Using a surface based computing device for verification of an identification document
First Claim
1. A method of granting access to a secured resource based upon verifying an identification document comprising:
- identifying an identification document placed on a surface based computing device, wherein the surface based computing device lacks keyboard and mouse peripherals for interactions, wherein said surface based computing device includes a graphical user interface comprising a detection area for presenting the identification document for scanning and an input mechanism comprising a plurality of user selectable, touch-sensitive keys, each of the keys comprising an alpha-numeric label representing an input character received when a user touches the corresponding key;
capturing an image of a user presenting the identification document;
the surface based computing device digitally encoding information from the identification document, by scanning the identification document once it is placed in the detection area;
analyzing the digitally encoded information to determine a type of the identification document;
retrieving features for the determined type of identification document from a data store;
comparing the digitally encoded information against the retrieved features to determine a compatibility score;
comparing the image of the user against an image contained within the digitally encoded information;
when the compatibility score exceeds a previously established threshold, verifying the identification document as authentic; and
when the compatibility score does not exceed the previously established threshold, determining that the identification document is not verified, wherein verified identification documents are utilized to grant a related user access to a secured resource; and
basing the granting of access to the secured resource upon comparison results of the captured image of the user and the image from the identification document as well as input received via the input mechanism.
1 Assignment
0 Petitions
Accused Products
Abstract
The current invention discloses a solution for using a surface based computing device for verification of an identification document, such as a driver'"'"'s license. A surface based computing device can be a device capable of scanning an identification document, comparing the scanned document against a set of conditions for a valid document, and reporting comparison results. A secured resource can be granted based at least in part upon identity verifications conducted by the surface based computing device. The surface based computing device can include a MICROSOFT SURFACE device or any other computing device able to scan an identification document and to process scanned results. In one embodiment, the surface based computing device can be used in conjunction with a human agent for added security.
54 Citations
19 Claims
-
1. A method of granting access to a secured resource based upon verifying an identification document comprising:
-
identifying an identification document placed on a surface based computing device, wherein the surface based computing device lacks keyboard and mouse peripherals for interactions, wherein said surface based computing device includes a graphical user interface comprising a detection area for presenting the identification document for scanning and an input mechanism comprising a plurality of user selectable, touch-sensitive keys, each of the keys comprising an alpha-numeric label representing an input character received when a user touches the corresponding key; capturing an image of a user presenting the identification document; the surface based computing device digitally encoding information from the identification document, by scanning the identification document once it is placed in the detection area; analyzing the digitally encoded information to determine a type of the identification document; retrieving features for the determined type of identification document from a data store; comparing the digitally encoded information against the retrieved features to determine a compatibility score; comparing the image of the user against an image contained within the digitally encoded information; when the compatibility score exceeds a previously established threshold, verifying the identification document as authentic; and when the compatibility score does not exceed the previously established threshold, determining that the identification document is not verified, wherein verified identification documents are utilized to grant a related user access to a secured resource; and basing the granting of access to the secured resource upon comparison results of the captured image of the user and the image from the identification document as well as input received via the input mechanism. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A surface based computing device comprising:
-
a scanning device configured to scan an identification document; an identification engine implemented within software executed upon the surface based computing device, where the identification engine is configured to analyze an identification document scanned by the scanning device to determine a validity of the scanned document by comparing features of the scanned identification document against features of an identification document template for a document of a same type as the scanned identification document; an image capture device configured to capturing an image of a user presenting the identification document, wherein the surface based computing device is configured to compare the image against an image contained in the identification document that has been scanned by the scanning device, wherein a granting of access to the secured resource is based upon comparison results of the captured image and the scanned image; and a user interface configured to present at least one of a user and a human verification agent with verification results of the analysis performed by the identification verification engine, wherein the verification results are utilized to selectively grant access to a secured resource, wherein the user interface is configured to present a sample image of a valid document of the same type as the identification document to the human verification agent so that the human verification agent is able to compare the sample image against the identification document, wherein said surface based computing device lacks keyboard and mouse peripherals for interactions, wherein said user interface comprises a graphical user interface comprising a detection area for presenting the identification document for scanning and an input mechanism comprising a plurality of user selectable, touch-sensitive keys, each of the keys comprising an alpha-numeric label representing an input character received when a user touches the corresponding key. - View Dependent Claims (16, 17, 18)
-
-
19. A method of granting access to a secured resource based upon verifying an identification document comprising:
-
identifying an identification document placed on a surface based computing device, wherein the surface based computing device lacks keyboard and mouse peripherals for interactions, wherein said surface based computing device includes a graphical user interface comprising a detection area for presenting the identification document for scanning and an input mechanism comprising a plurality of user selectable, touch-sensitive keys, each of the keys comprising an alpha-numeric label representing an input character received when a user touches the corresponding key, wherein the identification document is placed within the detection area when placed on the surface; the surface based computing device digitally encoding information from the identification document; analyzing the digitally encoded information to determine a type of the identification document; retrieving features for the determined type of identification document from a data store; comparing the digitally encoded information against the retrieved features to determine a compatibility score; when the compatibility score exceeds a previously established threshold, verifying the identification document as authentic; when the compatibility score does not exceed the previously established threshold, determining that the identification document is not verified, wherein verified identification documents are utilized to grant a related user access to a secured resource; requiring a human verification agent to verify the identification document before granting access to the secured resource; presenting the human verification agent with verifying instructions for the identification document, wherein said verifying instructions are based upon the retrieved features; and prompting the human verification agent responsive to the analyzing the digitally encoded information to examine specific elements of the identification document to validate specific aspects of the identification document that are difficult for automated components of a system to detect, yet that are relatively easy for the human verification agent to discern.
-
Specification