The present invention relates to systems, entities, and methods for certification of items such as documents, passports, licenses, degree certificates, and value items such as pieces of art and the like. More specifically, the present invention relates to re-certifying a item/document in the sense of verifying and/or renewing an already existing certificate/certification.
The publication U.S. Pat. No. 7,314,162 discloses a method and system for reporting identity document usage by storing in a database and reporting to an identity document owner instances in which that person's driver's license, passport or other government-issued identification documents are presented as a form of ID, thereby facilitating early notification of identity theft.
Further, the publication U.S. Pat. No. 7,503,488 discloses a method of assessing the risk of fraud before issuing a driver's license to an applicant on the basis of the relative incidence of fraud historically associated with the particular combination of collateral identification documents (e.g. birth certificate, passport, student ID card, etc.) presented by the applicant in their application for the driver's license.
It is desirable to re-certify, correct and/or update official (i.e. government-issued) cards or other certificates (e.g. birth certificate), educational degrees and diplomas, and other certificates, etc., especially those that do not have an inherent expiry or renewal date. It may be further desirable to print a certification mark on a commercial document for authentication purposes.
It is further desirable to mark items such as pieces (works) of art and other items of value (“value items”) with a certification mark without devaluing the value item (e.g. without altering the visual appearance of a work of art). It is further desirable to employ existing infrastructure to most efficient extent in that specific reader-printer(s) are commercially available for use to print on documents such as passports.
It is an object of the present invention to provide a system and method addressing these needs and solving the drawbacks from the prior arts.
The above mentioned problems and drawbacks of the conventional concepts are solved by the subject-matter of the embodiments of the present invention.
The sole FIGURE illustrates a special-purpose server and a specific printer or integrated reader-printer, according to an embodiment of the present invention.
Cards and certificates can be re-issued to make corrections or to update their security features, and the old cards or certificates surrendered for destruction. Some cards and certificates can show an expiry date and require periodic renewal (e.g. passport, driver's license, etc.). Specific reader-printers are commercially available for use to print re-issues of cards and certificates.
With reference to the sole FIGURE, an embodiment of the present invention includes a special-purpose server 10 that comprises one or more of an application server 12, a data collection module 14, an analytics module 16, an alert module 18, a firewall & anti-tamper module 20, and/or a secure communications module 22. Said application server 12 may provide privately owned cloud-based operational control of a reader, printer and/or integrated reader-printer, whichever may be installed, and other administrative functions, thereby relieving the burden of integrating a reader-printer into existing third-party electronic systems.
The data collection module 14 collects and stores in a database all data permitted by national law (e.g. privacy laws) that is associated with each use or selected uses of a passport or other value item, including: (i) scans of the value item by reader or integrated reader-printer, including multiple scans at multiple wavelengths of electromagnetic radiation, ultrasound scans (e.g. of liquid value items), x-ray scans, laser scans; (ii) value item identification such as a passport number, image(s) or other identification of the passport and its contents, including position within a given passport of any prior official (e.g. Visa) stamps in that given passport; (iii) biometric and biographic data of the value item holder or owner, such as fingerprints, eye scans, facial scans, body scans, infrared heat sensor data, audiovisual recordings (described further below), etc.; (iv) date, time and location of each use or selected uses of the value item, including for example whenever a passport is scanned at a passport scanning facility such as a border crossing, transportation hub such as at airports, ship docks and train stations, or at banks, hotels, etc., or whenever a value item is scanned at a scanning facility (i.e. a facility having a reader or integrated reader-printer); (v) sound, image or video recordings of interactions between passport holders and officials at a passport scanning facility or other recordings related to use of the value item, associated media metadata (e.g. number of frames recorded, frequency signatures of voice or other recorded data) and metrics calculated from such media metadata (e.g. which can be encrypted and employed to complement existing anti-tampering technologies); (vi) video data showing persons using the passport or other value item; (vii) travel information associated with the value item holder or owner, e.g. arrival and/or destination information, such as an airline flight no. associated with a passport being scanned at an airport or other passport scanning facility; (viii) medical information (e.g. health status, prior exposure to communicable diseases, medical reports, etc., associated with a passport holder, individual (e.g. refugee) present at an official data collection facility, or value item owner; (ix) related documentation, such as a scan of customs forms, scans of secondary identification documents, notes by officials involved, etc. (x) identity of the responsible Officer involved with handling a passport or other value item, such as where the Officer is identified by fingerprint using the reader-printer, if installed, or other biometric for example; and (xi) RFID contents where a RFID chip is installed in a passport, label or sticker (e.g. affixed to an object) or value item and scanned at the (passport) scanning facility. The database may also store information related to Visa, national entry, national exit, custom form, passport stamps or other official stamps for use in centrally (i.e. remotely) controlling a reader, printer and/or integrated reader-printer, whichever may be installed.
The analytics module 16 analyzes the data stored in the database to determine, in real-time, potentially irregular use of a passport or other value item, such as where an entry into or exit from a country is being attempted by a passport holder without a corresponding preceding exit or entry, or where a value item holder is exhibiting notable behavioral patterns such as nervousness. The analytics module 16 also monitors databases of INTERPOL, Europol, national criminal record databases, and other databases to identify individuals of interest who are attempting to use a passport at a passport scanning facility or other value item at a scanning facility. The analytics module 16 monitors length-of-stay restrictions to issue an alert if a passport holder has an overstay (e.g. has not exited a country by the expiry date of their Visa) or has an understay (e.g. has not stayed a sufficient amount of time in a country to qualify for a specifiable immigration status).
The alert module 18—The alert module 18 alerts the responsible Officer or other official when the passport or other value item scanned by the Officer has been flagged by the analytics module as being associated with irregular use or otherwise problematic. Alerts are also generated when tampering or other physical damage to the Special-purpose Server 10 or module thereof is detected. Alerts may be provided via the secure communications module (described below), and/or by email, text and/or voice message (e.g. to a mobile telephone), etc. to the responsible Officer or other official. Alerts may be provided to any official agency worldwide, as permitted by law, for the purposes of proactive security.
The firewall & anti-tamper module 20 protects the special-purpose Server 10 from external, Internet-based attacks, and also monitors for physical tampering, intrusion or other damage to the special-purpose hardware components.
The secure communications module 22 provides encryption for communications between the Special-purpose Server 10 and electronic systems of participating national governments, agencies thereof, commercial enterprises, or other customers, using encryption techniques consistent with customer preferences and legal requirements. The secure communications module 22 facilitates communications between the Special-purpose Server 10 and the client computers, including specific readers, printers and/or integrated reader-printers, at (passport) scanning facilities. The secure communications module 22 is operable to communicate with client computers within each country via a country-specific VPN (Virtual Private Network). In some embodiments, a separate VPN for each (passport) scanning facility is employed. Country-specific communications facilitate the transfer of information between countries (within the limits of both country's laws) via the Special-purpose Server 10, despite incompatibility between respective passport-related electronic systems of different countries. More generally, the secure communications module 22 facilitates the transfer of information between subscribing customers despite incompatibilities between their respective systems by receiving data from a first subscribing customer in accordance with a first communication protocol and then transmitting data from the Special-purpose Server 10 to a second subscribing customer in accordance with a second communication protocol wherein the first and second communication protocols are not necessarily compatible with each other.
Any number of modules of the special-purpose server 10 may be integrated into a customized black-box unit, and any given module may be commercialized as a stand-alone unit suitable for integrating with existing third-party electronic systems.
A specific printer or integrated reader-printer 30, may be either directly controlled as a stand-alone unit or centrally controlled by the special-purpose server 10 to print re-certification marks on official cards and certificates, thereby printing corrective information and/or employing newer security features. By way of example, an official card or certificate that is accepted as authentic may be scanned by a reader or integrated reader-printer 30, the scan results may be stored by the special-purpose server 10 in its database, a certification mark is generated on the basis of a selected template and dynamic field data (which optionally includes coded data produced on the basis of the scan results); and the certification mark is printed on the official card or certificate.
In the case of event tickets or other purchased tickets for commercial services (e.g. transportation tickets), using the Reader-Printer 30 to stamp or otherwise print on the ticket to indicate that it has already been used allows the use of security features (e.g. security features incorporated into the ink used for printing). Making the printed stamp visible inhibits improper re-use of such tickets by others.
By way of further example, a bill of lading that is accepted as authentic prior to use displays information describing the goods (e.g. quality standard, quantity, etc.) to be shipped. Such information from the bill of lading is encrypted and a certification mark is generated containing the encrypted information. The certification mark is printed on the bill of lading by the printer or integrated Reader-Printer 30 prior to shipping. At the destination, the bill of lading and goods actually contained in the shipped container are compared. If any discrepancy is found, the encrypted data of the certification mark is decrypted and compared to the information displayed on the bill of lading to determine whether the bill of lading was altered (e.g. tampered) during shipment. Additionally or alternatively, the decrypted information may be compared to the received goods.
As a further example, bundles of cash money may be held together by a paper wrap having printed thereon, by the printer or integrated reader-printer 30 prior to transporting, storing, etc., a certificate containing an encrypted indication of the amount of money in the bundle.
In variations, multiple certification marks can be printed at multiple locations which may be random locations or human-selected locations etc.
As an optional step, an image of the value item having the certification mark(s) applied thereto can be taken (e.g. by a Reader-Printer 30 internal camera) and then stored by the Special-purpose Server 10 for subsequent use in determining whether tampering of the certification mark(s) has occurred. By way of example, where multiple certification marks are placed at randomly selected locations (e.g. within specifiable boundaries) the relative or absolute locations of the certification mark(s) may be subsequently verified. In a variation, the object having the certification mark(s) applied thereto is scanned by the reader or integrated reader-printer 30 and the scan results are stored by the Special-purpose Server 10 for subsequent authentication of the value item and its certification mark(s).
According to another embodiment of the present invention, modifications to the mechanics are provided so that the reader-printer 30 can be adapted to support printing on objects of various shapes and sizes. For example, a specific reader/printer 30 may be a portable, handheld unit for scanning objects of various shapes and sizes.
According to method of operation embodiments of the present invention, a value item that is accepted as authentic is optionally scanned and the scanned data is stored by the special-purpose server 10; a certification mark is generated on the basis of a selected template and dynamic field data (which optionally includes coded data produced on the basis of the scan results); and the certification mark is printed on the value item using non-penetrating, non-absorbing ink that is visible only under exposure to specifiable electromagnetic radiation (e.g. ultraviolet light).
In variations, multiple certification marks can be printed at multiple locations which may be random locations or human-selected locations etc. By way of example, certification marks on the backside of a painting at the juncture between the backside of the canvas and the frame may be employed. Such backside certification marks need not be invisible for example.
In a variation, a scan of the value item having the certification mark(s) applied thereto can be taken by the reader or integrated reader-printer 30 at selected wavelengths of electromagnetic radiation and then stored by the Special-purpose Server 10 for subsequent use in determining whether tampering of the certification mark(s) has occurred. By way of example, where multiple certification marks are placed at randomly selected locations (within specifiable boundaries) the relative or absolute locations of the certification mark(s) may be subsequently verified.
Although detailed embodiments have been described, these only serve to provide a better understanding of the invention defined by the independent claims, and are not to be seen as limiting.
Number | Date | Country | Kind |
---|---|---|---|
15186653 | Sep 2015 | EP | regional |
15186695 | Sep 2015 | EP | regional |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/EP2016/072256 | 9/20/2016 | WO | 00 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2017/050736 | 3/30/2017 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
5267756 | Molee | Dec 1993 | A |
5380047 | Molee | Jan 1995 | A |
6308165 | Gilham | Oct 2001 | B1 |
6612494 | Outwater | Sep 2003 | B1 |
7046828 | Gibbs | May 2006 | B1 |
7314162 | Carr et al. | Jan 2008 | B2 |
7503488 | Davis | Mar 2009 | B2 |
8345315 | Sagan | Jan 2013 | B2 |
9947015 | Vildosola | Apr 2018 | B1 |
20010041214 | Brogger | Nov 2001 | A1 |
20020063744 | Stephens, Jr. | May 2002 | A1 |
20020122574 | Morgan | Sep 2002 | A1 |
20020178363 | Ambrogio | Nov 2002 | A1 |
20030015867 | Petkovsek | Jan 2003 | A1 |
20030121984 | Pinchen | Jul 2003 | A1 |
20030156294 | D'Agraives | Aug 2003 | A1 |
20030163696 | Rancien | Aug 2003 | A1 |
20030191694 | Vonfeldt | Oct 2003 | A1 |
20040026502 | Tame | Feb 2004 | A1 |
20040061913 | Takiguchi | Apr 2004 | A1 |
20040093497 | Arangio | May 2004 | A1 |
20040123565 | Rice | Jul 2004 | A1 |
20040188528 | Alasia | Sep 2004 | A1 |
20050216360 | Osterer | Sep 2005 | A1 |
20050243199 | Bohaker et al. | Nov 2005 | A1 |
20050289061 | Kulakowski | Dec 2005 | A1 |
20060072822 | Hatzav | Apr 2006 | A1 |
20060131402 | Crockett | Jun 2006 | A1 |
20060239516 | Morgan | Oct 2006 | A1 |
20060268352 | Tanigawa | Nov 2006 | A1 |
20070028093 | Cowburn | Feb 2007 | A1 |
20070155510 | Galvin | Jul 2007 | A1 |
20070251991 | Wilk | Nov 2007 | A1 |
20080002243 | Cowburn | Jan 2008 | A1 |
20080078826 | Siebers | Apr 2008 | A1 |
20080177405 | Galvin | Jul 2008 | A1 |
20080181447 | Adams | Jul 2008 | A1 |
20090307529 | Kim | Dec 2009 | A1 |
20100073128 | Talwerdi | Mar 2010 | A1 |
20100237983 | Tredoux | Sep 2010 | A1 |
20100266163 | Evevsky | Oct 2010 | A1 |
20110128360 | Hatzav | Jun 2011 | A1 |
20110135160 | Sagan | Jun 2011 | A1 |
20110283369 | Green | Nov 2011 | A1 |
20120226600 | Dolev | Sep 2012 | A1 |
20130142440 | Hirayama | Jun 2013 | A1 |
20140062652 | Roberson | Mar 2014 | A1 |
20140175165 | Havens | Jun 2014 | A1 |
20150028227 | Pawlik | Jan 2015 | A1 |
20150028578 | Pawlik | Jan 2015 | A1 |
20150083801 | Soborski | Mar 2015 | A1 |
20150127507 | Hall | May 2015 | A1 |
20160080589 | Talwerdi | Mar 2016 | A1 |
20160239934 | Soborski | Aug 2016 | A1 |
20160247341 | Talwerdi | Aug 2016 | A1 |
20160371303 | Voigt | Dec 2016 | A1 |
20170083731 | Sanwald | Mar 2017 | A1 |
20170091502 | Furlong | Mar 2017 | A1 |
20170091505 | Chamandy | Mar 2017 | A1 |
20170109875 | Shevchenko | Apr 2017 | A1 |
20170193525 | Shah | Jul 2017 | A1 |
20170195515 | Dolev | Jul 2017 | A1 |
20170287147 | Takahashi | Oct 2017 | A1 |
20180004997 | Furlong | Jan 2018 | A1 |
20180018836 | Fankhauser | Jan 2018 | A1 |
20180018837 | Fankhauser | Jan 2018 | A1 |
20180018838 | Fankhauser | Jan 2018 | A1 |
20180121691 | Talwerdi | May 2018 | A1 |
20180170804 | Witzmann | Jun 2018 | A1 |
20180286035 | Kozicki | Oct 2018 | A1 |
Number | Date | Country |
---|---|---|
200100193 | Oct 2001 | EA |
2132569 | Jun 1999 | RU |
2006010019 | Jan 2006 | WO |
2015058948 | Apr 2015 | WO |
Entry |
---|
International Search Report and Written Opinion issued with respect to application No. PCT/EP2016/072256. |
Eurasian Office Action in counterpart Eurasian Application No. EA201792129 dated Feb. 21, 2020 (and English language translation of the Office Action), 4 pages. |
Number | Date | Country | |
---|---|---|---|
20180121691 A1 | May 2018 | US |