EP1066553A2 - Sicherheitsdokumente - Google Patents

Sicherheitsdokumente

Info

Publication number
EP1066553A2
EP1066553A2 EP98945909A EP98945909A EP1066553A2 EP 1066553 A2 EP1066553 A2 EP 1066553A2 EP 98945909 A EP98945909 A EP 98945909A EP 98945909 A EP98945909 A EP 98945909A EP 1066553 A2 EP1066553 A2 EP 1066553A2
Authority
EP
European Patent Office
Prior art keywords
document
machine
information
readable
secure
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP98945909A
Other languages
English (en)
French (fr)
Other versions
EP1066553A4 (de
Inventor
Robert Christiansen
Robert T. Durst, Jr.
Jonathan D. Greene
Lester H. Keepper, Jr.
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Neomedia Technologies Inc
Original Assignee
Neomedia Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Neomedia Technologies Inc filed Critical Neomedia Technologies Inc
Publication of EP1066553A2 publication Critical patent/EP1066553A2/de
Publication of EP1066553A4 publication Critical patent/EP1066553A4/de
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/12Card verification
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • G07D7/0043Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip using barcodes
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means

Definitions

  • This invention relates to secure documents and in particular to the utilization of electromagnetic wave emission characteristics and machine-readable symbols in order to create secure documents .
  • a method of generating and verifying secure documents such as checks, money orders, traveler's checks, passports, shipping labels, food stamps, and electronic fund transfers comprising machine-readable symbols.
  • the secure document is printed with machine- readable symbols representing physical parameters of the secure document prior to application of hand or machine- printed indicia.
  • the secure document is printed with machine-readable symbols representing information not representative of physical parameters of the secure document prior to application of indicia such as human and/or machine-printed indicia appearing thereon, biometrics (finger and voice prints) , and transaction history.
  • a two-stage imaging or watermark process captures an image of indicia
  • J within an area defined by a ultraviolet coating, prepares a bit map thereof and encodes the bit map and/or a derivative thereof in machine-readable symbols that are then printed on the secure document.
  • Intrinsic verification of the secure document is accomplished by comparing actual physical measurements and scannings of the secure document with data content of the machine-readable symbols appearing on the secure document.
  • Extrinsic verification of the secure document is accomplished by comparing information content resident in local and/or remote databases concerning the secure document or its transfer with data content of the machine-readable symbols appearing on the secure document.
  • a fourth embodiment which tracks the secure document in the form of a check using both intrinsic and extrinsic verification, which provides the advantage of increasing the amount of time in which the payor bank must make the decision to finalize payment on the check.
  • a fifth embodiment provides a method for tracking the secure document in the form of a money order, which provides the advantage of intrinsic and extrinsic verification of authenticity by virtually every entity involved in the transfer of the money order.
  • a sixth embodiment provides a method for tracking the secure document in the form of a food stamp, which provides the advantage of intrinsic and extrinsic verification of authenticity by virtually every entity involved in the transfer of the food stamp and, thus, removal of the need for government entities to maintain costly reserves in contemplation of fraudulent food stamps.
  • a seventh embodiment provides a method for tracking a secure document which embodies an electronic fund transfer, which provides the advantage of intrinsic and extrinsic
  • the present invention encompasses a method of authenticating secure documents, comprising the steps of manufacturing blank secure documents comprising secure portions, the secure portions comprising predetermined emission spectrum and characteristics upon exposure to electromagnetic radiation of a predetermined wavelength; applying handwritten and machine printed indicia to the blank secure document; scanning the secure document in order to obtain an image; developing a bit map or derivative thereof from the image; maintaining a database comprising the predetermined emission spectrum, characteristics, wavelength, indicia and bit map or derivative thereof and image as well as additional relevant information concerning the secure document and transactions involving the secure document; encrypting the predetermined emission spectrum, characteristics, wavelength, indicia and bit map or derivative thereof; compressing the encrypted predetermined emission spectrum, characteristics, wavelength, indicia and bit map or derivative thereof; encoding the compressed predetermined emission spectrum, characteristics, wavelength, indicia and bit map or derivative thereof into machine-readable symbols; printing the machine-readable symbols on the blank secure document; obtaining the emission spectrum, characteristics, wavelength, indicia and bit map or derivative thereof from the secure document;
  • Fig. 1 illustrates a negotiable instrument comprising an electromagnetic wave emissive machine-readable snippet of the present invention.
  • Fig. 2 illustrates an exploded view of the electromagnetic wave emissive machine-readable snippet of the present invention comprising a linear bar code.
  • Fig. 3 illustrates an exploded view of the electromagnetic wave emissive machine-readable snippet of the present invention comprising a two-dimensional bar code
  • Fig. 4 illustrates a money order comprising the electromagnetic wave emissive machine-readable snippet of the present invention.
  • Fig. 5 illustrates a passport comprising the electromagnetic wave emissive machine-readable snippet of the present invention.
  • Fig. 6 illustrates a shipping label comprising the electromagnetic wave emissive machine-readable snippet of the present invention.
  • Figs. 7A and 7B are block diagrams illustrating a method for generating and verifying a secure document utilizing the electromagnetic wave emissive machine-readable snippet of the present invention.
  • Fig. 8 is a block diagram illustrating a method for expediting information to financial institutions required in order to decide whether to pay or dishonor a check utilizing the electromagnetic wave emissive machine- readable snippet of the present invention.
  • Fig. 9 is a block diagram illustrating a method for circulating a secure money equivalent utilizing the electromagnetic wave emissive machine-readable snippet of the present invention.
  • Fig. 10 is a block diagram illustrating customer support services provided by a service bureau shown in Fig. 9.
  • Fig. 11 is a block diagram illustrating a method for distributing a secure food stamp utilizing the electromagnetic wave emissive machine-readable snippet of the present invention.
  • Fig. 12 illustrates a negotiable instrument comprising an electromagnetic wave emissive machine-readable snippet of the present invention further comprising watermarks .
  • Figs. 13A-C is a flow chart illustrating a two- stage imaging or watermark process of the present invention.
  • Fig. 14 is a block diagram illustrating issuing and verification hardware packages to implement the two- stage imaging or watermark process of Figs. 13A-C.
  • Fig. 15 is a block diagram illustrating a recursive implementation of the two- stage imaging or watermark process of Figs. 13A-C.
  • Fig. 16 is a block diagram illustrating a method for distributing a secure suspended EFT utilizing the electromagnetic wave emissive machine -readable snippet of the present invention.
  • Fig. 17 is a flowchart illustrating a method for issuing secure money orders.
  • Fig. 18 is a flowchart illustrating a method for issuing secure gift certificates.
  • Fig. 19 illustrates a credit card and a money order comprising a travelling signature card embodiment of the present invention.
  • Fig. 1 illustrates a negotiable instrument in the form of a check 12 comprising an electromagnetic wave emissive machine-readable snippet 10 of the present invention.
  • the check 12 also comprises zones having information or indicia imprinted therein, typically found on all commonly issued checks such as a drawer's name and address zone 14; a payee's name zone 16; a numerical amount zone 18; an alphanumeric amount zone 20; a memo zone 22, a check number zone 24; and a drawer's signature zone 26. These zones may additionally utilize the techniques of the prior art disclosed in U.S. Pat. Nos.
  • Fig. 2 illustrates the electromagnetic wave emissive machine-readable snippet 10 of the present invention which comprises a machine-readable symbol, or in the case of Fig. 1, a linear bar code 28 within a coating or ultraviolet (UV) snippet 30 which exhibits predetermined luminescent, phosphorescent or fluorescent properties.
  • the order of application of the machine-readable symbol 28 with respect to the coating 30 is not critical to the scope of the present invention. However, the order may be important during the scanning and detection steps depending upon the characteristics of the application processes.
  • the preferred embodiment or most likely scenario is that the coating will be applied by, for instance, using a lithographic technique during the manufacture of the blank check 12 or stock and the machine-readable symbol 28 will be printed over the coating 12 at some point thereafter.
  • the machine-readable symbol 28 is printed by the drawer prior to issuance of the check 12 and/or the check printing company prior to making the checks available to the drawer. Thereafter, an attempted alteration of the machine-readable symbol 28, such as by "shaving" off the machine-readable symbol 28 from the surface of the check 12, will likely either deface the coating 12 or render it non-uniform which becomes obvious upon inspection during verification by means well known in ⁇ the art. For instance, areas in which the coating 12 is removed will appear as darkened areas against the lighter background of the uniform coating under, for instance, ultraviolet light.
  • Fig. 3 illustrates substitution of a two- dimensional bar code 36 for the linear bar code 28 illustrated in Figs. 1 and 2.
  • the two-dimensional bar code such as the two-dimensional portable data file PDF 417, comprises multiple rows of codewords.
  • Each codeword is a mark pattern comprising a plurality of elements or marks.
  • the marks can be of various heights, as in a linear bar code, or can be of a relatively small height to form a "dot code" .
  • each codeword belongs to a specific family or set of mark patterns that conforms to a particular descriptive rule which governs a characteristic of each mark pattern, for instance, a rule about the width of each mark and the total width of each mark pattern.
  • the codewords in any two adjacent rows are written in mutually exclusive subsets of the mark-pattern set (although in some embodiments the union of the subsets is not exhaustive of the set itself) .
  • each subset of the mark-pattern set is defined so that it includes as valid codewords for that subset, only those mark patterns that satisfy certain discriminator-
  • Such a two-dimensional bar code is able to achieve storage of up to 1 kilobyte of memory within an area of one to four square inches which represents approximately 250 English words- -about the size of a page or screen display.
  • U.S. Patent No. 5,504,322 describes such a two-dimensional bar code in greater detail and is hereby incorporated by reference .
  • FIGs. 4-6 Additional applications for the electromagnetic wave emissive machine-readable snippet 10 of the present invention are illustrated in Figs. 4-6 in the form of a money order, passport and shipping label, respectively. These applications are merely intended as examples of potential uses for the present invention and as such represent only a small subset of applications which would benefit from the many security advantages provided by the present invention.
  • One embodiment of the present invention comprises utilizing machine readable symbols printed on the secure document in order to ensure the authenticity of the blank secure document or stock.
  • Physical parameters and characteristics of the stock such as the wavelength of light required to excite the coating to a predetermined emission spectrum; the emission spectrum of the coating for instance, the wavelength of light emitted upon exposure to a predetermined source of electromagnetic energy, etc.; manufacturing run identification or stock number; identification of the printer used to lithograph the stock, and a template or identi ication of quantity, location, size and characteristics of the coated areas appearing on the secure documents in order to guide and align the reader,
  • Such information may be optionally encrypted, compressed, encoded into machine-readable symbols and applied by the manufacturer or lithographer responsible for applying the coating to the stock.
  • the information may be encoded in micro PDF represented by the absence of ultraviolet ink including the name of the printing facility, the location of the printing facility, the identification number of the printing machine, the customer's name, the date of the printing run, and the number of UV snippets appearing on the document.
  • the manufacturer of the stock could supply relevant information to a service bureau that would optionally encrypt, compress and encode the information into machine readable symbols and return the symbols to the manufacturer of the stock for application to the stock.
  • the issuer of the secure document could optionally encrypt, compress and encode this information into machine readable symbols and apply the symbols to the stock if this information were made available in some way such as on the packaging of the stock which could be sold comprising a variety of different values for these parameters.
  • the machine-readable symbol could take the form of micro PDF or could even be alphanumeric representation requiring scanning by Optical Character Recognition (OCR) techniques.
  • Figs. 7A and 7B illustrate a flowchart which describes a detailed approach to the generation and verification of a secure document utilizing the electromagnetic wave emissive machine-readable snippet 10 of the present invention.
  • a blank secure document is manufactured comprising secure portions which are coated, impregnated or otherwise treated with a substance exhibiting a predetermined and specific spectral emission characteristics (emission of electromagnetic radiation of a wavelength in the range of 539-549nm) in response to exposure to electromagnetic radiation of a specified wavelength (ultraviolet light) .
  • These secure portions may also be referred to as ultraviolet snippets or a coating.
  • the secure document could be in the form of money orders, gift certificates, passports, deeds, wills, licenses, packaging labels, negotiable instruments, titles, tickets, letters traveler's checks, food stamps or any other document for which secure verification of authenticity would be a ⁇ 3 useful attribute.
  • a user would then insert the blank secure document into a printer and invoke a program on a computer in step 44 which is adapted to encode information entered by the user into machine-readable symbols suitable for printing on top of the ultraviolet snippet .
  • Typical information which the user might enter during step 46 in order to authenticate the document comprises the following:
  • biometrics e.g., fingerprints by scanning or otherwise capturing an image of the fingerprint and digitizing it prior to encoding it in machine readable symbols
  • infometrics such as a birthdates, social security numbers, personal identification numbers (PIN's), demographics of those in the chain of negotiation, signatures (e.g., digital signatures or a digitized version of a handwritten signature such as that disclosed in U.S. Patent No.
  • the information entered by the user is optionally encrypted during step 48, optionally compressed during step 49 and encoded into machine-readable symbols during step 50 by any of the numerous techniques well known in the art.
  • the machine-readable symbol is then printed on the secure document in step 52.
  • the user then completes the remaining areas on the secure document by hand or keyboard entry into the personal computer in step 54 and issues the secure document in step 56.
  • This essentially ends a secure document generation phase of the process utilizing the electromagnetic wave emissive machine-readable snippet 10 of the present invention.
  • the generation process described above could alternatively or in addition be performed by the printer who prints information on the check after the lithographer coats the check but before the user who issues the check.
  • the secure document is ready to be issued, distributed, transferred or stored until needed.
  • the secure document may be transferred to a retail establishment, customs authority, or shipping company, respectively, which then performs intrinsic and/or extrinsic verification upon the secure document.
  • the secure document verification phase begins with insertion of the secure document into a scanner that scans both the machine-readable symbol as well as the human- readable information content of the secure document in step 60.
  • Data content contained in the scanned machine-readable symbol is then decoded in step 58, decompressed in step 61 and decrypted in step 62 if the machine-readable symbol was compressed and encrypted during the secure document generation phase.
  • the information content found in the human-readable information on the secure document and the data content found in the machine-readable symbol on the secure document may then be displayed in order to enable verification in step 66 by comparison between them or automatically verified without human invention.
  • the comparison results in a match between the data content of the machine-readable symbol and the information content of the human-readable information then the secure document will have successfully completed the secure document verification phase.
  • An unsuccessful match indicates an error in the secure document generation phase or a fraudulent alteration of the secure document thereafter.
  • the comparison may also take into account information obtained via outband resources or that information not obtained through inspection of the physical document but rather through queries of local or remote databases. For instance, information that would typically not appear on the face of the document would be digitized images of fingerprints, birthdates, mother's maiden names, etc.
  • the comparison step 66 specifically involves a two step process.
  • the first step subjects the ultraviolet snippet to a predetermined wavelength of light.
  • the actual spectral emission characteristics of the ultraviolet snippet are then captured, analyzed and verified against a set of expected spectral emission characteristics, and if the two are within a predetermined tolerance or range, then the ultraviolet snippet will be considered to be authentic.
  • the set of expected spectral emission characteristics might be predetermined and fixed in the comparison step 66 in advance, transmitted via outband resources such as local or remote databases specifically for the verification phase or contained within the machine-readable symbol as suggested in section (I) (B) above. In this way a physical measurement (i.e. the expected spectral emission characteristics) is taken, the results are reduced to a data element (i.e., a digital value which represents the expected wavelength of light emitted from the ultraviolet snippet) and the data element is represented in the modulation of the physical
  • /t variable i.e., the expected wavelength of emitted light is encoded and optionally encrypted and compressed in machine- readable symbol which is applied to the secure document of the present invention
  • the second step of the comparison involves verification of the data content of the machine-readable symbol (which is decoded and optionally decrypted and decompressed from the machine-readable symbol) against the information content of the human-readable information on the secure document as well as additional information made available to the verification process via local and remote resources and databases. For instance, by digitizing the drawer's signature (via means disclosed in U.S. Patent No. 5,138,140) and encoding it into machine-readable symbol the typical signature card which is kept on file for each of the customers of a financial institution could be merged with the negotiable instrument thereby providing additional means with which to ensure the authenticity of the negotiable instrument.
  • a secure document 146 comprises the same zones covered with fluorescent coating ("UV snippets") as those illustrated in Fig. 1.
  • UV snippets fluorescent coating
  • one or more of the UV snippets have been printed with machine-readable symbols 148 in addition to the handwritten or printed indicia.
  • the machine-readable symbols 148 are not restricted to being printed within the UV snippets, however, locating them there will provide the added benefit of security against alterations such as erasures.
  • Figs. 13A-C illustrates a flow chart of a method to create, issue and verify such secure documents as the check 146 illustrated in Fig. 12. n The first step in the flowchart of Fig.
  • step 13A is to manufacture a blank secure document in step 150 which may comprise a negotiable instrument such as the check 146, money order, gift certificate or any document which would benefit from increased security against alteration and verification of authenticity.
  • a user or issuer then completes the secure document by hand or machine in step 152 and invokes an issuing hardware/software package which could run on a personal computer in order to encode information into machine-readable symbols in step 154.
  • the completed secure document is then inserted into the issuing hardware/software package or scanner in step 156 which scans the handwritten or printed indicia within the UV snippets and prepares a bit map comprising pixel coordinates which digitally describes the relative location of the handwritten or printed indicia with respect to the UV snippet in step 158.
  • the scanner is guided by the UV snippet, which defines the area of interest and indicia to be scanned.
  • Limiting the area of interest to the UV snippet reduces the probability of misreads due to dirt, dust and other environmental agents and factors which appear on the face of the secure document as well as imperfections in the blank secure document or stock which are not critical to the verification process.
  • An additional advantage of limiting the field of interest to the UV snippets is that the overall speed of the scanning process is increased by reducing the area that is to be scanned.
  • the imaging process essentially involves sampling the UV snippet by superimposing a grid over the UV snippet and examining the energy output from each box or pixel of the grid with a sensor. The output from each box is then converted to an electrical signal .
  • a quantization process assigns a number to each of the electrical signals.
  • the result of the quantization process is a bit map or a matrix of numbers that digitally represent the scanned image .
  • bit map itself or some indirect representation of it such as a cyclic redundancy check sequence (CRC) , checksum, or hash function in decision 160. If the bit map will be used as the basis of the machine-readable symbol then the bit map is optionally encrypted, optionally compressed and encoded into machine-readable symbols (such as the two dimensional bar code illustrated as the machine-readable symbol 148 in Fig. 12) in steps 162, 164, and 166, respectively.
  • CRC cyclic redundancy check sequence
  • the bit map is not used then the hash function, checksum or an equivalent algorithm well known in the art is applied to the bit map in order to derive a distinguishing output which is optionally encrypted, optionally compressed and encoded into machine-readable symbol in steps 168, 170, and 172, respectively.
  • the machine-readable symbols After the machine-readable symbols have been printed on the secure document in step 174 it is issued in step 176.
  • the machine-readable symbols function as a "Watermark" which verifies the authenticity of handwritten as well as machine-printed indicia on the secure document according to the relative position of such indicia with respect to a predetermined UV snippet .
  • the receiver of the secure document or one who desires to intrinsically or extrinsically verify its authenticity scans the UV snippets on the secure document by inserting the secure document into a verification software/hardware package in step 178 which will decode the machine-readable symbols in step 180. If the information encoded into machine-readable symbols is a bit map then it is optionally decompressed, optionally decrypted, decoded and compared with the bit map of the indicia appearing on the face of the secure document within the UV snippets in steps 184, 186, and 188, respectively.
  • the information which has been encoded into machine-readable symbol is not a bit map then the information is optionally decompressed, optionally decrypted, decoded and compared with the CRC sequence, checksum, hash function or substantially similar information derived from the bit map of the indicia appearing on the face of the secure document in steps 190, 192, and 194, respectively.
  • the values compared in steps 188 or 194 are not equivalent then the secure document is indicated as not authentic and/or comprising material alterations in step 200.
  • the verifier may compare the scanned information to a relevant local or remote database in order to extrinsically verify the secure document.
  • Fig. 14 illustrates an embodiment of an issuing hardware package 202 and a verification hardware package 204 for implementing the method illustrated in Figs. 13A-C.
  • £ 0 blank secure document or stock 206 is completed by hand or machine yielding a completed document 208.
  • the completed document 208 is inserted into an issuing scanner 210 in order to capture an image of the handwritten and/or machine printed indicia appearing thereon.
  • This image is used by an issuing computer 212 in developing a bit map and/or derivative thereof by techniques well known in the art and described above.
  • the issuing computer 212 Upon optionally encrypting, optionally compressing and encoding the bit map and/or derivative thereof into machine -readable symbols the issuing computer 212 provides an issuing printer 214 with appropriate information to enable the issuing printer 214 to print machine-readable symbols representative of the bit map and/or derivative thereof on the completed document 208, which has been inserted into the issuing printer 214.
  • a watermarked document 216 comprising machine -readable symbols is then ready for secure issuance, circulation, storage or verification.
  • the watermarked document 216 In order to verify the watermarked document 216 it is inserted into a verifying scanner 218 which scans the UV snippets, thereby obtaining an image of indicia appearing on the watermarked document 216. A bit map and/or derivative thereof is developed from the image and compared to the machine-readable symbols that have been optionally decompressed, optionally decrypted and decoded in a verifying computer 220. If the components of this comparison are substantially equivalent then the watermarked document 216 has been successfully verified.
  • FIG. 12 An additional embodiment of the two-phase imaging watermark process is illustrated in Fig. 12 in the alphanumeric amount zone 20 as an additional machine readable symbol 149. As illustrated in Fig. 15, after
  • the additional machine readable symbol 149 may be applied to any or all zones on the secure document in substantially the same manner, except that the additional machine readable symbol 149 will now reflect the presence of the first machine readable symbol 148 as well as any prior machine readable symbol.
  • Any number of machine readable symbols 149 may be recursively placed on the secure document (representing the indicia within a zone and any or all prior machine readable symbols already printed in the zone) in order to describe any one or more coated areas or UV snippets as shown in steps 224 and 226, thereby yielding a mult-level watermarked document 228 (comprising in the case illustration three levels of security against alteration) .
  • This method enables a variable number of levels of security to be applied as required for any particular application.
  • the verification phase will be required to start with the last machine readable symbol applied and proceed in reverse order of application, thus ignoring or deleting some or all machine readable symbols from the current image according to a predetermined sequence which were already verified in prior steps (or intentionally ignored at a particular level) since these symbols would not have been part of the image during the development of the current machine-readable symbol. Therefore, if a fraudulent alteration of the secure document is made, it must be reflected in some or all subsequent levels of machine readable symbols which have been generated with an image comprising the altered area. Variations on this concept may comprise including a predetermined subset of the previously applied machine readable symbols applied in the image represented by the current machine readable symbol being applied.
  • Fig. 8 illustrates an application of the electromagnetic wave emissive machine-readable snippet 10 of the present invention which essentially provides a payor bank 80 with an additional amount of time during which to decide whether to dishonor or finalize payment on a check.
  • a holder 82 presents a secure document or check (having been prepared using the methods described above) to a depository bank 84 and a provisional credit (a credit that may be revoked prior to final payment of the instrument upon finding insufficient funds for payment, material alteration of the instrument or other deficiencies in the instrument) will be given to the holder 82.
  • the check is then placed with others for delivery to an intermediary bank or clearing house 86, sorted by the payor bank 80 and totaled.
  • the checks are then delivered to an intermediary bank 86 and given to an agent of the payor bank 80 and the provisional credit will
  • the checks are delivered to the payor bank 80, which determines their authenticity by verifying the checks against themselves (intrinsic verification as described above in section (I)) as well as against a positive pay file (extrinsic verification) . If the payor bank 80 successfully verifies the check, both intrinsically and extrinsically, then the check is paid and all provisional credits are made final (or in the terms of the banking industry, "firmed up”). However, if the check is not successfully verified then it is dishonored, returned with the appropriate notations and the provisional credits are revoked at the clearing house 86 and the depository bank 84.
  • the check comprises the electromagnetic wave emissive machine-readable snippet 10 of the present invention
  • the depository bank 84 and/or the intermediary bank 86 could intrinsically verify the authenticity of the check utilizing the methods described
  • the depository bank 84 and the intermediary bank 86 could extrinsically verify 87 the authenticity of the check via a request to the payor bank 80, which would provide the intermediary bank with relevant information comprising the drawer's name, account number, check number, amount to be paid, etc. in order to extrinsically verify the same information appearing on the face of the check.
  • the results of the verification phase are then forwarded to the payor bank 80 and/or the intermediary bank 86 in advance of the physical check in the form of an advance pay file 88.
  • the advance pay file 88 comprises all of the human-readable information content and machine-readable data content which was obtained via direct inspection and scanning of the physical check by the depository bank 84 and/or the intermediary bank 86 two to three days in advance of an opportunity by the payor bank 80 to do so.
  • the need to provide banks with a greater number of days to reconcile provisional credits is essentially eliminated since receipt and inspection of the physical check by the payor bank 80 is no longer required in order to verify authenticity of the check.
  • Fig. 9 illustrates a method for circulating a secure money equivalent such as money orders, gift certificates, etc. comprising the electromagnetic wave emissive machine-readable snippet 10 of the present invention.
  • An issuer 100 sells a secure money order 104 comprising the electromagnetic wave emissive machine- readable snippet 10 to a consumer 102 in exchange for cash or a consumer cash equivalent 106.
  • the additional functional responsibilities of the issuer 100 comprise the following :
  • the consumer 102 issues the secure money order 104 in exchange for goods, services or a payee consideration 108 from a payee 110 of the consumer's choice that subscribes to the system of circulating secure money equivalents of the present invention.
  • the payee 110 presents the secure money order 104 to a depository financial institution 112 in exchange for cash, a provisional credit on the payee's account or some other form of depository financial institution cash equivalent 114.
  • the depository financial institution 112 then presents the secure money order 104 to a clearing financial institution 116 in exchange for a provisional credit or some other form of clearing financial institution cash equivalent 118.
  • the issuer 100 Upon the initial sale of the secure money order 104 by the issuer 100, the issuer 100 transmits sales information 120 to a centralized service bureau 122 via outband resources (mail, Internet, secure modem, etc.) which comprises such information describing the transaction as the date, time, amount, consumer identification, serial number and other identifying characteristics of the secure money order transaction and the service bureau 122 acknowledges its receipt of the sales information.
  • outband resources email, Internet, secure modem, etc.
  • the service bureau 122 transmits a positive pay file 124 comprising information obtained from the transmitted sales information and a list of rejected items which should not be paid to the clearing financial institution 116 and perhaps additional relevant information appended by the service bureau 122. Based upon the information contained in the transmission of the positive pay file 124 the clearing financial institution 116 determines whether or not to pay the depository financial institution 112. The clearing financial institution 116 then transmits a paid items file 125 to the service bureau 122 comprising a list of those secure money orders 104 paid as well as additional relevant information describing the conditions under which payment was made .
  • the issuer 100 will reconcile the consumer cash equivalent 106 received from the consumer 102 with the secure money orders 104 sold and will deposit an issuer's sales proceeds 126 which represents the gross sales receipts for the sale of secure money orders 104 into the issuer's financial institution 128.
  • the issuer's financial institution 128 will pay the clearing financial institution 116.
  • the clearing financial institution 116 provides the clearing financial institution cash equivalent 118 to the depository financial institution 112 in exchange for the secure money order 104.
  • the circulation process is complete when the clearing financial institution 116 transmits secure money orders 104 which have been paid or rejected to the service bureau 122 for identification and warehousing.
  • the depository financial institution 112 has the option of seeking recourse against the consumer 102 or "writing-off" secure money orders 104 which were incorrectly paid as a loss .
  • Additional functional responsibilities of the clearing financial institution 116 comprise the following: 1. receipt of cash letters accompanying the secure money orders 104 from the depository financial institution 112;
  • the payee 110 and/or the depository financial institution 112 and/or the clearing financial institution 116 may request extrinsic verification as shown by reference numeral 130 of the authenticity of the secure money order 104 from the service bureau 122 via comparison of information in a positive pay file 124 from the service bureau 122 with information obtained from physical inspection and scanning of the secure money order 104.
  • the payee 110, the depository financial institution 112 and/or the clearing financial institution 116 may perform intrinsic verification upon the secure money order 104 using methods described in section (I) above by verifying the authenticity of the ultraviolet snippet (stock verification) and comparing the data content of the machine- readable symbol with the information content of the human readable information on the secure money order 104) as shown by reference numeral 132.
  • Fig. 10 illustrates the services provided by the service bureau 122 to the other entities involved in the circulation of the secure money order 104. Specifically, support services will be provided by the service bureau 122 to the issuer 100 in order to service the consumer 102 with
  • the issuer 100 transmits sales information to the service bureau 122 in a batch flow manner.
  • the service bureau 122 also responds to requests by the payee 110 and/or the depository financial institution 112 for confirmation of the authenticity of the secure money order 104 (encashment authorization service inquiries 130) in real time.
  • the seller of secure money orders is given the opportunity to become the issuer 100 of his own secure money orders 104 by action of the board of the directors of the issuer 100.
  • the board of directors determines that an issuer 100 will issue secure money orders 104 an application is made to the state government for a local license and a bond.
  • the issuer 100 Upon posting the bond and obtaining the license, the issuer 100 is able to promote and issue its own secure money orders 104 without concerns regarding inventory controls and audits, safekeeping facility requirements, or theft of blank financial paper.
  • the service bureau 122 may decide to offer incentives to help underwrite the marketing costs of new issuers 100 in return for a larger percentage of the long term float and escheat funds from secure money orders that have not been redeemed.
  • the sale of secure money orders 104 can be performed at any suitable location such as a cash register, a check-out line, or a customer service area.
  • a customer service representative enters a unique personal identification and a password into a keypad or other terminal entry device associated with a computer.
  • an issuing system accesses a security-cleared, pre-authorized secure money order input screen in which the amount to be assigned to the secure money order is entered.
  • the issuing system Upon issuance, the issuing system generates the secure money order 104 and a receipt or the equivalent of an application form, which was completed by the consumer 102.
  • Figs. 17 and 18 provide greater detail regarding two embodiments for the transaction between the consumer 102 and the issuer 100 in issuing secure money orders and secure gift certificates, respectively. These embodiments are specifically intended for retail establishments in which the following characteristics are present :
  • a customer service desk or area is not available to conduct the issuance of secure documents
  • Fig. 17 illustrates the issuance of a secure money order which is first selected by the consumer in the display area and taken to the cashier much like any other product being purchased in a retail store.
  • a serial and stock number would be imprinted on the secure money order in machine readable code along with the SKU and UPC of the prior art.
  • the secure money order would, for instance, be enclosed in clamshell wrapping and hung on a peg in a display rack. Also, a closed package with access through a visible envelope or cutaway portion may be used. The cashier would then scan the blank secure money order
  • SI automatically invoking software prompting the cashier or consumer to enter an amount, dollar value or denomination for the secure money order via a keyboard and display or other equivalent means of entry and acknowledgement well known in the art.
  • Issuance information obtained by scanning the secure money order along with the amount provided (which may be fixed on the document or printed during the transaction by the cashier) is then transmitted to a merchant central database for recording and further processing.
  • the issuance information along with optional additional information such as the time, date and location of issuance is then transmitted to the service bureau for recording, processing and verification against prior records regarding the printing of the secure money order (extrinsic verification) . If the results of the verification are satisfactory, authentication information is transmitted back to the merchant central database for recording, processing and transmittal to the cashier.
  • the cashier Upon receipt of the authentication information, the cashier will activate the secure money order by imprinting the desired denomination along with authentication information obtained from the service bureau in machine readable code using the methods described above via the cashier's register. The cashier then transfers the activated secure money order with a receipt for the transaction to the consumer, thus concluding the sale or issuance of the secure money order.
  • An alternative embodiment for the issuance of the secure money order which is also illustrated in Fig. 17, involves the transfer of value via electronic means rather than by physical transfer of the document.
  • the issuance process for the secure money order which initiates an electronic fund transfer would be substantially the same as that described immediately above, except that the consumer
  • Fig. 18 illustrates the issuance of a secure gift certificate, which is substantially the same as the secure money order embodiment illustrated in Fig. 17, except that gift certificates may optionally be available to the consumer in predetermined denominations making the entry of denominations unnecessary. Although possible, gift certificates would not typically involve the transfer of funds via electronic means.
  • a laser printer (the specific manufacturer and model number of which may be required to be certified by the service bureau 122 in order to maintain quality of printing standards) ;
  • cartridge toner (which may be provided by the service bureau 122 in order to ensure print quality as well as the use of special inks to further guarantee authenticity) .
  • the software requirements of the issuing system comprise a customer on-site module to include sales, issuing logic, print routines, and telecommunications capabilities.
  • the software and hardware may comprise the following characteristics:
  • a display to control the issuance of the secure money order 104 which displays the value and quantity of each secure money order 104 to be issued;
  • telecommunications capability comprising an ability to generate a sales information file do be transmitted to the service bureau (primarily via the Internet) .
  • the service bureau primarily via the Internet
  • other Internet Access Providers could be utilized as auxiliary channels of access to the service bureau 122 via
  • the issuer 100 receives software designed to access an Internet access provider (e.g., MCI, MSN, or AT&T Worldnet) having local access.
  • the software enables the issuer 100 to set up an account with the Internet Access Provider (IAP) .
  • IAP Internet Access Provider
  • the software addresses itself to the website corresponding to the service bureau 122, which will not require additional input from the issuer 100.
  • the software transfers the sales information file from the issuing system to the service bureau 122 once the software logs onto the service bureau website using security codes provided by the service bureau 122.
  • the service bureau 122 verifies that the sales information file has been received and transmits a formal acknowledgment back to the issuing system which is read by the issuer 100.
  • an Internet mail server at the service bureau 122 optionally transmits financial reports documenting status of the secure money order business (e.g., gross sales, net proceeds of sales, volume of sales, etc.) to the issuer 100.
  • the circulation method illustrated in Fig. 9 of the present invention will also permit operation in a "One to Many" mode which will enable the service bureau 122 to provide communication back to the issuer 100 in order to accommodate consumer service requests, general inquiries, stop payments, reporting, etc. Modifications to the software of the issuing system can be made available to the issuer 100 via E-mail, and therefore, worldwide customer service and support can be conducted efficiently and economically without sacrificing quality.
  • issuers 100 will reconcile sales receipts with consumer cash equivalent 106 received at least once a day in accordance with internal procedures generated by the service bureau 122. Where reconciliation is performed manually, the issuer 100 must total all consumer application forms and generate from this total a daily settle form (DSF) summarizing the total sales, voids and fees (consumer cash equivalents collected) . The total of the DSF's must equal the total cash or issuer's sales proceeds to be deposited with the seller's financial institution 128 for that particular day.
  • DSF daily settle form
  • the issuer 100 is merely required to reconcile a summary output of the daily sales information for the issuing system versus the issuer's sales proceeds 126 to be deposited in the seller's financial institution 128.
  • the issuing system must record detailed sales information regarding the secure money orders 104 issued, cancelled (voids) , and consumer cash equivalents 106 received in addition to maintaining comprehensive information regarding ongoing balances. This information is available both via a visual display as well as a printed copy. Daily totals are archived in a suitable database for historical and statistical tracking. The software is designed to enable future upgrade capability for conversion between international currencies.
  • An additional embodiment of the present invention involves an application to food stamps.
  • Food stamps are generally issued by an entity administered by a government agency that must typically post reserve funds in an account that services and provides funds for the food stamps. These reserves are used to cover anticipated fraudulent redemption of food stamps and are extremely costly to maintain.
  • a typical distribution method for circulating secure food stamps 134 is illustrated in Fig. 11 which utilizes methods of intrinsic and extrinsic verification that are substantially similar to those discussed above with respect to secure money orders.
  • a government authorized issuer 136 transfers the secure food stamps 134 to the consumer 102 based upon a predetermined set of eligibility requirements and transmits distribution information 142 to the service bureau 122.
  • the consumer 102 presents the secure food stamps 134 to the payee 110 in exchange for payee cash equivalent 108 that typically takes the form of necessities such as food. Prior to the exchange the payee 110 may intrinsically verify the authenticity of the secure
  • the payee 110 transfers the secure food stamp 134 to either a redemption institution 138 which may be the government, an authorized private entity or the government issuer 136 in exchange for redemption institution cash equivalent 140 which typically takes the form of cash or credit to an existing account.
  • the redemption institution 138 possesses the same options for verification of the secure food stamp, as did the payee 110.
  • the redemption institution 138 Upon redemption of the secure food stamp 134 the redemption institution 138 transmits payment information 142 to the service bureau 122.
  • the redemption institution 138 transfers secure food stamps 134 which have been redeemed back to the government issuer 136 or another entity which provides the warehousing function.
  • the government issuer 136 may also perform intrinsic verification upon the secure food stamp 134 as a prerequisite to its acceptance.
  • EFT electronic fund transfer
  • ATM automated teller machines
  • ACH automated clearing houses
  • ACH transfers are typically used by a number of popular money management software packages (e.g., Checkfree® and Quicken®). Such transfers are relatively inexpensive and clear in one to two days. Currently, the security against fraud is performed entirely by the underlying system (ACH) which confirms the transfer through the Federal Banking System.
  • ACH underlying system
  • the receiver of an electronic fund transfer is not permitted to finalize the transfer until the existence and sufficiency of funds to be transferred is confirmed.
  • the EFT authentication code essentially comprises a macro authentication code (MAC) or Data Encryption Standard (DES) key.
  • MAC macro authentication code
  • DES Data Encryption Standard
  • the consumer 102 issues a check bearing the suspended EFT 230 to a payee 110 who then presents it to a depository bank 112.
  • the depository bank 112 sorts it, extracts the suspended EFT 230, verifies the authenticity of the suspended EFT (intrinsically 132 and extrinsically 130 via request to the service bureau 122) at which point the physical document may be discarded.
  • the suspended EFT would then be submitted directly to the FEDNET for transfer of funds from one account to another.
  • a further advantage realized by the embodiments described above is that the supporting documentation (e.g., advance pay file 88, paid item file 125, payment information 142) which tracks the circulation of the secure documents while being an automatic byproduct of the process also satisfies the record-keeping requirements for escheatment recovery.
  • a percentage e.g., 85%
  • a percentage typically three to seven years depending on the state
  • the two-tiered approach to verification of secure documents described above as intrinsic and extrinsic verification not only permits verification at the Point Of Sale (POS) and every other point in the circulation of the secure document, but also provides a remote database (e.g., advance pay file 88, paid item file 125, payment information 142) which is substantially impossible to fraudulently alter in concert with and in the precise way that the secure document itself has been altered.
  • POS Point Of Sale
  • a remote database e.g., advance pay file 88, paid item file 125, payment information 142
  • An additional embodiment using the authentication methods described in the Secure Document Generation and Transactional Tracking sections above is a travelling signature card which follows such documents as a negotiable instrument, traveler's check or credit card as illustrated in Fig. 19. It should be noted that such documents need not have and in fact should not have a human readable representation of the user's signature in order to substantially eliminate the potential for forgery. Any document that benefits from authentication of the user's signature at a location remote to the storage of the signature card by comparing it against a pre-signed signature card which is inaccessible to unauthorized users could be used advantageously with this embodiment.
  • Such a document is imprinted with machine readable code comprising an optionally encoded and compressed bit map of the user's signature which has been signed on the signature card typically at the opening of the account or under equivalent circumstances well known in the art.
  • machine readable code comprising an optionally encoded and compressed bit map of the user's signature which has been signed on the signature card typically at the opening of the account or under equivalent circumstances well known in the art.
  • the merchant scans the document or card and associated hardware and software provides a visual image of the user's pre-signed signature from the bit map encoded on the document or card. The merchant then visually compares the handwritten signature of the person attempting to use the document or card with the
EP98945909A 1997-09-08 1998-09-04 Sicherheitsdokumente Withdrawn EP1066553A4 (de)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US5815397P 1997-09-08 1997-09-08
US58153P 1997-09-08
US6503397P 1997-11-10 1997-11-10
US65033P 1997-11-10
PCT/US1998/018571 WO1999013391A2 (en) 1997-09-08 1998-09-04 Improved secure documents

Publications (2)

Publication Number Publication Date
EP1066553A2 true EP1066553A2 (de) 2001-01-10
EP1066553A4 EP1066553A4 (de) 2001-01-10

Family

ID=26737300

Family Applications (1)

Application Number Title Priority Date Filing Date
EP98945909A Withdrawn EP1066553A4 (de) 1997-09-08 1998-09-04 Sicherheitsdokumente

Country Status (6)

Country Link
EP (1) EP1066553A4 (de)
JP (1) JP2001515809A (de)
AU (1) AU9305198A (de)
BR (1) BR9815643A (de)
CA (1) CA2302421A1 (de)
WO (1) WO1999013391A2 (de)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6325420B1 (en) * 1998-08-17 2001-12-04 Inspectron Corporation Method for embedding non-intrusive encoded data in printed matter and system for reading same
US6400272B1 (en) 1999-04-01 2002-06-04 Presto Technologies, Inc. Wireless transceiver for communicating with tags
JP4465064B2 (ja) * 1999-09-27 2010-05-19 富士フイルム株式会社 画像サーバおよびその制御方法
US7974921B1 (en) * 1999-12-05 2011-07-05 Moosa Eisa Al Amri Bank cheque system with cheques having magnetized strips and/or storage chips
US7346184B1 (en) * 2000-05-02 2008-03-18 Digimarc Corporation Processing methods combining multiple frames of image data
JP4783003B2 (ja) 2003-11-28 2011-09-28 株式会社東芝 個人認証媒体発行装置および個人認証媒体発行方法
CA2559271A1 (en) * 2004-03-12 2005-09-22 Ingenia Technology Limited Methods and apparatuses for creating authenticatable printed articles and subsequently verifying them
WO2009118803A1 (ja) * 2008-03-24 2009-10-01 緒方延泰 電子決済支援システム
GB2476226B (en) 2009-11-10 2012-03-28 Ingenia Holdings Ltd Optimisation
US20130103596A1 (en) * 2011-10-24 2013-04-25 Sabre Publishing, Ltd. Co. d/b/a Sabre Trademark & Licensing, Ltd. Co. Denominated authenticating royalty collection and enforcement process
MX2020009165A (es) 2018-03-07 2020-10-05 Sotec Consulting Sl Metodo y sistema de verificacion automatica de la autenticidad de documentos.

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5360235A (en) * 1969-11-01 1994-11-01 The United States Of America As Represented By The Secretary Of The Navy Secret optical marking
JPS6128182A (ja) * 1984-07-18 1986-02-07 Sony Corp 光学的情報記録媒体
GB8620430D0 (en) * 1986-08-22 1986-10-01 Plessey Co Plc Marking of articles
DE4241663C2 (de) * 1992-12-04 1997-05-28 Borus Spezialverfahren Verfahren zur Kennzeichnung und Erkennung eines Gegenstands

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
No further relevant documents disclosed *
See also references of WO9913391A2 *

Also Published As

Publication number Publication date
AU9305198A (en) 1999-03-29
BR9815643A (pt) 2002-02-05
JP2001515809A (ja) 2001-09-25
WO1999013391A3 (en) 1999-06-10
CA2302421A1 (en) 1999-03-18
WO1999013391A2 (en) 1999-03-18
EP1066553A4 (de) 2001-01-10

Similar Documents

Publication Publication Date Title
US7337953B2 (en) Negotiable instrument authentication systems and methods
US8768840B2 (en) Universal positive pay match, authentication, authorization, settlement and clearing system
US6390362B1 (en) Method and device for preventing check fraud
US7267264B2 (en) System and method for verifying the authenticity of a check and authorizing payment thereof
US7016524B2 (en) System for authenticating and processing of checks and other bearer documents
US6575362B1 (en) Secure money order issuing kiosk
USRE40220E1 (en) Check writing point of sale system
US6547129B2 (en) Check writing point of sale system
US7742996B1 (en) Computer program, system and method for on-line issuing and verifying a representation of economic value interchangeable for money having identification data and password protection over a computer network
US20060015733A1 (en) Process and system for the material reduction of counterfeit and identity-maker fraud
US8255312B2 (en) Issuing machine and issuing system
US20070055600A1 (en) Method for controlling spending
US20050203857A1 (en) Methods for transaction processing
US20050114264A1 (en) System and method for remoteley generating instruments
JP2006338539A (ja) 電子決済システム,電子決済サーバ,電子決済端末,およびコンピュータプログラム
US7708201B2 (en) System and method for verifying the authenticity of a check and authorizing payment thereof
US8616440B2 (en) Alternative banking system for managing traditional and nontraditional markets
EP1066553A2 (de) Sicherheitsdokumente
US7266527B1 (en) Method and device for preventing check fraud
US20080054064A1 (en) System and method for verifying the authenticity of a check and authorizing payment thereof
MXPA00002182A (en) Improved secure documents
WO2022043996A1 (en) A system and a method for cheque security
KR20030084846A (ko) 어음/수표책 교부 관리방법 및 그 프로그램소스를 기록한기록매체

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20000303

A4 Supplementary search report drawn up and despatched

Effective date: 20001009

AK Designated contracting states

Kind code of ref document: A4

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE

Kind code of ref document: A2

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN

18W Application withdrawn

Withdrawal date: 20020610