US20180150839A1 - Identity verification systems and methods - Google Patents
Identity verification systems and methods Download PDFInfo
- Publication number
- US20180150839A1 US20180150839A1 US15/365,559 US201615365559A US2018150839A1 US 20180150839 A1 US20180150839 A1 US 20180150839A1 US 201615365559 A US201615365559 A US 201615365559A US 2018150839 A1 US2018150839 A1 US 2018150839A1
- Authority
- US
- United States
- Prior art keywords
- handwriting
- individual
- stored
- input
- determining
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/951—Indexing; Web crawling techniques
-
- G06F17/30864—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
- G06F3/0488—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
- G06F3/04883—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
- G06Q20/108—Remote banking, e.g. home banking
- G06Q20/1085—Remote banking, e.g. home banking involving automatic teller machines [ATMs]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/042—Payment circuits characterized in that the payment protocol involves at least one cheque
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/30—Writer recognition; Reading and verifying signatures
- G06V40/33—Writer recognition; Reading and verifying signatures based only on signature image, e.g. static signature recognition
Definitions
- Consumer and user authentication methods are varied and typically involve a consumer knowing something (e.g., Personal Identification Number “PIN” or password), having something (smart card), or something they “are” (e.g., a fingerprint). While these solutions work well, or at least sufficiently, new methods are needed to provide new and different authentication options when other solutions have been compromised, for use as a secondary authentication mechanism, to reset other authentication credentials, and the like.
- something e.g., Personal Identification Number “PIN” or password
- smart card e.g., a smart card
- something they “are” e.g., a fingerprint
- Various embodiments herein each include at least one of systems, methods, and software for identity verification. Some such embodiments identify a consumer or user based on analysis of their handwriting on checks, other documents, or as input on a signature pad or other handwriting input device. Some such embodiments may be utilized to authenticate an individual, for emergency authentication or when other authentication solutions are not available, as one of a two or more step authentication process, authenticating checks, authenticating a signature or other handwriting on another document, and the like.
- One embodiment in the form of a method, includes storing a set of handwriting characteristics of an individual identified during processing of a plurality of handwriting samples of the individual. The method may then determine whether an input handwriting sample is handwriting of the individual based on the stored set of handwriting characteristics of the individual and then output a result of the determining.
- Another method embodiment includes identifying an individual from whom a handwriting sample was received as input based on stored sets of handwriting characteristics of a plurality of individuals and outputting data identifying the individual from whom the handwriting sample was received when the individual is identified, otherwise outputting data indicating no identification was made.
- a further embodiment in the form of a system, includes a processor, a memory device, a network interface device, and instructions stored on the at least one memory device that are executable by the processor to perform data processing activities.
- the data processing activities include storing, on the memory device, a set of handwriting characteristics of an individual identified during processing of a plurality of handwriting samples of the individual.
- the data processing activities may further include determining whether an input handwriting sample received via the network interface device is handwriting of the individual based on the stored set of handwriting characteristics of the individual. Subsequently, the data processing activities include outputting a result of the determining via the network interface device.
- FIG. 1 is a logical block diagram of a system architecture, according to an example embodiment.
- FIG. 2 is a block diagram of a computing device, according to an example embodiment.
- FIG. 3 is a block flow diagram of a method, according to an example embodiment.
- FIG. 4 is a block flow diagram of a method, according to an example embodiment.
- Various embodiments herein each include at least one of systems, methods, and software for identity verification. Some such embodiments identify a consumer or user based on analysis of their handwriting on checks, other documents, or as input on a signature pad or other handwriting input device. Some such embodiments may be utilized to authenticate an individual, for emergency authentication or when other authentication solutions are not available, as one of a two or more step authentication process, authenticating checks, authenticating a signature or other handwriting on another document, and the like.
- Some embodiments herein provide a solution, that may be provided as an Application Programming Interface (API), one or a set of web services, and the like.
- API Application Programming Interface
- Some such solutions may leverage a check processor's check image archive which may not be viewed as a strategic asset in a financial institution or an archive of other documents including handwriting associated with known individuals.
- Such embodiments are able to identify and store data representations of unique characteristics of an individual's handwriting from such archived handwriting samples, newly received handwriting samples, and handwriting received as learning input for proposes authentication of the identity of the individual based on handwriting, such as a signature, received at a later time.
- Such embodiments provide a new authentication solution that the individual does not need to know or have, rather it is something that just is. Such embodiments may enable authentication of the individual in emergency situations when other identification items or solutions are not available or fail, for secondary authentication, to verify the authenticity of a handwritten check or check signature, such as when a check amount is over a certain value, and the like.
- the functions or algorithms described herein are implemented in hardware, software or a combination of software and hardware in one embodiment.
- the software comprises computer executable instructions stored on computer readable media such as memory or other type of storage devices. Further, described functions may correspond to modules, which may be software, hardware, firmware, or any combination thereof. Multiple functions are performed in one or more modules as desired, and the embodiments described are merely examples.
- the software is executed on a digital signal processor, ASIC, microprocessor, or other type of processor operating on a system, such as a personal computer, server, a router, or other device capable of processing data including network interconnection devices.
- Some embodiments implement the functions in two or more specific interconnected hardware modules or devices with related control and data signals communicated between and through the modules, or as portions of an application-specific integrated circuit.
- the exemplary process flow is applicable to software, firmware, and hardware implementations.
- FIG. 1 is a logical block diagram of a system 100 architecture, according to an example embodiment.
- the system 100 is an example of a system on which some embodiments may be implemented.
- the database 112 may store an archive of documents, such as processed checks, signed documents, handwritten documents, and the like, or portions thereof, in electronic image form.
- One or more processes that execute on one or more servers 110 may execute against archived documents stored in the database 112 to identify characteristics of individuals handwriting across a plurality of documents associated in stored data with individuals' respective identities. Characteristics of handwriting that are identified and extracted from handwriting samples may include characteristics such as what is referred to as skill level, or neatness in terms of fluid, rhythmic, and artistic embellishment.
- Other characteristics may include slant or inclination of characters, character forms, movement of a writing utensil when forming characters or portions thereof, proportions of character portions compared to the whole character or other portions, height rations of characters with relation to one or more other characters, loop shape and form, pressure as is evident from line width, writing utensil lifting when forming certain characters, exit and entry strokes for characters, retracing, character and word spacing, case of letters, and other characteristics.
- These characteristics as may be extracted with regard to a particular individual are generally unique to the individual. The degree of the uniqueness may be lesser or greater depending upon the number of characteristics taken into account and in combination. The degree of uniqueness may be complete or a bit lower.
- the degree of a particular embodiment may be set based on a configuration setting of the software that extracts the characteristics and build a data representation of the characteristics, which may be considered as a handwriting fingerprint.
- a handwriting fingerprint is established for an individual, a data representation of the handwriting fingerprint is stored to the database 112 .
- the database 112 typically stores handwriting fingerprints for a plurality of individuals. Note that it is quite possible for a single individual to have two handwriting fingerprints in some embodiments, such as when an individual utilizes two or more distinct handwriting styles (e.g., block letters and cursive). However, some embodiments may limit an individual to a single handwriting fingerprint.
- the handwriting fingerprint may be utilized in various ways, depending on the embodiment.
- the handwriting fingerprint may be used utilized to verify the authenticity of a signature on checks drawn against an account of an individual, which may be for all checks, checks over a certain dollar amount, checks randomly selected, or otherwise.
- the handwriting fingerprint may be considered at a time when an imaging device 104 acquires an image of check based on data retrieved from the database 112 over a network 108 , such as the Internet.
- the check image may be transmitted over the network from the imaging device 104 to the one or more servers 110 via an API or web service call.
- the imaging device 104 may be a check reading and imaging device, a camera, a scanner, a product scanner, a handheld scanner, or other imaging device that may be located in a check processing facility, at a terminal such as terminal 102 described below, a document imaging facility, and the like.
- a handwriting fingerprint may also be utilized at a terminal 102 , such as an automated teller machine (ATM), airline check-in kiosk, library checkout kiosk, or other terminal.
- the terminal 102 may utilized the handwriting fingerprint locally or may transmit handwriting data over the network 108 to the one or more servers 110 via an API or web service call.
- the handwriting data may be received as input via the imaging device 104 , an electronic signature pad device coupled to the terminal 102 , a handwriting input received via a touch screen by a finger or stylus, and the like.
- the terminal 102 in some embodiments may be in the form of a mobile device 106 .
- the mobile device 106 may be a smartphone, handheld computing device, a tablet, a smartwatch or other device having a similar form factor and the like.
- FIG. 2 is a block diagram of a computing device, according to an example embodiment.
- multiple such computer systems are utilized in a distributed network to implement multiple components in a transaction-based environment.
- An object-oriented, service-oriented, or other architecture may be used to implement such functions and communicate between the multiple systems and components.
- One example computing device in the form of a computer 210 may include a processing unit 202 , memory 204 , removable storage 212 , and non-removable storage 214 .
- the example computing device is illustrated and described as computer 210 , the computing device may be in different forms in different embodiments.
- the computing device may instead be a smartphone, a tablet, smartwatch, or other computing device including the same or similar elements as illustrated and described with regard to FIG. 2 .
- Devices such as smartphones, tablets, and smartwatches are generally collectively referred to as mobile devices.
- the various data storage elements are illustrated as part of the computer 210 , the storage may also or alternatively include cloud-based storage accessible via a network, such as the Internet.
- memory 204 may include volatile memory 206 and non-volatile memory 208 .
- Computer 210 may include—or have access to a computing environment that includes a variety of computer-readable media, such as volatile memory 206 and non-volatile memory 208 , removable storage 212 and non-removable storage 214 .
- Computer storage includes random access memory (RAM), read only memory (ROM), erasable programmable read-only memory (EPROM) and electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technologies, compact disc read-only memory (CD ROM), Digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium capable of storing computer-readable instructions.
- RAM random access memory
- ROM read only memory
- EPROM erasable programmable read-only memory
- EEPROM electrically erasable programmable read-only memory
- flash memory or other memory technologies
- compact disc read-only memory (CD ROM) compact disc read-only memory
- DVD Digital Versatile Disks
- magnetic cassettes magnetic tape
- magnetic disk storage or other magnetic storage devices, or any other medium capable of storing computer-readable instructions.
- Computer 210 may include or have access to a computing environment that includes input 216 , output 218 , and a communication connection 220 .
- the input 216 may include one or more of a touchscreen, touchpad, mouse, keyboard, camera, one or more device-specific buttons, one or more sensors integrated within or coupled via wired or wireless data connections to the computer 210 , and other input devices.
- the computer 210 may operate in a networked environment using a communication connection 220 to connect to one or more remote computers, such as database servers, web servers, and other computing device.
- An example remote computer may include a personal computer (PC), server, router, network PC, a peer device or other common network node, or the like.
- the communication connection 220 may be a network interface device such as one or both of an Ethernet card and a wireless card or circuit that may be connected to a network.
- the network may include one or more of a Local Area Network (LAN), a Wide Area Network (WAN), the Internet, and other networks.
- the communication connection 220 may also or alternatively include a transceiver device, such as a BLUETOOTH® device that enables the computer 210 to wirelessly receive data from and transmit data to other BLUETOOTH® devices.
- Computer-readable instructions stored on a computer-readable medium are executable by the processing unit 202 of the computer 210 .
- a hard drive magnetic disk or solid state
- CD-ROM compact disc or solid state
- RAM random access memory
- various computer programs 225 or apps such as one or more applications and modules implementing one or more of the methods illustrated and described herein or an app or application that executes on a mobile device or is accessible via a web browser, may be stored on a non-transitory computer-readable medium.
- FIG. 3 is a block flow diagram of a method 300 , according to an example embodiment.
- the method 300 is an example of a method that may be performed in whole or in part on the one or more servers 110 of FIG. 1 .
- the method 300 includes storing 302 a set of handwriting characteristics of an individual identified during processing of a plurality of handwriting samples of the individual and determining 304 whether an input handwriting sample is handwriting of the individual based on the stored set of handwriting characteristics of the individual.
- the method 300 further includes outputting 306 a result of the determining.
- the stored 302 set of handwriting characteristics of the individual is stored in a database storing sets of handwriting characteristics of a plurality of individuals.
- a set of handwriting characteristics in some embodiments is stored 302 as a data representation of a plurality of handwriting characteristics.
- These handwriting characteristics may include, among others, one, two, or more of character slant, character forms, writing instrument direction of movement when forming a character or portion thereof, proportions between character portions, height ratios between characters, and character loop forms.
- outputting 306 the result of the determining includes outputting 306 a score generated by the determining where the score indicative of a degree of accuracy of the determining.
- the score may be generated in some such embodiments based on a degree of matching of certain characteristics of a handwriting fingerprint with a handwriting input, a number of matches, a frequency of matches, among other factors.
- the plurality of handwriting samples are stored check images.
- the input handwriting sample is an image of a check presented for processing.
- the input handwriting sample is received by a server performing at least a portion of the method 300 from a source over a network and the result of the determining is output in a data transmission from the server to the source over the network.
- the source may be a networked terminal, such as an ATM or other terminal.
- FIG. 4 is a block flow diagram of a method 400 , according to an example embodiment.
- the method 400 is an example of a method that may be performed in whole or in part on one or more of the one or more servers 110 , the terminal 102 , the imaging device 104 , and the mobile device 106 of FIG. 1 .
- the method 400 includes identifying 402 an individual from whom a handwriting sample was received as input based on stored sets of handwriting characteristics of a plurality of individuals.
- the method 400 further includes outputting 404 data identifying the individual from whom the handwriting sample was received when the individual is identified, otherwise outputting data indicating no identification was made.
- the method 400 may further include receiving the input handwriting sample and extracting the set of characteristics from the received handwriting sample.
- the handwriting sample is received and the extracting is performed on a client device that transmits a data representation of the extracted set of characteristics over a network to a computing device that performs the identifying.
- the input handwriting sample may initially be received as manual input into a signature pad input device. In other embodiments or other instances, the input handwriting sample may initially be received as an electronic image of a check captured by an imaging device when the check is presented for payment or for deposit.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Finance (AREA)
- Databases & Information Systems (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Data Mining & Analysis (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Human Computer Interaction (AREA)
- Collating Specific Patterns (AREA)
Abstract
Description
- Consumer and user authentication methods are varied and typically involve a consumer knowing something (e.g., Personal Identification Number “PIN” or password), having something (smart card), or something they “are” (e.g., a fingerprint). While these solutions work well, or at least sufficiently, new methods are needed to provide new and different authentication options when other solutions have been compromised, for use as a secondary authentication mechanism, to reset other authentication credentials, and the like.
- Various embodiments herein each include at least one of systems, methods, and software for identity verification. Some such embodiments identify a consumer or user based on analysis of their handwriting on checks, other documents, or as input on a signature pad or other handwriting input device. Some such embodiments may be utilized to authenticate an individual, for emergency authentication or when other authentication solutions are not available, as one of a two or more step authentication process, authenticating checks, authenticating a signature or other handwriting on another document, and the like.
- One embodiment, in the form of a method, includes storing a set of handwriting characteristics of an individual identified during processing of a plurality of handwriting samples of the individual. The method may then determine whether an input handwriting sample is handwriting of the individual based on the stored set of handwriting characteristics of the individual and then output a result of the determining.
- Another method embodiment includes identifying an individual from whom a handwriting sample was received as input based on stored sets of handwriting characteristics of a plurality of individuals and outputting data identifying the individual from whom the handwriting sample was received when the individual is identified, otherwise outputting data indicating no identification was made.
- A further embodiment, in the form of a system, includes a processor, a memory device, a network interface device, and instructions stored on the at least one memory device that are executable by the processor to perform data processing activities. The data processing activities, in some embodiments, include storing, on the memory device, a set of handwriting characteristics of an individual identified during processing of a plurality of handwriting samples of the individual. The data processing activities may further include determining whether an input handwriting sample received via the network interface device is handwriting of the individual based on the stored set of handwriting characteristics of the individual. Subsequently, the data processing activities include outputting a result of the determining via the network interface device.
-
FIG. 1 is a logical block diagram of a system architecture, according to an example embodiment. -
FIG. 2 is a block diagram of a computing device, according to an example embodiment. -
FIG. 3 is a block flow diagram of a method, according to an example embodiment. -
FIG. 4 is a block flow diagram of a method, according to an example embodiment. - Various embodiments herein each include at least one of systems, methods, and software for identity verification. Some such embodiments identify a consumer or user based on analysis of their handwriting on checks, other documents, or as input on a signature pad or other handwriting input device. Some such embodiments may be utilized to authenticate an individual, for emergency authentication or when other authentication solutions are not available, as one of a two or more step authentication process, authenticating checks, authenticating a signature or other handwriting on another document, and the like.
- Security and Consumer authentication is a major concern and is a constant battle in many instances, such as in banking. Some embodiments herein provide a solution, that may be provided as an Application Programming Interface (API), one or a set of web services, and the like. Some such solutions may leverage a check processor's check image archive which may not be viewed as a strategic asset in a financial institution or an archive of other documents including handwriting associated with known individuals. Such embodiments are able to identify and store data representations of unique characteristics of an individual's handwriting from such archived handwriting samples, newly received handwriting samples, and handwriting received as learning input for proposes authentication of the identity of the individual based on handwriting, such as a signature, received at a later time. Such embodiments provide a new authentication solution that the individual does not need to know or have, rather it is something that just is. Such embodiments may enable authentication of the individual in emergency situations when other identification items or solutions are not available or fail, for secondary authentication, to verify the authenticity of a handwritten check or check signature, such as when a check amount is over a certain value, and the like.
- These and other embodiments are described herein with reference to the figures.
- In the following detailed description, reference is made to the accompanying drawings that form a part hereof, and in which is shown by way of illustration specific embodiments in which the inventive subject matter may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice them, and it is to be understood that other embodiments may be utilized and that structural, logical and electrical changes may be made without departing from the scope of the inventive subject matter. Such embodiments of the inventive subject matter may be referred to, individually and/or collectively, herein by the term “invention” merely for convenience and without intending to voluntarily limit the scope of this application to any single invention or inventive concept if more than one is in fact disclosed.
- The following description is, therefore, not to be taken in a limited sense, and the scope of the inventive subject matter is defined by the appended claims.
- The functions or algorithms described herein are implemented in hardware, software or a combination of software and hardware in one embodiment. The software comprises computer executable instructions stored on computer readable media such as memory or other type of storage devices. Further, described functions may correspond to modules, which may be software, hardware, firmware, or any combination thereof. Multiple functions are performed in one or more modules as desired, and the embodiments described are merely examples. The software is executed on a digital signal processor, ASIC, microprocessor, or other type of processor operating on a system, such as a personal computer, server, a router, or other device capable of processing data including network interconnection devices.
- Some embodiments implement the functions in two or more specific interconnected hardware modules or devices with related control and data signals communicated between and through the modules, or as portions of an application-specific integrated circuit. Thus, the exemplary process flow is applicable to software, firmware, and hardware implementations.
-
FIG. 1 is a logical block diagram of asystem 100 architecture, according to an example embodiment. Thesystem 100 is an example of a system on which some embodiments may be implemented. For example, thedatabase 112 may store an archive of documents, such as processed checks, signed documents, handwritten documents, and the like, or portions thereof, in electronic image form. - One or more processes that execute on one or
more servers 110 may execute against archived documents stored in thedatabase 112 to identify characteristics of individuals handwriting across a plurality of documents associated in stored data with individuals' respective identities. Characteristics of handwriting that are identified and extracted from handwriting samples may include characteristics such as what is referred to as skill level, or neatness in terms of fluid, rhythmic, and artistic embellishment. Other characteristics may include slant or inclination of characters, character forms, movement of a writing utensil when forming characters or portions thereof, proportions of character portions compared to the whole character or other portions, height rations of characters with relation to one or more other characters, loop shape and form, pressure as is evident from line width, writing utensil lifting when forming certain characters, exit and entry strokes for characters, retracing, character and word spacing, case of letters, and other characteristics. These characteristics as may be extracted with regard to a particular individual are generally unique to the individual. The degree of the uniqueness may be lesser or greater depending upon the number of characteristics taken into account and in combination. The degree of uniqueness may be complete or a bit lower. The degree of a particular embodiment may be set based on a configuration setting of the software that extracts the characteristics and build a data representation of the characteristics, which may be considered as a handwriting fingerprint. Once a handwriting fingerprint is established for an individual, a data representation of the handwriting fingerprint is stored to thedatabase 112. Thedatabase 112 typically stores handwriting fingerprints for a plurality of individuals. Note that it is quite possible for a single individual to have two handwriting fingerprints in some embodiments, such as when an individual utilizes two or more distinct handwriting styles (e.g., block letters and cursive). However, some embodiments may limit an individual to a single handwriting fingerprint. - Once an individual has a handwriting fingerprint, the handwriting fingerprint may be utilized in various ways, depending on the embodiment. For example, the handwriting fingerprint may be used utilized to verify the authenticity of a signature on checks drawn against an account of an individual, which may be for all checks, checks over a certain dollar amount, checks randomly selected, or otherwise. The handwriting fingerprint may be considered at a time when an
imaging device 104 acquires an image of check based on data retrieved from thedatabase 112 over anetwork 108, such as the Internet. In other embodiment, the check image may be transmitted over the network from theimaging device 104 to the one ormore servers 110 via an API or web service call. Note that theimaging device 104 may be a check reading and imaging device, a camera, a scanner, a product scanner, a handheld scanner, or other imaging device that may be located in a check processing facility, at a terminal such asterminal 102 described below, a document imaging facility, and the like. - A handwriting fingerprint may also be utilized at a
terminal 102, such as an automated teller machine (ATM), airline check-in kiosk, library checkout kiosk, or other terminal. In some embodiments, theterminal 102 may utilized the handwriting fingerprint locally or may transmit handwriting data over thenetwork 108 to the one ormore servers 110 via an API or web service call. The handwriting data may be received as input via theimaging device 104, an electronic signature pad device coupled to theterminal 102, a handwriting input received via a touch screen by a finger or stylus, and the like. - The
terminal 102 in some embodiments may be in the form of amobile device 106. Themobile device 106 may be a smartphone, handheld computing device, a tablet, a smartwatch or other device having a similar form factor and the like. -
FIG. 2 is a block diagram of a computing device, according to an example embodiment. In one embodiment, multiple such computer systems are utilized in a distributed network to implement multiple components in a transaction-based environment. An object-oriented, service-oriented, or other architecture may be used to implement such functions and communicate between the multiple systems and components. One example computing device in the form of acomputer 210, may include aprocessing unit 202,memory 204,removable storage 212, andnon-removable storage 214. Although the example computing device is illustrated and described ascomputer 210, the computing device may be in different forms in different embodiments. For example, the computing device may instead be a smartphone, a tablet, smartwatch, or other computing device including the same or similar elements as illustrated and described with regard toFIG. 2 . Devices such as smartphones, tablets, and smartwatches are generally collectively referred to as mobile devices. Further, although the various data storage elements are illustrated as part of thecomputer 210, the storage may also or alternatively include cloud-based storage accessible via a network, such as the Internet. - Returning to the
computer 210,memory 204 may include volatile memory 206 andnon-volatile memory 208.Computer 210 may include—or have access to a computing environment that includes a variety of computer-readable media, such as volatile memory 206 andnon-volatile memory 208,removable storage 212 andnon-removable storage 214. Computer storage includes random access memory (RAM), read only memory (ROM), erasable programmable read-only memory (EPROM) and electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technologies, compact disc read-only memory (CD ROM), Digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium capable of storing computer-readable instructions. -
Computer 210 may include or have access to a computing environment that includesinput 216,output 218, and acommunication connection 220. Theinput 216 may include one or more of a touchscreen, touchpad, mouse, keyboard, camera, one or more device-specific buttons, one or more sensors integrated within or coupled via wired or wireless data connections to thecomputer 210, and other input devices. Thecomputer 210 may operate in a networked environment using acommunication connection 220 to connect to one or more remote computers, such as database servers, web servers, and other computing device. An example remote computer may include a personal computer (PC), server, router, network PC, a peer device or other common network node, or the like. Thecommunication connection 220 may be a network interface device such as one or both of an Ethernet card and a wireless card or circuit that may be connected to a network. The network may include one or more of a Local Area Network (LAN), a Wide Area Network (WAN), the Internet, and other networks. In some embodiments, thecommunication connection 220 may also or alternatively include a transceiver device, such as a BLUETOOTH® device that enables thecomputer 210 to wirelessly receive data from and transmit data to other BLUETOOTH® devices. - Computer-readable instructions stored on a computer-readable medium are executable by the
processing unit 202 of thecomputer 210. A hard drive (magnetic disk or solid state), CD-ROM, and RAM are some examples of articles including a non-transitory computer-readable medium. For example,various computer programs 225 or apps, such as one or more applications and modules implementing one or more of the methods illustrated and described herein or an app or application that executes on a mobile device or is accessible via a web browser, may be stored on a non-transitory computer-readable medium. -
FIG. 3 is a block flow diagram of amethod 300, according to an example embodiment. Themethod 300 is an example of a method that may be performed in whole or in part on the one ormore servers 110 ofFIG. 1 . - The
method 300 includes storing 302 a set of handwriting characteristics of an individual identified during processing of a plurality of handwriting samples of the individual and determining 304 whether an input handwriting sample is handwriting of the individual based on the stored set of handwriting characteristics of the individual. Themethod 300 further includes outputting 306 a result of the determining. - In some embodiments of the
method 300, the stored 302 set of handwriting characteristics of the individual is stored in a database storing sets of handwriting characteristics of a plurality of individuals. A set of handwriting characteristics in some embodiments is stored 302 as a data representation of a plurality of handwriting characteristics. These handwriting characteristics may include, among others, one, two, or more of character slant, character forms, writing instrument direction of movement when forming a character or portion thereof, proportions between character portions, height ratios between characters, and character loop forms. - In some further embodiments of the
method 300, outputting 306 the result of the determining includes outputting 306 a score generated by the determining where the score indicative of a degree of accuracy of the determining. The score may be generated in some such embodiments based on a degree of matching of certain characteristics of a handwriting fingerprint with a handwriting input, a number of matches, a frequency of matches, among other factors. - In some embodiments, the plurality of handwriting samples are stored check images. In some such embodiments, the input handwriting sample is an image of a check presented for processing.
- In another embodiment, the input handwriting sample is received by a server performing at least a portion of the
method 300 from a source over a network and the result of the determining is output in a data transmission from the server to the source over the network. The source may be a networked terminal, such as an ATM or other terminal. -
FIG. 4 is a block flow diagram of amethod 400, according to an example embodiment. Themethod 400 is an example of a method that may be performed in whole or in part on one or more of the one ormore servers 110, the terminal 102, theimaging device 104, and themobile device 106 ofFIG. 1 . - The
method 400 includes identifying 402 an individual from whom a handwriting sample was received as input based on stored sets of handwriting characteristics of a plurality of individuals. Themethod 400 further includes outputting 404 data identifying the individual from whom the handwriting sample was received when the individual is identified, otherwise outputting data indicating no identification was made. - The
method 400 may further include receiving the input handwriting sample and extracting the set of characteristics from the received handwriting sample. In some embodiments of themethod 400, the handwriting sample is received and the extracting is performed on a client device that transmits a data representation of the extracted set of characteristics over a network to a computing device that performs the identifying. The input handwriting sample may initially be received as manual input into a signature pad input device. In other embodiments or other instances, the input handwriting sample may initially be received as an electronic image of a check captured by an imaging device when the check is presented for payment or for deposit. - It will be readily understood to those skilled in the art that various other changes in the details, material, and arrangements of the parts and method stages which have been described and illustrated in order to explain the nature of the inventive subject matter may be made without departing from the principles and scope of the inventive subject matter as expressed in the subjoined claims.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/365,559 US20180150839A1 (en) | 2016-11-30 | 2016-11-30 | Identity verification systems and methods |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/365,559 US20180150839A1 (en) | 2016-11-30 | 2016-11-30 | Identity verification systems and methods |
Publications (1)
Publication Number | Publication Date |
---|---|
US20180150839A1 true US20180150839A1 (en) | 2018-05-31 |
Family
ID=62190965
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/365,559 Pending US20180150839A1 (en) | 2016-11-30 | 2016-11-30 | Identity verification systems and methods |
Country Status (1)
Country | Link |
---|---|
US (1) | US20180150839A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11323430B2 (en) * | 2018-03-21 | 2022-05-03 | Advanced New Technologies Co., Ltd. | Identity verification method and device and electronic device |
WO2022104999A1 (en) * | 2020-11-17 | 2022-05-27 | 深圳市鹰硕教育服务有限公司 | Handwriting graphics analysis method and apparatus, and electronic device |
CN114648813A (en) * | 2022-04-01 | 2022-06-21 | 东云睿连(武汉)计算技术有限公司 | A deep learning-based handwritten signature identification method and device |
US20220198124A1 (en) * | 2020-12-18 | 2022-06-23 | Samsung Electronics Co., Ltd. | Method and apparatus for recognizing handwriting inputs in multiple-user environment |
Citations (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4701960A (en) * | 1983-10-28 | 1987-10-20 | Texas Instruments Incorporated | Signature verification |
US5559895A (en) * | 1991-11-08 | 1996-09-24 | Cornell Research Foundation, Inc. | Adaptive method and system for real time verification of dynamic human signatures |
US6424728B1 (en) * | 1999-12-02 | 2002-07-23 | Maan Ammar | Method and apparatus for verification of signatures |
US20020152170A1 (en) * | 2001-04-12 | 2002-10-17 | International Business Machines Corporation | Method and apparatus for processing checks at an automatic teller machine for electronic transfer |
US20030138135A1 (en) * | 2002-01-23 | 2003-07-24 | Chung Kevin Kwong-Tai | Generation and verification of a digitized signature |
US20050035193A1 (en) * | 1997-05-30 | 2005-02-17 | Capital Security Systems, Inc. | Automated document cashing system |
US20060041506A1 (en) * | 2004-08-18 | 2006-02-23 | Mason James G | Validating negotiable documents using public document validation profiles |
US7168614B2 (en) * | 2004-12-10 | 2007-01-30 | Mitek Systems, Inc. | System and method for check fraud detection using signature validation |
US20070084911A1 (en) * | 2005-10-18 | 2007-04-19 | First Data Corporation | ATM check invalidation and return systems and methods |
US20080005579A1 (en) * | 2006-06-30 | 2008-01-03 | Mark Gaines | System and method of user authentication using handwritten signatures for an MFP |
US7545982B2 (en) * | 2002-03-15 | 2009-06-09 | Computer Sciences Corporation | Systems and methods of assessing documents using multi-field profile representations |
US20090164372A1 (en) * | 2007-12-20 | 2009-06-25 | Ncr Corporation | Methods of processing data captured during a deposit transaction conducted at an image-based self-service check depositing terminal |
US20090173781A1 (en) * | 1998-04-17 | 2009-07-09 | Natarajan Ramachandran | Banking system controlled responsive to data bearing records |
US7636457B2 (en) * | 2003-07-21 | 2009-12-22 | Gannon Technologies Group Llc | Systems and methods for assessing disorders affecting fine motor skills using handwriting recognition |
US20100161466A1 (en) * | 2006-10-10 | 2010-06-24 | Gilder Clark S | Electronic lockbox using digitally originated checks |
US20130159183A1 (en) * | 2011-12-15 | 2013-06-20 | Michael Lopez | Method of operating an image-based self-service check depositing terminal to detect a duplicate check deposit |
CN103250132A (en) * | 2010-12-20 | 2013-08-14 | 惠普发展公司,有限责任合伙企业 | Workflow-enhancing device, system and method |
US20140040141A1 (en) * | 2012-08-02 | 2014-02-06 | Bank Of America Corporation | Use of check-face meta-data for enhanced transaction processing |
US20150254655A1 (en) * | 2014-03-04 | 2015-09-10 | Bank Of America Corporation | Atm token cash withdrawal |
US9520034B1 (en) * | 2013-08-06 | 2016-12-13 | Patricia A. Walker | Banking system including at least one 3D printer |
US20170046560A1 (en) * | 2014-04-23 | 2017-02-16 | Signpass Ltd. | Methods and systems for signature analysis and authentication |
-
2016
- 2016-11-30 US US15/365,559 patent/US20180150839A1/en active Pending
Patent Citations (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4701960A (en) * | 1983-10-28 | 1987-10-20 | Texas Instruments Incorporated | Signature verification |
US5559895A (en) * | 1991-11-08 | 1996-09-24 | Cornell Research Foundation, Inc. | Adaptive method and system for real time verification of dynamic human signatures |
US20050035193A1 (en) * | 1997-05-30 | 2005-02-17 | Capital Security Systems, Inc. | Automated document cashing system |
US20090173781A1 (en) * | 1998-04-17 | 2009-07-09 | Natarajan Ramachandran | Banking system controlled responsive to data bearing records |
US6424728B1 (en) * | 1999-12-02 | 2002-07-23 | Maan Ammar | Method and apparatus for verification of signatures |
US20020152170A1 (en) * | 2001-04-12 | 2002-10-17 | International Business Machines Corporation | Method and apparatus for processing checks at an automatic teller machine for electronic transfer |
US20030138135A1 (en) * | 2002-01-23 | 2003-07-24 | Chung Kevin Kwong-Tai | Generation and verification of a digitized signature |
US7545982B2 (en) * | 2002-03-15 | 2009-06-09 | Computer Sciences Corporation | Systems and methods of assessing documents using multi-field profile representations |
US7636457B2 (en) * | 2003-07-21 | 2009-12-22 | Gannon Technologies Group Llc | Systems and methods for assessing disorders affecting fine motor skills using handwriting recognition |
US20060041506A1 (en) * | 2004-08-18 | 2006-02-23 | Mason James G | Validating negotiable documents using public document validation profiles |
US7168614B2 (en) * | 2004-12-10 | 2007-01-30 | Mitek Systems, Inc. | System and method for check fraud detection using signature validation |
US20070084911A1 (en) * | 2005-10-18 | 2007-04-19 | First Data Corporation | ATM check invalidation and return systems and methods |
US20080005579A1 (en) * | 2006-06-30 | 2008-01-03 | Mark Gaines | System and method of user authentication using handwritten signatures for an MFP |
US20100161466A1 (en) * | 2006-10-10 | 2010-06-24 | Gilder Clark S | Electronic lockbox using digitally originated checks |
US20090164372A1 (en) * | 2007-12-20 | 2009-06-25 | Ncr Corporation | Methods of processing data captured during a deposit transaction conducted at an image-based self-service check depositing terminal |
CN103250132A (en) * | 2010-12-20 | 2013-08-14 | 惠普发展公司,有限责任合伙企业 | Workflow-enhancing device, system and method |
US20130159183A1 (en) * | 2011-12-15 | 2013-06-20 | Michael Lopez | Method of operating an image-based self-service check depositing terminal to detect a duplicate check deposit |
US20140040141A1 (en) * | 2012-08-02 | 2014-02-06 | Bank Of America Corporation | Use of check-face meta-data for enhanced transaction processing |
US9520034B1 (en) * | 2013-08-06 | 2016-12-13 | Patricia A. Walker | Banking system including at least one 3D printer |
US20150254655A1 (en) * | 2014-03-04 | 2015-09-10 | Bank Of America Corporation | Atm token cash withdrawal |
US20170046560A1 (en) * | 2014-04-23 | 2017-02-16 | Signpass Ltd. | Methods and systems for signature analysis and authentication |
Non-Patent Citations (7)
Title |
---|
Bertrand Et. Al "A Conditional Random Field Model for Font Forgery Detection", https://ieeexplore.ieee.org/document/7333827 , 2015 (Year: 2015) * |
Chianese et. al, "Recovering dynamic information from static handwriting.", Pattern Recognition, Vol 26, No 3., 409, 418, accessed via https://www.researchgate.net/publication/220602224_Recovering_dynamic_information_from_static_handwriting (Year: 1993) * |
Desai Et. Al, "Forensic Examination Of Handwriting And Signatures", International Journal of Innovative Research and Development, https://www.internationaljournalcorner.com/index.php/ijird_ojs/issue/view/8152 , 2013 (Year: 2013) * |
Donato et. Al, "Automatic Signature Verification: The State of the Art", https://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=4603093&punumber=5326 , published in IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) ( Volume: 38, Issue: 5, September 2008) (Year: 2008) * |
forensic science simplified - "A Simplified Guide To Forensic Document Examination" https://web.archive.org/web/20131008222119/https://www.forensicsciencesimplified.org/docs/QuestionedDocuments.pdf , archived 2013 (Year: 2013) * |
Haffeman et. al, "Offline Handwritten Signature Verification - Literature Review", https://arxiv.org/pdf/1507.07909v2 , 2015 (Year: 2015) * |
Plamondon et. al, "Online and off-line handwriting recognition: a comprehensive survey", https://ieeexplore.ieee.org/document/824821 , January, 2000 (Year: 2000) * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11323430B2 (en) * | 2018-03-21 | 2022-05-03 | Advanced New Technologies Co., Ltd. | Identity verification method and device and electronic device |
WO2022104999A1 (en) * | 2020-11-17 | 2022-05-27 | 深圳市鹰硕教育服务有限公司 | Handwriting graphics analysis method and apparatus, and electronic device |
US20220198124A1 (en) * | 2020-12-18 | 2022-06-23 | Samsung Electronics Co., Ltd. | Method and apparatus for recognizing handwriting inputs in multiple-user environment |
US11847401B2 (en) * | 2020-12-18 | 2023-12-19 | Samsung Electronics Co., Ltd. | Method and apparatus for recognizing handwriting inputs in multiple-user environment |
CN114648813A (en) * | 2022-04-01 | 2022-06-21 | 东云睿连(武汉)计算技术有限公司 | A deep learning-based handwritten signature identification method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20250061436A1 (en) | Biometric authentication of pre-staged self-service terminal transactions | |
US20240420142A1 (en) | Systems and methods for biometric transaction management | |
US20230130755A1 (en) | Biometric transaction system | |
US20190213385A1 (en) | Method And Systems For Signature Analysis And Authentication | |
US20210374225A1 (en) | Providing an augmented reality overlay to secure input data | |
US20190258886A1 (en) | Extraction of data from a digital image | |
US20160277396A1 (en) | System and method for selectively initiating biometric authentication for enhanced security of access control transactions | |
US11824642B2 (en) | Systems and methods for provisioning biometric image templates to devices for use in user authentication | |
EP3967014A1 (en) | Methods and systems for generating a unique signature based on user device movements in a three-dimensional space | |
CN109426963B (en) | Biometric system for authenticating biometric requests | |
US20180374101A1 (en) | Facial biometrics card emulation for in-store payment authorization | |
US20180150839A1 (en) | Identity verification systems and methods | |
US12217260B2 (en) | Systems and methods for automated identity verification | |
US10318849B2 (en) | Check image data interference processing | |
SE1650354A1 (en) | Method and system for evaluating fingerprint templates | |
US20170091860A1 (en) | Method and system for performing an action in a branchless banking environment | |
US11468433B1 (en) | Systems and methods for biometric payments and authentication | |
KR20180011610A (en) | Self-banking apparatus for performing financial transaction and method using thereof | |
JP6126732B1 (en) | Signature authentication method and signature authentication system | |
US11195170B1 (en) | Method and a system for creating a behavioral user profile | |
US11521428B1 (en) | Methods and systems for signature verification | |
US20250094988A1 (en) | Distributed ledger technology utilizing cardless payments | |
JP2019061462A (en) | Biometric authentication system and biometric authentication method | |
US20180089675A1 (en) | Mobile device authentication | |
TWM571549U (en) | System for verifying online banking services by using mobile devices in combination with inductive financial cards |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: NCR CORPORATION, GEORGIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GAULD, FRANK JOSEPH LAMONT;REEL/FRAME:041771/0359 Effective date: 20161214 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
AS | Assignment |
Owner name: JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT Free format text: SECURITY INTEREST;ASSIGNOR:NCR CORPORATION;REEL/FRAME:050874/0063 Effective date: 20190829 Owner name: JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT, NEW YORK Free format text: SECURITY INTEREST;ASSIGNOR:NCR CORPORATION;REEL/FRAME:050874/0063 Effective date: 20190829 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
AS | Assignment |
Owner name: JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT, NEW YORK Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE PROPERTY NUMBERS SECTION TO REMOVE PATENT APPLICATION: 15000000 PREVIOUSLY RECORDED AT REEL: 050874 FRAME: 0063. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY INTEREST;ASSIGNOR:NCR CORPORATION;REEL/FRAME:057047/0161 Effective date: 20190829 Owner name: JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT, NEW YORK Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE PROPERTY NUMBERS SECTION TO REMOVE PATENT APPLICATION: 150000000 PREVIOUSLY RECORDED AT REEL: 050874 FRAME: 0063. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY INTEREST;ASSIGNOR:NCR CORPORATION;REEL/FRAME:057047/0161 Effective date: 20190829 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
AS | Assignment |
Owner name: CITIBANK, N.A., NEW YORK Free format text: SECURITY INTEREST;ASSIGNOR:NCR ATLEOS CORPORATION;REEL/FRAME:065331/0297 Effective date: 20230927 |
|
AS | Assignment |
Owner name: CITIBANK, N.A., NEW YORK Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE DOCUMENT DATE AND REMOVE THE OATH/DECLARATION (37 CFR 1.63) PREVIOUSLY RECORDED AT REEL: 065331 FRAME: 0297. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY INTEREST;ASSIGNOR:NCR ATLEOS CORPORATION;REEL/FRAME:065627/0332 Effective date: 20231016 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
AS | Assignment |
Owner name: NCR ATLEOS CORPORATION, GEORGIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NCR VOYIX CORPORATION;REEL/FRAME:067464/0882 Effective date: 20231016 Owner name: NCR VOYIX CORPORATION, GEORGIA Free format text: CHANGE OF NAME;ASSIGNOR:NCR CORPORATION;REEL/FRAME:067464/0595 Effective date: 20231013 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |