WO2008031167A1 - A system and method for the identification of a person - Google Patents
A system and method for the identification of a person Download PDFInfo
- Publication number
- WO2008031167A1 WO2008031167A1 PCT/AU2007/001367 AU2007001367W WO2008031167A1 WO 2008031167 A1 WO2008031167 A1 WO 2008031167A1 AU 2007001367 W AU2007001367 W AU 2007001367W WO 2008031167 A1 WO2008031167 A1 WO 2008031167A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- database
- accordance
- person
- guest
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 30
- 238000004590 computer program Methods 0.000 claims description 4
- 230000001419 dependent effect Effects 0.000 claims description 2
- 230000004308 accommodation Effects 0.000 description 8
- 230000009471 action Effects 0.000 description 4
- 238000004891 communication Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000007423 decrease Effects 0.000 description 2
- 241001122315 Polites Species 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 235000014510 cooky Nutrition 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000001066 destructive effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012015 optical character recognition Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/901—Indexing; Data structures therefor; Storage structures
Definitions
- the present invention relates to a system and method for the identification of persons.
- the system and method find particular, but not exclusive, use in industries where goods and/or services are hired, such as hotel/motel accommodation, air travel and vehicle hire, where it is useful to keep a record of behaviour.
- the present invention provides a method of identifying a person by utilising a database containing a plurality of information records, each record containing personal information relating to a person, comprising the steps of, the database receiving information capable of identifying a person, determining whether the information provided may be at least partly matched to at least one of the information records, and if so, returning the matching information.
- the each information provided may comprise a plurality of discrete pieces of information.
- the method may comprise the further step of comparing the number of pieces of information provided that match with corresponding pieces of information contained in any one of the records, and where the number of matches reaches a predetermined value, a match condition is generated.
- Each discrete piece of information may be ascribed a value .
- the value ascribed to each piece of information may be dependent on the capacity of the piece of information to uniquely identify a person.
- the step of comparing the number of disparate pieces of information may generate a match condition if the value ascribed to each matching piece of information totals a predetermined amount.
- the pieces of information may include first name, last name, address, telephone number, email address, credit card details, driver's licence number, vehicle registration number, and club or organisation membership number .
- the method may comprise the further step of generating a new record in the database to contain the information provided.
- the present invention provides a system for the identification of a person, comprising a database arranged to contain personal information pertaining to each of a plurality of persons, an enquiry module arranged to receive personal information pertaining to a person, and a weighting module arranged to ascribe a weighting to the personal information and return a value indicative of the suitability of the personal information in uniquely identifying the person.
- the system may further include a matching module, arranged to utilise the weighting to determine whether any of the personal information in the database matches the personal information pertaining to a person, and if so, providing the matching personal information in the database to a user.
- a matching module arranged to utilise the weighting to determine whether any of the personal information in the database matches the personal information pertaining to a person, and if so, providing the matching personal information in the database to a user.
- the present invention provides a computer program arranged, when loaded onto a computing system, to perform the method steps in accordance with the first aspect of the invention.
- the present invention provides a computer readable medium incorporating a computer program in accordance with a third aspect of the invention.
- Figure 1 is a diagram illustrating a computing system capable of operating an embodiment of the present invention
- Figure 2 to 6 are screenshots depicting various input screens of an embodiment of the present invention.
- Figure 7 is a diagram illustrating a system in accordance with an embodiment of the present invention.
- FIG. 1 there is shown a schematic diagram of a computing system 100 suitable for use with an embodiment of the present invention.
- the computing system 100 may be used to execute applications and/or system services such as a rental property management system in accordance with an embodiment of the present invention.
- the computing system 100 preferably comprises a processor 102, read-only memory (ROM) 104, random access memory (RAM) 106, and input/output devices such as disk drives 108, keyboard 110, mouse 112, display 114, printer 116, and communications link 118.
- the computer includes programs that may be stored in RAM 106, ROM 104, or disk drives 108 and may be executed by the processor 102.
- the Communications link 118 connects to a computer network such as the Internet but may be connected to a telephone line, an antenna, a gateway or any other type of
- Disk drives 108 may include any suitable storage media, such as, for example, floppy disk drives, hard disk drives, CD ROM drives or magnetic tape drives.
- the computing system 100 may use a single disk drive 108 or multiple disk drives.
- the computing system 100 may use any suitable operating systems, such as WindowsTM or UnixTM.
- the present invention is implemented as a software application 120 which interacts with a database 122, arranged to be executable on the computing system 100.
- a specific embodiment of the present invention provides a system and method for identifying individuals who engage or have engaged in undesirable acts.
- Databases which are utilised to contain information regarding alleged or actual misbehaviour are known. For example, all police and law enforcement agencies in many countries and jurisdictions maintain databases which list potential offenders and their alleged or proven offences. Access to offender databases is strictly controlled and the information in offender databases is not available to the public at large.
- offender databases are generally arranged to hold enough information to uniquely identify an offender.
- the database will hold personal details unique to the offender, such as their driver's licence, their passport number, their social security number, an image of their fingerprints or another reliable biometric identifier, or a DNA sample.
- a hotel or accommodation provider may request certain information from a guest. This may include their name, their address, their telephone number, their email address, their credit card details, and in some cases, their driver's licence.
- a hotel guest is not always obliged, by law, to provide all the information listed above. For example, in some countries, it may be perfectly legal for a guest to pay by cash, thereby negating the need to ask for a credit card.
- a hotel guest may not have a driver's licence, or may refuse to disclose their licence details, for privacy reasons. Therefore, an accommodation provider that wishes to identify a potential troublemaker may not normally have enough information at their disposal to make a reliable identification. Attempting to match on name or address alone may be problematic.
- the embodiment described herein provides a matching system which allows a provider to determine whether a guest may be a troublemaker by determining the identifying "value" of information provided by the guest.
- the embodiment described herein is a software application which incorporates a login screen, and allows an accommodation provider to securely log into the system.
- the provider uploads all collected information regarding a guest into the system.
- the provider is checking to determine whether a guest has a pre-existing record in the database.
- the system does not allow a provider to randomly view a list of guests who have pre-existing records in the database. Rather, the provider must enter a guest's details into the system and will only be informed of a guest's record if the entered guest details match a pre-existing record in the database. This provides a level of privacy, as the provider is prevented from accidentally viewing records which are not relevant to the guest being entered.
- a data input screen 200 which includes a series of text boxes 202 arranged to receive information regarding a guest.
- Each discrete component of information is provided in a separate text box, to preferably allow the information to be standardised (or normalised) , which in turn decrease the probability of an erroneous match.
- extra spaces, carriage returns and other non-alphanumeric characters inserted into a text box may be automatically discarded before any checking is undertaken, to prevent a non-match due to the accidental inclusion of extraneous characters .
- the discrete components of information may include the guest's first name, last name, address, telephone numbers, email addresses, driver's licence, credit card numbers, vehicle registration or any other information that a guest may customarily provide (e.g. a club membership number, such as a frequent flyer's club number) .
- the details may also be uploaded in other ways.
- the provider may scan a guest's driver's licence, and information may be extracted from the scanned image of the driver's licence by use of appropriate optical character recognition technology.
- the extracted information may then be saved in a file, in an appropriate format (for example, in a comma delimited format, or in a mark-up language format, such as XML) .
- the file may be uploaded using the file upload feature 204 provided by the software application.
- such a process may occur automatically (i.e. the proprietary booking system utilised by the provider may be arranged to automatically send a file, by FTP (File Transfer Protocol) , to the software application.
- FTP File Transfer Protocol
- any suitable method of inputting information may be utilised. Such variations and modifications are within the purview of a person skilled in the art.
- the software application performs an analysis of the provided information.
- the matching criteria utilised to determine a match is explained in more detail in the section entitled "Matching Criteria" . If a match is found, the matching record is displayed, in a summary format 300, as shown in Figure 3.
- the summary format 300 includes the guest's name, the number of alleged acts of undesirable behaviour committed by the guest 304 and the relative severity of the worst act 306, on a rating scale of 1-5, where 5 indicates the worst act (e.g. a criminal act, such as criminal damage, theft or assault) .
- the summary format may provide enough information for the provider to make a decision. However, if the provider requires more information, they may select a more detailed report, by clicking the check box 308, and selecting the "view report" button 310.
- a sample report 400 is shown in Figure 4.
- the sample report includes more detail on the alleged act, including dates, a description of the alleged act, the involvement of third parties (including law enforcement agencies) , and also a full record of all details provided by the guest when the alleged act took place.
- the report may also be printed or emailed to the provider, should the provider require a hard copy.
- the provider can then make a rational decision about whether to proceed with the booking, or alternatively, refuse entry or service to the guest.
- the procedure for lodging a complaint in the software application is analogous to the procedure for checking a guest .
- a screen for lodging a complaint in the software system There is shown a data input screen 500 which includes a series of text boxes 502 arranged to receive information regarding a guest .
- Each discrete component of information is provided in a separate text box, to preferably allow the information to be standardised (or normalised) , which in turn decreases the probability of an erroneous match.
- the discrete components of information may include the guest's first name, last name, address, telephone numbers, email addresses, driver's licence, credit card numbers, vehicle registration or any other information that a guest may customarily provide (e.g. a club membership number, such as a frequent flyer's club number) .
- the details may be uploaded in other ways, as described earlier with regard to the checking of a guest. Any suitable method of inputting information may be utilised. Such variations and modifications are within the purview of a person skilled in the art. Once the details are uploaded, the software application takes the provider to a screen 600 shown in Figure 6.
- the screen 600 allows the provider to input specific details regarding the alleged act, including the type of act performed (damage, theft, assault, etc.), an estimate cost for any damage suffered, a short description of the alleged act, which may be used to place the event in an appropriate context, whether the guest themselves was put on notice as to their alleged misbehaviour, and whether third parties, such as law enforcement agencies, were called to the incident.
- the type of act performed damage, theft, assault, etc.
- estimate cost for any damage suffered a short description of the alleged act, which may be used to place the event in an appropriate context, whether the guest themselves was put on notice as to their alleged misbehaviour, and whether third parties, such as law enforcement agencies, were called to the incident.
- the provider can click the "Add Complaint” button 604 to submit the complaint to the database.
- the database will then perform a match to determine whether the guest named in the complaint has a pre-existing record in the database. If the database finds a guest record that matches, the complaint details will be added to the existing guest's record. If no match is found, a new guest record is created.
- the matching criteria are detailed below in more detail .
- weighting is used to determine whether a relevant pre-existing record exists in the database. However, whether that record is returned (in the case of a check) or whether the record is associated with a pre-existing guest record (in the case of a recording a complaint) depends on the total weight of the information inputted by the provider. Each discrete component of information provided is ascribed a weighting which depends on the information' s "uniqueness" (i.e. how reliable the information is in uniquely identifying a guest) . The weighting is as follows :
- the address details of a guest are given a relatively low weighting, as many guests could share the same address. Also, guests may change their address on a semi-regular basis.
- Phone numbers and in particular mobile phone numbers on the other hand, tend to be more unique and less likely to be 'recycled' , so they are ascribed a higher weighting.
- Email addresses are usually unique to a person and they are rarely passed between individuals. However, email addresses may not be trustworthy, as a guest may easily create new email address, or a family may share an email address.
- Vehicle registration numbers are reasonably trustworthy, as a vehicle owner tends to keep the same vehicle for a number of years. Moreover, vehicle registration numbers are rarely recycled (except for custom plates, which may be sold to another vehicle owner) . Therefore, vehicle registration numbers are also ascribed to higher weighting.
- a complaint can be associated with a pre-existing guest if the first name, last name and at least two other criteria match. This means a complaint can be associated with a guest because they have the same name and live in the same state as the guest named in the pre-existing database record (as state and country would match) . This may not be appropriate in all circumstances, particularly where the guest's first name and last name are common.
- the aforementioned weighting system is used in conjunction with a threshold value, to determine whether the match is of a reasonable standard.
- a threshold value of 47 exists for associating a complaints record with a pre-existing guest record and a value of 16 exists for checking a guest against all pre-existing records in the database.
- the threshold value required for associating a complaint with an existing guest record is higher than the value required to return a positive result .
- the threshold value required for associating a complaint with an existing guest record is higher than the value required to return a positive result .
- the threshold value for matching the complaint to a pre-existing record is 47. Therefore, for a new complaint to be matched (and added to) an existing record in the database, at least one of the following sets of information would need to match:
- one provider may have uploaded information consisting of a first name, a last name and only two other criteria (e.g. an address and a suburb) . At the time of the upload, no matching guest was found, so a new record was created.
- a second complaint was recorded by another provider, the complaint including a guest with the same first and last name.
- the provider did not include an address and a suburb, but rather, an email address and a driver's licence.
- the second complaint does not contain any overlapping information which can be matched against the first complaint. That is, one complaint has an email address and a driver' s licence as identifying information, and the other complaint has an address and a suburb as identifying information. In this example, there is no way of verifying that the two complaints are related, so a new record is created in the database for the second complaint.
- a third complaint is recorded with the same first name and last name as the two complaints above, and also with four discrete pieces of information that overlap with the previous two entries . That is, the third complaint has the same address and suburb as the first complaint, and the same email address and driver's licence as the second complaint. In this case, the third complaint is capable of matching either of the previous compalints.
- the database will resolve this situation by attempting to match the new complaint to all existing complaints which share an identical first name and last name .
- the information in the third complaint when compared to the first complaint, has a threshold value of under 47, so the information is not associated with the first complaint.
- the information in the third complaint when compared to the second complaint, has a threshold value of over 47, so the information is associated with the second complaint .
- the system would match all three complaints and merge the three complaints into one record. In this way, records that originally exist as separate entities in the database may later be matched.
- the weighting system reduces the possibility of erroneous matching, while simultaneously increasing the chance of matching disparate entries in the database, even where a guest is providing different types of information.
- a "web” i.e. a HTML/XML interface viewable via a web browser
- SOA Service Oriented Architecture
- SOA is a design paradigm based on a loosely coupled collection of reusable services. That is, a provider may "link" or
- the results of the check are returned as a data structure that can be used within the software that initiated the request .
- This is achieved by providing a SOAP (Simple Object Access Protocol) web service, which allows any software application to access and exchange XML based messages over a computer network, in this case via HTTP.
- SOAP Simple Object Access Protocol
- Figure 7 describes an example implementation including the relationship between the entities in the SOA.
- the provider has a software application (such as a hotel management software package) 600.
- a proxy object 702 (which is akin to a parser or filter) , which receives requests from the software application 700 and converts the requests into a language that may be understood by the guest checking service 704. This is achieved through use of the SOAP library 706.
- the request is sent via a network, such as the Internet 708, to the guest checking service 704. Connection to the guest checking service 704 is established and data transferred through communication between the SOAP library 706 and a corresponding SOAP interface 710 which is connected to the guest checking service 704.
- the service is provided over the secure socket layer to protect data whilst in transit.
- the system may be arranged such that a provider may only need to authenticate once per session (in embodiments where session support is provided through cookies or other means) .
- authentication details need to be sent for each call on the service.
- the provider passes a list of guests as input to the guest checking method. This is achieved through an array of strongly typed objects where each object represents a guest, much like rows in a table.
- a provider wishing to call the guest checking method on the service creates a guest object array and sets the properties such as name and address for each guest it contains.
- the results from the guest checking method are returned as two related tables, represented in a structure similar to the input data.
- the first table will provide an overview of each guest's behaviour, for which a match was found.
- the second will provide more detailed information on each incident related to a matched guest.
- Two related tables are used rather than one to avoid data redundancy and thus increase the performance of the service .
- the system is easy to operate and allows the user to upload information in an intuitive manner.
- the software application provides the user with a reasonable basis on which to determine whether a guest will be a potential troublemaker. If the match is poor (i.e. there is low certainty regarding the likelihood of a correct match), the provider will not see any matching records. This reduces the chance that a guest will be erroneously identified as a troublemaker.
- the provider will see the record and can be reasonably sure that the match is correct, which will allow the provider to confidently make a decision as to whether to take action.
- the system reduces the likelihood of failing to match data on the basis of poor data input.
- the database reduces the risk of misidentifying and erroneously collating the actions of two or more different guests.
- the embodiment described herein may be easily adapted to be used in a generic setting, such as in a retail store, a club, or any other venue where it is common to request identification before allowing entry to a guest or customer.
- a generic setting such as in a retail store, a club, or any other venue where it is common to request identification before allowing entry to a guest or customer.
Landscapes
- Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Data Mining & Analysis (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2007295958A AU2007295958A1 (en) | 2006-09-14 | 2007-09-14 | A system and method for the identification of a person |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2006905076A AU2006905076A0 (en) | 2006-09-14 | A system and method for the identification of a person | |
AU2006905076 | 2006-09-14 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2008031167A1 true WO2008031167A1 (en) | 2008-03-20 |
Family
ID=39183279
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/AU2007/001367 WO2008031167A1 (en) | 2006-09-14 | 2007-09-14 | A system and method for the identification of a person |
Country Status (2)
Country | Link |
---|---|
AU (1) | AU2007295958A1 (en) |
WO (1) | WO2008031167A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130110855A1 (en) * | 2011-07-27 | 2013-05-02 | La Poste | Method of matching data and use in the verification of identity of a recipient of a mail |
US9094211B2 (en) | 2011-08-26 | 2015-07-28 | Life Technologies Corporation | Systems and methods for identifying an individual |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5946681A (en) * | 1997-11-28 | 1999-08-31 | International Business Machines Corporation | Method of determining the unique ID of an object through analysis of attributes related to the object |
US6026398A (en) * | 1997-10-16 | 2000-02-15 | Imarket, Incorporated | System and methods for searching and matching databases |
US6073130A (en) * | 1997-09-23 | 2000-06-06 | At&T Corp. | Method for improving the results of a search in a structured database |
US6182065B1 (en) * | 1996-11-06 | 2001-01-30 | International Business Machines Corp. | Method and system for weighting the search results of a database search engine |
-
2007
- 2007-09-14 WO PCT/AU2007/001367 patent/WO2008031167A1/en active Application Filing
- 2007-09-14 AU AU2007295958A patent/AU2007295958A1/en not_active Abandoned
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6182065B1 (en) * | 1996-11-06 | 2001-01-30 | International Business Machines Corp. | Method and system for weighting the search results of a database search engine |
US6073130A (en) * | 1997-09-23 | 2000-06-06 | At&T Corp. | Method for improving the results of a search in a structured database |
US6026398A (en) * | 1997-10-16 | 2000-02-15 | Imarket, Incorporated | System and methods for searching and matching databases |
US5946681A (en) * | 1997-11-28 | 1999-08-31 | International Business Machines Corporation | Method of determining the unique ID of an object through analysis of attributes related to the object |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130110855A1 (en) * | 2011-07-27 | 2013-05-02 | La Poste | Method of matching data and use in the verification of identity of a recipient of a mail |
US9081811B2 (en) * | 2011-07-27 | 2015-07-14 | La Poste | Method of matching data and use in the verification of identity of a recipient of a mail |
US9094211B2 (en) | 2011-08-26 | 2015-07-28 | Life Technologies Corporation | Systems and methods for identifying an individual |
US9520999B2 (en) | 2011-08-26 | 2016-12-13 | Life Technologies Corporation | Systems and methods for identifying an individual |
US10733277B2 (en) | 2011-08-26 | 2020-08-04 | Life Technologies Corporation | Systems and methods for identifying an individual |
US11636190B2 (en) | 2011-08-26 | 2023-04-25 | Life Technologies Corporation | Systems and methods for identifying an individual |
Also Published As
Publication number | Publication date |
---|---|
AU2007295958A1 (en) | 2008-03-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10417401B2 (en) | Dynamic digital consent | |
US7779457B2 (en) | Identity verification system | |
US20060288090A1 (en) | Privacy Information Reporting Systems with Refined Content Model | |
US20050209892A1 (en) | [Automated system and method for providing accurate, non-invasive insurance status verification] | |
US20070266439A1 (en) | Privacy management and transaction system | |
US20080109875A1 (en) | Identity information services, methods, devices, and systems background | |
US11263699B1 (en) | Systems and methods for leveraging remotely captured images | |
US20100005509A1 (en) | System, method and apparatus for electronically protecting data and digital content | |
US20120089835A1 (en) | System and Method for Automatic Authentication of an Item | |
CN101438297A (en) | Identity verification and access control | |
Gierlack | License plate readers for law enforcement: Opportunities and obstacles | |
US11983786B1 (en) | Computer-based system for facilitating the execution of law enforcement duties | |
Sprague et al. | Preserving identities: protecting personal identifying information through enhanced privacy policies and laws | |
Shaikh et al. | Characteristic trade-offs in designing large-scale biometric-based identity management systems | |
US20090060285A1 (en) | Rating individuals on a voluntary basis using legal non-discriminatory criteria | |
US20070025600A1 (en) | Printer with fingerprint identification function | |
WO2008031167A1 (en) | A system and method for the identification of a person | |
US20090150267A1 (en) | System and method for monitoring the status of items subject to liens | |
Ghosh et al. | How Far Data Mining Is Legal! | |
JP4718131B2 (en) | Personal information management system | |
US9842441B1 (en) | System and method for determining entry into a secured facility at a checkpoint | |
US12299759B1 (en) | Computer-based system for facilitating the execution of law enforcement duties | |
Hatuaon et al. | Juridical Review of the Criminal Act of Car Theft by Rental Car Mode According to the Criminal Law (KUHP) | |
Cockfield | The state of privacy laws and privacy-encroaching technologies after September 11: a two-year report card on the Canadian Government | |
Peterson et al. | Finding a Broadly Practical Approach fo r Regulating the Use of Facial Recognition by Law Enforcement |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07800321 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007295958 Country of ref document: AU |
|
ENP | Entry into the national phase |
Ref document number: 2007295958 Country of ref document: AU Date of ref document: 20070914 Kind code of ref document: A |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 07800321 Country of ref document: EP Kind code of ref document: A1 |