Biometric face recognition for applicant screening
First Claim
1. A method of screening applicants comprising the steps of:
- (a) receiving a request to apply from an applicant, said applicant appearing in person at an applicant screening branch;
(b) capturing a digital facial image of said applicant;
(c) converting without dithering said digital facial image of said applicant to a bilevel digital facial image of said applicant;
(d) transmitting said bilevel digital facial image of said applicant, along with data identifying said request to apply, from said applicant screening branch to a computing location;
(e) comparing, using computer based face recognition at said computing location, said bilevel digital facial image of said applicant with the bilevel digital facial images of prior applicants;
(f) examining, using computer accessible databases, a history of prior requests to apply from applicants whose bilevel digital facial images closely resemble said applicant, to detect behavior indicative of application fraud;
(g) updating, automatically, using computer accessible databases, said history of prior requests to apply, to include said bilevel digital facial image of said applicant, along with said data identifying said request to apply;
(h) providing notification of the results of the examination for application fraud, to encourage further scrutiny and a possible rejection of said request to apply, as appropriate;
(i) repeating all the above steps, a through h, for any subsequent request to apply at any subsequent applicant screening branch.
4 Assignments
0 Petitions
Accused Products
Abstract
Biometric facial comparison is deployed in a novel way to improve screening of applicants across multiple branch locations, preventing common forms of application fraud. The biometric facial comparison software is located at a computing location (20), readily accessible from a first applicant screening branch (30) and a subsequent applicant screening branch (40), by means of a communication network (10). The biometric facial screening is fast, affordable, nonintrusive, and takes place in person in the branch. Even if false identification documents are used, perpetrators will be automatically detected as they attempt to go from branch to branch making bogus transactions. Patterns of fraudulent behavior are detected even if no prior transaction is yet known to be fraudulent, and even if the applicant'"'"'s face does not match the face of any known perpetrator. Although the first fraudulent transaction will generally not be immediately detected, detection will occur before any subsequent transaction are processed or approved.
320 Citations
17 Claims
-
1. A method of screening applicants comprising the steps of:
-
(a) receiving a request to apply from an applicant, said applicant appearing in person at an applicant screening branch; (b) capturing a digital facial image of said applicant; (c) converting without dithering said digital facial image of said applicant to a bilevel digital facial image of said applicant; (d) transmitting said bilevel digital facial image of said applicant, along with data identifying said request to apply, from said applicant screening branch to a computing location; (e) comparing, using computer based face recognition at said computing location, said bilevel digital facial image of said applicant with the bilevel digital facial images of prior applicants; (f) examining, using computer accessible databases, a history of prior requests to apply from applicants whose bilevel digital facial images closely resemble said applicant, to detect behavior indicative of application fraud; (g) updating, automatically, using computer accessible databases, said history of prior requests to apply, to include said bilevel digital facial image of said applicant, along with said data identifying said request to apply; (h) providing notification of the results of the examination for application fraud, to encourage further scrutiny and a possible rejection of said request to apply, as appropriate; (i) repeating all the above steps, a through h, for any subsequent request to apply at any subsequent applicant screening branch. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of screening applicants for check cashing privileges or pay-by-check privileges comprising the steps of:
-
(a) receiving a request for said privileges from an applicant, said applicant appearing in person at an applicant screening branch; (b) capturing a digital facial image of said applicant; (c) converting without dithering said digital facial image of said applicant to a bilevel digital facial image of said applicant; (d) transmitting said bilevel digital facial image of said applicant, along with data identifying said request for said privileges, from said applicant screening branch to a computing location; (e) comparing, using computer based face recognition at said computing location, said bilevel digital facial image of said applicant with the bilevel digital facial images of prior applicants; (f) examining, using computer accessible databases, a history of prior requests to apply from applicants whose bilevel digital facial images closely resemble said applicant, to detect behavior indicative of fraud; (g) updating, automatically, using computer accessible databases, said history of prior requests to apply, to include said digital facial image of said applicant, along with said data identifying said request for said privileges; (h) providing notification of the results of the examination for application fraud, to encourage further scrutiny and a possible rejection of said request for said privileges, as appropriate; (i) repeating all the above steps, a through h, for any subsequent request for said privileges at any subsequent applicant screening branch. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
Specification