer of a document 11 places it on apparatus 10 to be verified and granted permission to enter or depart. If document 11 is not verified a visual and/or audible indication may be provided to the bearer of a document 11 to take some action, such as reporting to some other location for verification.
  • Other apparatus may be provided as required by specific applications, such as a bar code reader, a magnetic stripe reader, iris reader, a signature capture device, gate controller, and/or a smart card reader, all of which are not shown in FIG. 1.
  • FIG. 2 is a general block diagram showing the program steps involved in determining a document type.
  • block 30 it is determined if there is a document 11 on platen 12 .
  • Camera 18 and a light 16 (IR) remain on to detect the presence of a document on platen 12 by a change of the digital image output from the camera.
  • a light 16 visible is energized until a first image is captured of document 11 .
  • the program exits block 30 at NO and continuously cycles back to the input of block 30 .
  • the program exits block 30 at YES and progresses to block 31 where the first image is captured for processing to determine what type of document is on platen 12 .
  • the first picture is analyzed to locate its edges and from this the document size is determined. All documents that may be processed by apparatus 10 have a physical size and apparatus 10 determines the document size to be within one of a plurality of pre-selected size ranges, and there is a specific set of test regions and characteristics for each stored for the documents in each size range.
  • the physical size range in which the document is located is identified, and apparatus 10 has thereby narrowed down the document to be one of a smaller set of documents.
  • apparatus 10 has thereby narrowed down the document to be one of a smaller set of documents.
  • the presence of information at specific test regions on the document are looked for. For example, the presence of certain color patterns in specific test regions.
  • the information found at the specific test regions on the document is used to identify the type of document.
  • the document type is ascertained with a very high degree of confidence and there is no need to check for the presence of information at the other test regions on the document.
  • the presence of second specific information is looked for in a second test region in the first picture.
  • the document type is ascertained with a very high degree of confidence and there is no need to check for the presence of additional information in the first picture. Only if necessary, this process may be repeated for more specific information at additional test regions on the document, but the process is terminated as soon as the document type is ascertained with a very high degree of confidence. In this manner, testing to determine a document type is kept to a minimum.
  • a set of characteristics for the ascertained document size range are read from the master document file.
  • a description of the types of documents that have been ascertained of the same size as document 11 is retrieved from master document file.
  • certain types of documents will be analyzed more often than others. For example, if apparatus 10 is used to check driver licenses and identity cards at a state liquor store in the State of New Hampshire, the probability is that documents inserted into the apparatus for verification will be New Hampshire driver licenses and identity cards. Accordingly, over time the apparatus will collect information that most of the time New Hampshire driver licenses and identity cards are ascertained and verified, and possibly drivers licenses more often than identity cards.
  • the program progresses to block 37 where the image information in the second test region in the first picture is analyzed to determine if the information matches the retrieved set of characteristics for that test region. If there is no very high confidence match the program stores the match confidence determined at block 36 . This process repeats through a number of iterations as defined by a retrieved set of document definitions.
  • the digital image information for the last (Nth) region in the first picture is analyzed to determine if the information matches the set of characteristics for the Nth region. If there is no very high confidence match the program again stores this determination at block 36 .
  • the program determines when the image matching is complete. When complete, at block 41 it is decided if any of the confidence reports from blocks 35 , 37 and 38 exceed a predetermined minimum threshold. If any do, then the reference documents highest 3 (configurable number) scores are checked against document 11 using the secondary characteristics and test regions as specified in their respective document definition file. The process is the same as steps 36 - 40 . This procedure is followed until it has either been determined that a document is a specific type to a very high degree of confidence or the operator is notified that the type is questionable.
  • apparatus 10 can identify the document, processing of the document continues using the rotated image. Using the ascertained document type, the program progresses to block 45 and retrieves a document definition file from which inspection criteria are retrieved to be used in analyzing and verifying the document as described with reference to FIG. 3.
  • FIG. 3 is a block diagram showing the steps involved in reading and capturing data from the document, and testing to determine if a document is valid, counterfeit or has been altered.
  • the first information type is obtained from images created using ultraviolet, infrared, direct, polarized light, etc., where one or more additional images are obtained and then processed to derive data therefrom.
  • the second information type is pictorial or graphic information on documents, such as photo, fingerprint, or seal, and is captured directly from the document image.
  • the third information type is data read directly from an image on the document by optical character reading (OCR), intelligent character recognition (ICR), bar code interpretation, etc.
  • OCR optical character reading
  • ICR intelligent character recognition
  • bar code interpretation etc.
  • data may be derived from the other images of the document, when such information becomes visible under a special light.
  • MRZ machine-readable zones
  • CPU 14 uses an optical character reading (OCR) technology to “read” the alphanumeric information in the MRZ field.
  • OCR optical character reading
  • CPU 14 is able to determine if the document is a passport, or another type of document that includes an MRZ field.
  • MRZ information may include, but is not limited to, the name, birthday, sex, place of birth of the person to whom the document is issued, the date of issuance and expiration of the document, the issuing authority, issue run, and document number.
  • This information may also be encrypted and placed in bar codes or on microchips on documents, and used as a double check against visible information to verify that a document is not a forgery and/or has not been altered.
  • laser readable material invisible to the human eye, may be placed on the document which is written and read like a CDROM, but is written and read in rows, and may contain data visible elsewhere on the card, or encoded fingerprints, hand-geometry, iris scans, retinal scans, and other biometric information.
  • Certain inks such as those containing carbon black, absorb infrared light. Other inks do not absorb infrared light, but are transparent to it or reflect it. Both may appear to be the same color under normal light.
  • Printing on a document is generally in black, but MRZ items on the document will be printed with the special near-IR absorbing (B900) black ink to conform to international standards. When illuminated with a near-IR source this latter printing will appear, while all other printing disappears.
  • CPU 14 knows where to look for the special ink printing in a digitized image made under illumination of the near-IR source from the retrieved document definition file. If the near-IR responsive images are in the specified areas, whether they are alphanumeric text or certain patterns or images, they will be identified by CPU 14 as an indication that the passport 11 in document reader 10 has not been photocopied.
  • a long wave ultraviolet (UV-A) light causes certain inks and fibers to fluoresce, so they are visible within the image captured by camera 18 using this light source.
  • a short wave ultraviolet (UV-C) causes other special inks and fibers to fluoresce, while all other areas on the document image disappear, including those made with materials that fluoresce under UV-A.
  • alphanumeric characters and symbols may be printed on passport 11 or other documents with inks that are not visible to the human eye, but which appear when illuminated with a UV light source. These symbols may be printed on the portion of the passport that is laminated, or may be imprinted in or on the laminating material. From the retrieved document definition file CPU 14 knows where to look in a digitized picture captured from a document for the symbols that are visible when illuminated under a UV light source.
  • Document definition files include document layout (location of different types of information and pictures on a document), security features (such as information visible with ultraviolet, infrared, direct blue, and polarized light) and intrinsic characteristics (documetric) specific to the process or materials used to manufacture the document.
  • security features such as information visible with ultraviolet, infrared, direct blue, and polarized light
  • intrinsic characteristics documetric specific to the process or materials used to manufacture the document.
  • images are obtained using infrared, ultraviolet or other wavelengths of light; or polarized, coaxial, or light incident at specific angles at resolutions adapted to provide the best analysis for the type of data being read.
  • These additional images are processed to obtain further data on the document, for checking the authenticity of the document, and for determining if the document has been altered or is a counterfeit.
  • first data is captured by taking an ultraviolet, infrared, polarized etc. picture of document 11 as established by the document definition file for that document type. Assume that at block 51 an ultraviolet image is obtained first.
  • first data information made visible by the ultraviolet light is read and stored. Merely seeing if it is visible at specific locations on the document, or if the information made visible may be read using another technology such as optical character reading, barcode reading, or image recognition may check the information.
  • the information obtained using the ultraviolet picture, as described in the previous sentence is compared to reference information from the document definition file.
  • the weighted results of the comparison are saved.
  • a first data picture such as an infrared picture to be used, for example, to check for the use of certain carbon based inks on the document, or for alterations to the document.
  • information made visible by the infrared light is read and saved. Merely seeing if information is visible at specific locations on the document, or if the information made visible may be read using another technology such as optical character reading, and barcode reading may check the information.
  • the information obtained using the infrared picture is compared to standard reference information from the document definition file.
  • the weighted results of the comparison are saved.
  • the coaxial light sources are used in the detection and verification of retro-reflective materials contained in documents the use of an image, if any, in the retro-reflective material may be viewed, and the image, if any, may be compared to a reference image from a document definition file that is retrieved from storage, either locally or remotely.
  • a document definition file that is retrieved from storage
  • a direct blue light source generated by an array of blue LEDs is specifically used to verify that 3M's retro-reflective Confirms® material is used as the laminate, and has not been tampered with. Under this blue light a white logo is seen against a gray background. This is easily detected by analysis of the image produced, and can be read using optical character reading.
  • logos are combinations of words and graphics that are distinctive to the country or issuer of the passport or other type of document and are compared to words and graphics in the document definition file for the document. The logo is invisible to the naked eye. Any attempts to forge the 3M laminate, or to use another laminate, are obvious.
  • the program progresses to the input of block 62 where, using the document definition file, it is determined if there are any Nth data type information to be captured from the first picture, such as the OCR of characters or reading a bar-code data, as indicated by the document definition file.
  • the program branches from block 62 .
  • the program branches to block 63 where the Nth data type information at a specified location on the document is captured from the first image.
  • the information is read and stored. If the information is alphanumeric text it is read using OCR and the information saved. If the information is in barcode form the barcode is decoded and the information derived therefrom is saved.
  • the program makes a determination using the document definition file if there are any more Nth data information to be read and saved. If there is, the program branches from block 65 back to the input of block 63 to capture and read the Nth data information.
  • the first Nth data information is alphanumeric text that is read using OCR and the second Nth data information is a bar code that is read.
  • FIG. 4 is a block diagram showing the steps involved in further validating a document and verifying the identity of the bearer by comparing data derive from the document with data in databases, determining if the document bearer matches the biometrics on the document (typically the photograph), if the bearer is on a watch list, wanted list, or is on a prohibited entry list.
  • the information retrieved from the document in FIG. 3 is used to access databases related to the type of document being verified as specified in the document definition file or established in a master control file by the organization managing the operation of the system.
  • the database information being compared may be a positive or negative indication of the document validity or their identity.
  • the results are scored and used as a part of the overall evaluation of the document and the bearer.
  • Completion of the match test between the sets of information causes the program to progress to block 75 where other databases are accessed to determine, for example, if the bearer of the document is not in the issuing authority database, or is on a watch list of any type. While not shown in FIG. 4 these other database tests might include: (1) checking if the bearer of the document is wanted for any crimes, (2) checking the document against lists of stolen documents, (3) analysis of data combinations such as arrival on departure locations, (4) checking for prohibited entry individuals, and (5) matching suspected combinations of travelers and travel patterns. If the bearer of the document is on a watch list or wanted for any crimes, the program branches to block 77 to notify the appropriate authorities.
  • FIG. 5 is shown a block diagram of the steps involved in comparing biometric data on a document with that received directly from the document bearer.
  • the purpose for this comparisons is to validate the bearer of the document and to check against biometric “watch lists”.
  • a camera, a fingerprint scanner, and/or an iris scanner, microphone, or signature capture device must be located with apparatus 10 .
  • a decision is made at block 81 whether or not there is a match. When there is a match the program progresses to block 86 to display a message that there is a biometric data match. The program then returns to its start in FIG. 1.
  • this determination is made at block 81 .
  • the no match determination may be due to an altered or counterfeit document, but may also be due to the fact that the biometric data on the document (such as the photo) is unusable.
  • a warning message is given to the operator of apparatus 10 or the appropriate authorities.
  • the program progresses to block 83 to query the issuing authority of the document or other authority requesting that they or their appointed trust authority match the data and biometric and return the results.
  • the biometric data from the document and/or from the bearer may be used, along with data from the document, and are forwarded to the authority that will be performing the match.
  • the match results from the trust authority are checked to determine if there is a data match. If there is no data match, the program progresses to block 85 where an alert is given to the operator of apparatus 10 and/or the appropriate authorities. Upon it being determined at block 84 that there is a match, the program progresses to block 86 to display a message that there is a biometric data match. The program then returns to its start in FIG. 1.
  • biometric information retrieved directly from the document bearer and/or from the document may be compared against a biometric “watch list”. If it is determined that the document bearer is on a biometric “watchlist”, an alert message is given to the operator of apparatus 10 and/or the appropriate authorities.
  • apparatus 10 has verified both a document and the bearer of the document, and has verified that the bearer has authorization to participate in an activity represented by the document.
  • the program running apparatus 10 returns to its start state in FIG. 2 and is ready to check another document.

Abstract

Apparatus and a method are disclosed for automatically identifying and validating a document, for validating the identity of a bearer of a document, for verifying that the bearer has authorization to participate in an activity represented by the document, and for comparing information on the document against information databases to determine if there are known concerns about the document or its bearer. A document type is narrowed by initially determining the size of the document, and is then identified from amongst a group of documents by looking for colors or other characteristics at specific locations on the document only until the document is identified. The order in which document locations are looked at is dependent upon a history of the types of documents that have been identified. An identified document is verified by first looking up reference information about the document type and using that information to read specific contents and check only specific security and other features utilized on the document. The contents of a document are checked against a database to verify its contents, and other databases are checked for stolen documents, known valid documents, and prohibited travel or entry. Biometrics in databases, on documents and directly from the document bearer are compared to verify the bearer.

Description

    FIELD OF THE INVENTION
  • This invention relates to apparatus and a method for automatically identifying and validating a document, for validating the identity of a bearer of a document, for verifying that the bearer has authorization to participate in an activity represented by the document, and for comparing information on the document against information databases to determine if there are known concerns about the document or its bearer. [0001]
  • BACKGROUND OF THE INVENTION
  • Over time there has been an increase in counterfeiting and alterations to identity, travel and other documents, such as drivers licenses, passports, identification cards, and passes. In addition, there has been an increase in counterfeiting and alterations to documents having value, such as negotiable instruments, bonds and other similar documents. This has caused concern to the governments and companies who issue such identity and travel documents; and much financial loss where such counterfeit and altered documents are documents of value. [0002]
  • To hinder such counterfeiting and alterations to identity, travel and similar documents, and documents having value, many innovations have been proposed or introduced. One solution has been the development and implementation of new materials for producing such documents that has made counterfeiting and alterations more difficult, and the detection of counterfeit and altered documents easier and faster. Such new materials include the use of holograms and retro-reflective layers in laminating material, invisible information that only appears when illuminated by certain wavelengths of invisible light or other energy, and different types of inks that are seen as one color under normal ambient light but are seen as a different color when illuminated by certain wavelengths of invisible light or other energy (chemical taggants). In addition, magnetic and radio frequency (RF) taggants that are invisible to the eye are added to base materials and laminating materials but may be detected using special equipment. Further, micro-miniature smart chips and memory chips are embedded in such documents, just as they are in smart cards, and may be used to identify, read and validate documents in which they are embedded, and to identify and validate the bearer of such documents. [0003]
  • One example of a security laminating material used for anti-counterfeiting of passports is 3M's Confirm® security laminate described in U.S. Pat. No. 5,658,41 1. Another example of a 3M security laminating material used for anti-counterfeiting of passports is described in U.S. Pat. No. 5,631,064 and utilizes retro-reflective glass microspheres. [0004]
  • An example of an identity card using smart-card technology has recently been introduced in Malaysia where an embedded computer chip and memory allows the card to be used as a combination identity card, driver's license, cash card, national health service card, and passport. [0005]
  • Coupled with the increase of new materials and new techniques to produce documents that are more difficult to counterfeit or alter, there has been an increase in the demand for new equipment and systems for automatically identifying and validating documents, for validating the identity of a bearer of a document, for verifying that the bearer has authorization to participate in an activity represented by the document, and for comparing information on the document against information databases to determine if there are known concerns about the document or its bearer. This demand has risen because it has become virtually impossible for a person, by themself, to analyze and validate documents using such new materials and other techniques. [0006]
  • SUMMARY OF THE INVENTION
  • The present invention provides new apparatus and a method-for automatically identifying and validating documents, for validating the identity of a bearer of a document, for verifying that the bearer has authorization to participate in an activity represented by the document, and for comparing information on the document against information databases to determine if there are concerns about the document or its bearer. [0007]
  • The use of the new apparatus and methods speeds the process of checking documents, and achieving more accurate verification of a document and its bearer because individual examiners cannot be expected to remember or know all information concerning a plurality of document types. In addition, individuals get tired, distracted or careless and they make mistakes. [0008]
  • The new apparatus and method automatically identifies and authenticates existing, issued documents of different kinds, by checking the intrinsic characteristics of the document and its security features to verify that the documents are not counterfeited and have not been altered. The document's properties may also be used to query the authority that issued the document to confirm its validity. [0009]
  • In addition to identification and validation of the document, information contained in the document may be retrieved and used to validate the identity of a bearer of the document. Also, the current status of a bearer's authorization to engage in a particular activity indicated by the document may be verified, such as to cross a border, check-in to a flight, cash a check, rent a car, purchase a controlled substance, buy hazardous materials, or to enter a secure area. Further, a photo on the document may be captured with sufficient quality to be used for facial matching by machine or human. A picture, signature, fingerprint, iris scan or other biometric information stored on the document may be compared to biometric information received directly from the bearer of the document, and/or compared to biometric information retrieved from a central database. Also, the information obtained from the document and the bearer of the document may be checked against information stored in other local or distributed databases, such as “watch” lists, “wanted” lists, and prohibited entry lists. In this manner, both false identities and identity theft are detected. The certainty of detection then becomes a major deterrent to such crimes. [0010]
  • Finally, real-time auditing and reporting is done relative to the activity that is taking place and all information required to assess the risk of individual patterns of behavior. This information may be stored in a database and used by specific authorities as related to their jurisdictional responsibilities. Protection of the privacy of an individual is protected unless the bearer voluntarily forgoes such protection for added security or as an exception process in the case of a missing document. If there is sufficient reason to suspect illegal activity or the strong likelihood of a future threat, then the appropriate law enforcement agencies may over-ride the normal privacy protection features. [0011]
  • There are several steps involved in implementing the processes described in the previous paragraphs. [0012]
  • The first critical step is to identify the type of document presented. Several examples of documents that can be identified are passports, visas, driver licenses, alien residence cards, and INSPASS cards. The first step in the process uses an image of the presented document to determine the physical size of the document. All documents that may be processed are classified into a plurality of physical size ranges. Upon determining the size of the document from the first image the document type is thereby narrowed down to a smaller set of documents. To further narrow the search the presence of information at specific locations, i.e. test regions, on the document is looked for. For example, the presence of a certain pattern of colors in the test regions is looked for. Using the information found in the test regions on the document the type of document is identified with a high degree of probability. [0013]
  • To speed up document identity analysis, statistical information is collected and used to determine the order in which the test regions on a document are to be checked. For example, if the apparatus is primarily used to check driver licenses and identity cards in a state liquor store in the State of New Hampshire, the document most likely inserted into the apparatus for verification will be New Hampshire drivers licenses and identity cards. Accordingly, as the apparatus is in use, over time, it collects information that most of the time New Hampshire driver licenses and identity cards are verified. Using this statistical information, after a document size range determination is made and the size range includes New Hampshire drivers licenses and identity cards, subsequent checking for the presence of information at test regions on a document will initially look for the presence of such information that is found on New Hampshire documents. Thus, the processing time is typically shortened. [0014]
  • In the second step, using the identified document type, reference information for the document are retrieved. This criterion includes document layout, security features and intrinsic characteristics (documetric) for the identified document type. Using the reference information, data and images are collected from test regions on the document. Some of the data collected will be obtained using optical/intelligent character reading technology and bar-code reading technology. Data and images collected from the document are from areas intended for machine-readability; from human readable areas protected from forgery and tampering and not intended for machine readability; and from areas that are covert and not visible to the unaided human eye. Images are collected from documents using a variety of excitation sources, including infrared, visible and ultraviolet light sources, and polarized light based on the known properties for the specific document type as found in the reference information. Other information may be collected using devices such as ultrasonic, RF or magnetic sensors. [0015]
  • In the third step, the information and images collected from a document are analyzed and compared with known characteristics for the identified document type in the reference information. Images are processed to check the composition of the document, characteristics of the materials, and evidence of any alteration or counterfeiting. Also, classes of documents with known forgery characteristics are specifically examined for the forgery characteristics. At the conclusion of this third step, certain conclusions can be made as to the authenticity of the presented document and a “score” representing the quality of the match between the document and the known properties for that document is calculated. [0016]
  • Above a predetermined “score” the document is considered to be a real document in view of the level of analysis performed. Below a predetermined “score” it can conclusively be determined that the document is not valid. Between these scores there is questionable authenticity, and the document bearer and document may be subjected to closer examination. [0017]
  • In the fourth step the data and image information captured from each document may be used to query relevant databases controlled by the issuing authority of the document, or by agencies with lists of known stolen documents, watch lists of wanted or suspected individuals, biometric data for identity matching, data combinations such as arrival and departure locations, suspected combinations of travelers and travel patterns, known issued valid documents, and other pertinent information. [0018]
  • In the fifth step, after the presented document has been validated, then identity verification of the bearer is accomplished linking the bearer to the document. This is done by matching biometric information contained on the document with information measured from the bearer of the document. If the quality of a biometric on the document (such as a photo) and a biometric obtained directly from the bearer at the apparatus are sufficient for matching with a high degree of confidence, then no further examination is required. Should the biometric not match with sufficient confidence, a further match could be made by using the biometric information captured to query the authority that issued the document for their assessment of the match.[0019]
  • DESCRIPTION OF THE DRAWING
  • The invention will be better understood upon reading the following Detailed Description in conjunction with the drawing in which: [0020]
  • FIG. 1 is a block diagram of the novel validation and verification apparatus used to identify, read and verify documents and their bearers; [0021]
  • FIGS. 2A & 2B are a block diagram showing the steps involved in determining a document type; [0022]
  • FIG. 3 is a block diagram showing the steps involved in reading and capturing data from a document and determining if the document is counterfeit or has been altered; [0023]
  • FIG. 4 is a block diagram showing the steps involved in comparing data on a document with reference data and data in databases, and determining if the document bearer is on a watchlist; and [0024]
  • FIG. 5 is a block diagram showing the steps involved in retrieving and comparing biometric data on a document, in a database and directly from the document bearer.[0025]
  • DETAILED DESCRIPTION
  • In this Detailed Description the operation of our novel validation and [0026] verification apparatus 10 in FIG. 1 is described for reading and verifying all types of documents, but with emphasis given to reading and verifying a passport 11. In the description the terms document and passport are both used, often interchangeably. The detailed description uses a passport by way of illustration, but the same apparatus will also read the other types of documents using the same process as described. Other types of documents may be read and verified such as, but not limited to, driver licenses, identity cards, alien residence cards, and INSPASS cards. While documents of value may also be read and verified using the teaching of the preferred embodiment of the invention described herein, such documents of value are not specifically described in detail hereinafter.
  • On the inside of a [0027] passport 11 is located a photograph, bibliographic and possibly other information about the bearer of the passport. This is called the “personalization page.” The information on this page includes passport number, issuance and expiration dates, issuing authority, possibly biometric information about the person to whom the passport 11 is issued, and other information.
  • A piece of thin plastic is laminated to the surface of the personalization page of [0028] passport 11 to seal the photograph and information recorded thereon. This plastic laminating material may contain security features such as holograms or retro-reflective materials to provide a measure of security. Laminating, with or without such security features, is done to make it very difficult to alter a passport or to produce counterfeit passports, but passports are still altered and counterfeited despite security measures being taken. Other security measures include affixing holographic seals to the document under the laminating layer, using laminating material that has invisible images therein, use of special inks, use of special paper and imbedded threads, and using paper with a subdued background pattern that is damaged by attempts to alter the passport.
  • To make it harder to alter or counterfeit documents, new security measures are continually being developed to make it more difficult, if not impossible, to alter or counterfeit documents. Over time such new measures have included the use of chemical taggants to produce different papers, threads, and types of inks to imprint information. These taggants show up differently under lights of different color, including invisible light such as ultraviolet and infrared. These taggants may also be magnetic or have other properties that are not apparent, but which are detectable when using the proper excitation source and sensor. Further, alterations made to documents containing such security materials, that may be invisible to the naked eye, appear when excited with certain wavelengths of light or electromagnetic energy. Still further, special paper may be utilized that is not visibly damaged by attempts to alter the passport, but the damage can be detected using certain wavelengths of visible and invisible light, or other techniques such as RF or ultrasonic detection. [0029]
  • In FIG. 1 is shown a block diagram of our novel validation and [0030] verification apparatus 10. Apparatus 10 has a glass platen 12 onto which a document 11, such as a passport, is placed. The size and shape of platen 12 is chosen according to the intended use of apparatus 10 to accommodate a variety of different types of identity cards, travel documents, resident alien green cards, and other similar documents, such as drivers licenses, passports, identification cards, ingress/egress passes; and documents of value, such as bonds, certificates and negotiable instruments. The CPU 14 and associated peripheral devices illustrate a fully integrated embodiment of the apparatus. The physical apparatus may be constructed including only the elements associated with the camera 18, controller 15, lights 16, optics 17, display 21 and platen 12. In this configuration the apparatus serves as a peripheral to a processor. However, all of the functionality and process steps remain the same.
  • [0031] Lights 16 comprise a plurality of visible and invisible light sources or other excitation means of different wavelengths. These sources include, but are not limited to, visible light, near infrared (IR), long and short wave ultraviolet (UV), from arrays of light emitting diodes (LEDs), RF and ultrasonic, solid-state emitters, transducers, gas discharge, incandescent, and/or fluorescent sources. The emission from each of which may pass through a diffuser medium or focusing mechanism (not shown) to illuminate the page of document 11 on platen 12. A special instance of these lights 16 uses near-infrared (IR) and blue light from light emitting diodes to emulate a point source of light and illuminate a laminated page of the document. Such illumination is done coaxially with the path the reflected light travels to camera 18. Camera 18 has an operational frequency range that is able to image 400 nanometer to 1 micron, visible to near-IR. It can also be enhanced with transluminance materials to shift the response range to detect frequencies outside this range. The capabilities of camera 18, as shown, may also be extended to add filters or include transducers sensitive to frequencies in any range.
  • In addition, all light sources have programmable output intensities and LED sources may be pulsed to achieve higher peak power levels that provide greater illumination of the document and to help to expose security markings and unauthorized alterations at different levels within the passport. The frequency of pulsing the IR and blue light LEDs is high enough that the pulsing cannot be detected by [0032] camera 18. The light from the sequentially energized multiple light sources 16 is reflected from the laminated page of passport 11 on platen 12 and impinges on optics 17 which focuses the image for camera 18. The optics 17 can also be used to split the optical path to support multiple cameras/detectors and/or provide filtering to band limit the spectral content reaching the camera.
  • In this [0033] embodiment camera 18 is a high-resolution, color, solid-state camera that is controlled by CPU 14, and produces a digitized color picture. Camera 18 and near-IR light 16 are continuously operating while apparatus 10 is powered up and awaiting detection of a document. When apparatus 10 is to commence functioning, the presence of a document 11 on platen 12 is imaged by camera 18 and a first picture is sent to CPU 14 via an interface link 27. Link 27 is a high-speed, digital interface such as conforms to the IEEE 1394 standard, high-speed Ethernet, or a universal serial bus (USB), or other future protocols. The color picture is in a digitized format and CPU 14 stores it in a memory queue. In some instances gray scale pictures may be utilized. In other applications where color is not needed a monochrome camera may be utilized.
  • A local high [0034] capacity storage device 25 may store information such as document reference information files and image reference files, and a program run by CPU 14 to control the operation of validation and verification apparatus 10. Alternately, document reference information files and image reference files and other material may be filed in and accessed from a remote server. As the capability to check new document types is added to apparatus 10, and new and/or updated information about existing document types or security checks becomes available, that new or updated information is stored on storage device 25 from either a detachable CDROM drive 26 or from a remote server (not shown) via network port 22. Like all computers, there is memory 20 that comprises static and dynamic memory and it functions with CPU 14 in a well-known manner. In addition, network port 22 can be used to connect apparatus 10 to a server on a local area network (LAN) or wide area network (WAN) to record the time and date that the bearer of a passport is entering or leaving a country, and transfer other information retrieved from a document, and to communicate with authorities responsible for databases used for verifying and validating the document and its bearer, and to check if the bearer of the document is on a prohibited entry or wanted list (“watch list”).
  • [0035] Apparatus 10 also includes a display 21, which may include a touch-screen for response, to provide indications to the either the operator of apparatus 10 or to a person whose document is being checked, such as the validity or invalidity of document 11, validating or invalidating the identity of a bearer of the document, verifying or not verifying that the bearer has authorization to travel using the document, and indicating detection of an altered or counterfeit document. A separate display may also be provided for persons whose documents are being checked. There is also a display monitor 24 that may be used for a number of purposes including displaying to an operator more detailed information generated by apparatus 10, and pictures and other information retrieved from a remote network of computers via network port 22. In addition, there may be a keyboard 23 that is used by the operator to manually input information to apparatus 10.
  • In some [0036] applications apparatus 10 is in a stand-alone operation, such as at a point of ingress or egress, and a bearer of a document 11 places it on apparatus 10 to be verified and granted permission to enter or depart. If document 11 is not verified a visual and/or audible indication may be provided to the bearer of a document 11 to take some action, such as reporting to some other location for verification.
  • Other apparatus may be provided as required by specific applications, such as a bar code reader, a magnetic stripe reader, iris reader, a signature capture device, gate controller, and/or a smart card reader, all of which are not shown in FIG. 1. [0037]
  • In FIG. 2 is a general block diagram showing the program steps involved in determining a document type. At [0038] block 30 it is determined if there is a document 11 on platen 12. Camera 18 and a light 16 (IR) remain on to detect the presence of a document on platen 12 by a change of the digital image output from the camera. A light 16 (visible) is energized until a first image is captured of document 11. While the presence of document 11 is not detected the program exits block 30 at NO and continuously cycles back to the input of block 30. Once something is detected on platen 12 the program exits block 30 at YES and progresses to block 31 where the first image is captured for processing to determine what type of document is on platen 12.
  • At [0039] block 32, the first picture is analyzed to locate its edges and from this the document size is determined. All documents that may be processed by apparatus 10 have a physical size and apparatus 10 determines the document size to be within one of a plurality of pre-selected size ranges, and there is a specific set of test regions and characteristics for each stored for the documents in each size range.
  • Upon determining the physical size of [0040] document 10 from the first image, the physical size range in which the document is located is identified, and apparatus 10 has thereby narrowed down the document to be one of a smaller set of documents. To further narrow the search, the presence of information at specific test regions on the document are looked for. For example, the presence of certain color patterns in specific test regions. The information found at the specific test regions on the document is used to identify the type of document. If, within the aforementioned smaller set of document types, there is only a single document type that has specific information present at a test region, and the information is actually present at the test region in the first picture, the document type is ascertained with a very high degree of confidence and there is no need to check for the presence of information at the other test regions on the document. However, if a few document types have similar information present at a specific test region, the number of possibilities of the document type has been narrowed, but the document type has not yet been ascertained. Thus, the presence of second specific information is looked for in a second test region in the first picture. If there is only a single document type that has the second specific information present at the second test region, and the information is actually detected in the second test region, the document type is ascertained with a very high degree of confidence and there is no need to check for the presence of additional information in the first picture. Only if necessary, this process may be repeated for more specific information at additional test regions on the document, but the process is terminated as soon as the document type is ascertained with a very high degree of confidence. In this manner, testing to determine a document type is kept to a minimum.
  • At block [0041] 33 a set of characteristics for the ascertained document size range are read from the master document file. At block 34, a description of the types of documents that have been ascertained of the same size as document 11 is retrieved from master document file. As apparatus 10 is operated at a specific site over time certain types of documents will be analyzed more often than others. For example, if apparatus 10 is used to check driver licenses and identity cards at a state liquor store in the State of New Hampshire, the probability is that documents inserted into the apparatus for verification will be New Hampshire driver licenses and identity cards. Accordingly, over time the apparatus will collect information that most of the time New Hampshire driver licenses and identity cards are ascertained and verified, and possibly drivers licenses more often than identity cards. Using this statistical information, after a document size range determination is made for a document, and the size range includes New Hampshire drivers licenses and identity cards, the subsequent checking for the presence of information at test regions on the document will initially look for the presence of such information that is found first on New Hampshire drivers licenses and then on identity cards. If a document is not ascertained to be one of these two types of documents, processing will continue for other types of documents in the size range. Thus, the processing time is typically shortened.
  • Using the information read in [0042] blocks 33 and 34, and following a search ordering set by the statistical information, at block 35 the information from the first test region in the first picture is analyzed to determine if the information matches the retrieved characteristics for that region. If there is no very high confidence match the program progresses to block 36 and saves the match confidence determined.
  • If there is a very high confidence match, the program progresses to block [0043] 37 where the image information in the second test region in the first picture is analyzed to determine if the information matches the retrieved set of characteristics for that test region. If there is no very high confidence match the program stores the match confidence determined at block 36. This process repeats through a number of iterations as defined by a retrieved set of document definitions. At block 38 the digital image information for the last (Nth) region in the first picture is analyzed to determine if the information matches the set of characteristics for the Nth region. If there is no very high confidence match the program again stores this determination at block 36.
  • If there is a match the program progresses to block [0044] 39 where the document type is ascertained to a very high degree of confidence using the results of the image matching. Using the ascertained document type the program progresses to block 45 and retrieves a document definition file that is used in analyzing and verifying the document as described with reference to FIG. 3.
  • At [0045] block 40 the program determines when the image matching is complete. When complete, at block 41 it is decided if any of the confidence reports from blocks 35, 37 and 38 exceed a predetermined minimum threshold. If any do, then the reference documents highest 3 (configurable number) scores are checked against document 11 using the secondary characteristics and test regions as specified in their respective document definition file. The process is the same as steps 36-40. This procedure is followed until it has either been determined that a document is a specific type to a very high degree of confidence or the operator is notified that the type is questionable.
  • If none of the confidence reports exceeds the minimum threshold this means either document [0046] 11 on platen 12 is not placed thereon in the correct orientation, the document is in too poor a condition for recognition, or the document type is not included in the master document file of apparatus 10. It is virtually impossible to mis-orient a passport, however, that will not be the usual case for the smaller ID cards. It is then determined at block 42 if the first image is not a passport-size and has already been electronically rotated one-hundred eighty degrees.
  • If the image has not been previously rotated, at [0047] block 43 the image is electronically rotated one-hundred eighty degrees and the program returns to block 35 and the analysis formed at blocks 35, 36, 37, 38, 40, 41 and 42 is repeated. If the document type still cannot be ascertained a message is displayed “Can't Identify Document Type”. If the image has not previously been rotated, as determined at block 42, it is clearly determined that the document type is not included in the database, and the program progresses to block 44 where a message is forwarded, “Can't Identify Document Type”. Thus, apparatus 10 will notify all interested parties that other action must be taken to resolve the matter.
  • If after electronically rotating the first picture, [0048] apparatus 10 can identify the document, processing of the document continues using the rotated image. Using the ascertained document type, the program progresses to block 45 and retrieves a document definition file from which inspection criteria are retrieved to be used in analyzing and verifying the document as described with reference to FIG. 3.
  • FIG. 3 is a block diagram showing the steps involved in reading and capturing data from the document, and testing to determine if a document is valid, counterfeit or has been altered. To simplify this figure the operation is described with reference to three basic types of data to be obtained from documents. The first information type is obtained from images created using ultraviolet, infrared, direct, polarized light, etc., where one or more additional images are obtained and then processed to derive data therefrom. The second information type is pictorial or graphic information on documents, such as photo, fingerprint, or seal, and is captured directly from the document image. The third information type is data read directly from an image on the document by optical character reading (OCR), intelligent character recognition (ICR), bar code interpretation, etc. In some instances data may be derived from the other images of the document, when such information becomes visible under a special light. There may be more than one type of information in each of these data types, such as OCR, ICR and bar codes being on the same document. In addition, for information not found in any of the images, there may a magnetic stripe read by a magnetic stripe reader, RF reader, ultrasonic reader or a smart card reader. Different steps shown in FIG. 3 occur in parallel so the processing time is minimized. [0049]
  • Information in a standardized format is often located in fixed machine-readable zones (“MRZ”) on a document such as established under ICAO 9303 or ISO-7501 standards. If an MRZ is detected, [0050] CPU 14 uses an optical character reading (OCR) technology to “read” the alphanumeric information in the MRZ field. By analyzing information in the MRZ field, CPU 14 is able to determine if the document is a passport, or another type of document that includes an MRZ field. Such MRZ information may include, but is not limited to, the name, birthday, sex, place of birth of the person to whom the document is issued, the date of issuance and expiration of the document, the issuing authority, issue run, and document number. This information may also be encrypted and placed in bar codes or on microchips on documents, and used as a double check against visible information to verify that a document is not a forgery and/or has not been altered. In addition, laser readable material, invisible to the human eye, may be placed on the document which is written and read like a CDROM, but is written and read in rows, and may contain data visible elsewhere on the card, or encoded fingerprints, hand-geometry, iris scans, retinal scans, and other biometric information.
  • Certain inks, such as those containing carbon black, absorb infrared light. Other inks do not absorb infrared light, but are transparent to it or reflect it. Both may appear to be the same color under normal light. [0051]
  • Printing on a document is generally in black, but MRZ items on the document will be printed with the special near-IR absorbing (B900) black ink to conform to international standards. When illuminated with a near-IR source this latter printing will appear, while all other printing disappears. [0052] CPU 14 knows where to look for the special ink printing in a digitized image made under illumination of the near-IR source from the retrieved document definition file. If the near-IR responsive images are in the specified areas, whether they are alphanumeric text or certain patterns or images, they will be identified by CPU 14 as an indication that the passport 11 in document reader 10 has not been photocopied.
  • A long wave ultraviolet (UV-A) light causes certain inks and fibers to fluoresce, so they are visible within the image captured by [0053] camera 18 using this light source. A short wave ultraviolet (UV-C) causes other special inks and fibers to fluoresce, while all other areas on the document image disappear, including those made with materials that fluoresce under UV-A. In addition, alphanumeric characters and symbols may be printed on passport 11 or other documents with inks that are not visible to the human eye, but which appear when illuminated with a UV light source. These symbols may be printed on the portion of the passport that is laminated, or may be imprinted in or on the laminating material. From the retrieved document definition file CPU 14 knows where to look in a digitized picture captured from a document for the symbols that are visible when illuminated under a UV light source.
  • Document definition files include document layout (location of different types of information and pictures on a document), security features (such as information visible with ultraviolet, infrared, direct blue, and polarized light) and intrinsic characteristics (documetric) specific to the process or materials used to manufacture the document. Using retrieved document definitions, only selected ones of the UV, IR and other images are captured, and only specific regions in the images will be analyzed. In addition, images are obtained using infrared, ultraviolet or other wavelengths of light; or polarized, coaxial, or light incident at specific angles at resolutions adapted to provide the best analysis for the type of data being read. These additional images are processed to obtain further data on the document, for checking the authenticity of the document, and for determining if the document has been altered or is a counterfeit. [0054]
  • The reason that all possible images of a document are not captured sequentially is that all documents do not include features that require obtaining images using all of the combinations of excitation sources or camera resolutions available. In this way only required images are obtained and the document processing time is minimized. [0055]
  • In FIG. 3, at [0056] block 51, first data is captured by taking an ultraviolet, infrared, polarized etc. picture of document 11 as established by the document definition file for that document type. Assume that at block 51 an ultraviolet image is obtained first. At block 53 first data information made visible by the ultraviolet light is read and stored. Merely seeing if it is visible at specific locations on the document, or if the information made visible may be read using another technology such as optical character reading, barcode reading, or image recognition may check the information. At block 54 the information obtained using the ultraviolet picture, as described in the previous sentence, is compared to reference information from the document definition file. At block 55 the weighted results of the comparison are saved.
  • At block [0057] 56 a decision is made if the result of the comparison of the information obtained using the ultraviolet image and the reference information from the document definition file indicates the confidence level that there is a match or, conversely, indicates the possibility that the document is a counterfeit or has been altered.
  • At the same time that the ultraviolet picture is being read and analyzed, a decision is made at [0058] block 52 if there are more first data pictures to be obtained and analyzed. If there are more first data pictures to be obtained the program branches back to the input of block 51 to again capture a first data picture, such as an infrared picture to be used, for example, to check for the use of certain carbon based inks on the document, or for alterations to the document. At block 53 information made visible by the infrared light is read and saved. Merely seeing if information is visible at specific locations on the document, or if the information made visible may be read using another technology such as optical character reading, and barcode reading may check the information. At block 54 the information obtained using the infrared picture is compared to standard reference information from the document definition file. At block 55 the weighted results of the comparison are saved.
  • When the coaxial light sources are used in the detection and verification of retro-reflective materials contained in documents the use of an image, if any, in the retro-reflective material may be viewed, and the image, if any, may be compared to a reference image from a document definition file that is retrieved from storage, either locally or remotely. One example of such retro-reflective materials is 3M's Confirm material that is described in more detail in the following paragraphs. [0059]
  • When 3M's Confirm laminate is illuminated with coaxial IR light the image captured is a continuous gray and an embedded logo does not appear. It looks like a clean, gray slate. The continuous gray is easily detected as an indication of the presence of the Confirm material. Any alterations to and tampering with the Confirm laminate appear as black marks on the gray background and are easily detected. Further, at increased power levels, the light is reflected from the bottom surface of the laminate or the surface of the document which is laminated in a manner that reveals the use of unauthorized laminates, and alterations to the laminate. In addition, when viewing the Confirm material, IR coaxial illumination is not affected by normal scuff marks and scratches, fingerprints and dirt on the surface of the laminate. [0060]
  • A direct blue light source generated by an array of blue LEDs is specifically used to verify that 3M's retro-reflective Confirms® material is used as the laminate, and has not been tampered with. Under this blue light a white logo is seen against a gray background. This is easily detected by analysis of the image produced, and can be read using optical character reading. Such logos are combinations of words and graphics that are distinctive to the country or issuer of the passport or other type of document and are compared to words and graphics in the document definition file for the document. The logo is invisible to the naked eye. Any attempts to forge the 3M laminate, or to use another laminate, are obvious. [0061]
  • At the same time that the image is being read and analyzed, using the document definition file a decision is made at [0062] block 52 if there are more first data pictures to be obtained and analyzed. If there are no more first data pictures to be captured the program branches from block 52 to block 58 were it is determined if there are any second data type pictures to be captured. If there are none, the program branches directly to the input of block 62. When there are second data type pictures to be captured, per the document definition file, the program advances to block 59 and a photo or other pictorial information on the document at a specifically defined location is taken from the first picture and, at block 60, is stored. Typically, it will be a photograph on the document that is captured and saved for other purposes such as comparison with the bearer of the document by an attendant or by a computer using an image of the bearer's finger/or information in a database using facial recognition technology.
  • At the same time a photograph image or other pictorial information is being stored at [0063] block 60, using the document definition file a determination is being made at block 61 if there is another second data type picture to be captured, such as some graphic located on the first image of the document. If there is, the program cycles back to the input of block 59 to image the graphic at its specifically defined location. At block 60 the graphic is stored.
  • In the event that there are no additional second data type pictures to be captured, the program progresses to the input of [0064] block 62 where, using the document definition file, it is determined if there are any Nth data type information to be captured from the first picture, such as the OCR of characters or reading a bar-code data, as indicated by the document definition file. When the decision made is that there are no Nth data type information to be saved, the program branches from block 62. Upon the decision being made at block 62 that there is Nth data type information to be saved, the program branches to block 63 where the Nth data type information at a specified location on the document is captured from the first image. At block 64 the information is read and stored. If the information is alphanumeric text it is read using OCR and the information saved. If the information is in barcode form the barcode is decoded and the information derived therefrom is saved.
  • At the same time that a first Nth data type information is been retrieved from the first image, read and saved, at [0065] block 65 the program makes a determination using the document definition file if there are any more Nth data information to be read and saved. If there is, the program branches from block 65 back to the input of block 63 to capture and read the Nth data information. For example, the first Nth data information is alphanumeric text that is read using OCR and the second Nth data information is a bar code that is read.
  • When there is no more Nth data information to be read and saved the program exits [0066] block 65. At this time all images have been captured, all data read therefrom saved, and a decision now can be made as to the document validity based on the scoring to the degree to which the document matches the reference information in the document definition file.
  • In FIG. 4 is a block diagram showing the steps involved in further validating a document and verifying the identity of the bearer by comparing data derive from the document with data in databases, determining if the document bearer matches the biometrics on the document (typically the photograph), if the bearer is on a watch list, wanted list, or is on a prohibited entry list. At [0067] block 70 the information retrieved from the document in FIG. 3 is used to access databases related to the type of document being verified as specified in the document definition file or established in a master control file by the organization managing the operation of the system.
  • At block [0068] 74 a determination is made if there is a match between the two sets of information. The database information being compared may be a positive or negative indication of the document validity or their identity. The results are scored and used as a part of the overall evaluation of the document and the bearer.
  • Completion of the match test between the sets of information causes the program to progress to block [0069] 75 where other databases are accessed to determine, for example, if the bearer of the document is not in the issuing authority database, or is on a watch list of any type. While not shown in FIG. 4 these other database tests might include: (1) checking if the bearer of the document is wanted for any crimes, (2) checking the document against lists of stolen documents, (3) analysis of data combinations such as arrival on departure locations, (4) checking for prohibited entry individuals, and (5) matching suspected combinations of travelers and travel patterns. If the bearer of the document is on a watch list or wanted for any crimes, the program branches to block 77 to notify the appropriate authorities.
  • In FIG. 5 is shown a block diagram of the steps involved in comparing biometric data on a document with that received directly from the document bearer. The purpose for this comparisons is to validate the bearer of the document and to check against biometric “watch lists”. To implement this comparison a camera, a fingerprint scanner, and/or an iris scanner, microphone, or signature capture device must be located with [0070] apparatus 10. A decision is made at block 81 whether or not there is a match. When there is a match the program progresses to block 86 to display a message that there is a biometric data match. The program then returns to its start in FIG. 1.
  • If there is no biometric data information, this determination is made at [0071] block 81. The no match determination may be due to an altered or counterfeit document, but may also be due to the fact that the biometric data on the document (such as the photo) is unusable. At block 82 a warning message is given to the operator of apparatus 10 or the appropriate authorities. In addition, the program progresses to block 83 to query the issuing authority of the document or other authority requesting that they or their appointed trust authority match the data and biometric and return the results. The biometric data from the document and/or from the bearer may be used, along with data from the document, and are forwarded to the authority that will be performing the match.
  • At [0072] block 84 the match results from the trust authority are checked to determine if there is a data match. If there is no data match, the program progresses to block 85 where an alert is given to the operator of apparatus 10 and/or the appropriate authorities. Upon it being determined at block 84 that there is a match, the program progresses to block 86 to display a message that there is a biometric data match. The program then returns to its start in FIG. 1.
  • In addition to biometric data matching, biometric information retrieved directly from the document bearer and/or from the document may be compared against a biometric “watch list”. If it is determined that the document bearer is on a biometric “watchlist”, an alert message is given to the operator of [0073] apparatus 10 and/or the appropriate authorities.
  • At this [0074] point apparatus 10 has verified both a document and the bearer of the document, and has verified that the bearer has authorization to participate in an activity represented by the document. The program running apparatus 10 returns to its start state in FIG. 2 and is ready to check another document.
  • While what has been described herein is the preferred embodiment of the invention, it will be understood by those skilled in the art that numerous changes may be made without departing from the spirit and scope of the invention.[0075]

Claims (32)

What we claim is:
1. A method for identifying and verifying documents to determine if they are genuine, counterfeit or altered, the method comprising the steps of:
determining a first characteristic of a first document to be verified, the first characteristic being common to a first group of documents that is less than all documents;
retrieving a set of second characteristics for the first group of documents, where individual documents in the first group of documents have ones of the second characteristics;
comparing characteristics found in the first document with each of the second characteristics to identify the first document;
retrieving a set of reference information unique to the first document; and
comparing characteristics found in the first document with each of the set of reference information to determine if the first document is genuine, counterfeit or altered.
2. The method in accordance with claim 1 further comprising the step of providing an indication that the first document is genuine, counterfeit or altered based upon the results of the reference information comparing step.
3. The method in accordance with claim 1 wherein the first characteristic is the size of the first document, all documents are divided into size ranges and the first group of documents are those documents within one of the size ranges, and the second characteristics are found at specific locations on individual documents of the first group of documents.
4. The method in accordance with claim 3 wherein the second characteristics include color patterns at specific locations on the documents.
5. The method in accordance with claim 1 further comprising the steps of:
keeping track of each type of document identified in the first group of documents;
selecting second characteristics for use in the second characteristic comparing step starting with second characteristics for the most commonly identified type of document in the first group of documents.
6. Apparatus for identifying and verifying documents to determine if they are genuine, counterfeit or altered, the method comprising the steps of:
means for determining a first characteristic of a first document to be verified, the first characteristic being common to a first group of documents that is less than all documents;
means for retrieving a set of second characteristics for the first group of documents, where individual documents in the first group of documents have ones of the second characteristics;
means for comparing characteristics found in the first document with each of the second characteristics to identify the first document;
means for retrieving a set of reference information unique to the first document; and
means for comparing characteristics found in the first document with each of the set of reference information to determine if the first document is genuine, counterfeit or altered.
7. The apparatus in accordance with claim 1 further comprising means for providing an indication that the first document is genuine, counterfeit or altered based upon the results from the reference information comparing means.
8. The apparatus in accordance with claim 6 wherein the first characteristic is the size of the first document, all documents are divided into size ranges and the first group of documents are those documents within one of the size ranges, and the second characteristics are found at specific locations on individual documents of the first group of documents.
9. The apparatus in accordance with claim 8 wherein the second characteristics include color patterns at specific locations on the documents.
10. The apparatus in accordance with claim 6 further comprising:
means for keeping track of each type of document identified in the first group of documents;
means for selecting second characteristics for use by the second characteristic comparing means starting with second characteristics for the most commonly identified type of document in the first group of documents.
11. A method for identifying and verifying documents to determine if they are genuine, counterfeit or altered, the method comprising the steps of:
determining the size of a first document to be verified, the size being common to a first group of documents that is less than all documents;
retrieving a set of first characteristics for the first group of documents, where individual documents in the first group of documents have ones of the first characteristics;
comparing characteristics found in the first document with each of the first characteristics to identify the first document;
retrieving a set of reference information for the first document based upon the identity of the first document; and
comparing characteristics found in the first document with each of the set of reference information to determine if the first document is genuine, counterfeit or altered.
12. The method in accordance with claim 11 further comprising the steps of:
keeping track of each type of document identified in the first group of documents; and
selecting first characteristics for use in the first characteristic comparing step starting with first characteristics for the most commonly identified type of document in the first group of documents.
13. The method in accordance with claim 12 further comprising the step of providing an indication that the first document is genuine, counterfeit or altered based upon the results of the third characteristics comparing step.
14. The method in accordance with claim 13 wherein the second characteristics include color patterns at specific locations on the documents.
15. Apparatus for identifying and verifying documents to determine if they are genuine, counterfeit or altered, the apparatus comprising:
means for determining the size of a first document to be verified, the size being common to a first group of documents that is less than all documents;
means for retrieving a set of first characteristics for the first group of documents, where individual documents in the first group of documents have ones of the first characteristics;
means for comparing characteristics found in the first document with each of the first characteristics to identify the first document;
means for retrieving a set of reference information for the first document based upon the identity of the first document; and
means for comparing characteristics found in the first document with each of the set of reference information to determine if the first document is genuine, counterfeit or altered.
16. The apparatus in accordance with claim 15 further comprising:
means for keeping track of each type of document identified in the first group of documents; and
means for selecting first characteristics for use by the first characteristic comparing means starting with first characteristics for the most commonly identified type of document in the first group of documents;
17. The apparatus in accordance with claim 16 further comprising means for providing an indication that the first document is genuine, counterfeit or altered based upon the results of the third characteristics comparing means.
18. The apparatus in accordance with claim 17 wherein the second characteristics include color at specific locations on the documents.
19. A method for identifying and verifying documents to determine if they are genuine, counterfeit or altered, the method comprising the steps of:
determining a first characteristic of a first document to be verified, the first characteristic being common to a first group of documents that is less than all documents;
retrieving a set of second characteristics for the first group of documents, where individual documents in the first group of documents have ones of the second characteristics;
comparing characteristics found in the first document with each of the second characteristics to identify the first document;
keeping track of each type of document identified in the first group of documents;
selecting first characteristics for use in the first characteristic comparing step starting with first characteristics for the most commonly identified type of document in the first group of documents;
retrieving a set of reference information for the first document based upon the identity of the first document; and
comparing characteristics found in the first document with each of the reference information to determine if the first document is genuine, counterfeit or altered.
20. The method in accordance with claim 19 further comprising the step of providing an indication that the first document is genuine, counterfeit or altered based upon the results of the third characteristics comparing step.
21. The method in accordance with claim 20 wherein the first characteristics include color patterns at specific locations on the documents.
22. Apparatus for identifying and verifying documents to determine if they are genuine, counterfeit or altered, the apparatus comprising:
means for determining a first characteristic of a first document to be verified, the first characteristic being common to a first group of documents that is less than all documents;
means for retrieving a set of second characteristics for the first group of documents, where individual documents in the first group of documents have ones of the second characteristics;
means for comparing characteristics found in the first document with each of the second characteristics to identify the first document;
means for keeping track of each type of document identified in the first group of documents;
means for selecting second characteristics for use in the second characteristic comparing step starting with second characteristics for the most commonly identified type of document in the first group of documents;
means for retrieving a set of reference information for the first document based upon the identity of the first document; and
means for comparing characteristics found in the first document with each of the set of reference information to determine if the first document is genuine, counterfeit or altered.
23. The apparatus in accordance with claim 22 further comprising means for providing an indication that the first document is genuine, counterfeit or altered based upon the results of the reference information comparing means.
24. The apparatus in accordance with claim 23 wherein the first characteristics include color at specific locations on the documents.
25. A method for identifying and verifying documents to determine if they are genuine, counterfeit or altered, the method comprising the steps of:
determining the size of a first document to be verified, the size being common to a first group of documents that is less than all documents;
retrieving a set of first characteristics for the first group of documents, where individual documents in the first group of documents have ones of the first characteristics;
comparing characteristics found in the first document with each of the first characteristics to identify the first document;
keeping track of each type of document identified in the first group of documents;
selecting first characteristics for use in the first characteristic comparing step starting with first characteristics for the most commonly identified type of document in the first group of documents;
retrieving a set of reference information unique to the first document based upon the identity of the first document; and
comparing characteristics found in the first document with each of the reference information to determine if the first document is genuine, counterfeit or altered.
26. The method in accordance with claim 25 further comprising the step of providing an indication that the first document is genuine, counterfeit or altered based upon the results of the reference information comparing means.
27. The method in accordance with claim 26 wherein the first characteristics include color at specific locations on the documents.
28. Apparatus for identifying and verifying documents to determine if they are genuine, counterfeit or altered, the apparatus comprising:
means for determining the size of a first document to be verified, the size being common to a first group of documents that is less than all documents;
means for retrieving a set of first characteristics for the first group of documents, where individual documents in the first group of documents have ones of the first characteristics;
means for comparing characteristics found in the first document with each of the first characteristics to identify the first document;
means for keeping track of each type of document identified in the first group of documents;
means for selecting first characteristics for use by the first characteristic comparing means starting with first characteristics for the most commonly identified type of document in the first group of documents;
means for retrieving a set of reference information unique to the first document based upon the identity of the first document; and
means for comparing characteristics found in the first document with each of the reference information to determine if the first document is genuine, counterfeit or altered.
29. The apparatus in accordance with claim 28 further comprising means for providing an indication that the first document is genuine, counterfeit or altered based upon the results of the reference information comparing means.
30. The apparatus in accordance with claim 29 wherein the first characteristics include color at specific locations on the documents.
31. A computer readable medium containing executable instructions for identifying and verifying documents to determine if they are genuine, counterfeit or altered, the executable program instructions comprising program instructions for:
determining a first characteristic of a first document to be verified, the first characteristic being common to a first group of documents that is less than all documents;
retrieving a set of second characteristics for the first group of documents, where individual documents in the first group of documents have ones of the second characteristics;
comparing characteristics found in the first document with each of the second characteristics to identify the first document;
retrieving a set of reference information unique to the first document; and
comparing characteristics found in the first document with each of the reference information to determine if the first document is genuine, counterfeit or altered.
32. A computer readable medium containing executable instructions for identifying and verifying documents to determine if they are genuine, counterfeit or altered, the executable program instructions comprising program instructions for:
determining the size of a first document to be verified, the size being common to a first group of documents that is less than all documents;
retrieving a set of first characteristics for the first group of documents, where individual documents in the first group of documents have ones of the first characteristics;
comparing characteristics found in the first document with each of the first characteristics to identify the first document;
keeping track of each type of document identified in the first group of documents;
selecting first characteristics for use in the first characteristic comparing step starting with first characteristics for the most commonly identified type of document in the first group of documents;
retrieving a set of reference information unique to the first document based upon the identity of the first document; and
comparing characteristics found in the first document with each of the second characteristics to determine if the first document is genuine, counterfeit or altered.
US09/994,399 2001-11-26 2001-11-26 Validation and verification apparatus and method Abandoned US20030099379A1 (en)

Priority Applications (8)

Application Number Priority Date Filing Date Title
US09/994,399 US20030099379A1 (en) 2001-11-26 2001-11-26 Validation and verification apparatus and method
US10/487,824 US20040239732A1 (en) 2001-11-26 2002-08-06 Ink supply arrangement for a printer
PCT/US2002/037740 WO2003046815A1 (en) 2001-11-26 2002-11-25 Validation and verification apparatus and method
CA2467861A CA2467861C (en) 2001-11-26 2002-11-25 Validation and verification apparatus and method
CNB028234375A CN1295642C (en) 2001-11-26 2002-11-25 Validation and verification apparatus and method
EP02804055A EP1449155A4 (en) 2001-11-26 2002-11-25 Validation and verification apparatus and method
AU2002365578A AU2002365578A1 (en) 2001-11-26 2002-11-25 Validation and verification apparatus and method
US11/156,885 US7110573B2 (en) 2001-11-26 2005-06-20 Validation and verification apparatus and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US09/994,399 US20030099379A1 (en) 2001-11-26 2001-11-26 Validation and verification apparatus and method

Related Child Applications (2)

Application Number Title Priority Date Filing Date
US10/487,824 Continuation US20040239732A1 (en) 2001-11-26 2002-08-06 Ink supply arrangement for a printer
US11/156,885 Continuation US7110573B2 (en) 2001-11-26 2005-06-20 Validation and verification apparatus and method

Publications (1)

Publication Number Publication Date
US20030099379A1 true US20030099379A1 (en) 2003-05-29

Family

ID=25540631

Family Applications (3)

Application Number Title Priority Date Filing Date
US09/994,399 Abandoned US20030099379A1 (en) 2001-11-26 2001-11-26 Validation and verification apparatus and method
US10/487,824 Abandoned US20040239732A1 (en) 2001-11-26 2002-08-06 Ink supply arrangement for a printer
US11/156,885 Expired - Lifetime US7110573B2 (en) 2001-11-26 2005-06-20 Validation and verification apparatus and method

Family Applications After (2)

Application Number Title Priority Date Filing Date
US10/487,824 Abandoned US20040239732A1 (en) 2001-11-26 2002-08-06 Ink supply arrangement for a printer
US11/156,885 Expired - Lifetime US7110573B2 (en) 2001-11-26 2005-06-20 Validation and verification apparatus and method

Country Status (6)

Country Link
US (3) US20030099379A1 (en)
EP (1) EP1449155A4 (en)
CN (1) CN1295642C (en)
AU (1) AU2002365578A1 (en)
CA (1) CA2467861C (en)
WO (1) WO2003046815A1 (en)

Cited By (108)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030009420A1 (en) * 2001-07-05 2003-01-09 Jones John E. Automated payment system and method
US20030139994A1 (en) * 2002-01-22 2003-07-24 Jones John E. Financial institution system
US20030161509A1 (en) * 2002-02-22 2003-08-28 Kendall Wesley Eugene Card one
US20030212904A1 (en) * 2000-05-25 2003-11-13 Randle William M. Standardized transmission and exchange of data with security and non-repudiation functions
US20040133582A1 (en) * 2002-10-11 2004-07-08 Howard James V. Systems and methods for recognition of individuals using multiple biometric searches
US20040153408A1 (en) * 2002-09-25 2004-08-05 Jones John E. Financial document processing system
US20040213437A1 (en) * 2002-11-26 2004-10-28 Howard James V Systems and methods for managing and detecting fraud in image databases used with identification documents
US20050116025A1 (en) * 2003-10-17 2005-06-02 Davis Bruce L. Fraud prevention in issuance of identification credentials
US20050169511A1 (en) * 2004-01-30 2005-08-04 Cummins-Allison Corp. Document processing system using primary and secondary pictorial image comparison
WO2005096962A2 (en) * 2004-03-26 2005-10-20 Assuretec Systems Inc. Real time privilege management
US20050273627A1 (en) * 2004-05-18 2005-12-08 Davis Bruce L Biometrics in issuance of government documents
US20050274794A1 (en) * 2004-06-10 2005-12-15 Eli Bason Smart identification document
US20060010071A1 (en) * 2001-09-27 2006-01-12 Jones John E Document processing system using full image scanning
US20060015450A1 (en) * 2004-07-13 2006-01-19 Wells Fargo Bank, N.A. Financial services network and associated processes
US20060017959A1 (en) * 2004-07-06 2006-01-26 Downer Raymond J Document classification and authentication
US20060101327A1 (en) * 2004-11-09 2006-05-11 Frank Mandelbaum System and method for comparing documents
US20060157559A1 (en) * 2004-07-07 2006-07-20 Levy Kenneth L Systems and methods for document verification
US20060165262A1 (en) * 2005-01-24 2006-07-27 Konica Minolta Business Technologies, Inc. Apparatus, system and method for person verification
US20060165263A1 (en) * 2005-01-24 2006-07-27 Konica Minolta Business Technologies, Inc. Person verification apparatus, information processing apparatus and person verification system
US7152786B2 (en) 2002-02-12 2006-12-26 Digimarc Corporation Identification document including embedded data
US20070017990A1 (en) * 2005-07-19 2007-01-25 Fuji Xerox Co., Ltd. Document correction detection system and document tampering prevention system
US20070024422A1 (en) * 2005-07-27 2007-02-01 Arinc Incorporated Systems and methods for personnel security identification using adapted portable data storage and display devices
US20070036397A1 (en) * 2005-01-26 2007-02-15 Honeywell International Inc. A distance iris recognition
US20070076939A1 (en) * 1996-05-13 2007-04-05 Cummins-Allison Corp. Automated document processing system using full image scanning
US20070084912A1 (en) * 2003-10-17 2007-04-19 Davis Bruce L Fraud deterrence in connection with identity documents
FR2892552A1 (en) * 2005-10-24 2007-04-27 Itesoft Sa Organization and user e.g. customer, interaction device e.g. computer, has image processing unit extracting functional parameters of images and transmitting searched additional information to information request unit
WO2007060303A1 (en) * 2005-10-24 2007-05-31 Itesoft S.A. Device and method for interaction with a user
US20070162761A1 (en) * 2005-12-23 2007-07-12 Davis Bruce L Methods and Systems to Help Detect Identity Fraud
US20070260886A1 (en) * 2006-05-02 2007-11-08 Labcal Technologies Inc. Biometric authentication device having machine-readable-zone (MRZ) reading functionality and method for implementing same
US20070258633A1 (en) * 1996-11-27 2007-11-08 Cummins-Allison Corp. Automated document processing system using full image scanning
US20080298647A1 (en) * 2005-04-08 2008-12-04 Us Biometrics Corporation System and Method for Identifying an Enrolled User Utilizing a Biometric Identifier
US20090036783A1 (en) * 2007-07-30 2009-02-05 Sony Corporation Biometric image pickup apparatus
US20100013820A1 (en) * 2008-07-21 2010-01-21 Suk-Jae Park Method of driving plasma display panel and plasma display apparatus using the method
US7661600B2 (en) 2001-12-24 2010-02-16 L-1 Identify Solutions Laser etched security features for identification documents and methods of making same
US20100060881A1 (en) * 2008-09-11 2010-03-11 Non Linear Concepts, Inc. Ultrasonic Detection System and Method for the Detection of Transparent Window Security Features in Bank Notes
US7694887B2 (en) 2001-12-24 2010-04-13 L-1 Secure Credentialing, Inc. Optically variable personalized indicia for identification documents
US7744001B2 (en) 2001-12-18 2010-06-29 L-1 Secure Credentialing, Inc. Multiple image security features for identification documents and methods of making same
US7761453B2 (en) 2005-01-26 2010-07-20 Honeywell International Inc. Method and system for indexing and searching an iris image database
US7789311B2 (en) 2003-04-16 2010-09-07 L-1 Secure Credentialing, Inc. Three dimensional data storage
US7798413B2 (en) 2001-12-24 2010-09-21 L-1 Secure Credentialing, Inc. Covert variable information on ID documents and methods of making same
US7815124B2 (en) 2002-04-09 2010-10-19 L-1 Secure Credentialing, Inc. Image processing techniques for printing identification cards and documents
US7824029B2 (en) 2002-05-10 2010-11-02 L-1 Secure Credentialing, Inc. Identification card printer-assembler for over the counter card issuing
US7903863B2 (en) 2001-09-27 2011-03-08 Cummins-Allison Corp. Currency bill tracking system
US7933507B2 (en) 2006-03-03 2011-04-26 Honeywell International Inc. Single lens splitter camera
US8045764B2 (en) 2005-01-26 2011-10-25 Honeywell International Inc. Expedient encoding system
US8050463B2 (en) 2005-01-26 2011-11-01 Honeywell International Inc. Iris recognition system having image quality metrics
US8049812B2 (en) 2006-03-03 2011-11-01 Honeywell International Inc. Camera with auto focus capability
US8064647B2 (en) 2006-03-03 2011-11-22 Honeywell International Inc. System for iris detection tracking and recognition at a distance
US8063889B2 (en) 2007-04-25 2011-11-22 Honeywell International Inc. Biometric data collection system
US8085993B2 (en) 2006-03-03 2011-12-27 Honeywell International Inc. Modular biometrics collection system architecture
US8090246B2 (en) 2008-08-08 2012-01-03 Honeywell International Inc. Image acquisition system
US8090157B2 (en) 2005-01-26 2012-01-03 Honeywell International Inc. Approaches and apparatus for eye detection in a digital image
US8098901B2 (en) 2005-01-26 2012-01-17 Honeywell International Inc. Standoff iris recognition system
US20120056714A1 (en) * 2010-09-03 2012-03-08 Honeywell International Inc. Biometric visitor check system
US8162125B1 (en) 1996-05-29 2012-04-24 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US20120123821A1 (en) * 2010-11-16 2012-05-17 Raytheon Company System and Method for Risk Assessment of an Asserted Identity
US8204293B2 (en) 2007-03-09 2012-06-19 Cummins-Allison Corp. Document imaging and processing system
US8213782B2 (en) 2008-08-07 2012-07-03 Honeywell International Inc. Predictive autofocusing system
US20120235785A1 (en) * 2011-03-17 2012-09-20 Motorola Mobility, Inc. Wireless communication device and method with intelligent authentication
US8280119B2 (en) 2008-12-05 2012-10-02 Honeywell International Inc. Iris recognition system using quality metrics
US8391583B1 (en) 2009-04-15 2013-03-05 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8417017B1 (en) 2007-03-09 2013-04-09 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8428332B1 (en) 2001-09-27 2013-04-23 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8433123B1 (en) 2001-09-27 2013-04-30 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8437530B1 (en) 2001-09-27 2013-05-07 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8437528B1 (en) 2009-04-15 2013-05-07 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8436907B2 (en) 2008-05-09 2013-05-07 Honeywell International Inc. Heterogeneous video capturing system
US8437529B1 (en) 2001-09-27 2013-05-07 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8442276B2 (en) 2006-03-03 2013-05-14 Honeywell International Inc. Invariant radial iris segmentation
US8459436B2 (en) 2008-10-29 2013-06-11 Cummins-Allison Corp. System and method for processing currency bills and tickets
US8472681B2 (en) 2009-06-15 2013-06-25 Honeywell International Inc. Iris and ocular recognition system using trace transforms
US8478020B1 (en) 1996-11-27 2013-07-02 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8538123B1 (en) 2007-03-09 2013-09-17 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US20130287284A1 (en) * 2008-01-18 2013-10-31 Mitek Systems Systems and methods for classifying payment documents during mobile image processing
US8627939B1 (en) 2002-09-25 2014-01-14 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8630464B2 (en) 2009-06-15 2014-01-14 Honeywell International Inc. Adaptive iris matching using database indexing
EP2674923A3 (en) * 2012-06-15 2014-01-29 NCR Corporation Item validation
US8705808B2 (en) 2003-09-05 2014-04-22 Honeywell International Inc. Combined face and iris recognition system
US20140153837A1 (en) * 2011-02-18 2014-06-05 Google Inc. Automatic event recognition and cross-user photo clustering
US20140279516A1 (en) * 2013-03-14 2014-09-18 Nicholas Rellas Authenticating a physical device
US20140355073A1 (en) * 2013-06-03 2014-12-04 Kodak Alaris Inc. Classification of scanned hardcopy media
US8929640B1 (en) 2009-04-15 2015-01-06 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US20150029550A1 (en) * 2013-07-23 2015-01-29 Brother Kogyo Kabushiki Kaisha Information processing device and controlling method thereof
US8944234B1 (en) 2001-09-27 2015-02-03 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US9141876B1 (en) 2013-02-22 2015-09-22 Cummins-Allison Corp. Apparatus and system for processing currency bills and financial documents and method for using the same
US20150367551A1 (en) * 2014-06-20 2015-12-24 Nomacorc Llc Multi-component synthetic closure and method of manufacture thereof
US9348673B2 (en) 2013-12-17 2016-05-24 Brother Kogyo Kabushiki Kaisha Information processing device and control method of sharing image data to plural applications
GB2533908A (en) * 2014-10-20 2016-07-13 Idscan Biometrics Ltd Method, system and computer program for enhanced identity document validation
US9436810B2 (en) 2006-08-29 2016-09-06 Attributor Corporation Determination of copied content, including attribution
US9818249B1 (en) 2002-09-04 2017-11-14 Copilot Ventures Fund Iii Llc Authentication method and system
WO2017207064A1 (en) * 2016-06-03 2017-12-07 Veridas Digital Authentication Solutions, S.L. A method for authenticating a document
US9894238B2 (en) 2011-03-25 2018-02-13 Brother Kogyo Kabushiki Kaisha Computer readable recording medium, information processing apparatus, and information processing method
US10115118B2 (en) 2012-10-23 2018-10-30 Google Llc Obtaining event reviews
WO2019074366A1 (en) 2017-10-10 2019-04-18 Morpho B.V. Authentication of a person using a virtual identity card
US10270824B2 (en) 2012-06-27 2019-04-23 Google Llc System and method for event content stream
US10297100B1 (en) 2002-05-17 2019-05-21 Intellicheck Mobilisa, Inc. Identification verification system
US10373409B2 (en) 2014-10-31 2019-08-06 Intellicheck, Inc. Identification scan in compliance with jurisdictional or other rules
US10452908B1 (en) * 2016-12-23 2019-10-22 Wells Fargo Bank, N.A. Document fraud detection
EP3572972A1 (en) * 2018-05-23 2019-11-27 IDEMIA Identity & Security Germany AG Extendend convolutional neural network for document analysis
US10909362B2 (en) 2008-01-18 2021-02-02 Mitek Systems, Inc. Systems and methods for developing and verifying image processing standards for mobile deposit
EP3772013A1 (en) * 2019-07-29 2021-02-03 TripEye Limited Identity document validation method, system and computer program
US11048969B2 (en) * 2017-11-21 2021-06-29 Biome Inc. Identification device, identification method, identification system, and database
US20210203812A1 (en) * 2019-12-27 2021-07-01 Regula Ltd. Portable hardware-software complex for pattern and fingerprint recognition
US11157731B2 (en) 2013-03-15 2021-10-26 Mitek Systems, Inc. Systems and methods for assessing standards for mobile image quality
US11321774B2 (en) 2018-01-30 2022-05-03 Pointpredictive, Inc. Risk-based machine learning classifier
US11392679B2 (en) * 2019-05-07 2022-07-19 Advanced New Technologies Co., Ltd. Certificate verification
US11722615B2 (en) * 2021-04-28 2023-08-08 Pfu Limited Image processing including adjusting image orientation
US11853707B1 (en) * 2016-12-26 2023-12-26 Cerner Innovation, Inc. Determining adequacy of documentation using perplexity and probabilistic coherence

Families Citing this family (59)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004001680A1 (en) * 2002-06-20 2003-12-31 Wayfare Identifiers Inc. Biometric document authentication system
JP4334911B2 (en) * 2003-05-28 2009-09-30 ローレル精機株式会社 Banknote image detection device
JP4334910B2 (en) * 2003-05-28 2009-09-30 ローレル精機株式会社 Banknote image detection device
US7783563B2 (en) * 2003-12-09 2010-08-24 First Data Corporation Systems and methods for identifying payor location based on transaction data
US20050125360A1 (en) * 2003-12-09 2005-06-09 Tidwell Lisa C. Systems and methods for obtaining authentication marks at a point of sale
US7398925B2 (en) * 2003-12-09 2008-07-15 First Data Corporation Systems and methods for assessing the risk of a financial transaction using biometric information
US20050125295A1 (en) * 2003-12-09 2005-06-09 Tidwell Lisa C. Systems and methods for obtaining payor information at a point of sale
US7287689B2 (en) * 2003-12-09 2007-10-30 First Data Corporation Systems and methods for assessing the risk of a financial transaction using authenticating marks
US20050125338A1 (en) * 2003-12-09 2005-06-09 Tidwell Lisa C. Systems and methods for assessing the risk of a financial transaction using reconciliation information
US20050125296A1 (en) * 2003-12-09 2005-06-09 Tidwell Lisa C. Systems and methods for obtaining biometric information at a point of sale
EP2081130B1 (en) 2004-03-12 2013-07-24 Ingenia Holdings Limited Methods and apparatuses for creating authenticatable printed articles and subsequently verifying them
EP2128790A3 (en) 2004-03-12 2011-01-26 Ingenia Technology Limited Authenticity verification with linearised data
GB2444139B (en) * 2004-08-13 2008-11-12 Ingenia Technology Ltd Authenticity verification methods products and apparatuses
US7293853B2 (en) * 2004-12-06 2007-11-13 Silverbrook Research Pty Ltd Inkjet printer with simplex printhead and capping mechanism
US7258416B2 (en) * 2004-12-06 2007-08-21 Silverbrook Research Pty Ltd Inkjet printer with pivotal capping member
US7328968B2 (en) * 2004-12-06 2008-02-12 Silverbrook Research Pty Ltd Inkjet printer with simplex printhead and capping/purging mechanism
US20060228025A1 (en) * 2005-04-06 2006-10-12 Top Digital Co., Ltd. Portable electronic device having a pattern identification system
US20070140551A1 (en) * 2005-12-16 2007-06-21 Chao He Banknote validation
WO2007072044A1 (en) * 2005-12-23 2007-06-28 Ingenia Holdings (Uk) Limited Optical authentication
CN100442788C (en) * 2005-12-31 2008-12-10 华为技术有限公司 Method and system for realizing information repeat
US20080022414A1 (en) 2006-03-31 2008-01-24 Robert Cahn System and method of providing unique personal identifiers for use in the anonymous and secure exchange of data
JP2008102633A (en) * 2006-10-17 2008-05-01 Sharp Corp Image forming apparatus, user authentication system, control program for operating image forming apparatus, and computer-readable recording medium
US8503796B2 (en) 2006-12-29 2013-08-06 Ncr Corporation Method of validating a media item
US7826464B2 (en) * 2007-01-10 2010-11-02 Mikhail Fedorov Communication system
US8296662B2 (en) * 2007-02-05 2012-10-23 Brother Kogyo Kabushiki Kaisha Image display device
US9531544B2 (en) * 2007-05-31 2016-12-27 Red Hat, Inc. Two-dimensional bar code for ID card
US8893241B2 (en) 2007-06-01 2014-11-18 Albright Associates Systems and methods for universal enhanced log-in, identity document verification and dedicated survey participation
US8959584B2 (en) 2007-06-01 2015-02-17 Albright Associates Systems and methods for universal enhanced log-in, identity document verification and dedicated survey participation
JP5314007B2 (en) * 2007-06-01 2013-10-16 カーベーアー−ノタシ ソシエテ アノニム Authentication of security documents, especially banknotes
US9398022B2 (en) 2007-06-01 2016-07-19 Teresa C. Piliouras Systems and methods for universal enhanced log-in, identity document verification, and dedicated survey participation
US8056118B2 (en) 2007-06-01 2011-11-08 Piliouras Teresa C Systems and methods for universal enhanced log-in, identity document verification, and dedicated survey participation
US20090150442A1 (en) * 2007-08-22 2009-06-11 Ryan Barnard Aggregation of persons-of-interest information for use in an identification system
US8322605B2 (en) 2007-08-22 2012-12-04 Intellicheck Mobilisa, Inc. Dynamic identity matching in response to threat levels
EP2203865A2 (en) * 2007-09-24 2010-07-07 Apple Inc. Embedded authentication systems in an electronic device
US20110221565A1 (en) * 2007-11-05 2011-09-15 Nelson Ludlow Dynamic access control in response to flexible rules
US8600120B2 (en) 2008-01-03 2013-12-03 Apple Inc. Personal computing device control using face detection and recognition
US7884734B2 (en) * 2008-01-31 2011-02-08 Microsoft Corporation Unique identification of devices using color detection
GB2462059A (en) * 2008-07-11 2010-01-27 Ingenia Holdings Authentication scanner
GB2466465B (en) 2008-12-19 2011-02-16 Ingenia Holdings Authentication
GB2466311B (en) 2008-12-19 2010-11-03 Ingenia Holdings Self-calibration of a matching algorithm for determining authenticity
DE102009007588A1 (en) 2009-02-05 2010-08-19 Bundesdruckerei Gmbh Method and apparatus for verifying documents using a wavelet transform
US20100253782A1 (en) * 2009-04-07 2010-10-07 Latent Image Technology Ltd. Device and method for automated verification of polarization-variant images
IL202028A (en) 2009-11-10 2016-06-30 Icts Holding Company Ltd Product, apparatus and methods for computerized authentication of electronic documents
WO2011058554A1 (en) * 2009-11-10 2011-05-19 Au10Tix Limited Computerized integrated authentication/ document bearer verification system and methods useful in conjunction therewith
GB2476226B (en) 2009-11-10 2012-03-28 Ingenia Holdings Ltd Optimisation
US10387564B2 (en) * 2010-11-12 2019-08-20 International Business Machines Corporation Automatically assessing document quality for domain-specific documentation
US9002322B2 (en) 2011-09-29 2015-04-07 Apple Inc. Authentication with secondary approver
US8794515B2 (en) 2011-11-07 2014-08-05 Jeremy Krell Alcohol delivery management system
CN102789658B (en) * 2012-03-02 2015-02-18 成都三泰电子实业股份有限公司 Ultraviolet anti-counterfeiting check authenticity verification method
RU2510965C1 (en) * 2012-10-08 2014-04-10 Общество с ограниченной ответственностью "ВИЛДИС" Forensic expert video system
US9898642B2 (en) 2013-09-09 2018-02-20 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs
GB201406594D0 (en) 2014-04-11 2014-05-28 Idscan Biometric Ltd Method, system and computer program for validating a facial image-bearing identity document
US10482461B2 (en) 2014-05-29 2019-11-19 Apple Inc. User interface for payments
RU2584441C1 (en) * 2015-03-30 2016-05-20 Борис Вадимович Ситников Method of determining signs of installation on copies of documents made with electrophotographic method
CA2975030A1 (en) * 2016-07-29 2018-01-29 Confirm, Inc. System and apparatus for detecting forgery features on identification documents
KR102389678B1 (en) 2017-09-09 2022-04-21 애플 인크. Implementation of biometric authentication
US11100349B2 (en) 2018-09-28 2021-08-24 Apple Inc. Audio assisted enrollment
US10860096B2 (en) 2018-09-28 2020-12-08 Apple Inc. Device control using gaze information
EP3772014A1 (en) 2019-07-29 2021-02-03 TripEye Limited Identity document validation method, system and computer program

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4519041A (en) * 1982-05-03 1985-05-21 Honeywell Inc. Real time automated inspection
US5933526A (en) * 1986-07-25 1999-08-03 Ast Research, Inc. Handwritten keyboardless entry computer system
US6697516B1 (en) * 1997-03-28 2004-02-24 Sollac Method for inspecting the surface of a moving strip by prior classification of the detected surface irregularity

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4883219A (en) * 1988-09-01 1989-11-28 Anderson Jeffrey J Manufacture of ink jet print heads by diffusion bonding and brazing
US5992601A (en) * 1996-02-15 1999-11-30 Cummins-Allison Corp. Method and apparatus for document identification and authentication
US5155498A (en) * 1990-07-16 1992-10-13 Tektronix, Inc. Method of operating an ink jet to reduce print quality degradation resulting from rectified diffusion
DE4214555C2 (en) * 1992-04-28 1996-04-25 Eastman Kodak Co Electrothermal ink print head
US5618183A (en) * 1994-10-24 1997-04-08 Honeywell Inc. Dither motor connector for a self contained laser gyro
US5870124A (en) * 1995-04-12 1999-02-09 Eastman Kodak Company Pressurizable liquid ink cartridge for coincident forces printers
US5963234A (en) * 1995-08-23 1999-10-05 Seiko Epson Corporation Laminated ink jet recording head having flow path unit with recess that confronts but does not communicate with common ink chamber
DE19651050C1 (en) * 1996-12-09 1998-03-26 Francotyp Postalia Gmbh Ink-feed to printing head
US5871158A (en) * 1997-01-27 1999-02-16 The University Of Utah Research Foundation Methods for preparing devices having metallic hollow microchannels on planar substrate surfaces
EP0981806A4 (en) * 1997-05-07 2001-01-03 Cummins Allison Corp Intelligent currency handling system
US6234608B1 (en) * 1997-06-05 2001-05-22 Xerox Corporation Magnetically actuated ink jet printing device
US6181813B1 (en) * 1997-09-29 2001-01-30 Xerox Corporation Method for counterfeit currency detection using orthogonal line comparison
US6250738B1 (en) * 1997-10-28 2001-06-26 Hewlett-Packard Company Inkjet printing apparatus with ink manifold
US6269169B1 (en) * 1998-07-17 2001-07-31 Imaging Automation, Inc. Secure document reader and method therefor
US6281912B1 (en) * 2000-05-23 2001-08-28 Silverbrook Research Pty Ltd Air supply arrangement for a printer

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4519041A (en) * 1982-05-03 1985-05-21 Honeywell Inc. Real time automated inspection
US5933526A (en) * 1986-07-25 1999-08-03 Ast Research, Inc. Handwritten keyboardless entry computer system
US6697516B1 (en) * 1997-03-28 2004-02-24 Sollac Method for inspecting the surface of a moving strip by prior classification of the detected surface irregularity

Cited By (227)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070076939A1 (en) * 1996-05-13 2007-04-05 Cummins-Allison Corp. Automated document processing system using full image scanning
US20070172107A1 (en) * 1996-05-13 2007-07-26 Cummins-Allison Corp. Automated check processing system with check imaging and accounting
US8714336B2 (en) 1996-05-29 2014-05-06 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8162125B1 (en) 1996-05-29 2012-04-24 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US9390574B2 (en) 1996-11-27 2016-07-12 Cummins-Allison Corp. Document processing system
US8478020B1 (en) 1996-11-27 2013-07-02 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8380573B2 (en) 1996-11-27 2013-02-19 Cummins-Allison Corp. Document processing system
US8125624B2 (en) 1996-11-27 2012-02-28 Cummins-Allison Corp. Automated document processing system and method
US8442296B2 (en) 1996-11-27 2013-05-14 Cummins-Allison Corp. Check and U.S. bank note processing device and method
US8339589B2 (en) 1996-11-27 2012-12-25 Cummins-Allison Corp. Check and U.S. bank note processing device and method
US20070258633A1 (en) * 1996-11-27 2007-11-08 Cummins-Allison Corp. Automated document processing system using full image scanning
US8169602B2 (en) 1996-11-27 2012-05-01 Cummins-Allison Corp. Automated document processing system and method
US8437531B2 (en) 1996-11-27 2013-05-07 Cummins-Allison Corp. Check and U.S. bank note processing device and method
US8514379B2 (en) 1996-11-27 2013-08-20 Cummins-Allison Corp. Automated document processing system and method
US8701857B2 (en) 2000-02-11 2014-04-22 Cummins-Allison Corp. System and method for processing currency bills and tickets
US9495808B2 (en) 2000-02-11 2016-11-15 Cummins-Allison Corp. System and method for processing casino tickets
US9129271B2 (en) 2000-02-11 2015-09-08 Cummins-Allison Corp. System and method for processing casino tickets
US7568222B2 (en) 2000-05-25 2009-07-28 Randle William M Standardized transmission and exchange of data with security and non-repudiation functions
US20030212904A1 (en) * 2000-05-25 2003-11-13 Randle William M. Standardized transmission and exchange of data with security and non-repudiation functions
US8126793B2 (en) 2001-07-05 2012-02-28 Cummins-Allison Corp. Automated payment system and method
US20030009420A1 (en) * 2001-07-05 2003-01-09 Jones John E. Automated payment system and method
US7647275B2 (en) 2001-07-05 2010-01-12 Cummins-Allison Corp. Automated payment system and method
US7882000B2 (en) 2001-07-05 2011-02-01 Cummins-Allison Corp. Automated payment system and method
US9142075B1 (en) 2001-09-27 2015-09-22 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8103084B2 (en) 2001-09-27 2012-01-24 Cummins-Allison Corp. Document processing system using full image scanning
US8437529B1 (en) 2001-09-27 2013-05-07 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US20060010071A1 (en) * 2001-09-27 2006-01-12 Jones John E Document processing system using full image scanning
US8639015B1 (en) 2001-09-27 2014-01-28 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8644585B1 (en) 2001-09-27 2014-02-04 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8644584B1 (en) 2001-09-27 2014-02-04 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8428332B1 (en) 2001-09-27 2013-04-23 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8655045B2 (en) 2001-09-27 2014-02-18 Cummins-Allison Corp. System and method for processing a deposit transaction
US8396278B2 (en) 2001-09-27 2013-03-12 Cummins-Allison Corp. Document processing system using full image scanning
US8041098B2 (en) 2001-09-27 2011-10-18 Cummins-Allison Corp. Document processing system using full image scanning
US7903863B2 (en) 2001-09-27 2011-03-08 Cummins-Allison Corp. Currency bill tracking system
US7881519B2 (en) 2001-09-27 2011-02-01 Cummins-Allison Corp. Document processing system using full image scanning
US8433123B1 (en) 2001-09-27 2013-04-30 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8655046B1 (en) 2001-09-27 2014-02-18 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8437530B1 (en) 2001-09-27 2013-05-07 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US20090310188A1 (en) * 2001-09-27 2009-12-17 Cummins-Allison Corp. Document Processing System Using Full Image Scanning
US8944234B1 (en) 2001-09-27 2015-02-03 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8025239B2 (en) 2001-12-18 2011-09-27 L-1 Secure Credentialing, Inc. Multiple image security features for identification documents and methods of making same
US7744001B2 (en) 2001-12-18 2010-06-29 L-1 Secure Credentialing, Inc. Multiple image security features for identification documents and methods of making same
US7694887B2 (en) 2001-12-24 2010-04-13 L-1 Secure Credentialing, Inc. Optically variable personalized indicia for identification documents
US7661600B2 (en) 2001-12-24 2010-02-16 L-1 Identify Solutions Laser etched security features for identification documents and methods of making same
US7798413B2 (en) 2001-12-24 2010-09-21 L-1 Secure Credentialing, Inc. Covert variable information on ID documents and methods of making same
US8083152B2 (en) 2001-12-24 2011-12-27 L-1 Secure Credentialing, Inc. Laser etched security features for identification documents and methods of making same
US20030139994A1 (en) * 2002-01-22 2003-07-24 Jones John E. Financial institution system
US7152786B2 (en) 2002-02-12 2006-12-26 Digimarc Corporation Identification document including embedded data
US20070170248A1 (en) * 2002-02-12 2007-07-26 Brundage Trent J Authentication Methods and Systems Including Embedded Auxiliary Data
US7806322B2 (en) 2002-02-12 2010-10-05 Digimarc Corporation Authentication methods and systems including embedded auxiliary data
US20030161509A1 (en) * 2002-02-22 2003-08-28 Kendall Wesley Eugene Card one
US7815124B2 (en) 2002-04-09 2010-10-19 L-1 Secure Credentialing, Inc. Image processing techniques for printing identification cards and documents
US8833663B2 (en) 2002-04-09 2014-09-16 L-1 Secure Credentialing, Inc. Image processing techniques for printing identification cards and documents
US7824029B2 (en) 2002-05-10 2010-11-02 L-1 Secure Credentialing, Inc. Identification card printer-assembler for over the counter card issuing
US10297100B1 (en) 2002-05-17 2019-05-21 Intellicheck Mobilisa, Inc. Identification verification system
US11232670B2 (en) 2002-05-17 2022-01-25 Intellicheck, Inc. Identification verification system
US10726656B2 (en) 2002-05-17 2020-07-28 Intellicheck, Inc. Identification verification system
US9818249B1 (en) 2002-09-04 2017-11-14 Copilot Ventures Fund Iii Llc Authentication method and system
US7873576B2 (en) 2002-09-25 2011-01-18 Cummins-Allison Corp. Financial document processing system
US8627939B1 (en) 2002-09-25 2014-01-14 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US20040153408A1 (en) * 2002-09-25 2004-08-05 Jones John E. Financial document processing system
US9355295B1 (en) 2002-09-25 2016-05-31 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US20040133582A1 (en) * 2002-10-11 2004-07-08 Howard James V. Systems and methods for recognition of individuals using multiple biometric searches
US7277891B2 (en) 2002-10-11 2007-10-02 Digimarc Corporation Systems and methods for recognition of individuals using multiple biometric searches
US20040213437A1 (en) * 2002-11-26 2004-10-28 Howard James V Systems and methods for managing and detecting fraud in image databases used with identification documents
US7804982B2 (en) 2002-11-26 2010-09-28 L-1 Secure Credentialing, Inc. Systems and methods for managing and detecting fraud in image databases used with identification documents
US7789311B2 (en) 2003-04-16 2010-09-07 L-1 Secure Credentialing, Inc. Three dimensional data storage
US8705808B2 (en) 2003-09-05 2014-04-22 Honeywell International Inc. Combined face and iris recognition system
US7503488B2 (en) 2003-10-17 2009-03-17 Davis Bruce L Fraud prevention in issuance of identification credentials
US7549577B2 (en) 2003-10-17 2009-06-23 L-1 Secure Credentialing, Inc. Fraud deterrence in connection with identity documents
US20080073428A1 (en) * 2003-10-17 2008-03-27 Davis Bruce L Fraud Deterrence in Connection with Identity Documents
US7225977B2 (en) 2003-10-17 2007-06-05 Digimarc Corporation Fraud deterrence in connection with identity documents
US20070084912A1 (en) * 2003-10-17 2007-04-19 Davis Bruce L Fraud deterrence in connection with identity documents
US20050116025A1 (en) * 2003-10-17 2005-06-02 Davis Bruce L. Fraud prevention in issuance of identification credentials
US20050169511A1 (en) * 2004-01-30 2005-08-04 Cummins-Allison Corp. Document processing system using primary and secondary pictorial image comparison
WO2005096962A2 (en) * 2004-03-26 2005-10-20 Assuretec Systems Inc. Real time privilege management
WO2005096962A3 (en) * 2004-03-26 2007-06-14 Assuretec Systems Inc Real time privilege management
US20050288952A1 (en) * 2004-05-18 2005-12-29 Davis Bruce L Official documents and methods of issuance
US20050283617A1 (en) * 2004-05-18 2005-12-22 Davis Bruce L Motor vehicle documents
US20060016107A1 (en) * 2004-05-18 2006-01-26 Davis Bruce L Photo ID cards and methods of production
US20050273621A1 (en) * 2004-05-18 2005-12-08 Davis Bruce L Multistate collaboration between departments of motor vehicles
US20050273627A1 (en) * 2004-05-18 2005-12-08 Davis Bruce L Biometrics in issuance of government documents
US20060005050A1 (en) * 2004-06-10 2006-01-05 Supercom Ltd. Tamper-free and forgery-proof passport and methods for providing same
US20080272196A1 (en) * 2004-06-10 2008-11-06 On Track Innovations Ltd. Smart Identification Document
US20050274794A1 (en) * 2004-06-10 2005-12-15 Eli Bason Smart identification document
US7243840B2 (en) 2004-06-10 2007-07-17 On Track Innovations Ltd. Smart identification document
US7905415B2 (en) 2004-06-10 2011-03-15 On Track Innovations Ltd. Smart identification document
US20060017959A1 (en) * 2004-07-06 2006-01-26 Downer Raymond J Document classification and authentication
US20060157559A1 (en) * 2004-07-07 2006-07-20 Levy Kenneth L Systems and methods for document verification
US20060015450A1 (en) * 2004-07-13 2006-01-19 Wells Fargo Bank, N.A. Financial services network and associated processes
US8520957B2 (en) 2004-11-09 2013-08-27 Intellicheck Mobilisa, Inc. System and method for comparing documents
US8139869B2 (en) 2004-11-09 2012-03-20 Intellicheck Mobilisa, Inc. System and method for comparing documents
US10643068B2 (en) 2004-11-09 2020-05-05 Intellicheck, Inc. Systems and methods for comparing documents
US9489573B2 (en) 2004-11-09 2016-11-08 Intellicheck Mobilisa, Inc. System and method for comparing documents
US8942432B2 (en) 2004-11-09 2015-01-27 Intellicheck Mobilisa, Inc. System and method for comparing documents
US20110142295A1 (en) * 2004-11-09 2011-06-16 Mobilisa, Inc. System and method for comparing documents
US7860318B2 (en) 2004-11-09 2010-12-28 Intelli-Check, Inc System and method for comparing documents
US11531810B2 (en) 2004-11-09 2022-12-20 Intellicheck, Inc. Systems and methods for comparing documents
US8705807B2 (en) 2004-11-09 2014-04-22 Intellicheck Mobilisa, Inc. System and method for comparing documents
US20060101327A1 (en) * 2004-11-09 2006-05-11 Frank Mandelbaum System and method for comparing documents
US10127443B2 (en) 2004-11-09 2018-11-13 Intellicheck Mobilisa, Inc. System and method for comparing documents
US20060165263A1 (en) * 2005-01-24 2006-07-27 Konica Minolta Business Technologies, Inc. Person verification apparatus, information processing apparatus and person verification system
US20060165262A1 (en) * 2005-01-24 2006-07-27 Konica Minolta Business Technologies, Inc. Apparatus, system and method for person verification
US7817825B2 (en) 2005-01-24 2010-10-19 Konica Minolta Business Technologies, Inc. Apparatus, system and method for person verification
US8090157B2 (en) 2005-01-26 2012-01-03 Honeywell International Inc. Approaches and apparatus for eye detection in a digital image
US8098901B2 (en) 2005-01-26 2012-01-17 Honeywell International Inc. Standoff iris recognition system
US8050463B2 (en) 2005-01-26 2011-11-01 Honeywell International Inc. Iris recognition system having image quality metrics
US8045764B2 (en) 2005-01-26 2011-10-25 Honeywell International Inc. Expedient encoding system
US7761453B2 (en) 2005-01-26 2010-07-20 Honeywell International Inc. Method and system for indexing and searching an iris image database
US8285005B2 (en) 2005-01-26 2012-10-09 Honeywell International Inc. Distance iris recognition
US20070036397A1 (en) * 2005-01-26 2007-02-15 Honeywell International Inc. A distance iris recognition
US8488846B2 (en) 2005-01-26 2013-07-16 Honeywell International Inc. Expedient encoding system
US20080298647A1 (en) * 2005-04-08 2008-12-04 Us Biometrics Corporation System and Method for Identifying an Enrolled User Utilizing a Biometric Identifier
US20070017990A1 (en) * 2005-07-19 2007-01-25 Fuji Xerox Co., Ltd. Document correction detection system and document tampering prevention system
US7614558B2 (en) * 2005-07-19 2009-11-10 Fuji Xerox Co., Ltd. Document correction detection system and document tampering prevention system
US20070024422A1 (en) * 2005-07-27 2007-02-01 Arinc Incorporated Systems and methods for personnel security identification using adapted portable data storage and display devices
US8284985B2 (en) 2005-10-24 2012-10-09 Itesoft S.A. Interactive device for processing documents
WO2007060303A1 (en) * 2005-10-24 2007-05-31 Itesoft S.A. Device and method for interaction with a user
US20090175491A1 (en) * 2005-10-24 2009-07-09 Itesoft S.A. Device and method for interaction with a user
FR2892552A1 (en) * 2005-10-24 2007-04-27 Itesoft Sa Organization and user e.g. customer, interaction device e.g. computer, has image processing unit extracting functional parameters of images and transmitting searched additional information to information request unit
US9292513B2 (en) 2005-12-23 2016-03-22 Digimarc Corporation Methods for identifying audio or video content
US8458482B2 (en) 2005-12-23 2013-06-04 Digimarc Corporation Methods for identifying audio or video content
US8688999B2 (en) 2005-12-23 2014-04-01 Digimarc Corporation Methods for identifying audio or video content
US10007723B2 (en) 2005-12-23 2018-06-26 Digimarc Corporation Methods for identifying audio or video content
US20070162761A1 (en) * 2005-12-23 2007-07-12 Davis Bruce L Methods and Systems to Help Detect Identity Fraud
US8868917B2 (en) 2005-12-23 2014-10-21 Digimarc Corporation Methods for identifying audio or video content
US8064647B2 (en) 2006-03-03 2011-11-22 Honeywell International Inc. System for iris detection tracking and recognition at a distance
US8049812B2 (en) 2006-03-03 2011-11-01 Honeywell International Inc. Camera with auto focus capability
US8761458B2 (en) 2006-03-03 2014-06-24 Honeywell International Inc. System for iris detection, tracking and recognition at a distance
US8442276B2 (en) 2006-03-03 2013-05-14 Honeywell International Inc. Invariant radial iris segmentation
US7933507B2 (en) 2006-03-03 2011-04-26 Honeywell International Inc. Single lens splitter camera
US8085993B2 (en) 2006-03-03 2011-12-27 Honeywell International Inc. Modular biometrics collection system architecture
US20070260886A1 (en) * 2006-05-02 2007-11-08 Labcal Technologies Inc. Biometric authentication device having machine-readable-zone (MRZ) reading functionality and method for implementing same
US9436810B2 (en) 2006-08-29 2016-09-06 Attributor Corporation Determination of copied content, including attribution
US8417017B1 (en) 2007-03-09 2013-04-09 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8625875B2 (en) 2007-03-09 2014-01-07 Cummins-Allison Corp. Document imaging and processing system for performing blind balancing and display conditions
US8204293B2 (en) 2007-03-09 2012-06-19 Cummins-Allison Corp. Document imaging and processing system
US8538123B1 (en) 2007-03-09 2013-09-17 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8542904B1 (en) 2007-03-09 2013-09-24 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8063889B2 (en) 2007-04-25 2011-11-22 Honeywell International Inc. Biometric data collection system
US8233149B2 (en) * 2007-07-30 2012-07-31 Sony Corporation Biometric image pickup apparatus
US20090036783A1 (en) * 2007-07-30 2009-02-05 Sony Corporation Biometric image pickup apparatus
US20160203364A1 (en) * 2008-01-18 2016-07-14 Mitek Systems, Inc. Systems and methods for classifying payment documents during mobile image processing
US20130287284A1 (en) * 2008-01-18 2013-10-31 Mitek Systems Systems and methods for classifying payment documents during mobile image processing
US10909362B2 (en) 2008-01-18 2021-02-02 Mitek Systems, Inc. Systems and methods for developing and verifying image processing standards for mobile deposit
US10423826B2 (en) * 2008-01-18 2019-09-24 Mitek Systems, Inc. Systems and methods for classifying payment documents during mobile image processing
US9292737B2 (en) * 2008-01-18 2016-03-22 Mitek Systems, Inc. Systems and methods for classifying payment documents during mobile image processing
US10607073B2 (en) * 2008-01-18 2020-03-31 Mitek Systems, Inc. Systems and methods for classifying payment documents during mobile image processing
US11151369B2 (en) * 2008-01-18 2021-10-19 Mitek Systems, Inc. Systems and methods for classifying payment documents during mobile image processing
US8436907B2 (en) 2008-05-09 2013-05-07 Honeywell International Inc. Heterogeneous video capturing system
US20100013820A1 (en) * 2008-07-21 2010-01-21 Suk-Jae Park Method of driving plasma display panel and plasma display apparatus using the method
US8213782B2 (en) 2008-08-07 2012-07-03 Honeywell International Inc. Predictive autofocusing system
US8090246B2 (en) 2008-08-08 2012-01-03 Honeywell International Inc. Image acquisition system
US8139208B2 (en) * 2008-09-11 2012-03-20 Toshiba International Corporation Ultrasonic detection system and method for the detection of transparent window security features in bank notes
US20100060881A1 (en) * 2008-09-11 2010-03-11 Non Linear Concepts, Inc. Ultrasonic Detection System and Method for the Detection of Transparent Window Security Features in Bank Notes
US8459436B2 (en) 2008-10-29 2013-06-11 Cummins-Allison Corp. System and method for processing currency bills and tickets
US8280119B2 (en) 2008-12-05 2012-10-02 Honeywell International Inc. Iris recognition system using quality metrics
US8391583B1 (en) 2009-04-15 2013-03-05 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8787652B1 (en) 2009-04-15 2014-07-22 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8437532B1 (en) 2009-04-15 2013-05-07 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8644583B1 (en) 2009-04-15 2014-02-04 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8948490B1 (en) 2009-04-15 2015-02-03 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US9189780B1 (en) 2009-04-15 2015-11-17 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and methods for using the same
US9195889B2 (en) 2009-04-15 2015-11-24 Cummins-Allison Corp. System and method for processing banknote and check deposits
US9971935B1 (en) 2009-04-15 2018-05-15 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8437528B1 (en) 2009-04-15 2013-05-07 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8929640B1 (en) 2009-04-15 2015-01-06 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US10452906B1 (en) 2009-04-15 2019-10-22 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8958626B1 (en) 2009-04-15 2015-02-17 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8594414B1 (en) 2009-04-15 2013-11-26 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8559695B1 (en) 2009-04-15 2013-10-15 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US9972156B1 (en) 2009-04-15 2018-05-15 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8478019B1 (en) 2009-04-15 2013-07-02 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8467591B1 (en) 2009-04-15 2013-06-18 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US9477896B1 (en) 2009-04-15 2016-10-25 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8472681B2 (en) 2009-06-15 2013-06-25 Honeywell International Inc. Iris and ocular recognition system using trace transforms
US8630464B2 (en) 2009-06-15 2014-01-14 Honeywell International Inc. Adaptive iris matching using database indexing
US20120056714A1 (en) * 2010-09-03 2012-03-08 Honeywell International Inc. Biometric visitor check system
US8742887B2 (en) * 2010-09-03 2014-06-03 Honeywell International Inc. Biometric visitor check system
US20120123821A1 (en) * 2010-11-16 2012-05-17 Raytheon Company System and Method for Risk Assessment of an Asserted Identity
US10140552B2 (en) * 2011-02-18 2018-11-27 Google Llc Automatic event recognition and cross-user photo clustering
US20140153837A1 (en) * 2011-02-18 2014-06-05 Google Inc. Automatic event recognition and cross-user photo clustering
US11263492B2 (en) 2011-02-18 2022-03-01 Google Llc Automatic event recognition and cross-user photo clustering
US20120235785A1 (en) * 2011-03-17 2012-09-20 Motorola Mobility, Inc. Wireless communication device and method with intelligent authentication
US9894238B2 (en) 2011-03-25 2018-02-13 Brother Kogyo Kabushiki Kaisha Computer readable recording medium, information processing apparatus, and information processing method
US11388307B2 (en) 2011-03-25 2022-07-12 Brother Kogyo Kabushiki Kaisha Computer readable recording medium, information processing apparatus, and information processing method
US10375265B2 (en) 2011-03-25 2019-08-06 Brother Kogyo Kabushiki Kaisha Computer readable recording medium, information processing apparatus, and information processing method
US10924624B2 (en) 2011-03-25 2021-02-16 Brother Kogyo Kabushiki Kaisha Computer readable recording medium, information processing apparatus, and information processing method
US10115259B2 (en) 2012-06-15 2018-10-30 Ncr Corporation Item validation
EP2674923A3 (en) * 2012-06-15 2014-01-29 NCR Corporation Item validation
US10270824B2 (en) 2012-06-27 2019-04-23 Google Llc System and method for event content stream
US10115118B2 (en) 2012-10-23 2018-10-30 Google Llc Obtaining event reviews
US10163023B2 (en) 2013-02-22 2018-12-25 Cummins-Allison Corp. Apparatus and system for processing currency bills and financial documents and method for using the same
US11314980B1 (en) 2013-02-22 2022-04-26 Cummins-Allison Corp. Apparatus and system for processing currency bills and financial documents and method for using the same
US9558418B2 (en) 2013-02-22 2017-01-31 Cummins-Allison Corp. Apparatus and system for processing currency bills and financial documents and method for using the same
US9141876B1 (en) 2013-02-22 2015-09-22 Cummins-Allison Corp. Apparatus and system for processing currency bills and financial documents and method for using the same
US20140279516A1 (en) * 2013-03-14 2014-09-18 Nicholas Rellas Authenticating a physical device
US11157731B2 (en) 2013-03-15 2021-10-26 Mitek Systems, Inc. Systems and methods for assessing standards for mobile image quality
WO2014197358A1 (en) * 2013-06-03 2014-12-11 Kodak Alaris Inc. Classification of scanned hardcopy media
US9307107B2 (en) * 2013-06-03 2016-04-05 Kodak Alaris Inc. Classification of scanned hardcopy media
US20140355073A1 (en) * 2013-06-03 2014-12-04 Kodak Alaris Inc. Classification of scanned hardcopy media
US9549090B2 (en) * 2013-07-23 2017-01-17 Brother Kogyo Kabushiki Kaisha Information processing device performing a data sharing process among applications and controlling method thereof
US10230863B2 (en) 2013-07-23 2019-03-12 Brother Kogyo Kabushiki Kaisha Information processing device performing a data sharing process among applications and controlling method thereof
US20150029550A1 (en) * 2013-07-23 2015-01-29 Brother Kogyo Kabushiki Kaisha Information processing device and controlling method thereof
US9348673B2 (en) 2013-12-17 2016-05-24 Brother Kogyo Kabushiki Kaisha Information processing device and control method of sharing image data to plural applications
US20150367551A1 (en) * 2014-06-20 2015-12-24 Nomacorc Llc Multi-component synthetic closure and method of manufacture thereof
US10286586B2 (en) * 2014-06-20 2019-05-14 Vinventions Usa, Llc Multi-component synthetic closure and method of manufacture thereof
GB2533908A (en) * 2014-10-20 2016-07-13 Idscan Biometrics Ltd Method, system and computer program for enhanced identity document validation
US10373409B2 (en) 2014-10-31 2019-08-06 Intellicheck, Inc. Identification scan in compliance with jurisdictional or other rules
US10872488B2 (en) * 2016-06-03 2020-12-22 Veridas Digital Authentication Solutions, S.L. Method for authenticating a document
WO2017207064A1 (en) * 2016-06-03 2017-12-07 Veridas Digital Authentication Solutions, S.L. A method for authenticating a document
US20190251774A1 (en) * 2016-06-03 2019-08-15 Eduardo Azanza Ladrón A method for authenticating a document
US11631269B1 (en) 2016-12-23 2023-04-18 Wells Fargo Bank, N.A. Document fraud detection
US10452908B1 (en) * 2016-12-23 2019-10-22 Wells Fargo Bank, N.A. Document fraud detection
US11853707B1 (en) * 2016-12-26 2023-12-26 Cerner Innovation, Inc. Determining adequacy of documentation using perplexity and probabilistic coherence
US11675884B2 (en) 2017-10-10 2023-06-13 Idemia The Netherlands B.V. Authentication of a person using a virtual identity card
WO2019074366A1 (en) 2017-10-10 2019-04-18 Morpho B.V. Authentication of a person using a virtual identity card
US11048969B2 (en) * 2017-11-21 2021-06-29 Biome Inc. Identification device, identification method, identification system, and database
US11321774B2 (en) 2018-01-30 2022-05-03 Pointpredictive, Inc. Risk-based machine learning classifier
US11151829B2 (en) 2018-05-23 2021-10-19 Idemia Identity & Security Germany Ag Extended convolutional neural network for document analysis
EP3572972A1 (en) * 2018-05-23 2019-11-27 IDEMIA Identity & Security Germany AG Extendend convolutional neural network for document analysis
US11392679B2 (en) * 2019-05-07 2022-07-19 Advanced New Technologies Co., Ltd. Certificate verification
EP3772013A1 (en) * 2019-07-29 2021-02-03 TripEye Limited Identity document validation method, system and computer program
US11606631B2 (en) * 2019-12-27 2023-03-14 Regula Ltd. Portable hardware-software complex for pattern and fingerprint recognition
US20210203812A1 (en) * 2019-12-27 2021-07-01 Regula Ltd. Portable hardware-software complex for pattern and fingerprint recognition
US11722615B2 (en) * 2021-04-28 2023-08-08 Pfu Limited Image processing including adjusting image orientation

Also Published As

Publication number Publication date
CN1295642C (en) 2007-01-17
CN1592914A (en) 2005-03-09
EP1449155A4 (en) 2007-03-14
AU2002365578A1 (en) 2003-06-10
WO2003046815A1 (en) 2003-06-05
CA2467861A1 (en) 2003-06-05
CA2467861C (en) 2013-02-12
EP1449155A1 (en) 2004-08-25
US7110573B2 (en) 2006-09-19
US20050229010A1 (en) 2005-10-13
US20040239732A1 (en) 2004-12-02

Similar Documents

Publication Publication Date Title
US7110573B2 (en) Validation and verification apparatus and method
EP1099199B1 (en) Secure document reader and method therefor
US6785405B2 (en) Apparatus and method for document reading and authentication
US8756707B2 (en) Method of manufacturing security document and method for authenticating the document
US20090307112A1 (en) Two Tier Authentication
US7244043B2 (en) Method and system for a processor controlled illumination system for reading and analyzing materials
US20060017959A1 (en) Document classification and authentication
US20060157559A1 (en) Systems and methods for document verification
US20040112962A1 (en) Security, identificaiton and verification systems
US20100158377A1 (en) Authentication
US8317085B2 (en) Fraudulent document detection system and method
WO2005119588A1 (en) Forgery preventing card provided with two-dimensional code, and information presentation/verification system and information presentation/verification method using the forgery preventing card
GB2462029A (en) A system for tracking an article
Kuklinski Automated authentication of current identity documents
Kuklinski et al. The use of ID reader-authenticators in secure access control and credentialing
CA2739508A1 (en) Method of manufacturing security document and method for authenticating the document
Cambier et al. Printable, scannable biometric templates for secure documents and materials

Legal Events

Date Code Title Description
AS Assignment

Owner name: ASSURETEC SYSTEMS INC., NEW HAMPSHIRE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MONK, BRUCE C.;KUKLINSKI, THEODORE T.;REEL/FRAME:012329/0217

Effective date: 20011120

STCB Information on status: application discontinuation

Free format text: EXPRESSLY ABANDONED -- DURING EXAMINATION