The present disclosure relates generally to data processing and, more specifically, to identification (ID) verification using a device with embedded radio-frequency identification (RFID) functionality. Further, to make use of the identification verification technology, reliable means to read the ID are needed. This is especially true for NFC (Near-Field Communication) systems that is a subset of RFID technology. The issue of reading is especially true for readers not designed for specific documents. The NFC reader could have its NFC antenna in an unknown position to a user and the document could have its antenna in another unknown position. This is especially true for non-application specific NFC reading systems. The NFC reader may be an external device that plugs into a desktop or laptop computer or an electronics device designed to read any NFC document. The documents can include identification documents or any document where further validation is desirable. This can include but is not limited to contracts, deeds of trust, and wills. Further, while the current application addresses NFC enabled ID documents and NFC enabled readers based on the standards, the disclosure contemplates future short range communication technologies including the use of other frequencies, protocols, and passive energizing means. Thus, what is needed are method, devices and systems to assist a user in the alignment of an NFC reader's and NFC enabled ID document's antennas to enable communications between the two devices including the transmission of power from the NFC reader to the to the NFC enabled ID document.
Use of RFID systems to transfer data has opened new possibilities in computing and business. One such possibility is the use of RFID chips in biometric documents. A biometric document is a combined paper and electronic document (for example, a biometric passport) that contains biometric information and can be used to authenticate the identity of its holder. The RFID chip can be embedded in the front or back cover or center page of the biometric document. RFID enabled systems can read information from documents with embedded RFID chips using contactless technology. The use of RFID enabled ID documents can prevent falsification of ID documents as well as tampering, fraud, and other crimes using false documents.
Additionally, the alignment of the NFC antennas between an active NFC device and an NFC antenna of a passive device is not necessarily obvious and can end up frustrating the user with the possibility of the data connection never being made. Bringing the antennas into alignment is hampered by the facts that the location of the NFC antennas on the mobile device and document are not obvious and that they must be nearly touching for a data connection to be made. What is needed is methods, devices and systems to facilitate placing the two devices in a communications orientation.
This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
Provided are methods, devices, and systems for a user to align an NFC enabled mobile device with a document that is NFC enabled. In general, the disclosed methods, devices and systems related to identifying the type of mobile device being used, the type of document being read and providing user feedback in aligning the mobile device and document such that NFC communications are enabled.
According to one example embodiment of the disclosure, a method for aligning NFC antennas on a mobile device and document is provided. In the method, a model identifier from the mobile device is determined. The model identifier is associated with a mobile device configuration to determine the position of the video camera and the NFC antenna. This configuration can be preconfigured on the phone or retrieved from a network coupled source. The document type is determined by using a video camera or a manual input. Once the document type is determined, then it is associated with a document configuration to ascertain the location of the document's NFC antenna. Next, the device and document configuration is used to select and generate an alignment feedback schema. This can include using the offset of the mobile device video camera from the mobile device NFC antenna to pick a camera target on the document. The idea being that if the camera is brought to the camera target, then the NFC antennas would be close enough for communication.
Once a data connection is detected, then an indication can be provided. The alignment feedback schema can include graphics and overlays on the mobile device display. Further, sound or haptic feedback can be used to provide feedback of whether the antenna alignment is getting closer or farther away. Other example embodiments of the disclosure and aspects will become apparent from the following description taken in conjunction with the following drawings.
Embodiments are illustrated by way of example and not limitation in the figures of the accompanying drawings.
The following detailed description includes references to the accompanying drawings, which form a part of the detailed description. The drawings show illustrations in accordance with exemplary embodiments. These exemplary embodiments, which are also referred to herein as “examples,” are described in enough detail to enable those skilled in the art to practice the present subject matter. The embodiments can be combined, other embodiments can be utilized, or structural, logical, and electrical changes can be made without departing from the scope of what is claimed. The following detailed description is, therefore, not to be taken in a limiting sense, and the scope is defined by the appended claims and their equivalents.
Identity verification is important in enabling and securing financial operations, hiring processes, health care, professional services, and so forth. However, ID documents can be tampered with and falsified for fraudulent purposes. To provide an additional protective measure, an RFID chip can be embedded in the ID document. Digital data stored on the RFID chip can duplicate data printed on the ID document. The digital data can be authenticated via Public Key Infrastructure, which makes forgery difficult and expensive. However, conventional digital verification using RFID chip requires special purpose readers.
A system for ID document verification is provided. The system for ID document verification can allow verification of ID documentation having an embedded RFID chip. An image of the ID document can be captured using a camera associated with a client device. The client device can transmit the ID document image to a server for processing for retrieval of printed data represented by the ID document (e.g., holder's name, age, fingerprints, document number, and expiration date). The retrieved data may be sent back to the client device and further to a server. The system for ID document verification residing on the client device may use the retrieved data as a key to unlock the RFID chip and access digital data stored in the RFID chip. The digital data may be transmitted to the server, where the system for ID document verification compares the printed and digital data to determine whether the printed and digital data are identical. Additionally, the system for ID document verification may perform a facial recognition using the printed and digital data. Based on the comparison and/or recognition, similarities between the printed and digital data may be ascertained. Such verification can establish whether printed data in the ID document was altered and whether the ID document is authentic.
In some embodiments, the system for ID document verification can also allow for personal information extraction from a physical ID document.
The network 110 may include the Internet or any other network capable of communicating data between devices. Suitable networks may include or interface with any one or more of, for instance, a local intranet, a Personal Area Network, a Local Area Network (LAN), a Wide Area Network (WAN), a Metropolitan Area Network (MAN), a Virtual Private Network (VPN), a storage area network, a frame relay connection, an Advanced Intelligent Network connection, a synchronous optical network connection, a digital T1, T3, E1 or E3 line, Digital Data Service connection, Digital Subscriber Line connection, an Ethernet connection, an Integrated Services Digital Network (ISDN) line, a dial-up port such as a V.90, V.34 or V.34bis analog modem connection, a cable modem, an Asynchronous Transfer Mode connection, or a Fiber Distributed Data Interface or Copper Distributed Data Interface connection. Furthermore, communications may also include links to any of a variety of wireless networks, including Wireless Application Protocol, General Packet Radio Service, Global System for Mobile Communication, Code Division Multiple Access or Time Division Multiple Access, cellular phone networks, Global Positioning System (GPS), cellular digital packet data, Research in Motion, Limited duplex paging network, Bluetooth radio, or an IEEE 802.11-based radio frequency network. The network 110 can further include or interface with any one or more of an RS-232 serial connection, an IEEE-1394 (Firewire) connection, a Fiber Channel connection, an infrared port, a Small Computer Systems Interface connection, a Universal Serial Bus (USB) connection or other wired or wireless, digital or analog interface or connection, mesh, or Digi® networking. The network 110 may include a network of data processing nodes that are interconnected for the purpose of data communication. The network may include a Software-defined Networking (SDN). The SDN may include one or more of the above network types. Generally, the network 110 may include a number of similar or dissimilar devices connected together by a transport medium enabling communication between the devices by using a predefined protocol. Those skilled in the art will recognize that the present disclosure may be practiced within a variety of network configuration environments and on a variety of computing devices.
An ID document 140 can include a document having an embedded RFID chip (for example, a biometric passport, digital passport, government issued ID, drivers' license, and so forth).
To verify the ID document 140, a user can cause the system 200 to capture an image 130 of the ID document 140 by using a camera associated with the client device 120 (a smart phone, a notebook, a personal computer (PC), a tablet PC, or the like). An image 130 associated with the ID document 140 may be transmitted to the server 150 either via a mobile application, a stand-alone web application, or via a fully integrated service (XML, i-frame). The image 130 may be captured by a camera associated with the client device 120, e.g., a phone camera, a tablet PC camera, and so forth. The server 150 may receive and analyze the image 130 to recognize printed data associated with the ID document 140 (for example, issue date, holder's name, age, gender, holder's fingerprint, and so forth). Printed data can be recognized by optical character recognition (OCR).
The results of the printed data analysis can be transmitted back to the client device 120. The client device 120 may scan the RFID chip embedded in the ID document 140 using an RFID reader (or an NFC reader). The RFID reader can be a part of the client device 120 or it can be detachably attached to the client device 120 via one of the ports. Alternatively, the RFID reader can be a stand-alone device and the client device 120 can communicate with it wirelessly (for example, via Bluetooth).
The retrieved printed data can be used as a key to access the digital data on the RFID chip of the ID document 140. By matching the digital and printed data, the system 200 for ID document verification may confirm authenticity of the ID document 140.
An optional database 230 may be configured to store printed data and digital data as well as verification results.
The processor 210 may comprise, or may be in communication with, media (for example, computer-readable media) that stores instructions that, when executed by the processor 210, cause the processor 210 to perform the elements described herein. Furthermore, the processor 210 may operate any operating system capable of supporting locally executed applications, client-server based applications, and/or browser or browser-enabled applications.
The method 300 may proceed with transmitting the image to a server for processing at operation 320. The processing can include optical character recognition to obtain printed data. The printed data may include holder's name, date of birth, gender, fingerprint, document number, and so forth. The printed data obtained as a result of processing may be received from the server at operation 330 and used to unlock the RFID chip at operation 340. After unlocking the RFID chip (for example, using any recognized text as a key to access the RFID chip), digital data (or biometric data) stored in the RFID chip may be retrieved at operation 350.
At operation 360, the digital data may be analyzed to check the authenticity of the ID document. The digital data in general duplicates the printed data. By comparing the digital data from the RFID chip and the recognized printed data, the system for ID document verification can ensure that printed data was not altered and the ID document is not forged. Based on the analysis, the system may determine that the digital data and printed data are identical and verify the ID document. Alternatively, according to the analysis, the system may determine one or more evidences of forgery (for example, a difference of the printed data and the digital data, an absence of the digital data, nonstandard digital data, and so forth). On the determining the one or more evidences of forgery, the system may reject the ID document. A verification result may be provided at operation 370.
In some embodiments, data of the verified ID document may be used to automatically populate an electronic form, fields associated with a web resource, and so forth. Thus, filling in forms, may be facilitated and accelerated. Moreover, automatic filling in of electronic forms or blanks allows avoiding mistakes and misprints pertaining to manual entry.
The client device 404 can scan an RFID chip 416 in the ID document 402 using an RFID reader 418 (or an NFC reader). The RFID reader 418 can be either embedded in the client device 404 or detachably attached to the client device 404 via a port of the client device 404. The digital data 414 in the RFID chip 416 may be encrypted, so the retrieved printed data can be used as a key to access the digital data 414.
The digital data 414 and printed data can be compared on the client device 404 to verify ID document identity. Additionally, the digital data 414 can be used to fill-in forms, employment forms, medical records, and so forth.
The example computer system 500 includes a processor or multiple processors 502, a hard disk drive 504, a main memory 506, and a static memory 508, which communicate with each other via a bus 510. The computer system 500 may also include a network interface device 512. The hard disk drive 504 may include a computer-readable medium 520, which stores one or more sets of instructions 522 embodying or utilized by any one or more of the methodologies or functions described herein. The instructions 522 can also reside, completely or at least partially, within the main memory 506, the static memory 508, and/or within the processors 502 during execution thereof by the computer system 500. The main memory 506 and the processors 502 also constitute machine-readable media.
While the computer-readable medium 520 is shown in an exemplary embodiment to be a single medium, the term “computer-readable medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of instructions. The term “computer-readable medium” shall also be taken to include any medium that is capable of storing, encoding, or carrying a set of instructions for execution by the machine and that causes the machine to perform any one or more of the methodologies of the present application, or that is capable of storing, encoding, or carrying data structures utilized by or associated with such a set of instructions. The term “computer-readable medium” shall accordingly be taken to include, but not be limited to, solid-state memories, optical and magnetic media. Such media can also include, without limitation, hard disks, floppy disks, NAND or NOR flash memory, digital video disks (DVDs), Random Access Memory (RAM), Read-Only Memory (ROM), and the like.
The exemplary embodiments described herein can be implemented in an operating environment comprising computer-executable instructions (e.g., software) installed on a computer, in hardware, or in a combination of software and hardware. The computer-executable instructions can be written in a computer programming language or can be embodied in firmware logic. If written in a programming language conforming to a recognized standard, such instructions can be executed on a variety of hardware platforms and for interfaces to a variety of operating systems.
In some embodiments, the computer system 500 may be implemented as a cloud-based computing environment, such as a virtual machine operating within a computing cloud. In other embodiments, the computer system 500 may itself include a cloud-based computing environment, where the functionalities of the computer system 500 are executed in a distributed fashion. Thus, the computer system 500, when configured as a computing cloud, may include pluralities of computing devices in various forms, as will be described in greater detail below.
In general, a cloud-based computing environment is a resource that typically combines the computational power of a large grouping of processors (such as within web servers) and/or that combines the storage capacity of a large grouping of computer memories or storage devices. Systems that provide cloud-based resources may be utilized exclusively by their owners, or such systems may be accessible to outside users who deploy applications within the computing infrastructure to obtain the benefit of large computational or storage resources.
The cloud may be formed, for example, by a network of web servers that comprise a plurality of computing devices, such as a client device, with each server (or at least a plurality thereof) providing processor and/or storage resources. These servers may manage workloads provided by multiple users (e.g., cloud resource customers or other users). Typically, each user places workload demands upon the cloud that vary in real-time, sometimes dramatically. The nature and extent of these variations typically depends on the type of business associated with the user.
It is noteworthy that any hardware platform suitable for performing the processing described herein is suitable for use with the technology. The terms “computer-readable storage medium” and “computer-readable storage media” as used herein refer to any medium or media that participate in providing instructions to a central processing unit (CPU) for execution. Such media can take many forms, including, but not limited to, non-volatile media, volatile media and transmission media. Non-volatile media include, for example, optical or magnetic disks, such as a fixed disk. Volatile media include dynamic memory, such as system RAM. Transmission media include coaxial cables, copper wire, and fiber optics, among others, including the wires that comprise one embodiment of a bus. Transmission media can also take the form of acoustic or light waves, such as those generated during radio frequency (RF) and infrared (IR) data communications. Common forms of computer-readable media include, for example, a floppy disk, a flexible disk, a hard disk, magnetic tape, any other magnetic medium, a CD-ROM disk, DVD, any other optical medium, any other physical medium with patterns of marks or holes, a RAM, a Programmable Read-Only Memory (PROM), an Erasable Programmable Read-Only Memory (EPROM), an Electrically Erasable Programmable Read-Only Memory (EEPROM), a FlashEPROM, any other memory chip or data exchange adapter, a carrier wave, or any other medium from which a computer can read.
Various forms of computer-readable media may be involved in carrying one or more sequences of one or more instructions to a CPU for execution. A bus carries the data to system RAM, from which a CPU retrieves and executes the instructions. The instructions received by system RAM can optionally be stored on a fixed disk either before or after execution by a CPU.
Computer program code for carrying out operations for aspects of the present technology may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a LAN or a WAN, or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
The corresponding structures, materials, acts, and equivalents of all means or steps plus function elements in the claims below are intended to include any structure, material, or act for performing the function in combination with other claimed elements as specifically claimed. The description of the present technology has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the disclosure. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the disclosure. Exemplary embodiments were chosen and described in order to best explain the principles of the present technology and its practical application, and to enable others of ordinary skill in the art to understand the disclosure for various embodiments with various modifications as are suited to the particular use contemplated.
Aspects of the present technology are described above with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the disclosure. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
Further disclosed herein is technology concerned with systems and methods for aligning NFC antennas of two NFC enabled devices for the purpose of communication between the devices. The following detailed description includes references to the accompanying drawings, which form a part of the detailed description. The drawings show illustrations, in accordance with exemplary embodiments. These exemplary embodiments, which are also referred to herein as “examples.” are described in enough detail to enable those skilled in the art to practice the present subject matter. The embodiments can be combined, other embodiments can be utilized, or structural, logical, and electrical changes can be made without departing from the scope of what is claimed. The following detailed description is therefore not to be taken in a limiting sense, and the scope is defined by the appended claims and their equivalents. In this document, the terms “a” and “an” are used, as is common in patent documents, to include one or more than one. In this document, the term “or” is used to refer to a nonexclusive “or,” such that “A or B” includes “A but not B,” “B but not A,” and “A and B,” unless otherwise indicated.
Alignment of the NFC antennas can be a non-obvious task that is necessary to electronically read data from a document by a mobile device. However, user guidance and feedback can be provided by the mobile device to configure the device and align the NFC antennas. The methods disclosed provide feedback for device orientation for antenna alignment and device configuration.
Alternatively, the environment can include a more generic NFC reader device that is a combination of a computing system as shown in
Non limiting examples of mobile devices 610 include devices such as smart phones and tablet devices. These devices need to support an active NFC device mode. Further, these devices need to have a means for providing feedback to a user. Smart phones can provide feedback though a variety of feedback sources including but not limited to their user displays, sound and tone generating capability, LEDs, and haptic capabilities.
The document 620 is a physical item including but not limited to a passport, driver's license, or other identity document to which a user desires to make an NFC connection and read data from the document 620. A document 620 is a physical item that contains passive NFC electronics 625 including an NFC antenna 624. The NFC electronics 625 can be co-located with the NFC antenna 624 or separately located. The document 620 contains data which a user can read through a contactless NFC connection between the mobile device 610 and the document 620. In one embodiment, the document is a passive device powered from the mobile device. The power for the NFC electronics 625 is received from the mobile device 610. The emission of an electromagnetic field through an inductive antenna 614 inductively couples to the NFC document's antenna 624 and thereby provides power. However, the disclosure also contemplates the document 620 being an active device. While this is a contactless technology, the two antennas need to be in close proximity. For an NFC device, the communication distance is less than two centimetres.
Non-limiting examples of NFC passive documents include driver licenses, identity cards, passports, credit cards, and physical documents that have NFC electronics and antennas embedded within them. Each of these documents has a known configuration that can include NFC antenna location on a card page, the page number or cover (front or back) on a multi-page document where the NFC antenna can best be accessed, the location of an MRZ (machine readable zone), identifying marks or text that can be found on the document or a combination thereof.
As shown in the example of
The mobile device and document configuration information in on-device storage 616 can be preconfigured on the mobile device 610 or downloaded over the network 630 from a server 640. Further, the applications 618 on the mobile device 610 can also be preconfigured on the mobile device 610 or downloaded from the server 640.
The video camera 613 can be used to identify the document 620 type and in conjunction with the display 617, guide a user to align the mobile device antenna 614 with the document antenna 624. A mobile device application 618 can process an image or video of the document 620 to identify a document type. Alternatively, the video image can be uploaded over the Network 630 to a Server 640 configured with an application 641 configured to identify the document type. For example, the application 618 might identify a distinguishing feature on the cover of a passport to determine the document type or process its MRZ 627 to determine the document type. Further, the application 618 may control the mobile device 610 to provide an alignment feedback schema according to the mobile device type and the document type to guide a user to bring the mobile device 610 and document 620 within NFC communication distance.
The device configuration information held in on-device storage 616 can include offset data between the video camera 613 and the mobile device NFC antenna 614. This information can be stored as a first offset 611 in the direction of one mobile device 610 dimension and a second offset 612 in a direction perpendicular to the direction of the first offset 611. This information is required to determine a document target 626 on the document 620 because when the mobile device 610 is in or is coming into contact with the document 620, the video camera 613 will be offset from the document antenna 624 so the distance between the video camera 613 and the antenna 614 has to be accounted for.
For each mobile device 610, the offsets can be different and thus the mobile device configuration 616 will contain information of the offset 611, 612 for each mobile device type if the video camera 613 is to be used in the alignment process.
The mobile device configuration information in on-device storage 616 can contain other information including but not limited to the number of cameras on the device, and the strength of the NFC reader, types of haptic feedback supported, LEDs that can be controlled, tone generating capabilities, and accelerometer capabilities.
The document 620 can have one or more of identifying text 628, a shape, or an MRZ (machine readable zone) 627 which can be imaged by the camera 613 and processed by the application 618 to determine a document type. Further, the camera 613 can work in conjunction with an on-device application 618 to provide alignment feedback in accordance with the NFC-document type and the mobile device type.
The use of the word PASSPORT is only for the purpose of illustration. The target for the camera 613 is selected to compensate for the offset 611, 612 of the camera 613 from the mobile device's 610 NFC antenna 614. For other documents, the document target 626 can be any other word, colored area, corner or edge of the document.
On the display 617, there is shown an image target 619. The image target 619 is a graphic overlay on the display 617. In the shown embodiment, the word “PASSPORT” is partially shown on the display 617. As shown, the mobile device 610 is positioned sufficiently above the document for the video camera 613 to focus on the document and be within the video camera 613 field of view. Shown on the display 617 is an arrow indicator 615 providing feedback regarding the direction to move the mobile device for antenna alignment. Other graphics are contemplated including, text, or moving graphics or graphics with audio. Further, the generation of the alignment indicator can include a rotation indication.
Referring to
The process starts at 801 where the mobile device application is installed. The installation can include the downloading from the server 640 of an application 641, mobile device configuration 642, schema configuration 643, and document configuration information 644. Further, this step can include the initial configuration of the mobile device including preferences for the alignment user feedback.
In a step 805, the model of the mobile device is identified. The model identifier is a processor readable number, sequence of numbers, or ACII string, or other encoded processor readable string that identifies the model of the mobile device. The model number contains information specific enough to identify a device's configuration including but not limited to the location of the NFC chip. Further, the configuration can identify other useful mobile device features including but not limited to the position of one or more camera lenses on the mobile device, the strength of the NFC reader on the mobile device, audio capabilities, and haptic feedback features. Access to the model identifier can be through an operating system request or reading a hardware memory mapped location. For example, the IOS operating for an Apple iPhone or the Android operating system may have operating system calls to access the phone's model and make.
In step 810, the model identifier is associated with a device configuration in on-device storage 616. The device configurations including mobile device configuration data 642 and the document configurations including document configuration data 644 are stored in a source. This source can be a data structure, table, a database or any other suitable means to store information regarding the device configuration. The source can be located on a Server 640 and accessed when needed or downloaded to the mobile device 610 during the initial configuration of the mobile device 610 and stored in the on-device storage 616, e.g., a non-volatile memory. The device configuration data can include one or more of the following: the position of the NFC antenna on the mobile device 610, the position of one or more of the cameras on the mobile device 610, the strength of the NFC reader on the mobile device, whether the device supports haptic feedback and vibration modes, audio and tone capabilities, and information regarding controllable LED.
Next, the document type is identified 815 so that the location of the document NFC antenna 624 can be located. In one embodiment, the document 620 includes an MRZ (machine readable zone) 627 that can be can optically read by the mobile device 610 and thereby determine the type of the document such as a driver's license, identity card, or a passport. A mobile device software program (application 618) can direct the user to image the document 620 with the video camera. The image is processed to determine the document type. If there is not an MRZ 627 on the document, the application 618 can use image processing techniques or OCR to determine the document type. In one example, the text might say “University of XYZ” which could be used in identifying the document as a University identification card. Associating the document ID with a document configuration 820 would enable a determination of whether the document is NFC enabled and the location of the document NFC antenna.
In another embodiment, the user can enter into the mobile device the document type. This entry can be through a display menu or typed into the mobile device or by utilizing a web browser on the mobile device.
Next an alignment feedback schema is selected 825 based on the mobile device configuration and the document configuration. The use of the alignment feedback schema can include user preferences and be user selectable. One user may prefer display graphics for alignment feedback. Another user may be sight impaired and prefer using tones or audio information for guidance. Further, the alignment feedback schema can be determined by the device configuration of the mobile device. If the device does not have haptic feedback capabilities, then this option will not be included in the feedback schema.
The alignment feedback can be tailored to any of a user's senses or combination of senses. These can include visual, audio, haptic feedback, or a combination thereof. By way of non-limiting examples, visual feedback can include display graphic images and overlays, LEDs on the phone, and camera lights. Graphical images can include pointers on the direction to move, twist, or turn the mobile device or the document to achieve antenna alignment. Further, the graphical images can include moving graphs or a video to familiarize a user on the positioning of the mobile device and the document. The graphics can be to scale and have a realistic appearance.
Using the selected alignment feedback schema, the mobile device generates feedback 830 according to the selected feedback schema. Examples of provided alignment feedback schema are provided below.
In a step 835, the mobile device monitors for a data connection 835 with the document. This can be an event created by the operating system or a query made to the operating system by an application. The mobile device can be configured to download all the data from the document once the connection is made.
In a step 840, a connection indication is generated when the mobile device and the document data connection is made. This indication can be a tone, a graphic, a vibration or other haptic feedback, or a combination thereof. Further, a data transfer completion indication can be generated at the end of the data transfer. Preferably, the data transfer completion indication is different from the connection indication. If the data to be transferred is small, the data transfer completion indication is not needed. But if the data transfer is large, requiring seconds for completion, then the data transfer completion indication is needed.
Thus, computer-implemented methods and systems for identification document verification are described. Although embodiments have been described with reference to specific exemplary embodiments, it will be evident that various modifications and changes can be made to these exemplary embodiments without departing from the broader spirit and scope of the present application. Accordingly, the specification and drawings are to be regarded in an illustrative rather than a restrictive sense.
Different user feedback schemas can be used to assist in the alignment of the mobile device antenna 614 with the document antenna 624 sufficient for data communications. The examples provided below are for illustrative purposes and not intended to limit the scope of the invention.
After installing the application a user starts an application on the mobile device. The application may have been configured with user preferences including a preferred feedback schema using either the display, audio indications, or by haptic feedback means.
The mobile device will then determine its device type through a query to the operating system. Once it knows that it is, for example, a “Make XYZ Model 9” it looks to a device configuration table that contains mobile device configuration information regarding what video cameras the device has, the video camera location, the NFC antenna location, LED control capability, sound and tone generation capability, haptic features, and accelerometer capabilities.
In one embodiment, the user has configured the mobile device to use the display for the alignment feedback schema. The application may first display message of how the mobile device is to be configured. For example, the message may direct the use to remove any case holding the mobile device. Such case may make NFC operation impossible or overly sensitive. Further, a text overlay message or graphic can be displayed indicating that the document may need to be opened to a specific page.
Next, the user asserts a button starting the process to align the antennas and read the document NFC data. A text message is displayed telling the user to hold the mobile device far enough away from the document to get the entire document within the display. The application starts the video camera which then grabs frames of the video image for processing to find and identify the document. First the process looks for an MRZ within the image. If found, the MRZ is processed and a document type determined. If there is not an MRZ, an image of the document is processed to see if any of the text, logos, or other markings can be extracted and used in the determination of the document type. The document type is then looked up in a table containing document configurations for the document types. The associated document configurations contain the location of the NFC antenna. If for some reason the document type is not found, the mobile device can connect to a server that has the latest document types and document configuration information. If found, the document configuration is transmitted to the mobile device.
For the given example, the document has an MRZ and the application identifies the document as a country XYZ identity card. Using the document configuration data, the location of the document NFC antenna is known. This is combined with location of the mobile device video camera and a document target location is determined.
As a first level of user feedback, a graphic or picture of the orientation of the mobile device and the document can be displayed. This graphic will give a user information about how the mobile device and document should be oriented and a rough idea of their positioning to align the antennas.
Next, the video images are processed to identify the document, the document target location on the document and to overlay on the live video image the image target location. The user could have been previously informed that the overlaid image target should be moved to the center of the display. In another embodiment, an indication can be overlaid on the display showing the direction the phone should be moved for alignment. This indicator can include an indication that either the mobile device or the document should be rotated so that when the mobile device and document are brought together, the NFC antennas are more likely to be aligned.
In one configuration, the indicator will show the direction that the mobile device should be moved for alignment. In another configuration the indication will show the direction in which the image target should move. At the center of the screen there can be an overlay graphic, such as a bullseye showing where the image target should be located.
Once the mobile device is correctly positioned, with the image target centered in the display, a centered indication can be generated. In one configuration this indication can be the flashing of the bullseye, a change of brightness of the bullseye, or a change of color of the bullseye.
The user will then be directed to lower or otherwise bring the mobile device into contact or close proximity with the document. The mobile device, if configured with accelerometers may detect the rotation of the mobile device or movements to the left, right, up, down, while being lowered. Using the accelerometer data, any movement causing misalignment can be calculated and used to generated indications for moving the mobile device while on the document. If the NFC data connection is not made, an indication by either graphic, text, or voice will be given to rotate the mobile device against the document. Alternatively an indication to move the device in small circles or small rotation until the data connection indication is made.
Once the data connection is made, a graphic or sound is made to signal the user to stop moving the device until the data transfer is complete. The data transfer time can be short, sub second or as long as several seconds. A completion indication can then be generated either on the display or with a sound.
In another configuration, the user has selected audio indicators for feedback. As before, the user asserts a button starting the process to align the antennas and read the document NFC data. A voice message is output to the user to hold the mobile device at least six inches away from the document to get the entire document within the camera view. The application starts the video camera which then grabs frames of the video image for processing to find and identify the document. First the process looks for an MRZ within the image. If found, the MRZ is processed and a document type determined. If there is not an MRZ, an image of the document is processed to see if any of the text, logos, or other markings can be extracted and used in the document type determination. The document type is then looked up in a table of different document types to determine the location of the NFC antenna. As mentioned above, the mobile device can connect to a server that has the latest document types and document configuration information.
Using the same example, the document has an MRZ and the application identifies the document as a country XYZ identity card. Using the document configuration data, the location of the document NFC antenna is known. This is combined with location of the mobile device video camera, a document target location is determined. As a first level of user feedback, audio feedback guides a user in the orientation of the mobile device and the document. This audio information gives a user information about how the mobile device and document should be oriented and a course idea of their positioning.
Next, the video images are processed to identify the document target location. Audio messages or tones will be given for the orienting and aligning of the mobile device. These can include but are not limited to words “left”, “right”, “up”, “down”, “rotate clockwise”, and “rotate counter clockwise.” In another configuration, a tone can be used to indicate whether the user is getting closer or farther away from aligning the NFC antennas.
Once the mobile device is correctly positioned, a centered audio indication can be generated. In one configuration this centered indication can be a tone of bell or a voice saying “centered”. The user will then be directed to lower or otherwise bring the mobile device into contact with the document. Audio directions can be used for this step. The mobile device, if configured with accelerometers may detect the rotation of the mobile device while being lowered. If the NFC data connection is not made, an indication by voice will be given to rotate the mobile device against the document. Alternatively a voice will indicate to the user to move the device in small circles or small twists until the data connection indication is made.
Once the data connection is made, a sound is made to signal the user to stop moving the device until the data transfer is complete. The data transfer time can be short, sub second or as long as several seconds. A completion indication can then be generated with a tone, bell, or voice indication.
In another example configuration, the user has selected haptic indicators for feedback. As before, the user asserts a button starting the process to align the antennas and read the document NFC data. The user is informed that a first vibration will occur when mobile device at least six inches away and over the document to get the entire document within the camera view. The application starts the video camera which then grabs frames of the video image for processing to find and identify the document. First the process looks for an MRZ within the image. If found, the MRZ is processed and a document type determined. If there is not an MRZ, an image of the document is processed to see if any of the text, logos, or other markings can be extracted and used in the document type determination. The document type is then looked up in a table of different document types to determine the location of the NFC antenna. As mentioned above, the mobile device can connect to a server that has the latest document types and document configuration information.
Using the same example, the document has an MRZ and the application identifies the document as a country XYZ identity card. Using the document configuration data, the location of the document NFC antenna is known. This is combined with location of the mobile device video camera, and a document target location is determined. As a first level of user feedback, haptic feedback guides a user in the orientation of the mobile device and the document. This text or audio information gives a user information about how the mobile device and document should be oriented and a course idea of their positioning.
Next, the video images are processed to identify the document target location. Vibrations will be generated for the orientating orienting and aligning of the mobile device. Vibration strength, if supported by the mobile device, can be used to indicate whether the mobile device is getting closer or farther away from aligning the NFC antennas.
Once the mobile device is correctly positioned, a centered audio indication can be generated. This can be a quick pulsing vibration. The user will then, by the way of text or previously being informed, bring the mobile device contact with the document. The mobile device, if configured with accelerometers may detect the rotation of the mobile device while being lowered. If the NFC data connection is not made, an indication by a low frequency vibration will be given to rotate the mobile device against the document. Alternatively a different vibration will indicate to the user to move the device in small circles or small twists until the data connection indication is made.
Once the data connection is made, a quick vibration made to signal the user to stop moving the device until the data transfer is complete. The data transfer time can be short, sub second or as long as several seconds. A completion indication can then be generated with a long strong vibration.
The present utility patent application is a continuation-in-part application of and claims priority benefit of U.S. patent application Ser. No. 16/529,293 filed Aug. 1, 2019, now granted U.S. Pat. No. 10,747,971 issued on Aug. 18, 2020, which is a continuation of and claims priority benefit of U.S. patent application Ser. No. 15/604,372, filed May 24, 2017, now granted U.S. Pat. No. 10,372,950 issued on Aug. 6, 2019, which is a continuation of U.S. patent application Ser. No. 14/722,058, filed May 26, 2015, now granted U.S. Pat. No. 9,665,754 issued on May 30, 2017, which is related to and claims priority benefit of U.S. provisional application No. 62/004,101, filed May 28, 2014 under 35 U.S.C. 119(e). The present utility patent application is related to U.S. patent application Ser. No. 16/917,776 filed Jun. 30, 2020 entitled “Self-Sovereign Identity Systems and Methods for Identification Documents” and U.S. patent application Ser. No. 16/917,832 filed Jun. 30, 2020 entitled “Systems and Methods of Identification Verification Using Hybrid Near-Field Communication and Optical Authentication.” The contents of these applications are incorporated herein by reference for all purposes to the extent that such subject matter is not inconsistent herewith or limiting hereof.
Number | Name | Date | Kind |
---|---|---|---|
5881172 | Pintsov | Mar 1999 | A |
7168614 | Kotovich et al. | Jan 2007 | B2 |
7201323 | Kotovich et al. | Apr 2007 | B2 |
7249717 | Kotovich et al. | Jul 2007 | B2 |
7430310 | Kotovich et al. | Sep 2008 | B2 |
7657091 | Postnikov et al. | Feb 2010 | B2 |
7778457 | Nepomniachtchi et al. | Aug 2010 | B2 |
7787695 | Nepomniachtchi et al. | Aug 2010 | B2 |
7949176 | Nepomniachtchi | May 2011 | B2 |
7953268 | Nepomniachtchi | May 2011 | B2 |
7978900 | Nepomniachtchi et al. | Jul 2011 | B2 |
8000514 | Nepomniachtchi et al. | Aug 2011 | B2 |
8326015 | Nepomniachtchi | Dec 2012 | B2 |
8379914 | Nepomniachtchi et al. | Feb 2013 | B2 |
8452098 | Nepomniachtchi et al. | May 2013 | B2 |
8483473 | Roach et al. | Jul 2013 | B2 |
8577118 | Nepomniachtchi et al. | Nov 2013 | B2 |
8582862 | Nepomniachtchi et al. | Nov 2013 | B2 |
8831361 | Pintsov | Sep 2014 | B2 |
8977571 | Bueche, Jr. et al. | Mar 2015 | B1 |
8995774 | van Deventer et al. | Mar 2015 | B1 |
9106821 | Baldwin | Aug 2015 | B1 |
9269010 | Abulafia et al. | Feb 2016 | B2 |
9369287 | Sarvestani | Jun 2016 | B1 |
9373030 | van Deventer et al. | Jun 2016 | B2 |
9495586 | Hagen et al. | Nov 2016 | B1 |
9665754 | Hagen | May 2017 | B2 |
9740926 | Hagen et al. | Aug 2017 | B2 |
9842331 | Nepomniachtchi et al. | Dec 2017 | B2 |
10372950 | Hagen | Aug 2019 | B2 |
10467445 | Rule et al. | Nov 2019 | B1 |
10498401 | Rule et al. | Dec 2019 | B1 |
10747971 | Hagen | Aug 2020 | B2 |
10885514 | Hart et al. | Jan 2021 | B1 |
11222342 | Rule | Jan 2022 | B2 |
11461567 | Singal et al. | Oct 2022 | B2 |
20020169721 | Cooley et al. | Nov 2002 | A1 |
20040049401 | Carr et al. | Mar 2004 | A1 |
20050007236 | Lane et al. | Jan 2005 | A1 |
20050067487 | Brundage et al. | Mar 2005 | A1 |
20060057550 | Sahashi | Mar 2006 | A1 |
20060267737 | Colby | Nov 2006 | A1 |
20060274945 | Chu et al. | Dec 2006 | A1 |
20070109101 | Colby | May 2007 | A1 |
20070122004 | Brown et al. | May 2007 | A1 |
20070172155 | Guckenberger | Jul 2007 | A1 |
20070200679 | Colby | Aug 2007 | A1 |
20070200680 | Colby | Aug 2007 | A1 |
20070200681 | Colby | Aug 2007 | A1 |
20070200684 | Colby | Aug 2007 | A1 |
20080046366 | Bemmel et al. | Feb 2008 | A1 |
20080093447 | Johnson | Apr 2008 | A1 |
20080144947 | Alasia et al. | Jun 2008 | A1 |
20080195858 | Nguyen | Aug 2008 | A1 |
20080211622 | Rindtorff et al. | Sep 2008 | A1 |
20080238681 | Rodgers | Oct 2008 | A1 |
20080279959 | Holmes | Nov 2008 | A1 |
20090106824 | Morel et al. | Apr 2009 | A1 |
20090154778 | Lei et al. | Jun 2009 | A1 |
20090167934 | Gupta | Jul 2009 | A1 |
20090309704 | Chang et al. | Dec 2009 | A1 |
20100052852 | Mohanty | Mar 2010 | A1 |
20100066072 | Paeschke et al. | Mar 2010 | A1 |
20100150348 | Fairbanks et al. | Jun 2010 | A1 |
20100245034 | D'Oliveiro et al. | Sep 2010 | A1 |
20100263034 | Banchelin | Oct 2010 | A1 |
20100329577 | Kitai | Dec 2010 | A1 |
20100332838 | Zhu et al. | Dec 2010 | A1 |
20110068173 | Powers et al. | Mar 2011 | A1 |
20110076941 | Taveau et al. | Mar 2011 | A1 |
20110209192 | LeClerc Greer et al. | Aug 2011 | A1 |
20110309146 | Zazzu et al. | Dec 2011 | A1 |
20120011010 | Boulanouar | Jan 2012 | A1 |
20120139703 | Szoke et al. | Jun 2012 | A1 |
20120144201 | Anantha et al. | Jun 2012 | A1 |
20120154246 | Tietke et al. | Jun 2012 | A1 |
20120155700 | Huang | Jun 2012 | A1 |
20120229872 | Dolev | Sep 2012 | A1 |
20120230577 | Calman et al. | Sep 2012 | A1 |
20120299709 | Nishimura | Nov 2012 | A1 |
20120322374 | Yamaoka et al. | Dec 2012 | A1 |
20130012124 | Hymel et al. | Jan 2013 | A1 |
20130061050 | Davis et al. | Mar 2013 | A1 |
20130084801 | Royston | Apr 2013 | A1 |
20130198079 | Mattes et al. | Aug 2013 | A1 |
20130204786 | Mattes et al. | Aug 2013 | A1 |
20130214898 | Pineau et al. | Aug 2013 | A1 |
20130214902 | Pineau et al. | Aug 2013 | A1 |
20130222119 | Tietke et al. | Aug 2013 | A1 |
20130243266 | Lazzouni | Sep 2013 | A1 |
20130281014 | Frankland et al. | Oct 2013 | A1 |
20130305059 | Gormley et al. | Nov 2013 | A1 |
20130311788 | Faher et al. | Nov 2013 | A1 |
20140003717 | Brito et al. | Jan 2014 | A1 |
20140009348 | Behin | Jan 2014 | A1 |
20140019768 | Pineau et al. | Jan 2014 | A1 |
20140029857 | Kompalli et al. | Jan 2014 | A1 |
20140046954 | MacLean et al. | Feb 2014 | A1 |
20140052636 | Mattes | Feb 2014 | A1 |
20140058951 | Kuppuswamy | Feb 2014 | A1 |
20140168012 | Mankowski | Jun 2014 | A1 |
20140230039 | Prakash et al. | Aug 2014 | A1 |
20140253297 | Kawaguchi et al. | Sep 2014 | A1 |
20140270400 | Natale et al. | Sep 2014 | A1 |
20140279519 | Mattes et al. | Sep 2014 | A1 |
20140376050 | Baba | Dec 2014 | A1 |
20150004934 | Qian et al. | Jan 2015 | A1 |
20150078671 | van Deventer et al. | Mar 2015 | A1 |
20150088776 | Parrish et al. | Mar 2015 | A1 |
20150170085 | Amtrup et al. | Jun 2015 | A1 |
20150199568 | van Deventer et al. | Jul 2015 | A1 |
20150312879 | Lagnado | Oct 2015 | A1 |
20150347839 | Hagen | Dec 2015 | A1 |
20160050324 | Ohshita et al. | Feb 2016 | A1 |
20160078434 | Huxham et al. | Mar 2016 | A1 |
20160104041 | Bowers et al. | Apr 2016 | A1 |
20160119548 | Geurts | Apr 2016 | A1 |
20160162729 | Hagen et al. | Jun 2016 | A1 |
20160210621 | Khan | Jul 2016 | A1 |
20160128568 | Bellamy et al. | Aug 2016 | A1 |
20160360348 | Ueda | Dec 2016 | A1 |
20160366294 | Uroskin et al. | Dec 2016 | A1 |
20170156024 | Shigaki | Jun 2017 | A1 |
20170168759 | Hirotani et al. | Jun 2017 | A1 |
20170213211 | Sibert et al. | Jul 2017 | A1 |
20170255800 | Hagen | Sep 2017 | A1 |
20170303262 | Yuan | Oct 2017 | A1 |
20170324750 | Khan | Nov 2017 | A1 |
20170337403 | Ohno | Nov 2017 | A1 |
20180140946 | Ueno | May 2018 | A1 |
20180189583 | Wohlken et al. | Jul 2018 | A1 |
20180260617 | Jones et al. | Sep 2018 | A1 |
20180278739 | Mei | Sep 2018 | A1 |
20180374383 | Thielen | Dec 2018 | A1 |
20190089164 | Lu | May 2019 | A1 |
20190173873 | Brown et al. | Jun 2019 | A1 |
20190354736 | Hagen | Nov 2019 | A1 |
20200195636 | Landrock et al. | Jun 2020 | A1 |
20200249835 | Ueno | Aug 2020 | A1 |
20200334430 | Gupta et al. | Oct 2020 | A1 |
20200334431 | Singal et al. | Oct 2020 | A1 |
20210240773 | Chen et al. | Aug 2021 | A1 |
20210342840 | Rule | Nov 2021 | A1 |
20220076261 | Rule | Mar 2022 | A1 |
20230013280 | Singal et al. | Jan 2023 | A1 |
Number | Date | Country |
---|---|---|
1646966 | Apr 2006 | EP |
1677231 | Jul 2006 | EP |
1724707 | Nov 2006 | EP |
1755065 | Feb 2007 | EP |
1851668 | Nov 2007 | EP |
1891607 | Oct 2008 | EP |
2073153 | Jun 2009 | EP |
2100403 | Sep 2009 | EP |
2075726 | Jul 2010 | EP |
2240878 | Oct 2010 | EP |
2274702 | Jan 2011 | EP |
1938118 | May 2012 | EP |
2465075 | Jun 2012 | EP |
2474931 | Jul 2012 | EP |
2085913 | Aug 2012 | EP |
2508999 | Oct 2012 | EP |
2038811 | Jan 2013 | EP |
2591463 | Oct 2014 | EP |
2803016 | Nov 2014 | EP |
2219878 | Mar 2015 | EP |
2973378 | Jan 2016 | EP |
2976706 | Jan 2016 | EP |
3079103 | Oct 2016 | EP |
3093797 | Nov 2016 | EP |
3385895 | Oct 2018 | EP |
3570215 | Nov 2019 | EP |
2798571 | Apr 2020 | EP |
WO2007105720 | Sep 2007 | WO |
WO2013000614 | Jan 2013 | WO |
WO2014025540 | Feb 2014 | WO |
WO2016193765 | Dec 2016 | WO |
WO2017207064 | Jul 2017 | WO |
WO2018018175 | Feb 2018 | WO |
WO2019002832 | Jan 2019 | WO |
WO2019009685 | Jan 2019 | WO |
WO2019048574 | Mar 2019 | WO |
WO2021021372 | Feb 2021 | WO |
WO2021021373 | Feb 2021 | WO |
WO2021021374 | Feb 2021 | WO |
Entry |
---|
Author Unknown, “Euclidean Vector”, Wikipedia, Revision dated Jun. 12, 2020. (Year: 2020). |
“Machine Readable Travel Documents Part 11, Security Mechanishs for MRTDS”, Doc 9303, International Civil Aviation Organization, Seventh Edition, 2015, 112 pages. |
“Machine Readable Travel Documents (MRTDs): History, Interoperability, and Implementation”, Version: Release 1, Draft 1.4, International Civil Aviation Organization, Mar. 23, 2007, pp. 1-60. |
Pooters, Ivo, “Keep Out of My Passport: Access Control Mechanisms in E-Passports” in: Technical Report, Jun. 15, 2008, pp. 1-13. |
Kinneging, Tom A.F., “PKI for Machine Readable Travel Documents offering ICC Read-Only Access”, Version 1.1, International Civil Aviation Organization, Oct. 1, 2004, pp. 1-57. |
“International Search Report” and “Written Opinion”, Patent Cooperation Treaty Application PCT/US2020/040371, dated Sep. 25, 2020, 15 pages. |
“International Search Report” and “Written Opinion”, Patent Cooperation Treaty Application PCT/US2020/040374, dated Sep. 28, 2020, 9 pages. |
“International Search Report” and “Written Opinion”, Patent Cooperation Treaty Application PCT/US2020/040368, dated Sep. 30, 2020, 20 pages. |
Number | Date | Country | |
---|---|---|---|
20200334429 A1 | Oct 2020 | US |
Number | Date | Country | |
---|---|---|---|
62004101 | May 2014 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 15604372 | May 2017 | US |
Child | 16529293 | US | |
Parent | 14722058 | May 2015 | US |
Child | 15604372 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 16529293 | Aug 2019 | US |
Child | 16917746 | US |