GB2560188A - User identification and address verification systems and methods - Google Patents

User identification and address verification systems and methods Download PDF

Info

Publication number
GB2560188A
GB2560188A GB1703456.2A GB201703456A GB2560188A GB 2560188 A GB2560188 A GB 2560188A GB 201703456 A GB201703456 A GB 201703456A GB 2560188 A GB2560188 A GB 2560188A
Authority
GB
United Kingdom
Prior art keywords
user
address
data
image
document
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB1703456.2A
Other versions
GB201703456D0 (en
Inventor
John Barlow Ryan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
E4 Strategic Pty Ltd
Original Assignee
E4 Strategic Pty Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by E4 Strategic Pty Ltd filed Critical E4 Strategic Pty Ltd
Priority to GB1703456.2A priority Critical patent/GB2560188A/en
Publication of GB201703456D0 publication Critical patent/GB201703456D0/en
Publication of GB2560188A publication Critical patent/GB2560188A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A data aggregation system collects address data from one or more credible external data sources. A user provides address data, which is compared with the address data from the credible sources to verify the user supplied data. The address data may be supplied as a proof of address document. An image of the document may be captured and optical character recognition used to extract the address data. Also, a data aggregation system obtains identification information about a user, including an image of the user. The user supplies an image of an identification document, which is compared with the data from the credible source to verify the users identity. Images of the user on the identity document, from the credible source and captured images may be compared to check the users identity. The data is supplied by the user in relation to a live session with an agent, such as a video call, a telephone call, instant messaging or live chat.

Description

(71) Applicant(s):
E4 Strategic (Pty) Ltd (Incorporated in South Africa)
6th Road, Hyde Park, Johannesburg, South Africa (72) Inventor(s):
Ryan John Barlow (56) Documents Cited:
WO 2004/107219 A1 US 20150341370 A1 US 20050137991 A1 (58) Field of Search:
INT CL G06F Other: WPI, EPODOC
CA 002744112 A1 US 20130219480 A1 (74) Agent and/or Address for Service:
Agile IP LLP
Airport House, Purley Way, Croydon, Surrey, CR0 0ΧΖ, United Kingdom (54) Title of the Invention: User identification and address verification systems and methods
Abstract Title: Verifying a user address and identity by comparing user supplied data with data obtained from an external credible source (57) A data aggregation system collects address data from one or more credible external data sources. A user provides address data, which is compared with the address data from the credible sources to verify the user supplied data. The address data may be supplied as a proof of address document. An image of the document may be captured and optical character recognition used to extract the address data. Also, a data aggregation system obtains identification information about a user, including an image of the user. The user supplies an image of an identification document, which is compared with the data from the credible source to verify the user’s identity. Images of the user on the identity document, from the credible source and captured images may be compared to check the user’s identity. The data is supplied by the user in relation to a live session with an agent, such as a video call, a telephone call, instant messaging or live chat.
o.
USER/AGENT (ACCOUNTABLE INSTITUTION) -1-'-
USER {APPLICANT/ CUSTOMER) -1- IDENTIFICATION SERVICE 3RD PARTY DATA SUPPLIER
-USER INITIATES CALLVIRTUAL CALL STARTED -RECORDING BEGINS _CALL ROUTED TO AVAILABLEAGENT
---VIDEO FEED ACTIVATED--<----VIDEO FEED ACTIVATED-AGENT REQUESTS USER TO SUPPLY ADDRESS INFGRMATION-----USER SUPPLIES ADDRESS DETAIL---I I
AGENT REQUESTS CONSENTTO OBTAIN ADDRESS AND ID DETAILS FROM SUPPLIERS
I I —CONSENT GIVEN FOR SPECIFIED SUPPLIER—-REQUEST PROFILE—
-DOCUMENT & DATA RETURNED--------PROCESSES
REQUEST
---DISPLAY DOCUMENT & DATA«---IF FAILED, REPEAT PROCESS-Fig. 3 «· - -SAVE VERIFICATION RESULT · /VIRTUAL CALL ENDED V - RECORDING STOPS
VERIFY ADDRESS MATCHES INFORMATION ' SUPPLIED BY USER.
At least one drawing originally filed was informal and the print reproduced here is taken from a later filed formal copy.
/4 (Λ
LU (Λ (/)
LU a
O a' z:
o
03 17 of~-~~i
Figure GB2560188A_D0001
Fig. 1
2/4
Figure GB2560188A_D0002
03 17
Figure GB2560188A_D0003
Fig. 2
3/4
03 17 (Z5
Figure GB2560188A_D0004
CO ώ
’ll
VIRTUAL CALL ENDED - - RECORDING STOPS
4/4
Figure GB2560188A_D0005
CZ) CC bi a; zi y ΰ Ω ψ H >a A < co u 5 a Q= lu Ο Zu
LL. r*y. z Cl — 0 tZ) <
£
QC
LU >
-1 l·
LU 1 0 1 < ό j h L k 1 1 1 1 1 1 E έ U Z3
03 17
Figure GB2560188A_D0006
-J co £ 2 § ί ω ο <. uj μ l·—· co 5Σ m °
-J <5 fcu < o ° E O < Ο ί 3 U j H 5 < £ α u <
Q
LU
LU
LU
LU zi
Z £
LU
Lf) >
t= <
Ώ σ
LU <
“TT <
υ
CZ>
LU
B b
<
Q [2
LU </) a
2:
-<LU
CC
Z)
I— CL < u
UJ <
U7
CC
LU
CZ)
UJ
Q x 0 o <
£ § w
Q_ g CC θ u
<
I— Q LU
Cl
CZ)
Q
LU <
LU □C z
CC
LU >
LU <Z)
UJ < 0 U < 0 I— oc >
-RECORDING STOPS >cc
LU >
CK
Figure GB2560188A_D0007
n
O U > -t- LU £ a < S £ “ o ί 5 ec 0 LU 2
'.Z!
-3 Z5 £
LU
CO <Z)
LU s?
<
<Z) (Z)
LU
O
CC
CL
LU
CL
LU
DC £3 ’ll v
>- 1 USER IDENTIFICATION AND ADDRESS VERIFICATION SYSTEMS AND METHODS
FIELD OF THE INVENTION
The invention relates to user identification verification techniques, including user address verification techniques, and systems and methods therefor.
BACKGROUND TO THE INVENTION
The verification of an identity of a user continues to be increasingly important in today’s mobile and remotely functioning environment. There is a need to do more in less time, therefore technologies are being developed that look to use remote operability wherein systems and solutions are being generated and used to aid and facilitate persons and/or entities to conduct business, provide services and comply with legal or other requirements in a simpler, quicker and more accessible manner.
Know Your Customer (KYC), Anti-Money Laundering (AML) and Financial Intelligence Centre Act 38 of 2001 (FICA) are just some of regulatory measures in place wherein certain information must be provided by individuals or entities such that their identification can verified. These and many others fall into the broader category of financial intelligence. Government agencies are typically the organisations responsible for collecting and analysing the financial intelligence within countries. The aim of the legislation and goal of these organization is to have a measure of control over and reduce international and national financial crime, money laundering, tax evasion, terrorist financing activities amongst other criminal activity. Such measures must be taken by jurisdictions, and individuals and entities must comply with the legislation. Should compliance not take place, there are ramifications which are provided for.
Financial Intelligence data collection and analysis occurs world-wide. Countries may have different legislation tailored for a specific country, however the premise and objectives of all of the legislation is consistent. As a part of the collection and analysis process, verification of an individual identity, address and the like thereof needs to take place. Typically this is a process that takes time, and is administratively intensive. It also involves the physical submission of certain documents to one or more agencies of organisations. The verification may involve back and forth electronic correspondence between an agent of a financial institution or other institution, and the individual or entity that needs to provide the correct information in order for the institution to be compliant with a particular country’s financial intelligence laws or
-2regulations. The required documents may be submitted electronically, but face-to-face or a physical meeting is still required between the individual and agent or official in order to complete the verification process. This is tedious and time consuming for all parties involved. Thereafter the documents and information must be collated and issued to a further agent, if necessary, for processing, analysis and finally approval or clearing. The most common means of carrying out this verification process is by doing it in person, physically at a branch or offices with an agent, in a face-to-face interaction between the person who needs to be verified and an agent or official from the institution.
The identity and address of the individual that needs to be verified are two important aspects of the verification process. There are currently no effective systems in place to simplify and improve this process. There are also no methods employed that facilitate the process and allow for efficient and effective verification of the address and/or identity of a person.
If institutions fail to comply with financial intelligence legislation or requirements prescribed within the necessary jurisdiction, they can be held liable for fines or other implications which could ultimately result in substantial financial loss.
Various technologies and systems have been developed to address the above legislative requirements and other needs, while certain technologies have been designed specifically to allow quick and simple identification verification and/or authentication of Identity Documents (ID) or users in an online environment.
US 20150341370 ‘Systems and methods relating to the authenticity and verification of photographic identity documents’ is one such system. The above patent does teach a system and method of identity document verification, however a copy of a person’s ID document is not obtained from another source for verification against the copy of the ID document supplied by the user. Furthermore, a live photograph of the person whose identity is to be verified is not taken and used for verification. The system is not capable of verifying the address of a user.
WO2016128567 ‘Digital identity’ is used with Know Your Customer (KYC), to confirm the customer’s address. However, the way in which this is achieved is not taught in the patent, and address verification is not sufficiently disclosed. This patent describes a system and method of verifying a person’s identity. There is also mention of its use with Know Your Customer (KYC), to validate the identity of a person. However, copies of ID documents are not sourced from an additional official source for verification against the copy of the ID
-3document supplied by the user, and there is therefore no validation of authenticity of the ID document of the user.
US20050137991 ‘Method and system for name and address validation and correction’ discloses a method of comparing the address information on a document to that of address information on a database to verify it is the correct address. This is specifically used for postal address verification and does not deal with identity verification.
US9081952 ‘Systems and methods for providing secure electronic document storage, retrieval and use with electronic user identity verification’ provides for an identity verification system in which the system electronically receives identity verification data. This system is used with accounts on a digital mailbox system. The steps taken to verify the address are not disclosed, and the steps taken to verify the identity are not disclosed. This system does not allow for effective verification of address and identity of a user using an integrated system.
US8250097 Online identity management and identity verification’ does not teach or describe a system and method of address verification and refers only to identity as the compilation of data elements. The data elements including the physical address of the user. This system does not allow for effective verification of address and identity of a user using an integrated system.
US20140254893 ‘Global identification (ID) and age verification system and method’ discloses a system that is capable of verifying the address of a user but does not provide for address information extraction from a document to be used for verification. Furthermore, the patent only uses numerical analysis of identification documents in verifying the identity of the user.
DE102013100635 ‘User identification’ discloses a system and method of identifying a user, and verifying a user, but does not disclose the way in which an address is verified or whether additional and/or separate documents are supplied by a user or obtained from another source for verification.
US9075975 Online pseudonym verification and identity validation’ discloses a system and method of identifying a user, and verifying a user. The patent does not describe how address verification takes place and what the system does to achieve this. There is no extraction of address information in order to verify an address and the steps taken to verify the address are not disclosed. The patent is focussed on providing a system and method to prevent unauthorized access to on-line services, wherein service providers typically require the
-4customer to identify themselves using some sort of pseudonym. It is directed at methods of authenticating an online user's face that are less vulnerable to compromise.
The objective of the invention is to overcome and partially alleviate some of the drawbacks described above, and provide an improved and effective system for and method of verifying the identification and/or address of a user.
SUMMARY OF THE INVENTION
According to a first aspect of the invention, there is provided a system for verifying the address of a user, the system comprising:
a back-end including data aggregation means;
the data aggregation means configured to obtain address data relating to a user from a credible source;
a front-end, connected to the back-end via a network;
the front-end configured such that the data aggregation means is prompted by an agent before, during and/or after a live session between the user and the agent, such that the address data is obtainable from the credible source; and the address data obtained is used to verify the address of the user by analysing and comparing the address data provided by the user, to the address data obtained by the data aggregation means.
The front-end may include a user interface in the form of a website and/or mobile application (APP).
The user interface may differ for the user to be verified and the agent, wherein the system includes a first front-end for a user, and a second front-end for the agent, wherein the first and second front-ends include at least two different electronic devices.
The network may include network nodes, wherein the nodes are connected using either cable media or wireless media.
The front-end may be a network node of the network.
-5The front-end may be an electronic computing device, including but not limited to a smartphone, mobile telecommunications device, tablet, laptop computer, Personal Computer (PC), kiosk computer and the likes thereof.
The back-end may be a network node of the network.
The back-end may include one or more servers.
The back-end may be a network node located remotely from the agent and/or user.
The back-end may be connected wirelessly or via cable to the front-end used by the agent.
In a preferred configuration, the network includes at least three separate nodes, wherein the first network node includes the front-end of the user, the second network node includes the front-end of the agent, and the third network node including the back-end.
The live session may include a face-to-face video call, a telephonic call and/or via instant messaging or live chat.
The data aggregation means may be prompted through the front-end before, during or after a live session.
The data aggregation means may be configured to connect the back-end to one or more remote servers of one or more credible sources, and further configured to request and obtain the address data of a particular user, and further configured to transmit the address data from the back-end to the front-end.
The address data may include any proof of address document or information included on official records held on the one or more servers.
The credible source may include one or more credible data providers.
The front-end may be configured such that the user address may further be verified by recording the verbal confirmation of the current address of the user, the verbal confirmation given by the user.
-6The front-end may be configured such that the user address may further be verified by allowing the user to electronically sign or mark the user interface such that an electronic document or image is generated and the back-end may record the electronically signed or marked document or image.
The front-end may be configured to provide for a face-to-face video call, wherein the user may provide the user address during the face-to-face video call.
The front-end may be configured to provide for a telephone call, wherein the user may provide the user address during the telephone call.
The front-end may be configured to provide an instant messaging or chat platform, wherein the user may provide the user address via instant messaging or chat.
The user address may be provided by the user verbally, written, and/or in document form.
The user address provided by a user may be verified against address data from one or more credible sources, such as Bureau data, Land Registry data or a third party supplier data, wherein the data aggregation means is prompted to verify the user address provided by the user by comparing it to the user address data obtained from the credible source.
The front-end may be configured such that the user address may be visually represented on an onscreen electronic map using the address data obtained from the credible source and/or the user.
The front-end may be configured such that the user may supply evidence of the provided address in document form and the document form evidence may be recorded on the backend.
The front-end may be configured to allow the user to capture an image of the document.
The front-end may be configured to allow the user to upload the image of the physical document while in the live session.
The system may be configured to allow the image to be encrypted.
-Ί The front-end may be configured to allow the image to be submitted to a verification server of the back-end.
The front-end may be configured to allow an agent to review the image, and accept or reject the image, wherein if rejected, a new image may be captured by the user.
The back-end may be configured to perform optical character recognition (OCR) on the accepted image and may extract data such as text or other information from the image.
The front-end may be configured to receive the extracted data from the back-end and display the extracted data on a screen for the agent to review before accepting it.
The extracted data may be amended by the agent.
The back-end may be configured to encrypt and store the image and extracted data from the image on the verification server of the back-end.
The list of documents for proof of address may be managed on the back-end, wherein the list is configurable by the agent or any party controlling the system.
According to a second aspect of the invention there is provided a system for verifying the identity of a user, the system comprising:
a back-end including data aggregation means;
a front-end connected to the back-end via a network, the front-end configured to obtain an image of an ID document of the user, the image being capturable before, during and/or after a live session between the user and the agent;
the data aggregation means configured to obtain identification data of the user from a credible source when prompted by an agent or user via the front-end, wherein the identification data obtained contains at least an embedded image of the user; the front-end further being configured to transmit the image of the ID document captured to the back-end, the back-end being configured to analyse and compare identification data contained in the image of the ID document with the identification data obtained from the credible source, such that the ID document of the user is authenticated and/or validated; and the back-end including a verification means being configured to at least analyse and compare the images obtained of the user to verify the identity of the user.
-8The front-end is further configured to obtain an image of the user, the image capturable during a live session between the user and an agent;
The front-end may include a user interface in the form of a website and/or mobile application (APP).
The user interface may differ for the user to be verified and the agent, wherein the system includes a first front-end for a user, and a second front-end for the agent, wherein the first and second front-ends include at least two different electronic devices.
The network may include network nodes, wherein the nodes are connected using either cable media or wireless media.
The front-end may be a network node of the network.
The front-end may be an electronic computing device, including but not limited to a smartphone, mobile telecommunications device, tablet, laptop computer, Personal Computer (PC) and the likes thereof.
The back-end may be one or more network nodes of the network.
The back-end may include one or more servers. The servers may be remote of each other.
The back-end may include one or more network nodes located remotely from the agent and/or user.
The back-end may be connected wirelessly or via cable to the front-end used by the agent.
In the preferred configuration, the network includes at least three separate nodes, wherein the first network node includes the front-end of the user, the second network node includes the front-end of the agent, and the third network node including the back-end.
The live session may include a face-to-face video call, a telephonic call and/or via instant messaging or live chat.
-9The data aggregation means may be prompted through the front-end before, during or after a live session.
The data aggregation means may be configured to connect the back-end to one or more remote servers of one or more credible sources, and further configured to request and obtain the identification data of a particular user, and further configured to transmit the identification data from the back-end to the front-end.
The identification data may include a copy of the ID document of the user.
The ID document may include but is not limited to a National ID card, National ID book, a driver’s licence, medical card and a passport.
The credible source may include one or more credible data providers.
The front-end may be configured to provide for a face-to-face video call, wherein the user may provide a copy of their ID document and/or capture an image of himself/herself during the face-to-face video call.
The front-end may be configured to provide for a telephone call, wherein the user may provide the user identity information, such as their full particulars, during the telephone call. The full particulars may include a physical, postal address and/or email address.
The front-end may be configured to provide an instant messaging or chat platform, wherein the user may provide the user identity information, such as the full particulars of the user, via instant messaging or chat. The full particulars may include a physical, postal address and/or email address.
The verification means may include facial recognition technology.
The ID document may be validated by applying facial recognition algorithms against at least two of the images of the user.
The images may be examined by algorithms to locate and validate embedded watermarks, micro-text and any other official marks created by an issuing body of the ID document.
- 10The verification means may include facial recognition technology and voice biometric recognition, wherein the voice of the user is analysed and compared against credible voice records or databases.
The voice records or databases may be stored on one or more remote servers which the backend may connect to and obtain the voice records.
The servers may be cloud based.
In the preferred embodiment of the invention, the verification means may include and apply OCR technology to the image of the ID document provided by the user or the copy of the ID document obtained from the credible source, in order to extract textual, numerical and/or optical features such as names, numbers, date and any other unique identity identifiers.
The images obtained during the live session are managed by an agent, therefore restricting the user from editing information or tampering with the images obtained by the system.
The back-end may be configured to time stamp all steps taken or actions performed by the agent and/or the user.
The front-end may be configured to allow the user and/or agent to electronically sign or mark a user interface of the front-end such that an electronic document or image is generated.
The electronically signed or marked document or image may be stored on the back-end.
The images, documents and information data obtained may be collated into a report which may serve as evidence of a successful or unsuccessful user identity verification.
The report may be stored on the back-end.
The report may be transmitted directly to an institution or agency for further processing.
The list of documents usable to identify a user may be managed on the back-end, wherein the list is configurable by the agent or any party controlling the system.
The live sessions may be recorded such that if a live session is interrupted, progress may be retained as previous actions are recorded, eliminating the need to re-start the process.
- 11 The face-to-face video calls may be reviewed and replayed by an agent at any stage.
The live sessions may be exported and stored on the back-end.
In the preferred embodiment of the invention, the system for verifying the address of the user and the system for verifying the identity of the user as described above, are integrated into a combination system for verifying the identity and address of the user.
According to a third aspect of the invention, there is provided a method of verifying an address of a user using the system for verifying the address of the user, the method including:
prompting by an agent via the front-end of the system, a data aggregation means of a back-end of the system to aggregate address data, before, during or after a live session between the user and an agent;
obtaining the address data from one or more credible sources connected to the data aggregation means; and verifying the address of the user by analysing and comparing the address data obtained from the data aggregation means, with the address data provided by the user.
According to a fourth aspect of the invention there is provided a method of verifying the identity of a user using the system for verifying the identity of the user, the method including:
prompting by an agent via a front-end of the system, a data aggregation means of a backend of the system configured to obtain identification data related to the user from a credible source, before, during or after a live session between the user and an agent, wherein the front-end and back-end are connected, and wherein the identification data obtained contains at least an embedded image of the user;
obtaining an image of an ID document of the user, the image being capturable during a live session between the user and the agent, the image capturable via the front-end; transmitting the image of the ID document captured by the front-end to the back-end; analysing and comparing the identification data contained in the image of the ID document against the identification data obtained from the credible source, wherein the back-end is configured to carry out the analysis and comparison;
authenticating and/or validating the ID document of the user based on the analysis and comparison; and
- 12verifying the identity of the user, based on the analysis and comparison of at least the images obtained of the user from the ID document and identification data.
The method further including the step of applying OCR technology to the image of the ID document provided by the user and/or the identification data obtained from the credible source, in order to extract textual and/or optical features such as names, numbers, dates and any other unique identifiers.
The method further including the step of obtaining an image of the user captured by the user during the live session.
In the preferred embodiment of the invention, the method for verifying the address of a user and the method for verifying the identity of a user as described above, are integrated into a combined method for verifying the identity and address of a user.
BRIEF DESCRIPTION OF THE REPRESENTATIONS
The invention will now be briefly explained with reference to the following non-limiting representations, wherein:
Figure 1 is a diagram showing the pre-registration or pre-activation by a user of a system in APP form;
Figure 2 is a diagram showing the registration or activation by the user of the system in APP form;
Figure 3 is a diagram showing a system for and method of verifying the address and/or identity of the user, wherein address data is obtained from a credible source; and
Figure 4 is a diagram showing the system for and method of verifying the address and/or identity of the user.
DETAILED DESCRIPTION OF THE REPRESENTATIONS
The invention relates to a system for verifying the address of the user and a system for verifying the identity of the user as, wherein the systems are usable independent of each other or are capable of integration into a combined system for verifying the identity and address of the user. The invention further relates to a method of verifying the identity of a user using the system for verifying the identity of the user, and a method of verifying the address of the user
- 13using the system for verifying the address of the user, wherein the methods are used independently of each other, or are capable of integration into a combined method of verifying the identity and address of the user.
It should be appreciated to those skilled in the art that without derogating from the scope of the invention as described, that there are various alternative embodiments or alternative implementations or configurations of the invention and its features.
Referring to Figure 1, the user applies for or requests a facility or account from an accountable institution, or the user wishes to transact with the accountable institution. An agent from the accountable institution will instruct or request for verification of the user. The user will be notified, either by way of SMS or email, wherein the user will be sent the uniform resource locator (URL) or web address from where the system is accessible. The user would then, preferably be prompted or requested to download and install a mobile application (APP), alternatively access the system from a web interface.
Referring to Figure 2, once the user has downloaded the APP, he or she will create an activate their profile. During profile activation, the device DNA is sent to a server of a back-end of the system. Thereafter, a verification request is sent to the device of the user, which includes a list of the requirements for verification. The user reviews this list on a user interface of a frontend of the system, wherein the user interface will typically be a mobile telecommunications device, smart phone or tablet. Alternatively, the user interface includes a PC, laptop computer or kiosk computer.
Referring to Figure 3, the user initiates a live session. The live session is preferably a face-to face video call. Once initiated, the call is recorded, and it is routed to an available agent. The video feed is activated. The agent requests that the user supply address information. The user provides their address details, which can be take place verbally or in writing, which details is transmitted in real-time to the agent during the call. Thereafter, the agent requests that the user give consent for the agent or accountable institution to obtain address and identification details from a credible source, the credible source being a third party data supplier. Once consent is provided, the agent requests the third party data supplier provide a profile or information for the specified user. This is achieved by a data aggregation means configured on the back-end of the system. The third party data supplier processes the request, preferably automatically, and retrieves documents and/or data, which is then transmitted back to the agent. The document and/or data is displayed on at least the user interface of the agent, but preferably will be shown on both the interfaces of the user and the agent at the same time,
- 14such that both the agent and the user may view the data and/or document received from the data supplier. The agent uses the address information supplied initially by the user, and compares it with the address information obtained from the data supplier in order to verify the address of the user. Should the address information be a match, it is a successful verification result. If there is no match, the process can resume at a point preceding the non-matching occurrence. For example, the user will not be required to start the process afresh and upload or submit any previously and successfully submitted supporting document or information. In this way time will not be wasted in the situation where there was only one failed submission or match close to the end of the process, which must then be repeated from the start again. In a similar way, the identity of the user is verifiable, wherein a copy of ID document of the user is retrieved by the data aggregation means. Once received the agent may review this document, and in particular compare the identity photograph of the user on the ID document, with the live image of the user in the video call. The agent can also adapt or correct mistakes or grammar errors should they be found on the address information, such that the address information captured by the system is correct. Once verification is completed, the verification result is saved by the agent. The call between the user and agent is then ended and recording of the call is terminated. The recording of the call is stored on the back-end server and is retrievable by the agent or accountable institution when required.
Referring to Figure 4, the user initiates a live session in the form of a face-to-face video call. The call starts recording and live video feed is established. The call is routed to an available agent. The agent then initiates image capture and sets image quality settings. The user takes a photo using their mobile device camera or other device camera. The image capturing can be triggered by the user or alternatively, can be triggered by the agent. The photo image is then transmitted to the server on the back-end. In the embodiment of the invention for address verification, proof of address documentation can be provided from the user, wherein the user provides a copy of accredited address information such as a copy of a utility bill, other bill or validly accepted document, typically not older than 3 months. The user captures an image of the document and uploads it onto the system in real-time during the call, such that the agent can review the image of the document for verification of the address. The back-end includes a verification means configured to at least analyse the image obtained from the user. The verification means includes OCR technology, wherein OCR is performed on the image. The OCR extracts particular pre-set optical characters locatable on the image analysed. These optical character may include photographs, text, numbers and the likes thereof. The address information extracted from the document using OCR is then compared to the address information supplied by the user. The address of the user is then verified by the agent. If the verification result is successful, and the information or address data is a match, the successful
- 15result is saved. If it is not successful and matching failed, the process is repeated. The call is then ended once the verification is complete, and recording is stopped. The verification result, image submitted, and call recording are stored on the back-end server.
In another embodiment of the invention, the identity of a user is verifiable. The user can take a photo of their face or head for identity verification purposes. The image is displayed on the user interface of at least the agent, for review. The agent can review and compare the information provided on the user identity, and more specifically visually compare the photo image captured and submitted by the user, with the image shown of user on the live video feed.
The systems and methods illustrated in the figures can be integrated in a further embodiment not shown in any of the representations. This embodiment will be explained by way of describing a non-limiting example. In such an embodiment, the data aggregation means of the back-end of the system is configured to obtain a copy of identity data or information of the user, at the agents instruction. For example a copy of the ID document of the user is retrieved by the third party data supplier upon request by the agent, and a copy of the ID document of the user is supplied. The user can also take a photo of their face or head for identity verification purposes. This captured image is displayable on the user interface of at least the agent, for review. The agent can also review and visually compare the photo image captured and submitted by the user, with the image obtained by the data aggregation means. Furthermore, the live video feed will show an image of the user which can further be compared to the submitted photo image and the image obtained from the data supplier, such that effective identity verification is possible. Preferably the agent shall be able to view all three images of the user obtained as described above, in which the agent can verify the identity of the user.
Therefore the above invention overcomes and partially alleviates some of the drawbacks found in the related prior art, and provides an improved and effective system for and method of verifying the identification and/or address of a user.

Claims (31)

1. A system for verifying the address of a user, the system comprising: a back-end including data aggregation means;
the data aggregation means configured to obtain address data relating to a user from a credible source;
a front-end, connected to the back-end via a network;
the front-end configured such that the data aggregation means is prompted by an agent before, after and/or during a live session between the user and the agent, such that the address data is obtainable from the credible source; and the address data obtained is used to verify the address of the user by analysing and comparing the address data provided by the user, to the address data obtained by the data aggregation means.
2. The system as claimed in claim 1, wherein the front-end includes a first electronic device of the user and a second electronic device of the agent.
3. The system as claimed in either claim 1 or 2, wherein the back-end includes one or more remote servers.
4. The system as claimed in any one of the preceding claims, wherein the live session includes a face-to-face video call, a telephonic call and/or via instant messaging or live chat.
5. The system as claimed in any one of the preceding claims, wherein the data aggregation means is configured to connect the back-end to one or more remote servers of one or more credible sources, and further configured to request and obtain the address data of the user, and further configured to transmit the address data from the back-end to the front-end.
6. The system as claimed in any one of the preceding claims, wherein the address data includes any proof of address document or information included on official records held on the one or more servers.
7. The system as claimed in any one of the preceding claims, wherein the user address provided by a user is verified against address data from one or more credible sources,
- 17wherein the data aggregation means is prompted to verify the user address provided by the user by comparing it to the user address data obtained from the credible source.
8. The system as claimed in any one of the preceding claims, wherein the front-end is configured such that the user address is visually represented on an onscreen electronic map using the address data obtained from the credible source and/or the user.
9. The system as claimed in any one of the preceding claims, wherein the front-end is configured such that the user supplies evidence of their address in document form and the document form evidence may be recorded on the back-end.
10. The system as claimed in any one of the preceding claims, wherein the front-end is configured to allow the user to capture, upload and submit an image of the document for verification by a verification server.
11. The system as claimed in claim 10, the front-end is configured to allow an agent to review the image, and accept or reject the image, wherein if rejected, a new image is capturable by the user.
12. The system as claimed in either claim 10 or 11, wherein the back-end is configured to perform optical character recognition (OCR) on the accepted image and may extract data such as text or other information from the image.
13. The system as claimed in claim 12, wherein the front-end may be configured to receive the extracted data from the back-end and display the extracted data on a screen for the agent to review and/or amend before accepting the extracted data.
14. A system for verifying the identity of a user, the system comprising:
a back-end including data aggregation means;
a front-end connected to the back-end via a network, the front-end configured to obtain an image of an ID document of the user, the image being capturable before, during and/or after a live session between the user and the agent;
the data aggregation means configured to obtain identification data of the user from a credible source when prompted by an agent or user via the front-end, wherein the identification data obtained contains at least an embedded image of the user;
- 18the front-end further being configured to transmit the image of the ID document captured to the back-end, the back-end being configured to analyse and compare identification data contained in the image of the ID document with the identification data obtained from the credible source, such that the ID document of the user is authenticated and/or validated; and the back-end including a verification means being configured to at least analyse and compare the images obtained of the user to verify the identity of the user.
15. The system as claimed in claim 14, wherein the front-end includes a first electronic device of the user and a second electronic device of the agent.
16. The system as claimed in either claim 14 or 15, wherein the back-end includes one or more remote servers.
17. The system as claimed in any one of claims 14 to 16, wherein the live session includes a face-to-face video call, a telephonic call and/or via instant messaging or live chat.
18. The system as claimed in any one of claims 14 to 17, wherein the data aggregation means is configured to connect the back-end to one or more remote servers of one or more credible sources, and further configured to request and obtain the identification data of a particular user, and further configured to transmit the identification data from the back-end to the front-end.
19. The system as claimed in any one of claims 14 to 18, wherein the identification data includes a copy of an identity (ID) document of the user.
20. The system as claimed in any one of claims 14 to 19, wherein the front-end is configured to allow the user to capture an image of himself/herself during the live session.
21. The system as claimed in any one of claims 14 to 20, wherein the ID document is validated by applying facial recognition algorithms against at least two of the images of the user.
22. The system as claimed in any one of claims 14 to 21, wherein the verification means includes voice biometric recognition, wherein the voice of the user is analysed and compared against credible voice records or databases.
23. The system as claimed in any one of the claims 14 to 22, wherein the verification means includes and applies OCR technology to the image of the ID document provided by the
- 19user or the copy of the ID document obtained from the credible source, in order to extract textual, numerical and/or optical features such as names, numbers, date and any other unique identity identifiers.
24. The system as claimed in any one of the claims 14 to 23, the back-end being configured to time stamp all steps taken or actions performed by the agent and/or the user.
25. The system as claimed in any one of the preceding claims, wherein the images, documents and information data obtained is collated into a report.
26. The systems as claimed in any one of the preceding claims, wherein the system for verifying the address of the user and the system for verifying the identity of the user are integrated into a combination system for verifying the identity and address of the user.
27. A method of verifying an address of a user using the system for verifying the address of the user, the method including:
prompting by an agent via the front-end of the system, a data aggregation means of a back-end of the system to aggregate address data, before, during or after a live session between the user and an agent;
obtaining the address data from one or more credible sources connected to the data aggregation means; and verifying the address of the user by analysing and comparing the address data obtained from the data aggregation means, with the address data provided by the user.
28. A method of verifying the identity of a user using the system for verifying the identity of the user, the method including:
prompting by an agent via a front-end of the system, a data aggregation means of a backend of the system configured to obtain identification data related to the user from a credible source, before, during or after a live session between the user and an agent, wherein the front-end and back-end are connected, and wherein the identification data obtained contains at least an embedded image of the user;
obtaining an image of an ID document of the user, the image being capturable during a live session between the user and the agent, the image capturable via the front-end;
transmitting the image of the ID document captured by the front-end to the back-end;
-20analysing and comparing the identification data contained in the image of the ID document against the identification data obtained from the credible source, wherein the back-end is configured to carry out the analysis and comparison;
authenticating and/or validating the ID document of the user based on the analysis and comparison; and verifying the identity of the user, based on the analysis and comparison of at least the images obtained of the user from the ID document and identification data.
29. The method as claimed in claim 28, wherein the method further includes the step of applying OCR technology to the image of the ID document provided by the user and/or the identification data obtained from the credible source, in order to extract textual and/or optical features such as names, numbers, dates and any other unique identifiers.
30. The method as claimed in either claim 28 or 29, wherein the method further includes the step of obtaining an image of the user captured by the user during the live session.
31. The methods as claimed in any one of claims 27 to 30, wherein the method for verifying the address of the user and the method for verifying the identity of the user are integrated into a combined method for verifying the identity and address of the user.
Intellectual
Property
Office
Application No: GB1703456.2 Examiner: Mark Simms
GB1703456.2A 2017-03-03 2017-03-03 User identification and address verification systems and methods Withdrawn GB2560188A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB1703456.2A GB2560188A (en) 2017-03-03 2017-03-03 User identification and address verification systems and methods

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB1703456.2A GB2560188A (en) 2017-03-03 2017-03-03 User identification and address verification systems and methods

Publications (2)

Publication Number Publication Date
GB201703456D0 GB201703456D0 (en) 2017-04-19
GB2560188A true GB2560188A (en) 2018-09-05

Family

ID=58543747

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1703456.2A Withdrawn GB2560188A (en) 2017-03-03 2017-03-03 User identification and address verification systems and methods

Country Status (1)

Country Link
GB (1) GB2560188A (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114328593A (en) * 2020-10-10 2022-04-12 腾讯科技(深圳)有限公司 Address data processing method and device, computer equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2744112A1 (en) * 2003-04-01 2004-10-01 Transunion Interactive, Inc. Credit report retrieval system including voice-based interface
WO2004107219A1 (en) * 2003-05-29 2004-12-09 Locateplus Holdings Corporation Current mailing address identification and verification
US20050137991A1 (en) * 2003-12-18 2005-06-23 Bruce Ben F. Method and system for name and address validation and correction
US20130219480A1 (en) * 2012-02-21 2013-08-22 Andrew Bud Online Pseudonym Verification and Identity Validation
US20150341370A1 (en) * 2014-02-25 2015-11-26 Sal Khan Systems and methods relating to the authenticity and verification of photographic identity documents

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2744112A1 (en) * 2003-04-01 2004-10-01 Transunion Interactive, Inc. Credit report retrieval system including voice-based interface
WO2004107219A1 (en) * 2003-05-29 2004-12-09 Locateplus Holdings Corporation Current mailing address identification and verification
US20050137991A1 (en) * 2003-12-18 2005-06-23 Bruce Ben F. Method and system for name and address validation and correction
US20130219480A1 (en) * 2012-02-21 2013-08-22 Andrew Bud Online Pseudonym Verification and Identity Validation
US20150341370A1 (en) * 2014-02-25 2015-11-26 Sal Khan Systems and methods relating to the authenticity and verification of photographic identity documents

Also Published As

Publication number Publication date
GB201703456D0 (en) 2017-04-19

Similar Documents

Publication Publication Date Title
US10999079B2 (en) System and method for high trust cloud digital signing and workflow automation in health sciences
US11900491B2 (en) Systems and methods for executing and delivering electronic documents
US20190199718A1 (en) Methods and systems for providing online verification and security
US20190319948A1 (en) Remote authentication and identification proofing systems and methods
CN109636318B (en) Real estate registration system and real estate registration method
US20160065558A1 (en) Identity verification for online education
CA3057396A1 (en) Methods and devices for acquiring and recording tracking information on blockchain
CN107025397B (en) Identity information acquisition method and device
SA110310576B1 (en) Device, System, and Method for Registering and Authetnticating Handwritten ‎Signatures and Archiving Handwritten Information
CN111542824A (en) System and method for automatic online notarization conference recovery
KR102042129B1 (en) Method and apparatus for authenticating user
US20190034610A1 (en) Mobile application for automatic information synthesis
JP2005190452A (en) Authentication system
JP2006277028A (en) User registration method and proxy authentication system using biometric information
US11777929B2 (en) Field forensic method to acquire adaptable format biometric evidentiary proof of having complied with the special consent provisions of countries&#39; data protection regulations
US10504119B2 (en) System and method for executing remote electronic authentication
WO2016200416A1 (en) Methods and systems for providing online verification and security
CA3147624A1 (en) Identity verification and service provision platform and method
GB2560188A (en) User identification and address verification systems and methods
WO2006075396A1 (en) Authentication system
WO2016083987A1 (en) Method of and system for obtaining proof of authorisation of a transaction
TWM631654U (en) Online long-distance insurance integration system for multiple people to review insurance policy and write electronic signatures at the same time
JP5284258B2 (en) Biometric and demographic data transfer and management system and device
KR20170118382A (en) System and method for electronically managing certificate of real name confirmation
CA3084760A1 (en) System and method for conducting background screening and adjudication

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)