GB2610241A - Identity Verification method and system - Google Patents
Identity Verification method and system Download PDFInfo
- Publication number
- GB2610241A GB2610241A GB2113666.8A GB202113666A GB2610241A GB 2610241 A GB2610241 A GB 2610241A GB 202113666 A GB202113666 A GB 202113666A GB 2610241 A GB2610241 A GB 2610241A
- Authority
- GB
- United Kingdom
- Prior art keywords
- official
- candidate
- registered
- data
- mobile device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000012795 verification Methods 0.000 title claims abstract description 127
- 238000000034 method Methods 0.000 title claims description 111
- 238000010200 validation analysis Methods 0.000 claims abstract description 34
- 230000001815 facial effect Effects 0.000 claims description 22
- 230000004044 response Effects 0.000 claims description 20
- 238000010801 machine learning Methods 0.000 claims description 7
- 230000006399 behavior Effects 0.000 claims description 5
- 238000004891 communication Methods 0.000 description 13
- 238000012790 confirmation Methods 0.000 description 7
- 230000000694 effects Effects 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 5
- 230000001413 cellular effect Effects 0.000 description 3
- 210000004209 hair Anatomy 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 210000004709 eyebrow Anatomy 0.000 description 2
- 238000011835 investigation Methods 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 210000000887 face Anatomy 0.000 description 1
- 210000001061 forehead Anatomy 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000012549 training Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
- 238000012800 visualization Methods 0.000 description 1
- 210000000216 zygoma Anatomy 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Tourism & Hospitality (AREA)
- Educational Administration (AREA)
- Development Economics (AREA)
- Health & Medical Sciences (AREA)
- Economics (AREA)
- General Health & Medical Sciences (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Verifying an identity of a candidate official comprises communicating data relating to a candidate official from a mobile device 101N to an identity verification server 120. The data relating to the candidate official comprises one or more of: one or more images and/or videos depicting a face of the candidate official, one or more images and/or videos depicting an article of identification displayed by the candidate official, and wireless signal data received by a wireless receiver of the mobile device from a wireless transmitter associated with the candidate official. Verification further comprises communicating validation information from the identity verification server to the mobile device, wherein the validation information comprises a result of a comparison between the data relating to the candidate official and registered official identification data retrieved from an identity database.
Description
Identity Verification Method and System
BACKGROUND
[0001] A typical civilian would assume that an individual dressed as an official such as a police officer, driving a police officer's car or an individual with a police badge is a legitimate police officer. However, these individuals may have had unauthorised access to a police officer's identity to later pose as police officers. It is known that there have been instances when civilians have been approached at home, at work or stopped on the road by individuals posing as police officers, who may at times provide false identification information, such as false police officer names or fake police officer badges, in an attempt to hide their true identities while engaging in an offense. Thus, there remains a need for a reliable way for civilians to verify the identity of any police officer they encounter on the road as well as flag an offense in real time or moments after an offense.
SUMMARY
[0002] This summary is not intended to identify key features of the invention, nor is it intended to be used to limit the scope of the claimed subject matter. The scope of the present invention is defined in the claims.
[0003] A method of verifying the identity of a candidate official (such as a police officer) is provided. The method comprises communicating data relating to a candidate official from a mobile device to an identity verification server. The method further comprises communicating validation information from the identity verification server to the mobile device. The validation information comprises a result of a comparison between the data relating to the candidate official and registered official identification data retrieved from an identity database.
[0004] The data relating to the candidate official may comprise one or more of: one or more images and/or videos depicting a face of the candidate official, one or more images and/or videos depicting an article of identification displayed by the candidate official, and wireless signal data received by a wireless receiver of the mobile device from a wireless transmitter associated with the candidate official.
[0005] The one or more images and/or videos depicting the face and/or article of identification may be obtained from a camera of the mobile device. Location data may be obtained from a location sensor of the mobile device. Time and/or date data may be obtained from a clock of the mobile device.
[0006] Various combinations of data are possible for performing a comparison to provide validation information. For example, the data relating to the candidate official may comprise: at least two images depicting the face of the candidate official, at least one image and geographic location data indicating where the image was obtained, at least one image depicting a face of the candidate official, and at least one image depicting an article of identification displayed by the candidate official, and many other permutations.
[0007] The validation information may further comprise a result of a search for registered official identification data in the identity database that matches (or at least partially matches) the data relating to the candidate official.
[0008] The validation information may further comprise a registered official profile, comprising registered official identification data retrieved from the identity database. The profile may contain all of the registered official identification data retrieved from the identity database or a subset of the registered official identification data retrieved from the identity database.
[0009] By providing a profile of the registered official, the user of the mobile device may be able to determine whether the candidate official is genuine or not. This determination may be fed back to the identity verification server for various purposes, such as classifier training.
[0010] In some cases, the identity database may include registered official identification data that is useful for determining by the identity verification server whether the candidate official is the registered official. However, some of this data may be confidential and should not be revealed to the mobile device. For example, in some cases, the up-to-date location of the official may be useful for verifying whether the candidate official is genuine or not. However, releasing this data might compromise activities undertaken by the official. In particular, if the official is involved with law enforcement, publicly revealing the location of the official could assist criminals with evading law enforcement. Moreover, revealing too much data about the registered official could assist someone trying to impersonate that official and therefore the data released as profile data might be restricted.
[0011] The data relating to the candidate official may further comprise geographic location data indicating where the data relating to the candidate official was obtained.
[0012] The data relating to the candidate official may further comprise time and/or date data indicating when the data relating to the candidate official was obtained.
[0013] By providing a location and/or time indicating where/when the data relating to the candidate official was obtained, the identity verification server can provide validation information comprising a more reliable determination of whether the candidate official is genuine.
[0014] The registered official identification data may comprise one or more of: one or more images and/or videos depicting a face of the registered official; one or more images depicting an article of identification displayed by the registered official; one or more images and/or videos depicting a vehicle associated with the registered official; a signal verification code for verifying a wireless signal transmitted by a wireless transmitter associated with the registered official (or a vehicle associated with the registered official); a registration code associated with the registered official; a registration code associated with an article of identification displayed by the registered official; a registration code associated with a vehicle associated with the registered official; geographic location data indicating a last known location of the registered official and/or a vehicle associated with the registered official, preferably also including time and/or date information indicating when the registered official was at the location; demographic information of the registered official, 4 -a name of the registered official; a place of work of the registered official; a current occupation of the registered official; a status of duty and/or work schedule of the registered official; data relating to workplace offenses committed by the registered official and/or incidents in which the registered official was involved; one or more images and/or videos depicting a face of an individual suspected of impersonating the registered official; and geographic location data indicating a location of an individual suspected of impersonating the registered official, preferably also including time and/or date information indicating when the individual suspected of impersonating the registered official was at the location.
[0015] Where the data relating to the candidate official comprises one or more images and/or videos depicting the face of the candidate official, and where the registered official identification data comprises one or more images and/or videos depicting the face of the registered official, the comparison between the data relating to the candidate official and the registered official identification data may be performed using facial recognition techniques.
[0016] The comparison between the data relating to the candidate official and the registered official identification data may be performed by an identity recognition server comprising a facial recognition matching application.
[0017] The comparison between the data relating to the candidate official and the registered official identification data may result in potential matches with a plurality of registered officials. The method may further comprise communicating, from the identity verification server to the mobile device, one or more images and/or videos depicting a face of each of the registered officials that potentially match the candidate official.
[0018] Where there are a plurality of potential matches, the method may comprise communicating a request for a user to select a best match of the plurality of potential matches (or report that none of the plurality of potential matches is a match).
-
[0019] The method may further comprise communicating a message from the mobile device to the identity verification server that identifies one of the plurality of potential matches as a best match with the candidate official or indicates that none of the plurality of potential matches is a match with the candidate official.
[0020] Where the message identifies one of the plurality of potential matches that is a best match with the candidate official, the method may further comprise communicating profile information of the registered official that is the best match. The profile may comprise registered official identification data retrieved from the identity database (or a subset thereof), as described above.
[0021] Where the data relating to the candidate official comprises one or more images and/or videos depicting an article of identification displayed by the candidate official, the method may further comprise analysing the one or more images and/or videos depicting an article of identification displayed by the candidate official and determining whether the article of identification displayed by the candidate official is a genuine article of identification belonging to a registered official.
[0022] Where the data relating to the candidate official comprises one or more images and/or videos depicting an article of identification displayed by the candidate official, the registered official identification data may be retrieved from the identity database based on a registration code of the candidate official (e.g. a badge number) determined from one or more images and/or videos depicting an article of identification displayed by the candidate official.
[0023] The validation information may comprise the registration code.
[0024] The comparison between the data relating to the candidate official and the registered official identification data may comprise determining whether the article of identification displayed by the candidate official is genuine. This can be performed by an identity recognition server having an application configured to analyse images and videos of the article of identification and identify features of the article of identification to determine whether it is genuine or a forgery. 6 -
[0025] Where the data relating to the candidate official comprises wireless signal data received by a wireless receiver of the mobile device from a wireless transmitter associated with the candidate official, the method may further comprise analysing the wireless signal data and, based on unique characteristics of the wireless signal data, determining whether the wireless signal data originates from a genuine wireless transmitter associated with a registered official.
[0026] The validation information may further comprises an image of the vehicle associated with the candidate official.
[0027] The validation information may comprise an indication that the data relating to the candidate official does not match with the registered official identification data retrieved from the identity database.
[0028] The validation information may comprise an indication that the search for registered official identification data in the identity database that matches or partially matches the data relating to the candidate official results in zero potential matches.
[0029] The validation information may be an indication from the identity verification server that the candidate official has not been successfully validated (perhaps because they are impersonating a registered official "an imposter"). This may be in the form of an indication that there is no match for the candidate official in the database. This may alternatively be in the form of an indication that the closest possible match to the candidate official is not a good enough match to validate the candidate official (e.g. because the facial similarity is not high enough to validate the candidate official). Alternatively, this could be an indication that some of the data is inconsistent with data in the database. For example, the server may inform the mobile device that the article of identification displayed by the candidate official belongs to an official that is not on duty (perhaps because they are retired). Alternatively, the server could inform the mobile device that the closest matching registered official (that the candidate official is potentially posing as) is at a different location to the location to where the candidate official data was collected by the mobile device.
[0030] Wherein the validation information comprises a registered official profile comprising registered official identification data retrieved from the identity database, the method may 7 -further comprise communicating, from the mobile device to the identity verification server, an indication that the candidate official does not match with the registered official profile.
[0031] In other words, the mobile device may send a report (perhaps based on a visual comparison by a user of the mobile device) that the candidate official does not match with the registered official identification data (profile data provided by the identity verification server).
[0032] The method further may comprise communicating a second-best match from the identity verification server to the mobile device in response to the indication that the candidate official does not match with the profile data.
[0033] Data relating to the candidate official may be stored in a database in response to determining that the data relating to the candidate official does not match with the registered official identification data retrieved from the identity database.
[0034] Data relating to the candidate official may be stored in a database in response to determining that the search for registered official identification data in the identity database that matches or partially matches the data relating to the candidate official results in zero potential matches.
[0035] Data relating to the candidate official may be stored in a database in response to receiving an indication that the candidate official does not match with the registered official profile.
[0036] Data relating to the candidate official may be stored in a database in response to receiving an indication that the candidate official does not match with the registered official profile and there are no other potential matches to provide to the mobile device.
[0037] The data relating to the candidate official may be stored in the identity database or a separate impersonator database.
[0038] The data relating to the candidate official may be communicated from an identity verification application on the mobile device. The data relating to the candidate official may be digitally signed by the identity verification application. 8 -
[0039] The data relating to the candidate official may further comprise time and/or date information indicating when the data relating to the candidate official was captured. The data relating to the candidate official may further comprise geographic location information indicating where the data relating to the candidate official was captured. The location, time and/or data information may be digitally signed by the identity verification application.
[0040] The use of an identity verification application to supply the data relating to the candidate official that has been digitally signed in some way may assist with ensuring that only legitimate data is supplied to the identity verification server and only legitimate mobile devices are provided with validation information. This can help to prevent improper use of the system. For example, criminals may submit fraudulent data to the identity verification server for a number of reasons including: to overwhelm the server with requests to bring it offline (denial of service attack), to supply large volumes of fraudulent data so that genuine data is masked by the noise of the fraudulent data (provide so many reports of imposters that an actual imposter goes unnoticed for a time), to supply specific fraudulent data to divert attention onto a false report and away from genuine reports, to provide an impression of group consensus (such as many reports of an official or imposter being in a specific location when they are actually elsewhere), to extract genuine data from the server (for example, obtain updated profile information for a specific individual), to infer data from the database that is not normally revealed (for example, send reports of a candidate official in various locations until a positive validation is received and infer the location of that registered official from the positive response). Behaviours such as those described above can be deterred or prevented using an identity verification application that digitally signs the data relating to the candidate official.
[0041] The data may be collected via the identity verification application so that the identity verification application can be sure the data is collected in real time. In other words, the identity verification application can verify that the images are collected from the camera of the mobile device at the reported time and location.
[0042] The method may further comprise verifying whether the data relating to the candidate official is validly signed.
[0043] The comparison between the data relating to the candidate official and registered official identification data in the identity database may only be performed in response to a check that the data relating to the candidate official has been validly signed. In other words, the identity verification server may check that the data relating to the candidate official has been validly signed before proceeding further.
[0044] Communicating the validation information from the identity verification server to the mobile device may only be performed in response to verification that the data relating to the candidate official is validly signed.
[0045] The method may further comprise communicating an error message from the identity verification server to the mobile device in response to a determination that the data relating to the candidate official is not validly signed.
[0046] Storing candidate official data may only performed in response to a check that the data relating to the candidate official is validly signed.
[0047] The method may further comprise determining whether the data relating to the candidate official is suspicious. This may comprise checking how many times the mobile device has reported candidate official data recently. The data may be deemed suspicious if the same image is sent by different mobile devices. Data may be deemed suspicious if the same location is sent by different mobile devices.
[0048] Tracking data regarding (such as locations of candidate officials) may be stored by the identity verification server or in a database.
[0049] Candidate official data from similar locations (i.e. within a certain radius of each other) may be grouped together.
[0050] Each mobile device may be assigned a trust score. The trust score of a mobile device may be reduced if suspicious data is received.
-10 - [0051] The method may further comprise storing the data relating to the candidate official in a tracking data store. The method may further comprise reviewing data in the tracking data store from a plurality of different mobile devices. The method may further comprise assigning a trust score to each of the plurality of mobile devices. Reviewing the data in the tracking data may comprise identifying one or more mobile devices that have submitted suspicious data relating to a candidate official and reducing the trust score of the one or more mobile devices. Identifying suspicious data may comprise one or more of: a) determining that identical data relating to a candidate official has been communicated by first and second different mobile devices; b) determining that a mobile device has submitted logically inconsistent data; c) determining that a mobile device has submitted a volume of data relating to a candidate official above a predetermined threshold in a predetermined time period (in other words, a single device has submitted too many reports): and d) analysing the data in the tracking data store using machine learning to identify devices submitting fake reports.
[0052] The method may further comprise analysing the data in the tracking data store using machine learning may help to identify behaviour of individuals impersonating registered officials. The method may further comprise analysing the data in the tracking data store using machine learning to identify suspicious data relating to a candidate official (false reports). The method may further comprise analysing the data in the tracking data store using machine learning may help to identify behaviour of mobile devices submitting suspicious data relating to a candidate official (false reports).
[0053] The registered official may be a police officer. The article of identification may be a police badge. The registered vehicle may be a police vehicle.
[0054] The above methods refer to "communicating" data, information, indications, images, videos and messages. A step of "communicating" may be interpreted as sending or receiving. To illustrate this, examples are provided below.
[0055] Where the method is a method performed by a mobile device, the method may include one or more of the following steps: * sending data relating to a candidate official to an identity verification server, * receiving validation information from the identity verification server, * receiving, from the identity verification server, one or more images and/or videos depicting the face of each of the registered officials that potentially match the candidate official, * sending a message to the identity verification server that either: identifies one of the plurality of potential matches as a best match with the candidate official; or indicates that none of the plurality of potential matches is a match with the candidate official, * receiving profile information of the registered official that is the best match, * sending, to the identity verification server, an indication that the candidate official does not match with the registered official profile, and * receiving an error message from the identity verification server.
[0056] Likewise, where the method is a method performed by an identity verification server, the method may include one or more of the following steps: * receiving data relating to a candidate official from a mobile device, * sending validation information to the mobile device, * sending, to the mobile device, one or more images and/or videos depicting the face of each of the registered officials that potentially match the candidate official, * receiving a message from the mobile device that either: identifies one of the plurality of potential matches as a best match with the candidate official; or indicates that none of the plurality of potential matches is a match with the candidate official, * sending profile information of the registered official that is the best match, * receiving, from the mobile device, an indication that the candidate official does not match with the registered official profile, and * sending an error message to the mobile device.
[0057] The method may further comprise determining a registration code of the candidate official (e.g. a badge number) from the image and/or video. This may be performed by the identity verification server or the identity verification application on the mobile device.
[0058] The method may further comprise a step of capturing the data relating to the candidate official.
-12 - [0059] The method further may further comprise digitally signing, by the identity verification application on the mobile device, the data relating to the candidate official.
[0060] The method may further comprise verifying that the data relating to the candidate official has been validly signed or determining that the data relating to the candidate official is not validly signed.
[0061] The method may further comprise retrieving registered official identification data from the identity database.
[0062] The method may further comprise comparing the data relating to the candidate official with the registered official identification data retrieved from the database.
[0063] The method may further comprise sending the data relating to the candidate official to an identity recognition server.
[0064] The method may further comprise receiving one or more potential matches from the identity recognition server. The method may further comprise receiving match scores corresponding with the one or more potential matches from the identity recognition server.
[0065] The method may further comprise storing the data relating to the candidate official in the identity database in response to an indication or determination that the candidate official does not match with the registered official identification data (or profile data).
[0066] The method may further comprise receiving, from a plurality of mobile devices, data relating to candidate officials.
[0067] A mobile device is also provided. The mobile device comprises memory storing instructions that, when executed on a processor of the mobile device, cause the mobile device to perform a method as described above.
[0068] The mobile device may comprise one or more of: * a wireless antenna (such as cellular, wireless fidelity "Wi-Fi'', Bluetooth, GPS, and the like); * a camera; -13 - * a display screen; * a touchscreen; * a keyboard; * an identity verification application; and * a GPS antenna (or other location service antenna).
[0069] An identity verification server is also provided. The identity verification server comprises memory storing instructions that, when executed on a processor of the identity verification server, cause the identity verification server to perform a method as described 10 above.
[0070] A system for verifying an identity of a candidate official is also provided. The system is configured to perform a method as described above.
[0071] The system may comprise an identity verification server and an identity database as described above.
[0072] The system may further comprise an identity recognition server comprising a facial recognition matching application, as described above.
[0073] The system may further comprise one or more mobile devices.
[0074] Computer software for verifying an identity of a candidate official is also provided. The computer software comprises instructions that, when executed by a processor of a mobile device or server, cause the mobile device or server to perform a method as described above.
[0075] A method of identifying a target police officer vehicle is also provided. The method comprises receiving at a mobile device a wireless signal transmitted from a wireless transmitter at a verified police officer vehicle to confirm its authenticity. Based on unique characteristics of the wireless signal that is transmitted from the wireless transmitter installed on the police officer vehicle; and in response to a verification outcome from a local identity database, the method further comprises displaying to a user on a mobile device screen an indication of confirmed identity of the police officer vehicle.
-14 - [0076] A method of identifying a target police officer is also provided. The method comprises: capturing at least two live images of the target police officer using a mobile device; uploading the captured live images to verify authenticity and identifying similarities of a matching face that is stored in a database, using facial features of the uploaded image with a weighted match score that is greater than or equal to a 95% match score; retrieving an official image of an identified police officer that is linked with the matching face and transmitting the identified police officer's official image to a screen of the mobile device; receiving a message on the mobile device screen confirming that the images captured from the mobile device and the official image sent to the mobile device describe or represent the same police officer; disclosing police officer profile information associated with the official image; and transmitting the police officer profile information to the mobile device.
[0077] A method of identifying a target police officer badge is also provided. The method comprises capturing, by a mobile device that comprises a GPS antenna, a camera and an application that enables the mobile device to verify the authenticity of the police officer badge on site, one image in real time or a real time video of the police officer badge, capturing GPS coordinates of the mobile device and transmitting a request to the local identity database to verify the identity of the police officer badge. The request comprises at least one image in real time or video and GPS coordinates. The method further comprises matching the police officer badge to a badge on a system comprising a local identity database, matching the image or video provided by the mobile device to police officer information that is stored on the local identity database, retrieving an official image of a police officer associated with the matched police officer badge and transmitting the official police officer image to the mobile device; receiving confirmation that the matched police officer badge belongs to a verified police officer; transmitting a message to a server, indicating that the matched image is an official police officer badge of a verified police officer that is currently on duty in the captured location; receiving information related to the identity of the police officer from the server; and displaying the information related to the identity of the police officer on the mobile device screen.
[0078] A range of other features and benefits may be incorporated into the same technology, depending on the user's needs.
-15 -
BRIEF DESCRIPTION OF THE DRAWINGS
[0079] Non-limiting specific examples are described below in detail in relation to the following Figures.
[0080] FIG. 1 illustrates an example Identity Authentication System.
[0081] FIG. 2 illustrates a method for police officer badge verification.
[0082] FIG. 3 illustrates a method for performing identity authentication.
[0083] FIG. 4 illustrates an identity validation process for checking the validity of images captured by the user via the application and sent to identity server using geographic locations.
[0084] FIG. 5 illustrates an example method for reporting criminal incident information using a mobile device.
[0085] FIG. 6 illustrates a method of verifying an identity of a candidate official.
[0086] FIG. 7A illustrates a mobile device. FIG. 7B illustrates a server.
DETAILED DESCRIPTION
Overview [0087] A technology is provided for verifying the authenticity of a police officer by recognising a police vehicle, a police identity badge and a police officer against an individual or posed individual on scene via wireless transmitters, facial recognition matching, and an identity database. The method includes receiving a wireless signal on a personal mobile device. The signal received on the mobile device is transmitted from a wireless transmitter, which is present only on a verified police officer vehicle and serves as the basis of confirming the authenticity of a police officer vehicle. Live images of the police officer or police officers in the vehicle to be identified can be captured and transmitted to an identity database for identification. The identity database keeps a record of authentic police -16 -officers who are currently active or on duty on any given day. This helps in matching the live captured image to a potential matching police officer on the database. Confirmation of authenticity of the police officer on site can be achieved by transmitting to the mobile device: an image, name, official police officer identity number and the duty status that is registered in the identity database. The identity server can manage location information for the verified police officer by creating, analysing and later storing location records of the police officer in the database. The identity server can update the identity database to track links between a verified police officer vehicle being used by an individual posing as a police officer, a verified police office badge being used by an individual posing as a police officer or individuals that have previously posed as a police officer.
[0088] The following description provides example implementations of the present invention and is directed specifically to police officer vehicle and police officer identity verification technologies. The example implementations also illustrate event correlation and association using identity recognition and wireless communications with a mobile device and an identity database. These methods could equally be used to verify identities of other types of registered official.
[0089] In a first example, this invention addresses the problems described above by using a wireless transmitter to verify the authenticity of a police officer vehicle and verifying received images or videos captured in real time, at a reported location (which may be provided as GPS coordinates) against an identity database.
[0090] In a second example, identity recognition can be used to identify a police officer depicted in an image or video captured in real time with a mobile device. A matching official image can be presented to the user of the mobile device to confirm that captured image or video depicts a registered police officer in the same or close proximity to the reported location. If there is a match, police officer profile information associated with the potential match image in an identity database can be retrieved and sent to the mobile device. The potential match image may be presented to a user of the mobile device. The user may provide an indication to mobile device that the captured image or video does or does not depict the same person as the potential match image retrieved from the identity database. Suppose the potential matching image does not depict the same person as the captured image. In that case, the mobile device can be used to create and store profile information in -17 -association with the captured image or video in the database, which is added to a gallery to help identify individuals posing as police officers.
[0091] In some settings, the mobile device can be used to record offenses related to the individual posing as a fake police officer. The mobile device can submit the recordings to report such identified individuals.
[0092] As described herein, an identity verification server can be used to identify individuals captured in real time on received images or videos using identity recognition from the databases, to view profile information and update offenses related to the identified individuals and the individuals accessing the identity database via their mobile devices.
[0093] In some settings, the identity verification server can receive information about offenses related to the identified police officers, track and correlate offenses using the identity database, and transmit event notifications to mobile devices associated with the user.
[0094] At least some aspects of this technology can improve the performance of the application by providing better offense tracking and reporting functionality in real time or immediately after an incident. The performance of the computers used to track, report and form links to such offenses can also be improved. Using an identity database, to create and analyse links between reported offenses and other locations can reduce the computation costs associated with offense correlation and association.
System for Police Identity Verification and Reporting [0095] A system can be provided for a user to request police officer identity verification using an identity database and mobile device with a camera for identity recognition.
[0096] FIG. 1 is a diagram with an example of the Identity Authentication system 100, which can be used for police officer identity verification and reporting. The system 100 comprises of one or more mobile devices 101A-101N, an identity verification server 120, an identity recognition server 140, and an identity database 130. The identity verification server 120 may be a police officer identity verification server. The identity database130 -18 -may be a local identity database. The identity verification application may be a police officer identity verification application.
[0097] The mobile devices typically comprises of a processor, memory space, a screen, a camera, and an identity verification application. For example, the mobile device 101A comprises a processor 102, memory space 103, wireless antenna 104, a camera 105, a screen 106, and an identity verification application 110. The identity verification application 110 can be stored in an internal or external or internal memory of the mobile device 101A. The identity verification application can be executed by the processor 102 to perform identity verifications.
[0098] The mobile devices 101A-101N can be designed to transmit messages to and receive messages from the identity verification server 120.
[0099] The identity verification server 120 consists of a processor 122, an internal memory 123 and an external memory space 124. The identity verification server 120 is designed to receive video and image messages from the mobile device 101A and transmit messages to the mobile device 101A. In the example, the identity verification server 120 is designed to receive messages to, and receive message from, the identity database 130.
[0100] The example includes an identity database 130 that comprises identification data, such as police officer identity data. The identity database 130 may further comprise other nodes of data connected to an individual via types of offenses. The identity database 130 can be configured to research data notes in response to received search requests and to return search results identifying offenses that match provided search criteria. The identity database 130 can be configured to process requests to create and update or simply create or update the database by registering, updating or deleting an offense committed by a verified police officer or an individual posing as a police officer. The identity database 130 is designed to receive messages comprising such requests from the identity verification server 120.
[0101] The identity recognition server 140 is designed to identify individual faces captured in real time images or video and to extract the identified facial features using an identity recognition engine 142. Any captured images or videos that do not match the existing database are stored in an image gallery for future recognition of individuals posing as a -19 -police officer. The identity recognition server can be configured to identify multiple images of a same or similar looking person by using facial recognition matching 144 to compare the facial features of captured image against the facial features of all individuals on the identity database 130. The identity recognition server 140 is designed to receive messages from the identity verification server 120 and also designed to send messages related to the outcomes of the search results to the identity verification server 120.
[0102] Example of facial features can include eye shape, eye colour, eye distance, nose shape, nose bridge, nose size, nose tip, eyebrow distance, eyebrow shape, forehead, ear shape, hair, face size, and/or location, mouth shape, mouth size, face width, chin, and cheekbones. A combination of these facial features can be recognised using machine learning techniques, such as visualization.
[0103] A match can be determined by summing up facial similarity scores and combining the similarity scores to produce a total matching score. The total matching score can be expressed as a percentage for example 99% match. In at some scenarios, the facial feature index scores can be adjusted using one or more specified score weighting for each facial feature. For example, an individual's hair is capable of a greater change than an individual's eye distance. Therefore, given two images of a same person, it is more likely that the facial features associated with the facial hair in the respective images will have a lower weighting in the overall score due to its greater variability when compared to eye distance. Weights associated with the various facial feature scores can be adjusted to reflect likelihood of changing a feature.
[0104] When the matching image scores less than a threshold score (for example, 95%), the mobile device user may observe the face of the transmitted image to determine whether it depicts the individual that is physically present. A confirmation message may be sent to the mobile device to confirm whether the matching image provided by the server is in fact the same person. The confirmation message may be processed to determine whether the same person is displayed in both images.
[0105] Only when a determination is made that both images display the same person, then at 224 it is determined that captured image is associated with a verified police officer profile information. If it is determined that the image that was sent was not captured via the application, then no matching profile information is sent to the user's mobile device.
-20 -Methods for Police Officer Identity Verification and Tracking [0106] FIG. 2 is an example method 200 for police officer badge verification using an identity verification server. At 202, an image of a police officer badge and number is received at the identity verification server from a mobile device. The badge details are searched and checked against existing police officer information 203. The image can be sent directly from the application of the mobile device. In at least some settings, the identity verification server can determine if the image that was received is genuine by determining whether it was captured via the application in real time in a specific GPS location before proceeding with the identity verification.
[0107] At 204, a matching image associated with the identified police officer badge is transmitted to the mobile device. The identified police officer badge can be associated with a registration code, such as a unique identifier police officer identity number, which may be used to confirm the authenticity of the captured image. In this scenario, the identity verification server is instructed to send the unique identifier police officer identity number to the mobile device 205. The mobile device can then retrieve and display profile information of the police officer.
[0108] In at least one embodiment, transmitting the police officer profile information to the mobile device at 205 can further comprise of transmitting one or more images of official identification, such as police identification cards, associated with the police officer profile information.
[0109] If no match is found 210, it is determined that the captured images is not an authentic police badge 211 then, new information is recorded to associate the information on the badge as fake 212. The new information received from the user can be a part of the message that flags the fake police badge and the last location (e.g. GPS coordinates) in which it was used. A notification is then sent to the mobile device informing of the fake badge that was used 213.
[0110] Saving this new profile information can create new nodes and/or offenses registered/reported on the identity database.
-21 - [0111] FIG. 3 is a diagram demonstrating a method 300 for performing identity authentication using a mobile device 101A, the identity verification server 120, the identity recognition server 140, and the identity database 130.
A captured image 302 is transmitted from a mobile device 101A to the identity verification server 120. The real time image captured using the application 302 is received by the identity verification server 120, where the source of the image submitted by the user of the mobile device 101A is verified. The source of the image is verified using GPS coordinates of the app and the captured image or video 302 is transmitted from the identity verification server 120 to the identity recognition server 140 as part of a request 303 to verify the authenticity of the individual that is presented as a police officer and the captured image or video against the facial features of verified police officers on the identity database. The identity recognition server 140 generates results 304 identifying a potential match 305 from the captured image 302. If more than one search result is generated due to a high facial feature similarity index score amongst two individuals, then the best match will be presented to the user. The mobile screen will be prompted with a message to examine the transmitted image of the best match and confirm which individual is physically present and verifies the captured image or video 302.
[0112] The identity recognition server 140 presents search results 306 with best match scores of official images that were identified as potentially matching the captured image and the same individual to the identity verification server 120.
[0113] If two best matching images are detected by the search result, then a request may be sent to the mobile device, prompting the user to confirm which of the two images best represent the individual that is physically present.
[0114] The identity verification server transmits a command to in response to the user confirmation, extracts profile information linked to the individual in question and shares the profile information 307 to the mobile device 101A.
[0115] The user confirmation builds an internal database of feedback related to correct and incorrect matches that can form the basis of linking a police officer to a common geographic location.
-22 -Police Officer Image Validation Process [0116] In any of the examples described above, methods can be provided for user image validation to improve the quality of new user generated profile information that is added into the system. Such a validation process results in the system providing responses to genuine user requests to identify authentic police officers and those posing as police officers. Methods are also provided for creating profile data relating to imposters, to identify those posing as police officers more easily in future. However, new profile data to identify those posing as police officers should only be created in response to genuine reports of individuals posing as police officers.
[0117] This can deter and filter non-genuine user requests from manipulating or influencing the system to store images associated to individuals that were not physically present.
[0118] FIG. 4 is an identity validation process 400 for checking the validity of images captured by the user via the application and sent to identity server using geographic locations. The identity validation server can be performed in real-time or during periods when the application is in low usage.
[0119] At 402, the geographic location of a user is detected and recorded, using the geographic location of the mobile device used to capture and send the image via the application.
[0120] A GPS antenna is used to record a geographic location, which consists of GPS coordinates taken by the mobile device at the time of capturing and sending the image on the application.
[0121] At 403, a tracking file of similar images and or images that have been received from the same geographic location is stored that links geographic location with the previously received images.
[0122] At 404, if a new geographic location for one or more images that were previously sent by a different mobile device lies within a specified radius and is resubmitted via the application, the geographic location of the previously received image can be considered too near to the actual geographic location of the newly submitted image and the new received -23 -images are flagged as invalid. A mobile device that is flagged on the system would receive a low trust score. One or more factors can be used to determine a user's trust score. When the rate of invalid images captured via the application and submissions are high, a negative trust score is assigned to the mobile device 405.
[0123] Other factors that can be used separately or together with the above factor, is a proximity calculation of the geolocation of the mobile devices. A selection of mobile devices capturing images in real time and submitting those same captured images from within a close geolocation compared to other users will also result in a negative trust score. In at least one setting, the application can impose restrictions on the type of image and the number of images that can be submitted from the same geographic location. If one or more images equal more than the maximum number of images that can be submitted within a specified time period and single location, the submitted images can be considered invalid and the user is flagged with a low trust score 406. User with low trust scores can be excluded from the application until further investigations are completed to confirm the authenticity of the user's identity and motives for uploading with frequency.
[0124] Provisionally excluded user accounts can be added or reintroduced into the application once the user investigation is completed. There may be advantages in flagging and excluding users who have been identified as attempting to skew the system with fake police officer reports.
Police Officer Profile Information [0125] Police officer profile information consists of data relating to a verified police officer.
Police officer profile information can include demographic information, such as a name, police identification number, their associated police station, current occupation, status of duty and work schedule. The profile information can include information about workplace offenses or incidents in which the person was involved. Upon request, other types of data can be included in the police officer profile information.
Mobile Device [0126] In any of the scenarios, a mobile device is considered a portable computing device that is designed to connect and correspond over one or more wireless communication -24 -channels. The mobile device may comprise of at least one processor, a camera, wireless communication antenna and memory storage capacity. In such devices, a wireless communication antenna could consist of the built-in cellular antenna, wireless fidelity antenna or a GPS antenna. In order to present search results information and feedback to the user, a mobile devices comprises of a screen or display. To capture input from the user, the mobile device can comprise of a keyboard and/or touchscreens and a camera.
Identity Database [0127] An identity database is a system of record that can store and manage data in one or more data structures. A database can also be a process running on a server or virtual machine in a virtualized computing environment with access to virtualized hardware. Likewise, the identity verification server and/or the identity recognition server may be provided by one or more virtual machines in a virtualized computing environment with access to virtualized hardware.
[0128] In practice, the database is a process that is responsible for keeping data in data structure.
Identity Verification Application [0129] An identity verification application can be a computer program configured to accept instructions from a mobile device to perform operations for police identity verification, offense reporting, and/or offense notification.
Identity Verification Server [0130] In any of the scenarios, identity verification server can be a server computer set up to communicate with one or more mobile devices via a wireless network or direct wireless communication. The identity verification server consists of a processor and a storage that is programmed to communicate with the database via a wired or wireless network or direct wired or wireless communication. In come scenarios, the identity verification server is configured to communicate with an identity recognition server via a wired or wireless network or direct wired or wireless communication.
-25 -Identity Recognition Server [0131] In any of the scenarios, the identity recognition server can be a computer server that is instructed to communicate with one or more identity verification servers via a wireless network, direct wireless communication, direct wired network or wired networks.
Communication between identity recognition server and the identity verification server can also be achieved via combination of wireless network, direct wireless communication, direct wired network or wired networks.
Offense Information [0132] Offense information consists of a combination of written and photographic of video information documenting one or more offenses linked to a verified identity in real time. Offense information can be grouped in different event types. Offense information may also consist of a date, time and geographic location of the mobile device that generated the report and the approximate date, time, and geographic location of the occurrence of the incident. In addition to the offense information captured in real time, the offense information can comprise of written information detailing the offense.
Methods for Reporting, Identifying Patterns and Tracking Incidents [0133] Methods can be provided for reporting incidents of criminal nature and accidents involving verified police officer identities, identifying patterns of incidents and tracking reported incidents.
[0134] FIG. 5 is a flowchart with an example method 500 for reporting criminal incident information using a mobile device. At 502, a report is submitted via the application on a mobile device reporting that an accident or incident of criminal nature has taken place. Incident types that can be reported include theft, missing items, physical abuse, burglary, assaults, disorderly conduct, kidnapping, vandalism and rape. A question is displayed on the user interface to confirm whether the identified and verified police officer was involved in the incident 503. The police officer must have been verified using the above identity verification technologies described above.
-26 - [0135] At 504, a confirmation is received that the identified and verified police officer was involved in the incident. User feedback is received via the user interface with a response of whether the police officer was involved in the criminal incident or accident.
[0136] At 505, further information on the incident is communicated to a server. The incident event information can consist of a video or image captured in real time by the user and a geographic location of the mobile device.
The identity verification server [0137] The identity verification server uses the reported criminal incident information to identify a pattern of criminal activity within a specific geographic location. The identity verification server uses the reported criminal incident information to identify a pattern of criminal activity related to a verified police officer or an individual posing as a police officer.
[0138] These incidents are stored in the database to allow the identity verification server to search and examine one or more incidents in order to identify any patterns using information from both the reported criminal incidents and the stored criminal incident information.
[0139] In some scenarios, these pattern identification searches can link one police officer or an individual posing as a police officer to more than one criminal incident. A pattern of criminal activity can be flagged on the system, when it is determined that an incident type has occurred more than once within a specified distance and time frame. A notification can be sent to the user reporting that the individual is associated a pattern of the criminal activity.
System for Police Officer Vehicle Verification A verification system is described below that allows a mobile device user to verify the authenticity of a police officer vehicle that is located in close proximity. In such a scenario, the police vehicle sends a wireless signal and using either the wireless signal or a camera of the mobile device. The mobile device user may be able to identify the verified police officer vehicle by its transmitter signal. In addition, once the police officer vehicle is identified the mobile device may be programmed to automatically to recognise and display -27 -the same police vehicle whenever the mobile user and the police vehicle are located in close proximity. This system may be helpful when a mobile device user is approached by an unmarked police vehicle or when being intercepted at night, an unsafe neighbourhood or in an area where visibility is poor.
[0140] An operating system could comprise of wireless communication system that can be used to implement the method disclosed herein. Communications system generally includes: one or more wireless carrier systems; a land communications network; a backend system that includes at least one of a remote server or a data service center; a mobile device; and a police officer vehicle.
[0141] A transmitter may be configured to send and receive wireless police officer vehicle information. However, in at least one embodiment, the transmitter operates only in a transmit mode. For example, the transmitter may send a wireless signal. The wireless signal may be configured to transmit information that wirelessly confirms the identity of the police officer vehicle. In some implementations, the positive verification may be in the form of a predetermined sequence of light pulses or patterns on the mobile device.
[0142] In some examples, the wireless signal may be digitally signed. In further examples, the wireless signal may be a digitally signed signal comprising data indicating the current time and/or the current location of the vehicle (e.g. GPS coordinates). The mobile device may verify that the time and/or location of the vehicle match the signed time and/or location in the received wireless signal. The mobile device may verify the signed signal using a signal verification code (e.g. a public key) obtained from the identity verification server. The signal verification code may be stored in the identity database.
[0143] FIG. 6 illustrates a method of verifying an identity of a candidate official. The method comprises: S610: communicating data relating to a candidate official from a mobile device to an identity verification server; and S620: communicating validation information from the identity verification server to the mobile device, wherein the validation information comprises a result of a comparison between the data relating to the candidate official and registered official identification data retrieved from an identity database.
-28 - [0144] FIG. 7A illustrates a mobile device. The mobile device comprises memory 710 storing instructions that, when executed on a processor 720 of the mobile device, cause the mobile device to perform the method illustrated in FIG. 6.
[0145] FIG 7B illustrates an identity verification server. The identity verification server comprises memory 760 storing instructions that, when executed on a processor 770 of the identity verification server, cause the identity verification server to perform the method illustrated in FIG. 6.
Alternatives and variations [0146] The invention is described above with reference to data stored in;retrieved from an identity database. In these specific examples, the database may be a local identity database. The local identity database may store information relating to local officials. In other examples, the identity database could be a regional, national or international identity database (for example) comprising data for identifying a broader scope of officials.
[0147] The invention is described above using the example of a police officer as the official. However, the candidate official could be any kind of registered official. For example, the official could be any kind of registered law enforcement official such as a traffic warden, or a security guard. Moreover, the candidate official could be engaged in activities other than law enforcement. For example, the candidate official could be a legal professional, healthcare professional, engineer, political representative, military personnel, and the like.
[0148] Aspects of the invention are described above with reference to verifying a police badge. Nevertheless, these techniques could be used to verify a range of different articles of identification such as epaulettes, insignia (such as military insignia), ID cards, and the like.
[0149] Methods of determining location are described above with reference to use of Global Positioning System, GPS coordinates. Nevertheless, the skilled person will appreciate that different methods of obtaining a geographic location may be used. For example, other global navigation satellite systems include GLONASS, BeiDou and Galileo. Other positioning systems could be used, such as positioning based on cellular signals.
Claims (23)
- -29 -CLAIMS: 1. A method of verifying an identity of a candidate official, the method comprising: communicating data relating to a candidate official from a mobile device to an identity verification server, wherein the data relating to the candidate official comprises one or more of: one or more images and/or videos depicting a face of the candidate official, one or more images and/or videos depicting an article of identification displayed by the candidate official, and wireless signal data received by a wireless receiver of the mobile device from a wireless transmitter associated with the candidate official: and communicating validation information from the identity verification server to the mobile device, wherein the validation information comprises a result of a comparison between the data relating to the candidate official and registered official identification data retrieved from an identity database.
- 2. The method of claim 1, wherein the validation information comprises a result of a search for registered official identification data in the identity database that matches or partially matches the data relating to the candidate official.
- 3. The method of claim 1 or claim 2, wherein the validation information further comprises a registered official profile comprising registered official identification data retrieved from the identity database.
- 4. The method of any preceding claim, wherein the data relating to the candidate official further comprises one or more of: geographic location data indicating where the data relating to the candidate official was obtained; and time and/or date data indicating when the geographic location data relating to the candidate official was obtained.
- 5. The method of any preceding claim, wherein the registered official identification data comprises one or more of: one or more images and/or videos depicting a face of the registered official; -30 -one or more images depicting an article of identification displayed by the registered official; one or more images and/or videos depicting a vehicle associated with the registered official; a signal verification code for verifying a wireless signal transmitted by a wireless transmitter associated with the registered official; a registration code associated with the registered official; a registration code associated with an article of identification displayed by the registered official; a registration code associated with a vehicle associated with the registered official; geographic location data indicating a last known location of the registered official and/or a vehicle associated with the registered official, preferably also including time and/or date information indicating when the registered official was at the location; a name of the registered official; a place of work of the registered official; a current occupation of the registered official; a status of duty and/or work schedule of the registered official; data relating to workplace offenses committed by the registered official and/or incidents in which the registered official was involved; one or more images and/or videos depicting a face of an individual suspected of impersonating the registered official; and geographic location data indicating a location of an individual suspected of impersonating the registered official, preferably also including time and/or date information indicating when the individual suspected of impersonating the registered official was at the location.
- 6. The method of any preceding claim, wherein the data relating to the candidate official comprises one or more images and/or videos depicting the face of the candidate official, wherein the registered official identification data comprises one or more images and/or videos depicting the face of the registered official, and wherein the comparison between the data relating to the candidate official and the registered official identification data is performed using facial recognition techniques.
- -31 - 7. The method of claim 6, wherein the comparison between the data relating to the candidate official and the registered official identification data is performed by an identity recognition server comprising a facial recognition matching application.
- 8. The method of claim 6 or claim 7, wherein the comparison between the data relating to the candidate official and the registered official identification data results in potential matches with a plurality of registered officials, wherein the method further comprises communicating, from the identity verification server to the mobile device, one or more images and/or videos depicting the face of each of the registered officials that potentially match the candidate official.
- 9. The method of claim 8, further comprising, communicating a message from the mobile device to the identity verification server that either: identifies one of the plurality of potential matches as a best match with the candidate official; or indicates that none of the plurality of potential matches is a match with the candidate official.
- 10. The method of claim 9, wherein the message identifies one of the plurality of potential matches that is a best match with the candidate official, the method further comprising communicating profile information of the registered official that is the best match.
- 11. The method of any preceding claim, wherein the data relating to the candidate official comprises one or more images and/or videos depicting an article of identification displayed by the candidate official, and wherein: a) the method further comprises analysing the one or more images and/or videos depicting an article of identification displayed by the candidate official and determining whether the article of identification displayed by the candidate official is a genuine article of identification belonging to a registered official; and/or b) wherein the registered official identification data is retrieved from the identity database based on a registration code of the candidate official determined from one or more images and/or videos depicting an article of identification displayed by the candidate official.
- -32 - 12. The method of any preceding claim, wherein the data relating to the candidate official comprises wireless signal data received by a wireless receiver of the mobile device from a wireless transmitter associated with the candidate official, wherein the method further comprises analysing the wireless signal data and, based on unique characteristics of the wireless signal data, determining whether the wireless signal data originates from a genuine wireless transmitter associated with a registered official.
- 13. The method of any preceding claim, wherein the validation information comprises an indication that either: the data relating to the candidate official does not match with the registered official identification data retrieved from the identity database; or the search for registered official identification data in the identity database that matches or partially matches the data relating to the candidate official results in zero potential matches.
- 14. The method of any of claims 1 to 12, wherein the validation information further comprises a registered official profile comprising registered official identification data retrieved from the identity database, wherein the method further comprises communicating, from the mobile device to the identity verification server, an indication that the candidate official does not match with the registered official profile.
- 15. The method of claim 13 or claim 14, wherein the data relating to the candidate official is stored in a database in response to either: a) determining that the data relating to the candidate official does not match with the registered official identification data retrieved from the identity database; b) determining that the search for registered official identification data in the identity database that matches or partially matches the data relating to the candidate official results in zero potential matches; or c) receiving an indication that the candidate official does not match with the registered official profile.
- 16. The method of any preceding claim, wherein the data relating to the candidate official is communicated from an identity verification application on the mobile device, wherein the data relating to the candidate official is digitally signed by the identity verification application.
- -33 - 17. The method of claim 16, wherein the method comprises: communicating the validation information from the identity verification server to the mobile device in response to verification that the data relating to the candidate official is validly signed; or communicating an error message from the identity verification server to the mobile device in response to a determination that the data relating to the candidate official is not validly signed.
- 18. The method of any preceding claim, wherein the method further comprises: storing the data relating to the candidate official in a tracking data store; reviewing data in the tracking data store from a plurality of different mobile devices; assigning a trust score to each of the plurality of mobile devices, wherein reviewing the data in the tracking data comprises identifying one or more mobile devices that have submitted suspicious data relating to a candidate official and reducing the trust score of the one or more mobile devices, wherein identifying suspicious data comprises one or more of: a) determining that identical data relating to a candidate official has been communicated by first and second different mobile devices; b) determining that a mobile device has submitted logically inconsistent data; c) determining that a mobile device has submitted a volume of data relating to candidate officials above a predetermined threshold in a predetermined time period; and d) analysing the data in the tracking data store using machine learning to identify devices submitting fake reports. 25
- 19. The method of claim 18, further comprising analysing the data in the tracking data store using machine learning to: identify behaviour of individuals impersonating registered officials; identify suspicious data relating to a candidate official; and/or identify behaviour of a mobile device submitting suspicious data relating to one or more candidate officials.
- 20. A mobile device comprising memory storing instructions that, when executed on a processor of the mobile device, cause the mobile device to perform the method of any of claims 1 to 17.-34 -
- 21. An identity verification server comprising memory storing instructions that, when executed on a processor of the identity verification server, cause the identity verification server to perform the method of any of claims 1 to 19.
- 22. A system configured to perform the method of any of claims 1 to 19.
- 23. Computer software comprising instructions that, when executed by a processor of a mobile device or server, cause the mobile device or server to perform the method of any of claims 1 to 19.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB2112399.7A GB202112399D0 (en) | 2021-08-31 | 2021-08-31 | DMZ police officer identity authentication system |
Publications (3)
Publication Number | Publication Date |
---|---|
GB202113666D0 GB202113666D0 (en) | 2021-11-10 |
GB2610241A true GB2610241A (en) | 2023-03-01 |
GB2610241B GB2610241B (en) | 2024-06-05 |
Family
ID=77999596
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GBGB2112399.7A Ceased GB202112399D0 (en) | 2021-08-31 | 2021-08-31 | DMZ police officer identity authentication system |
GB2113666.8A Active GB2610241B (en) | 2021-08-31 | 2021-09-24 | Identity Verification Method and System |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GBGB2112399.7A Ceased GB202112399D0 (en) | 2021-08-31 | 2021-08-31 | DMZ police officer identity authentication system |
Country Status (1)
Country | Link |
---|---|
GB (2) | GB202112399D0 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116777447B (en) * | 2023-08-25 | 2023-11-14 | 国网山东省电力公司滨州市滨城区供电公司 | Quick fee refund method, system, terminal and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1833003A2 (en) * | 2006-03-07 | 2007-09-12 | Kabushiki Kaisha Toshiba | Face authentication apparatus and face authentication method |
CN108898122A (en) * | 2018-07-03 | 2018-11-27 | 河南亚视软件技术有限公司 | A kind of Intelligent human-face recognition methods |
CN111753271A (en) * | 2020-06-28 | 2020-10-09 | 深圳壹账通智能科技有限公司 | Account opening identity verification method, account opening identity verification device, account opening identity verification equipment and account opening identity verification medium based on AI identification |
CN112613020A (en) * | 2020-12-31 | 2021-04-06 | 中国农业银行股份有限公司 | Identity verification method and device |
-
2021
- 2021-08-31 GB GBGB2112399.7A patent/GB202112399D0/en not_active Ceased
- 2021-09-24 GB GB2113666.8A patent/GB2610241B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1833003A2 (en) * | 2006-03-07 | 2007-09-12 | Kabushiki Kaisha Toshiba | Face authentication apparatus and face authentication method |
CN108898122A (en) * | 2018-07-03 | 2018-11-27 | 河南亚视软件技术有限公司 | A kind of Intelligent human-face recognition methods |
CN111753271A (en) * | 2020-06-28 | 2020-10-09 | 深圳壹账通智能科技有限公司 | Account opening identity verification method, account opening identity verification device, account opening identity verification equipment and account opening identity verification medium based on AI identification |
CN112613020A (en) * | 2020-12-31 | 2021-04-06 | 中国农业银行股份有限公司 | Identity verification method and device |
Also Published As
Publication number | Publication date |
---|---|
GB202112399D0 (en) | 2021-10-13 |
GB202113666D0 (en) | 2021-11-10 |
GB2610241B (en) | 2024-06-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11238722B2 (en) | Methods and systems for providing online monitoring of released criminals by law enforcement | |
CN112789611A (en) | Identifying and verifying individuals using facial recognition | |
EP3407232B1 (en) | Spatiotemporal authentication | |
CA2770406C (en) | An intelligent peripheral device and system for the authentication and verification of individuals and/ or documents through a secure multifunctional authentication service with data storage capability | |
CN106850199B (en) | Fake-licensed vehicle identification method, device and system | |
CN107870983A (en) | Vehicle peccancy approaches to IM, block chain and storage medium based on block chain | |
AU2018201140B2 (en) | System and method for candidate profile screening | |
US20110001604A1 (en) | Automatic incident reporting in an access control system | |
US20200293639A1 (en) | Methods and systems for ensuring that an individual is authorized to conduct an activity | |
CN106339740B (en) | A kind of managing and control system of article unique identification management-control method and application this method | |
US11983301B2 (en) | Systems and methods for virtual traffic stops | |
CN111369797A (en) | Vehicle monitoring method, electronic fence construction method, electronic fence and device | |
US20070025600A1 (en) | Printer with fingerprint identification function | |
CN202306814U (en) | Network monitoring system for motor vehicle designated-driving | |
CN111639879B (en) | Intelligent security personnel information management method, device and system, storage medium and server | |
CA3202706A1 (en) | Method and apparatus for user recognition | |
CN110557722B (en) | Target group partner identification method and related device | |
US11790638B2 (en) | Monitoring devices at enterprise locations using machine-learning models to protect enterprise-managed information and resources | |
GB2610241A (en) | Identity Verification method and system | |
CN117037489A (en) | Expressway accident remote disposal method and system | |
US20070094720A1 (en) | Security system | |
US20220165136A1 (en) | Identifying and logging mobile devices posing security threats | |
CN111447563B (en) | Target object tracking method and security system | |
WO2012178186A1 (en) | Identification and authentication system and method | |
CN111861267A (en) | Scoring assessment method based on prison management |