The embodiments of the present invention relate generally to document verification systems, more specifically, to a document verification system and method using identity and financial documents.
Various document verification systems have been in existence for years. In some systems, verifying a document typically requires an expert or a person trained in identifying, comparing and verifying documents to determine its authenticity. This can be both time consuming and cost prohibitive because of the extensive training or years of experience that is required. Automated or computerized verification systems, on the other hand, are quick and efficient at analyzing and verifying the authenticity of documents. However, these systems acquire and analyze existing security features, if any, without further validation or confirmation of the security features.
Thus, there exists a need for a document verification system that is not only low cost and easy to operate for users with little or no experience in examining and authenticating documents, but one that also focuses on identifying, comparing and verifying feature information associated with identity and financial documents.
The general purpose of the present invention, which will be described subsequently in greater detail, is to provide a new document verification system and method using identity and financial documents that has many novel features that result in a new document verification system and method, which is not anticipated, rendered obvious, suggested, or even implied by any prior art document verification systems and methods, either alone or in any combination thereof.
There has thus been outlined, rather broadly, the more important features of the embodiments of the present invention in order that the detailed description thereof may be better understood, and in order that the present contribution to the art may be better appreciated. There are additional features of the embodiments of the present invention that will be described hereinafter.
In this respect, before explaining the embodiments of the present invention it is to be understood that the embodiments of the present invention are not limited in their application to the details of construction and to the arrangements of the components set forth in the following description or illustrated in the drawings. The embodiments of the present invention are capable of being practiced and carried out in various ways. Also, it is to be understood that the phraseology and terminology employed herein are for the purpose of the description and should not be regarded as limiting.
Accordingly, one embodiment of the present invention is a document verification system, comprising: a storage device operable to store one or more validation documents; an acquisition device in communication with the storage device, the acquisition device operable to acquire at least one feature information from one or more unauthenticated documents and at least one feature information from the one or more validation documents; and a processing device in communication with the acquisition device and the storage device, the processing device operable to receive the at least one feature information from the one or more unauthenticated documents and the at least one feature information from the one or more validation documents. In another embodiment, the storage device, the acquisition device and the processing device may be integrated into a single unit.
A primary object of the present invention is to provide an identity and financial document verification system and method that overcomes the shortcomings of any prior art devices.
Another object of the present invention is to provide an identity and financial document verification system and method that provides users possessing little or no document examination experience with a simple, secure and expeditious system and method of determining the authenticity of a given identity or financial document and to submit documents of questionable authenticity to the appropriate authority.
Another object is to provide an identity and financial document verification system and method that provide secure storage for all documents and document feature information.
Another object is to provide an identity and financial document verification system and method that lead users through a step-by-step feature comparison of an unauthenticated document to a plurality of validation documents.
Another object is to provide an identity and financial document verification system and method that acquire visible document features or non-visible document features or both from a document.
Another object is to provide an identity and financial document verification system and method that acquire visible document features or non-visible document features or both from a document to a corresponding validation document.
Another object is to provide an identity and financial document verification system and method that secure and encrypt transport of document features (image and data) among all components of the identity and financial system and method and to other document systems and methods as needed.
Another object is to provide an identity and financial document verification system and method that provide electronic submission of a document to the appropriate document system and authority.
Another object is to provide an identity and financial document verification system and method that have the ability to distribute new information about counterfeit and invalidated documents.
Other objects and advantages of the present invention will become obvious to the reader and it is intended that these objects and advantages are within the scope of the present invention.
To the accomplishment of the above and related objects, the embodiments of the present invention may be configured in the form illustrated in the accompanying drawings, attention being called to the fact, however, that the drawings are illustrative only, and that changes may be made in the specific construction illustrated.
Other variations, embodiments and features of the present invention will become evident from the following detailed description, drawings and claims.
Various other objects, features and attendant advantages of the present invention will become fully appreciated as the same becomes better understood when considered in conjunction with the accompanying drawings, in which like reference characters designate the same or similar parts throughout the several views, and wherein:
The detailed description below relates to a document verification system and method of use. However, it should be understood that the embodiments disclosed hereinafter are not limited in their application to the details of construction and/or the arrangements of the components. The embodiments of the present invention are capable of being practiced in various manners. Also, it should be understood that the phraseology and terminology employed herein are for the purpose of describing the embodiments of the present invention and are not intended to limit the scope of the invention in any way.
Initial reference is made to
Returning now to
The document verification system 10 further includes a processing device 16, which can be configured on a PC or as a standalone unit or hosted on a server. The processing device 16 may be in the form of a computer processor, micro-computer, integrated circuit or similar processing means. The processing device 16 communicates and receives document feature information from both the acquisition device 14 and the storage device 12. Ideally, the processing device 16 can retrieve the feature information of the validation documents on the storage device 12. Otherwise, the processing device 16 can retrieve the feature information of the validation documents from the acquisition device 14 after the information has been acquired or extracted by the acquisition device 14. Ideally, the processing device 16 can be integrated into a single unit with either the storage device 12 or the acquisition device 14 or both. Like the storage device 12 and the acquisition device 14, the methods and systems of securing and transmitting information from and to the processing device 16 are commonly known and need not be described in further detail.
The processing device 16 further includes a verification application that provides users with step-by-step procedures related to a document verification process. Ideally, the document verification process involves comparing features acquired from an unauthenticated document with features acquired from the validation documents. In operation, the verification application initially retrieves validation documents that are stored on the storage device 12. If no validation documents exist on the storage device 12, the validation documents can be manually entered into the system. Once the validation documents are available, the verification application initiates the acquisition device 14 to acquire and extract feature information from the validation documents, if necessary. The extracted feature information can then be stored in a database on the storage device 12 for future reference. As previously described, if there are feature information that the acquisition device 14 is unfamiliar with, it can be programmed, via the verification application, to acquire or extract such unfamiliar feature information. The verification application will guide the user through this acquisition process if necessary. Ideally, there is no need for the verification application to initiate the acquisition or extraction process if feature information from the validation documents have been previously acquired and extracted or are already available on the storage device 12.
Once the feature information from the validation documents are made available, the verification application will ask for feature information from an unauthenticated document in making the necessary comparison. Like with the validation documents, the unauthenticated document can be pre-existing on the storage device 12 or can be manually entered into the system. Also, if the feature information of the unauthenticated document is readily available, the verification application will use it and make the comparison. If not, the verification application will initiate the acquisition device 14 and acquire or extract the feature information from the unauthenticated document in a similar fashion as with the validation document. As previously described, these document feature information can be visible or non-visible document features.
The standards of determining whether an unauthenticated document satisfies the document verification process can be decided by the processing device 16 or by a user. If the unauthenticated document satisfies the document verification process, meaning that the feature information from the unauthenticated document are substantially similar to the feature information from the validation documents, it will be determined to have been verified and validated. For instance, if there are 10 feature information available from the validation documents and 9 of those feature information can be found in the unauthenticated document, then the unauthenticated document can be determined to have been verified and validated. The threshold level for meeting the document verification process can be determined electronically by the verification application or manually by the user. If the unauthenticated document fails to satisfy the document verification process or if it raises additional questions, meaning that the feature information from the unauthenticated document are not substantially similar to the feature information from the validation documents, the processing device 16, via the verification application, is capable of submitting, via a network, the unauthenticated document to other types of document verification systems. If the authenticity of the unauthenticated document is in question, the user can submit the unauthenticated document for examination and review by the proper document verification authority 18 that can later return the results of the official examination. The document verification authorities 18 include without limitation, international agencies and organizations, commercial agencies and organizations, U.S. government agencies and organizations, and other known security agencies and organizations as shown in
For security reasons, transactions within the document verification system 10 are secured and encrypted using known systems and methods including without limitation, secure and encrypted routing or transmitting of document features (images and data) between each of the individual devices. Various security implementations can also be accommodated using different hardware and software platforms. Additionally, secure and encrypted routing or transmitting can take place with other document systems outside the document verification system 10 including without limitation, other document applications, servers, application systems, and any other necessary document server, site or application.
Although the invention has been described in detail with reference to several embodiments, additional variations and modifications exist within the scope and spirit of the invention as described and defined in the following claims.
With respect to the above description then, it is to be realized that the optimum dimensional relationships for the parts of the invention, to include variations in size, materials, shape, form, function and manner of operation, assembly and use, are deemed readily apparent and obvious to one skilled in the art, and all equivalent relationships to those illustrated in the drawings and described in the specification are intended to be encompassed by the present invention.
Therefore, the foregoing is considered as illustrative only of the principles of the invention. Further, since numerous modifications and changes will readily occur to those skilled in the art, it is not desired to limit the invention to the exact construction and operation shown and described, and accordingly, all suitable modifications and equivalents may be resorted to, falling within the scope of the invention.
This application claims the benefit of Provisional Application Ser. No. 60/750,093 filed on Dec. 13, 2005 entitled “Identity and Financial Document Verification System,” and is related to copending U.S. patent application Ser. No. 11/080,916 filed on Mar. 14, 2005 entitled “Hologram Imaging Device and Method of Using Same.” The entireties of these applications are incorporated herein by reference for all purposes.
Number | Date | Country | |
---|---|---|---|
60750093 | Dec 2005 | US |