G07D7/206

Systems and methods for updating an image registry for use in fraud detection related to financial documents

A system comprising: a check Image Record (CIR) database configured to store, for each of a plurality of accounts, a CIR, wherein each CIR comprises feature information related to features extracted from a plurality of reference checks associated with the associated account of the plurality of accounts; memory configured to store instructions; and a processor coupled with the CIR database and the memory, the processor configured to run the instructions, which cause the processor to: receive an image of a test check associated with an account of the plurality of accounts, extract feature information from the image, compare the features with the feature information stored in the CIR database for the account associated with the test check, generate a fraud score, and update each CIR by determining.

Facial liveness detection with a mobile device

A system for remote identification of users. The system uses deep learning techniques for authenticating a user from an identification document, using automated verification of identification documents and detection that a live person identified by the document is present. Liveness of a user indicated by the identification document may be determined with a deep learning model trained for identification of facial spoofing attacks. The deep learning model may be trained using training data extracted from facial feature locations of training images.

Devices, systems, and methods for optical validation

Existing currency validation (CVAL) devices, systems, and methods are too slow, costly, intrusive, and/or bulky to be routinely used in common transaction locations (e.g., at checkout, at an automatic teller machine, etc.). Presented herein are devices, systems, and methods to facilitate optical validation of documents, merchandise, or currency at common transaction locations and to do so in an obtrusive and convenient way. More specifically, the present invention embraces a validation device that may be used alone or integrated within a larger system (e.g., point of sale system, kiosk, etc.). The present invention also embraces methods for currency validation using the validation device, as well as methods for improving the quality and consistency of data captured by the validation device for validation.

Devices, systems, and methods for optical validation

Existing currency validation (CVAL) devices, systems, and methods are too slow, costly, intrusive, and/or bulky to be routinely used in common transaction locations (e.g., at checkout, at an automatic teller machine, etc.). Presented herein are devices, systems, and methods to facilitate optical validation of documents, merchandise, or currency at common transaction locations and to do so in an obtrusive and convenient way. More specifically, the present invention embraces a validation device that may be used alone or integrated within a larger system (e.g., point of sale system, kiosk, etc.). The present invention also embraces methods for currency validation using the validation device, as well as methods for improving the quality and consistency of data captured by the validation device for validation.

Reader device and identification device
11295094 · 2022-04-05 · ·

An input and output controller transmits timing signals respectively to sensor modules based on unit conveyance distances of the respective sensor modules and a predetermined order of the sensor module. The sensor modules reads, in response to the timing signals, identification information included in an object and respectively generates read data and. The input and output controller acquires the read data respectively generated by the sensor modules and respectively outputs the read data in the predetermined order.

Securing composite objects using digital fingerprints
11238146 · 2022-02-01 · ·

A system comprises a combination of digital fingerprint authentication techniques, processes, programs, and hardware to facilitate highly reliable authentication of a wide variety of composite physical objects. “Composite” in this case means that there are distinct regions of the object that must be authenticating individually and in tandem to authenticate the entire object. Preferably, a template is stored that defines for a class of objects what regions must be found, their locations, optionally semantic content of the regions, and other criteria. digital fingerprinting is utilized to locate and attempt to match candidate regions by querying a database of reference object records.

IMAGE BASED NOVELTY DETECTION OF MATERIAL SAMPLES

Systems and methods for detecting/identifying novel material samples are provided. A test sample image is processed with a trained transformation function to obtain a transformed matrix. A measure of similarity of the test image based on the transformed matrix is compared to a threshold to determine whether the test sample is novel to a batch of material samples that are provided to train the transformation function.

SYSTEMS AND METHODS FOR VISUAL VERIFICATION
20210264424 · 2021-08-26 ·

A system comprising: a document holder; an image sensor directed toward the document holder; a polarized filter between the image sensor and the document holder; a filter motor configured to rotate the polarized filter; one or more processors; and at least one memory having stored thereon computer program code that, when executed by the one or more processors, instructs the one or more processors to: control the filter motor to rotate the polarized filter; control the image sensors to capture a plurality of images of a document within the document holder, the plurality of images corresponding to a respective relative orientations of the polarized filter to the document; identify a feature of the document; and output, in response comparing respective visual characteristics of the feature of the document to corresponding expected visual characteristics of the first feature for the document, an indication of a verification of the document.

Verification of a security document

A method for verifying a security document by means of a reading device wherein first transmission and/or reflection properties of a first region of the security document are detected in a first spectral range by the reading device and a first data set specifying these properties is generated therefrom, wherein the first region at least in some regions overlaps an optical security element arranged on the security document or embedded in the security document and wherein second transmission and/or reflection properties of the first region of the security document are detected in a second spectral range by the reading device and a second data set specifying these properties is generated therefrom, wherein the first spectral range differs from the second spectral range, and wherein, the authenticity of the security document and/or of the security element is checked on the basis of at least the first data set and the second data set.

Verification of a security document

A method for verifying a security document by means of a reading device wherein first transmission and/or reflection properties of a first region of the security document are detected in a first spectral range by the reading device and a first data set specifying these properties is generated therefrom, wherein the first region at least in some regions overlaps an optical security element arranged on the security document or embedded in the security document and wherein second transmission and/or reflection properties of the first region of the security document are detected in a second spectral range by the reading device and a second data set specifying these properties is generated therefrom, wherein the first spectral range differs from the second spectral range, and wherein, the authenticity of the security document and/or of the security element is checked on the basis of at least the first data set and the second data set.