Method and apparatus for depositing paper checks from home or office
First Claim
1. A method of protecting a document which will be transformed into a value bearing instrument after adding additional markings to the document from fraudulent alteration of the markings comprising the steps of:
- generating encryptions of a unique identifier X of the document, the unique identifier X being printed on the document; and
covering each critical field k, k=1,2,3. . . , of the document where markings are to be added with encrypted versions of X, Signk,0(X), where Signk,0(X) is a cryptographic function or family thereof which is known only to an institution which issues the document, Signk,0(X) being used to authenticate the document.
1 Assignment
0 Petitions
Accused Products
Abstract
A form of paper checks, and the apparatus and method to handle them, allows deposit from home or office. The apparatus can be implemented with a Personal Computer (PC) having a secure cryptography generator (SCG) installed. The process of depositing paper checks begins by the payee endorsing a check having printed thereon encryptions in at least selected locations where information is written by a payer. The act of writing by the payee obscuring some of the encryptions. The payee then scans the endorsed check with a scanner to generate a digitized version of the check. The computer extracts from the digitized version of the check a concatenated branch number, account number and check number and a corresponding digital signature. The payee then transmits the extracted information together with the digitized version of the check for deposit. The checks a specially designed to prevent fraud such alteration of the payee, amount and multiple deposits. In addition to the encryptions imprinted on the check, a secret key and a plurality of digital signatures are generated based on the concatenated branch number, account number and check number.
167 Citations
38 Claims
-
1. A method of protecting a document which will be transformed into a value bearing instrument after adding additional markings to the document from fraudulent alteration of the markings comprising the steps of:
-
generating encryptions of a unique identifier X of the document, the unique identifier X being printed on the document; and
covering each critical field k, k=1,2,3. . . , of the document where markings are to be added with encrypted versions of X, Signk,0(X), where Signk,0(X) is a cryptographic function or family thereof which is known only to an institution which issues the document, Signk,0(X) being used to authenticate the document. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
-
25. A document protecting against fraudulent alteration of markings added to the document to transform the document into a value bearing instrument, the document having printed thereon and covering each critical field k, k=1,2,3. . . , where markings are added to the document encrypted versions a unique identifier X printed on the document, Signk0(X), where Signk0(X) is a cryptographic function or family thereof which is known only to an institution which issues the document, Signk0(X) being used to authenticate the document.
Specification