US20190325675A1 - Identification scan in compliance with jurisdictional or other rules - Google Patents
Identification scan in compliance with jurisdictional or other rules Download PDFInfo
- Publication number
- US20190325675A1 US20190325675A1 US16/459,582 US201916459582A US2019325675A1 US 20190325675 A1 US20190325675 A1 US 20190325675A1 US 201916459582 A US201916459582 A US 201916459582A US 2019325675 A1 US2019325675 A1 US 2019325675A1
- Authority
- US
- United States
- Prior art keywords
- identification
- document
- identification document
- location
- jurisdiction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012545 processing Methods 0.000 claims description 39
- 238000012795 verification Methods 0.000 claims description 11
- 230000002265 prevention Effects 0.000 claims description 3
- 238000012552 review Methods 0.000 claims description 3
- 238000004891 communication Methods 0.000 claims description 2
- 230000000873 masking effect Effects 0.000 claims description 2
- 230000004044 response Effects 0.000 claims description 2
- 238000000034 method Methods 0.000 abstract description 27
- 230000026676 system process Effects 0.000 abstract 1
- 230000008569 process Effects 0.000 description 13
- 230000000694 effects Effects 0.000 description 8
- 230000033228 biological regulation Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 6
- 230000014759 maintenance of location Effects 0.000 description 5
- 238000012550 audit Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 238000013500 data storage Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012015 optical character recognition Methods 0.000 description 2
- 238000013474 audit trail Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000004397 blinking Effects 0.000 description 1
- 239000000969 carrier Substances 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000011012 sanitization Methods 0.000 description 1
Images
Classifications
-
- G07C9/00103—
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10366—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the interrogation device being adapted for miscellaneous applications
- G06K7/10415—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the interrogation device being adapted for miscellaneous applications the interrogation device being fixed in its position, such as an access control device for reading wireless access cards, or a wireless ATM
-
- G06K9/00—
-
- G07C9/00007—
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
Definitions
- Identity verification is critical for various transactions or activities, such as transactions of age-restricted merchandise or access control activities for certain restricted areas.
- a sales clerk or gate keeper can manually check an identification document of an individual who is involved in a transaction or wants to have access to a restricted area.
- manual verification can be a time-consuming process and can be subject to inaccuracies due to human errors.
- FIG. 1 is a flowchart illustrating a method implemented by an identification scanning system for retrieving identification information from an identification document and sequentially applying applicable rules to the retrieved information.
- FIG. 2 is a flowchart illustrating a method implemented by an identification scanning system for retrieving identification information from an identification document and applying applicable rules in parallel to the retrieved information.
- FIG. 3 is a flowchart illustrating a method implemented by an identification scanning system for identifying applicable rules to retrieve information from an identification document and then retrieving the information in accordance with the rules.
- FIG. 4 is a schematic diagram illustrating a system for performing identification scans in compliance with jurisdictional or other rules.
- FIG. 5 is a schematic diagram illustrating a scanning device and an identification document.
- FIG. 6 is a schematic diagram illustrating a user interface for the system for performing identification scans in compliance with jurisdictional or other rules.
- Identity verification plays an important role in transactions, activities, or interactions among parties who are not familiar with one another.
- identification documents e.g., a driver license, an identification card, a passport, or other suitable documents containing sufficient information to help verify the identity of an individual
- Systems that can automatically read identification documents are increasingly used by businesses, governments, or individuals because they provide a fast, convenient and accurate solution for identity verification.
- the present system and method provide a convenient way to automatically verify identity of an identification document holder while maintaining compliance with applicable electronic scanning rules of various jurisdictions. More particularly, the present system and method enable scanning, processing, and utilizing (by, for example, presenting and/or storing) identification information derived from identification documents in a rule-compliant fashion.
- the scanning process includes a manual or automatic process of capturing any suitable information (including but not limited to images, embedded information, coded information, layout information, etc.) by a suitable scanning device.
- the system utilizes a database that contains relevant rules and regulations from various jurisdictions.
- the database can be centralized (e.g., a network-accessible database having all relevant rules) or decentralized (e.g., databases having relevant rules stored in various devices).
- the system can retrieve (e.g., by a scanning device) identification information from an identification document and then receive applicable rules (of various jurisdictions) from the database. In other embodiments, the system can first receive applicable rules from the database and then retrieve identification information from an identification document.
- Applicable rules can be determined or identified based on various factors.
- the factors include, for example, an issuer of the identification document, a current location where the identification document is being read, and a proposed use of the information contained in the identification document by an operator of a document scanner.
- the issuer of an identification document can be a state government, a federal government, a national or local agency (e.g., a military service, a government agency), a corporation, or other suitable entity.
- the issuer can have its own rules or regulations associated with how the information may be used from the identification documents issued by it. For example, Jurisdiction A may prohibit transmission of identification information retrieved from any Jurisdiction A driver licenses to a third party.
- the current location of the identification document when it is being scanned can be another factor.
- Jurisdiction B can prohibit a seller from recording or maintaining certain sensitive information (e.g., name and address) derived from electronic scans of identification documents. Proposed uses of the scanned information by the operator of the document scanner can be another factor to consider. For example, Jurisdiction C may expressly prohibit the storage and use of identification information derived from electronic scans of identification documents for mailing list purposes.
- sensitive information e.g., name and address
- the present technology can process the retrieved identification information based on the applicable rules.
- the “processing” of scanned identification information includes applying use restrictions specified by the applicable rules to the identification information, such as redacting, masking, removing, not storing, not transmitting, using only for limited purposes, etc. some of the retrieved identification information.
- the system can delete, hide, mask, obscure, or edit the retrieved identification information, so as to make sure that an operator of the system (e.g., a sales clerk scanning a customer's identification document for a loyalty program) is in compliance with the applicable rules.
- the system can further present the processed identification information to a user via a user interface (e.g., on a display).
- the system can present an indication showing that the identification information has been processed and is being presented in compliance with the applicable rules. In some embodiments, the system can maintain a record of how the identification information has been processed and utilized for purposes of a subsequent audit to show that the system has been compliant with the applicable rules.
- the system disclosed herein can be implemented by a suitable software product or various types of applications.
- the system includes an input device (e.g., an identification scanner) configured to receive identification information.
- the system includes a processing module configured to process the received identification information based on multiple rules.
- the rules can be determined or identified at least based on an issuer of the identification document (e.g., a driver license issued by Jurisdiction A), a current location of the identification document (e.g., a used-car dealer's office in Jurisdiction B), and a proposed use of information from the identification document (e.g., to verify the identity of a potential used-car buyer for an application for a loan).
- the rules can be predetermined and stored in the system before the system retrieves the identification information. In other embodiments, the rules can be determined after the system retrieves the identification information.
- the system can identify the issuer of the identification document after retrieving the identification information, and the system can communicate with a database that stores relevant rules in various jurisdictions via a network.
- the system disclosed herein can be implemented in a dedicated scanning device, in a multi-purposes portable device (e.g., a smartphone, a notebook, a tablet, a phablet), or in other suitable devices, either fixed or mobile.
- FIG. 1 is a flowchart illustrating a method 100 implemented by an identification scanning system for displaying information derived from an identification document to a user of the identification scanning system.
- the system retrieves identification information from an identification document associated with an individual.
- the identification document can be a local government issued identification document (e.g., a driver's license, a state ID), a federal government issued identification document (e.g., a passport, a military identification), a non-government-issued identification document (e.g., a corporate ID, a school ID), or other suitable identification documents.
- the identification information can be retrieved by a scanning device.
- the identification information is encapsulated, embedded, or reflected in an identification document by visible text, barcodes, magnetic stripes, embedded data chips, etc. that are printed on, attached to, or contained in the identification document.
- the scanning device retrieves the identification information via image capture and optical character recognition (OCR), barcode reader, magnetic stripe reader, NFC chip reader, or other complementary technology. Additional details about techniques for scanning identification documents are described in commonly-owned U.S. Pat. No. 5,864,623, filed on Jul. 15, 1996 and entitled, “AUTHENTICATION SYSTEM FOR DRIVERS LICENSES” and U.S. Pat. No. 8,322,605, filed on Aug.
- the system receives information regarding an issuer of the identification document. For example, the system can identify that the scanned identification document is a document issued by Jurisdiction A based on embedded information readable/accessible through a scan of a barcode, a magnetic stripe, a read of an embedded data chip, or an analysis of the layout of the identification document. More particularly, for example, the system can recognize that the scanned identification document is a Jurisdiction-A ID by comparing the layout or format of the scanned identification document with an ID database that stores layout or format information of ID cards issued by various jurisdictions.
- the system can recognize textual content (e.g., a description of “JURISDICTION A—DRIVER LICENSE”) located at a specific portion (e.g., the upper portion) of the scanned identification document and learn the issuer information.
- the system can identify the issuer information by retrieving or reading information that is coded or embedded in the scanned identification document.
- the issuer information can also be received from a user input. That is, a user of the system may manually enter information into the system which characterizes the issuer of identification document that is being scanned.
- the system determines whether there exist any applicable rules based on the issuer. For example, Jurisdiction A may have specific rules regarding retention and use of data derived from any identification cards issued by it.
- relevant rules are maintained and stored in a centralized database, and the system can access the centralized database system via a wired or wireless network.
- the relevant rules can be stored in a local scanning device or at a local computing system at a point of sale.
- the system continues at block 107 to apply the identified rules to the retrieved identification information.
- Jurisdiction A may prohibit use of gender and age information derived from Jurisdiction-A-issued identification cards by electronic scans.
- the system can apply Jurisdiction A's rule by processing the retrieved identification information to delete the gender and age information retrieved from a Jurisdiction-A-issued identification card.
- processing proceeds to block 109 directly.
- the system receives a current location of the identification document.
- the current location can be generated, determined, or identified from various sources.
- the current location of the identification document being scanned can be determined using one or more methods, including: (1) accessing a database that contains the location where the system implementing the method 100 is installed (e.g., a record shows that a relevant software product was installed in a computing device located in a city such as Moab, Utah); (2) accessing a database containing a location of a physical building containing the point of sale (e.g., the current scanning operation occurs at a store located in Jurisdiction B); (3) using a service that converts a (network) virtual address to a physical location (e.g., a service shows that an Internet Protocol (IP) address of a computing device utilized in the scanning operation has a physical location in Jurisdiction B); or (4) using a global positioning system (GPS) or other similar location-determining technology to determine the current location of the scanning device (e.g., a GPS shows that
- Jurisdiction B may have specific rules regarding electronic scans of identification documents within its jurisdiction. Examples of specific rules include: (1) a prohibition of retention of any scanned data after use, (2) a prohibition of dissemination of scanned data to third parties, (3) a prohibition of using the scanned data for more than one purpose (e.g., using the scanned customer information for the purpose of age-restricted purchase and adding to a mailing list, (4) restrictions on the types of information that can be collected (e.g., a date of birth, an identification number, an expiration date, a name, or an address), and (5) a prohibition of storing certain types of information (e.g., a photograph, a social security number, a height, a weight, a race, or a signature).
- specific rules include: (1) a prohibition of retention of any scanned data after use, (2) a prohibition of dissemination of scanned data to third parties, (3) a prohibition of using the scanned data for more than one purpose (e.g., using the scanned customer information for the purpose of age-re
- the system continues at block 113 to apply the identified rules to the retrieved identification information. For example, if Jurisdiction B prohibits retention of age information from electronic scans of any identification documents, the system can apply this rule by processing the retrieved identification information to delete the age information retrieved from an identification card issued by any jurisdiction. In an event that no applicable rule has been identified at block 111 , processing proceeds to block 115 directly.
- the system receives a proposed use of the identification document.
- the proposed use can be based on a predetermined system setting.
- a system installed at a point of sale may be configured so that the proposed use of scanned information is for purposes of consummating a sale.
- a system at a car dealership may be configured so that the proposed use of the scanned information is to prevent fraud in loan applications.
- the proposed use is received from a user input.
- a cashier may indicate that the scanned information is to be used for purposes of signing up for a loyalty program.
- Jurisdiction C may only allow information electronically scanned from identification documents to be stored or shared for specific purposes (e.g., product returns, account collection activities, establishing contractual relationships, credit card applications, credit verification, identity verification, fraud prevention, criminal conduct prevention, advancing law enforcement, etc.) but prohibited for other activities (e.g., activities relating to general marketing or customer loyalty programs).
- specific purposes e.g., product returns, account collection activities, establishing contractual relationships, credit card applications, credit verification, identity verification, fraud prevention, criminal conduct prevention, advancing law enforcement, etc.
- other activities e.g., activities relating to general marketing or customer loyalty programs.
- the system applies the identified rules to the retrieved identification information. For example, if Jurisdiction C only allows use of electronically-scanned gender and age information for law enforcement purposes, the system can apply this rule by processing the retrieved identification information to delete the gender and age information retrieved from an identification card if the proposed use is not for law enforcement.
- the system displays the processed identification information based on the applied rules.
- the system presents the processed identification information to an operator or a user of the system (e.g., a sales clerk, a gate keeper, a used-car dealer, a loan officer, a police officer, or other suitable individual).
- the information may be presented on a computing device display or in a printout of a form or other document, stored for subsequent reference, and/or transmitted to other computing systems for additional processing.
- the processed identification information is a redacted version of the identification information. In other words, some identification information is stripped out and not presented to the user.
- the system ensures that the electronic scans of identification documents are in compliance with the identified applicable rules.
- the system can present the processed identification information along with an indication showing the reasons why the identification information has been redacted or restricted in some fashion (e.g., a description of “State Law Prohibits Electronic Scan of Age for Marketing”).
- the system generates and maintains a record regarding the scanned identification documents and resulting use of the scanned information for purposes of future review and audit.
- the system enables system users to provide evidence to appropriate authorities that demonstrate compliance with applicable rules.
- the sequence of receiving the information of the issuer, the current location, and the proposed use (and identifying/applying applicable rules) can be varied. For example, receiving the proposed use and identifying/applying applicable rules can be performed before receiving the issuer and the current location, depending on various designs.
- FIG. 2 is a flowchart illustrating a method 200 implemented by an identification scanning system for displaying information derived from an identification document.
- the system starts at block 201 to retrieve identification information from an identification document associated with an individual.
- the identification information can be retrieved by a scanning device, as discussed above.
- the system also receives information regarding an issuer of the identification document, a current location of the identification document, and a proposed use of the information from the identification document in parallel at blocks 203 , 205 , and 207 .
- the issuer of the identification document can be received from a user input.
- the current location can be generated, determined, or identified from various sources.
- the proposed use can be based on a predetermined setting or received from a user input.
- the system After receiving the information regarding the issuer, the current location, and the proposed use of the identification document, the system-determines whether there are any applicable rules based on the received information in parallel at decision blocks 209 , 211 , and 213 . In an event that no applicable rule has been identified, processing proceeds to block 223 directly. In an event that one or more applicable rules are identified at decision blocks 209 , 211 , and 213 , the system continues at block 215 to retrieve the identified applicable rules (e.g., from a local database or a centralized database, as discussed above). After retrieving the applicable rules, processing proceeds to decision block 217 to determine whether there is any conflict among the identified applicable rules. For example, conflicts may arise between a federal rule and a state rule.
- the system continues to block 219 to prioritize the identified applicable rules in conflict. For example, a federal rule may prevail when it conflicts with a state rule, and therefore a high priority is assigned to the federal rule while a low priority is assigned to the state rule.
- the system may selectively apply the most restrictive aspects of each of the rules to ensure that the system abides by the minimum requirements of both rules. For example, if one rule indicates that information can be used for marketing purposes but not for loyalty purposes, and another rule indicates that the information can be used for loyalty purposes but not marketing purposes, the system may bar the use of scanned information for either marketing purposes or for loyalty purposes. By applying the most conservative interpretation, the system helps ensure that all applicable rules are being met. If there is no conflict among the identified rules, processing proceeds to block 221 directly.
- Processing continues to block 221 to apply identified rules to the identification information. If there is a conflict of rules, then the rules are applied based on the priorities thereof. For example, when a rule with high priority conflicts with a rule with low priority, the rule with high priority is applied and the rule with low priority is ignored. As discussed above, applying the applicable rules can include processing (e.g., delete, hide, mask, obscure, or edit) the identification information. In some embodiments, an operator of the system can modify the rules manually (e.g., override an identified rule). In such case, the system can provide a warning to the operator so as to inform the operator that a manual modification may result in a violation of the identified rule.
- processing e.g., delete, hide, mask, obscure, or edit
- an operator of the system can modify the rules manually (e.g., override an identified rule). In such case, the system can provide a warning to the operator so as to inform the operator that a manual modification may result in a violation of the identified rule.
- the system presents the processed identification information based on the applied rules (e.g., it is presented to an operator of the system or stored for a future use such as a royalty program).
- the presented identification information can be a stripped version of the identification information.
- the system can make sure that the whole process (e.g., including electronic scans of identification documents and further uses of the retrieved information) involving identification documents from various jurisdictions is in compliance with identified applicable rules.
- the system can present the processed identification information along with an indication showing the reasons why the identification information needs to be processed.
- the system can generate and maintain a record regarding the whole process involving electronic scans of identification documents for purposes of a subsequent audit to show that the system has been compliant with the applicable rules.
- FIG. 3 is a flowchart illustrating a method 300 implemented by an identification scanning system for displaying information derived from an identification document.
- the system receives information regarding an issuer of the identification document.
- the issuer of the identification document can be retrieved by a scanning device.
- the issuer of the identification document can be received from a user input.
- processing continues at decision block 303 to determine whether there exist any applicable rules based on the issuer of the identification document.
- relevant rules from various jurisdictions are maintained and stored in a centralized database, and the system can access to the centralized database system via a wired or wireless network.
- the relevant rules are stored in a local scanning device or at a local computing system at a point of sale, visitor center or restricted area. In an event that one or more applicable rules are identified, the rules are “remembered” or stored. Processing then continues at block 307 .
- the system receives information regarding a current location of the identification document.
- the current location can be generated from various sources, as discussed above.
- processing proceeds to decision block 309 to determine whether there exist any applicable rules based on the second set of information. In an event that one or more applicable rules are identified at decision block 309 , the rules are “remembered” or stored. The system continues at block 313 .
- the system receives information regarding a proposed use of the identification document.
- the proposed use can be received from a predetermined setting or a user input.
- processing proceeds to decision block 315 to determine whether there exist any applicable rules on the proposed use based on the issuer and/or location. In an event that one or more applicable rules are identified, the rules are “remembered.” The system then continues at block 319 .
- the system determines whether there is any conflict among identified “remembered” applicable rules (e.g., a federal rule may conflict with a state rule for certain types of conduct). If there is no conflict among the identified rules, processing proceeds to block 323 directly. If there is a conflict among identified rules, processing proceeds to block 321 to prioritize the identified rules in conflict. The system continues to block 323 to retrieve identification information from the identification document in accordance with the “remembered” applicable rules. For example, Jurisdiction A may prohibit retrieving address information by electronic scanning an identification document for any purposes. In this case, the system would not retrieve the address information from the identification document (e.g., the system can identify the field of “Address” and skip it in the process of information retrieval).
- a conflict among identified “remembered” applicable rules e.g., a federal rule may conflict with a state rule for certain types of conduct. If there is no conflict among the identified rules, processing proceeds to block 323 directly. If there is a conflict among identified rules, processing proceeds to block 321 to prioritize
- the system displays the processed identification information to an operator.
- the processed identification information can be presented as a stripped or “sanitized” version of the identification information.
- the system can make sure that the whole process involving identification documents from various jurisdictions is in compliance with applicable rules.
- the system can present the processed identification information along with an indication showing the reasons why the identification information needs to be processed.
- the system can generate and maintain a record regarding the whole process involving electronic scans of identification documents for purposes of future review and audit (e.g., as evidence for compliance of applicable rules).
- the system can generate a statement stating that the use of the information scanned by the system has remained compliant with the applicable rules. The statement can be used to let an identification document holder (e.g., a customer at a store) know that the identification scan performed by the system is compliant with the applicable rules.
- FIG. 4 is a schematic diagram illustrating a system 400 .
- the system 400 can include a processor 401 , a memory 402 , an input device 403 , a processing module 405 , a display module 407 , a communication module 409 , and a data storage unit 411 .
- the system 400 can be a portable device (e.g., a smartphone, a notebook, a tablet, a phablet, or other suitable devices).
- the system 400 can communicate with an external database 411 via a network 413 .
- the network 413 can include the Internet, a corporate intranet, a wireless network, or other suitable networks.
- the database 415 can store multiple electronic scanning rules or regulations from various jurisdictions. In some embodiments, the database 415 can be a distributed database.
- the processor 401 is coupled to other components and configured to control the same.
- the memory 402 is configured to temporarily (or non-transitorily) store data or instructions processed by the processor 401 .
- the input device 403 can receive a user input (e.g., the issuer, the current location, and the proposed use for identifying applicable rules as discussed above).
- the input device 403 can be a scanning device for retrieving identification information from an identification document associated with an individual.
- the input device 403 can be configured to have embedded information regarding a location or a proposed use.
- the input device 403 can be designed or programmed to use only in a certain jurisdiction (e.g., a store located in Jurisdiction A).
- the input device 403 can be designed or programmed for a specific purpose, such as a customer royalty program.
- the embedded information can be used to determine one of the factors (e.g., the “location” factor and the “proposed use” factor discussed above) that are used to identify applicable rules in various jurisdictions.
- the processing module 405 is configured to process the retrieved identification information based on identified applicable rules (e.g., these rules can be identified at and received from the database 415 based on predetermined criteria such as the issuer, the current location, and the proposed use). In some embodiments, the processing module 405 can delete, hide, mask, obscure, or edit the retrieved identification information based on multiple identified applicable rules.
- the display module 407 is configured to present the processed identification information to an operator or a user of the system 400 (e.g., a sales clerk uses the system 400 to scan a customer's identification document for identity verification).
- the identified applicable rules can be stored in the data storage unit 411 , such that the system 400 can have access to the identified applicable rules without accessing the network 413 .
- This arrangement enables the system 400 to function normally without network connection.
- the data storage unit 411 can be used to store the redacted or processed identification information for a future process.
- the stored redacted identification information can be used for an analysis of consumer behavior, a consumer royalty program, a marketing activity, or other suitable processes.
- FIG. 5 is a schematic diagram illustrating a scanning device 500 and an identification document.
- the scanning device can be connected with a database 529 via a network 527 .
- the network 527 can include the Internet, a corporate intranet, a wireless network, or other suitable networks.
- the database 529 can store multiple rules or regulations regarding electronic scans from various jurisdictions.
- the database 529 can be a distributed database.
- the scanning device 500 is configured to receive identification information from an identification card, which includes a front side 501 and a back side 503 .
- the identification information can include an expiration date 505 of the identification card, a photograph 507 , an identification number 511 , a name 513 , an address 515 , a set of personal information 517 (including sex/gender, height, weight, and eye color), and a date of birth 519 .
- the scanning device 500 can retrieve the identification information by scanning one-dimension barcodes 509 and 525 , a two-dimensional barcode 521 , a magnetic stripe 523 and/or an embedded data chip (not shown). In other embodiments, the scanning device 500 can retrieve the identification information by scanning other suitable types of data carriers.
- the scanning device 500 can identify or recognize the identification information retrieved from identification documents in various ways (e.g., based on embedded information readable/accessible through a scan or the layout of the scanned identification document).
- FIG. 6 is a schematic diagram illustrating a user interface for the system for performing identification scans in compliance with jurisdictional rules.
- the user interface 600 presents a set of processed identification information (e.g., the processed identification information discussed in connection with FIGS. 1-4 above) in a display area 601 .
- the display area 601 further includes a first stripped area 603 and a second stripped area 605 .
- the first stripped area 603 indicates that address information (e.g., the address 615 shown in FIG. 6 ) cannot be presented to a user due to certain rules.
- the second stripped area 605 indicates that personal information (e.g., the set of personal information 616 shown in FIG. 6 ) cannot be presented to a user due to certain rules.
- An indication 607 can be presented adjacent to the display area 601 .
- the indication 607 includes a description “Data Stripped Due to State Law,” which explains the reason of the existence of the first stripped area 603 and the second stripped area 605 .
- the indication 607 can be removed from the interface 600 .
- the indication can include various forms including blinking signals, sounds, or other suitable indicators.
- Suitable computing systems or devices include server computers, multiprocessor systems, microprocessor-based systems, network devices, minicomputers, mainframe computers, distributed computing environments that include any of the foregoing, and the like.
- Such computing systems or devices may include one or more processors that execute software instructions to perform the functions described herein.
- Processors include programmable general-purpose or special-purpose microprocessors, programmable controllers, application specific integrated circuits (ASICs), programmable logic devices (PLDs), or a combination of such devices.
- Software may be stored in a memory, such as a random access memory (RAM), a read-only memory (ROM), a flash memory, or a combination of such devices.
- Software may also be stored in one or more storage devices, such as magnetic or optical based disks, flash memory devices, or any other type of non-volatile storage medium for storing data.
- Software may include one or more program modules which include routines, programs, objects, components, data structures, and so on that perform particular tasks or implement particular abstract data types. The functionality of the program modules may be combined or distributed as desired in various embodiments.
Landscapes
- Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Electromagnetism (AREA)
- General Health & Medical Sciences (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
- This application claims priority under 35 U.S.C. 120 to copending U.S. patent application Ser. No. 14/530,568, filed Oct. 31, 2014, entitled IDENTIFICATION SCAN IN COMPLIANCE WITH JURISDICTIONAL OR OTHER RULES. Application Ser. No. 14/530,568 is incorporated by reference in its entirety as if fully set forth herein.
- Identity verification is critical for various transactions or activities, such as transactions of age-restricted merchandise or access control activities for certain restricted areas. In a traditional fashion, a sales clerk or gate keeper can manually check an identification document of an individual who is involved in a transaction or wants to have access to a restricted area. Unfortunately, manual verification can be a time-consuming process and can be subject to inaccuracies due to human errors.
- One way to overcome the problems with manual identification checks is to utilize an automatic scanning system that can quickly scan and accurately verify an identification document. However, various jurisdictions have different rules and regulations regarding the scanning of identification documents and the retention of information gained from the scans. For example, some jurisdictions may prohibit retention or dissemination of information retrieved from identification documents by electronic scans, while other jurisdictions may allow the same. For entities having activities in multiple jurisdictions, it is cumbersome and difficult to comply with all applicable rules and regulations in all jurisdictions where they operate. In addition, not every individual or business entity is capable of keeping track of related rules (not to mention corresponding updates) in various jurisdictions. As a result, many companies err on the side of caution and do not use or store much of the information that can be obtained from an identification document. Alternatively, some companies may manually enter information that is read from a document, which is prone to errors, rather than rely on a scan. Both solutions are sub-optimal from the standpoint of the business operator.
-
FIG. 1 is a flowchart illustrating a method implemented by an identification scanning system for retrieving identification information from an identification document and sequentially applying applicable rules to the retrieved information. -
FIG. 2 is a flowchart illustrating a method implemented by an identification scanning system for retrieving identification information from an identification document and applying applicable rules in parallel to the retrieved information. -
FIG. 3 is a flowchart illustrating a method implemented by an identification scanning system for identifying applicable rules to retrieve information from an identification document and then retrieving the information in accordance with the rules. -
FIG. 4 is a schematic diagram illustrating a system for performing identification scans in compliance with jurisdictional or other rules. -
FIG. 5 is a schematic diagram illustrating a scanning device and an identification document. -
FIG. 6 is a schematic diagram illustrating a user interface for the system for performing identification scans in compliance with jurisdictional or other rules. - Identity verification plays an important role in transactions, activities, or interactions among parties who are not familiar with one another. To make sure that an individual standing in front of you is “authentic” or “the right person” to deal with, identification documents (e.g., a driver license, an identification card, a passport, or other suitable documents containing sufficient information to help verify the identity of an individual) are frequently used to verify the holders' identifies. Systems that can automatically read identification documents are increasingly used by businesses, governments, or individuals because they provide a fast, convenient and accurate solution for identity verification. Due to the increasing use of identity document scans and privacy concerns over the use of information obtained from those scans, however, more and more jurisdictions (e.g., countries, states, provinces, counties, cities, or other suitable administrative districts) have specific rules to regulate conduct involving collecting identification information via electronic scans of identification documents. Therefore, simply using an automatic identify verification system runs the risk of violating such rules in various jurisdictions.
- The present system and method provide a convenient way to automatically verify identity of an identification document holder while maintaining compliance with applicable electronic scanning rules of various jurisdictions. More particularly, the present system and method enable scanning, processing, and utilizing (by, for example, presenting and/or storing) identification information derived from identification documents in a rule-compliant fashion. The scanning process includes a manual or automatic process of capturing any suitable information (including but not limited to images, embedded information, coded information, layout information, etc.) by a suitable scanning device. The system utilizes a database that contains relevant rules and regulations from various jurisdictions. The database can be centralized (e.g., a network-accessible database having all relevant rules) or decentralized (e.g., databases having relevant rules stored in various devices). In some embodiments, the system can retrieve (e.g., by a scanning device) identification information from an identification document and then receive applicable rules (of various jurisdictions) from the database. In other embodiments, the system can first receive applicable rules from the database and then retrieve identification information from an identification document.
- Applicable rules can be determined or identified based on various factors. The factors include, for example, an issuer of the identification document, a current location where the identification document is being read, and a proposed use of the information contained in the identification document by an operator of a document scanner. The issuer of an identification document can be a state government, a federal government, a national or local agency (e.g., a military service, a government agency), a corporation, or other suitable entity. The issuer can have its own rules or regulations associated with how the information may be used from the identification documents issued by it. For example, Jurisdiction A may prohibit transmission of identification information retrieved from any Jurisdiction A driver licenses to a third party. The current location of the identification document when it is being scanned can be another factor. Various jurisdictions have rules on electronic scans of identification documents that happen within their territories. For example, Jurisdiction B can prohibit a seller from recording or maintaining certain sensitive information (e.g., name and address) derived from electronic scans of identification documents. Proposed uses of the scanned information by the operator of the document scanner can be another factor to consider. For example, Jurisdiction C may expressly prohibit the storage and use of identification information derived from electronic scans of identification documents for mailing list purposes.
- After identifying applicable rules, the present technology can process the retrieved identification information based on the applicable rules. The “processing” of scanned identification information includes applying use restrictions specified by the applicable rules to the identification information, such as redacting, masking, removing, not storing, not transmitting, using only for limited purposes, etc. some of the retrieved identification information. For example, the system can delete, hide, mask, obscure, or edit the retrieved identification information, so as to make sure that an operator of the system (e.g., a sales clerk scanning a customer's identification document for a loyalty program) is in compliance with the applicable rules. The system can further present the processed identification information to a user via a user interface (e.g., on a display). In some embodiments, the system can present an indication showing that the identification information has been processed and is being presented in compliance with the applicable rules. In some embodiments, the system can maintain a record of how the identification information has been processed and utilized for purposes of a subsequent audit to show that the system has been compliant with the applicable rules. The system disclosed herein can be implemented by a suitable software product or various types of applications.
- The system includes an input device (e.g., an identification scanner) configured to receive identification information. The system includes a processing module configured to process the received identification information based on multiple rules. As noted previously, the rules can be determined or identified at least based on an issuer of the identification document (e.g., a driver license issued by Jurisdiction A), a current location of the identification document (e.g., a used-car dealer's office in Jurisdiction B), and a proposed use of information from the identification document (e.g., to verify the identity of a potential used-car buyer for an application for a loan). In some embodiments, the rules can be predetermined and stored in the system before the system retrieves the identification information. In other embodiments, the rules can be determined after the system retrieves the identification information. For example, the system can identify the issuer of the identification document after retrieving the identification information, and the system can communicate with a database that stores relevant rules in various jurisdictions via a network. The system disclosed herein can be implemented in a dedicated scanning device, in a multi-purposes portable device (e.g., a smartphone, a notebook, a tablet, a phablet), or in other suitable devices, either fixed or mobile.
- Various embodiments of the invention will now be described. The following description provides specific details for a thorough understanding and an enabling description of these embodiments. One skilled in the art will understand, however, that the invention may be practiced without many of these details. Additionally, some well-known structures or functions may not be shown or described in detail, so as to avoid unnecessarily obscuring the relevant description of the various embodiments. The terminology used in the description presented below is intended to be interpreted in its broadest reasonable manner, even though it is being used in conjunction with a detailed description of certain specific embodiments of the invention.
-
FIG. 1 is a flowchart illustrating amethod 100 implemented by an identification scanning system for displaying information derived from an identification document to a user of the identification scanning system. Atblock 101, the system retrieves identification information from an identification document associated with an individual. In some embodiments, the identification document can be a local government issued identification document (e.g., a driver's license, a state ID), a federal government issued identification document (e.g., a passport, a military identification), a non-government-issued identification document (e.g., a corporate ID, a school ID), or other suitable identification documents. In some embodiments, the identification information can be retrieved by a scanning device. The identification information is encapsulated, embedded, or reflected in an identification document by visible text, barcodes, magnetic stripes, embedded data chips, etc. that are printed on, attached to, or contained in the identification document. The scanning device retrieves the identification information via image capture and optical character recognition (OCR), barcode reader, magnetic stripe reader, NFC chip reader, or other complementary technology. Additional details about techniques for scanning identification documents are described in commonly-owned U.S. Pat. No. 5,864,623, filed on Jul. 15, 1996 and entitled, “AUTHENTICATION SYSTEM FOR DRIVERS LICENSES” and U.S. Pat. No. 8,322,605, filed on Aug. 22, 2007 and entitled, “DYNAMIC IDENTITY MATCHING IN RESPONSE TO THREAT LEVELS,” which are incorporated by reference herein in their entirety. Atblock 103, the system receives information regarding an issuer of the identification document. For example, the system can identify that the scanned identification document is a document issued by Jurisdiction A based on embedded information readable/accessible through a scan of a barcode, a magnetic stripe, a read of an embedded data chip, or an analysis of the layout of the identification document. More particularly, for example, the system can recognize that the scanned identification document is a Jurisdiction-A ID by comparing the layout or format of the scanned identification document with an ID database that stores layout or format information of ID cards issued by various jurisdictions. In another example, the system can recognize textual content (e.g., a description of “JURISDICTION A—DRIVER LICENSE”) located at a specific portion (e.g., the upper portion) of the scanned identification document and learn the issuer information. In other embodiments, the system can identify the issuer information by retrieving or reading information that is coded or embedded in the scanned identification document. In some embodiments, the issuer information can also be received from a user input. That is, a user of the system may manually enter information into the system which characterizes the issuer of identification document that is being scanned. - At
decision block 105, the system determines whether there exist any applicable rules based on the issuer. For example, Jurisdiction A may have specific rules regarding retention and use of data derived from any identification cards issued by it. In some embodiments, relevant rules are maintained and stored in a centralized database, and the system can access the centralized database system via a wired or wireless network. In some embodiments, the relevant rules can be stored in a local scanning device or at a local computing system at a point of sale. - In an event that one or more applicable issuer rules are identified, the system continues at
block 107 to apply the identified rules to the retrieved identification information. For example, Jurisdiction A may prohibit use of gender and age information derived from Jurisdiction-A-issued identification cards by electronic scans. In this example, the system can apply Jurisdiction A's rule by processing the retrieved identification information to delete the gender and age information retrieved from a Jurisdiction-A-issued identification card. In an event that no applicable rule has been identified, processing proceeds to block 109 directly. - At
block 109, the system receives a current location of the identification document. The current location can be generated, determined, or identified from various sources. The current location of the identification document being scanned can be determined using one or more methods, including: (1) accessing a database that contains the location where the system implementing themethod 100 is installed (e.g., a record shows that a relevant software product was installed in a computing device located in a city such as Moab, Utah); (2) accessing a database containing a location of a physical building containing the point of sale (e.g., the current scanning operation occurs at a store located in Jurisdiction B); (3) using a service that converts a (network) virtual address to a physical location (e.g., a service shows that an Internet Protocol (IP) address of a computing device utilized in the scanning operation has a physical location in Jurisdiction B); or (4) using a global positioning system (GPS) or other similar location-determining technology to determine the current location of the scanning device (e.g., a GPS shows that a computing device utilized in the scanning operation is located in Jurisdiction B). In some embodiments, the current location can be determined using one method and then can be further verified by another method. - After the location information is received, the system proceeds to decision block 111 to determine whether there exist any applicable rules based on the location. For example, Jurisdiction B may have specific rules regarding electronic scans of identification documents within its jurisdiction. Examples of specific rules include: (1) a prohibition of retention of any scanned data after use, (2) a prohibition of dissemination of scanned data to third parties, (3) a prohibition of using the scanned data for more than one purpose (e.g., using the scanned customer information for the purpose of age-restricted purchase and adding to a mailing list, (4) restrictions on the types of information that can be collected (e.g., a date of birth, an identification number, an expiration date, a name, or an address), and (5) a prohibition of storing certain types of information (e.g., a photograph, a social security number, a height, a weight, a race, or a signature).
- In an event that one or more applicable rules based on location are identified at
block 111, the system continues atblock 113 to apply the identified rules to the retrieved identification information. For example, if Jurisdiction B prohibits retention of age information from electronic scans of any identification documents, the system can apply this rule by processing the retrieved identification information to delete the age information retrieved from an identification card issued by any jurisdiction. In an event that no applicable rule has been identified atblock 111, processing proceeds to block 115 directly. - At
block 115, the system receives a proposed use of the identification document. The proposed use can be based on a predetermined system setting. For example, a system installed at a point of sale may be configured so that the proposed use of scanned information is for purposes of consummating a sale. As another example, a system at a car dealership may be configured so that the proposed use of the scanned information is to prevent fraud in loan applications. In some embodiments, the proposed use is received from a user input. For example, a cashier may indicate that the scanned information is to be used for purposes of signing up for a loyalty program. After the proposed use is determined, processing proceeds to decision block 117 where the system determines whether there exist any applicable rules based on the proposed use. For example, Jurisdiction C may only allow information electronically scanned from identification documents to be stored or shared for specific purposes (e.g., product returns, account collection activities, establishing contractual relationships, credit card applications, credit verification, identity verification, fraud prevention, criminal conduct prevention, advancing law enforcement, etc.) but prohibited for other activities (e.g., activities relating to general marketing or customer loyalty programs). In an event that no applicable rule has been identified atblock 117, processing proceeds to block 121 directly. - In an event that one or more applicable rules are identified, at
block 119 the system applies the identified rules to the retrieved identification information. For example, if Jurisdiction C only allows use of electronically-scanned gender and age information for law enforcement purposes, the system can apply this rule by processing the retrieved identification information to delete the gender and age information retrieved from an identification card if the proposed use is not for law enforcement. - At
block 121, the system displays the processed identification information based on the applied rules. In some embodiments, the system presents the processed identification information to an operator or a user of the system (e.g., a sales clerk, a gate keeper, a used-car dealer, a loan officer, a police officer, or other suitable individual). The information may be presented on a computing device display or in a printout of a form or other document, stored for subsequent reference, and/or transmitted to other computing systems for additional processing. In some embodiments, the processed identification information is a redacted version of the identification information. In other words, some identification information is stripped out and not presented to the user. The system ensures that the electronic scans of identification documents are in compliance with the identified applicable rules. In some embodiments, the system can present the processed identification information along with an indication showing the reasons why the identification information has been redacted or restricted in some fashion (e.g., a description of “State Law Prohibits Electronic Scan of Age for Marketing”). - In some embodiments, the system generates and maintains a record regarding the scanned identification documents and resulting use of the scanned information for purposes of future review and audit. By providing an audit trail associated with a scanned document, the system enables system users to provide evidence to appropriate authorities that demonstrate compliance with applicable rules. It will be appreciated that in the illustrated embodiment of
FIG. 1 , the sequence of receiving the information of the issuer, the current location, and the proposed use (and identifying/applying applicable rules) can be varied. For example, receiving the proposed use and identifying/applying applicable rules can be performed before receiving the issuer and the current location, depending on various designs. -
FIG. 2 is a flowchart illustrating amethod 200 implemented by an identification scanning system for displaying information derived from an identification document. The system starts atblock 201 to retrieve identification information from an identification document associated with an individual. In some embodiments, the identification information can be retrieved by a scanning device, as discussed above. The system also receives information regarding an issuer of the identification document, a current location of the identification document, and a proposed use of the information from the identification document in parallel atblocks FIG. 1 , the issuer of the identification document can be received from a user input. The current location can be generated, determined, or identified from various sources. And the proposed use can be based on a predetermined setting or received from a user input. - After receiving the information regarding the issuer, the current location, and the proposed use of the identification document, the system-determines whether there are any applicable rules based on the received information in parallel at decision blocks 209, 211, and 213. In an event that no applicable rule has been identified, processing proceeds to block 223 directly. In an event that one or more applicable rules are identified at decision blocks 209, 211, and 213, the system continues at
block 215 to retrieve the identified applicable rules (e.g., from a local database or a centralized database, as discussed above). After retrieving the applicable rules, processing proceeds to decision block 217 to determine whether there is any conflict among the identified applicable rules. For example, conflicts may arise between a federal rule and a state rule. If there is a conflict, the system continues to block 219 to prioritize the identified applicable rules in conflict. For example, a federal rule may prevail when it conflicts with a state rule, and therefore a high priority is assigned to the federal rule while a low priority is assigned to the state rule. As another example, if two rules conflict, the system may selectively apply the most restrictive aspects of each of the rules to ensure that the system abides by the minimum requirements of both rules. For example, if one rule indicates that information can be used for marketing purposes but not for loyalty purposes, and another rule indicates that the information can be used for loyalty purposes but not marketing purposes, the system may bar the use of scanned information for either marketing purposes or for loyalty purposes. By applying the most conservative interpretation, the system helps ensure that all applicable rules are being met. If there is no conflict among the identified rules, processing proceeds to block 221 directly. - Processing continues to block 221 to apply identified rules to the identification information. If there is a conflict of rules, then the rules are applied based on the priorities thereof. For example, when a rule with high priority conflicts with a rule with low priority, the rule with high priority is applied and the rule with low priority is ignored. As discussed above, applying the applicable rules can include processing (e.g., delete, hide, mask, obscure, or edit) the identification information. In some embodiments, an operator of the system can modify the rules manually (e.g., override an identified rule). In such case, the system can provide a warning to the operator so as to inform the operator that a manual modification may result in a violation of the identified rule.
- At
block 223, the system presents the processed identification information based on the applied rules (e.g., it is presented to an operator of the system or stored for a future use such as a royalty program). In some embodiments, the presented identification information can be a stripped version of the identification information. The system can make sure that the whole process (e.g., including electronic scans of identification documents and further uses of the retrieved information) involving identification documents from various jurisdictions is in compliance with identified applicable rules. In some embodiments, the system can present the processed identification information along with an indication showing the reasons why the identification information needs to be processed. In some embodiments, the system can generate and maintain a record regarding the whole process involving electronic scans of identification documents for purposes of a subsequent audit to show that the system has been compliant with the applicable rules. -
FIG. 3 is a flowchart illustrating amethod 300 implemented by an identification scanning system for displaying information derived from an identification document. Atblock 301, the system receives information regarding an issuer of the identification document. In some embodiments, the issuer of the identification document can be retrieved by a scanning device. In some embodiments, the issuer of the identification document can be received from a user input. Processing continues atdecision block 303 to determine whether there exist any applicable rules based on the issuer of the identification document. In some embodiments, relevant rules from various jurisdictions are maintained and stored in a centralized database, and the system can access to the centralized database system via a wired or wireless network. In some embodiments, the relevant rules are stored in a local scanning device or at a local computing system at a point of sale, visitor center or restricted area. In an event that one or more applicable rules are identified, the rules are “remembered” or stored. Processing then continues atblock 307. - At
block 307, the system receives information regarding a current location of the identification document. The current location can be generated from various sources, as discussed above. After the current location is received, processing proceeds to decision block 309 to determine whether there exist any applicable rules based on the second set of information. In an event that one or more applicable rules are identified atdecision block 309, the rules are “remembered” or stored. The system continues atblock 313. - At
block 313, the system receives information regarding a proposed use of the identification document. The proposed use can be received from a predetermined setting or a user input. After the proposed use is received, processing proceeds to decision block 315 to determine whether there exist any applicable rules on the proposed use based on the issuer and/or location. In an event that one or more applicable rules are identified, the rules are “remembered.” The system then continues atblock 319. - At
decision block 319, the system determines whether there is any conflict among identified “remembered” applicable rules (e.g., a federal rule may conflict with a state rule for certain types of conduct). If there is no conflict among the identified rules, processing proceeds to block 323 directly. If there is a conflict among identified rules, processing proceeds to block 321 to prioritize the identified rules in conflict. The system continues to block 323 to retrieve identification information from the identification document in accordance with the “remembered” applicable rules. For example, Jurisdiction A may prohibit retrieving address information by electronic scanning an identification document for any purposes. In this case, the system would not retrieve the address information from the identification document (e.g., the system can identify the field of “Address” and skip it in the process of information retrieval). - At
block 325, the system displays the processed identification information to an operator. In some embodiments, the processed identification information can be presented as a stripped or “sanitized” version of the identification information. The system can make sure that the whole process involving identification documents from various jurisdictions is in compliance with applicable rules. In some embodiments, the system can present the processed identification information along with an indication showing the reasons why the identification information needs to be processed. In some embodiments, the system can generate and maintain a record regarding the whole process involving electronic scans of identification documents for purposes of future review and audit (e.g., as evidence for compliance of applicable rules). In some embodiments, the system can generate a statement stating that the use of the information scanned by the system has remained compliant with the applicable rules. The statement can be used to let an identification document holder (e.g., a customer at a store) know that the identification scan performed by the system is compliant with the applicable rules. -
FIG. 4 is a schematic diagram illustrating asystem 400. As shown inFIG. 4 , thesystem 400 can include aprocessor 401, amemory 402, aninput device 403, a processing module 405, adisplay module 407, acommunication module 409, and adata storage unit 411. In some embodiments, thesystem 400 can be a portable device (e.g., a smartphone, a notebook, a tablet, a phablet, or other suitable devices). Thesystem 400 can communicate with anexternal database 411 via anetwork 413. In some embodiments, thenetwork 413 can include the Internet, a corporate intranet, a wireless network, or other suitable networks. In the illustrated embodiments, thedatabase 415 can store multiple electronic scanning rules or regulations from various jurisdictions. In some embodiments, thedatabase 415 can be a distributed database. Theprocessor 401 is coupled to other components and configured to control the same. Thememory 402 is configured to temporarily (or non-transitorily) store data or instructions processed by theprocessor 401. - In the illustrated embodiment, the
input device 403 can receive a user input (e.g., the issuer, the current location, and the proposed use for identifying applicable rules as discussed above). In some embodiments, theinput device 403 can be a scanning device for retrieving identification information from an identification document associated with an individual. In some embodiments, theinput device 403 can be configured to have embedded information regarding a location or a proposed use. For example, theinput device 403 can be designed or programmed to use only in a certain jurisdiction (e.g., a store located in Jurisdiction A). As another example, theinput device 403 can be designed or programmed for a specific purpose, such as a customer royalty program. The embedded information can be used to determine one of the factors (e.g., the “location” factor and the “proposed use” factor discussed above) that are used to identify applicable rules in various jurisdictions. The processing module 405 is configured to process the retrieved identification information based on identified applicable rules (e.g., these rules can be identified at and received from thedatabase 415 based on predetermined criteria such as the issuer, the current location, and the proposed use). In some embodiments, the processing module 405 can delete, hide, mask, obscure, or edit the retrieved identification information based on multiple identified applicable rules. Thedisplay module 407 is configured to present the processed identification information to an operator or a user of the system 400 (e.g., a sales clerk uses thesystem 400 to scan a customer's identification document for identity verification). In some embodiments, the identified applicable rules can be stored in thedata storage unit 411, such that thesystem 400 can have access to the identified applicable rules without accessing thenetwork 413. This arrangement enables thesystem 400 to function normally without network connection. In some embodiments, thedata storage unit 411 can be used to store the redacted or processed identification information for a future process. For example, the stored redacted identification information can be used for an analysis of consumer behavior, a consumer royalty program, a marketing activity, or other suitable processes. -
FIG. 5 is a schematic diagram illustrating ascanning device 500 and an identification document. As shown inFIG. 5 , the scanning device can be connected with adatabase 529 via anetwork 527. In some embodiments, thenetwork 527 can include the Internet, a corporate intranet, a wireless network, or other suitable networks. In the illustrated embodiments, thedatabase 529 can store multiple rules or regulations regarding electronic scans from various jurisdictions. In some embodiments, thedatabase 529 can be a distributed database. Thescanning device 500 is configured to receive identification information from an identification card, which includes afront side 501 and aback side 503. In the illustrated embodiment, the identification information can include anexpiration date 505 of the identification card, aphotograph 507, anidentification number 511, aname 513, anaddress 515, a set of personal information 517 (including sex/gender, height, weight, and eye color), and a date ofbirth 519. Thescanning device 500 can retrieve the identification information by scanning one-dimension barcodes dimensional barcode 521, amagnetic stripe 523 and/or an embedded data chip (not shown). In other embodiments, thescanning device 500 can retrieve the identification information by scanning other suitable types of data carriers. Thescanning device 500 can identify or recognize the identification information retrieved from identification documents in various ways (e.g., based on embedded information readable/accessible through a scan or the layout of the scanned identification document). -
FIG. 6 is a schematic diagram illustrating a user interface for the system for performing identification scans in compliance with jurisdictional rules. As shown inFIG. 6 , theuser interface 600 presents a set of processed identification information (e.g., the processed identification information discussed in connection withFIGS. 1-4 above) in adisplay area 601. Thedisplay area 601 further includes a first strippedarea 603 and a second strippedarea 605. The first strippedarea 603 indicates that address information (e.g., the address 615 shown inFIG. 6 ) cannot be presented to a user due to certain rules. Similarly, the second strippedarea 605 indicates that personal information (e.g., the set of personal information 616 shown inFIG. 6 ) cannot be presented to a user due to certain rules. Anindication 607 can be presented adjacent to thedisplay area 601. In the illustrated embodiment, theindication 607 includes a description “Data Stripped Due to State Law,” which explains the reason of the existence of the first strippedarea 603 and the second strippedarea 605. In some embodiments, theindication 607 can be removed from theinterface 600. In some embodiments, the indication can include various forms including blinking signals, sounds, or other suitable indicators. - It will be appreciated by those skilled in the art that the components or modules that are part of the system or interact with the system may be implemented by computer-executable instructions, such as program modules, executed by one or more computers or other devices. Those skilled in the art will further appreciate that the system or aspects of the system disclosed herein may be implemented on any computing system or device. Suitable computing systems or devices include server computers, multiprocessor systems, microprocessor-based systems, network devices, minicomputers, mainframe computers, distributed computing environments that include any of the foregoing, and the like. Such computing systems or devices may include one or more processors that execute software instructions to perform the functions described herein. Processors include programmable general-purpose or special-purpose microprocessors, programmable controllers, application specific integrated circuits (ASICs), programmable logic devices (PLDs), or a combination of such devices. Software may be stored in a memory, such as a random access memory (RAM), a read-only memory (ROM), a flash memory, or a combination of such devices. Software may also be stored in one or more storage devices, such as magnetic or optical based disks, flash memory devices, or any other type of non-volatile storage medium for storing data. Software may include one or more program modules which include routines, programs, objects, components, data structures, and so on that perform particular tasks or implement particular abstract data types. The functionality of the program modules may be combined or distributed as desired in various embodiments.
- From the foregoing, it will be appreciated that specific embodiments of the invention have been described herein for purposes of illustration, but that various modifications may be made without deviating from the spirit and scope of the present disclosure. Accordingly, the present technology is not limited except as by the appended claims.
Claims (21)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/459,582 US20190325675A1 (en) | 2014-10-31 | 2019-07-01 | Identification scan in compliance with jurisdictional or other rules |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/530,568 US10373409B2 (en) | 2014-10-31 | 2014-10-31 | Identification scan in compliance with jurisdictional or other rules |
US16/459,582 US20190325675A1 (en) | 2014-10-31 | 2019-07-01 | Identification scan in compliance with jurisdictional or other rules |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/530,568 Continuation US10373409B2 (en) | 2014-10-31 | 2014-10-31 | Identification scan in compliance with jurisdictional or other rules |
Publications (1)
Publication Number | Publication Date |
---|---|
US20190325675A1 true US20190325675A1 (en) | 2019-10-24 |
Family
ID=55853248
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/530,568 Active 2035-03-10 US10373409B2 (en) | 2014-10-31 | 2014-10-31 | Identification scan in compliance with jurisdictional or other rules |
US16/459,582 Pending US20190325675A1 (en) | 2014-10-31 | 2019-07-01 | Identification scan in compliance with jurisdictional or other rules |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/530,568 Active 2035-03-10 US10373409B2 (en) | 2014-10-31 | 2014-10-31 | Identification scan in compliance with jurisdictional or other rules |
Country Status (2)
Country | Link |
---|---|
US (2) | US10373409B2 (en) |
WO (1) | WO2016070138A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20230385831A1 (en) * | 2022-05-24 | 2023-11-30 | Ncr Corporation | Customer identification verification |
Families Citing this family (155)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7708189B1 (en) | 2002-05-17 | 2010-05-04 | Cipriano Joseph J | Identification verification system and method |
US7860318B2 (en) | 2004-11-09 | 2010-12-28 | Intelli-Check, Inc | System and method for comparing documents |
US9729583B1 (en) | 2016-06-10 | 2017-08-08 | OneTrust, LLC | Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance |
US10373409B2 (en) * | 2014-10-31 | 2019-08-06 | Intellicheck, Inc. | Identification scan in compliance with jurisdictional or other rules |
US10237424B2 (en) | 2016-02-16 | 2019-03-19 | Ricoh Company, Ltd. | System and method for analyzing, notifying, and routing documents |
US10198477B2 (en) * | 2016-03-03 | 2019-02-05 | Ricoh Compnay, Ltd. | System for automatic classification and routing |
US10915823B2 (en) | 2016-03-03 | 2021-02-09 | Ricoh Company, Ltd. | System for automatic classification and routing |
US11244367B2 (en) | 2016-04-01 | 2022-02-08 | OneTrust, LLC | Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design |
US20220164840A1 (en) | 2016-04-01 | 2022-05-26 | OneTrust, LLC | Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design |
US11004125B2 (en) | 2016-04-01 | 2021-05-11 | OneTrust, LLC | Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design |
US10706447B2 (en) | 2016-04-01 | 2020-07-07 | OneTrust, LLC | Data processing systems and communication systems and methods for the efficient generation of privacy risk assessments |
US10452722B2 (en) * | 2016-04-18 | 2019-10-22 | Ricoh Company, Ltd. | Processing electronic data in computer networks with rules management |
US10585968B2 (en) | 2016-06-10 | 2020-03-10 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US11134086B2 (en) | 2016-06-10 | 2021-09-28 | OneTrust, LLC | Consent conversion optimization systems and related methods |
US10726158B2 (en) | 2016-06-10 | 2020-07-28 | OneTrust, LLC | Consent receipt management and automated process blocking systems and related methods |
US11023842B2 (en) | 2016-06-10 | 2021-06-01 | OneTrust, LLC | Data processing systems and methods for bundled privacy policies |
US10572686B2 (en) | 2016-06-10 | 2020-02-25 | OneTrust, LLC | Consent receipt management systems and related methods |
US10607028B2 (en) | 2016-06-10 | 2020-03-31 | OneTrust, LLC | Data processing systems for data testing to confirm data deletion and related methods |
US11146566B2 (en) | 2016-06-10 | 2021-10-12 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US10318761B2 (en) | 2016-06-10 | 2019-06-11 | OneTrust, LLC | Data processing systems and methods for auditing data request compliance |
US10776514B2 (en) | 2016-06-10 | 2020-09-15 | OneTrust, LLC | Data processing systems for the identification and deletion of personal data in computer systems |
US10467432B2 (en) | 2016-06-10 | 2019-11-05 | OneTrust, LLC | Data processing systems for use in automatically generating, populating, and submitting data subject access requests |
US10282559B2 (en) | 2016-06-10 | 2019-05-07 | OneTrust, LLC | Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques |
US10949565B2 (en) | 2016-06-10 | 2021-03-16 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US10846433B2 (en) | 2016-06-10 | 2020-11-24 | OneTrust, LLC | Data processing consent management systems and related methods |
US11144622B2 (en) | 2016-06-10 | 2021-10-12 | OneTrust, LLC | Privacy management systems and methods |
US10949170B2 (en) | 2016-06-10 | 2021-03-16 | OneTrust, LLC | Data processing systems for integration of consumer feedback with data subject access requests and related methods |
US11562097B2 (en) | 2016-06-10 | 2023-01-24 | OneTrust, LLC | Data processing systems for central consent repository and related methods |
US11294939B2 (en) | 2016-06-10 | 2022-04-05 | OneTrust, LLC | Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software |
US11481710B2 (en) | 2016-06-10 | 2022-10-25 | OneTrust, LLC | Privacy management systems and methods |
US11544667B2 (en) | 2016-06-10 | 2023-01-03 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US10783256B2 (en) | 2016-06-10 | 2020-09-22 | OneTrust, LLC | Data processing systems for data transfer risk identification and related methods |
US11354434B2 (en) | 2016-06-10 | 2022-06-07 | OneTrust, LLC | Data processing systems for verification of consent and notice processing and related methods |
US11675929B2 (en) | 2016-06-10 | 2023-06-13 | OneTrust, LLC | Data processing consent sharing systems and related methods |
US10848523B2 (en) | 2016-06-10 | 2020-11-24 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11151233B2 (en) | 2016-06-10 | 2021-10-19 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US10873606B2 (en) | 2016-06-10 | 2020-12-22 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11475136B2 (en) | 2016-06-10 | 2022-10-18 | OneTrust, LLC | Data processing systems for data transfer risk identification and related methods |
US10685140B2 (en) | 2016-06-10 | 2020-06-16 | OneTrust, LLC | Consent receipt management systems and related methods |
US10592648B2 (en) | 2016-06-10 | 2020-03-17 | OneTrust, LLC | Consent receipt management systems and related methods |
US10997318B2 (en) | 2016-06-10 | 2021-05-04 | OneTrust, LLC | Data processing systems for generating and populating a data inventory for processing data access requests |
US10798133B2 (en) | 2016-06-10 | 2020-10-06 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11336697B2 (en) | 2016-06-10 | 2022-05-17 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11222309B2 (en) | 2016-06-10 | 2022-01-11 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11461500B2 (en) | 2016-06-10 | 2022-10-04 | OneTrust, LLC | Data processing systems for cookie compliance testing with website scanning and related methods |
US10803200B2 (en) | 2016-06-10 | 2020-10-13 | OneTrust, LLC | Data processing systems for processing and managing data subject access in a distributed environment |
US11341447B2 (en) | 2016-06-10 | 2022-05-24 | OneTrust, LLC | Privacy management systems and methods |
US11410106B2 (en) | 2016-06-10 | 2022-08-09 | OneTrust, LLC | Privacy management systems and methods |
US10776518B2 (en) | 2016-06-10 | 2020-09-15 | OneTrust, LLC | Consent receipt management systems and related methods |
US11727141B2 (en) | 2016-06-10 | 2023-08-15 | OneTrust, LLC | Data processing systems and methods for synching privacy-related user consent across multiple computing devices |
US10885485B2 (en) | 2016-06-10 | 2021-01-05 | OneTrust, LLC | Privacy management systems and methods |
US11210420B2 (en) | 2016-06-10 | 2021-12-28 | OneTrust, LLC | Data subject access request processing systems and related methods |
US12052289B2 (en) | 2016-06-10 | 2024-07-30 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US10740487B2 (en) | 2016-06-10 | 2020-08-11 | OneTrust, LLC | Data processing systems and methods for populating and maintaining a centralized database of personal data |
US10678945B2 (en) | 2016-06-10 | 2020-06-09 | OneTrust, LLC | Consent receipt management systems and related methods |
US11295316B2 (en) | 2016-06-10 | 2022-04-05 | OneTrust, LLC | Data processing systems for identity validation for consumer rights requests and related methods |
US11277448B2 (en) | 2016-06-10 | 2022-03-15 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11222142B2 (en) | 2016-06-10 | 2022-01-11 | OneTrust, LLC | Data processing systems for validating authorization for personal data collection, storage, and processing |
US11366909B2 (en) | 2016-06-10 | 2022-06-21 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11200341B2 (en) | 2016-06-10 | 2021-12-14 | OneTrust, LLC | Consent receipt management systems and related methods |
US10839102B2 (en) | 2016-06-10 | 2020-11-17 | OneTrust, LLC | Data processing systems for identifying and modifying processes that are subject to data subject access requests |
US11301796B2 (en) | 2016-06-10 | 2022-04-12 | OneTrust, LLC | Data processing systems and methods for customizing privacy training |
US11227247B2 (en) | 2016-06-10 | 2022-01-18 | OneTrust, LLC | Data processing systems and methods for bundled privacy policies |
US11625502B2 (en) | 2016-06-10 | 2023-04-11 | OneTrust, LLC | Data processing systems for identifying and modifying processes that are subject to data subject access requests |
US10416966B2 (en) | 2016-06-10 | 2019-09-17 | OneTrust, LLC | Data processing systems for identity validation of data subject access requests and related methods |
US11238390B2 (en) * | 2016-06-10 | 2022-02-01 | OneTrust, LLC | Privacy management systems and methods |
US10284604B2 (en) | 2016-06-10 | 2019-05-07 | OneTrust, LLC | Data processing and scanning systems for generating and populating a data inventory |
US11403377B2 (en) | 2016-06-10 | 2022-08-02 | OneTrust, LLC | Privacy management systems and methods |
US10706176B2 (en) | 2016-06-10 | 2020-07-07 | OneTrust, LLC | Data-processing consent refresh, re-prompt, and recapture systems and related methods |
US10565236B1 (en) | 2016-06-10 | 2020-02-18 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US12118121B2 (en) | 2016-06-10 | 2024-10-15 | OneTrust, LLC | Data subject access request processing systems and related methods |
US11520928B2 (en) | 2016-06-10 | 2022-12-06 | OneTrust, LLC | Data processing systems for generating personal data receipts and related methods |
US10169609B1 (en) | 2016-06-10 | 2019-01-01 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US11438386B2 (en) | 2016-06-10 | 2022-09-06 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11025675B2 (en) | 2016-06-10 | 2021-06-01 | OneTrust, LLC | Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance |
US10853501B2 (en) | 2016-06-10 | 2020-12-01 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US10762236B2 (en) | 2016-06-10 | 2020-09-01 | OneTrust, LLC | Data processing user interface monitoring systems and related methods |
US11636171B2 (en) | 2016-06-10 | 2023-04-25 | OneTrust, LLC | Data processing user interface monitoring systems and related methods |
US10510031B2 (en) | 2016-06-10 | 2019-12-17 | OneTrust, LLC | Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques |
US10909488B2 (en) | 2016-06-10 | 2021-02-02 | OneTrust, LLC | Data processing systems for assessing readiness for responding to privacy-related incidents |
US11416590B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11188615B2 (en) | 2016-06-10 | 2021-11-30 | OneTrust, LLC | Data processing consent capture systems and related methods |
US11228620B2 (en) | 2016-06-10 | 2022-01-18 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11392720B2 (en) | 2016-06-10 | 2022-07-19 | OneTrust, LLC | Data processing systems for verification of consent and notice processing and related methods |
US11087260B2 (en) | 2016-06-10 | 2021-08-10 | OneTrust, LLC | Data processing systems and methods for customizing privacy training |
US10503926B2 (en) | 2016-06-10 | 2019-12-10 | OneTrust, LLC | Consent receipt management systems and related methods |
US11366786B2 (en) | 2016-06-10 | 2022-06-21 | OneTrust, LLC | Data processing systems for processing data subject access requests |
US10796260B2 (en) | 2016-06-10 | 2020-10-06 | OneTrust, LLC | Privacy management systems and methods |
US11416798B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing systems and methods for providing training in a vendor procurement process |
US11651104B2 (en) | 2016-06-10 | 2023-05-16 | OneTrust, LLC | Consent receipt management systems and related methods |
US11651106B2 (en) | 2016-06-10 | 2023-05-16 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US10713387B2 (en) | 2016-06-10 | 2020-07-14 | OneTrust, LLC | Consent conversion optimization systems and related methods |
US12045266B2 (en) | 2016-06-10 | 2024-07-23 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US10878127B2 (en) | 2016-06-10 | 2020-12-29 | OneTrust, LLC | Data subject access request processing systems and related methods |
US11328092B2 (en) | 2016-06-10 | 2022-05-10 | OneTrust, LLC | Data processing systems for processing and managing data subject access in a distributed environment |
US10496846B1 (en) | 2016-06-10 | 2019-12-03 | OneTrust, LLC | Data processing and communications systems and methods for the efficient implementation of privacy by design |
US10592692B2 (en) | 2016-06-10 | 2020-03-17 | OneTrust, LLC | Data processing systems for central consent repository and related methods |
US10606916B2 (en) | 2016-06-10 | 2020-03-31 | OneTrust, LLC | Data processing user interface monitoring systems and related methods |
US11188862B2 (en) | 2016-06-10 | 2021-11-30 | OneTrust, LLC | Privacy management systems and methods |
US11100444B2 (en) | 2016-06-10 | 2021-08-24 | OneTrust, LLC | Data processing systems and methods for providing training in a vendor procurement process |
US10565397B1 (en) | 2016-06-10 | 2020-02-18 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US11038925B2 (en) | 2016-06-10 | 2021-06-15 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11343284B2 (en) | 2016-06-10 | 2022-05-24 | OneTrust, LLC | Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance |
US11057356B2 (en) | 2016-06-10 | 2021-07-06 | OneTrust, LLC | Automated data processing systems and methods for automatically processing data subject access requests using a chatbot |
US10776517B2 (en) | 2016-06-10 | 2020-09-15 | OneTrust, LLC | Data processing systems for calculating and communicating cost of fulfilling data subject access requests and related methods |
US12136055B2 (en) | 2016-06-10 | 2024-11-05 | OneTrust, LLC | Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques |
US11138299B2 (en) | 2016-06-10 | 2021-10-05 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US10565161B2 (en) | 2016-06-10 | 2020-02-18 | OneTrust, LLC | Data processing systems for processing data subject access requests |
US11157600B2 (en) | 2016-06-10 | 2021-10-26 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11354435B2 (en) | 2016-06-10 | 2022-06-07 | OneTrust, LLC | Data processing systems for data testing to confirm data deletion and related methods |
US11138242B2 (en) | 2016-06-10 | 2021-10-05 | OneTrust, LLC | Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software |
US11416589B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US10706131B2 (en) | 2016-06-10 | 2020-07-07 | OneTrust, LLC | Data processing systems and methods for efficiently assessing the risk of privacy campaigns |
US11418492B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing systems and methods for using a data model to select a target data asset in a data migration |
US11416109B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Automated data processing systems and methods for automatically processing data subject access requests using a chatbot |
US11222139B2 (en) | 2016-06-10 | 2022-01-11 | OneTrust, LLC | Data processing systems and methods for automatic discovery and assessment of mobile software development kits |
US10997315B2 (en) | 2016-06-10 | 2021-05-04 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US10769301B2 (en) | 2016-06-10 | 2020-09-08 | OneTrust, LLC | Data processing systems for webform crawling to map processing activities and related methods |
US10909265B2 (en) | 2016-06-10 | 2021-02-02 | OneTrust, LLC | Application privacy scanning systems and related methods |
US11074367B2 (en) | 2016-06-10 | 2021-07-27 | OneTrust, LLC | Data processing systems for identity validation for consumer rights requests and related methods |
US10282700B2 (en) | 2016-06-10 | 2019-05-07 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US10706379B2 (en) | 2016-06-10 | 2020-07-07 | OneTrust, LLC | Data processing systems for automatic preparation for remediation and related methods |
US11586700B2 (en) | 2016-06-10 | 2023-02-21 | OneTrust, LLC | Data processing systems and methods for automatically blocking the use of tracking tools |
US10896394B2 (en) | 2016-06-10 | 2021-01-19 | OneTrust, LLC | Privacy management systems and methods |
US10708305B2 (en) | 2016-06-10 | 2020-07-07 | OneTrust, LLC | Automated data processing systems and methods for automatically processing requests for privacy-related information |
US10944725B2 (en) | 2016-06-10 | 2021-03-09 | OneTrust, LLC | Data processing systems and methods for using a data model to select a target data asset in a data migration |
US10242228B2 (en) | 2016-06-10 | 2019-03-26 | OneTrust, LLC | Data processing systems for measuring privacy maturity within an organization |
US20180039829A1 (en) * | 2016-08-04 | 2018-02-08 | Roger D. Summers | Continuous, self-executing verification worksheet system |
US10013577B1 (en) | 2017-06-16 | 2018-07-03 | OneTrust, LLC | Data processing systems for identifying whether cookies contain personally identifying information |
US10007907B1 (en) | 2017-09-25 | 2018-06-26 | Capital One Services, Llc | Method and system of capturing an image of a card |
WO2019225553A1 (en) * | 2018-05-22 | 2019-11-28 | 日本電気株式会社 | Information provision device, terminal, identity verification system, information provision method, and recording medium |
US10628180B1 (en) * | 2018-08-20 | 2020-04-21 | C/Hca, Inc. | Disparate data aggregation for user interface customization |
US11908573B1 (en) | 2020-02-18 | 2024-02-20 | C/Hca, Inc. | Predictive resource management |
US11144675B2 (en) | 2018-09-07 | 2021-10-12 | OneTrust, LLC | Data processing systems and methods for automatically protecting sensitive data within privacy management systems |
US11544409B2 (en) | 2018-09-07 | 2023-01-03 | OneTrust, LLC | Data processing systems and methods for automatically protecting sensitive data within privacy management systems |
US10803202B2 (en) | 2018-09-07 | 2020-10-13 | OneTrust, LLC | Data processing systems for orphaned data identification and deletion and related methods |
US11528267B2 (en) | 2019-12-06 | 2022-12-13 | Bank Of America Corporation | System for automated image authentication and external database verification |
WO2022011142A1 (en) | 2020-07-08 | 2022-01-13 | OneTrust, LLC | Systems and methods for targeted data discovery |
US11444976B2 (en) | 2020-07-28 | 2022-09-13 | OneTrust, LLC | Systems and methods for automatically blocking the use of tracking tools |
US11475165B2 (en) | 2020-08-06 | 2022-10-18 | OneTrust, LLC | Data processing systems and methods for automatically redacting unstructured data from a data subject access request |
US11436373B2 (en) | 2020-09-15 | 2022-09-06 | OneTrust, LLC | Data processing systems and methods for detecting tools for the automatic blocking of consent requests |
US11526624B2 (en) | 2020-09-21 | 2022-12-13 | OneTrust, LLC | Data processing systems and methods for automatically detecting target data transfers and target data processing |
WO2022076373A1 (en) | 2020-10-05 | 2022-04-14 | OneTrust, LLC | Systems and methods for detecting prejudice bias in machine-learning models |
EP4241173A1 (en) | 2020-11-06 | 2023-09-13 | OneTrust LLC | Systems and methods for identifying data processing activities based on data discovery results |
US11687528B2 (en) | 2021-01-25 | 2023-06-27 | OneTrust, LLC | Systems and methods for discovery, classification, and indexing of data in a native computing system |
WO2022170047A1 (en) | 2021-02-04 | 2022-08-11 | OneTrust, LLC | Managing custom attributes for domain objects defined within microservices |
US11494515B2 (en) | 2021-02-08 | 2022-11-08 | OneTrust, LLC | Data processing systems and methods for anonymizing data samples in classification analysis |
US20240098109A1 (en) | 2021-02-10 | 2024-03-21 | OneTrust, LLC | Systems and methods for mitigating risks of third-party computing system functionality integration into a first-party computing system |
US11775348B2 (en) | 2021-02-17 | 2023-10-03 | OneTrust, LLC | Managing custom workflows for domain objects defined within microservices |
US11546661B2 (en) | 2021-02-18 | 2023-01-03 | OneTrust, LLC | Selective redaction of media content |
US20240311497A1 (en) | 2021-03-08 | 2024-09-19 | OneTrust, LLC | Data transfer discovery and analysis systems and related methods |
US11562078B2 (en) | 2021-04-16 | 2023-01-24 | OneTrust, LLC | Assessing and managing computational risk involved with integrating third party computing functionality within a computing system |
US12153704B2 (en) | 2021-08-05 | 2024-11-26 | OneTrust, LLC | Computing platform for facilitating data exchange among computing environments |
US11557136B1 (en) * | 2022-02-23 | 2023-01-17 | Scandit Ag | Identity document verification based on barcode structure |
US11620142B1 (en) | 2022-06-03 | 2023-04-04 | OneTrust, LLC | Generating and customizing user interfaces for demonstrating functions of interactive user environments |
Citations (60)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4982072A (en) * | 1987-02-09 | 1991-01-01 | Hitachi, Ltd. | Driver license check system with IC card and method therefor |
US5668874A (en) * | 1995-02-28 | 1997-09-16 | Lucent Technologies Inc. | Identification card verification system and method |
US5748908A (en) * | 1995-06-07 | 1998-05-05 | Yu; Mason K. | Automated, classified expenditure data card recording system |
US5864623A (en) * | 1996-07-15 | 1999-01-26 | Intellicheck Inc. | Authentication system for driver licenses |
US20020143571A1 (en) * | 1996-07-15 | 2002-10-03 | Messina Kevin M. | Authentication system for identification documents |
US20030057276A1 (en) * | 2001-09-24 | 2003-03-27 | Checkpoint Systems, Inc. | Method and system for non-contact automated verification of the correctness of the identity of an item having an associated primary identifier |
US20030115459A1 (en) * | 2001-12-17 | 2003-06-19 | Monk Bruce C. | Document and bearer verification system |
US20030154138A1 (en) * | 2001-12-21 | 2003-08-14 | John Phillips | Identification verification system and method |
US20030183695A1 (en) * | 2001-12-18 | 2003-10-02 | Brian Labrec | Multiple image security features for identification documents and methods of making same |
US20040100363A1 (en) * | 2002-11-23 | 2004-05-27 | Kathleen Lane | Birth and other legal documents having an RFID device and method of use for certification and authentication |
US20040250142A1 (en) * | 2003-03-28 | 2004-12-09 | Feyler David M. | UV2D reader, age verification and license validation system |
US20050067496A1 (en) * | 2003-09-30 | 2005-03-31 | Jonathan Yen | Extracting graphical bar codes from template-based documents |
US20050109850A1 (en) * | 2002-12-18 | 2005-05-26 | Jones Robert L. | Identification document with three dimensional image of bearer |
US20060010027A1 (en) * | 2004-07-09 | 2006-01-12 | Redman Paul J | Method, system and program product for measuring customer preferences and needs with traffic pattern analysis |
US20060047731A1 (en) * | 2004-09-01 | 2006-03-02 | Yoshiro Matsui | Document-management device, document-management program, recording medium, and document-management method |
US20060131395A1 (en) * | 2004-09-09 | 2006-06-22 | Cash Systems, Inc. | System and method for checkless cash advance settlement |
US20060151607A1 (en) * | 2004-11-05 | 2006-07-13 | Kazunori Horikiri | Document scan system, document transfer system, document transfer method, and storage medium readable by a computer |
US20060157559A1 (en) * | 2004-07-07 | 2006-07-20 | Levy Kenneth L | Systems and methods for document verification |
US20060209351A1 (en) * | 2005-03-18 | 2006-09-21 | Canon Kabushiki Kaisha | Document management apparatus, control method therefor, computer program, and storage medium |
US7118027B2 (en) * | 2004-02-04 | 2006-10-10 | Lester Sussman | Method and system to issue an electronic visa of a foreign visitor at a country's foreign consular premises |
US20060231610A1 (en) * | 2005-04-15 | 2006-10-19 | Beacon Communication Kk | Handheld system and method for age verification |
US20060235746A1 (en) * | 2005-04-18 | 2006-10-19 | Hammond Mark S | Systems and methods for providing a reward at a point of return |
US20060259420A1 (en) * | 2005-05-11 | 2006-11-16 | Schaffer Bret C | System and Method for Regulatory Compliance Assessment of Settlement Statement Data |
US20070138260A1 (en) * | 2005-12-21 | 2007-06-21 | Ncr Corporation | Methods and apparatus for automated document examination for age verification |
US20070183000A1 (en) * | 2005-12-16 | 2007-08-09 | Ori Eisen | Methods and apparatus for securely displaying digital images |
US20080059803A1 (en) * | 2006-09-06 | 2008-03-06 | Zeon Corporation | Method for the authentication of printed document |
US20080098292A1 (en) * | 2006-10-20 | 2008-04-24 | Intelli-Check, Inc. | Automatic document reader and form population system and method |
US20080239365A1 (en) * | 2007-03-26 | 2008-10-02 | Xerox Corporation | Masking of text in document reproduction |
US20080238670A1 (en) * | 2007-03-30 | 2008-10-02 | Verizon Business Network Services, Inc. | Security device with display |
US20080261564A1 (en) * | 2000-08-29 | 2008-10-23 | Logan James D | Communication and control system using location aware devices for audio message storage and transmission operating under rule-based control |
US20090164474A1 (en) * | 2006-06-08 | 2009-06-25 | Softmedical, Inc. | Methods and systems for consolidating medical information |
US20090167492A1 (en) * | 2006-03-01 | 2009-07-02 | Entrydata Pty Ltd | Identity verification and access control |
US20090296166A1 (en) * | 2008-05-16 | 2009-12-03 | Schrichte Christopher K | Point of scan/copy redaction |
US20100051679A1 (en) * | 2008-08-26 | 2010-03-04 | Vancouver International Airport Authority | Method and system for inspection of travelers |
US20100070396A1 (en) * | 2007-12-21 | 2010-03-18 | Celcorp, Inc. | Virtual redaction service |
US7708189B1 (en) * | 2002-05-17 | 2010-05-04 | Cipriano Joseph J | Identification verification system and method |
US7757075B2 (en) * | 2002-11-15 | 2010-07-13 | Microsoft Corporation | State reference |
US7802305B1 (en) * | 2006-10-10 | 2010-09-21 | Adobe Systems Inc. | Methods and apparatus for automated redaction of content in a document |
US20110001604A1 (en) * | 2007-11-05 | 2011-01-06 | Nelson Ludlow | Automatic incident reporting in an access control system |
US20110145147A1 (en) * | 2009-12-14 | 2011-06-16 | Wylie Michael S | System and method for authorizing transactions |
US8781512B1 (en) * | 2011-10-22 | 2014-07-15 | Proximetry, Inc. | Systems and methods for managing wireless links |
US20140259838A1 (en) * | 2013-03-13 | 2014-09-18 | Bank Of America Corporation | Card with edge indicators |
US20150088778A1 (en) * | 2013-09-24 | 2015-03-26 | Adam Y. Tsao | System and method for verifying a travelers authorization to enter into a jurisdiction using a software application installed on a personal electronic device |
US20150341370A1 (en) * | 2014-02-25 | 2015-11-26 | Sal Khan | Systems and methods relating to the authenticity and verification of photographic identity documents |
US20160104167A1 (en) * | 2014-10-09 | 2016-04-14 | C T Corporation System | Device and method for populating a legal filing with an individual's name from a government-issued identification document |
US20160104041A1 (en) * | 2014-10-13 | 2016-04-14 | Klink Technologies, Inc. | Method and system for identity and age verification |
US9326267B1 (en) * | 2008-07-02 | 2016-04-26 | Iwao Fujisaki | Communication device |
US20160125680A1 (en) * | 2014-10-31 | 2016-05-05 | Intellicheck Mobilisa, Inc. | Identification scan in compliance with jurisdictional or other rules |
US20160179776A1 (en) * | 2014-12-17 | 2016-06-23 | Heartland Payment Systems, Inc. | E-signature |
US20180166160A1 (en) * | 2016-10-24 | 2018-06-14 | James F. Walton, III | System and method for providing access to electronically stored medical information |
US10147076B2 (en) * | 2002-10-01 | 2018-12-04 | Andrew H B Zhou | Digital currency (virtual payment cards) issued by central bank for mobile and wearable devices |
US10157339B2 (en) * | 2015-03-03 | 2018-12-18 | WonderHealth, LLC | Access control for encrypted data in machine-readable identifiers |
US10366564B1 (en) * | 2018-03-07 | 2019-07-30 | Tapcentive, Inc. | Personal gaming terminal used in possession of player |
US10380379B2 (en) * | 2015-03-03 | 2019-08-13 | WonderHealth, LLC | Selectively encrypting and displaying machine-readable identifiers in a device lock screen |
US10387577B2 (en) * | 2015-03-03 | 2019-08-20 | WonderHealth, LLC | Secure data translation using machine-readable identifiers |
US10440014B1 (en) * | 2016-09-30 | 2019-10-08 | Assa Abloy Ab | Portable secure access module |
US20200193252A1 (en) * | 2018-12-13 | 2020-06-18 | EVERYTHING Ltd | Dynamic Product Tag Based on an Environmental Condition |
US20200357497A1 (en) * | 2019-05-09 | 2020-11-12 | Deirdre Kamber Todd | Secure systems, devices and methods for storing and accessing personal identification, medical, and veterinary information |
US20210049334A1 (en) * | 2019-08-14 | 2021-02-18 | Avery Dennison Retail Information Services, Llc | Method of Optimizing Read Technology for High Density Items |
US11018939B1 (en) * | 2018-12-10 | 2021-05-25 | Amazon Technologies, Inc. | Determining product compatibility and demand |
Family Cites Families (372)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
SE330282B (en) | 1968-06-24 | 1970-11-09 | Saab Ab | |
US3569619A (en) | 1968-06-27 | 1971-03-09 | Luther G Simjian | Verification system using coded identifying and storage means |
US3702392A (en) | 1970-11-20 | 1972-11-07 | Interface Ind Inc | Methods for verifying the identity of a card holder and apparatus therefor |
US3868057A (en) | 1971-06-29 | 1975-02-25 | Robert C Chavez | Credit card and indentity verification system |
US3906201A (en) | 1973-04-23 | 1975-09-16 | William A Housman | Module card verification system |
JPS5075879A (en) | 1973-11-09 | 1975-06-21 | ||
US3956615A (en) | 1974-06-25 | 1976-05-11 | Ibm Corporation | Transaction execution system with secure data storage and communications |
US3988570A (en) | 1975-01-10 | 1976-10-26 | Endyn Industries Ltd. | Controlled access and automatic revenue reporting system |
SE7713964L (en) | 1976-12-10 | 1978-06-11 | Emi Ltd | SAFETY DOCUMENT AND METHOD FOR ITS MANUFACTURE |
CH619551A5 (en) | 1977-01-24 | 1980-09-30 | Gretag Ag | Method for obtaining a high degree of protection against falsification of a card which bears permanent and variable, machine-readable information |
US4138057A (en) | 1977-07-08 | 1979-02-06 | Atalla Technovations | Card, system and method for securing user identification data |
USRE30579E (en) | 1977-10-28 | 1981-04-14 | Telecredit, Inc. | Check authorization system |
US4193131A (en) | 1977-12-05 | 1980-03-11 | International Business Machines Corporation | Cryptographic verification of operational keys used in communication networks |
US4186871A (en) | 1978-03-01 | 1980-02-05 | International Business Machines Corporation | Transaction execution system with secure encryption key storage and communications |
FR2469760A1 (en) | 1979-11-09 | 1981-05-22 | Cii Honeywell Bull | METHOD AND SYSTEM FOR IDENTIFYING PEOPLE REQUESTING ACCESS TO CERTAIN MEDIA |
DE3000560C2 (en) | 1980-01-09 | 1986-10-09 | Hermann 7742 St Georgen Stockburger | Method for checking the authenticity of a data carrier and device for carrying out the method |
DE3050473C2 (en) | 1980-01-09 | 1986-09-18 | Hermann 7742 St Georgen Stockburger | Method for checking the authenticity of a data carrier and device z. Implementation of the procedure |
US4357529A (en) | 1980-02-04 | 1982-11-02 | Atalla Technovations | Multilevel security apparatus and method |
US4639889A (en) | 1980-02-19 | 1987-01-27 | Omron Tateisi Electronics Company | System for controlling communication between a main control assembly and programmable terminal units |
US4304961A (en) | 1980-03-03 | 1981-12-08 | Burroughs Corporation | Authenticator code generator |
US4369361A (en) | 1980-03-25 | 1983-01-18 | Symbol Technologies, Inc. | Portable, stand-alone, desk-top laser scanning workstation for intelligent data acquisition terminal and method of scanning |
US4568936A (en) | 1980-06-23 | 1986-02-04 | Light Signatures, Inc. | Verification system for document substance and content |
US4656473A (en) | 1984-10-04 | 1987-04-07 | Light Signatures, Inc. | Secure card and sensing system |
US4575816A (en) | 1980-12-19 | 1986-03-11 | International Business Machines Corporation | Interactive transactions processor using sequence table pointers to access function table statements controlling execution of specific interactive functions |
US4453074A (en) | 1981-10-19 | 1984-06-05 | American Express Company | Protection system for intelligent cards |
DE3143915A1 (en) | 1981-11-05 | 1983-05-11 | Brown, Boveri & Cie Ag, 6800 Mannheim | IDENTITY CARD |
SE442249B (en) | 1983-11-17 | 1985-12-09 | Ericsson Telefon Ab L M | PROCEDURE AND DEVICE FOR VERIFICATION OF PERSONAL IDENTIFICATION NUMBER AND CHECKING INSERT NUMBER SERIES IN IDENTIFICATION MEDIA |
US4634846A (en) | 1984-05-22 | 1987-01-06 | American District Telegraph Company | Multimode programmable stand-alone access control system |
JPS6191790A (en) | 1984-10-12 | 1986-05-09 | カシオ計算機株式会社 | Card verification device |
US4689477A (en) | 1984-12-31 | 1987-08-25 | Light Signatures, Inc. | Verification system for document substance and content |
EP0195112A3 (en) | 1985-03-11 | 1988-03-02 | Im Electronics Co Ltd | A magnetic card discriminator |
US4812628A (en) | 1985-05-02 | 1989-03-14 | Visa International Service Association | Transaction system with off-line risk assessment |
US5016192A (en) | 1985-09-10 | 1991-05-14 | Sony Corporation | Videotex terminal with a memory for storing plural picture frames |
GB8525161D0 (en) | 1985-10-11 | 1985-11-13 | Blackwell V C | Personalised identification device |
LU86203A1 (en) | 1985-12-11 | 1987-07-24 | Cen Centre Energie Nucleaire | METHOD AND APPARATUS FOR VERIFYING THE AUTHENTICITY OF DOCUMENTS LINKED TO A PERSON AND THE IDENTITY OF THEIR CARRIERS |
US4752676A (en) | 1985-12-12 | 1988-06-21 | Common Bond Associates | Reliable secure, updatable "cash" card system |
US5367148A (en) | 1986-04-18 | 1994-11-22 | Cias, Inc. | Counterfeit detection using ID numbers with at least one random portion |
FR2601795B1 (en) | 1986-07-17 | 1988-10-07 | Bull Cp8 | METHOD FOR DIVERSIFYING A BASE KEY AND FOR AUTHENTICATING A KEY THUS DIVERSIFIED AS HAVING BEEN PREPARED FROM A PREDETERMINED BASE KEY, AND SYSTEM FOR IMPLEMENTING IT |
JPS63138462A (en) | 1986-12-01 | 1988-06-10 | Hitachi Ltd | Automatic cash transaction device |
US4906988A (en) | 1987-01-27 | 1990-03-06 | Rand Mcnally & Co. | Object verification system and method |
US4807287A (en) | 1987-04-06 | 1989-02-21 | Light Signatures, Inc. | Document authentication method |
JPS6455695A (en) | 1987-08-27 | 1989-03-02 | Sanden Corp | Vending machine |
US5140634A (en) | 1987-09-07 | 1992-08-18 | U.S Philips Corporation | Method and apparatus for authenticating accreditations and for authenticating and signing messages |
US5030117A (en) | 1987-09-25 | 1991-07-09 | Delorme David M | Digital global map generating system |
JPH0195362A (en) | 1987-10-07 | 1989-04-13 | Omron Tateisi Electron Co | Debit-cum-credit terminal |
US4811408A (en) | 1987-11-13 | 1989-03-07 | Light Signatures, Inc. | Image dissecting document verification system |
US4879747A (en) | 1988-03-21 | 1989-11-07 | Leighton Frank T | Method and system for personal identification |
US4995081A (en) | 1988-03-21 | 1991-02-19 | Leighton Frank T | Method and system for personal identification using proofs of legitimacy |
US5055658A (en) | 1988-07-25 | 1991-10-08 | Cockburn John B | Security system employing digitized personal physical characteristics |
DE68928170T2 (en) | 1988-10-18 | 1998-02-19 | Oki Electric Ind Co Ltd | CLASSIFICATION SYSTEM FOR PERSONAL SECRET NUMBERS |
US5644723A (en) | 1989-05-01 | 1997-07-01 | Credit Verification Corporation | Method and system for selective incentive point-of-sale marketing in response to customer shopping histories |
US4972476A (en) | 1989-05-11 | 1990-11-20 | Nathans Robert L | Counterfeit proof ID card having a scrambled facial image |
JP2882642B2 (en) | 1989-07-06 | 1999-04-12 | エヌシーアール インターナショナル インコーポレイテッド | Card handling device |
JP2630651B2 (en) | 1989-07-26 | 1997-07-16 | ヤマハ株式会社 | Fader device |
US5136643A (en) | 1989-10-13 | 1992-08-04 | Fischer Addison M | Public/key date-time notary facility |
US5001752A (en) | 1989-10-13 | 1991-03-19 | Fischer Addison M | Public/key date-time notary facility |
JP3100972B2 (en) | 1989-10-30 | 2000-10-23 | 株式会社メニコン | Intraocular lens |
US4993068A (en) | 1989-11-27 | 1991-02-12 | Motorola, Inc. | Unforgeable personal identification system |
US5337361C1 (en) | 1990-01-05 | 2001-05-15 | Symbol Technologies Inc | Record with encoded data |
US4981370A (en) | 1990-01-29 | 1991-01-01 | Dziewit Halina S | Document authentication apparatus |
US5007089A (en) | 1990-04-09 | 1991-04-09 | International Business Machines Corporation | Secure key management using programable control vector checking |
NL9001368A (en) | 1990-06-15 | 1992-01-02 | Tel Developments B V | SECURITY OF OBJECTS OR DOCUMENTS. |
JP2639179B2 (en) | 1990-06-19 | 1997-08-06 | 日産自動車株式会社 | Vehicle operation compensation device |
JPH0471079A (en) | 1990-07-12 | 1992-03-05 | Takayama:Kk | Positioning method for image |
US5163098A (en) | 1990-09-06 | 1992-11-10 | Dahbura Abbud S | System for preventing fraudulent use of credit card |
EP0551433B1 (en) | 1990-10-01 | 2001-05-09 | BUSH, Thomas A. | Transactional processing system |
US5241600A (en) | 1991-07-16 | 1993-08-31 | Thinking Machines Corporation | Vertification system for credit or bank card or the like |
JPH0575879A (en) | 1991-09-17 | 1993-03-26 | Mitsubishi Electric Corp | Facsimile device |
US5429361A (en) | 1991-09-23 | 1995-07-04 | Bally Gaming International, Inc. | Gaming machine information, communication and display system |
US5347589A (en) | 1991-10-28 | 1994-09-13 | Meeks Associates, Inc. | System and method for displaying handwriting parameters for handwriting verification |
US5222152A (en) | 1991-11-19 | 1993-06-22 | Digital Biometrics, Inc. | Portable fingerprint scanning apparatus for identification verification |
US5467403A (en) | 1991-11-19 | 1995-11-14 | Digital Biometrics, Inc. | Portable fingerprint scanning apparatus for identification verification |
US5199074A (en) | 1992-01-06 | 1993-03-30 | Advanced Micro Devices, Inc. | Encryption system |
US5341428A (en) | 1992-01-30 | 1994-08-23 | Gbs Systems Corporation | Multiple cross-check document verification system |
US5336871A (en) | 1992-02-07 | 1994-08-09 | American Bank Note Holographics, Incorporated | Holographic enhancement of card security |
US5432329A (en) | 1992-02-07 | 1995-07-11 | American Bank Note Holographics | Automated holographic optical recognition and decoding system for verification |
US5446273A (en) | 1992-03-13 | 1995-08-29 | Leslie; William M. | Credit card security system |
US5280527A (en) | 1992-04-14 | 1994-01-18 | Kamahira Safe Co., Inc. | Biometric token for authorizing access to a host system |
US5287181A (en) | 1992-08-20 | 1994-02-15 | Holman Michael J | Electronic redeemable coupon system and television |
US5446885A (en) | 1992-05-15 | 1995-08-29 | International Business Machines Corporation | Event driven management information system with rule-based applications structure stored in a relational database |
US5214699A (en) | 1992-06-09 | 1993-05-25 | Audio Digital Imaging Inc. | System for decoding and displaying personalized indentification stored on memory storage device |
US5284364A (en) | 1992-06-10 | 1994-02-08 | Anvik Corporation | Increased-security identification card system |
US5259025A (en) | 1992-06-12 | 1993-11-02 | Audio Digitalimaging, Inc. | Method of verifying fake-proof video identification data |
US5331137A (en) | 1992-07-14 | 1994-07-19 | Symbol Technologies, Inc. | Machine readable code combining preprinted indicia with hand-mark data |
US6105871A (en) | 1992-07-16 | 2000-08-22 | Telxon Corporation | Portable bar code scanner apparatus |
US5237611A (en) | 1992-07-23 | 1993-08-17 | Crest Industries, Inc. | Encryption/decryption apparatus with non-accessible table of keys |
CA2105926A1 (en) | 1992-09-11 | 1994-03-12 | George J. Tomko | Fingerprint verification system |
US5432864A (en) | 1992-10-05 | 1995-07-11 | Daozheng Lu | Identification card verification system |
US5422468A (en) | 1992-10-30 | 1995-06-06 | Abecassis; Max | Deposit authorization system |
US5337358A (en) | 1992-11-20 | 1994-08-09 | Pitney Bowes Inc. | Apparatus for recording a transaction including authenticating an identification card |
US5864622A (en) | 1992-11-20 | 1999-01-26 | Pitney Bowes Inc. | Secure identification card and method and apparatus for producing and authenticating same |
US5249227A (en) | 1992-11-30 | 1993-09-28 | Motorola, Inc. | Method and apparatus of controlling processing devices during power transition |
SE9203607L (en) | 1992-12-01 | 1994-06-02 | Fred Goldberg | Vehicle authorization system |
JPH0793648A (en) | 1993-01-25 | 1995-04-07 | Shinki:Kk | Sales device of article with sales object age limit in automatic vending machine |
US5321751A (en) | 1993-02-18 | 1994-06-14 | Eastman Kodak Company | Method and apparatus for credit card verification |
US5848426A (en) | 1993-03-05 | 1998-12-08 | Metanetics Corporation | Automatic data translation between different business systems |
US5490217A (en) | 1993-03-05 | 1996-02-06 | Metanetics Corporation | Automatic document handling system |
US5367581A (en) | 1993-03-31 | 1994-11-22 | Direct Data Systems | Magnetic reader with read head biased against document by resilient deflection of circuit board |
DE4311295A1 (en) | 1993-04-02 | 1994-10-06 | Borus Spezialverfahren | Identification system |
US5513019A (en) | 1993-04-16 | 1996-04-30 | Crown Roll Leaf, Inc. | Semi-transparent reflective layer for a phase hologram |
US5420924A (en) | 1993-04-26 | 1995-05-30 | Pitney Bowes Inc. | Secure identification card and method and apparatus for producing and authenticating same by comparison of a portion of an image to the whole |
CA2123456C (en) | 1993-05-24 | 1998-09-15 | William Berson | Document authentication system utilizing a transparent label |
US5546278A (en) | 1993-12-15 | 1996-08-13 | Itt Corporation | IC card protective cover |
US5513261A (en) | 1993-12-29 | 1996-04-30 | At&T Corp. | Key management scheme for use with electronic cards |
US6104809A (en) | 1993-12-29 | 2000-08-15 | Pitney Bowes Inc. | Apparatus for verifying an identification card |
US5559885A (en) | 1994-01-14 | 1996-09-24 | Drexler Technology Corporation | Two stage read-write method for transaction cards |
US5553143A (en) | 1994-02-04 | 1996-09-03 | Novell, Inc. | Method and apparatus for electronic licensing |
US5461217A (en) | 1994-02-08 | 1995-10-24 | At&T Ipm Corp. | Secure money transfer techniques using smart cards |
US5781650A (en) | 1994-02-18 | 1998-07-14 | University Of Central Florida | Automatic feature detection and age classification of human faces in digital images |
DE4410459A1 (en) | 1994-03-25 | 1995-02-16 | Siemens Ag | Electronic signature method in data transmission |
US5598474A (en) | 1994-03-29 | 1997-01-28 | Neldon P Johnson | Process for encrypting a fingerprint onto an I.D. card |
JP3348960B2 (en) | 1994-03-30 | 2002-11-20 | 株式会社東芝 | Certification card creation device and certification card creation method |
US5651066A (en) | 1994-04-28 | 1997-07-22 | Nippon Telegraph And Telephone Corporation | Cipher key distribution system effectively preventing illegitimate use and charging of enciphered information |
FR2719680B1 (en) | 1994-05-05 | 1996-07-12 | Gemplus Card Int | Method for securing access to removable cards for computer. |
US5594806A (en) | 1994-06-20 | 1997-01-14 | Personnel Identification & Entry Access Control, Inc. | Knuckle profile indentity verification system |
US5621200A (en) | 1994-06-22 | 1997-04-15 | Panda Eng., Inc. | Electronic verification machine for validating a medium having conductive material printed thereon |
US5506395A (en) | 1994-06-22 | 1996-04-09 | William C. Eppley | Multi-access card and card holder with a plurality of machine readable service access codes placed thereon |
US5469506A (en) | 1994-06-27 | 1995-11-21 | Pitney Bowes Inc. | Apparatus for verifying an identification card and identifying a person by means of a biometric characteristic |
US5594226A (en) | 1994-07-11 | 1997-01-14 | Steger; Paul | Automated check verification and tracking system using bar code information |
JP2638525B2 (en) | 1994-08-03 | 1997-08-06 | 日本電気株式会社 | Electronic signature verification device |
US5694471A (en) | 1994-08-03 | 1997-12-02 | V-One Corporation | Counterfeit-proof identification card |
DE19527737B4 (en) | 1994-08-05 | 2006-06-01 | Ovd Kinegram Ag | Arrangement with a reader and with an information memory with optical and magnetic features |
US5500518A (en) | 1994-11-17 | 1996-03-19 | Alliedsignal Inc. | Memory card including extraction/retention arrangement |
US5870723A (en) | 1994-11-28 | 1999-02-09 | Pare, Jr.; David Ferrin | Tokenless biometric transaction authorization method and system |
US5613012A (en) | 1994-11-28 | 1997-03-18 | Smarttouch, Llc. | Tokenless identification system for authorization of electronic transactions and electronic transmissions |
US7613659B1 (en) | 1994-11-28 | 2009-11-03 | Yt Acquisition Corporation | System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse |
US5758257A (en) | 1994-11-29 | 1998-05-26 | Herz; Frederick | System and method for scheduling broadcast of and access to video programs and other data using customer profiles |
US5679938A (en) | 1994-12-02 | 1997-10-21 | Telecheck International, Inc. | Methods and systems for interactive check authorizations |
US5513272A (en) | 1994-12-05 | 1996-04-30 | Wizards, Llc | System for verifying use of a credit/identification card including recording of physical attributes of unauthorized users |
US5721777A (en) | 1994-12-29 | 1998-02-24 | Lucent Technologies Inc. | Escrow key management system for accessing encrypted data with portable cryptographic modules |
US5770084A (en) | 1995-01-01 | 1998-06-23 | Board Of Supervisors Of Louisiana State University And Agricultural And Mechanical College | Polymerized chiral micelles for chiral separations |
US6745937B2 (en) | 1995-06-07 | 2004-06-08 | E-Comm, Inc. | Low-power hand-held transaction device |
KR960032232A (en) | 1995-02-25 | 1996-09-17 | 김광호 | Card read / write unit compatible with memory cards and smart cards |
US6760463B2 (en) | 1995-05-08 | 2004-07-06 | Digimarc Corporation | Watermarking methods and media |
US6202055B1 (en) | 1996-08-21 | 2001-03-13 | Image Data, Llc | Positive identification display device and scanner for low cost collection and display of graphic and text data in a secure manner |
US5706507A (en) | 1995-07-05 | 1998-01-06 | International Business Machines Corporation | System and method for controlling access to data located on a content server |
US5635981A (en) | 1995-07-10 | 1997-06-03 | Ribacoff; Elie D. | Visitor identification system |
US5695835A (en) | 1995-07-27 | 1997-12-09 | Weber; Daniel J. | Multi dimensional camouflaged garment |
US5786587A (en) | 1995-08-10 | 1998-07-28 | American Bank Note Holographics, Inc. | Enhancement of chip card security |
US5663553A (en) | 1995-09-27 | 1997-09-02 | Intel Corporation | Mass storage device adapter for smart cards |
US5742685A (en) | 1995-10-11 | 1998-04-21 | Pitney Bowes Inc. | Method for verifying an identification card and recording verification of same |
US5796832A (en) | 1995-11-13 | 1998-08-18 | Transaction Technology, Inc. | Wireless transaction and information system |
US5722526A (en) | 1995-11-13 | 1998-03-03 | Sharrard; Robert C. | Dispensing security system for a vending machine |
JPH09245231A (en) | 1996-03-07 | 1997-09-19 | Fujitaka:Kk | Automatic vending machine having age identification function |
US6343313B1 (en) | 1996-03-26 | 2002-01-29 | Pixion, Inc. | Computer conferencing system with real-time multipoint, multi-speed, multi-stream scalability |
US6661910B2 (en) * | 1997-04-14 | 2003-12-09 | Cummins-Allison Corp. | Network for transporting and processing images in real time |
US5988497A (en) | 1996-05-30 | 1999-11-23 | Mci Communications Corporation | Method for authenticating credit transactions to prevent fraudulent charges |
US6557752B1 (en) | 1996-06-12 | 2003-05-06 | Q-International, Inc. | Smart card for recording identification, and operational, service and maintenance transactions |
US6070147A (en) | 1996-07-02 | 2000-05-30 | Tecmark Services, Inc. | Customer identification and marketing analysis systems |
US5770849A (en) | 1996-08-23 | 1998-06-23 | Motorola, Inc. | Smart card device with pager and visual image display |
US5812664A (en) | 1996-09-06 | 1998-09-22 | Pitney Bowes Inc. | Key distribution system |
US5966654A (en) | 1996-11-01 | 1999-10-12 | Ericsson Inc. | Recyclable cellular telephone and method and apparatus for supporting the use of a recyclable cellular telephone within a cellular telephone network acting as a theme park communicator/scheduler |
US5991429A (en) | 1996-12-06 | 1999-11-23 | Coffin; Jeffrey S. | Facial recognition system for security access and identification |
US6119932A (en) | 1997-02-18 | 2000-09-19 | Protech Video Security, Inc. | Identification verification apparatus and method |
USD393950S (en) | 1997-03-10 | 1998-05-05 | Shelter Pro, Llc | Concealment tape |
US5805849A (en) | 1997-03-31 | 1998-09-08 | International Business Machines Corporation | Data processing system and method for using an unique identifier to maintain an age relationship between executing instructions |
US6679425B1 (en) | 1997-06-18 | 2004-01-20 | Express Technology, Inc. | Systems, apparatus and processes to verify a person's age to determine if the person is authorized |
US6085976A (en) | 1998-05-22 | 2000-07-11 | Sehr; Richard P. | Travel system and methods utilizing multi-application passenger cards |
US6119933A (en) | 1997-07-17 | 2000-09-19 | Wong; Earl Chang | Method and apparatus for customer loyalty and marketing analysis |
US6523741B1 (en) | 1997-09-05 | 2003-02-25 | Dimaria Peter C. | Apparatus for controlling the rental and sale of age-controlled merchandise and for controlling access to age-controlled services |
US6148091A (en) | 1997-09-05 | 2000-11-14 | The Identiscan Company, Llc | Apparatus for controlling the rental and sale of age-controlled merchandise and for controlling access to age-controlled services |
US5959541A (en) | 1997-09-23 | 1999-09-28 | Accu-Time Systems, Inc. | Biometric time and attendance system with epidermal topographical updating capability |
US6317544B1 (en) | 1997-09-25 | 2001-11-13 | Raytheon Company | Distributed mobile biometric identification system with a centralized server and mobile workstations |
US6038666A (en) | 1997-12-22 | 2000-03-14 | Trw Inc. | Remote identity verification technique using a personal identification device |
US5995014A (en) | 1997-12-30 | 1999-11-30 | Accu-Time Systems, Inc. | Biometric interface device for upgrading existing access control units |
US6199079B1 (en) | 1998-03-09 | 2001-03-06 | Junglee Corporation | Method and system for automatically filling forms in an integrated network based transaction environment |
US7809138B2 (en) * | 1999-03-16 | 2010-10-05 | Intertrust Technologies Corporation | Methods and apparatus for persistent control and protection of content |
US6820984B2 (en) | 1998-04-09 | 2004-11-23 | Seiko Epson Corporation | Projection display device and remote controller |
US6205479B1 (en) | 1998-04-14 | 2001-03-20 | Juno Online Services, Inc. | Two-tier authentication system where clients first authenticate with independent service providers and then automatically exchange messages with a client controller to gain network access |
US6089452A (en) | 1998-04-16 | 2000-07-18 | Rhode, Iii; Edward W. | Operator's license validation system |
US6484260B1 (en) | 1998-04-24 | 2002-11-19 | Identix, Inc. | Personal identification system |
US6234389B1 (en) | 1998-04-29 | 2001-05-22 | @Pos.Com, Inc. | PCMCIA-based point of sale transaction system |
US6928546B1 (en) | 1998-05-14 | 2005-08-09 | Fusion Arc, Inc. | Identity verification method using a central biometric authority |
EP1080415B1 (en) | 1998-05-21 | 2017-01-18 | Equifax Inc. | System and method for authentication of network users |
US6068301A (en) | 1998-05-26 | 2000-05-30 | Han; Wenyu | Method and apparatus for impeding the counterfeiting of cards, instruments and documents |
US6222463B1 (en) | 1998-06-25 | 2001-04-24 | Lucent Technologies, Inc. | Vehicle communication network |
US6279013B1 (en) * | 1998-07-20 | 2001-08-21 | Xerox Corporation | Interactive newspaper |
US6196460B1 (en) | 1998-08-13 | 2001-03-06 | Cardcom, Inc. | Age verification device |
DE19844360A1 (en) | 1998-09-28 | 2000-04-13 | Anatoli Stobbe | Access control system |
US6522772B1 (en) | 1998-09-30 | 2003-02-18 | Ncr Corporation | Self-service checkout terminal having a biometric sensing device for verifying identity of a user and associated method |
US6363387B1 (en) | 1998-10-20 | 2002-03-26 | Sybase, Inc. | Database system providing methodology for enhancing concurrency using row update bit and deferred locking |
US6289113B1 (en) | 1998-11-25 | 2001-09-11 | Iridian Technologies, Inc. | Handheld iris imaging apparatus and method |
US6169542B1 (en) | 1998-12-14 | 2001-01-02 | Gte Main Street Incorporated | Method of delivering advertising through an interactive video distribution system |
US6736317B1 (en) | 1999-04-20 | 2004-05-18 | Mcdonald Ian | Real time internet-based transit management and control system with wireless vehicular data link |
AUPQ439299A0 (en) | 1999-12-01 | 1999-12-23 | Silverbrook Research Pty Ltd | Interface system |
US20010027439A1 (en) | 1999-07-16 | 2001-10-04 | Holtzman Henry N. | Method and system for computerized form completion |
US6224109B1 (en) | 1999-08-07 | 2001-05-01 | James Yung Chien Yang | Credit card with driver's license or identification |
US6651217B1 (en) | 1999-09-01 | 2003-11-18 | Microsoft Corporation | System and method for populating forms with previously used data values |
US6542635B1 (en) | 1999-09-08 | 2003-04-01 | Lucent Technologies Inc. | Method for document comparison and classification using document image layout |
US20020095389A1 (en) | 1999-10-05 | 2002-07-18 | Gaines Robert Vallee | Method, apparatus and system for identity authentication |
US8036431B1 (en) | 1999-10-29 | 2011-10-11 | Identix Incorporated | Portable apparatus for identification verification |
US6564997B1 (en) | 1999-11-15 | 2003-05-20 | Idx, Inc. | Electronic security key for enabling electronic coin acceptors and the like |
US6464134B1 (en) | 1999-12-10 | 2002-10-15 | Terri Page | System and method for verifying the authenticity of a check and authorizing payment thereof |
SE518290C2 (en) | 1999-12-29 | 2002-09-17 | Ericsson Telefon Ab L M | Portable communication device with an optical or magnetic reading device |
US6871287B1 (en) | 2000-01-21 | 2005-03-22 | John F. Ellingson | System and method for verification of identity |
US6956615B2 (en) | 2000-01-28 | 2005-10-18 | Pentax Corporation | Structure for mounting a solid-state imaging device |
US6171138B1 (en) | 2000-01-28 | 2001-01-09 | Motorola, Inc. | Electrical connector for removable components |
US7027931B1 (en) | 2000-02-24 | 2006-04-11 | Bionostics, Inc. | System for statistical analysis of quality control data |
WO2001071463A2 (en) | 2000-03-17 | 2001-09-27 | United States Postal Service | Methods and systems for providing a secure electronic mailbox |
CA2342095A1 (en) | 2000-03-27 | 2001-09-27 | Symagery Microsystems Inc. | Image capture and processing accessory |
US6981028B1 (en) * | 2000-04-28 | 2005-12-27 | Obongo, Inc. | Method and system of implementing recorded data for automating internet interactions |
US7599847B2 (en) | 2000-06-09 | 2009-10-06 | Airport America | Automated internet based interactive travel planning and management system |
JP2002015263A (en) | 2000-06-28 | 2002-01-18 | Nec Corp | System and method for easy settlement by portable telephone |
AU7182701A (en) | 2000-07-06 | 2002-01-21 | David Paul Felsher | Information record infrastructure, system and method |
US8380630B2 (en) * | 2000-07-06 | 2013-02-19 | David Paul Felsher | Information record infrastructure, system and method |
CA2417763A1 (en) | 2000-08-04 | 2002-02-14 | Infoglide Corporation | System and method for comparing heterogeneous data sources |
US20020046185A1 (en) | 2000-08-30 | 2002-04-18 | Jean-Marc Villart | System and method conducting POS transactions |
US20020025796A1 (en) | 2000-08-30 | 2002-02-28 | Taylor William Stuart | System and method conducting cellular POS transactions |
JP4654498B2 (en) | 2000-08-31 | 2011-03-23 | ソニー株式会社 | Personal authentication system, personal authentication method, information processing apparatus, and program providing medium |
US7353014B2 (en) | 2000-10-31 | 2008-04-01 | Vijay Raghavan Chetty | Universal portable unit |
JP4087049B2 (en) | 2000-11-01 | 2008-05-14 | 株式会社日立製作所 | Data conversion method for database management system, apparatus for realizing the same, and storage medium for program for executing the same |
US20020089410A1 (en) | 2000-11-13 | 2002-07-11 | Janiak Martin J. | Biometric authentication device for use with a personal digital assistant |
US7349987B2 (en) | 2000-11-13 | 2008-03-25 | Digital Doors, Inc. | Data security system and method with parsing and dispersion techniques |
US7313825B2 (en) | 2000-11-13 | 2007-12-25 | Digital Doors, Inc. | Data security system and method for portable device |
WO2002042926A1 (en) | 2000-11-20 | 2002-05-30 | Ecrio Inc. | Method for downloading bar code encoded information with a mobile communication |
US6587032B2 (en) | 2000-11-28 | 2003-07-01 | International Business Machines Corporation | System and method for controlling access to a computer resource |
JP2002181175A (en) | 2000-12-19 | 2002-06-26 | Aisin Aw Co Ltd | Hydraulic controller for continuously variable transmission |
US20020087478A1 (en) | 2001-01-03 | 2002-07-04 | Hudd Neil P. | Wireless financial transactions |
US20020134837A1 (en) | 2001-01-23 | 2002-09-26 | Jakob Kishon | Method and apparatus for electronically exchanging data |
US6592029B2 (en) | 2001-02-16 | 2003-07-15 | Ghassan Brikho | System and method for gathering customer information for completing check cashing transactions |
US7382911B1 (en) | 2001-02-16 | 2008-06-03 | Hand Held Products, Inc. | Identification card reader |
US20030225687A1 (en) | 2001-03-20 | 2003-12-04 | David Lawrence | Travel related risk management clearinghouse |
US20020156676A1 (en) | 2001-04-17 | 2002-10-24 | Ahrens John C. | System, method, and apparatus for creating and securely managing accounts holding cash equivalents |
US6914517B2 (en) | 2001-04-17 | 2005-07-05 | Dalton Patrick Enterprises, Inc. | Fingerprint sensor with feature authentication |
CA2344726C (en) | 2001-04-19 | 2004-12-14 | Phil Hardy | Leafy camouflage suit |
WO2002095589A1 (en) | 2001-05-17 | 2002-11-28 | Identix Incorporated | Mobile identity verification |
US6758394B2 (en) | 2001-07-09 | 2004-07-06 | Infonox On The Web | Identity verification and enrollment system for self-service devices |
US6499141B1 (en) | 2001-08-20 | 2002-12-31 | Shelter-Pro, Llc | Multidimensional camouflage outer wear garment system |
US6910223B2 (en) | 2001-08-20 | 2005-06-28 | Shelter-Pro, Llc | Camouflage covering system |
US20030048904A1 (en) | 2001-09-07 | 2003-03-13 | Po-Tong Wang | Web-based biometric authorization apparatus |
US20030177102A1 (en) * | 2001-09-21 | 2003-09-18 | Timothy Robinson | System and method for biometric authorization for age verification |
US6475146B1 (en) | 2001-09-24 | 2002-11-05 | Siemens Medical Solutions Usa, Inc. | Method and system for using personal digital assistants with diagnostic medical ultrasound systems |
US7873576B2 (en) * | 2002-09-25 | 2011-01-18 | Cummins-Allison Corp. | Financial document processing system |
AU2002334708A1 (en) | 2001-10-01 | 2003-04-14 | Kline And Walker, Llc | Pfn/trac system faa upgrades for accountable remote and robotics control |
US20030071730A1 (en) | 2001-10-15 | 2003-04-17 | Valbh Anil I. | Traffic infringement electronic reporting system |
US6854642B2 (en) | 2001-10-19 | 2005-02-15 | Chesterfield Holdings, L.L.C. | System for vending products and services using an identification card and associated methods |
US20060243799A1 (en) | 2001-10-22 | 2006-11-02 | Maximus, Inc., | Method and apparatus for providing heightened airport security |
US20030078069A1 (en) | 2001-10-24 | 2003-04-24 | Phillip Lindeman | Portable communication device with split user inputs |
US7072081B2 (en) | 2001-10-24 | 2006-07-04 | Hewlett-Packard Development Company, L.P. | Compact portable 2D/ 3D image capture system |
US6934861B2 (en) | 2001-11-06 | 2005-08-23 | Crosscheck Identification Systems International, Inc. | National identification card system and biometric identity verification method for negotiating transactions |
JP2003157615A (en) | 2001-11-20 | 2003-05-30 | Hitachi Electronics Service Co Ltd | Recording and reproduction system, recording medium, reading and reproducing device, and reproduction-only device |
US20030099379A1 (en) | 2001-11-26 | 2003-05-29 | Monk Bruce C. | Validation and verification apparatus and method |
US7051932B2 (en) | 2001-12-26 | 2006-05-30 | Vivotech, Inc. | Adaptor for magnetic stripe card reader |
US20030126092A1 (en) | 2002-01-02 | 2003-07-03 | Mitsuo Chihara | Individual authentication method and the system |
US6721578B2 (en) | 2002-01-31 | 2004-04-13 | Qualcomm Incorporated | System and method for providing an interactive screen on a wireless device interacting with a server |
US7137064B2 (en) | 2002-02-02 | 2006-11-14 | International Business Machines Corporation | System and method for facilitating document imaging requests |
US8235287B2 (en) | 2010-10-13 | 2012-08-07 | Square, Inc. | Read head device with slot configured to reduce torque |
US6944782B2 (en) | 2002-02-12 | 2005-09-13 | Semtek Innovative Solutions, Inc. | Magnetic strip reader with power management control for attachment to a PDA device |
US7430674B2 (en) | 2002-02-12 | 2008-09-30 | Semtek Innovative Solutions, Inc. | Magnetic stripe reader with power management control for attachment to a PDA device |
AU2003217642A1 (en) | 2002-02-19 | 2003-09-09 | Digmarc Corporation | Security methods employing drivers licenses and other documents |
US7818657B1 (en) * | 2002-04-01 | 2010-10-19 | Fannie Mae | Electronic document for mortgage transactions |
US20080041942A1 (en) | 2002-04-17 | 2008-02-21 | Aissa Nebil B | Biometric Multi-Purpose Terminal, Payroll and Work Management System and Related Methods |
US7212279B1 (en) | 2002-05-20 | 2007-05-01 | Magna Chip Semiconductor Ltd. | Biometric identity verifiers and methods |
US6754910B2 (en) | 2002-05-24 | 2004-06-29 | Scott S. Shultz | Camouflage composition and method of making |
US7898385B2 (en) | 2002-06-26 | 2011-03-01 | Robert William Kocher | Personnel and vehicle identification system using three factors of authentication |
US20040010472A1 (en) | 2002-07-12 | 2004-01-15 | Hilby Robert T. | System and method for verifying information |
US20040104268A1 (en) | 2002-07-30 | 2004-06-03 | Bailey Kenneth Stephen | Plug in credit card reader module for wireless cellular phone verifications |
AU2003263989A1 (en) | 2002-08-05 | 2004-02-23 | Metaedge Corporation | Spatial intelligence system and method |
US20040078335A1 (en) | 2002-08-29 | 2004-04-22 | Calvesio Raymond V. | Transportation security system and method that supports international travel |
US8019691B2 (en) | 2002-09-10 | 2011-09-13 | Visa International Service Association | Profile and identity authentication service |
US20050284931A1 (en) | 2002-09-10 | 2005-12-29 | Regiscope Digital Imaging Co. Llc | Digital transaction recorder with facility access control |
US6779721B2 (en) | 2002-09-20 | 2004-08-24 | Eid Access, Inc. | Systems and methods for managing security at plural physical locations |
US6991159B2 (en) | 2002-09-30 | 2006-01-31 | Lipman Electronic Engineering Ltd. | Point of sale terminal including a socket for receiving a mobile device |
WO2004034236A2 (en) | 2002-10-11 | 2004-04-22 | Digimarc Corporation | Systems and methods for recognition of individuals using multiple biometric searches |
US7398200B2 (en) | 2002-10-16 | 2008-07-08 | Adobe Systems Incorporated | Token stream differencing with moved-block detection |
US6970088B2 (en) | 2002-10-17 | 2005-11-29 | Compex, Inc. | Method for tracking and processing passengers and their transported articles |
US8909926B2 (en) | 2002-10-21 | 2014-12-09 | Rockwell Automation Technologies, Inc. | System and methodology providing automation security analysis, validation, and learning in an industrial controller environment |
US6785405B2 (en) | 2002-10-23 | 2004-08-31 | Assuretec Systems, Inc. | Apparatus and method for document reading and authentication |
US7309010B2 (en) | 2002-11-04 | 2007-12-18 | Western Pathology Consultants, Inc. | Identification method and apparatus |
US7035626B1 (en) | 2002-11-14 | 2006-04-25 | Sierra Design Group | Remote gaming using cell phones with location and identity restrictions |
US7494060B2 (en) | 2002-12-10 | 2009-02-24 | Anthony Zagami | Information-based access control system for sea port terminals |
JP2004234543A (en) | 2003-01-31 | 2004-08-19 | Toshiba Corp | Person's identity confirmation method, information equipment and person's identity confirmation system |
US7167094B2 (en) | 2003-01-31 | 2007-01-23 | Secure Care Products, Inc. | Systems and methods for providing secure environments |
US7391917B2 (en) * | 2003-02-13 | 2008-06-24 | Canon Kabushiki Kaisha | Image processing method |
US7161465B2 (en) | 2003-04-08 | 2007-01-09 | Richard Glee Wood | Enhancing security for facilities and authorizing providers |
US7844545B2 (en) | 2003-04-25 | 2010-11-30 | The Western Union Company | Systems and methods for validating identifications in financial transactions |
AU2003902422A0 (en) | 2003-05-19 | 2003-06-05 | Intellirad Solutions Pty. Ltd | Access security system |
US20050093675A1 (en) | 2003-10-30 | 2005-05-05 | Wood Richard G. | Process and method of screening an individual at a point of entry to a secure environment to ascertain a risk factor |
EP1625664B1 (en) | 2003-05-22 | 2010-12-08 | PIPS Technology Inc. | Automated site security, monitoring and access control system |
US7119553B2 (en) | 2003-06-11 | 2006-10-10 | Konsulteurope Limited Limited Joint Stock Company | Security scanners with capacitance and magnetic sensor arrays |
DE20309254U1 (en) | 2003-06-16 | 2003-11-06 | SCM Microsystems GmbH, 85737 Ismaning | access system |
EP1644806A4 (en) | 2003-06-17 | 2007-10-03 | United Security Appl Id Inc | Electronic security system for monitoring and recording activity and data relating to persons |
US7455224B2 (en) | 2003-06-26 | 2008-11-25 | Kochevar Peter D | Site-specific access management |
US20050007776A1 (en) | 2003-07-07 | 2005-01-13 | Monk Bruce C. | Method and system for a processor controlled illumination system for reading and analyzing materials |
JP2005051734A (en) * | 2003-07-15 | 2005-02-24 | Hitachi Ltd | Electronic document authenticity guarantee method and electronic document publication system |
US20080148059A1 (en) | 2003-07-25 | 2008-06-19 | Shapiro Michael F | Universal, Biometric, Self-Authenticating Identity Computer Having Multiple Communication Ports |
US7343604B2 (en) | 2003-07-25 | 2008-03-11 | International Business Machines Corporation | Methods and apparatus for creation of parsing rules |
WO2005020114A1 (en) | 2003-08-22 | 2005-03-03 | Fujitsu Limited | Entering/leaving management system |
US7362210B2 (en) | 2003-09-05 | 2008-04-22 | Honeywell International Inc. | System and method for gate access control |
US7817013B2 (en) | 2003-09-05 | 2010-10-19 | Honeywell International Inc. | Distributed stand-off ID verification compatible with multiple face recognition systems (FRS) |
US7500178B1 (en) | 2003-09-11 | 2009-03-03 | Agis Network, Inc. | Techniques for processing electronic forms |
JP4615272B2 (en) | 2003-09-29 | 2011-01-19 | 富士フイルム株式会社 | Authentication system, program, and building |
US20050076013A1 (en) | 2003-10-01 | 2005-04-07 | Fuji Xerox Co., Ltd. | Context-based contact information retrieval systems and methods |
US20050080649A1 (en) | 2003-10-08 | 2005-04-14 | Alvarez Andres C. | Systems and methods for automating the capture, organization, and transmission of data |
JP4393161B2 (en) * | 2003-11-20 | 2010-01-06 | キヤノン株式会社 | Image processing apparatus and image processing method |
US20050137987A1 (en) * | 2003-12-22 | 2005-06-23 | Robert May | Customer age verification |
JP2005216225A (en) * | 2004-02-02 | 2005-08-11 | Seiko Epson Corp | Credit card processing control method, program, credit card processing device, POS terminal and POS system |
JP2005242775A (en) | 2004-02-27 | 2005-09-08 | Omron Corp | Gate system |
US20050209955A1 (en) | 2004-03-16 | 2005-09-22 | Underwood Timothy J | Apparatus and method for document processing |
CA2575738A1 (en) * | 2004-03-26 | 2006-10-20 | Assuretec Systems Inc. | Real time privilege management |
US8407097B2 (en) | 2004-04-15 | 2013-03-26 | Hand Held Products, Inc. | Proximity transaction apparatus and methods of use thereof |
US20050241003A1 (en) | 2004-04-27 | 2005-10-27 | Kevin Sweeney | Cellular telephone based electronic access control system |
US7212113B2 (en) | 2004-05-04 | 2007-05-01 | Lockheed Martin Corporation | Passenger and item tracking with system alerts |
CN101002217A (en) * | 2004-05-18 | 2007-07-18 | 西尔弗布鲁克研究有限公司 | Pharmaceutical product tracking |
US7466223B2 (en) | 2004-05-21 | 2008-12-16 | Pips Technology, Inc. | Automated site security, monitoring and access control system |
US20050273453A1 (en) | 2004-06-05 | 2005-12-08 | National Background Data, Llc | Systems, apparatus and methods for performing criminal background investigations |
US7147155B2 (en) | 2004-06-10 | 2006-12-12 | David Weekes | Global origin and departure information system |
US20060075228A1 (en) * | 2004-06-22 | 2006-04-06 | Black Alistair D | Method and apparatus for recognition and real time protection from view of sensitive terms in documents |
US7325003B2 (en) | 2004-07-02 | 2008-01-29 | Cognos Incorporated | Method and system for mapping datasources in a metadata model |
US7309012B2 (en) | 2004-09-07 | 2007-12-18 | Semtek Innovative Solutions, Inc. | Secure magnetic stripe reader for handheld computing and method of using same |
US7568108B2 (en) | 2004-09-24 | 2009-07-28 | Sielox, Llc | Access and security control system and method |
US7280030B1 (en) | 2004-09-24 | 2007-10-09 | Sielox, Llc | System and method for adjusting access control based on homeland security levels |
US7860318B2 (en) | 2004-11-09 | 2010-12-28 | Intelli-Check, Inc | System and method for comparing documents |
TWI331304B (en) | 2005-02-05 | 2010-10-01 | Compal Electronics Inc | Radio frequency identification security system and method |
US20060184575A1 (en) | 2005-02-16 | 2006-08-17 | Keith Singleton | Law enforcement data management techniques |
US7128273B2 (en) | 2005-03-24 | 2006-10-31 | International Business Machines Corporation | Secure credit card adapter |
US8181261B2 (en) * | 2005-05-13 | 2012-05-15 | Xerox Corporation | System and method for controlling reproduction of documents containing sensitive information |
US8183980B2 (en) | 2005-08-31 | 2012-05-22 | Assa Abloy Ab | Device authentication using a unidirectional protocol |
US7997476B2 (en) | 2005-09-15 | 2011-08-16 | Capital One Financial Corporation | Wireless devices for storing a financial account card and methods for storing card data in a wireless device |
US10853570B2 (en) * | 2005-10-06 | 2020-12-01 | TeraDact Solutions, Inc. | Redaction engine for electronic documents with multiple types, formats and/or categories |
WO2007045051A1 (en) | 2005-10-21 | 2007-04-26 | Honeywell Limited | An authorisation system and a method of authorisation |
US8903744B2 (en) * | 2005-11-18 | 2014-12-02 | Xerox Corporation | System and method for controlling access to personal identification information contained in documents |
US8938671B2 (en) * | 2005-12-16 | 2015-01-20 | The 41St Parameter, Inc. | Methods and apparatus for securely displaying digital images |
US7492256B2 (en) | 2005-12-29 | 2009-02-17 | International Business Machines Corporation | Tilt detecting apparatus and method |
US7716240B2 (en) | 2005-12-29 | 2010-05-11 | Nextlabs, Inc. | Techniques and system to deploy policies intelligently |
US20070226014A1 (en) | 2006-03-22 | 2007-09-27 | Bisrat Alemayehu | System and method of classifying vehicle insurance applicants |
US7739744B2 (en) | 2006-03-31 | 2010-06-15 | Novell, Inc. | Methods and systems for multifactor authentication |
EP2011055A4 (en) | 2006-04-17 | 2011-05-04 | Hypercom Corp | Dual purpose card reader |
US20070254676A1 (en) | 2006-04-28 | 2007-11-01 | Texas Instruments, Inc. | Assisting A Location-Determining System Using Location Determined From A Communication System |
US20070275735A1 (en) | 2006-05-23 | 2007-11-29 | Texas Instruments, Inc. | Map information communicated via a wireless system |
US8590034B2 (en) * | 2006-06-21 | 2013-11-19 | Basit Hussain | Method, system and apparatus for providing stateful information redaction |
US20080027949A1 (en) * | 2006-07-27 | 2008-01-31 | Jun Kawada | Scanned document management system |
US8220047B1 (en) * | 2006-08-09 | 2012-07-10 | Google Inc. | Anti-phishing system and method |
US7392944B2 (en) | 2006-08-22 | 2008-07-01 | International Business Machines Corporation | Managing content at a portable, content adjustable personal identification device |
US8332063B2 (en) | 2006-11-08 | 2012-12-11 | Honeywell International Inc. | Apparatus and method for process control using people and asset tracking information |
US8294554B2 (en) | 2006-12-18 | 2012-10-23 | Radiofy Llc | RFID location systems and methods |
US8090388B1 (en) * | 2007-03-20 | 2012-01-03 | Uniden America Corporation | Method and apparatus for determining a geographic location |
US8590783B2 (en) | 2007-03-30 | 2013-11-26 | Verizon Patent And Licensing Inc. | Security device reader and method of validation |
US7797309B2 (en) | 2007-06-07 | 2010-09-14 | Datamaxx Applied Technologies, Inc. | System and method for search parameter data entry and result access in a law enforcement multiple domain security environment |
US8322605B2 (en) | 2007-08-22 | 2012-12-04 | Intellicheck Mobilisa, Inc. | Dynamic identity matching in response to threat levels |
US20090150442A1 (en) | 2007-08-22 | 2009-06-11 | Ryan Barnard | Aggregation of persons-of-interest information for use in an identification system |
US8009013B1 (en) | 2007-09-21 | 2011-08-30 | Precision Control Systems of Chicago, Inc. | Access control system and method using user location information for controlling access to a restricted area |
US7821391B2 (en) | 2007-10-01 | 2010-10-26 | Sony Ericsson Mobile Communications Ab | RFID tracker and locator |
US20090089206A1 (en) * | 2007-10-01 | 2009-04-02 | Martin Lukac | Methods and systems for on-line loan procurement |
WO2009059116A2 (en) | 2007-10-31 | 2009-05-07 | Equifax, Inc. | Methods and systems for providing risk ratings for use in person-to-person transactions |
US20090121897A1 (en) | 2007-11-14 | 2009-05-14 | Electronic Data Systems Corporation | Apparatus, and method, for facilitating passage at a limited access facility |
US20090144619A1 (en) * | 2007-12-03 | 2009-06-04 | Steven Francis Best | Method to protect sensitive data fields stored in electronic documents |
JP5121557B2 (en) * | 2008-05-12 | 2013-01-16 | キヤノン株式会社 | Information processing apparatus, information processing method, and program |
US7880601B2 (en) | 2008-05-23 | 2011-02-01 | Okezie Pathfins C | Vehicle safety apparatus and method |
US20100033753A1 (en) * | 2008-08-06 | 2010-02-11 | Kenneth Stephenson | System and method for selective redaction of scanned documents |
US20110191117A1 (en) * | 2008-08-15 | 2011-08-04 | Mohammed Hashim-Waris | Systems and methods for delivering medical consultation at pharmacies |
US20100046015A1 (en) * | 2008-08-21 | 2010-02-25 | Craig Thompson Whittle | Methods and systems for controlled printing of documents including sensitive information |
US20100123003A1 (en) | 2008-11-20 | 2010-05-20 | Olson A Wayne | Method for verifying instant card issuance |
WO2010088199A2 (en) | 2009-01-27 | 2010-08-05 | Watchguard Technologies, Inc. | Location-aware configuration |
CA2752053C (en) | 2009-02-10 | 2017-06-27 | 4361423 Canada Inc. | Appareil et procede pour transactions commerciales utilisant un dispositif de communication |
JP5531461B2 (en) * | 2009-06-19 | 2014-06-25 | 富士ゼロックス株式会社 | Document processing apparatus, document processing program, and document flow system |
US7685629B1 (en) | 2009-08-05 | 2010-03-23 | Daon Holdings Limited | Methods and systems for authenticating users |
US8635177B2 (en) * | 2009-08-17 | 2014-01-21 | Adobe Systems Incorporated | Rule-based binding |
GB201000021D0 (en) * | 2010-01-04 | 2010-02-17 | Plastic Logic Ltd | Electronic document reading devices |
JP2011198245A (en) * | 2010-03-23 | 2011-10-06 | Canon Inc | Document management system |
RU2012152642A (en) | 2010-05-07 | 2014-06-20 | Дзе Дан Энд Брадстрит Корпорейшн | IMPROVING A DATABASE REQUEST |
GB2494080A (en) * | 2010-06-11 | 2013-02-27 | Blueprint Growth Inst Inc | Electronic document delivery, display, updating and interaction systems and methods |
US8771085B1 (en) | 2010-08-06 | 2014-07-08 | Arthur C. Clyde | Modular law enforcement baton |
US20130024239A1 (en) | 2011-07-20 | 2013-01-24 | Bank Of America Corporation | Insider threat detection |
US9864482B2 (en) * | 2012-03-13 | 2018-01-09 | Cognilore Inc. | Method of navigating through digital content |
US9069982B2 (en) * | 2012-08-16 | 2015-06-30 | Berkeley Information Technology Pty Ltd | Automated redaction of documents based on security-level determination |
US8984650B2 (en) | 2012-10-19 | 2015-03-17 | Pearson Education, Inc. | Privacy server for protecting personally identifiable information |
US20150012305A1 (en) * | 2013-07-03 | 2015-01-08 | Research In Motion Limited | Mobile device for managing e-tickets and payment transactions |
US9137232B2 (en) * | 2014-01-14 | 2015-09-15 | Xerox Corporation | Method and system for controlling access to document data using augmented reality marker |
PL3352993T3 (en) * | 2015-09-24 | 2020-07-13 | Sicpa Holding Sa | Remote passport and security document marking |
US9838468B2 (en) | 2015-10-28 | 2017-12-05 | Iberon, Llc | System and method for directing entrants at a checkpoint using a mobile device |
US10282605B2 (en) * | 2016-09-30 | 2019-05-07 | Kyocera Document Solutions Inc. | Print data semantic analyzer |
-
2014
- 2014-10-31 US US14/530,568 patent/US10373409B2/en active Active
-
2015
- 2015-10-30 WO PCT/US2015/058491 patent/WO2016070138A1/en active Application Filing
-
2019
- 2019-07-01 US US16/459,582 patent/US20190325675A1/en active Pending
Patent Citations (63)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4982072A (en) * | 1987-02-09 | 1991-01-01 | Hitachi, Ltd. | Driver license check system with IC card and method therefor |
US5668874A (en) * | 1995-02-28 | 1997-09-16 | Lucent Technologies Inc. | Identification card verification system and method |
US5748908A (en) * | 1995-06-07 | 1998-05-05 | Yu; Mason K. | Automated, classified expenditure data card recording system |
US20050131829A1 (en) * | 1996-07-15 | 2005-06-16 | Intelli-Check, Inc. | Authentication system for identification documents |
US5864623A (en) * | 1996-07-15 | 1999-01-26 | Intellicheck Inc. | Authentication system for driver licenses |
US20020143571A1 (en) * | 1996-07-15 | 2002-10-03 | Messina Kevin M. | Authentication system for identification documents |
US20080261564A1 (en) * | 2000-08-29 | 2008-10-23 | Logan James D | Communication and control system using location aware devices for audio message storage and transmission operating under rule-based control |
US20030057276A1 (en) * | 2001-09-24 | 2003-03-27 | Checkpoint Systems, Inc. | Method and system for non-contact automated verification of the correctness of the identity of an item having an associated primary identifier |
US20030115459A1 (en) * | 2001-12-17 | 2003-06-19 | Monk Bruce C. | Document and bearer verification system |
US20030183695A1 (en) * | 2001-12-18 | 2003-10-02 | Brian Labrec | Multiple image security features for identification documents and methods of making same |
US20030154138A1 (en) * | 2001-12-21 | 2003-08-14 | John Phillips | Identification verification system and method |
US7708189B1 (en) * | 2002-05-17 | 2010-05-04 | Cipriano Joseph J | Identification verification system and method |
US10147076B2 (en) * | 2002-10-01 | 2018-12-04 | Andrew H B Zhou | Digital currency (virtual payment cards) issued by central bank for mobile and wearable devices |
US7757075B2 (en) * | 2002-11-15 | 2010-07-13 | Microsoft Corporation | State reference |
US20040100363A1 (en) * | 2002-11-23 | 2004-05-27 | Kathleen Lane | Birth and other legal documents having an RFID device and method of use for certification and authentication |
US20050109850A1 (en) * | 2002-12-18 | 2005-05-26 | Jones Robert L. | Identification document with three dimensional image of bearer |
US20040250142A1 (en) * | 2003-03-28 | 2004-12-09 | Feyler David M. | UV2D reader, age verification and license validation system |
US20050067496A1 (en) * | 2003-09-30 | 2005-03-31 | Jonathan Yen | Extracting graphical bar codes from template-based documents |
US7118027B2 (en) * | 2004-02-04 | 2006-10-10 | Lester Sussman | Method and system to issue an electronic visa of a foreign visitor at a country's foreign consular premises |
US20060157559A1 (en) * | 2004-07-07 | 2006-07-20 | Levy Kenneth L | Systems and methods for document verification |
US20060010027A1 (en) * | 2004-07-09 | 2006-01-12 | Redman Paul J | Method, system and program product for measuring customer preferences and needs with traffic pattern analysis |
US20060047731A1 (en) * | 2004-09-01 | 2006-03-02 | Yoshiro Matsui | Document-management device, document-management program, recording medium, and document-management method |
US20060131395A1 (en) * | 2004-09-09 | 2006-06-22 | Cash Systems, Inc. | System and method for checkless cash advance settlement |
US20060151607A1 (en) * | 2004-11-05 | 2006-07-13 | Kazunori Horikiri | Document scan system, document transfer system, document transfer method, and storage medium readable by a computer |
US20060209351A1 (en) * | 2005-03-18 | 2006-09-21 | Canon Kabushiki Kaisha | Document management apparatus, control method therefor, computer program, and storage medium |
US20060231610A1 (en) * | 2005-04-15 | 2006-10-19 | Beacon Communication Kk | Handheld system and method for age verification |
US20060235746A1 (en) * | 2005-04-18 | 2006-10-19 | Hammond Mark S | Systems and methods for providing a reward at a point of return |
US20060259420A1 (en) * | 2005-05-11 | 2006-11-16 | Schaffer Bret C | System and Method for Regulatory Compliance Assessment of Settlement Statement Data |
US20070183000A1 (en) * | 2005-12-16 | 2007-08-09 | Ori Eisen | Methods and apparatus for securely displaying digital images |
US20070138260A1 (en) * | 2005-12-21 | 2007-06-21 | Ncr Corporation | Methods and apparatus for automated document examination for age verification |
US20090167492A1 (en) * | 2006-03-01 | 2009-07-02 | Entrydata Pty Ltd | Identity verification and access control |
US20090164474A1 (en) * | 2006-06-08 | 2009-06-25 | Softmedical, Inc. | Methods and systems for consolidating medical information |
US20080059803A1 (en) * | 2006-09-06 | 2008-03-06 | Zeon Corporation | Method for the authentication of printed document |
US7802305B1 (en) * | 2006-10-10 | 2010-09-21 | Adobe Systems Inc. | Methods and apparatus for automated redaction of content in a document |
US20080098292A1 (en) * | 2006-10-20 | 2008-04-24 | Intelli-Check, Inc. | Automatic document reader and form population system and method |
US20080239365A1 (en) * | 2007-03-26 | 2008-10-02 | Xerox Corporation | Masking of text in document reproduction |
US20080238670A1 (en) * | 2007-03-30 | 2008-10-02 | Verizon Business Network Services, Inc. | Security device with display |
US20110001604A1 (en) * | 2007-11-05 | 2011-01-06 | Nelson Ludlow | Automatic incident reporting in an access control system |
US20100070396A1 (en) * | 2007-12-21 | 2010-03-18 | Celcorp, Inc. | Virtual redaction service |
US20090296166A1 (en) * | 2008-05-16 | 2009-12-03 | Schrichte Christopher K | Point of scan/copy redaction |
US9326267B1 (en) * | 2008-07-02 | 2016-04-26 | Iwao Fujisaki | Communication device |
US20100051679A1 (en) * | 2008-08-26 | 2010-03-04 | Vancouver International Airport Authority | Method and system for inspection of travelers |
US20110145147A1 (en) * | 2009-12-14 | 2011-06-16 | Wylie Michael S | System and method for authorizing transactions |
US8781512B1 (en) * | 2011-10-22 | 2014-07-15 | Proximetry, Inc. | Systems and methods for managing wireless links |
US20140259838A1 (en) * | 2013-03-13 | 2014-09-18 | Bank Of America Corporation | Card with edge indicators |
US20150088778A1 (en) * | 2013-09-24 | 2015-03-26 | Adam Y. Tsao | System and method for verifying a travelers authorization to enter into a jurisdiction using a software application installed on a personal electronic device |
US10320807B2 (en) * | 2014-02-25 | 2019-06-11 | Sal Khan | Systems and methods relating to the authenticity and verification of photographic identity documents |
US20150341370A1 (en) * | 2014-02-25 | 2015-11-26 | Sal Khan | Systems and methods relating to the authenticity and verification of photographic identity documents |
US20160104167A1 (en) * | 2014-10-09 | 2016-04-14 | C T Corporation System | Device and method for populating a legal filing with an individual's name from a government-issued identification document |
US20160104041A1 (en) * | 2014-10-13 | 2016-04-14 | Klink Technologies, Inc. | Method and system for identity and age verification |
US10373409B2 (en) * | 2014-10-31 | 2019-08-06 | Intellicheck, Inc. | Identification scan in compliance with jurisdictional or other rules |
US20160125680A1 (en) * | 2014-10-31 | 2016-05-05 | Intellicheck Mobilisa, Inc. | Identification scan in compliance with jurisdictional or other rules |
US20160179776A1 (en) * | 2014-12-17 | 2016-06-23 | Heartland Payment Systems, Inc. | E-signature |
US10157339B2 (en) * | 2015-03-03 | 2018-12-18 | WonderHealth, LLC | Access control for encrypted data in machine-readable identifiers |
US10380379B2 (en) * | 2015-03-03 | 2019-08-13 | WonderHealth, LLC | Selectively encrypting and displaying machine-readable identifiers in a device lock screen |
US10387577B2 (en) * | 2015-03-03 | 2019-08-20 | WonderHealth, LLC | Secure data translation using machine-readable identifiers |
US10440014B1 (en) * | 2016-09-30 | 2019-10-08 | Assa Abloy Ab | Portable secure access module |
US20180166160A1 (en) * | 2016-10-24 | 2018-06-14 | James F. Walton, III | System and method for providing access to electronically stored medical information |
US10366564B1 (en) * | 2018-03-07 | 2019-07-30 | Tapcentive, Inc. | Personal gaming terminal used in possession of player |
US11018939B1 (en) * | 2018-12-10 | 2021-05-25 | Amazon Technologies, Inc. | Determining product compatibility and demand |
US20200193252A1 (en) * | 2018-12-13 | 2020-06-18 | EVERYTHING Ltd | Dynamic Product Tag Based on an Environmental Condition |
US20200357497A1 (en) * | 2019-05-09 | 2020-11-12 | Deirdre Kamber Todd | Secure systems, devices and methods for storing and accessing personal identification, medical, and veterinary information |
US20210049334A1 (en) * | 2019-08-14 | 2021-02-18 | Avery Dennison Retail Information Services, Llc | Method of Optimizing Read Technology for High Density Items |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20230385831A1 (en) * | 2022-05-24 | 2023-11-30 | Ncr Corporation | Customer identification verification |
Also Published As
Publication number | Publication date |
---|---|
US20160125680A1 (en) | 2016-05-05 |
US10373409B2 (en) | 2019-08-06 |
WO2016070138A1 (en) | 2016-05-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20190325675A1 (en) | Identification scan in compliance with jurisdictional or other rules | |
US12045891B2 (en) | Method for using electronic metadata to verify insurance claims | |
Bloom et al. | Self-driving cars and data collection: Privacy perceptions of networked autonomous vehicles | |
US11217086B2 (en) | Remote identification of person using combined voice print and facial image recognition | |
US11830097B2 (en) | Systems, apparatus, and methods for integrating and streamlining the process of issuing citations while simultaneously enhancing security of law enforcement officers (LEOs) | |
GB2517949A (en) | Ticket authorisation | |
US12099776B2 (en) | Visual verification of virtual credentials and licenses | |
US20160104167A1 (en) | Device and method for populating a legal filing with an individual's name from a government-issued identification document | |
US20210233341A1 (en) | Digital identification validation system | |
US20180182051A1 (en) | System and method for tracking sexual assault kit evidence | |
CN114882448A (en) | Vehicle monitoring method and electronic equipment | |
US11676235B1 (en) | Computer-based system for facilitating the execution of law enforcement duties | |
US20180182050A1 (en) | System and method for tracking sexual assault kit evidence | |
US20220130230A1 (en) | Systems and methods for identification of a person using live audio and/or video interactions including local identification and remote identification of the person | |
Ogochukwu | Identification management in Nigeria: innovations for financial inclusion | |
US20060178940A1 (en) | Open house information system | |
Lynch et al. | Facial recognition technology: considerations for use in policing | |
Zmud et al. | License plate reader technology: Transportation uses and privacy risks | |
McKinley | New terrains of privacy in South Africa | |
US20180150800A1 (en) | Background check processing system | |
Beckley | Intelligence: A risk too far, or" dignity and justice for all of us"? | |
Cottrill | Intelligent mobility and big data for planning, trust, and privacy | |
Zang et al. | Building A Collocation Detection System Using A Wi-Fi Sensor Array for COVID-19 Contact Tracing in A University Setting | |
Davis | Letter from the director | |
Seow et al. | Automated Traffic Congestion Charging Systems: Privacy considerations for New Zealand |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INTELLICHECK, INC., NEW YORK Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:WHITE, BILLY JOE;EMBRY, RUSSELL T.;SIGNING DATES FROM 20150109 TO 20150112;REEL/FRAME:049647/0910 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STCT | Information on status: administrative procedure adjustment |
Free format text: PROSECUTION SUSPENDED |