1. Field
The present disclosure relates to a wireless communication method and device with intelligent authentication.
2. Introduction
Users enjoy portable electronic devices and wireless communication devices. Innovative features and functions are embraced by the user community.
There is a need for a wireless communication method and device with intelligent authentication. It is becoming more common nowadays, that currency counterfeiters are attempting to pass off even low value currencies. And, when this happens, a proprietor takes the loss for counterfeit bills. A proprietor would welcome a portable device, such as a cell phone, computing device, tablet and the like, that could be used to authenticate currency and important documents.
There is a need for a wireless communication method and device adapted for authenticating currency.
There is a need for a wireless communication method and device adapted for authenticating important documents, such as passports, identification cards, credit cards and driver's licenses, typically with UV seals. For example, a bar owner would welcome a simple and accurate way to detect and reject underage patrons attempting to gain entry.
Thus, a method and device that addresses these kinds of problems would be considered an improvement in the art.
In order to describe the manner in which the above-recited and other advantages and features of the disclosure can be obtained, a more particular description of the disclosure briefly described above will be rendered by reference to specific embodiments thereof which are illustrated in the appended drawings. Understanding that these drawings depict only typical embodiments of the disclosure and are not therefore to be considered to be limiting of its scope, the disclosure will be described and explained with additional specificity and detail through the use of the accompanying drawings in which:
As shown in
In one embodiment, the camera module 290 is capable of being in communication with GPS, GNSS, cellular tower, and alike, and a processor module 294, coupled to the controller 220. In more detail, the camera module 290 can reside within the controller 220, can reside within the memory 270, can be an autonomous module, can be software, can be hardware, or can be in any other format useful for a module on a wireless communication device 200.
The display 240 can be a liquid crystal display (LCD), a light emitting diode (LED) display, a touch screen display, a plasma display, or any other means for displaying information. The transceiver 250 may include a transmitter and/or a receiver. The audio input and output circuitry 230 can include a microphone, a speaker, a transducer, or any other audio input and output circuitry. The user interface 260 can include a keypad, buttons, a touch pad, a joystick, an additional display, or any other device useful for providing an interface between a user and an electronic device. The memory 270 may include a random access memory, a read only memory, an optical memory or any other memory that can be coupled to a wireless communication device.
In more detail, the wireless communication device 200 shown in
A block diagram of a wireless communication method 300 is shown in
The step 320 may include matching an object in the first image to a known document (currency, driver's license, passport, etc). Step 320 may also include determining that certain objects are not in the picture, such as a face. In one embodiment, it may be desirable not to illuminate a person with UV light. Therefore, the criteria may include that a face not be in the first image. It is expected that the picture of a face, such as in a drivers license, is an acceptable criteria, however a real face in the picture may not be an acceptable criteria.
Step 320 of projecting UV illumination and taking a second image may happen without further UI input from the user if the predetermined criteria of step 320 is met.
The step of comparing the first and second image 340 may occur in the device 120 or in the network 110, or in a combination of the two.
In one embodiment, the object being examined for authenticity, includes an identifier viewable under UV illumination, such as for example, an ultra violet seal typically found on credit cards, pass ports, identification cards and currency.
In a preferred embodiment, the comparing step 340 can include optical recognition which can include image recognition, character recognition, visual recognition, facial recognition, color recognition, shape recognition and the like. This can be accomplished by use of the detector module 291 in
In one embodiment, the comparing step 340 further includes calculating a score and displaying a result. For example, a color such as red, a stop sign image or any pass fail indication can be presented to a user on a display, for real time results.
The method 300 can further comprise providing a passing mode wherein a prompt indicates the predetermined criteria has matched and a failing mode indicating the predetermined criteria has not matched, relative to the determining step 320. Preferably, a prompt indicates or confirms that it is appropriate to proceed, that is to capture the second image. For example, after taking a first picture with a predetermined criteria that has matched, a user is prompted to proceed, to take a second with UV illumination. It is also expected that the second picture could be automatically taken by the device after the predetermined criteria has been met.
In one use case, the predefined criteria in the determining step 320, relates to at least one of a currency, a credit card, a passport, a drivers license and an identification card. For example, the predefined criteria could include an image of a president for currency, a certain font, certain characters, a certain color, a certain geometric size, a certain shape and the like.
The projecting ultra violet illumination step 330 using light source two 297 in
In one use case, when the object is one of a passport, a credit card, a drivers license and an identification card (hereafter document), a third image of a purported owner can be captured. This feature can provide a record of one trying to use a non-authentic, counterfeit or failed document, for the record, if needed. For example, if an underage person tried to gain access to a bar, a record would be made of that persons attempted entry. Thus, the record could include three images, be date and time stamped, include an authenticity score, for the record. For example, the first image could be an image of an ID card or passport, a second image could be the ID Card or passport under UV illumination and the third a picture of the purported owner. In one embodiment, a user can be prompted to focus the camera on the purported owner, for enhanced automation.
In another case, if the object is one of a passport, a drivers license and an identification card, a third picture can automatically be taken when facial recognition senses that a face is framed in the camera, for enhanced ease of use.
In another embodiment, a wireless communication device 200 is disclosed. It can include: a housing 210 including a display 240; a controller 220 coupled to the housing 210, the controller 220 configured to control the operations of a wireless communication device; and an intelligent camera module 290 including an imager 295, a light source 296 and a second light source 297, such as an ultra violet light source. The intelligent camera module 290 is configured to: capture a first image of an object; determine whether the object matches a predetermined criteria; project ultra violet illumination at the object and capture a second image of the object; and compare the second image to a reference file. Advantageously, the wireless communication device 200 can determine purported authenticity of the object.
In a preferred embodiment, the second light source 297 includes an ultra violet light source configured to illuminate an identifier viewable under ultra violet illumination, such as for example, an ultra violet seal, typically found on credit cards, pass ports, identification cards and currency.
In a preferred embodiment, the intelligent camera module 290 includes a detector module 291 configured with optical recognition which can include image recognition, character recognition, visual recognition, facial recognition, color recognition, shape recognition and the like. Advantageously, such optical recognition detecting, can be used to check against a reference file in memory 292, to confirm a threshold authenticity such that the optically recognized image matches the reference file. For example, the comparing step 340 compares to pre-determined like objects, which can provide an authenticity score, to ascertain whether a threshold score is met. Beneficially, optical recognition and authenticity scoring can improve counterfeit detection.
In one use case, the intelligent camera module 290 is configured with a processor 294, to calculate a score and display a result to a user real time. In more detail, in one embodiment, the intelligent camera module 290 is configured to provide a passing mode on the display 240, wherein a prompt indicates that the predetermined criteria has matched, and a failing mode indicating the predetermined criteria has not matched, presented on the display 240. In the case of the passing mode, a prompt can indicate it is appropriate to capture the second image, via display 240.
In another use case, the intelligent camera module 290 is configured to capture a third image, with the imager 295, of a purported owner of a passport, drivers license and identification card or currency. This provides a record of an imposter or currency counterfeiter, for record.
1. A user of a phone takes a picture.
2. If the picture is of an ID or of currency, then a second picture is taken automatically with UV LED enabled in the flash.
3. If the picture is of an ID, then user is prompted to take a third picture of the ID holder (UV LED off).
4. Picture with UV LED is compared to norms and a valid/not-valid indication is given.
5. Picture of the user is compared to the ID picture and a % match score is given.
6. All pictures can be stored as evidence of policy enforcement.
The method and device herein can be customized by network personnel or a service provider, or by a user, to provide a unique user experience.
The device 200 and method 300 are preferably implemented on a programmed processor. However, the controllers, flowcharts, and modules may also be implemented on a general purpose or special purpose computer, a programmed microprocessor or microcontroller and peripheral integrated circuit elements, an integrated circuit, a hardware electronic or logic circuit such as a discrete element circuit, a programmable logic device, or the like. In general, any device on which resides a finite state machine capable of implementing the flowcharts shown in the figures may be used to implement the processor functions of this disclosure.
While this disclosure has been described with specific embodiments thereof, it is evident that many alternatives, modifications, and variations will be apparent to those skilled in the art. For example, various components of the embodiments may be interchanged, added, or substituted in the other embodiments. Also, all of the elements of each figure are not necessary for operation of the disclosed embodiments. For example, one of ordinary skill in the art of the disclosed embodiments would be enabled to make and use the teachings of the disclosure by simply employing the elements of the independent claims. Accordingly, the preferred embodiments of the disclosure as set forth herein are intended to be illustrative, not limiting. Various changes may be made without departing from the spirit and scope of the disclosure.
In this document, relational terms such as “first,” “second,” and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. The terms “comprises,” “comprising,” or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. An element proceeded by “a,” “an,” or the like does not, without more constraints, preclude the existence of additional identical elements in the process, method, article, or apparatus that comprises the element. Also, the term “another” is defined as at least a second or more. The terms “including,” “having,” and the like, as used herein, are defined as “comprising.”