Process and system for the material reduction of counterfeit and identity-maker fraud
First Claim
1. A method of authenticating a document requiring authentication, said method comprising the steps of:
- scanning said document;
detecting relevant elements on said document;
detecting validation symbols on said document;
extracting encrypted secure identity code stored in the validation symbols;
extracting characteristic components from the encrypted secure identity code stored in the validation symbols, wherein said characteristic components cannot be re-created into human readable data forms corresponding to the relevant elements on said document;
translating the relevant elements on said document into data forms that correspond with the characteristic components stored in the validation symbols on said document; and
determining whether the translated relevant elements on said document correspond with the characteristic components stored in the validation symbols on said document.
4 Assignments
0 Petitions
Accused Products
Abstract
A method, system and product for the material reduction of counterfeit and identity/maker fraud as it relates to payment vehicles and other authentication-requiring documents. The authentication system allows an institution to apply a code comprising relevant elements of an end-user to an authentication-requiring document. The authentication system allows institutions to validate the authentication-requiring documents at the point of presentment. The authentication system is stand alone and self-authenticating, allowing institutions to include the method, system and product anywhere in the institutions'"'"' document verification or manufacturing process.
122 Citations
43 Claims
-
1. A method of authenticating a document requiring authentication, said method comprising the steps of:
-
scanning said document;
detecting relevant elements on said document;
detecting validation symbols on said document;
extracting encrypted secure identity code stored in the validation symbols;
extracting characteristic components from the encrypted secure identity code stored in the validation symbols, wherein said characteristic components cannot be re-created into human readable data forms corresponding to the relevant elements on said document;
translating the relevant elements on said document into data forms that correspond with the characteristic components stored in the validation symbols on said document; and
determining whether the translated relevant elements on said document correspond with the characteristic components stored in the validation symbols on said document. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method of creating an authentication-requiring document, said method comprising the steps of:
-
collecting relevant elements from data associated with an end-user;
analyzing the collected relevant elements;
translating the relevant elements to characteristic components;
compressing the characteristic components;
encoding the compressed characteristic components into a secure identity code of approximately 100 bytes in size per end-user;
securely delivering the secure identity code to a machine readable system; and
printing an encoded version of the secure identity code on the authentication-requiring document. - View Dependent Claims (14, 15)
-
-
16. A method of creating and maintaining validation symbol, said method comprising the steps of:
-
obtaining a secure identity code;
encrypting the secure identity code; and
converting the encrypted secure identity code to validation symbols to be placed on an authentication-requiring document. - View Dependent Claims (17, 18, 19, 20, 21)
-
-
22. A computer readable storage medium containing a computer readable code for operating a computer to perform a method of authenticating a document with a validation symbol, said method comprising the steps of:
-
scanning said document;
detecting relevant elements on said document;
detecting validation symbols on said document;
extracting encrypted secure identity code stored in the validation symbols;
extracting characteristic components from the encrypted secure identity code stored in the validation symbols, wherein said characteristic components cannot be re-created into human readable data forms corresponding to the relevant elements on said document;
translating the relevant elements on said document into data forms that correspond with the characteristic components stored in the validation symbols on said document; and
determining whether the translated relevant elements on said document correspond with the characteristic components stored in the validation symbols on said document. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. A system comprising a stand alone authentication-requiring document computer program, said program causing the system to perform the steps of:
-
collecting relevant elements from data associated with the end-user;
analyzing the collected relevant elements;
translating the relevant elements to characteristic components;
compressing the characteristic components;
encoding the compressed characteristic components into a secure identity code of approximately 100 bytes in size per end-user;
securely delivering the secure identity code to a machine readable system; and
printing an encoded version of the secure identity code on the authentication-requiring document. - View Dependent Claims (34, 35)
-
-
36. A system for generating a validation symbol comprising of a stand alone capture translating computer program, said program causing the system to perform the steps of:
-
obtaining a secure identity code;
encrypting the secure identity code; and
converting the encrypted secure identity code to validation symbol to be placed on authentication-requiring document. - View Dependent Claims (37, 38, 39, 40, 41)
-
-
42. A method of authenticating an authentication-requiring document, said method comprising the steps of:
-
capturing information that will assist in authenticating the authentication-requiring document, said information including but not limited to reference data defining signatures, document details and account information;
converting the captured information into a symbol, wherein said symbol cannot be re-created into human readable form;
applying the symbol on the authentication-requiring document;
scanning the authentication-requiring document;
reading the symbol on the authentication-requiring document;
reading aspects of the authentication-requiring document appropriate for comparison with the symbol read; and
applying an automated evaluative process that will output a confidence level regarding the authenticity of the authentication-requiring document.
-
-
43. A check comprising:
-
a substrate; and
a validation symbol used for authentication of said check located on the substrate, said validation symbol being produced by;
collecting relevant elements from data associated with an end-user;
analyzing the collected relevant elements;
translating the relevant elements to characteristic components;
compressing the characteristic components;
encoding the compressed characteristic components into a secure identity code of approximately 100 bytes in size per end-user;
securely delivering the secure identity code to a machine readable system; and
printing an encoded version of the secure identity code on the substrate.
-
Specification