WO2005038583A2 - Examiner - Google Patents

Examiner Download PDF

Info

Publication number
WO2005038583A2
WO2005038583A2 PCT/US2004/033202 US2004033202W WO2005038583A2 WO 2005038583 A2 WO2005038583 A2 WO 2005038583A2 US 2004033202 W US2004033202 W US 2004033202W WO 2005038583 A2 WO2005038583 A2 WO 2005038583A2
Authority
WO
WIPO (PCT)
Prior art keywords
information
database
entity
harvested
harvested information
Prior art date
Application number
PCT/US2004/033202
Other languages
French (fr)
Other versions
WO2005038583A3 (en
Inventor
Robert Eryou
James Knapp
Original Assignee
Kycos Holding Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kycos Holding Limited filed Critical Kycos Holding Limited
Publication of WO2005038583A2 publication Critical patent/WO2005038583A2/en
Publication of WO2005038583A3 publication Critical patent/WO2005038583A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries

Definitions

  • the invention relates to a system, method, and database, or combinations involving them, whereby topic-specific information can be stored, assigned a relevancy or weighting figure or value, optionally updated with new harvested information, and eventually accessed or retrieved by a user.
  • the topic- specific information can include information related to specific individuals, corporate entity information, financial transaction information, bank account information, government information, police or law enforcement information, and/or judicial information.
  • the topic-specific information can include medical data, medical history information, diagnostic information, and/or patient information.
  • specific items of information or records in the database can be authenticated and digitally signed for future use and retrieval. Authenticated information can then represent the highest relevancy or weighting value.
  • User access or retrieval of information can be for verifying or researching information, for example.
  • the system, method, and database provide a level of authentication not previously available to a number of industries.
  • the invention can be used by financial service providers to perform pre-transaction research to comply with customer disclosure rules and regulations.
  • government regulations have placed increased requirements on financial service providers to verify or authenticate the source of funds or the correctness of records relating to a transaction.
  • U.S. Department of Treasury has expanded its regulatory reach in an effort to require documentation or verification to make it easier to prevent, detect, and prosecute international money laundering and the financing of terrorism or other illegal activities.
  • the systems, databases, and methods of the invention address these problems by providing authenticated items of information or records in a database that a user can request, retrieve, and review and then use to determine the authenticity of a person, entity, or the accuracy of the same or a related item of information.
  • a “harvested information unit” is an “item of information” that is obtained through a search of a remote datasource.
  • a remote datasource includes structured and unstructured databases, proprietary databases, webpages, and captured or OCR information from various print or Internet sources.
  • the "item of information” can be a document, such as a legal document or identification document, a part of a webpage, or any other digitally storable content relating to a specific topic.
  • the specific topic is defined by the database or system operator, but can generally be limited by certain types of information, certain sources for information, or certain keywords or keyobjects present on printed or printable information.
  • one topic-specific database relates to persons and corporate entities and their ability to legally transact business or make purchases with monetary funds.
  • An “object” may be used interchangeably with an “entity” and is used generally to refer to individuals, groups, corporations, agents, and the like. It is understood and contemplated that when “object” or “entity” is used in connection with a legal entity such as a corporation, partnership, or company, that the "photograph” of such a legal entity may be used to describe either the photograph of a shareholder (or other appropriate equity holder or beneficial owner), or may be used instead to refer to a copy of the relevant corporate papers such as "articles of incorporation.”
  • a “photograph” can also be a captured document representing a government issued identification or passport for a person or individual.
  • the invention comprises a system for authentication of information for use by a user.
  • the system may include: a database having a plurality of records or items of information, said records including an entity's name and one or more of the following: a photograph of the entity, a government-issued identification number for the entity, and a passport number for the entity; a user interface to the records database to accept a query from a user, said query comprising a request to obtain database information about a queried entity; a database search engine to search the records database and to obtain records for the queried entity; a data-seeking module to query a plurality of remote datasources for information on the queried entity, said data-seeking module producing a plurality of harvested information units from the plurality of remote datasources; a reliability assessment module to assign and associate a value to each of the plurality of harvested information units based upon the remote database from which the harvested information unit was obtained; and a report generator to generate an output comprising the name of a queried entity, one or more records
  • the output can also indicate that no item of information or record exists for the queried entity.
  • the system may utilize the Internet to obtain information about the queried entity from one or more of the following sources: a newspaper; a governmental agency; a judicial court; a police department; and a bank.
  • the system may also include an update module to update the records database with the harvested information units relating to the queried entity and the values that are associated with each of the harvested information units.
  • the reliability assessment module may assign a value based upon the remote datasource from which the harvested information unit was obtained and/or based upon an identity of a knowledge worker that obtained the information.
  • the knowledge worker may be a person with expertise in assessing the accuracy of the harvested information unit, or may be a software program.
  • the knowledge worker may also review a harvested information unit for reliability and then digitally sign the harvested information unit.
  • a digital watermark may be used to verify the authenticity of an item of data.
  • the report may include the values associated with the plurality of harvested information units, and information regarding any digital signatures and/or any digital watermarks that are associated with any of the harvested information units.
  • the present invention comprises a method for authenticating information to facilitate financial transactions.
  • the method may include: receiving a query to search a records database to obtain records for a queried entity, said records including an entity's name and one or more of the following: photographs for the entity, a government-issued identification number for the entity, and a passport number for the entity; initiating the search of the records database, and obtaining records for the queried entity, said records including the queried entity's name and one or more of the following: a photograph, a government-issued identification number, and a passport number; initiating a search of a plurality of remote datasources for information on the queried entity, and obtaining a plurality of harvested information units from the plurality of remote datasources; assigning a value to each of the plurality of harvested information units based upon an identity of the remote datasource from which the harvested information unit was obtained; and generating a report comprising the name of a queried entity, one or more records from the records database relating to the queried entity if
  • the method may utilize the Internet to obtain information about the queried entity from one or more of the following sources: a newspaper; a governmental agency; a judicial court; a police department; and a bank.
  • the method may also include updating the records database with the harvested information units relating to the queried entity and the values that are associated with each of the harvested information units.
  • the values being assigned to the information units may be based upon the remote datasource from which the harvested information unit was obtained and/or based upon an identity of a knowledge worker that obtained the information.
  • the knowledge worker may be a person with expertise in assessing the accuracy of the harvested information unit, or may be a software program.
  • the knowledge worker may also review a harvested information unit for reliability and then digitally sign the harvested information unit.
  • a digital watermark may be used to verify the authenticity of an item of data.
  • the report may include the values associated with the plurality of harvested information units, and information regarding any digital signatures and/or any digital watermarks that are associated with any of the harvested information units.
  • the present invention comprises a method for populating a database.
  • the method includes: inputting into a database an entity's name and one or more of the following: a photograph of the entity, a government-issued identification number for the entity, and a passport number for the entity if it exists; searching a plurality of remote datasources using a global network to obtain a plurality of harvested information units, said plurality of remote datasources including one or more of the following sources: a newspaper; a governmental agency; a judicial court; a police department; and a bank.
  • a value is associated with each of the plurality of harvested information units based upon an identity of the remote database from which the harvested information unit was obtained, and storing the plurality of harvested information units into the database, together with each unit's associated value.
  • the values being assigned to the information units may be based upon the remote datasource from which the harvested information unit was obtained and/or based upon an identity of a knowledge worker that obtained the information.
  • the knowledge worker may be a person with expertise in assessing the accuracy of the harvested information unit, or may be a software program.
  • the knowledge worker may also review a harvested information unit for reliability and then digitally sign the harvested information unit.
  • a digital watermark may be used to verify the authenticity of an item of data.
  • the report may include the values associated with the plurality of harvested information units, and information regarding any digital signatures and/or any digital watermarks that are associated with any of the harvested information units.
  • the present invention comprises a database.
  • the database may include: a plurality of records, said records including an entity's name and one or more of the following if they exist: a photograph of the entity, a government-issued identification number for the entity, and a passport number for the entity; a plurality of harvested information units, which units were obtained through querying a plurality of remote datasources, said remote datasources including databases from at least the following sources: a newspaper; a governmental enforcement agency; a judicial court; a police department; and a bank; and a reliability index for each of the plurality of harvested information units, said index being a value that is associated with a harvested information unit based upon the remote database from which the harvested information unit was obtained.
  • the reliability index may be based upon the remote datasource from which the harvested information unit was obtained and/or upon an identity of a knowledge worker that obtained the information.
  • the database optionally includes a user interface to the database to accept a query from a user, said query comprising a request to obtain database information about a queried entity and/or a report generator to generate an output comprising the name of a queried entity, one or more records from the records database relating to the queried entity if they exist, and one or more harvested information units relating to the queried entity if they exist.
  • the database may permit an adjustment to the reliability index of a harvested information unit based upon a review of the harvested information unit by a knowledge worker with expertise in assessing the accuracy of the harvested information unit.
  • the database can also store digital signatures and/or digital watermarks, which may be used to authenticate one or more portions of the database.
  • Figure 1 is a schematic diagram illustrating the architecture of an exemplary system for populating a database.
  • the system can be used in a method for populating a topic-specific database. While separate containers representing the database are shown at the bottom, the database can be a single data repository with structured data indicating the source of the data or of each record or item of information.
  • Figure 2 is schematic diagram illustrating an exemplary system for authenticating information for use by a user and an exemplary method for populating a database.
  • the "person" images do not necessarily represent persons, but can also be automated steps or modules. The fact that certain steps or processes are included in this diagram should not be taken as a requirement that any step be included in a system or method of the invention.
  • a user here is represented by the Financial Service Provider example. An individual seeking a card or device to assist in the authentication of the person or the presence of a person is also exemplified.
  • the key symbol represents an authentication and/or value assessment module or process.
  • the lock symbol represents a digital signature or watermarking step or module.
  • the External Authentication (EA) element can be a biometric authentication step, such as one associated with a fingerprint authentication device.
  • An Entity Relationship Application refers to a process or module that identifies the ultimate beneficial owner of an asset or a corporate entity or other entity.
  • the Intro page is an optional digitally stored file or document that summarizes the content of a particular item of information or collection of related items of information.
  • the Intro page can include a bar code, other identification code, or other machine-readable code for ease of access, and can also include the date stamp and the type of information it is associated with.
  • FIG 3 is schematic diagram illustrating an exemplary system or method of the invention.
  • Information or requests can be entered by a Financial Service Provider (FSP) or an Individual. Access to the system can be through an extranet and/or secure connection.
  • FSP Financial Service Provider
  • the circled A represents a connection to the elements in Figure 2
  • the circled B represents a connection to the elements of Figure 4.
  • Figure 4 is schematic diagram illustrating an exemplary system or method of the invention, here primarily a back-up for the elements and/or servers and/or data in Figure 3.
  • a financial transaction is, as noted below, broadly defined as at least any purchase or transaction where funds or accounts should or are desired to be authenticated, or where some or part of the transaction must be reported to a government agency.
  • a system is produced to populate a database with information specific to financial transaction information.
  • financial transaction information can be the identity of a person owning specific assets, listed as holder of a bank account, brokerage account, insurance policy, real estate, corporation, partnership, organization, or other related information.
  • personal information can be. government issued identification papers or documents, passports, driver's licenses, vehicle permits, professional licenses, military identification, or any related information.
  • Another type of financial transaction information is information of any type that must be reported to a government agency or representative before, during, or after a transaction, such as a purchase or sale of real estate, purchase or sale of a vehicle, purchase or sale of a weapon or firearm, or any information that must be reported under the provisions or implementing rules of the USA Patriot Act, or any related information.
  • the information can be authenticated by an authentication agent, which includes a trained or licensed, agent or officer familiar with the identification of authentic and fraudulent information.
  • an authentication agent which includes a trained or licensed, agent or officer familiar with the identification of authentic and fraudulent information.
  • financial transaction information can be authenticated by a compliance officer.
  • the authentication agent or compliance officer can be represented by the term "knowledge worker.”
  • medical data or medical records can be authenticated by a licensed physician or health care professional.
  • the authentication process can include a certification whereby the authenticated document or information is digitally signed and/or stamped with a watermark and/or certification.
  • the method or technology used to stamp, sign, or watermark the information or document can be selected from any available or preferred.
  • the stamp, certification, or watermarking of the information or document bear the digital signature or indication of the compliance officer, knowledge worker, or other authentication agent.
  • All the information can be stored in a database, such as a computer database.
  • a requester or user of the database can access the database to search for information related to a person, entity, or financial transaction in order to verify the identity of a person, asset, or ownership of an asset.
  • the database can also include information stored in a personal identification card or device.
  • the personal identification card or device When the personal identification card or device is presented to a user of the database, the user can easily verify the identity of the person holding the card or device from the information in the database. This example can be used to resolve the security and verification concerns of a card-not- present transaction.
  • Some devices such as a mobile biometric device, can include authentication by personal presence at the device. Several biometric devices are available and can be selected for this purpose, including fingerprint reader or recognition devices.
  • Figure 1 generally depicts an exemplary system and method for populating a database. While the database(s) is/are shown as separate at the bottom, they can be and preferably would be part of a single data repository, where logical representation or structured data sets allow the identification of the source of the data. Consequently, we will use the terms "database” and “databases” interchangeably throughout this disclosure unless otherwise stated.
  • Information flows into the databases from a variety of applications.
  • a manual input application allows information gathered from manual reviews and/or investigative research to be entered as digital pages.
  • manual review of information gleaned from other datasources, such as webpages, newspapers, police reports, FBI most wanted lists, outstanding warrants, arrest reports, civil complaints, and the like can be manually inputted.
  • specific URL searches or specific unstructured datasource searches can provide information to include through manual input. Certain datasources can be routinely accessed and reviewed for information, for example on weekly or other schedules.
  • a summarizer process can be used to reduce any item of information to its relevant, topic-specific content.
  • the summarizer function is represented by the "Information Reduction Engine,” however other sources can be similarly summarized.
  • the summarizer process can remove or hide certain personal information if privacy concerns dictate.
  • the summarizer process and/or an additional process in any embodiment of the invention can prevent certain users from accessing certain information stored in a database of the invention.
  • Privacy screens and security or limited access levels can be utilized in conjunction with the methods of the invention to protect, hide, or edit certain items of information or even items of information that may only be related to a particular request. Reports can therefore be tailored to contain particular sets or sub-sets of information stored in a database of the invention.
  • a report can be tailored to contain the desired information, such as desired names or entities and information directly related thereto, while hiding other undesired or private information, such as other names also appearing in the database or information unit or information that is not topic-specific.
  • Manual input pages are created as computer-readable files with this information and the summaries.
  • Each item of manual input information can be identified in the database as being from manual input source, and more particularly, what specific type or where the information came from and when. This is represented by the "Manual Entered Data" in the bottom of Figure 1.
  • Public and private datasources can be searched for topic-specific information to include in the database.
  • a certain number of predetermined html datasources can be searched regularly through the use of an Access Scheduler.
  • Any of a variety of web spiders or engines can be used for the retrieval purpose or Retrieval Engine.
  • keyword searches can be performed routinely from a number of likely datasources or URLs.
  • Any of the datasources can be unstructured datasources. Again, this information can be summarized by scrubbing to remove extraneous content. Thus, both the full datasource document and the summarized version can be stored in the database. These two data sets are represented by "Internet Data” and "Archived Web Sites" in the bottom of Figure 1.
  • Full text searching and indexing of datasources can also add items of information into the database. Items entered into the database from other datasources or from user requests can be introduced by one of many full text indexing or OCR methods.
  • the I ndexer function represents one aspect of the items of information or records that can be input based upon this process or module.
  • the administrative Admin Functions of the system and methods can control a number of datasource access factors and content factors.
  • the administrative functions can control the specific URLs searched, the type of link, a specific date for a search, the local path to information, a specific entity or name to search for, a group of entities or names, and the type of content to search.
  • Certain high value datasources can be accessed routinely to archive any topic-specific items. This is represented in the "Archive Web Sites" at the bottom of Figure 1.
  • Information can be assigned a relevance or weight figure or a "value" or simply stored into the database.
  • the relevance or weight figure or value can be used in preparing the report to the user, so that information of the highest relevance or weight value can be sent to the user.
  • the applicable date and source of any item of information is stored with that item of information so that a query of the database returns information from the database as well as the source of the information and when it was stored.
  • items of information in the databases of the invention are stored as computer-readable files.
  • the items can be reduced to digital storage media by scanning or digital image processing.
  • Other information can be received from a digital source and stored as received.
  • Information can also be collected from a source or received from a user, then encrypted and/or time stamped and/or watermarked to authenticate it.
  • Methods for scanning, digital image processing, encrypting, time stamping, and watermarking are well known in the art.
  • Figure 2 represents a method for populating a database, in particular with financial transaction topic-specific information.
  • Figure 2 shows how requests or documents submitted by Financial Service Providers or by Individuals can be incorporated as items of information in a database.
  • a document such as a government issued identity document or tangible asset or bank account ownership document
  • the document is first prepared as a digital or computer-readable file, here represented by the "Scanner” step, however, as noted above, other methods beyond scanning can be used.
  • Scanner digital or computer-readable file
  • an optional External Authentication process can be performed.
  • a biometric device can be used for this purpose, such as a fingerprint authentication device.
  • an ID CARD can be created, which can be used, once authenticated, by an individual or financial service provider to verify information or assets related to a pending transaction. Through either scanning or digitally storing a file or mark, the document's accuracy and authenticity can be confirmed by a compliance officer or knowledge worker.
  • a digital signature can represent the compliance officer involved.
  • a compliance officer or knowledge worker can also assign a relevance value to an item of information or record.
  • the knowledge worker process can also be performed by a software module that assigns a relevance value based upon the source of the item of information, the content of the item of information, or a combination of factors. In this example, an FBI most wanted list may represent a high relevance value, a large newspaper a medium relevance value, while some webpages a low relevance value. The criteria for automatically assigning a relevance value can be changed.
  • a card or a card with an associated biometric device can be issued to a person or entity for further use of the system or method of the invention.
  • the Card Printer step represents this aspect in Figure 2.
  • the information requested or submitted by a Financial Service Provider (FSP) or Person or Individual can be submitted to the system through a secure connection or extranet. While not explicitly shown, all information in the databases here and elsewhere for this invention can be encrypted or otherwise secured.
  • the databases (DB) listed in these figures again represent logical representation or structured data and not necessarily separate databases or servers.
  • the SAN Network can be backed up on tape (LTO Library).
  • the Docs Capture step or module represents a digital storage step or OCR module for the inputted request or information.
  • Content Management functions can define the topic- specific information, can represent a search through the database, or can further define sets or sources of items or information.

Abstract

The invention relates to a system, method, and database, or combinations involving them, whereby topic-specific information can be stored, assigned a relevancy or weighting figure or value, optionally updated with new harvested information, and eventually accessed or retrieved by a user. Reports for specific users can be tailored to include all or a portion of the stored information for a particular request. In a preferred embodiment, the topic-specific information can include information related to specific individuals, corporate entity information, financial transaction information, bank account information, government information, police or law enforcement information, and/or judicial information. In another preferred embodiment, the topic-specific information can include medical data, medical history information, diagnostic information, and/or patient information. In particular, but not by way of limitation, the invention can be used by financial service providers to perform pre-transaction research to comply with customer disclosure rules and regulations.

Description

METHOD AND SYSTEM FOR AUTHENTICATING INFORMATION AND POPULATING A DATABASE WITH TOPIC-SPECIFIC INFORMATION
FIELD of the INVENTION and INTRODUCTION
The invention relates to a system, method, and database, or combinations involving them, whereby topic-specific information can be stored, assigned a relevancy or weighting figure or value, optionally updated with new harvested information, and eventually accessed or retrieved by a user. In a preferred embodiment, the topic- specific information can include information related to specific individuals, corporate entity information, financial transaction information, bank account information, government information, police or law enforcement information, and/or judicial information. In another preferred embodiment, the topic-specific information can include medical data, medical history information, diagnostic information, and/or patient information. In a preferred method of the invention, specific items of information or records in the database can be authenticated and digitally signed for future use and retrieval. Authenticated information can then represent the highest relevancy or weighting value. User access or retrieval of information can be for verifying or researching information, for example. The system, method, and database provide a level of authentication not previously available to a number of industries. In particular, but not by way of limitation, the invention can be used by financial service providers to perform pre-transaction research to comply with customer disclosure rules and regulations.
BACKGROUND of the INVENTION
Many industries rely upon secure databases for information related to their business purposes. While the reliability of the information in these database has become increasingly more important, the access to and the methods for inputting information has not kept pace. In particular, transactions over the Internet and information gleaned from webpages present particular problems in authenticating the parties to a transaction and in determining the accuracy of the information.
In one example, government regulations have placed increased requirements on financial service providers to verify or authenticate the source of funds or the correctness of records relating to a transaction. For example, the U.S. Department of Treasury has expanded its regulatory reach in an effort to require documentation or verification to make it easier to prevent, detect, and prosecute international money laundering and the financing of terrorism or other illegal activities.
Such trends require businesses to rely upon accurate databases and to perform reliability analysis of the information provided by a database. In one aspect, the systems, databases, and methods of the invention address these problems by providing authenticated items of information or records in a database that a user can request, retrieve, and review and then use to determine the authenticity of a person, entity, or the accuracy of the same or a related item of information.
SUMMARY of the INVENTION
The systems, methods, and databases of the invention are explained below in general terms and in terms related specifically to financial transactions or financial service provider users. However, nothing in this disclosure should be taken as a limitation of the invention to any particular topic of information, any specific industry, or any specific regulatory requirement.
All documents or information referred to is specifically incorporated into this disclosure by reference and can be relied on to make and use aspects or embodiments of the invention.
As used here, a "harvested information unit" is an "item of information" that is obtained through a search of a remote datasource. As explained below, a remote datasource includes structured and unstructured databases, proprietary databases, webpages, and captured or OCR information from various print or Internet sources. The "item of information" can be a document, such as a legal document or identification document, a part of a webpage, or any other digitally storable content relating to a specific topic. The specific topic is defined by the database or system operator, but can generally be limited by certain types of information, certain sources for information, or certain keywords or keyobjects present on printed or printable information. As described more fully below, one topic-specific database relates to persons and corporate entities and their ability to legally transact business or make purchases with monetary funds.
An "object" may be used interchangeably with an "entity" and is used generally to refer to individuals, groups, corporations, agents, and the like. It is understood and contemplated that when "object" or "entity" is used in connection with a legal entity such as a corporation, partnership, or company, that the "photograph" of such a legal entity may be used to describe either the photograph of a shareholder (or other appropriate equity holder or beneficial owner), or may be used instead to refer to a copy of the relevant corporate papers such as "articles of incorporation." A "photograph" can also be a captured document representing a government issued identification or passport for a person or individual.
In a general embodiment, the invention comprises a system for authentication of information for use by a user. The system may include: a database having a plurality of records or items of information, said records including an entity's name and one or more of the following: a photograph of the entity, a government-issued identification number for the entity, and a passport number for the entity; a user interface to the records database to accept a query from a user, said query comprising a request to obtain database information about a queried entity; a database search engine to search the records database and to obtain records for the queried entity; a data-seeking module to query a plurality of remote datasources for information on the queried entity, said data-seeking module producing a plurality of harvested information units from the plurality of remote datasources; a reliability assessment module to assign and associate a value to each of the plurality of harvested information units based upon the remote database from which the harvested information unit was obtained; and a report generator to generate an output comprising the name of a queried entity, one or more records from the records database relating to the queried entity, and one or more harvested information units relating to the queried entity. The output can also indicate that no item of information or record exists for the queried entity. The system may utilize the Internet to obtain information about the queried entity from one or more of the following sources: a newspaper; a governmental agency; a judicial court; a police department; and a bank. The system may also include an update module to update the records database with the harvested information units relating to the queried entity and the values that are associated with each of the harvested information units. Optionally, the reliability assessment module may assign a value based upon the remote datasource from which the harvested information unit was obtained and/or based upon an identity of a knowledge worker that obtained the information. The knowledge worker may be a person with expertise in assessing the accuracy of the harvested information unit, or may be a software program. The knowledge worker may also review a harvested information unit for reliability and then digitally sign the harvested information unit. Alternatively, a digital watermark may be used to verify the authenticity of an item of data. The report may include the values associated with the plurality of harvested information units, and information regarding any digital signatures and/or any digital watermarks that are associated with any of the harvested information units.
In another embodiment, the present invention comprises a method for authenticating information to facilitate financial transactions. The method may include: receiving a query to search a records database to obtain records for a queried entity, said records including an entity's name and one or more of the following: photographs for the entity, a government-issued identification number for the entity, and a passport number for the entity; initiating the search of the records database, and obtaining records for the queried entity, said records including the queried entity's name and one or more of the following: a photograph, a government-issued identification number, and a passport number; initiating a search of a plurality of remote datasources for information on the queried entity, and obtaining a plurality of harvested information units from the plurality of remote datasources; assigning a value to each of the plurality of harvested information units based upon an identity of the remote datasource from which the harvested information unit was obtained; and generating a report comprising the name of a queried entity, one or more records from the records database relating to the queried entity if they exist, and one or more harvested information units relating to the queried entity if they exist. The method may utilize the Internet to obtain information about the queried entity from one or more of the following sources: a newspaper; a governmental agency; a judicial court; a police department; and a bank. The method may also include updating the records database with the harvested information units relating to the queried entity and the values that are associated with each of the harvested information units. Optionally, the values being assigned to the information units may be based upon the remote datasource from which the harvested information unit was obtained and/or based upon an identity of a knowledge worker that obtained the information. The knowledge worker may be a person with expertise in assessing the accuracy of the harvested information unit, or may be a software program. The knowledge worker may also review a harvested information unit for reliability and then digitally sign the harvested information unit. Alternatively, a digital watermark may be used to verify the authenticity of an item of data. The report may include the values associated with the plurality of harvested information units, and information regarding any digital signatures and/or any digital watermarks that are associated with any of the harvested information units.
In another embodiment, the present invention comprises a method for populating a database. The method includes: inputting into a database an entity's name and one or more of the following: a photograph of the entity, a government-issued identification number for the entity, and a passport number for the entity if it exists; searching a plurality of remote datasources using a global network to obtain a plurality of harvested information units, said plurality of remote datasources including one or more of the following sources: a newspaper; a governmental agency; a judicial court; a police department; and a bank. A value is associated with each of the plurality of harvested information units based upon an identity of the remote database from which the harvested information unit was obtained, and storing the plurality of harvested information units into the database, together with each unit's associated value. Optionally, the values being assigned to the information units may be based upon the remote datasource from which the harvested information unit was obtained and/or based upon an identity of a knowledge worker that obtained the information. The knowledge worker may be a person with expertise in assessing the accuracy of the harvested information unit, or may be a software program. The knowledge worker may also review a harvested information unit for reliability and then digitally sign the harvested information unit. Alternatively, a digital watermark may be used to verify the authenticity of an item of data. The report may include the values associated with the plurality of harvested information units, and information regarding any digital signatures and/or any digital watermarks that are associated with any of the harvested information units.
In yet another embodiment, the present invention comprises a database. The database may include: a plurality of records, said records including an entity's name and one or more of the following if they exist: a photograph of the entity, a government-issued identification number for the entity, and a passport number for the entity; a plurality of harvested information units, which units were obtained through querying a plurality of remote datasources, said remote datasources including databases from at least the following sources: a newspaper; a governmental enforcement agency; a judicial court; a police department; and a bank; and a reliability index for each of the plurality of harvested information units, said index being a value that is associated with a harvested information unit based upon the remote database from which the harvested information unit was obtained. The reliability index may be based upon the remote datasource from which the harvested information unit was obtained and/or upon an identity of a knowledge worker that obtained the information. The database optionally includes a user interface to the database to accept a query from a user, said query comprising a request to obtain database information about a queried entity and/or a report generator to generate an output comprising the name of a queried entity, one or more records from the records database relating to the queried entity if they exist, and one or more harvested information units relating to the queried entity if they exist. The database may permit an adjustment to the reliability index of a harvested information unit based upon a review of the harvested information unit by a knowledge worker with expertise in assessing the accuracy of the harvested information unit. Preferably, the database can also store digital signatures and/or digital watermarks, which may be used to authenticate one or more portions of the database.
These and other embodiments are more fully described in the Detailed Description section. It is to be understood, however, that there is no intention to limit the invention to the forms described in this Summary of the Invention or in the Detailed Description. One skilled in the art can recognize that there are numerous modifications, equivalents, and alternative constructions that fall within the spirit and scope of the invention as expressed by this disclosure and in the claims. BRIEF DESCRIPTION of the DRAWINGS
Various objects, advantages, and a more complete understanding of the invention are readily appreciated in light of the following Detailed Description and to the appended claims, especially when taken in conjunction with the accompanying Drawings.
Figure 1 is a schematic diagram illustrating the architecture of an exemplary system for populating a database. The system can be used in a method for populating a topic-specific database. While separate containers representing the database are shown at the bottom, the database can be a single data repository with structured data indicating the source of the data or of each record or item of information.
Figure 2 is schematic diagram illustrating an exemplary system for authenticating information for use by a user and an exemplary method for populating a database. The "person" images do not necessarily represent persons, but can also be automated steps or modules. The fact that certain steps or processes are included in this diagram should not be taken as a requirement that any step be included in a system or method of the invention. A user here is represented by the Financial Service Provider example. An individual seeking a card or device to assist in the authentication of the person or the presence of a person is also exemplified. The key symbol represents an authentication and/or value assessment module or process. The lock symbol represents a digital signature or watermarking step or module. The External Authentication (EA) element can be a biometric authentication step, such as one associated with a fingerprint authentication device. An Entity Relationship Application refers to a process or module that identifies the ultimate beneficial owner of an asset or a corporate entity or other entity. The Intro page is an optional digitally stored file or document that summarizes the content of a particular item of information or collection of related items of information. The Intro page can include a bar code, other identification code, or other machine-readable code for ease of access, and can also include the date stamp and the type of information it is associated with.
Figure 3 is schematic diagram illustrating an exemplary system or method of the invention. Information or requests can be entered by a Financial Service Provider (FSP) or an Individual. Access to the system can be through an extranet and/or secure connection. The circled A represents a connection to the elements in Figure 2, and the circled B represents a connection to the elements of Figure 4.
Figure 4 is schematic diagram illustrating an exemplary system or method of the invention, here primarily a back-up for the elements and/or servers and/or data in Figure 3.
DETAILED DESCRIPTION
As noted above, the invention is not limited to any particular topic-specific information or any particular user or industry. As merely one example, the description below primarily addresses a financial service provider user or a database for personal or entity information for authenticating a financial transaction. A financial transaction is, as noted below, broadly defined as at least any purchase or transaction where funds or accounts should or are desired to be authenticated, or where some or part of the transaction must be reported to a government agency.
In one example of the invention, a system is produced to populate a database with information specific to financial transaction information. In this example, financial transaction information can be the identity of a person owning specific assets, listed as holder of a bank account, brokerage account, insurance policy, real estate, corporation, partnership, organization, or other related information. Personal information can be. government issued identification papers or documents, passports, driver's licenses, vehicle permits, professional licenses, military identification, or any related information. Another type of financial transaction information is information of any type that must be reported to a government agency or representative before, during, or after a transaction, such as a purchase or sale of real estate, purchase or sale of a vehicle, purchase or sale of a weapon or firearm, or any information that must be reported under the provisions or implementing rules of the USA Patriot Act, or any related information.
Whatever the type of information or topic the information relates to or is specific for, the information can be authenticated by an authentication agent, which includes a trained or licensed, agent or officer familiar with the identification of authentic and fraudulent information. In one example, financial transaction information can be authenticated by a compliance officer. The authentication agent or compliance officer can be represented by the term "knowledge worker."
In another example, medical data or medical records can be authenticated by a licensed physician or health care professional.
The authentication process can include a certification whereby the authenticated document or information is digitally signed and/or stamped with a watermark and/or certification. The method or technology used to stamp, sign, or watermark the information or document can be selected from any available or preferred. In preferred examples, the stamp, certification, or watermarking of the information or document bear the digital signature or indication of the compliance officer, knowledge worker, or other authentication agent.
All the information can be stored in a database, such as a computer database. A requester or user of the database can access the database to search for information related to a person, entity, or financial transaction in order to verify the identity of a person, asset, or ownership of an asset.
In another example, the database can also include information stored in a personal identification card or device. When the personal identification card or device is presented to a user of the database, the user can easily verify the identity of the person holding the card or device from the information in the database. This example can be used to resolve the security and verification concerns of a card-not- present transaction. Some devices, such as a mobile biometric device, can include authentication by personal presence at the device. Several biometric devices are available and can be selected for this purpose, including fingerprint reader or recognition devices.
Referring now to the drawings, Figure 1 generally depicts an exemplary system and method for populating a database. While the database(s) is/are shown as separate at the bottom, they can be and preferably would be part of a single data repository, where logical representation or structured data sets allow the identification of the source of the data. Consequently, we will use the terms "database" and "databases" interchangeably throughout this disclosure unless otherwise stated. Information flows into the databases from a variety of applications. A manual input application allows information gathered from manual reviews and/or investigative research to be entered as digital pages. In addition, manual review of information gleaned from other datasources, such as webpages, newspapers, police reports, FBI most wanted lists, outstanding warrants, arrest reports, civil complaints, and the like can be manually inputted. In addition, specific URL searches or specific unstructured datasource searches can provide information to include through manual input. Certain datasources can be routinely accessed and reviewed for information, for example on weekly or other schedules.
In many aspects, a summarizer process can be used to reduce any item of information to its relevant, topic-specific content. The summarizer function is represented by the "Information Reduction Engine," however other sources can be similarly summarized.
Similarly, the summarizer process can remove or hide certain personal information if privacy concerns dictate. Thus, the summarizer process and/or an additional process in any embodiment of the invention can prevent certain users from accessing certain information stored in a database of the invention. Privacy screens and security or limited access levels can be utilized in conjunction with the methods of the invention to protect, hide, or edit certain items of information or even items of information that may only be related to a particular request. Reports can therefore be tailored to contain particular sets or sub-sets of information stored in a database of the invention. For example, to prevent private information from being disclosed, a report can be tailored to contain the desired information, such as desired names or entities and information directly related thereto, while hiding other undesired or private information, such as other names also appearing in the database or information unit or information that is not topic-specific.
Any of the manual information can be summarized prior to inclusion or input. Manual input pages are created as computer-readable files with this information and the summaries. Each item of manual input information can be identified in the database as being from manual input source, and more particularly, what specific type or where the information came from and when. This is represented by the "Manual Entered Data" in the bottom of Figure 1. Public and private datasources can be searched for topic-specific information to include in the database. In a preferred aspect, a certain number of predetermined html datasources can be searched regularly through the use of an Access Scheduler. Any of a variety of web spiders or engines can be used for the retrieval purpose or Retrieval Engine. Alternatively, keyword searches can be performed routinely from a number of likely datasources or URLs. Any of the datasources can be unstructured datasources. Again, this information can be summarized by scrubbing to remove extraneous content. Thus, both the full datasource document and the summarized version can be stored in the database. These two data sets are represented by "Internet Data" and "Archived Web Sites" in the bottom of Figure 1.
Full text searching and indexing of datasources can also add items of information into the database. Items entered into the database from other datasources or from user requests can be introduced by one of many full text indexing or OCR methods. The I ndexer function represents one aspect of the items of information or records that can be input based upon this process or module.
The administrative Admin Functions of the system and methods can control a number of datasource access factors and content factors. For example, the administrative functions can control the specific URLs searched, the type of link, a specific date for a search, the local path to information, a specific entity or name to search for, a group of entities or names, and the type of content to search. Certain high value datasources can be accessed routinely to archive any topic-specific items. This is represented in the "Archive Web Sites" at the bottom of Figure 1.
Information can be assigned a relevance or weight figure or a "value" or simply stored into the database. The relevance or weight figure or value can be used in preparing the report to the user, so that information of the highest relevance or weight value can be sent to the user. Generally, the applicable date and source of any item of information is stored with that item of information so that a query of the database returns information from the database as well as the source of the information and when it was stored.
In general, items of information in the databases of the invention are stored as computer-readable files. The items can be reduced to digital storage media by scanning or digital image processing. Other information can be received from a digital source and stored as received. Information can also be collected from a source or received from a user, then encrypted and/or time stamped and/or watermarked to authenticate it. Methods for scanning, digital image processing, encrypting, time stamping, and watermarking are well known in the art.
Turning now in detail to the exemplary methods and systems of Figures 2-4, in one aspect Figure 2 represents a method for populating a database, in particular with financial transaction topic-specific information. In this aspect, Figure 2 shows how requests or documents submitted by Financial Service Providers or by Individuals can be incorporated as items of information in a database. In the case of a document (DOCS), such as a government issued identity document or tangible asset or bank account ownership document, the document is first prepared as a digital or computer-readable file, here represented by the "Scanner" step, however, as noted above, other methods beyond scanning can be used. Here, we refer to a "document" that is a digital or computer-readable file having the information of the original document or piece of information. Obviously, "documents" need not be only paper documents.
In one path for a document, after a digital or computer-readable file is created, an optional External Authentication process can be performed. A biometric device can be used for this purpose, such as a fingerprint authentication device.
For government ID type documents, an ID CARD can be created, which can be used, once authenticated, by an individual or financial service provider to verify information or assets related to a pending transaction. Through either scanning or digitally storing a file or mark, the document's accuracy and authenticity can be confirmed by a compliance officer or knowledge worker. A digital signature can represent the compliance officer involved. A compliance officer or knowledge worker can also assign a relevance value to an item of information or record. The knowledge worker process can also be performed by a software module that assigns a relevance value based upon the source of the item of information, the content of the item of information, or a combination of factors. In this example, an FBI most wanted list may represent a high relevance value, a large newspaper a medium relevance value, while some webpages a low relevance value. The criteria for automatically assigning a relevance value can be changed.
As noted, a card or a card with an associated biometric device can be issued to a person or entity for further use of the system or method of the invention. The Card Printer step represents this aspect in Figure 2.
In Figures 3 and 4, the information requested or submitted by a Financial Service Provider (FSP) or Person or Individual can be submitted to the system through a secure connection or extranet. While not explicitly shown, all information in the databases here and elsewhere for this invention can be encrypted or otherwise secured. The databases (DB) listed in these figures again represent logical representation or structured data and not necessarily separate databases or servers. The SAN Network can be backed up on tape (LTO Library). The Docs Capture step or module represents a digital storage step or OCR module for the inputted request or information. As in Figure 1 , Content Management functions can define the topic- specific information, can represent a search through the database, or can further define sets or sources of items or information.
Finally, those skilled in the art will appreciate that the systems, methods, and databases described here can be modified beyond the specific architecture of the Figures and definitions given. One of skill in the art is familiar with ways to manipulate and use databases, systems, and methods.
There is no intention to limit the invention to the disclosed exemplary forms. Many variations, modifications and alternative constructions fall within the scope and spirit of the disclosed invention as expressed in the claims.

Claims

WHAT IS CLAIMED IS:
1. A system for authentication of information for use by a user, comprising: a database having a plurality of records, said records including an entity's name and one or more of the following: photographs for the entity, a government- issued identification number for the entity, and a passport number for the entity; a user interface to the database to accept a query from a user, said query comprising a request to obtain database information about a queried entity; a database search engine to search the records database and to obtain records for the queried entity; a data-seeking module to query a plurality of remote datasources for information on the queried entity, said data-seeking module producing a plurality of harvested information units from one or more remote datasources; a reliability assessment module to assign and associate a value to each of the plurality of harvested information units based upon the remote database from which the harvested information unit was obtained; and a report generator to generate an output comprising the name of a queried entity, one or more records from the database relating to the queried entity, and one or more harvested information units relating to the queried entity.
2. The system of claim 1 , wherein the data-seeking module uses the Internet to obtain information about the queried entity from one or more of the following sources: a newspaper; a governmental agency; a judicial court; a police department; and a bank.
3. The system of one of claims 1 -2, further comprising: an update module to update the database with harvested information units relating to the queried entity and the values that are associated with each of the harvested information units.
4. The system of one of claims 1-4, wherein the reliability assessment module assigns and associates a value to each of the plurality of harvested information units based upon the remote datasource from which the harvested information unit was obtained and/or based upon a knowledge worker that obtained the information.
5. The system of claim 4, wherein the knowledge worker is a software program.
6. The system of claim 4, wherein the knowledge worker is a person who reviews the harvested information unit for completeness or accuracy.
7. The system of one of claims 1-6, wherein the reliability assessment module permits an adjustment to the value assigned and associated to a harvested information unit based upon a review of the harvested information unit by a / knowledge worker with expertise in assessing the accuracy of the harvested information unit.
8. The system of one of claims 1-7, wherein the reliability assessment module permits a knowledge worker to review a harvested information unit for reliability and to digitally sign the harvested information unit.
9. The system of one of claims 1-8, wherein the reliability assessment module permits a knowledge worker to review a harvested information unit for reliability and to digitally watermark the harvested information unit to verify its authenticity.
10. The system of one of claims 1-9, wherein the queried entity is a corporation, and the output comprises one or more names of the corporation's shareholders, one or more records from the database relating to a corporation's shareholders, and one or more harvested information units relating to the corporation's shareholders.
11. The system of one of claims 1-10, wherein the report also contains the values associated with the plurality of harvested information units, and optionally does not contain undesired names or information.
12. The system of one of claims 1-10, wherein the report also contains information regarding any digital signatures and any digital watermarks that are associated with any of the harvested information units.
13. A method for authenticating information to facilitate financial transactions comprising: receiving a query to search a database to obtain records for a queried entity, said records including an entity's name and one or more of the following: photographs for the entity, a government-issued identification number for the entity, and a passport number for the entity; initiating the search of the database, and obtaining records for the queried entity, said records including the queried entity's name and one or more of the following: a photograph, a government-issued identification number, and a passport number; initiating a search of a plurality of remote datasources for information on the queried entity, and obtaining a plurality of harvested information units from the plurality of remote datasources; assigning a value to each of the plurality of harvested information units based upon an identity of the remote datasource from which the harvested information unit was obtained; and generating a report comprising the name of a queried entity, one or more records from the database relating to the queried entity, and one or more harvested information units relating to the queried entity.
14. The method of claim 13, wherein the report also contains the values associated with the plurality of harvested information units.
15. The method of one of claims 13-14, wherein the search of remote datasources includes a database for one or more of the following sources: a newspaper; a governmental agency; a judicial court; a police department; and a bank.
16. The method of one of claims 13-15, further comprising: updating the database with the harvested information units relating to the queried entity and the values that are associated with each of the harvested information units.
17. The method of one of claims 13-16, wherein the step of assigning a value comprises assigning and associating a value to each of the plurality of harvested information units based upon the remote datasource from which the harvested information unit was obtained and/or based upon a knowledge worker that obtained the information.
18. The method of one of claims 13-17, further comprising: adjusting the value assigned and associated to a harvested information unit based upon a review of the harvested information unit by a knowledge worker with expertise in assessing the accuracy of the harvested information unit.
19. The method of one of claims 13-18, further comprising: digitally signing a harvested information unit.
20. The method of one of claims 13-18, further comprising: digitally watermarking a harvested information unit to verify its authenticity.
21. The method of one of claims 13-20, wherein the report also contains information regarding any digital signatures or any digital watermarks that are associated with any of the harvested information units.
22. A method for populating a database comprising: inputting into a database an entity's name and one or more of the following: a photograph for the entity, a government-issued identification number for the entity, and a passport number for the entity; searching a plurality of remote datasources using a global network to obtain a plurality of harvested information units, said plurality of remote datasources including one or more of the following sources: a newspaper; a governmental agency; a judicial court; a police department; and a bank; associating a value to each of the plurality of harvested information units based upon an identity of the remote datasource from which the harvested information unit was obtained; and storing the plurality of harvested information units into the database, together with each unit's associated value.
23. The method of claim 22, wherein the step of associating a value comprises associating" a value to each of the plurality of harvested information units based upon the remote datasource from which the harvested information unit was obtained and/or based upon a knowledge worker that obtained the information.
24. The method of one of claims 22-23, further comprising: adjusting the value associated to a harvested information unit based upon a review of the harvested information unit by a knowledge worker with expertise in assessing the accuracy of the harvested information unit.
25. The method of one of claims 22-24, further comprising: digitally signing a harvested information unit before its storage into the database
26. The method of one of claims 22-24, further comprising: digitally watermarking a harvested information unit to authenticate the unit before its storage into the database.
27. The method of one of claims 22-26, wherein the step of searching a remote datasource comprises searching at least one remote database for each of the following sources: a newspaper; the FBI; a judicial court; a police department; and a bank.
28. The method of one of claims 22-27, wherein the step of inputting information comprises: digitally scanning a document to create scanned data that identifies the individual; inputting into a database the scanned data that identifies the individual; inputting into the database one or more of the following additional identification information: a photograph of the individual, a government issued ID number for the individual, and a passport number for the individual; associating in the database the scanned data that identifies the individual with the one or more additional identification information.
29. The method of claim 28, further comprising: digitally signing one or more portions of data being entered into the database.
30. The method of claim 1 , wherein the step of searching a plurality of remote datasources comprises utilizing an internet connection to access the plurality of remote datasources.
31. A database comprising a plurality of records, said records including an entity's name and one or more of the following: photographs for the entity, a government-issued identification number for the entity, and a passport number for the entity; a plurality of harvested information units, which units were obtained through querying a plurality of remote datasources, said remote datasources including databases from at least the following sources: a newspaper; a governmental enforcement agency; a judicial court; a police department; and a bank; and a reliability index for each of the plurality of harvested information units, said index being a value that is associated with a harvested information unit based upon the remote database from which the harvested information unit was obtained;
32. The database of claim 31 , wherein the reliability index is based upon the remote database from which the harvested information unit was obtained and upon an identity of a knowledge worker that obtained the information.
33. The database of claim 31 , further comprising a date stamp for each harvested information unit, representing the date the unit was entered into the database.
34. The database of one of claims 31-33, further comprising: a user interface to the database to accept a query from a user, said query comprising a request to obtain database information about a queried entity; and a report generator to generate an output comprising the name of a queried entity, one or more records from the records database relating to the queried entity, and one or more harvested information units relating to the queried entity.
35. The database of one of claims 31-34, further comprising: an interface to adjust the reliability index of a harvested information unit based upon a review of the harvested information unit by a knowledge worker with expertise in assessing the accuracy of the harvested information unit.
36. The database of one of claims 31-35, further comprising: a digital signature that authenticates one or more portions of the database.
37. The database of one of claims 31-35, further comprising: a digital watermark that authenticates one or more portions of the database.
PCT/US2004/033202 2003-10-10 2004-10-08 Examiner WO2005038583A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US50989803P 2003-10-10 2003-10-10
US60/509,898 2003-10-10

Publications (2)

Publication Number Publication Date
WO2005038583A2 true WO2005038583A2 (en) 2005-04-28
WO2005038583A3 WO2005038583A3 (en) 2006-07-20

Family

ID=34465116

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2004/033202 WO2005038583A2 (en) 2003-10-10 2004-10-08 Examiner

Country Status (1)

Country Link
WO (1) WO2005038583A2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014150692A1 (en) * 2013-03-15 2014-09-25 Robert Andrew Eckel System and method for transaction authentication
US9481197B2 (en) 2013-06-05 2016-11-01 Morphotrust Usa, Llc System and method for credential authentication
US10311435B2 (en) 2013-03-28 2019-06-04 Morphotrust Usa Llc System and method for transaction authentication

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5924074A (en) * 1996-09-27 1999-07-13 Azron Incorporated Electronic medical records system
US6021202A (en) * 1996-12-20 2000-02-01 Financial Services Technology Consortium Method and system for processing electronic documents
US20030097349A1 (en) * 2001-11-21 2003-05-22 Ge Financial Assurance Holdings, Inc. Method and system for verifying and correcting data records in a database

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5924074A (en) * 1996-09-27 1999-07-13 Azron Incorporated Electronic medical records system
US6021202A (en) * 1996-12-20 2000-02-01 Financial Services Technology Consortium Method and system for processing electronic documents
US20030097349A1 (en) * 2001-11-21 2003-05-22 Ge Financial Assurance Holdings, Inc. Method and system for verifying and correcting data records in a database

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014150692A1 (en) * 2013-03-15 2014-09-25 Robert Andrew Eckel System and method for transaction authentication
US10311435B2 (en) 2013-03-28 2019-06-04 Morphotrust Usa Llc System and method for transaction authentication
US10943233B2 (en) 2013-03-28 2021-03-09 Morphotrust Usa, Llc System and method for transaction authentication
US11625721B2 (en) 2013-03-28 2023-04-11 Idemia Identity & Security USA LLC System and method for transaction authentication
US9481197B2 (en) 2013-06-05 2016-11-01 Morphotrust Usa, Llc System and method for credential authentication
US10037460B2 (en) 2013-06-05 2018-07-31 Morphotrust Usa, Llc System and method for credential authentication
US10474891B2 (en) 2013-06-05 2019-11-12 Morphotrust Usa, Llc System and method for credential authentication

Also Published As

Publication number Publication date
WO2005038583A3 (en) 2006-07-20

Similar Documents

Publication Publication Date Title
US7676426B2 (en) Biometric risk management
US9331997B2 (en) Systems and methods for managing disclosure of protectable information
US20080109875A1 (en) Identity information services, methods, devices, and systems background
US20100161816A1 (en) Identity information services, methods, devices, and systems
US7979908B2 (en) Method and system of verifying and authenticating background and consumer records
US6567789B1 (en) Method and system for electronic exchange of tax information
US8701185B2 (en) Method for locating fraudulent replicas of web sites
US20080082432A1 (en) Method for managing tax return information
US20140344130A1 (en) Systems And Methods For Automated Political Risk Management
Dempsey et al. Commercial data and national security
US20050010600A1 (en) System and method for electronically managing composite documents
US20050209892A1 (en) [Automated system and method for providing accurate, non-invasive insurance status verification]
US20080167883A1 (en) Method and System for Monitoring and Protecting Real Estate Title (Ownership) Against Fraudulent Transaction (Title Theft) and Mortgage Fraud
JP2010267292A (en) Digital asset management, targeted searching and desktop searching using digital watermark
WO2006002179A2 (en) Evaluating the relevance of documents and systems and methods therefor
US9424278B2 (en) Methods of searching public information for sales leads
Romano VI. Electronic Evidence and the Federal Rules
WO2005038583A2 (en) Examiner
Sødring et al. Publishing and using record-keeping structural information in a blockchain
WO2004001544A2 (en) Biometric risk management
Weisbord et al. The Commodification of Public Land Records
Ives et al. Anything you search can be used against you in a court of law: Data mining in search archives
US20100250628A1 (en) Identity Confidence Framework
US20220171881A1 (en) Digital file forensic accounting and management system
Harrison The digital detective: An introduction to digital forensics.

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase