As described in U.S. patent application Ser. No. 11/321,025, checks typically provide a safe and convenient method for an individual to purchase goods and/or services. To use a check, the individual usually must open a checking account, or other similar account, at a financial institution and deposit funds, which are then available for later withdrawal. To pay for goods and/or services with a check, the payor (i.e., the buyer) usually designates a payee (i.e., the seller) and an amount payable on the check. In addition, the payor often signs the check. Once the check has been signed, it is usually deemed negotiable, meaning the check may be validly transferred to the payee upon delivery. By signing and transferring the check to the payee, the payor authorizes funds to be withdrawn from the payor's account on behalf of the payee in return for the goods and/or services provided by the payee.
Checks have certain advantages over other forms of payment, such as cash. For example, while often considered the most liquid type of asset, cash also may be the least secure. Unlike a check, cash is usually freely transferable and does not have to be endorsed. Thus, the owner and possessor of cash is most often the same individual. Because cash is freely transferable, cash that is lost or stolen typically cannot be recovered. Therefore, the risks associated with cash transactions are often unacceptable, particularly with respect to transactions not conducted in person (e.g., by mail) and/or involving large sums of money. A check, on the other hand, provides a payor with more security because the check usually requires a payor to specify both the person and amount to be paid. Furthermore, as noted above, the check is usually not valid until it is properly signed by the payor. These safeguards help to reduce the risk that money will be lost and/or stolen and ensure that the proper payee receives the proper amount of money.
Cash may have other disadvantages as well. For example, because cash is freely transferable, there may be little or no verifiable transaction history. It is often desirable for a payor and/or payee to have physical proof that a particular transaction took place. This typically requires that the payor receive a receipt. However, receipts may contain errors and can be easily misplaced. In contrast, a bank processing a check will ordinarily create a transaction history, which may include the identity of the payee, the amount to be paid, the date of the payment, and the signature of the payor. This enables both a payor and payee to independently verify the accuracy of most transactions involving a payment by check.
While a check may provide a payor with a convenient and secure form of payment, receiving a check may put certain burdens on the payee, such as the time and effort required to deposit the check. For example, depositing a check typically involves going to a local bank branch and physically presenting the check to a bank teller. In addition to the time commitment that may be required, visiting a bank branch may be problematic for the payee if the bank's hours of operation coincide with the payee's normal hours of employment. Thus, the payee may be required to leave work early and/or change work schedules.
A check may pose other burdens for the payee. As noted above, a check may not be freely transferable, thereby limiting the payee's ability to use funds from the check. For example, it is usually difficult to for the payee to purchase goods and/or services using a check issued by the payor. While the check may be endorsed and accepted by a third party, such transactions are often disfavored because the third party may not know the payor and, thus, may not be willing to accept the risk that the payor has insufficient funds to cover the check. Therefore, the payee may not have access to the funds from the check until the payee deposits the check at the bank, the check has cleared and the funds have been credited to the payee's account. The payee may have to wait even longer if the payee chooses to deposit the check by mail. Therefore, there is a need for a convenient method of remotely depositing a check while enabling the payee to quickly access the funds from the check.
The described embodiments contemplate a system, method and computer-readable medium with computer-executable instructions for remotely redeeming a negotiable instrument. In an embodiment, a novel system may include financial institution electronics, such as a server equipped with appropriate hardware and software for facilitating deposit of a check. Such electronics may be configured for receiving from a customer computer an identification of an account for deposit of a check, and an amount of said check. They may be further configured for receiving an image of a front side of said check, and for analyzing said image to determine if it meets at least one criterion. The criterion could be, for example, image size, image legibility, image orientation, image format, presence of certain image features that indicate the image in fact represents a check, and so forth. Financial institution electronics may be also configured for determining if there is an error in a deposit transaction. Numerous errors are possible candidates for detection, and several exemplary errors are provided herein. If there are no errors that warrant aborting the transaction, then such electronics may be further configured to initiate a deposit of the check.
In another embodiment, a novel system may include, for example, a computer readable medium bearing instructions that can configure a customer's general purpose computer to facilitate a check deposit. Acting under direction of such instructions, the general purpose computer may instruct a customer, for example via a display coupled such computer, in utilizing an image capture device to generate an electronic image of a front side of a check, such that said electronic image of a front side of a check meets at least one first criterion such as image size, image legibility, image orientation, image quality, and location and/or orientation of the check within the image. Instructions may further be provided for receiving the image of a front side of a check from said image capture device, and optionally instructing the customer to process the image, e.g., by approving the image and/or modifying it to meet at least one second criterion. A second criterion might also be, for example, one or more of image size, image legibility, image orientation, image quality, and location and/or orientation of the check within the image. Finally, the customer computer, acting under direction of the instructions, may deliver an approved electronic image to financial institution electronics.
Additional advantages and features of the invention are described below.
The systems and methods for remote deposit of checks in accordance with the present disclosure are further described with reference to the accompanying drawings in which:
Certain specific details are set forth in the following description and figures to provide a thorough understanding of various embodiments of the invention. Certain well-known details often associated with computing and software technology are not set forth in the following disclosure, however, to avoid unnecessarily obscuring the various embodiments of the invention. Further, those of ordinary skill in the relevant art will understand that they can practice other embodiments of the invention without one or more of the details described below. Finally, while various methods are described with reference to steps and sequences in the following disclosure, the description as such is for providing a clear implementation of embodiments of the invention, and the steps and sequences of steps should not be taken as required to practice this invention.
In one embodiment, the financial institution controlling electronics 131 is also the institution at which the customer has an account 160. Financial institution 130 may perform a variety of steps to process the incoming check image and other data. For example, financial institution may ensure the check is valid, ensuring the check image is in proper form for electronic handling, ensure it is not a duplicate of a previously deposited check, and so forth. Financial institution 130 may also forward the image over a network 125 to one or more other entities 140, 150, which may be associated with an account 170 on which the check was drawn.
A general purpose computer 111 is generally a Personal Computer (PC) running one of the well-known WINDOWS® brand operating systems made by MICROSOFT® Corp., or a MACINTOSH® (Mac) brand computer, running any of the APPLE® operating systems. General purpose computers are ubiquitous today and the term should be well understood. A general purpose computer 111 may be in a desktop or laptop configuration, and generally has the ability to run any number of applications that are written for and compatible with the computer's operating system. The term “general purpose computer” specifically excludes specialized equipment as may be purchased by a business or other commercial enterprise, for example, for the specialized purpose of high-speed, high-volume check deposits. A particular advantage of embodiments of the invention is its ability to operate in conjunction with electronics that today's consumers actually own or can easily acquire, such as a general purpose computer, a scanner, and a digital camera.
An exemplary general purpose computer 111 as may be utilized in conjunction with embodiments of the invention is illustrated in
Computing architecture 202 further includes a hard disk drive 226, and may include a magnetic disk drive 2218 for reading from and writing to a removable magnetic disk 220, and an optical disk drive 222 for reading from or writing to a removable optical disk 224 such as a CD ROM or other optical media. The hard disk drive 226, magnetic disk drive 218, and optical disk drive 224 are connected to the bus 208 by appropriate interfaces. The drives and their associated computer-readable media provide nonvolatile storage of computer-readable instructions, data structures, program modules and other data for computing device 200. Although the exemplary environment described herein employs a hard disk, a removable magnetic disk 218 and a removable optical disk 224, other types of computer-readable media such as magnetic cassettes, flash memory cards, digital video disks, random access memories (RAMs), read only memories (ROMs), and the like, may also be used in the exemplary operating environment.
A number of program modules may be stored on the hard disk 226, magnetic disk 218, optical disk 224, ROM 212, or RAM 210, including an operating system 227, one or more application programs 228, other program modules 230, and program data 232. A user may enter commands and information into computing device 200 through input devices such as a keyboard 234 and a pointing device 236. An image capture device 246 may also be coupled to the general purpose computer 200 as an input device. Other input devices 238 may include a microphone, joystick, game pad, satellite dish, or the like. These and other input devices are connected to the processing unit 204 through interfaces 240 that are coupled to the bus 208. A monitor 242 or other type of display device is also connected to the bus 208 via an interface 224, such as a video adapter 224.
Generally, the data processors of computing device 200 are programmed by means of instructions stored at different times in the various computer-readable storage media of the computer. Programs and operating systems may be distributed, for example, on floppy disks, CD-ROMs, or electronically, and are installed or loaded into the secondary memory of a computer. At execution, the programs are loaded at least partially into the computer's primary electronic memory 206.
Computing device 200 may operate in a networked environment using logical connections to one or more remote computers, such as financial institution electronics 248. The financial institution electronics 248 may be one or more server computers, routers, network PCs, and so forth, which typically include many or all of the elements described above relative to computing device 200. The financial institution electronics 248 may run remote application programs 258 which may operate in concert with application programs 228 that execute on the computer 200. For example, a “software component” as described herein may, in one embodiment, execute pursuant to commands from a remote application program 258. The software component may of course also operate in a more autonomous manner, performing certain tasks and then communicating data as necessary back to the remote application programs 258.
When used in a LAN networking environment, a computer 200 is connected to a local network 250 through a network interface or adapter 254. When used in a WAN networking environment, computing device 200 typically includes a modem 256 or other means for establishing communications over the wide area network 252, such as the Internet. The modem 256, which may be internal or external, can be connected to the bus 208 for example via a serial port interface, or by sending a signal to a wireless router which then broadcasts and receives wireless signals to and from a wireless card that is connected to the computer 200.
In a networked environment, program modules depicted relative to the computing device 200, or portions thereof, may be stored in the remote memory storage device. It will be appreciated that the network connections shown are exemplary and other means of establishing a communications link between the computers may be used.
A general purpose computer such as 200 may also be “customer-controlled.” A common example of a customer-controlled computer would be a typical computer located in a private residence. The owner of such a computer typically has the power to install programs and configure the computer as they wish, subject to certain security restrictions that may be imposed by the hardware or software manufacturers. A customer-controlled computer need not be located in a private residence, however. For example, computers in college dormitories, in workplace offices, and so forth may also be considered to be “customer-controlled.”
An example of a computer that would not be considered customer-controlled would be an Automatic Teller Machine (ATM) that is typically controlled by a bank or other business. Although a customer may access and utilize an ATM machine, the ATM machine is not customer-controlled because the allowed uses of the ATM machine are highly restricted. Relevant factors in determining whether a machine is customer controlled are thus the scope of operations that a customer may perform using the machine, and extent to which the customer can reconfigure the machine in some way by adding software and/or hardware components.
One of the applications 228 that may run on a general purpose computer 200 in connection with the invention is a browser. Common browsers in use today are, for example, the popular INTERNET EXPLORER® line of browsers made by MICROSOFT® Corp., the FIREFOX® browsers distributed via the MOZILLA® open source project, and the NETSCAPE NAVIGATOR® browsers also distributed via the MOZILLA® open source project. Browsers generally allow users to point to a Uniform Resource Locator (URL), and thereby retrieve information such as a web page. For example, a browser application on computer 200 could retrieve a web page that is kept at server associated with financial institution electronics 248, and display the web page on display 242 to the account owner 110 (
Another application 228, or set of applications, that may run on a general purpose computer 200 in connection with the invention comprises “virtual machine” technologies such as the JAVA® virtual machine software distributed by SUN MICROSYSTEMS® Corp, and .NET® Framework distributed by MICROSOFT® Corp. In general, such applications facilitate execution of further application programs 228 in a variety of computing environments. For example, a JAVA® applet is a computer program (which may be alternatively referred to herein as a “software component”) that can execute on any computer running the JAVA® virtual machine software. The applet may be provided to virtual machine software in a “source code” format, and may be compiled by a “just in time” compiler, so as to put the applet in a form that can be executed by the hardware associated with the particular computing device. These technologies are known in the art and may be utilized in connection with certain embodiments of the invention as described herein.
Referring back to
Referring now to
Referring back to
Financial institution 130 is illustrated as associated with a server 131. Financial institution 130 may maintain and operate server 131 for the purposes of communicating with customers such as 110. Alternatively, such server may be maintained and operated by one or more third party vendors who act under the instructions of the financial institution 130, but possess skills and resources that may be more effective in competent operation of electronics. Such arrangements are well known in the industry and in this case the server 131 is nonetheless considered to be “associated” with the financial institution 130.
Account owner 110 may be an individual who owns account 160, which may be held at financial institution 130. As such, account owner 110 may be described as a customer of financial institution 130 and/or a “payee” because it is contemplated that customer 110 may deposit a check made out to him- or herself. Embodiments of the invention are also possible, however, in which the customer deposits a check made to another payee, in which case the customer and payee are not one and the same. Account 160 may be any type of account for depositing funds, such as a savings account, checking account, brokerage account, and the like. Account owner 110 may communicate with financial institution 130 by way of communication network 120, which may include an intranet, the Internet, a local area network (LAN), a wide area network (WAN), a public switched telephone network (PSTN), a cellular network, a voice over internet protocol (VoIP) network, and the like. Account owner 110 may communicate with financial institution 130 by phone, email, instant messaging, facsimile, and the like.
In one contemplated embodiment, network 120 is a publicly accessible network such as the Internet, which can presently be accessed from many private residences and many public places such as college campuses, airports, coffee shops, and restaurants throughout the United States as well as many other countries of the world. A variety of technologies are available to establish secure connections over such a public network, so that data transmitted between computer 111 and a server 131 associated with the institution 130 remains either inaccessible or indecipherable by third parties that may intercept such data. The invention may make use of any such security technologies.
Financial institutions 130, 140 and 150 may communicate with each other via a network 125. Network 125 may be a publicly accessed network such as 120. Alternatively, network 125 may have certain characteristics that differ from network 120, due to the different requirements of bank-to-bank communications. For example, one might envision certain security features and access restrictions being more important in bank-to-bank communications.
Distributed computing provides sharing of computer resources and services by exchange between computing devices and systems. These resources and services include the exchange of information, cache storage and disk storage for files. Distributed computing takes advantage of network connectivity, allowing clients to leverage their collective power to benefit the entire enterprise. In this regard, a variety of devices may have applications, objects or resources that may implicate the processes described herein.
This network 470 may itself comprise other computing entities that provide services to the system of
It can also be appreciated that an object, such as 475, may be hosted on another computing device 476. Thus, although the physical environment depicted may show the connected devices as computers, such illustration is merely exemplary and the physical environment may alternatively be depicted or described comprising various digital devices such as PDAs, televisions, MP3 players, etc., software objects such as interfaces, COM objects and the like.
There are a variety of systems, components, and network configurations that support distributed computing environments. For example, computing systems may be connected together by wired or wireless systems, by local networks or widely distributed networks. Currently, many networks are coupled to the Internet, which provides an infrastructure for widely distributed computing and encompasses many different networks. Any such infrastructures, whether coupled to the Internet or not, may be used in conjunction with the systems and methods provided.
A network infrastructure may enable a host of network topologies such as client/server, peer-to-peer, or hybrid architectures. The “client” is a member of a class or group that uses the services of another class or group to which it is not related. In computing, a client is a process, i.e., roughly a set of instructions or tasks, that requests a service provided by another program. The client process utilizes the requested service without having to “know” any working details about the other program or the service itself. In a client/server architecture, particularly a networked system, a client is usually a computer that accesses shared network resources provided by another computer, e.g., a server. In the example of
A server is typically, though not necessarily, a remote computer system accessible over a remote or local network, such as the Internet. The client process may be active in a first computer system, and the server process may be active in a second computer system, communicating with one another over a communications medium, thus providing distributed functionality and allowing multiple clients to take advantage of the information-gathering capabilities of the server. Any software objects may be distributed across multiple computing devices or objects.
Client(s) and server(s) communicate with one another utilizing the functionality provided by protocol layer(s). For example, HyperText Transfer Protocol (HTTP) is a common protocol that is used in conjunction with the World Wide Web (WWW), or “the Web.” Typically, a computer network address such as an Internet Protocol (IP) address or other reference such as a Universal Resource Locator (URL) can be used to identify the server or client computers to each other. The network address can be referred to as a URL address. Communication can be provided over a communications medium, e.g., client(s) and server(s) may be coupled to one another via TCP/IP connection(s) for high-capacity communication.
Returning again to
For example, account owner 110 may convert the check into a digital image by scanning the front and/or back of the check using image capture device 112. Account owner 110 may then send the image to financial institution 130 using the systems and methods described herein. Please refer to
For example, the check may be cleared by presenting the digital image to financial institution 140, which may be a regional branch of the Federal Reserve, along with a request for payment. Financial institution 130 and 150 may have accounts at the regional branch of the Federal Reserve. As will be discussed in greater detail below, financial institution 130 may create a substitute check using the image provided by account owner 110 and present the substitute check to financial institution 140 for further processing. Upon receiving the substitute check, financial institution 140 may identify financial institution 150 as the paying bank (e.g., the bank from which the check is drawn). This may be accomplished using a nine-digit routing number located on the bottom left hand corner of the check. A unique routing number is typically assigned to every financial institution in the United States. Financial institution 140 may present the substitute check to financial institution 150 and request that the check be paid. If financial institution 150 verifies the check (i.e., agrees to honor the check), financial institution 140 may then settle the check by debiting funds from financial institution 150 and crediting funds to financial institution 130. Financial institution 150 may then debit funds from account 170.
It will be appreciated that the preceding examples are for purposes of illustration and explanation only, and that an embodiment is not limited to such examples. For example, financial institution 150 may be a correspondent bank (i.e., engaged in a partnership with financial institution 130). Thus, financial institution 130 may bypass the regional branch of the Federal Reserve and clear the check directly with financial institution 150. In addition, account 160 and account 170 may both be held at financial institution 130, in which case the check may be cleared internally.
Server 500 may comprise a subsystem 511 for providing a software component 532 to a computer 530. This subcomponent may require the customer to download a virtual machine framework 533 so that the component 532 is operable on the operating system 535 and hardware 537 of the computer 530. In general, the software component allows the financial institution to control certain aspects of check image creation and delivery by the computer 530. Thus, while the computer 530 may be customer-controlled, the customer downloads component 532 to facilitate a deposit, thereby allowing a financial institution to effectively control certain aspects of the image generation and delivery process.
Server 500 may also comprise a subsystem for user authentication 512, such as by requiring a username and password. Other authentication methods such as requiring a digital certificate, data representing a customer fingerprint, and so forth are also possible. User authentication can open an interactive session supported by a component such as 508, in which the user can exchange information with the server 500 and receive instructions from the server 500. In addition, server 500 may, in some embodiments, control operation of the software component 532.
Server 500 may comprise a subsystem for receiving from a customer-controlled general purpose computer such as 530, an identification of an account for deposit of a check, and an amount of said check. “Remote deposit servlet” 510 may for example provide such functions. Remote deposit servlet 510 may provide a user interface (or user interface data) to a browser 534, and such user interface may prompt a customer to enter information such as an account number and an amount of a check for deposit. In an embodiment where multiple checks are being deposited at once, the customer may itemize the checks by writing an amount of each. It will be appreciated that servlet 510 need not directly take responsibility for a website, and may instead merely communicate with one or more other subsystems that are responsible for doing so.
Server 500 may further comprise a subsystem for receiving from computer 530 an image of a front side of said check. “Image servlet” 509 is such a subsystem in the illustrated embodiment. In embodiments where software component 532 is responsible for delivering images to image servlet 509, servlet 509 may be configured to communicate with component 532 as appropriate. In one embodiment, both an image of a front side of a check and an image of a back side of a check are received. These may be two separate images, or may be a single image in which the separately generated images are “stitched together” for simultaneous viewing as a single image.
Server 500 may further comprise a subsystem for analyzing said image of a front side of said check to determine if it meets at least one criterion. Subsystems 502 and 503 may for example perform such determining. In order to automate remote check deposits, it is desirable to configure server 500 to recognize that the image it receives is in fact a check, that the check is valid and not a duplicate, and that the received image can be used to further process the transaction. Image quality determination 502 may thus be provided to ensure that the received image can be used to further process the transaction.
Image usability determination subsystem 503 may further require an image to meet additional criteria. For example, it may be required that the image is in a particular format, e.g. a Joint Photographic Experts Group (JPEG) format. While systems may be designed to handle checks in any format, it may be cost effective to require customers to send in only images of specified formats so as to lower development costs of the system. It may also be required that the image is of a predetermined size, or that the image has features indicating it is a negotiable instrument of a desired type. For example, almost all checks have certain features, such as a MICR line, a signature line, an endorsement area on the back, an amount box, a date, and so forth. Often such features are in a consistent location on the check. A subsystem such as 503 may ensure that such features are present prior to allowing the transaction to continue.
Server 500 may further comprise a subsystem for performing Optical Character Recognition (OCR) on said image of said front side of said check. OCR can be useful in determining MICR line information such as routing number, account number, and check number. It can also be used to determine a check amount by performing OCR on the amount location of the check. Other information such as check date, payor name, payor financial institution, and so forth may be gleaned. Such information may be validated, for example, by comparing it to information such as a list of valid routing numbers, comparing an OCR-determined amount to a customer-entered amount, and so forth, or simply stored in a log file.
Server 500 may further comprise a subsystem for determining if there is an error in said deposit of said check. Error processing 506 may be responsible for this, and may comprise a variety of useful aspects. In one embodiment, error processing 506 may comprise a subsystem for validating a routing number associated with said check. In another embodiment, error processing 506 may comprise a subsystem for determining if said check was previously deposited. For example, if a list of deposited checks is maintained for the depositing customer, then the check number can be compared against such a list. Comparing to a list of all deposits for an entire financial institution, or even multiple financial institutions, is also possible. However, if duplicate checking is to be done in real time, i.e. while the customer waits for confirmation, then it is desirable to streamline the process for example by only determining duplicates from a predetermined set of most likely relevant data.
Error processing 506 may further comprise a subsystem for comparing an amount of a check as provided by a customer to an amount determined by performing OCR on said image of said front side of said check. If the numbers do not match, the server can indicate an error and as a result, not proceed with the deposit transaction. Similarly, such an error may result from any error checking operation performed herein. Alternatively, certain errors can be designated as not meriting aborting a deposit, and may simply result in flagging the transaction for later scrutiny. Such a “transaction flagging” approach is particularly applicable to situations in which a duplicate check deposit is identified. Because duplicate determinations are prone to false positives, simply flagging, rather than aborting, a transaction may be preferable when a duplicate is possible.
OCR may also be applied to an image of a back side of the check. For example, in one embodiment, an OCR analysis of a MICR line location on an alleged image of a back of a check can be made. Backs of checks should not have MICR lines. Therefore, if such OCR process identifies MICR information, it can be determined that the image of the back of a check is improper. Thus, one criterion in analyzing an image of a back of a check may be the absence of a MICR line.
Server 500 may further comprise an endorsement determination subsystem 505. Such a subsystem 505 may determine if a signature appears on said back side of said check. While endorsement of a check is not legally required for depositing a check into the payee's bank account, there are a variety of reasons banks typically require endorsement by the payee. Endorsement determination 505 may comprise simply checking for some indication of handwriting in the endorsement area of the image of the back side of a check. Other embodiments may go further by attempting to recognize an authorized signature of the payee and/or customer.
Server 500 may further comprise temporary image storage 501 for storing images while performing operations such as OCR and error processing. Images stored in temporary storage may be in the original format, i.e. as received from computer 530, or in some other format, such as the bi-tonal TIFF format required by Check 21 legislation, or both. In fact, it can be useful to include in some embodiments a mechanism for converting images from such first format to a second format such as bi-tonal TIFF, and to place such images in a log file.
Server 500 may further comprise a subsystem for initiating a deposit of a check into the specified account 513. Deposit initiation may comprise a wide variety of possible actions, depending on how such operations are initiated in particular bank systems. For example, a deposit might be initiated by “soft posting” or provisionally posting a credit to the customer's account. It might be initiated by forwarding an image to the payor's bank or Federal Reserve. It might be initiated by placing data in a batch file for processing all the deposits for the day. Deposit initiation is any action that sets in motion a chain of automated events resulting in a crediting of the customer's account.
Referring now to computer 530, a number of novel aspects also pertain to computer 530 as well as the interaction between the computer 530 and the server 500. As described above, a software component 532 may be executed by computer 530 in connection with carrying out the invention. One embodiment of the software component is illustrated in
A customer may connect to server 500 using a browser application 543 that executes on the computer 530. The customer may view instructions in the browser, for example instructing the customer to log in, instructing the customer to place a check on or in front of an image capture device, instructing the customer to edit an image, and so forth. The browser may run in conjunction with the software component 532, or the software component may run in a separate process and have its own user interface.
Image capture device control software and/or image edit software 531 may also execute on the computer 530. This software 531 interfaces with the image capture device 540, and may serve functions such as initiating image capture, managing image retrieval, facilitating image editing, and so forth. In one embodiment, software 531 may provide an interface so that it can be controlled to some extent by software component 532. If software component is in turn controlled by image servlet 509, the management of the image capture and retrieval process can be performed from the server 500. Alternatively, at any step along the way, the customer can be instructed to perform certain functions using software 531 or component 432, if such functions are better performed, or more conveniently performed by a human.
Storage location 536 provides a location that can be temporarily used by the component 532 to store images and/or a log file that may be generated to persist useful data regarding a deposit transaction.
Operations that are performed by the system comprising computer 530, browser 534, component 532, image capture software 531, image capture device 540, and customer (not shown) can generally comprise providing customer credentials, identifying an account, identifying an amount of a deposit, capturing an image of a front side of a check according to the criteria required by the bank via component 532, cropping and rotating the image of a front side of a check according to the criteria required by the bank via component 532, endorsing and capturing an image of a back side of a check according to the criteria required by the bank via component 532, and delivering such images to server 500.
As mentioned above, the component 600 may also be designed to interoperate with a virtual machine framework 620, for the purpose of realizing certain benefits as understood in the art to accompany such technologies, such as facilitating widespread distribution and better guarantees of acceptable operation. The framework 620 in turn operates on the platform of the customer's general purpose computer 630.
For example, the component 600 may provide a subsystem 602 for instructing a customer, for example via a user interface visible on a display coupled to a customer-controlled general purpose computer 630, in utilizing an image capture device to generate an electronic image of a front side of a check, such that said electronic image of a front side of a check meets at least one first criterion. In one embodiment, the customer may be instructed for example to place the check face-down in a top left corner of a scanner bed. The customer may further be instructed to place the check in a certain orientation. An image thus produced will meet criteria such as being upright and at a “right angle” with respect to a rectangular image format.
The component 600 may also comprise a subsystem 604 such as image capture device interface for receiving an image of a front side of a check from the image capture device. The image may be immediately uploaded to the server 640, or may be temporarily persisted using image storage function 605. A reason for such temporary persisting is to allow for certain customer modifications, and to allow for generation of further images such as an image of a back side of the check. Although not necessary to the invention, it can be expedient to deliver all images to the server 640 at once.
Once an image is generated, subsystem 602 may further instruct the customer to process the electronic image of a front side of a check. Processing the image may comprise simply approving the image if said image of a front side of a check meets said at least one first criterion. This aspect may also be provided by another subsystem such as 606. For example, the image may be presented to the customer and the customer may be asked if the image is right side up and legible. If so, the customer may approve the image, for example by selecting an appropriate approval button in the user interface.
Components 602, 604, 605, and 606 may operate similarly with regard to capturing an image of a back side of a check. The customer may be instructed by 602 to capture an electronic image of a back side of a check meets at least one third criterion, which may in one embodiment be a same criterion as the first criterion, e.g. image size, image legibility, image orientation, and so forth. The image may be received by the component via 604. The customer may also be asked to approve by 602.
Further to being instructed by 602 and/or 606 to process an image, a customer may be instructed to modify said electronic image of a front side of a check and/or a back side of the check, such that said electronic image of a front side of a check meets at least one second criterion. For example, an image as scanned may be presented to the customer, and the customer may be asked to select a bottom right corner of the check in the image. Assuming the top left corner of the check is also in the top left corner of the image, the customer selection of the bottom right corner of the check can be used to crop out any and all of the image that goes beyond the boundaries of the check.
Component 600 may also comprise a subsystem for generating a log file 607 comprising data associated with said deposit. Exemplary data that may be collected in the log file is an identification of the operating system used by the customer's general purpose computer, an identification of a browser used by the customer's general purpose computer, an identification of an image capture device make and model, an identification of a version of the JAVA virtual machine software, or, if .NET technologies are used, the version of the .NET Framework, and an identification of transaction data, for example a transaction ID, account number, customer name, amount of deposit, check routing number, check number, check account number, and so forth.
Component 600 may also comprise a subsystem for data delivery 608 and cleanup 609. The delivery subsystem 608 may initiate a delivery of images and other data, such as the log file, to the server. It may utilize functionality provided in the server interface 601 if desirable. The cleanup subsystem 609 may delete certain data from the customer's computer 630. For example, any image files that may have been created for temporary purposes may be deleted. Thus cleanup subsystem 609 may remove an electronic image of a front side of a check from a memory associated with said customer-controlled general purpose computer 630.
It should be appreciated that the various illustrations and examples provided herein also disclose corresponding methods and computer readable media bearing instructions for carrying out such methods. Furthermore, in addition to the specific implementations explicitly set forth herein, other aspects and implementations will be apparent to those skilled in the art from consideration of the specification disclosed herein. It is intended that the specification and illustrated implementations be considered as examples only, with a true scope and spirit of the following claims.
This application is a continuation of U.S. patent application Ser. No. 16/657,677 (still pending), filed on Oct. 18, 2019, which is continuation of U.S. Patent application Ser. No. 14/225,090 (now abandoned), filed on Mar. 25, 2014, which is a continuation of U.S. patent application Ser. No. 11/590,974, (now U.S. Pat. No. 8,708,227) filed on Oct. 31, 2006, and titled “Systems and Methods for Remote Deposit of Checks”, the entirety of each of which is incorporated by reference herein. This application is related by subject matter to U.S. patent application Ser. No. 11/591,003, U.S. patent application Ser. No. 11/591,014, U.S. patent application Ser. No. 11/590,971, U.S. patent application Ser. No. 11/591,025, all filed on Oct. 1, 2006 and also entitled “Systems and Methods for Remote Deposit of Checks.” This application is also related by subject matter to U.S. patent application Ser. No. 11/321,025, U.S. patent application Ser. No. 11/321,027, U.S. patent application Ser. No. 11/320,998 all filed on Dec. 29, 2005 and entitled “Remote Deposit of Checks,” and U.S. patent application Ser. No. 11/591,131 filed Oct. 31, 2006 also entitled “Remote Deposit of Checks.”
Number | Name | Date | Kind |
---|---|---|---|
5664027 | Ittner | Sep 1997 | A |
5668897 | Stolfo | Sep 1997 | A |
5748780 | Stolfo | May 1998 | A |
5890141 | Carney et al. | Mar 1999 | A |
6164529 | Peters | Dec 2000 | A |
6564380 | Murphy | May 2003 | B1 |
6704039 | Pena | Mar 2004 | B2 |
6738087 | Belkin et al. | May 2004 | B2 |
6930718 | Parulski et al. | Aug 2005 | B2 |
7296734 | Pliha | Nov 2007 | B2 |
7568615 | Corona et al. | Aug 2009 | B2 |
7647897 | Jones | Jan 2010 | B2 |
7766223 | Mello | Aug 2010 | B1 |
7865425 | Waelbroeck | Jan 2011 | B2 |
7873200 | Oakes, III | Jan 2011 | B1 |
7873556 | Dolan | Jan 2011 | B1 |
7876949 | Oakes, III | Jan 2011 | B1 |
7885880 | Prasad | Feb 2011 | B1 |
7962411 | Prasad | Jun 2011 | B1 |
7974869 | Sharma | Jul 2011 | B1 |
8009931 | Li | Aug 2011 | B2 |
8051453 | Arseneau et al. | Nov 2011 | B2 |
8064729 | Li | Nov 2011 | B2 |
8118654 | Nicolas | Feb 2012 | B1 |
8131636 | Viera et al. | Mar 2012 | B1 |
8275715 | Caruso | Sep 2012 | B2 |
8351677 | Oakes, III | Jan 2013 | B1 |
8396623 | Maeda et al. | Mar 2013 | B2 |
8433127 | Harpel | Apr 2013 | B1 |
8452689 | Medina, III | May 2013 | B1 |
RE44274 | Popadic et al. | Jun 2013 | E |
8483473 | Roach | Jul 2013 | B2 |
8538124 | Harpel | Sep 2013 | B1 |
8542921 | Medina | Sep 2013 | B1 |
8688579 | Ethington | Apr 2014 | B1 |
8725607 | Dunn | May 2014 | B2 |
8768836 | Acharya | Jul 2014 | B1 |
8824772 | Viera | Sep 2014 | B2 |
9195986 | Christy et al. | Nov 2015 | B2 |
9235860 | Boucher et al. | Jan 2016 | B1 |
9387813 | Moeller et al. | Jul 2016 | B1 |
9524269 | Brinkmann et al. | Dec 2016 | B1 |
9674396 | Pashintsev | Jun 2017 | B1 |
9818090 | Bueche, Jr. | Nov 2017 | B1 |
10210767 | Johansen | Feb 2019 | B2 |
10217375 | Waldron | Feb 2019 | B2 |
10402944 | Pribble et al. | Sep 2019 | B1 |
10460295 | Oakes, III et al. | Oct 2019 | B1 |
10482432 | Oakes, III et al. | Nov 2019 | B1 |
10846667 | Hecht | Nov 2020 | B1 |
11121989 | Castinado | Sep 2021 | B1 |
11182753 | Oakes, III et al. | Nov 2021 | B1 |
11222315 | Prasad et al. | Jan 2022 | B1 |
11232517 | Medina et al. | Jan 2022 | B1 |
11250398 | Prasad et al. | Feb 2022 | B1 |
11288898 | Moon | Mar 2022 | B1 |
11328267 | Medina, III | May 2022 | B1 |
11398215 | Clauer Salyers | Jul 2022 | B1 |
20010020949 | Gong et al. | Sep 2001 | A1 |
20020075380 | Seeger et al. | Jun 2002 | A1 |
20020152169 | Dutta | Oct 2002 | A1 |
20030046223 | Crawford | Mar 2003 | A1 |
20030056104 | Carr | Mar 2003 | A1 |
20030081121 | Swan | May 2003 | A1 |
20030119478 | Nagy et al. | Jun 2003 | A1 |
20030158811 | Sanders | Aug 2003 | A1 |
20040136586 | Okamura | Jul 2004 | A1 |
20040193878 | Dillinger et al. | Sep 2004 | A1 |
20050001924 | Honda | Jan 2005 | A1 |
20050038746 | Latimer | Feb 2005 | A1 |
20050038748 | Latimer | Feb 2005 | A1 |
20050078192 | Sakurai | Apr 2005 | A1 |
20050087594 | Phillips | Apr 2005 | A1 |
20050091117 | Phillips | Apr 2005 | A1 |
20050091132 | Phillips | Apr 2005 | A1 |
20050097046 | Singfield | May 2005 | A1 |
20050102208 | Gudgeon | May 2005 | A1 |
20050125337 | Tidwell | Jun 2005 | A1 |
20050128333 | Park | Jun 2005 | A1 |
20050133586 | Rekeweg et al. | Jun 2005 | A1 |
20050165641 | Chu | Jul 2005 | A1 |
20050190269 | Grignani | Sep 2005 | A1 |
20050273430 | Pliha | Dec 2005 | A1 |
20060010071 | Jones | Jan 2006 | A1 |
20060023930 | Patel | Feb 2006 | A1 |
20060026140 | King | Feb 2006 | A1 |
20060171697 | Nijima | Feb 2006 | A1 |
20060045321 | Yu | Mar 2006 | A1 |
20060080252 | Doran | Apr 2006 | A1 |
20060124728 | Kotovich et al. | Jun 2006 | A1 |
20060152576 | Kiessling et al. | Jul 2006 | A1 |
20060202468 | Phillips | Sep 2006 | A1 |
20060270421 | Phillips | Nov 2006 | A1 |
20060280360 | Holub | Dec 2006 | A1 |
20070058874 | Tabata et al. | Mar 2007 | A1 |
20070095909 | Chaum | May 2007 | A1 |
20070136078 | Plante | Jun 2007 | A1 |
20070244811 | Tumminaro | Oct 2007 | A1 |
20080013831 | Aoki | Jan 2008 | A1 |
20080040280 | Davis | Feb 2008 | A1 |
20080141117 | King | Jun 2008 | A1 |
20080192129 | Walker | Aug 2008 | A1 |
20080250196 | Mori | Oct 2008 | A1 |
20080270295 | Lent | Oct 2008 | A1 |
20090092287 | Moraleda | Apr 2009 | A1 |
20090171723 | Jenkins | Jul 2009 | A1 |
20090176511 | Morrison | Jul 2009 | A1 |
20090222347 | Whitten | Sep 2009 | A1 |
20090236201 | Blake | Sep 2009 | A1 |
20090240574 | Carpenter | Sep 2009 | A1 |
20090242626 | Jones | Oct 2009 | A1 |
20100038839 | DeWitt et al. | Feb 2010 | A1 |
20100069093 | Morrison | Mar 2010 | A1 |
20100069155 | Schwartz | Mar 2010 | A1 |
20100076890 | Low | Mar 2010 | A1 |
20100112975 | Sennett | May 2010 | A1 |
20100142749 | Rhoads | Jun 2010 | A1 |
20100150424 | Nepomniachtchi et al. | Jun 2010 | A1 |
20100161408 | Karson | Jun 2010 | A1 |
20100201711 | Fillion et al. | Aug 2010 | A1 |
20100262607 | Vassilvitskii | Oct 2010 | A1 |
20100287250 | Carlson | Nov 2010 | A1 |
20100318461 | Smith | Dec 2010 | A1 |
20110015963 | Chafle | Jan 2011 | A1 |
20110016109 | Vassilvitskii | Jan 2011 | A1 |
20110054780 | Dhanani | Mar 2011 | A1 |
20110082747 | Khan | Apr 2011 | A1 |
20110083101 | Sharon | Apr 2011 | A1 |
20110105092 | Felt | May 2011 | A1 |
20110112985 | Kocmond | May 2011 | A1 |
20110166976 | Krein | Jul 2011 | A1 |
20120036014 | Sunkada | Feb 2012 | A1 |
20120052874 | Kumar | Mar 2012 | A1 |
20120098705 | Yost | Apr 2012 | A1 |
20120109793 | Abeles | May 2012 | A1 |
20120113489 | Heit et al. | May 2012 | A1 |
20120150767 | Chacko | Jun 2012 | A1 |
20120230577 | Calman et al. | Sep 2012 | A1 |
20120296768 | Fremont-Smith | Nov 2012 | A1 |
20130021651 | Popadic et al. | Jan 2013 | A9 |
20130097076 | Love | Apr 2013 | A1 |
20130191261 | Chandler | Jul 2013 | A1 |
20130324160 | Sabatellil | Dec 2013 | A1 |
20130332004 | Gompert et al. | Dec 2013 | A1 |
20130332219 | Clark | Dec 2013 | A1 |
20130346306 | Kopp | Dec 2013 | A1 |
20130346307 | Kopp | Dec 2013 | A1 |
20140010467 | Mochizuki et al. | Jan 2014 | A1 |
20140032406 | Roach et al. | Jan 2014 | A1 |
20140037183 | Gorski et al. | Feb 2014 | A1 |
20140156501 | Howe | Jun 2014 | A1 |
20140203508 | Pedde | Jul 2014 | A1 |
20140207673 | Jeffries | Jul 2014 | A1 |
20140207674 | Schroeder | Jul 2014 | A1 |
20140244476 | Shvarts | Aug 2014 | A1 |
20140313335 | Koravadi | Oct 2014 | A1 |
20140351137 | Chisholm | Nov 2014 | A1 |
20140372295 | Tatham | Dec 2014 | A1 |
20140374486 | Collins, Jr. | Dec 2014 | A1 |
20150134517 | Cosgray | May 2015 | A1 |
20150235484 | Kraeling et al. | Aug 2015 | A1 |
20150244994 | Jang et al. | Aug 2015 | A1 |
20150294523 | Smith | Oct 2015 | A1 |
20150348591 | Kaps et al. | Dec 2015 | A1 |
20160026866 | Sundaresan | Jan 2016 | A1 |
20160189500 | Kim et al. | Jun 2016 | A1 |
20170039637 | Wandelmer | Feb 2017 | A1 |
20170068421 | Carlson | Mar 2017 | A1 |
20170132583 | Nair | May 2017 | A1 |
20170229149 | Rothschild et al. | Aug 2017 | A1 |
20170263120 | Durie, Jr. et al. | Sep 2017 | A1 |
20180025251 | Welinder et al. | Jan 2018 | A1 |
20180108252 | Pividori | Apr 2018 | A1 |
20180197118 | McLaughlin | Jul 2018 | A1 |
20190026577 | Hall et al. | Jan 2019 | A1 |
20190122222 | Uechi | Apr 2019 | A1 |
20190311227 | Kriegman et al. | Oct 2019 | A1 |
20200311844 | Luo et al. | Oct 2020 | A1 |
20210097615 | Gunn, Jr. | Apr 2021 | A1 |
Number | Date | Country |
---|---|---|
1967565 | May 2007 | CN |
202141007247 | Mar 2021 | IN |
2004-23158 | Jan 2004 | JP |
3708807 | Oct 2005 | JP |
2005326902 | Nov 2005 | JP |
Entry |
---|
Tiwari, Rajnish et al., “Mobile Banking as Business Strategy”, IEEE Xplore, Jul. 2006. |
Lyn C. Thomas, “A survey of credit and behavioural scoring: forecasting financial risk of lending to consumers”, International Journal of Forecasting, (Risk) (2000). |
Non-Final Office Action issued on U.S. Appl. No. 14/293,159 on Aug. 11, 2022. |
Non-Final Office Action issued on U.S. Appl. No. 16/455,024 on Sep. 7, 2022. |
Non-Final Office Action issued on U.S. Appl. No. 17/071,678 on Sep. 14, 2022. |
Non-Final Office Action issued on U.S. Appl. No. 17/180,075 on Oct. 4, 2022. |
Non-Final Office Action issue on U.S. Appl. No. 17/511,822 on Sep. 16, 2022. |
Non-Final Office Action issued on U.S. App. No. 17/568,849 on Oct. 4, 2022. |
Yong Gu Ji et al., “A Usability Checklist forthe Usability Evaluation of Mobile Phone User Interface”, International Journal of Human-Computer Interaction, 20(3), 207-231 (2006). |
Printout of news article dated Feb. 13, 2008, announcing a Nokia phone providing audio cues for capturing a document image. |
IPR Petition 2022-01593, Truist Bank v. United Services Automobile Association filed Oct. 11, 2022. |
Bruno-Britz, Maria “Mitek Launches Mobile Phone Check Capture Solution,” Bank Systems and Technologies Information Week (Jan. 24, 2008). |
V User Guide, https://www.lg.com/us/suggort/manualsdocuments?customerModelCode=%20LGVX9800&csSalesCode=LGVX9800, select“VERISON(USA) en”; The V_UG_051 125.pdf. |
MING Phone User Manual, 2006. |
Patel, Kunur, “How Mobile Technology is Changing Banking's Future” AdAge, Sep. 21, 2009, 4 pages. |
Spencer, Harvey, “Controlling Image Quality at the Point of Capture” Check 21, Digital Check Corporation & HSA 2004. |
Moseik, Celeste K., “Customer Adoption of Online Restaurant Services: a Multi-Channel Approach”, Order No. 1444649 University of Delaware, 2007, Ann Arbor: ProQuest., Web. Jan. 10, 2022 (Year: 2007). |
ANS X9.100-160-1-2004, Part 1: Placement and Location of Magnetic Ink Printing (MICR), American National Standard for Financial Services, approved Oct. 15, 2004. |
Clancy, Heather, “Turning cellphones into scanners”, The New York Times, Feb. 12, 2005; https://www.nytimes.com/2005/02/12/busienss/worldbusiness/turning-cellphones-into-scanners.html. |
Consumer Guide to Check 21 and Substitute Checks, The Federal Reserve Board, The Wayback Machine—Oct. 28, 2004; https://web.archive.org/web/20041102233724/http://www.federalreserve.gov. |
Curtin, Denis P., A Short Course in Digital Photography Chapter 7 Graphic File Formats. |
Dance, Christopher, “Mobile Document Imaging”, Xerox, Research Centre Europe, XRCE Image Processing Area, Nov. 2004. |
Digital Photography Now, Nokia N73 Review, Oct. 28, 2006. |
Federal Reserve System, 12 CFR Part 229, Regulation CC: Docket No. R-1176, Availability of Funds and Collection of Checks, Board of Governors of the Federal Reserve System Final rule. |
Financial Services Policy Committee, Federal Reserve Banks Plan Black-and-White Image Standard and Quality Checks, May 18, 2004. |
MICR-Line Issues Associated With The Check 21 Act and the Board's Proposed Rule, Prepared by Federal Reserve Board Staff, Apr. 27, 2004. |
Microsoft Computer Dictionary Fifth Edition—Copyright 2002. |
HTTP Over TLS, Network Working Group, May 2000, Memo. |
Nokia N73—Full phone specifications. |
Ranjan, Amit, “Using a Camera with Windows Mobile 5”, Jul. 21, 2006. |
Reed, John, “FT.com site: Mobile users branch out”, ProQuest, Trade Journal, Oct. 6, 2005. |
Weiqui Luo et al., “Robust Detection of Region-Duplication Forgery in Digital Image” Guoping Qui, School of Computer Science, University of Nottingham, NG8 1BB, UK—Jan. 2006. |
Final Written Decision relating to U.S. Pat. No. 8,699,779, IPR2021-01070, Jan. 19, 2023. |
Final Written Decision relating to U.S. Pat. No. 8,977,571, IPR2021-01073, Jan. 19, 2023. |
Final Written Decision relating to U.S. Pat. No. 10,621,559, IPR2021-01077, Jan. 20, 2023. |
Henkel, Joseph et al., “Remote Deposit Capture in the Consumer's Hands”, Downloaded on Jun. 19, 2010 at 18:46: UTC from IEEE Xplore. |
“Image Scanner having Image Quality diagnostics capability with NO operator intervention”, an IP.com Prior Art Database Technical Disclosure, Mar. 26, 2003. |
Bieniecki, Wojciech et al. “Image Preprocessing for Improving OCR Accuracy”, Computer Engineering Department, Technical University of Lodz, al. Politechniki 11, Lodz Poland, May 23, 2007. |
Shaikh, Aijaz Ahmed et al., “Auto Teller Machine (ATM) Fraud—Case Study of Commercial Bank in Pakistan”, Department of Business Administration, Sukkur Institute of Business Administration, Sukkur, Pakistan, Aug. 5, 2012. |
IPR2023-00829 filed Apr. 13, 2023, Truist Bank vs. United Services Automobile Association, 97 pages. |
“Reserve Banks to Adopt DSTU X9.37-2003 Format for Check 21 Image Services,” Fed. Reserve Bank of Minneapolis Fin. Serv. Policy Comm., May 18, 2004. |
“Camera Phone Shoot-Out”, Phone Scoop, Dec. 18, 2002. |
Shirai, K. et al., “Removal of Background Patterns and Signatures for Magnetic Ink Character Recognition of Checks,” 2012 10th IAPR International Workshop on Document Analysis Systems, Gold Coast, QLD. Australia, 2012, pp. 190-194. |
Ding, Y. et al., “Background removal for check processing using morphology in Two-and Three-Dimensional Vision Systems for Inspection, Control, and Metrology”. vol. 5606, pp. 19-26, SPIE 2004. |
Haskell, B.G. et al, “Image and video coding-emerging standards and beyond,” in IEEE Transactions on Circuits and Systems for Video Technology, vol. 8 No. 7, pp. 814-837, Nov. 1998. |
Number | Date | Country | |
---|---|---|---|
Parent | 16657677 | Oct 2019 | US |
Child | 17574757 | US | |
Parent | 14225090 | Mar 2014 | US |
Child | 16657677 | US | |
Parent | 11590974 | Oct 2006 | US |
Child | 14225090 | US |