System and Method for Preventing Wet Signature Legal Documents, and the Agency Relationships they Create, from Being Used to Perpetrate Fraud and Financial Abuse

20220405364 · 2022-12-22

Assignee

Inventors

Cpc classification

International classification

Abstract

A system and method for securing and authenticating legal documents and agency relationships to prevent each from being used to perpetrate fraud and financial abuse, including a network server having a processor and memory and an executable program with code stored in said memory and configured for bidirectional communication with a plurality of network connectable devices through the Internet to accept requests from notaries and registered members to register digital copies of wet signature legal documents.

Claims

1. A system and method for securing and authenticating legal documents and agency relationships to prevent each from being used to perpetrate fraud and financial abuse, comprising the steps of: providing a network server having a processor and memory and an executable program with code stored in said memory, wherein said server and said executable program are configured for bidirectional communication with a plurality of network connectable devices through the Internet, and further wherein said server and said executable program, (a) accept registration requests from notaries to register with the system so as to enable registered notaries to enter notarizations into said system and, for qualifying notaries, to register the notary in the system; (b) register members who have connected with said network server using a network-connectable device and who have provided qualifying registration information; (c) register digital copies of wet signature legal documents provided by registered members (“registered documents”); (d) accept and save instructions from registered members relating to registered documents, including, at a minimum, (i) the title of the document; (ii) the date of document execution; (iii) the parties identified in the or beneficiaries under the document; (iv) the persons who have power to amend or revoke the document; (v) the amendment history of the document; (vi) a list of trusted persons and their contact information, the trusted persons being those to whom alerts are sent on the occurrence of a predetermined and specified events; (e) assign an identification number (IDN) to the registered document; (f) accept notarized documents from registered notaries; and (g) automatically generating and transmitting an alert to trusted persons on the occurrence of any of the predetermined and specified events of substep (d)(iv).

2. The system and method of claim 1, wherein the step (a) registration of notaries includes: providing a registration page accessible through the internet for prospective notaries to register with the system; accepting identifying and qualifying information from the prospective notary, an individual natural person, including at least the name and notary number; if the notary is invalid, preventing access to any successor pages in the registration system and prompting the prospective notary to address the disqualifying issue and return to registration thereafter; if the notary is valid, prompting the prospective notary to swear an oath that the information provided is true and accurate; if the notary is valid, automatically generating and transmitting an email to the prospective notary detailing the next steps in the registration process and advising that a verification code will be mailed to their address on file with the Secretary of State; providing a link for a valid notary to pay for the registration; setting up a login for the prospective notary; sending a communication with a verification code to the prospective notary; enabling the prospective notary to log in to the system to input the verification code provided, thereby activating the registration; generating and recording a notary number (INN) for the newly registered notary; and adding the registered notary to a system email list for sending information and system updates; wherein when the foregoing steps are complete, the registered notary is able to log in to the system to enter notarizations into the system.

3. The system and method of claim 2, further including the step of sending the newly registered notary an introductory video on system use via email or text.

4. The system and method of claim 2, wherein the step (c) registration of digital copies of wet signature legal documents provided by registered members is directed to registration of an estate planning trust and includes: enabling a registered member to login to the system; providing access to the registered member a trust registration webpage; providing to the registered member at the trust registration webpage a hyperlink prompting the registered member to register a trust; providing the registered member a system of successive prompts through which the registered member may provide answers to a series of questions having information that may qualify a document for registration in the system, the information including the name of the trust, the date the trust was signed, the number of people involved in the creation of the trust, the individuals who have authority to amend or revoke the trust, the primary trustor Social Security Number identified when filing trust federal tax returns, the number of times the trust has been previously amended, the dates and times of the prior amendments, the names of the current trustees, the number of trustee signatures required for trust actions, the express powers of the trustees, the identity of successor trustees, and a listing of trusted persons to whom alerts are to be sent on the occurrence of predetermined specified events, including full contact information; generating a document number for the document and assigning it to the document; generating and attaching to the numbered document a trust amendment that specifies kinds of occurrences, predetermined and specified events (“triggering events”), that will generate an automatic alert to be sent to the trusted persons and authorizing the system administrator to send such alerts on the happening of such triggering events; generating a certification of trust; accepting and saving the document when uploaded by the registered member; recording and storing the document in the system server; and transmitting the generated trust amendment and certification of trust to the registered member.

5. The system and method of claim 4, wherein the predetermined and specified events that cause an alert to be automatically generated and sent to trusted persons include the initial trust registration itself, amendment of a registered trust, a revocation or rescission of a registered trust, a change in the list of trusted persons, a change in a trustee, an exercise of a power of appointment, and the removal of a trust from the registry.

6. The system and method of claim 5, wherein in response to an initial trust registration, the system software generates a special email and transmits the email to each trusted person to inform them that they have been nominated by the trustor(s) to act in the capacity of a trusted person, the email including an invitation to each trusted persons to create an account in the system.

7. The system and method of claim 5, wherein in response to the occurrence of any one or more of the specified and predetermined events, an alert is sent to all trusted persons notifying them of the fact of the occurrence.

8. The system and method of claim 1, wherein step (f), accepting notarized documents, includes: transmitting to a registered member a message directing the registered member to consult a listing of geographically proximate registered notaries to consult or advising the registered member to contact a system administrator to obtain a listing of registered notaries; after the registered member has contacted the registered notary, signed documents in the registered notary's presence, obtained a signature acknowledgement from the registered notary, allowing login access to the registered notary to provide notarization information; matching the notarial process to registered documents using the IDN assigned at step (e); obtaining from the registered notary an affidavit requiring the registered notary to provide answers to a succession of questions, including the number of documents signed, the document titles, the number of pages in each document, indicated by title, how the registered notary was contacted, who paid for the registered notary services, where the signing took place, and the individuals present at the place of signing; and accepting a submitted affidavit when all affidavit questions are answered and the registered notary requests to submit the affidavit.

9. An internet-based system for securing and authenticating wet signature legal documents, and the agency relationships they create, from being used to perpetrate fraud or financial abuse or from interference with those agency relationships, comprising: a server having a server processor, memory configured to store executable software, wherein said system and said executable program are configured for bidirectional communication with a plurality of network connectable devices through the Internet, and further wherein said server and said executable program are configured to, (a) receive and record “sign-up” or registration data from one or more users of network-connectable devices through which data can be input and transmitted, wherein once the sign-up data is received and recorded, the user is a “Registered Member”; (b) receive and record information from legal notaries, verifying the veracity of identifying information for the notary and the validity of the notary, assigning a notary number to the notary, and registering the notary so as to provide authorization for the notary to enter data and images into said system; (c) receive and register digital copies of wet signature legal documents (“Registered Documents”) from Registered Members registered through step (a) as well as information relating to such Registered Documents, including, among other things, (i) the name of the legal document; (ii) the date the document was executed; (iii) the parties or beneficiaries under the document; (iv) the persons who have power to amend or revoke the document; (v) the amendment history of the document; (vi) a list of trusted persons and their contact information (“Trusted Persons”), the Trusted Persons being those to whom alerts are to be sent on the occurrence of a triggering event, which include, inter alia, an attempt to amend, modify, revoke or rescind, change Trusted Persons, change a trustee, exercise a power of appointment, remove the trust from the registry, or in any way change the Registered Document (“triggering events”); (vii) a statement prohibiting any future amendment, revocation, change in trustee, change in the designation of Trusted Persons, exercise of power of appointment, and removal of trust from said registry, specifying that the exercise of any power of appointment contained in the Registered Document that affects the terms, corpus, parties, beneficiaries under the document, is invalid or ineffective unless and until such acts are also registered in said system; (d) save the Registered Documents registered in step (c) as business records within said system memory; (e) assign Registration Numbers to the Registered Documents and agency relationships to put third parties on notice that a Registered Document or agency relationship is registered in and can be verified through said system; and (f) on the occurrence of any one or more of the triggering events occurs, using said executable code to automatically send an alert to the Registered Member and the registered Member's designated Trusted Persons advising the alert recipients about the fact and nature of any change or proposed change, thereby assuring the validity of data through both the Registered Member and the Trusted Persons concurrently with the triggering event.

10. The system and method of claim 9, further including step (c)(viii), receiving and registering an express request and instructions from the Registered Member to have Trusted Persons notified in the event of the occurrence one or more of the triggering events.

11. The system and method of claim 9, further including the step of receiving and recording information concerning notarial acts from notaries, the information including, inter alia, the person or entity who contacted the notary, when and where the notarial act took place, who was present during the notarial act, and who paid for the notarial act.

12. The system and method of claim 11, further including a method of instantly verifying notarial acts of notaries registered under step (b), comprising: assigning a number (an “IDN”) or a QR code to a notarial acknowledgment; receiving data in real time from the registered notary; associating the data with the IDN or QR code; providing access through said system to enable users to confirm the document title, date, notary, signatory, and filed declaration connected with the notarized document bearing the IDN or QR code.

13. The system and method of claim 9, wherein the wet signature legal documents and agency relationships secured and authenticated with said system and method includes trusts, wills, deeds, and powers of attorney.

14. The system and method of claim 9, further including the steps of providing and accepting subscriptions from financial institutions and upon request from a financial institution, providing clearinghouse services by confirming and updating changes in trusteeship for Registered Documents that are trusts.

15. The system and method of claim 9, further including the steps of providing and accepting subscriptions from financial institutions and upon request from a subscribing financial institution, providing clearinghouse services by confirming and updating changes in powers of attorney for Registered Documents that are powers of attorney.

Description

BRIEF DESCRIPTION OF SEVERAL VIEWS OF THE DRAWINGS

[0054] The invention will be better understood and objects other than those set forth above will become apparent when consideration is given to the following detailed description thereof. Such description makes reference to the annexed drawings wherein:

[0055] FIG. 1 is a highly schematic functional diagram showing exemplary network infrastructure for implementing the inventive system and method for preventing wet signature legal documents, and the agency relationships they create, from being used to perpetrate fraud and financial abuse;

[0056] FIG. 2 is a block diagrammatic top level critical path flow chart showing system functions at a highly abstract level;

[0057] FIG. 3 is a flow chart showing the Illuminotary registration process as implemented in the inventive system, i.e., how notaries sign up to obtain authorization to participate in the system as “Illuminotaries”;

[0058] FIG. 4 is a flow chart showing a second critical path in the system directed to how a Member (e.g., a trustor) signs up and registers an estate planning document in the registry;

[0059] FIG. 5 is a flow chart showing a third critical path in the system, namely, how the notarization process works when executed in the inventive system;

[0060] FIG. 6 is a flow chart stack showing a fourth critical path in the inventive system, namely those events that trigger the transmission of notifications to the Trusted Persons in a Member's list of Trusted Persons;

[0061] FIG. 7 is a block diagrammatic flow chart showing a fifth critical path in the inventive system, namely, the information accessible to financial institutions authorized to obtain and review up-to-date estate planning documents and information;

[0062] FIG. 8 is a flow chart showing the login/sign in process of a Member (e.g., a trustor), as implemented in the inventive system;

[0063] FIG. 9 is a block diagrammatic top level critical path flow chart showing the trust registration process at a highly abstract level from the perspective of the system, and incorporating FIGS. 8, 11, 15, and 19 therein;

[0064] FIG. 10 is a block diagrammatic top level critical path flow chart showing the trust registration process at a highly abstract level from the perspective of the Member, and incorporating FIGS. 8, 11, 17, and 20 therein;

[0065] FIG. 11 is a flow chart showing the questionnaire and associated logic required for trust registration from all perspectives;

[0066] FIG. 12 is a is a block diagrammatic top level critical path flow chart showing the process for registering a new document to the system from the perspective of the system and incorporating FIGS. 14, 15, and 19 therein;

[0067] FIG. 13 is a block diagrammatic top level critical path flow chart showing the process for registering a new document to the system from the perspective of the Member and incorporating FIGS. 14, 17, and 20 therein;

[0068] FIG. 14 is a flow chart showing the questionnaire and associated logic required for registering a new document from all perspectives;

[0069] FIG. 15 is a flow chart showing the Illuminotarization process as implemented in the inventive system from the perspective of the system and incorporating FIG. 18 therein;

[0070] FIG. 16 is a flow chart showing the Illuminotarization process as implemented in the inventive system from the perspective of the Illuminotary and incorporating FIG. 18 therein;

[0071] FIG. 17 is a flow chart showing the Illuminotarization process as implemented in the inventive system, from the perspective of the Member;

[0072] FIG. 18 is a flow chart showing the questionnaire and associated logic required for Illuminotarization from all perspectives;

[0073] FIG. 19 is a flow chart showing the process and logic for uploading an Illuminotarized document from the perspective of the system;

[0074] FIG. 20 is a flow chart showing the process and logic for uploading an Illuminotarized document from the perspective of the Member;

[0075] FIG. 21 is a flow chart showing the process and logic for the Illuminotary registration specifically from the perspective of the system; and

[0076] FIG. 22 is a flow chart showing the process and logic for the Illuminotary registration specifically from the perspective of the Illuminotary.

DETAILED DESCRIPTION OF THE INVENTION

[0077] Referring to FIGS. 1 through 7, wherein like reference numerals refer to like components in the various views, there is illustrated therein a new and improved system and method for preventing wet signature legal documents, and the agency relationships they create, from being used to perpetrate fraud and financial abuse.

[0078] Referring first to FIG. 1, there is shown an embodiment of the inventive system in an exemplary network infrastructure 10. From the background discussion, it will be immediately evident that the system is intended for use on a large scale by the subscribing Members of the general public. Thus, it is contemplated that the system will find its natural expression online and on the internet, accessed by users through the World Wide Web using any of a wide variety of input devices, such as a personal data assistant or mobile/cellular phones 12, discrete laptops, tablet, or desktop computers 14, or similar network-connected data processing devices 16 connected through separate local area networks 18, either directly through wired connection or through wireless telecommunications systems and networks 22, 24. System software for the inventive system (including the registry itself and the registry management system that accesses the registry) may be hosted on a server processor having memory, a processor connected to the memory, and executable program stored in memory. The server process may be maintained on-site 26 by a system administrator, or it may be operated on a remote processor in a cloud-enabled telecommunications network 28, still under system administrator management and control, and all in a manner well known in the art, the details for which are thus unnecessary.

[0079] FIG. 2 shows the top-level critical path 30 of the Document and Agency Registry and Clearinghouse by Illuminote (“DARCI”) system, which system bears a proprietary name of Illuminote. At step 32 in the inventive Illuminote system, a notary, using a network connected device, accesses the Illuminote website and enters the information necessary to register and participate as an Illuminotary in the system. [Notary registration details are set out more fully in FIG. 3.] At step 34, the system administrator automatically verifies the information provided by the candidate Illuminotary and 36, creates and stores an Illuminote notary number (INN) 38, and stores the Illuminotary's email information 40 to ensure transmission of system updates to the newly authorized and registered Illuminotary as such updates become available.

[0080] In the instant case, the term “Member” refers to a person who registers estate planning documents for protection under the Illuminote system. At step 42, a Member using a network connected device connects to the system server through the system website and purchases a subscription to use the system services. [Details of the Member subscription process are set out more fully in FIG. 4.] The system provides the Member with a member number 44 and stores the number in system memory. 46.

[0081] The Member is then provided a series of questions to answer regarding the particulars of their trust to be registered. The system generates and assigns an 8-digit alphanumeric DARCI number to the trust. With the Member information provided, including a listing of Trusted Persons to whom notices are to be sent, the system responds by generating a Registration Amendment to the trust and a Certification of Trust 48, each of which is assigned by the system its own unique IDN. At this time, the Member is instructed to print the documents and provided with direction to locate an Illuminotary 50 and, ultimately, for later upload 52.

[0082] Before uploading a notarized document, the Member must locate and arrange a personal meeting 54 with the Illuminotary. At the Illuminotary event, at step 56 the Illuminotary logs into his/her account and inputs the IDN(s) of the documents that are to be Illuminotarized 420, Upon receipt of the IDNs, the system generates an access code and emails or texts it to the Member 422, who provides it to the Illuminotary to enter. Once entered, the Illuminotary can proceed forward with the notarial process as provided by law. At the conclusion of the notarial process, the Illuminotary answers system generated questions regarding the circumstances of the notarial act 58 using a network connected device. The Illuminotary is queried about the accuracy of his/her answers and affirms under penalty of perjury that the answers given are accurate. At that time, the system updates the status of each IDN from “issued” to “completed” and the system is ready to receive uploads of pictures of the documents. 60 The Member may then upload and save the Illuminotarized document(s) in the system. Once completed, the system administrator will verify 62 that the uploaded document and the notarization meet system requirements. [Details on the notarization process, as well as subsequent entry of the notarization and uploading of the notarized document, are set out in FIG. 5.]

[0083] Thereafter, should one or another of several predetermined triggering events occur, notifications are sent to the Trusted Persons 64 identified by the Member at the time the subscription commenced. [Details on such triggering events are set out more fully in FIG. 6.]

[0084] FIG. 3 is a flow chart showing the system operation 70 for notaries to sign up and obtain authorization to participate in the Illuminote system. At step 72 a prospective Illuminotary accesses the system webpage 74. He or she is presented with an active hyperlink which, when clicked 74, takes the prospect to a sign-up page 76. The page includes information about what an Illuminotary is and does and provides a button for the prospect to indicate their wish to become an “Illuminotary”, i.e., a notary authorized to participate in the system and to notarize Illuminote documents.

[0085] At the registration page, the notary prospect inputs critical identifying and qualifying information 78, including name and notary number. An invalid notary will be prevented from accessing successor pages in the registration process and will be prompted 80 to update and/or renew the commission and return thereafter. If the notary is valid, the prospect will be prompted to swear an oath that the information provided is true and accurate 82. Again, if the notary is valid, the system will automatically generate and transmit an email to the prospect 84 detailing the next steps and advising them a verification code will be mailed to their address on file with the Secretary of State, and a link to pay for the registration and to set up the notary login. When the notary pays the registration fee and creates a login 92, a postcard is sent with a verification code 86, 88, 90. The new notary (now an “Illuminotary”) then logs in to the system to input the verification code provided, and this activates the registration 94. The system backend generates and records the Illuminote notary number (INN) and adds the Illuminotary to the system email list for sending information and updates 96. With the activation complete 98, the system automatically sends the Illuminotary an introductory video via email or text. The Illuminotary is thereafter able to log in to the system to enter notarizations into the system.

[0086] FIG. 4 provides details on the second critical path 110 in the system, directed to how a Member (e.g., a trustor) registers an estate planning document in the registry. The process begins with the Member accessing the Illuminote website and clicking a “Register my Trust” hyperlink 112. The system then prompts the Member to answer a series of questions and provide information to qualify a document for registration in the system, including: the name of the trust 114; the date the trust was signed 116; the number of people involved in the creation of the trust 118; the individuals who have authority to amend or revoke the trust 120; the primary trustor Social Security Number identified when filing trust federal tax returns 122; whether the trust has been previously amended 124; if yes, how many times 126; the dates and times of the prior amendments 128; if the trust had not been previously amended, the names of the current trustees 130; whether one trustee signature is sufficient or all trustee signatures are required for trust actions 132; the express powers of the trustees 134; the identity of successor trustees 136; and a listing of Trusted Persons, with full contact information 138. With this information entered in the system, the system backend generates an Illuminate document number for the document, a DARCI trust amendment, and a DARCI certification of trust 140. The Member then completes the Illuminotarization process by uploading the document to DARCI, and the system server records and stores the document 142. At step 144, the Member creates his or her account, pays for the services, receives the Illuminotarization information, the DARCI documents, and the backend generates the Member number.

[0087] FIG. 5 is a flow chart showing a third critical path 150 in the system, namely, how an actual notarization process is implemented using the inventive system. Here is it seen that the Member is directed by a transmitted message 152 to consult a listing of geographically proximate Illuminotaries he or she may elect to consult. Alternatively, the Member will be instructed to contact the system administrator to get suitable names. The Member may then contact the Illuminotary 154 to sign documents in the Illuminotary's presence. The Illuminotary will schedule the signing 156, perform a signature acknowledgement at a mutually convenient time and place, and log in to the system to provide notarization information and an affidavit 158. The system backend then matches the Illuminotary process to Illuminote documents using the IDN 160 (such as through a QR matrix barcode).

[0088] The Illuminotary affidavit requires that the Illuminotary provide answers to a succession of questions, including: the number of documents signed and the document titles 162; the number of pages in each document, indicated by title 164; how the Illuminotary was contacted 166; who paid for the Illuminotary services 168; where the signing took place 170; and the individuals present at the place of signing 172. The Illuminotary is then prompted to confirm each answer on the affidavit 174, and when so confirmed, the Illuminotary clicks on a clickable “submit” call to action (CTA) button on the webpage 176. The affidavit submission process is thereby completed.

[0089] FIG. 6 is a stacked flow chart showing a fourth critical path 180 in the inventive system. This illustration shows the events that trigger the transmission of notifications to the Trusted Persons in a Member's list of Trusted Persons. These include: the initial trust registration itself 182, after which the system generates a special email 184 and transmits the email 186 to each Trusted Person to alert them that they have been nominated by the trustor(s) to act in the capacity of a Trusted Person. The system further invites the Trusted Persons to create an account in the system.

[0090] A second event that will trigger a Trusted Person (TP) notification is when a registered trust is amended 188. Such an event triggers an email 190 informing the TPs of the fact (not substance) of the amendment. The same holds for a revocation or rescission of a registered trust 192, which triggers a transmitted notice of the same 194 to the TPs; a change in a TP 196, which triggers an alert to all TPs 198, including those removed; a change in a trustee 200, which triggers a notice of the same 202; the exercise of a power of appointment 204, which triggers an alert 206 that a power of appointment has been exercised; and the removal of a trust from the registry 208, which triggers an alert to all TPs 210 that the trust has been removed.

[0091] FIG. 7 is a block diagrammatic flow chart showing a fifth critical path 220 in the inventive system, showing the kind of information accessible to financial institutions authorized to obtain and review up-to-date estate planning documents and information. As can be seen, financial institutions having monthly subscriptions to the system may include a number of authorized users with individual login credentials 222. When the authorized users log in to the system, they may search the system database using available search fields 224, which, at a minimum, include trust number and power of attorney number. At step 226, authorized users with a Trust Number may view the Illuminote Document Number (IDN) of the most recent certification of trust, as well as date from the Certification of Trust fields. Authorized users with a POA number may view the IDN of the most recent POA document, the principal's name, the agent's name, and the agent's various authorities. At step 228, the system backend records and stores a log of who accessed the system, the time, and the elements viewed.

[0092] Referring to FIGS. 8 through 22, there is illustrated therein a new and improved system and method, set forth from the various perspectives of the Member, the inventive system itself, and the notary, for preventing trusts and trusteeship, specifically, from being used to perpetrate fraud and financial abuse.

[0093] FIG. 8 is a flow chart showing the login/sign-in process of a Member (e.g., a trustor), as implemented in the inventive system 230. At step 234, a new Member signs up and must first create a username and password and agree to Terms of Services 236. Upon completion, they can access the portal and try the system with no commitment or move forward with securing their documents 238. At step 232, existing Members login to view their portal showing their documents and actions taken on their account 238.

[0094] FIGS. 9-11 are block diagrammatic top level critical path flow charts showing the trust registration process at a highly abstract level from all the perspectives and is an expansion of steps 240, 250, 260 set out in FIG. 4.

[0095] FIG. 9 shows how the inventive system responds to the data provided by the Member 240. First, the Member or prospective member signs up or logs in, as set forth in FIG. 8. Upon selecting “secure my trust” 242, the system will move the Member through the required interviews, steps of which are set forth in detail in. FIGS. 11, 15, and 19 and incorporated herein, before emailing their Trusted Persons 244, emailing the Member 246, and allowing the Member access to the portal 248.

[0096] FIG. 10 shows what the Member experiences as the Member interacts with the inventive system 250 when selecting “secure my trust” 252. The inventive system refers to and incorporates the steps set forth in FIG. 11 to advance to step 254, where the Member is prompted to download and print the onboarding system documents for trust registration. The inventive system refers to and incorporates/executes the steps set forth in FIGS. 11 and 20 to advance to Applicant: Illuminote, Inc. step 256, at which time the Member can access the portal and view and/or share documents. At step 258, the Member receives a welcome email.

[0097] FIG. 11 shows the inventive system's questionnaire, in combination with associated logic required, for trust registration from all perspectives. The Member completes a questionnaire consisting of a series of questions that will enable the system to generate the onboarding documents 260. These questions include name of trust 262, date it was established 264, title of document establishing trust 266, the number of pages establishing the trust 268, identity of person(s) associated 270, identifying information of those persons 272, optional info 274, the roles of person(s) associated 276, trustor power to amend and revoke 278, and any additional person(s) 280. The questionnaire continues the registration 282 and asks who the primary trustor is, if there is more than one 284. The system then moves onto whether any additional documents were added after the trust establishment 286, and if so, title 288, date 290, pages 292, and requests information confirmation 294. The documents are added to the system one at a time, and if there are additional documents to register, steps 286-292 repeat for each document. Upon completion of adding documents, the system will create an Illuminote Document Number (“IDN”) and assign to the Member Declaration setting forth documents comprising the trust 298. The system will then generate a Member Declaration for the Member to sign acknowledging the documents are the complete set 300. The system continues to engage the Member by asking the Member to input the manner of trustee signature requirement to act on the trust 302 and the extent of trustee powers 304. At this point in the questionnaire, the data entry is complete and the system will engage in quality control 308. If quality control is satisfied, the system will then generate a unique DARCI number and assign it to the Trust 310. Next, the system will generate IDNs for the two remaining onboarding documents, the Registration Amendment and Trust Certification 312, and attach those IDNs to the two onboarding documents it generates 314. The Member can now download the Member Declaration, Registration Amendment, and Trust Certification 316.

[0098] FIGS. 12-14 are block diagrammatic top level critical path flow charts showing the process at a highly abstract level from all the perspectives for the registration of new documents (e.g., new amendments or change of trustee documents that come into existence after the trust is registered).

[0099] FIG. 12 shows how the inventive system responds to the data provided by the Member when adding a document after initial trust registration 320. First, the Member initiates the process by logging in, as set forth in FIG. 8. Next, the Member starts this process by selecting add a new document to their already-registered trust 324. The system responds by determining whether the new document changes any of the stored data for the Member's current Trust Certification 326. If the answer is negative, the system will generate a new Illuminotary Notarial Acknowledgement (“INA”), with corresponding new IDN, for the new document in the portal for download and printing 328. If the answer is affirmative, the system will generate a new Trust Certification, with corresponding new IDN, and a new INA with corresponding new IDN, for download and printing 330. When the Member completes the system requirements and uploads the system generated documents, the steps of which are set forth in detail in FIGS. 15 and 19, this triggers the inventive system to email the Trusted Persons 332 and email the Member 334. The Member can now view and share the newly added documents in the portal 336.

[0100] FIG. 13 shows what the Member experiences as they interact with the inventive system to add a new document to their previously registered trust 340. Member logs in to portal 342 and selects add a new document to their trust 344. The inventive system proceeds through new document interview set forth in FIG. 14. The Member downloads and prints all required documents 346. The process loop is closed by Member following process for Illuminotarization and upload set forth in FIGS. 17 and 20, respectively. Member can now view and share the new documents from the portal 348.

[0101] FIG. 14 shows the questionnaire, in combination with associated logic required, for registration of new documents from all perspectives 350. Member selects add new document to existing trust 352. The inventive system inquires as to the document name 354, its number of pages 356, its date 358, and whether the new document revokes the trust 360. At this point, different critical paths are triggered depending on Member responses. If the response to the previous question is affirmative, the inventive system will generate and assign a new IDN for the document 380, and create the INA 386 for the Member to download and print 388. If the answer to the revocation question is negative, the inventive system will determine whether a new Trust Certification is required. It does this by asking a series of questions such as, does the document reflect a change of primary trustor 362, does the document reflect a chance of who can amend or revoke the trust 364, does the document reflect a change of the trustee signature requirements 366, does the document reflect a chance of trustee 368, does the document reflect a change of trustee powers 370, and does the document reflect a chance of the next successor trustee 372. If the answer to any of the questions 362-372 is YES 374, a new IDN is created and assigned to new documents 376. If the answer to any of the questions 362-372 is NO, the inventive system will generate and assign a new IDN for the document 380 and create the acknowledgment 386 for the Member to download and print 388. If the answer to any of the questions 362-372 is YES, the inventive system will create and assign an IDN for the new document 376 and create the INA for the new document 378, create and assign an IDN to the new Trust Certificate 382, and generate the new Trust Certificate 384 for the Member to download and print 388.

[0102] FIGS. 15-18 are block diagrammatic top level critical path flow charts showing the process at a highly abstract level from all the perspectives for the Illuminotarization of documents 390, 410, 430, and 450.

[0103] FIG. 15 shows how the inventive system responds to the data provided by, and provides data to, the Notary and Member 390. At step 392, the Notary inputs the DARCI number assigned to the trust that they are Illuminotarizing. The inventive system responds to the Notary's query by providing the list of all IDNs associated with that batch that are pending notarization 394. The inventive system then emails a Verification Code 396 to the Member to whom the IDN was assigned, and the Member provides the Verification Code to the Notary to complete the cycle 398. At step 400, the IDNs are now confirmed and displayed for the Notary. The inventive system then runs the Notary through the Affidavit process, as set forth in detail in FIG. 18. The IDNs are now Illuinotarized 402.

[0104] FIG. 16 shows what the Notary experiences as they interact with the inventive system and Member 410. At step 412, the Notary is contacted by the Member to perform notary/Illuminotary services. The Notary observes Member either sign or acknowledge the signature on the document 414. At step 416, the Notary completes the notarial act and receives the documents from the Member 418. At step 420, the Notary inputs the DARCI number of the documents and receives and enters the Verification Code the Member provides 422. The inventive system then runs the Notary through the Affidavit process, as set forth in detail in FIG. 18. At step 424, the inventive system sends a conformation email to the Notary and the Notary executes the Illuminotary acknowledgement 426. The process is complete, and the Notary returns the documents to the Member 428.

[0105] FIG. 17 shows what the Member experiences 430 as she interacts with the inventive system and Notary. The Member locates an Illuminotary through the inventive system 432. The Member then either signs or acknowledges to the Notary 434 that they have signed the documents. At step 436, the Notary gives the signed documents to the Illuminotary, receives the Verification Code from the inventive system 438 via email, provides the Verification Code 440 to the Illuminotary, and receives the Illuminotarized docs 442 from the Illuminotary. The inventive system generates an email confirmation to the Member 444.

[0106] FIG. 18 shows the questionnaire, in combination with associated logic required, for Illuminotarization, 450 from all perspectives. The Notary begins the Illuminotarization process 452 and inputs objective responses to these prompts 454: who first contacted you 456; who paid you 458; where did the signing or acknowledgment take place 460; and who was present 462. At step 464, the Illuminotary verifies each IDN for matching title and page information, reviews and affirms if correct 466 and the IDNs are now Illuminotarized 468.

[0107] FIGS. 19 and 20 are block diagrammatic top level critical path flow charts showing the process at a highly abstract level from all the perspectives for the uploading of new documents to the inventive system (e.g., new amendments or change of trustee documents that come into existence after the trust is registered).

[0108] FIG. 19 shows how the inventive system responds to the data provided 470 by the Member for document uploading. At step 472, the Member chooses the option to upload completed documents. The inventive system directs the Member to a page 474 which displays all the outstanding IDNs assigned to that Member where the Member can select the appropriate IDN for upload 476. The system prompts the Member to confirm title and correct number of pages for the IDN selected 478 and receives the upload from the Member 480 and runs quality control 482 and document accuracy exists, change the IDN status to “complete” 484. Next, the inventive system will direct the Member to one of four possible routes based on the IDN's purpose 486: original trust registration, additional document, revoke a registered document, or remove a registered document. For original trust registration, an email is triggered to Trusted Persons 498 and the inventive system will change DARCI status to “complete” 500. The inventive system will simultaneously generate the Trust Certification 504, email Trusted Persons 502, and change the DARCI status to “complete”. The temporary table info in the inventive system will be deleted, 508 upload is complete, 510 and the Member will be emailed confirmation 512. The Member can now view and share documents from the Portal 514. If the route determined by the inventive system is a new document, the critical path consists of emailing Trusted Persons 496 and depending upon the responses to the inquiries, may or may not generate and updated Trust Certification. If generation of a new Trust Certification is triggered, Trusted Persons will be emailed 502, old information will be overwritten 504, and DARCI status will change to “complete” 506 with any temporary table information being deleted 508. If the inventive system ascertains that the purpose of the IDN is to revoke a registered trust, initiation of the operation involves an email to Trusted Persons 488 and DARCI status changed to “revoked” 490. The upload is complete 510, the Member is emailed confirmation that upload is complete 512 and Member can view or share the revoked documents from the Portal 514. If the inventive system ascertains that the purpose of the IDN is to remove a registered trust, initiation of said operation involves an email to Trusted Persons 492 and DARCI status changed to “inactive” 494. The upload is complete 510, the Member is emailed confirmation that upload is complete 512.

[0109] FIG. 20 shows what the Member experiences as they interact with the inventive system for the uploading of new documents 520. The Member initiates the protocol by selecting “upload” 522 which will direct the Member to the page with links for all “Illuminotarized” IDNs assigned to Member 524. From there, Member chooses the IDN for uploading 526 and the system will ask the Member to confirm the title and number of pages for each IDN 528. Next, the Member scans 530 and uploads 532 the document to complete upload process 534. The system will send the Member an email confirming upload 536 and the Member can now view and share documents from the Portal 538.

[0110] FIGS. 21 and 22 are block diagrammatic top level critical path flow charts showing the process for qualifying to become an Illuminotary at a highly abstract level from all the perspectives; this is a detailed expansion of FIG. 3.

[0111] FIG. 21 shows how the inventive system responds to the data provided by the prospective Illuminotary 540. At step 542, the inventive system will scrape California's notary website listing data for valid notaries daily for updates. Upon receipt of a query to become an Illuminotary 544, the inventive system matches the prospective notary against this list by validating state, name, and commission 546. If a match is found, the inventive system moves to step 552 by directing the prospective Illuminotary to create login credentials. If no match is found, the inventive system will return an error message 550. At step 554, the validated prospective notary receives and email from the inventive system and a Confirmation Code will be sent to the prospective Illuminotary to their address on file with California's Secretary of State 556 as determined by the inventive system's web scraper. The prospective Illuminotary logs back into the inventive system to enter the Confirmation Code 558, reviews and agrees to Illuminote, Inc.'s Terms of Service, 560. Inventive system now classifies the prospect as an Illuminotary and an email is sent 564.

[0112] FIG. 22 shows how to become an Illuminote Notary or “Illuminotary” and the interaction with the inventive system from that perspective 570. The prospective Illuminotary clicks on “Become an Illuminotary” to start the process 572. The prospect enters her state, name, and commission 574. The inventive system will return a match 576 or error 578 response. The match response continues the process by directing the prospect to create login credentials 580 to which the inventive system will email the prospect a confirmation 582 and further instruction regarding a Confirmation Code 584 that will be sent to their address on file with the California Secretary of state. At step 586, the prospect logs in and provides the Confirmation Code they received 588, reviews and agrees to Illuminote, Inc.'s Terms of Service 590 and becomes an Illuminotary 592. Lastly, the new Illuminotary receives a welcome email from the inventive system.

[0113] The above disclosure is sufficient to enable one of ordinary skill in the art to practice the invention and provides the best mode of practicing the invention presently contemplated by the inventor. While there is provided herein a full and complete disclosure of the preferred embodiments of this invention, it is not desired to limit the invention to the exact construction, dimensional relationships, and operation shown and described. Various modifications, alternative constructions, changes, and equivalents will readily occur to those skilled in the art and may be employed, as suitable, without departing from the true spirit and scope of the invention. Such changes might involve alternative materials, components, structural arrangements, sizes, shapes, forms, functions, operational features, or the like.

[0114] Therefore, the above description and illustrations should not be construed as limiting the scope of the invention, which is defined by the appended claims.