AU779543B2 - Document authentication method and apparatus - Google Patents

Document authentication method and apparatus Download PDF

Info

Publication number
AU779543B2
AU779543B2 AU73942/00A AU7394200A AU779543B2 AU 779543 B2 AU779543 B2 AU 779543B2 AU 73942/00 A AU73942/00 A AU 73942/00A AU 7394200 A AU7394200 A AU 7394200A AU 779543 B2 AU779543 B2 AU 779543B2
Authority
AU
Australia
Prior art keywords
document
receptacle
data
scanned
storage means
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
AU73942/00A
Other versions
AU7394200A (en
Inventor
Martin Alan Scott Graham
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Accudent Pty Ltd
Original Assignee
Accudent Pty Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AUPQ2737A external-priority patent/AUPQ273799A0/en
Application filed by Accudent Pty Ltd filed Critical Accudent Pty Ltd
Priority to AU73942/00A priority Critical patent/AU779543B2/en
Publication of AU7394200A publication Critical patent/AU7394200A/en
Application granted granted Critical
Publication of AU779543B2 publication Critical patent/AU779543B2/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Landscapes

  • Credit Cards Or The Like (AREA)
  • Collating Specific Patterns (AREA)

Description

WO 01/18754 PCT/AU00101081 1 TITLE: DOCUMENT AUTHENTICATION METHOD AND
APPARATUS
BACKGROUND OF THE INVENTION 1. Field of the Invention THIS INVENTION relates to a document authentication method and apparatus.
The invention is particularly suitable for, but not limited to, validation of financial instruments, including cash bank notes), personal cheques, traveller's cheques, credit cards, debit cards and the like.
The invention is also particularly suitable for, but not limited to, the validation of legal instruments such as letters, agreements, licences, bills, and copies photocopies) thereof.
2. Prior Art The counterfeiting of documents, particularly currency, has been a major problem for the authorities for many years. Money issuing authorities Reserve Banks or Mints) have adopted many different methods in an attempt to overcome or minimise counterfeiting of currency and other financial documents, and examples have included features or indicia such as watermarks and holograms. Examples of papers discussing such matters include (1) "Spacial Logic Algorithms Using Basic Morphological, Anologic CNN Operations" (Zarande et al) in "The Proceedings of the 1994 Third WO 01/18754 PCTIAU00/01081 2 IEEE International Workshop on Cellular Neural Networks and their Applications", Rome, Italy, published in the "International Journal of Circuit Theory and Applications" v 24 n 3 May-Jun 1996, pages 283- 300; "Development of Embossed Holograms" (Haines) in "Proceedings of SPIE The International Society for Optical Engineering", v 2652, 1996, Society of Photo-Optical Instrumentation Engineers, Bellingham, WA, United States of America, pages 45-52; "Performance of Diffraction Grating on a Banknote The Experience with the Australian Commemorative Note" (Hardwick) in "Proceedings of SPIE The International Society for Optical Engineering", v 1210, published by The International Society for Optical Engineering, Bellingham, WA, United States of America, pages 20-26; "Optically Variable Devices for use on Bank Notes" (Rolfe) in "Proceedings of SPIE The International Society for Optical Engineering" v 1210, published by the International Society for Optical Engineering, Bellingham, WA, United States of America, pages 14-19; "Evaluation of Security Features for new U.S. Currency" (Church et al) in "Proceedings of SPIE The International Society for Optical Engineering", v 2659, 1996, Society of Photo Optical Instrumentation Engineers, Bellingham, WA, United States of America, pages 28-36.
Whilst such authentication features or indicia can be placed in bank notes, currency or other financial or legal documents, 3 there is a need for financial or legal instruments bearing such indicia, to be rapidly and accurately-identified and authenticated.
SUMMARY OF THE PRESENT INVENTION It is an object of the present invention to provide a method where a document a financial or legal instrument, as hereinbefore described), can be authenticated as either valid, or identified as invalid or counterfeit.
It is a preferred object that the method can be carried out rapidly and accurately.
•10 It is a further preferred object to provide a method which requires minimal hardware requirements.
It is a still further preferred object to provide apparatus Sofor carrying out the method.
I" Other preferred objects will become apparent from the following description.
In one aspect, the present invention resides in apparatus for authenticating a document including: a receptacle to receive a document; means to scan the document as the document enters the receptacle; data transfer means to transfer scanned data from the scanning means; data storage means operable to receive the data; means to scan the document as the document exits the receptacle; the data transfer means transfers the scanned data from the scanning means to the data storage means; and means to delete the scanned data from the data in the data storage means to record the removal of the document from the receptacle; so arranged that: the document can be released from the receptacle when :instructed by the data storage means.
10 Preferably, the features/indicia scanned include o watermarks, holograms, serial numbers, words, devices, colours (eg., patterns, combinations) or other features or indicia printed on, embossed into, incorporated in, or otherwise forming part of, the document.
Preferably, the database contains one or more features/ indicia for comparison by which the authentication of the document may be determined. The document may be authenticated when the features/indicia scanned match the criteria of one or more (but preferably a plurality) of identification components stored in the database.
Preferably, when a document is established to be authentic or otherwise, the signal is transmitted to the location at which the document is scanned to indicate whether or not the document is authentic or otherwise and/or one or more alternative locations, eg., to a security unit.
Preferably, the terminal includes scanning means operable to scan the scanned features/indicia hereinbefore described and means to transport the document past the scanning means.
The scanning means may incorporate one or more scanning heads, each operable to scan one or more features/indicia on the documents.
The database may be provided on the central computer 10 which incorporates the comparator means.
The transmission means may incorporate any suitable communication means, eg., telephony, wireless, infra-red, hardware or the like.
In a second aspect, the present invention resides in a 15 method of authenticating a document including the steps of: scanning the document for one or more pre-existing features and/or indicia as the document enters the receptacle; transferring the scanned data to the data storage means; the document is only released from the receptacle when instructed by the data storage means.
BRIEF DESCRIPTION OF THE DRAWINGS To enable the invention to be fully understood, embodiments will now be described with reference to the accompanying drawings, in which: FIG. 1 is a plan view of a document bank note) to be authenticated; oSe *o *oooo* ooo o go WO 01/18754 PCT/AU00/01081 7 FIG. 2 is a schematic circuit diagram of a first embodiment of the authentication apparatus; FIG. 3 is a front view of a terminal for the first embodiment; FIG. 4 is a schematic circuit diagram of the scanner of the terminal of FIG. 3; FIG. 5 is a schematic diagram of a hand-held scanner operable with the terminal of FIG. 3; FIG. 6 is a schematic diagram of a wallet or note holder of a second embodiment; and FIG. 7 is a schematic diagram of a scanning wand of a third embodiment.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS FIG. 1 is a plan view of a bank note 10 which is an example of a document to be authenticated by the present invention.
The bank note 10 has the following indicia, any one or more of which can be compared against stored indicia: a) serial number 11; b) words 12; c) design (optionally coloured) 13; d) hologram 14; e) signature WO 01118754 PCT/AU00/0108! 8 f) photographic image 16; g) watermark (or embossing) 17; h) micro dots 18; and i) thumb- (or finger-) print 19.
In a first embodiment (see FIGS. 2 and the system 100 consists of an end user terminal 110 (with a document scanner 111 and end user connector 112) connected to a main computer or central server unit 120 centre that has a resident database 121. The database structure 121 is to be hereinafter described. The computer 120 has an input device 122, central processing unit (CPU) 123 and comparing unit 124, the latter comprising the scanned information serial number/signature) with the material stored in the database 121.
The end user terminal 110 can be configured in several different ways. It can be a desktop stand-alone device, that is connected to the system in real time. A portable model is also possible in one application that will enable the operator to be away from the network connection. Another configuration of the end user terminal 110 could be the integration of the terminal into a major piece of business equipment.
The end user terminal document scanner 111 consists of a motorised note tray 117 that is used to draw the note (or document) into and through (or into and out of) the terminal. The WO Ol1n 8754 PCT/AU00/01081 9 note 10 is passed past a pair of scanning heads 113, 114. The scanning heads 113, 114 are doubled to ensure the note 10 can be read no matter which way the note 10 is inserted. (As shown in dashed lines in FIG. 4, the scanning heads 113, 114 may be spaced so that the note 10 passes between them.) The scanning heads contain a number of integrated components, which allow the note to be scanned in several ways. Incorporated in the terminal scanner 111 is an information processing unit 115. The information is passed through a line terminal device 130, that is appropriate to the type of institution where the equipment is installed, to the computer 120.
The motorised tray 117 for the terminal unit 111 allows the note 10 to be pulled past the scanning heads 113, 114 at, preferably, a constant velocity. The motor drive 116 for the rollers 117a of the tray 112 can be preferably set to an almost infinite number of speeds. A motor control unit 118 is integrated into the information processing unit 115 and relies upon an analog (or digital) control mechanism. (It may be manually set by a control 118a.) The type of currency used, the level of identification required and the need for extra analysis can determine the motor control output.
The two identical scanning heads 113, 114 are provided one on each side of the tray 117. In an alternative embodiment, the, or each scanning head may consist of a scanning head with a calibrateable daylight light source and an integrated circuit 115c WO 01/18754 PCT/AUOO/01081 embedded into the head to control the colour analysis process. The scanner 111 may be commercially available and the specification will depend upon the ultimate requirement of the colour analysis unit.
The output of the scanning heads 113, 114 is fed to the information processing unit 115 where the information is filtered and processed.
The information processing unit (IPU) 115 consists of the main processing unit 115a for the information coming from the scanning unit, and an upgradeable memory module with a "flash memory" (or a ROM) 115b. All of the software for the terminal unit 110 and the network interface unit 115 is embedded in the "flash memory" or ROM 115b. The embedding of the software in the "flash memory" or ROM 115b assists in the maintenance of security of the information and to prevent tampering. Within the IPU 115, a security controller is used to monitor the integrity of the unit by monitoring a system of electronic locks and seals throughout the system. Should the integrity of the system be breached, the unit 115 will transmit a security alarm to the network control site via computer 120.
For applications that take the user away from the normal fixed terminal 110, a portable unit 240 (see FIG. 5) will allow the scanning of discrete amounts of information from a note 10 or other instrument. The portable unit 240 scans the area by the user moving the device over the target area the note 10) in a constant motion. The information is stored in the unit 240 and compared WO 01/18754 PCT/AU00/01081 11 initially against any information held within an onboard memory. The device 240 can have information downloaded from the system 110 and will normally be used as a first level device used to identify notes or other instruments that require further detailed investigation.
The unit 240 consists of a small scanning head 213 with an integrated light source 214. The information from the scanning head 213 is fed into a cut-down version of the IPU 215. The portable device 240 contains a cut-down version of the colour analysis circuitry and is used to do preliminary analysis of a designated area on the note. The IPU 215 includes solid state memory that allows the storage of the information gathered from the scan. This information is processed and compared with the information held in memory within the device. Output to the operator is in the form of three lights 241-243 "green" 241 for "passed", "yellow" 242 for "unknown" and "red" 243 for a note 10 that is found to match a number in the memory and requires confiscation or other action as appropriate. (With a yellow light 242, the note 10 may require manual checking for authenticity/damage.) The terminal unit 210 can be integrated into almost all money handling machines and processors 250. These include all types and models of cash drawers 251 or totalisers, all money drop boxes, and the units can also be integrated into most secure money safes. The advantage of the system for money storage is that all of WO 01/18754 PCT/AU00/0108i 12 the notes and instruments in the cash storage device 251 can be itemised and accounted for.
The terminal equipment 111 can be locationally separate due to the modular design of the terminal unit 111. This configuration is ideal where the system is located in an area that needs to remove large holdings of cash from close proximity of the public interface.
The terminal unit 111 can be upgraded in steps to include an integrated EFTPOS terminal, allow for the printing of microdot security devices, validation of magnetic swipe cards and smart cards, the automatic compilation of foreign currency and the instant conversion of foreign currency in real time when connected to the international network. Supporting the system can be an add-on system that will allow individuals and companies to print their own is cheques from their account and incorporate a number of hidden security features that will be able to be detected through the terminal.
These security features may be a mixture of colour and position controlled by a secret embedded algorithm.
The system employs a large distributed database 121 in the central computer 120. The database 121 (for, eg., bank notes) (as a "data vault") may contain bank note numbers/types and files that correspond to its colour analysis profile. This profile is reduced to a number through the use of an algorithm that is a part of the WO 01/18754 PCT/AU00O/01081 13 colour analysis system.
When. a note 10 or other instrument is fed into the terminal unit 111, the embedded software first determines the denomination of the note 10 through the first output of the colour analysis unit 115c. The note 10 is then fully scanned via the outputs of the scanning heads 113, 114, and the information is passed to the information processing unit 115. The information processing unit 115 resolves the serial number 11 of the note and requests the note file from the central server unit 120. When this information is received by the terminal 111, the serial numbers 11 are compared and all of the alarm flags are checked. Where the note 10 meets these tests, the note approval light 111 a is illuminated. Where a note fails one of the tests, a note alarm light 111 b is illuminated and the system activates the video surveillance system 150 to record evidence of the person passing the note. The actual process used in this case will vary depending on the threat and safety profile of the end user.
The software in the terminal unit 111 may be embedded within a "flash memory" or a Read Only Memory (ROM) 115b. The software is preferably written in a 4GL language, or any high level language, and compiled prior to the burning of a ROM or placement in the "flash" memory 115b. This is to allow customisation of the software for each particular site. The software is used to determine the denomination of the note 10 through colour analysis and the WO 01/18754 PCT/AU00/01081 14 structure of all other features/indicia scanned 11-19. Once the scan is completed, the image file is processed to retrieve the note number and a colour profile number is generated.
In a second embodiment (see FIG. portable wallets 310 are designed to enable the safe transit of cash or securities.
The wallet 310 has a scanning head 313 which will record the serial number data 11, via a data writer/reader 316, onto a small retrieval card 314, as the cash 10 is scanned as it enters a storage receptacle 311.
The card 314 will be required to either deposit, or retrieve, notes 10 from the wallet 310. This will enable the safe transit and storage of the wallet 310.
The note 10 can only be retrieved from the wallet 310 if the card 314 is inserted and the data writer/reader 316 instructs a lock 318 to open a door or access panel 319 to the receptacle 311.
In a third embodiment, a small lipstick sized, portable, rechargeable scanning wand 410 (see FIG. 7) enables designated cash notes 10 to be scanned, for instance, in the hotel room before going out shopping. The serial numbers 11 of the scanned notes are scanned via a scanning head 413 and stored on a memory unit 415 stored in the wand 410. If the cash (or a wallet/purse containing the cash) is stolen, the wand has a record of the stolen note(s).
An add-on or integrated system associated with a mobile WO 01/18754 PCIIAU00/01081 phone 430 may be used to transmit the stored serial numbers 11 to the central database computer 120 to allow the serial numbers of the notes to be notified to the authorities, eg., police. The unit can also be used to enable a cheque or cash to be cleared at a remote location purchasing a car on the week-end with a cheque).
The operation of the database 121 will now be described.
The database 121 for currency/bank notes 10 is established as follows: Notes 10 are scanned into the system at the Mint. The serial number 11 and any microdot (or other) security patterns 12-19 are confirmed and stored as a new masterfile and finally a master note image is recorded. From this master image, a reference colour is set and captured.
All legitimate serial numbers 11 of all notes 10 and denominations that have been issued by the Mint are on the database.
If a scanned serial number 11 does not match with a serial number 11 legitimately issued by the Mint, an alarm will be sent to the terminal unit 110 via a light or other type of silent alarm.
If a note 10 is presented to the system that creates an image file outside the tolerances of acceptability, the serial number or the masterfile will be marked and the note 10 will be withdrawn from WO 01/18754 PCT/AU00/01081 16 circulation when presented at a banking interface.
The system will allow the banks to automatically separate the worn, torn damaged and incomplete notes.
It is envisaged that new types of notes will be created to incorporate new colour encryption devices, colour encrypted watermarks, and microdot 18 colour patterns through 16.7 million colours each tied to the serial number. This mark will, in turn, be able to be used to independently verify the validity of the note offline.
In line with new technologies, the clear hologram window 14 can be used to verify the unique polymer colour to add to the overall analysis of the note. This will mean that any particular note will be able to be independently verified with a number of different and independent tests.
Forging of the note 10 will require: a) knowledge of the colour serial number link; b) knowledge of the encrypted watermark 17; c) the use of the correct polymer blend; d) a valid serial number 11 from the Mint.
Cheques can have a colour dot serial number link and a link to the signature. The cheque can also, using this feature, have a unique PIN (personal identification number), which will allow the instant authorisation of the cheque.
For ultra secure company cheques, the cheques can be WO 01118754 PCT/AU00/01081 17 made up at the company and specially printed with a microdot pattern that gives an audit trail in the company to the process used to draw the cheque. This will allow cheques to be made up on demand and the machine can code all of the information into the cheque pattern prior to issue.
Another device that can be used to secure the cheque and can be used for travellers cheques is a thumbprint. This print pad can be a polymer that dries quickly when exposed to air. When the cheque is used, the top is peeled off the square and the print made.
Within a very short time, the print dries and the cheque is presented.
The scanner detects the image and compares it against a file entry of allowable prints.
Thumb cheques do not require a signature. It is hard to forge a fingerprint and the person who signs the cheque is secret and no name needs to be on the cheque. The cheque can be authorised upon presentation to the bank or other financial institution. Security devices can be built into the cheque and if a person is made to validate the cheque under duress, a duress fingerprint can be used.
Th system will be able to recognise the duress alarm and activate the security procedures.
Signatures can be unreliable, for instance, after injury or with Parkinsons Syndrome. Using the system, a validated signature file can be automatically updated. Validation can use a mixture of WO 01/18754 PCT/AU00/01081 18 personal verification and advanced software tools such as fractals and chaos analysis.
Travellers cheques can have serial number and PIN identification, and can also incorporate a duress PIN feature and/or can use the polymer thumbprint devices. A PIN signature can be digitally encrypted into the travellers cheque. Stolen cheques can be easily traced and dishonoured.
The system prevents business from: 1. Theft.
All notes stored on the business premises, as scanned, will be on file. If robbed, the owner only needs to press an alarm code and the details of all of the notes on file are transmitted to the security section of the system and marked immediately as stolen.
This information is then passed to all of the relevant authorities.
2. Misappropriation.
All scanned notes can be put into a database and the business owner knows with confidence the amount of cash flow through the business in relation to stock held or sold.
3. Theft/Misuse of Cheques (Personal and Travellers).
A client is requested, upon opening an account at a financial institution, to supply: a) A PIN (personally selected); b) Signature; WO 01/18754 PCT/AU00/01081 19 C) Finger prints designated finger for approval; and (ii) designated finger for alarm.
d) Usual identification documentation.
The PIN, signature and fingerprints are all ditigized and stored in the secure database. Whenever a cheque is presented to a terminal, the relevant sections of the captured image are analysed and compared to the master files in the relevant databases (eg., fingerprint and signature databases).
In addition, a secure PIN number may be entered into the terminal allowing instant cheque clearance, much like current plastic credit cards.
An additional feature of the EFTPOS type terminal could include a small digitizer pad for fingerprint authentication. This could either replace the current PIN number authentication or be used as an added layer of security.
Digital signature comparison to master files could be included which compares the signature on the credit card with the master file signature as well as comparison with the client created signature at the site of cash dispersal.
All inconclusive results will be referred to a central service centre for attention.
Databases (with ongoing upgrade) can store the following information: WO 01118754 PCT/AUO0/O1081 a) valid note files include image and serial numbers; b) valid note serial numbers; c) stolen/missing note registry (NB: a drug dealer who obtains his cash from various drug dealers could potentially be apprehended as he deposits the cash into his/her account, as much of the cash will probably have been stolen in armed robberies, etc.); d) destroyed note registry; e) damaged note registry (notes earmarked for removal and destruction); 0 f) fingerprint digitized image files; g) signature digitized image files; h) PIN number client registry.
System uses include: a) security all notes scanned into the system, 5 whether in the till, a cash box, safe or wallet, etc.; b) counterfeit detection; c) damaged note detection; d) identification of money laundering and other illegal currency transactions (once the system comes into general use, 0 individual notes can be tracked).
The proposed system (in one or more embodiments) is designed to enable one or more of the following; 1. Cash, personal cheques and travellers cheques to 1 2 WO 01/18754 PCT/AU00/01081 21 be assessed for authenticity at the point of presentation.
2. Cash notes, serial numbers and computer image files to be stored at secure national processing laboratory in addition to a central international centre.
3. Cash serial numbers, which enter the system, are compared to master files of authentic serial numbers supplied by the national Mint.
4. Cash serial numbers, which enter the system, are compared to master files of stolen note serial numbers.
5. Cash serial numbers, which enter the system, are compared to other note serial numbers currently stored within the system to see if any duplications are present.
6. Recording and deleting of note serial numbers as they enter and leave the till at the end user interface. This allows a digital record of cash transactions going through the till, in addition to recording the serial numbers of notes held within the till should a thief occur.
7. Colour and image analysis of presented tender, identifying damaged notes which are then recorded centrally and digitally tagged to allow their removal from circulation at an appropriate location.
8. Appropriate law enforcement agencies to be notified of any stolen or forged notes presented to the system or any WO 01O18754 PCT/AU00/01081 22 notes stolen from the system.
9. Integration of the system into secure tills, secure cash transportation boxes and safes.
Remote cash authentication using either a conventional mobile phone with a specifically designed clip-on scanner, or an integrated mobile phone with built-in scanner.
Customers can dial into the national centre, enter a PIN number and then scan the notes at the point of sale.
11. Option of small, lipstick sized optical scanner, which can be manually rolled over the serial number on a cash note.
This serial number is compared to stored numbers within the ROM within the device. The device is battery powered and the ROM is upgradeable.
12. The tracking of individual notes as they move throughout the market (once the system has been fully implemented within a nation).
13. Integrated internationally operation centre will notify other national centres and law enforcement agencies leg., FBI) of stolen or forged foreign currency and notes.
14. Personal and travellers cheques can be cleared by using a personal PIN number as well as a signature upon presentation to the system.
Personal cheques presented to the system can be WO 01/18754 PCT/AU00/01081 23 electronically checked against account balances (in a similar fashion to plastic cash cards).
16. Clients' signatures and/or finger prints can be scanned into the system when an account is opened at a financial institution. This master signature file can then be compared against signatures and/or finger print admitted to the system at a later date upon cheque presentation (the fingerprints can be read in "real time" for the cashing of cheques/access to secure areas).
17. Special cheques to be manufactured, which allow a finger print to be placed on the cheque in place of or in addition to a signature. A region of the cheque can have a peel of polymer cover which reveals a polymer pad which enables a fingerprint to be made.
The polymer pad solidifies a few seconds after the peel off cover has been removed. Customers can designate the finger they wish to use and can include an alarm finger. Fingerprints allow a degree of anonymity and allow disabled people leg., Parkinsonism, etc.) to avoid the signature process.
18. Photocopiers where "secure" documents having identifying features/indicia can only be copied by authorised persons.
19. Photographs/video images can be stored and compared for recognition purposes.
All the data can be stored in a central "data vault", where third parties are billed each time they access the data WO 01/18754 PCT/AU00/01081 24 to check the authentication/recognition of a document, etc.
It will be readily apparent to the skilled addressee that the range of potential applications is limitless.
Various changes and modifications may be made to the embodiments described and illustrated without departing from the present invention.

Claims (8)

1. Apparatus for authenticating a document including: a receptacle to receive a document; means to scan the document as the document enters the receptacle; data transfer means to transfer scanned data from the scanning means; data storage means operable to receive the data; means to scan the document as the document exits the e receptacle; the data transfer means transfers the scanned data from the scanning means to the data storage means; and means to delete the scanned data from the data in the data storage means to record the removal of the document from the 15 receptacle; so arranged that: S"the document can be released from the receptacle when instructed by the data storage means.
2. Apparatus as claimed in Claim 1 wherein: the documents are bank notes and the serial numbers thereof are scanned as the bank notes enter and exit the receptacle to enable a digital record of cash transactions and to record the serial numbers of bank notes held in the receptacle should theft occur.
3. Apparatus as claimed in Claim 1 or Claim 2 wherein: 26 the document is scanned for one or more pre-existing features and/or indicia and the scanned data is compared with a master file in the data storage means, the master file is being updated to record changes in the scanned features and/or indicia of the document.
4. Apparatus as claimed in any one of Claims 1 to 3 wherein: the data storage means is a card means operable to receive the data, and a card reader associated with the receptacle, the document only being releasable from the receptacle when the card means is placed in, or read by, the card reader.
Apparatus as claimed in any one of Claims 1 to 4 wherein: the receptacle is a cash drawer, cash register, money 15 drop box, cash box, wallet or the like.
6. Apparatus according to Claim 4 wherein: S"the means to scan the document is a scanning head operable to scan the document .for one or more pre-existing-identifying-- features and/or indicia; and the data storage means includes a data writer operable to record the data onto the card means.
7. Apparatus according to Claim 1 wherein: the data storage means is an information processing unit connectable to a computer.
8. A method of authenticating a document including the steps of: scanning the document for one or more pre-existing features and/or indicia as the document enters the receptacle; transferring the scanned data to the data storage means; and scanning the document as the document exits the receptacle; and S deleting the scanned data from the data storage means to record the removal of the document from the receptacle; so arranged that: the document is released from the receptacle when instructed by the data storage means. 4o
AU73942/00A 1999-09-08 2000-09-08 Document authentication method and apparatus Ceased AU779543B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU73942/00A AU779543B2 (en) 1999-09-08 2000-09-08 Document authentication method and apparatus

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
AUPQ2737A AUPQ273799A0 (en) 1999-09-08 1999-09-08 Document authentication method and apparatus
AUPQ2737 1999-09-08
AU73942/00A AU779543B2 (en) 1999-09-08 2000-09-08 Document authentication method and apparatus
PCT/AU2000/001081 WO2001018754A1 (en) 1999-09-08 2000-09-08 Document authentication method and apparatus

Publications (2)

Publication Number Publication Date
AU7394200A AU7394200A (en) 2001-04-10
AU779543B2 true AU779543B2 (en) 2005-01-27

Family

ID=25637449

Family Applications (1)

Application Number Title Priority Date Filing Date
AU73942/00A Ceased AU779543B2 (en) 1999-09-08 2000-09-08 Document authentication method and apparatus

Country Status (1)

Country Link
AU (1) AU779543B2 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106837058A (en) * 2017-01-13 2017-06-13 珠海易时代科技有限公司 A kind of high security refers to vein safe cabinet system and unlocking method

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5818021A (en) * 1996-12-03 1998-10-06 Szewczykowski; Jerzy Method for identifying counterfeit negotiable instruments

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5818021A (en) * 1996-12-03 1998-10-06 Szewczykowski; Jerzy Method for identifying counterfeit negotiable instruments

Also Published As

Publication number Publication date
AU7394200A (en) 2001-04-10

Similar Documents

Publication Publication Date Title
US6764000B1 (en) Document authentication method and apparatus
CA2304281C (en) Intelligent currency validation network
US8959029B2 (en) System, apparatus, and methods for currency processing control and redemption
US7433844B2 (en) Automated banking machine currency tracking method
US7513413B2 (en) Correlation of suspect currency note received by ATM to the note depositor
EP1041523A2 (en) Transaction recordal and validation
US20060157559A1 (en) Systems and methods for document verification
US20030085271A1 (en) Automated banking machine currency tracking system
WO1999022344A1 (en) Fraud prevention method and system
IL109199A (en) Identification system
EP1275089A2 (en) Biometric authentication card, system and method
CA2465116C (en) Automated banking machine currency tracking system and method
JP4890774B2 (en) Financial transaction system
US5863074A (en) Fraud inhibiting personal check and method
CN1744139B (en) Automatic trading device
JPH10157352A (en) Ic card, and personal information administration system using the ic card
AU779543B2 (en) Document authentication method and apparatus
WO1997015032A1 (en) System for the safe authentication and management of registered credit instruments and documents
GB2398270A (en) Document with user authentication.
CA2356314C (en) Activable document and system for acktivable documents
JPH10320517A (en) Identity authentication method and device therefor using mark invisible to naked eye
EP1179810A1 (en) Security documents data exchange system
CA2239627C (en) Credit card with digitized finger print and reading apparatus
GB2362743A (en) Inhibiting fraudulent transactions
Ram Immigration and National Security: Best Practices

Legal Events

Date Code Title Description
MK1 Application lapsed section 142(2)(a) - no request for examination in relevant period
NB Applications allowed - extensions of time section 223(2)

Free format text: THE TIME IN WHICH TO REQUEST EXAMINATION HAS BEEN EXTENDED TO 20030223