NETWORK-IMPLEMENTED METHODS AND SYSTEMS FOR AUTHENTICATING A CHECK
First Claim
Patent Images
1. A system for authentication and verification of a financial check instrument comprising:
- a. a first data access module comprising at least one imaging subsystem;
b. a second data access module comprising at least one imaging subsystem, wherein the second data access module is temporospatially separate from the first data access module;
c. a backend management server comprising;
an image processing module, a data processing module, a memory; and
a processor in electronic communication with the memory, the first data access module, the second data access module, the data processing module and the image processing module, wherein the processor is configured to;
i. receive a first image corresponding to a first financial check instrument from the first data module;
ii. receive a second image corresponding to the second data access module;
iii. partition the first image into a plurality of fields;
iv. partition the second image into the same plurality of fields;
v. compare the plurality of fields of the second image to the plurality of fields of the first image;
vi. determine the degree of similarity between the first image and the second image; and
vii. if the degree of similarity is above a predetermined threshold value, provide an authentication indicia to the second data access module, else provide an indicia of a lack of authenticity.
0 Assignments
0 Petitions
Accused Products
Abstract
The disclosure relates generally to checks and other negotiable financial instruments and particularly to mitigating exposure to financial fraud. Specifically, the disclosure relates to systems and methods of authenticating checks issued by a first entity for the benefit of a third party.
43 Citations
23 Claims
-
1. A system for authentication and verification of a financial check instrument comprising:
-
a. a first data access module comprising at least one imaging subsystem; b. a second data access module comprising at least one imaging subsystem, wherein the second data access module is temporospatially separate from the first data access module; c. a backend management server comprising;
an image processing module, a data processing module, a memory; and
a processor in electronic communication with the memory, the first data access module, the second data access module, the data processing module and the image processing module, wherein the processor is configured to;i. receive a first image corresponding to a first financial check instrument from the first data module; ii. receive a second image corresponding to the second data access module; iii. partition the first image into a plurality of fields; iv. partition the second image into the same plurality of fields; v. compare the plurality of fields of the second image to the plurality of fields of the first image; vi. determine the degree of similarity between the first image and the second image; and vii. if the degree of similarity is above a predetermined threshold value, provide an authentication indicia to the second data access module, else provide an indicia of a lack of authenticity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of authenticating a paper financial instrument, comprising:
-
a. receiving, by a backend management server, a first image corresponding to a first check from a first data access module, wherein the first data access module is in electronic communication with the backend management server; b. receiving by the backend management server a second image corresponding to a second paper financial instrument from a second data access module, wherein the second data access module is temposrospatially separated from the first data access module and is in electronic communication with the backend management server; c. using the backend management server, partitioning the first image into a plurality of fields; d. using the backend management server, partitioning the second image into the same plurality of fields; e. using the backend management server, comparing the plurality of fields of the second image to the plurality of fields of the first check image in order to determine a level of similarity between the second image and the first image; f. using the backend management server, determining the degree of similarity between the second image and the first image; and g. if the degree of similarity is above a predetermined threshold, providing an authentication indicia to a user associated with the second data access module, else providing the user associated with the second data access module with an indicia of a lack of authenticity. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer-readable medium comprising computer-readable instructions for authenticating a check, said computer-readable instructions resident on a backend management server, configured for causing a processor to:
-
a. receive a first image corresponding to a first check from a first data module, wherein the first data access module is in electronic communication with the backend management server; b. receive a second image corresponding to a second check from a second data access module, wherein the second data access module is temposrospatially separated from the first data access module and is in electronic communication with the backend management server; c. partition the first image into a plurality of fields; d. partition the second image into the same plurality of fields; e. compare the plurality of fields of the second check image to the plurality of fields of the first check image in order to determine a level of similarity between the second image and the first image; f. determine the degree of similarity between the first check image and the second check image; and g. if the degree of similarity between the two check images is above a predetermined threshold value, provide an authentication indicia to a user associated with the second data access module, else provide the user with an indicia of a lack of authenticity. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
Specification