US20140052636A1 - Image Processing For Credit Card Validation - Google Patents

Image Processing For Credit Card Validation Download PDF

Info

Publication number
US20140052636A1
US20140052636A1 US13/968,164 US201313968164A US2014052636A1 US 20140052636 A1 US20140052636 A1 US 20140052636A1 US 201313968164 A US201313968164 A US 201313968164A US 2014052636 A1 US2014052636 A1 US 2014052636A1
Authority
US
United States
Prior art keywords
video data
card
payment instrument
block
transaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/968,164
Inventor
Daniel Mattes
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jumio Corp
Original Assignee
Jumio Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jumio Inc filed Critical Jumio Inc
Priority to PCT/US2013/055195 priority Critical patent/WO2014028769A2/en
Priority to US13/968,164 priority patent/US20140052636A1/en
Assigned to JUMIO INC. reassignment JUMIO INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MATTES, DANIEL
Publication of US20140052636A1 publication Critical patent/US20140052636A1/en
Assigned to CLOWER, AS SECURITY AGENT, CHRISTOPHER JOSEPH reassignment CLOWER, AS SECURITY AGENT, CHRISTOPHER JOSEPH PATENT SECURITY AGREEMENT Assignors: JUMIO INC.
Assigned to JUMIO BUYER, INC. reassignment JUMIO BUYER, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: JUMIO INC.
Assigned to JUMIO INC. reassignment JUMIO INC. ORDER AUTHORIZING SALE FREE AND CLEAR OF LIENS Assignors: UNITED STATES BANKRUPTCY COURT FOR THE DISTRICT OF DELAWARE
Assigned to JUMIO CORPORATION reassignment JUMIO CORPORATION CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: JUMIO BUYER, INC.
Priority to US15/689,389 priority patent/US10878274B2/en
Priority to US17/104,570 priority patent/US11455786B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0007Image acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/30Subject of image; Context of image processing
    • G06T2207/30168Image quality inspection

Definitions

  • the present disclosure generally relates to the security of online financial transactions, and in particular, to assessing the authenticity of payment instruments, such as credit and debit cards, using video processing analysis.
  • Online commerce has developed into a mainstream alternative to conventional in-store retail shopping and has also created opportunities for new online service offerings. So it is now common for a consumer to browse online product and service offerings, select, order, and pay for a product and/or a service in a financial transaction that is substantially all online. However, online transactions are vulnerable to security breaches and various forms of fraud.
  • one of the problems with a typical online credit card verification process is that it circumvents the customary signature and identification verification protocols that take place during an in-store retail transaction.
  • a merchant provides an order form that requires a consumer to enter personal data such a name, a billing address, a telephone number, and credit card information.
  • the consumer enters and sends the data requested in the form over the internet or some other data connection.
  • the merchant verifies that the credit card information is valid and that the card can be charged the payment amount.
  • the card verification is usually conducted over a proprietary billing center verification network, such as the VisaNet network.
  • the personal data and the credit card information provided by the consumer may have been acquired illicitly.
  • Neither the merchant nor the billing center is able to reliably verify that the individual providing the personal data and credit card information is the true authorized user of the credit card. Additionally, neither the merchant nor the billing center is able to reliably verify that the individual providing the credit card details has physical possession of the actual credit card, or assess whether such a card is authentic or a counterfeit.
  • a sales clerk can request signed photo identification in order to verify that the person tendering the credit card is the true authorized user of the credit card.
  • the sales clerk can then compare the signatures on the credit card and the sales slip against the signature on the picture identification, and also verify that the consumer is the same person shown on the picture identification.
  • picture identification serves as a potential deterrent against using an illicitly acquired payment instrument during an in-store transaction.
  • sales personnel learn to recognize the names and faces of frequent customers.
  • the sales clerk can visually and physically inspect the credit card offered to assess whether or not the card is authentic or a counterfeit.
  • Systems, methods, and devices described herein enable the enhancement of the security of online financial transactions by assessing the authenticity of payment instruments, such as credit and debit cards, using video processing analysis.
  • Implementations of systems, methods, and devices within the scope of the appended claims each have several aspects, no single one of which is solely responsible for the desirable attributes described herein. Without limiting the scope of the appended claims, some prominent features are described herein. After considering this discussion, and particularly after reading the section entitled “Detailed Description” one will understand how the features of various implementations are used to assess the authenticity of payment instruments, such as credit and debit cards.
  • systems, methods, and devices are operable to assess various characteristics (e.g. variations of shadows, surface reflectivity, holograms, security features, color gradients, aspect ratios, thickness and/or length measurements, etc.) of credit cards from video data provided by a user.
  • various characteristics e.g. variations of shadows, surface reflectivity, holograms, security features, color gradients, aspect ratios, thickness and/or length measurements, etc.
  • one or more card characteristics captured during an online transaction may be compared against one or more of the same characteristics available in a card database indexed and/or otherwise searchable by card issuer, and which stores credit card characteristics for a number of cards provided by various credit card issuers (e.g. banks, etc.).
  • one or more card characteristics captured during an online transaction may be compared against one or more of the same characteristics captured during previous transaction(s) to verify that the credit card being used during a transaction matches the card with the same information (i.e. credit card number) from previous transaction(s).
  • a voice print record and/or location information may be combined with the use of the encoded and/or encrypted video data to provide additional security.
  • images of signatures, electronic signatures and/or other biometric information may be combined with the use of the encoded and/or encrypted video data to provide additional security.
  • FIG. 1 is a block diagram of an example client-server environment.
  • FIG. 2 is a block diagram of an example implementation of a client system.
  • FIG. 3 is a block diagram of an example implementation of a server system.
  • FIG. 4 is a flowchart representation of a client device method.
  • FIG. 5 is a flowchart representation of a client device method.
  • FIG. 6 is a schematic drawing of an example credit card.
  • FIG. 7 is a schematic drawing of an example identification document/card.
  • FIG. 8 is a flowchart representation of a machine vision method.
  • FIG. 9 is a flowchart representation of a machine vision method.
  • FIG. 10 is a flowchart representation of a machine vision method.
  • FIG. 11 is a flowchart representation of an authentication server method.
  • FIG. 12 is a flowchart representation of an authentication server method.
  • FIG. 1 is a block diagram of an example client-server environment 100 . While certain example features are illustrated, those skilled in the art will appreciate from the present disclosure that various other features have not been illustrated for the sake of brevity and so as not to obscure more pertinent aspects of the implementations disclosed herein. To that end, the client-server environment 100 includes a billing center 150 , a retailer/merchant (or service provider) 140 , a third party verification service provider 160 , a mobile phone operator 122 (i.e. wireless carrier), an internet service provider 120 , and a communications network 104 .
  • a billing center 150 includes a billing center 150 , a retailer/merchant (or service provider) 140 , a third party verification service provider 160 , a mobile phone operator 122 (i.e. wireless carrier), an internet service provider 120 , and a communications network 104 .
  • Each of the billing center 150 , the retailer 140 , the third party verification service provider 160 , the mobile phone operator 122 , the internet service provider 120 are capable of being connected to the communication network 104 in order to exchange information with one another and/or other devices and systems.
  • the mobile phone operator 122 and the internet service provider 120 are operable to connect client devices to the communication network 104 as well.
  • a smartphone 102 is operable with the network of the mobile phone operator 122 , which includes for example, a base station 122 a .
  • a laptop computer 103 (or tablet, desktop, workstation or the like) is connectable to the network provided by the internet service provider 120 , which is ultimately connectable to the communication network 104 .
  • client-server environment 100 is merely an example provided to discuss more pertinent features of the present disclosure.
  • the communication network 104 may be any combination of wired and wireless local area network (LAN) and/or wide area network (WAN), such as an intranet, an extranet, including a portion of the internet.
  • the communication network 104 uses the HyperText Transport Protocol (HTTP) to transport information using the Transmission Control Protocol/Internet Protocol (TCP/IP).
  • HTTP permits the client device 102 to access various resources available via the communication network 104 .
  • TCP/IP Transmission Control Protocol/Internet Protocol
  • HTTP permits the client device 102 to access various resources available via the communication network 104 .
  • HTTP HyperText Transport Protocol
  • TCP/IP Transmission Control Protocol/Internet Protocol
  • HTTP permits the client device 102 to access various resources available via the communication network 104 .
  • the various implementations described herein are not limited to the use of any particular protocol.
  • the retailer 140 includes an online customer sales application server 141 and a database 142 .
  • the retailer 140 includes a local customer sales application, such as a point-of-sale terminal within a department store.
  • the retailer 140 may be an online service provider (e.g. a gambling website, a social networking website, a dating website, etc.) or a retailer of real and/or digital goods (e.g. clothing, music, etc.).
  • the billing center 150 is associated with at least one credit company associated with a credit card, a debit card, or other payment instrument.
  • the billing center 150 may be a computerized system holding information relating to client accounts, billing conditions and history, transactions history, and personal and other details of each client and/or of each credit card associated with the billing center 150 .
  • the billing center 150 includes a verification server 151 and a database 152 .
  • the billing center 150 may be associated with one or more credit companies, enabling the retrieval of data from one or more third party databases (not shown) including such information.
  • the verification server 151 retrieves data from the database 152 to check authorization of a transaction according to predefined authorization rules followed by the billing center 151 .
  • the third party verification service provider 160 is provided to enable the enhancement of the security of online financial transactions by assessing the authenticity of payment instruments, such as credit and debit cards, using video processing analysis.
  • the third party verification service provider 160 is enabled to receive and analyze video data from a client device (e.g. the smartphone 102 or laptop computer 104 ), and includes a verification server 161 , an optional user authentication card database 162 , a video/image database 164 , and a transactions database 166 .
  • client devices such as the computer 103 and smartphone 102
  • client devices include a display and a camera.
  • a mobile application is operated at least in part by the client device.
  • the client devices 102 and/or 103 are enabled to communicate with the billing center 150 , the third party verification service provider 160 , and the retailer 140 .
  • the computer may include at least one of an Ethernet enabled network adapter or interface, a WiFi enabled network adapter or interface, a cable modem, a DSL modem, a cellular wireless device, or the like.
  • a user may use a client device 102 / 103 to access the online customer sales application server 141 provided by the retailer 140 .
  • the camera associated with the client device is used to obtain at least video data including representations of the credit card, which is processed according to one of the various methods described below.
  • the video data is sent to the third party verification server provider 160 to assess the authenticity of the credit card presented by the user in the video data.
  • the verification server 161 receives the video data and is enabled to assess various characteristics of the credit card from the video data provided by the user.
  • the assessed characteristics include at least one of variations of shadows, surface reflectivity, holograms, security features, color gradients, aspect ratios, thickness measurements, and/or length measurements obtainable from the video images.
  • a timestamp and/or location data associated with the video data may be analyzed to ensure that the video data is current with respect to a particular transaction and/or that the location information associated with video data indicates a location proximate to where the user is purported to be based on an IP address or other information associated with the transaction.
  • some implementations include inspecting one or more data fields included in the received video data to determine whether or not the video data was recorded within a time period proximate to the current process (e.g. 1-2 minutes) and/or whether the video data was recorded in a place proximate to where the user is purported to be. If the timestamp is not valid and/or the location information is questionable, the method includes taking remedial action or stopping the process altogether. For example, in some implementations a remedial action includes at least requesting additional video data. Additionally and/or alternatively, the rejected video data and any subsequently received video data may be compared to determine if there are any abnormalities or other signs of fraud on the process.
  • one or more card characteristics captured during an online transaction may be compared against one or more of the same characteristics available in the optional user authenticated card database 162 .
  • the optional user authenticated card database 162 is indexed and/or otherwise searchable by card number, and stores user authenticated credit card characteristics each card.
  • the optional user authenticated card database 162 stores credit (and/or debit) card characteristics that can be used to validate cards issued to individual users.
  • each card may have precise colors, surfaces with precise reflectivity characteristics, optical security features (e.g. holograms), and precise arrangements of characters and/or information fields that can be measured and compared against cards offered by users with the same card number.
  • one or more card characteristics captured during an online transaction may be compared against one or more of the same characteristics captured during previous transaction(s) to verify that the credit card being used during a transaction matches the card with the same information (i.e. credit card number) from previous transaction(s).
  • the at least one of the video/image database 164 and the transactions database 166 can be used to store values representative of card characteristics obtained from previous transactions for a particular user card and/or actual portions of the video data received by the third part verification server provider 160 .
  • a voice print record and/or location information may be combined with the use of the encoded and/or encrypted video data to provide additional security.
  • images of signatures, electronic signatures and/or other biometric information may be combined with the use of the encoded and/or encrypted video data to provide additional security.
  • FIG. 2 is a block diagram of an example implementation of a client device (e.g. smartphone 102 ) discussed above with reference to FIG. 1 .
  • client device e.g. smartphone 102
  • the client device 102 / 103 includes one or more processing units (CPU's) 202 , one or more network or other communications interfaces 208 , memory 206 , a camera 209 , and one or more communication buses 204 for interconnecting these and various other components.
  • the communication buses 204 may include circuitry (sometimes called a chipset) that interconnects and controls communications between system components.
  • the memory 206 includes high-speed random access memory, such as DRAM, SRAM, DDR RAM or other random access solid state memory devices; and may include non-volatile memory, such as one or more magnetic disk storage devices, optical disk storage devices, flash memory devices, or other non-volatile solid state storage devices.
  • the memory 206 may optionally include one or more storage devices remotely located from the CPU(s) 202 .
  • the memory 206 including the non-volatile and volatile memory device(s) within the memory 206 , comprises a non-transitory computer readable storage medium.
  • the memory 206 or the non-transitory computer readable storage medium of the memory 206 stores the following programs, modules and data structures, or a subset thereof including an operating system 216 , a network communication module 218 , and a transactions processing module 231 .
  • the operating system 216 includes procedures for handling various basic system services and for performing hardware dependent tasks.
  • the network communication module 218 facilitates communication with other devices via the one or more communication network interfaces 208 (wired or wireless) and one or more communication networks, such as the internet, other wide area networks, local area networks, metropolitan area networks, and so on.
  • the transactions processing module 231 is configured to cooperate with instructions sent from a verification server (e.g. verification server 161 ).
  • the transactions processing module 231 includes a video processing module 210 and an optional voice and location data verification module 211 .
  • the video processing module 210 facilitates the capture and encoding of video and/or image data to be sent to the verification server.
  • the video processing module 210 includes a set of instructions 210 a and heuristics and metadata 210 b .
  • the voice and location data verification module 211 facilitates the capture and encoding of voice and location data requested by the verification server.
  • the voice and location data verification module 211 includes a set of instructions 211 a and heuristics and metadata 211 b.
  • FIG. 3 is a block diagram of an example implementation of a verification server system 151 / 161 (e.g. verification server 151 or 161 ). While certain specific features are illustrated, those skilled in the art will appreciate from the present disclosure that various other features have not been illustrated for the sake of brevity and so as not to obscure more pertinent aspects of the implementations disclosed herein. To that end, the server system 151 / 161 includes one or more processing units (CPU's) 302 , one or more network or other communications interfaces 308 , memory 306 , and one or more communication buses 304 for interconnecting these and various other components. The communication buses 304 may include circuitry (sometimes called a chipset) that interconnects and controls communications between system components.
  • CPU's processing units
  • the communication buses 304 may include circuitry (sometimes called a chipset) that interconnects and controls communications between system components.
  • the memory 306 includes high-speed random access memory, such as DRAM, SRAM, DDR RAM, or other random access solid state memory devices; and may include non-volatile memory, such as one or more magnetic disk storage devices, optical disk storage devices, flash memory devices, or other non-volatile solid state storage devices.
  • the memory 306 may optionally include one or more storage devices remotely located from the CPU(s) 302 .
  • the memory 306 including the non-volatile and volatile memory device(s) within the memory 306 , comprises a non-transitory computer readable storage medium.
  • the memory 306 or the non-transitory computer readable storage medium of the memory 306 stores the following programs, modules, and data structures, or a subset thereof including an operating system 316 , a network communication module 318 , a verification processing module 301 , an optional user authenticated card database 162 , a video/image database 164 , and a transactions database 166 .
  • the operating system 316 includes procedures for handling various basic system services and for performing hardware dependent tasks.
  • the network communication module 318 facilitates communication with other devices via the one or more communication network interfaces 308 (wired or wireless) and one or more communication networks, such as the internet, other wide area networks, local area networks, metropolitan area networks, and so on.
  • one or more communication network interfaces 308 wireless or wireless
  • one or more communication networks such as the internet, other wide area networks, local area networks, metropolitan area networks, and so on.
  • the verification processing module 301 includes video processing module 310 and an optional voice and location data verification module 311 .
  • the video processing module 310 facilitates the processing of video and/or image data received from the client device. To that end, the video processing module 310 includes a set of instructions 310 a and heuristics and metadata 310 b .
  • the voice and location data verification module 311 facilitates the processing of voice and location data received from the client device. To that end, the voice and location data verification module 311 includes a set of instructions 311 a and heuristics and metadata 311 b .
  • the instrument verification module 312 facilitates the processing of instrument data received from the client device. To that end, the instrument verification module 312 includes a set of instructions 312 a and heuristics and metadata 312 b.
  • the optional user authenticated card database 162 is indexed and/or otherwise searchable by card number, and stores credit card characteristics for a number of cards on a per card basis.
  • the optional user authenticated card database 162 includes card number data sets 331 a , . . . , 331 n .
  • Each issuer card number data set includes a master or clean list of (and/or debit) card characteristics for a respective credit card obtained during a secure activation process involving the true user of the credit card.
  • the card number data set 331 a includes credit card characteristics of the respective credit card issued to the true user, which are, in some implementations, obtained during a secure activation process involving the true user.
  • the video/image database 164 is indexed by credit card (and/or debit card) number, and stores values representative of card characteristics obtained from previous transactions for a particular user card and/or actual portions of the video data received by the third part verification server 151 / 161 .
  • the record for credit card number 333 includes characteristics 334 .
  • the transactions database 166 stores data related to transaction locations 335 , types of payment instruments used 336 , and/or identification document characteristics 337 .
  • FIG. 3 shows an example implementation of a server system
  • FIG. 3 is intended more as a functional description of the various features which may be present in a set of servers than as a structural schematic of the embodiments described herein.
  • items shown separately could be combined and some items could be separated.
  • some items shown separately in FIG. 3 could be implemented on single servers and single items could be implemented by one or more servers.
  • the actual number of servers used to implement a server system and how features are allocated among them will vary from one implementation to another, and may depend in part on the amount of data traffic that the system must handle during peak usage periods as well as during average usage periods.
  • FIG. 4 is a flowchart representation of a client device method.
  • the method is performed by a client device (e.g. smart-phone, tablet, laptop, personal computer, etc.), having an associated digital camera, in order to facilitate authentication of an online financial transaction.
  • a client device e.g. smart-phone, tablet, laptop, personal computer, etc.
  • the method may be implemented on at least one of the two client devices 102 and 103 as a part of an online commerce client application.
  • the method includes receiving a transaction request in which the user will present a credit or debit card to the camera associated with the client device.
  • an application running on the client device 103 detects when a user is attempting to complete a purchase by, for example, receiving an input from a web-browser and/or a sub-routine of the application operable to prompt a user for an input and subsequently receive an input indicative of the user attempting to make a purchase.
  • the method optionally includes forcing a light into an “on” state so that the camera included on and/or associated with the client device is able to acquire well lit video data including a credit card (or debit card) presented by the user.
  • the method includes starting the video capture process by activating the camera associated with the client device.
  • the method includes focusing the digital camera using a known feature, such as a logo or trademark. In some implementations, the method includes focusing the digital camera using a previously unknown feature, so that cards that have unknown and/or exotic features can be processed.
  • the method includes capturing an image of the credit card presented by the user from the video stream produced by the digital camera.
  • the method optionally includes applying an optical character recognition (OCR) technique to the image of the credit card in order to identify and extract the credit card details.
  • OCR optical character recognition
  • One or more of the segments of the image may include characters relating to the credit card details (e.g. segment of each group of four to six numbers of the card number, another segment of the expiry date of the card and yet another segment of the name of the card holder).
  • the image analysis may also include recognizing the characters in each identified segment. Additionally, the analysis may also include an optional verification process that includes verifying whether all pertinent segments have been identified and the relevant characters recognized. Additionally and/or alternatively, in some implementations, the image may be sent to a server, where the OCR process is applied to the image.
  • the method includes determining whether all of the pertinent credit card details have been obtained. If any of the pertinent credit card details are missing or could not be extracted from the image (“No” path from block 4 - 7 ), as represented by block 4 - 8 , the method includes reverting to a fallback procedure to obtain the pertinent credit card details. On the other hand, if all of the pertinent credit card details have been extracted and/or otherwise provided by the user (“Yes” path from block 4 - 7 ), as represented by block 4 - 9 , the method includes displaying at least some of the credit card details to the user on the client device 103 .
  • the method includes receiving a payment confirmation input from the user in response to displaying the credit card details.
  • the method includes transmitting video data to the authentication or verification server as a part of an authentication request to enhance the security of the transaction.
  • the pertinent cretid card details, extracted from the captured image and/or received from the user are also transmitted along with the video data at 4 - 11 .
  • the method includes receiving an authentication message indicating whether or not the transaction can/has been confirmed based on an authentication process in which the authenticity of the credit card presented was assessed.
  • FIG. 5 is a flowchart representation of a client device method.
  • the method is performed by a client device (e.g. smart-phone, tablet, laptop, personal computer, etc.) in order to facilitate authentication of an online financial transaction.
  • a client device e.g. smart-phone, tablet, laptop, personal computer, etc.
  • the method may be implemented on at least one of the two client devices 102 and 103 as a part of an online commerce client application.
  • the method includes receiving a transaction request in which the user will present a credit or debit card to the camera associated with the client device.
  • the method includes starting the video capture process by activating the camera associated with the client device.
  • any of the steps 4 - 4 through 4 - 9 are also performed.
  • the method includes one of encrypting and compressing the video stream captured by the camera.
  • the method includes transmitting the encrypted and/or compressed video data to an authentication server (i.e. verification server) as a part of an authentication request to enhance the security of the transaction.
  • the method includes receiving an authentication message indicating whether or not the transaction can/has been confirmed based on an authentication process in which the authenticity of the credit card presented was assessed.
  • the method includes determining whether the authentication message indicates that the card presented by the user is likely to be valid based on the analysis of the credit card details and/or video data by the authentication server. If the authentication message indicates that the credit card is not likely authentic or that there is a question about the authenticity of the card (“No” path from block 5 - 6 ), as represented by block 5 - 7 , the method includes ending the transaction and transmitting a message reporting a possible fraud to at least one of the card issuer and a security service. In some implementations, the method is implemented so as to use location based tracking available on a smartphone and/or IP address based tracking so that the fraud report includes an indication of where the suspected fraud is taking place.
  • the use of location and/or IP address based tracking is concealed from the user of the client device.
  • the method includes displaying a positive card authentication message to the user on the client device and prompting the user to confirm the transaction/purchase. Additionally and/or alternatively, in some implementations, the authentication message indicates that the card is likely authentic and that the transaction has been processed. As represented by block 5 - 9 , the method includes determining whether or not the user has provided an input indicative of a transaction/purchase confirmation.
  • the method includes ending the transaction.
  • the method includes completing the transaction/purchase by transmitting a confirmation message to one of the online retailer, the billing center, and/or the authentication server.
  • FIG. 6 is a schematic drawing of an example credit card 620 provided to describe the various characteristics that may be identified from an image of a credit card.
  • the credit card 620 may include a cardholder name 621 (i.e. the true authorized user of the card), a credit card number 622 , an expiry date 623 , a rewards number 624 (e.g. airline miles reward number or the like), a card issuer name or logo 611 (e.g. Bank of Somewhere), one or more security features 612 (e.g. a hologram), a logo for the card type 614 (e.g. VISA or MasterCard), and a background color and/or pattern 651 .
  • a cardholder name 621 i.e. the true authorized user of the card
  • a credit card number 622 i.e. the true authorized user of the card
  • an expiry date 623 e.g. airline miles reward number or the like
  • a rewards number 624 e.g. airline miles reward number or the like
  • the credit card may also include a Card Verification Value Code (CVV or CVC), which is typically printed or engraved one either the front or back surface of the card. Additionally, these features are typically arranged in a very precise way and have other precise characteristics associated with them, which can be checked to ensure that the credit card 620 is authentic.
  • CVV or CVC Card Verification Value Code
  • characteristics such as font size, spacing, color, shadows, reflections, reflectivity, thickness, and the like may be measured and compared against authenticated card characteristics and/or card characteristics obtained from prior transactions in order to determine differences or matches.
  • card measurements such as the offset 643 of the card issuer name/logo 611 from the edge of the card, the spacing 642 between the card issuer name/logo 611 , the spacing 641 between the credit card number 622 and the security feature 612 , and the height 644 of the credit card may be measured from an image of the credit card 620 , and compared against authenticated card characteristics and/or card characteristics obtained from prior transactions in order to determine differences or matches.
  • the background 651 may include a distinctive color, a pattern, a watermark, a translucent security feature, etc., which may be evaluated to determine differences or matches as a part of the verification process.
  • FIG. 7 is a schematic drawing of an example driver license 720 (i.e. an identification card or document). Similar to the schematic of the credit card 620 of FIG. 6 , the driver license 720 includes a number of characteristic features that are typical of a driver license or the like. For example, the driver license 720 includes a photo 731 , an indicator of the jurisdiction 711 , an indicator of the license 714 , a security feature 712 (e.g. hologram or semi-transparent picture, etc.), first and second license holder information fields 721 , 722 , and a background color and/or pattern 751 .
  • a security feature 712 e.g. hologram or semi-transparent picture, etc.
  • characteristics such as a respective birth date, font size, spacing, color, shadows, reflections, reflectivity, thickness, and the like may be measured and compared against the identification issuer's verified specifications in order to determine differences or matches.
  • each of these features, individually and/or in combination, may be evaluated from an image of the driver license 720 (or other identification document) sent from a client device to a verification server.
  • FIG. 8 is a flowchart representation of a machine vision method.
  • the method is performed by a client device (e.g. smart-phone, tablet, laptop, personal computer, etc.) in order to facilitate authentication of an online financial transaction.
  • the method may be implemented on at least one of the two client devices 102 and 103 as a part of an online commerce client application.
  • the method includes receiving the video stream captured by the digital camera.
  • the method includes detecting a known mark and/or a mark that is likely to be included on the surface of a credit card.
  • the mark may be a logo, a trademark indicating the type of credit card (e.g. VISA, Mastercard, American Express, etc.), a likely sequence of numbers and/or letters, a feature such as a smart-chip, etc.
  • the method includes assessing whether the mark is in focus within a threshold range or other parameter. For example, assessing whether or not the mark is in focus may include, without limitation, comparing the detected mark against known marks stored in memory, and measuring the contrast between features included in the mark (e.g. measuring how sharp the lines are).
  • the method includes adjusting the focus incrementally and then re-assessing the focus of the mark.
  • the method includes capturing and/or selecting an image from the video stream.
  • FIG. 9 is a flowchart representation of a machine vision method.
  • the method is performed by a client device (e.g. smart-phone, tablet, laptop, personal computer, etc.) in order to facilitate authentication of an online financial transaction.
  • the method may be implemented on at least one of the two client devices 102 and 103 as a part of an online commerce client application.
  • the method includes receiving the video stream captured by the digital camera.
  • the method includes identifying the edges, corners and aspect ratio of the card within the video stream.
  • the method includes identifying a credit or debit card in the video stream based on an expected aspect ratio for the card.
  • the method includes assessing whether one or more of the edges of the card are in focus. If the edges of the card are not in focus within a threshold or the like (“No” path from block 9 - 4 ), as represented by block 9 - 5 , the method includes adjusting the focus incrementally and then re-assessing the focus of the edges. In some implementations, the device may not allow incremental adjustment of the camera focus. As such, additionally and/or alternatively, in some implementations, the method includes triggering the autofocus of the camera on the area where the card is expected and/or estimated to be.
  • the method includes assessing whether one or more of the corners are the card are in focus. If the corners are not n focus within a threshold or the like (“No” path from block 9 - 6 ), as represented by block 9 - 7 , the method includes adjusting the focus incrementally and then re-assessing the focus of the corners. On the other hand, if the corners are determined to be in focus (“Yes” path from block 9 - 6 ), as represented by block 9 - 8 , the method includes capturing an image from the video stream.
  • FIG. 10 is a flowchart representation of a machine vision method.
  • the method is performed by a client device (e.g. smart-phone, tablet, laptop, personal computer, etc.) in order to facilitate authentication of an online financial transaction.
  • a client device e.g. smart-phone, tablet, laptop, personal computer, etc.
  • the method may be implemented on at least one of the two client devices 102 and 103 as a part of an online commerce client application.
  • the method includes receiving and/or capturing an image of a credit or debit card with a digital camera.
  • the method includes applying an OCR technique to the image of the credit card in order to identify and extract the credit card details.
  • One or more of the segments of the image may include characters relating to the credit card details (e.g. segment of each group of four to six numbers of the card number, another segment of the expiry date of the card and yet another segment of the name of the card holder).
  • the image analysis may also include recognizing the characters in each identified segment. Additionally, the analysis may also include an optional verification process that includes verifying whether all pertinent segments have been identified and the relevant characters recognized.
  • the method includes determining whether all of the pertinent credit card details have been obtained by determining if all the necessary characters have been recognized within a certainty estimate above a threshold. For example, in some implementations, a measurement of contrast may be used to estimate the certainty of the estimate. The certainty estimate would be greater if there is a high degree of contrast between the text and the background color. If all of the pertinent credit card details have been extracted and/or otherwise provided by the user (“Yes” path from block 10 - 3 ), as represented by block 10 - 4 , the method includes displaying the credit card details to the user on the client device.
  • the method includes identifying the one or more character fields with missing and/or uncertain information.
  • the method includes a number of fallback procedures that may be used to obtain the missing information. For example, as represented by block 10 - 6 a , in some implementations, the method includes restricting the possible selections for the missing data to those selections that are likely or possible. For example, if the missing information is in the expiry date field, only future dates may be provided as selections. In another example, as represented by block 10 - 6 b , in some implementations, the method includes allowing the user to manually enter the missing information while not allowing the user to tamper and/or change the information that was successfully extracted by the OCR process.
  • the method includes determining whether or not the missing information has been received using one or more of the fallback procedures. If all of the pertinent credit card details have been successfully provided by the user (“Yes” path from block 10 - 7 ), as represented by block 10 - 4 , the method includes displaying the credit card details to the user on the client device. On the other hand, if the missing information has not been successfully retrieved by one of the fallback procedures (“No” path from block 10 - 7 ), the method includes a secondary set of fallback procedures. For example, as represented by block 10 - 8 a , in some implementations, the method includes sending an email, text message and/or instant message to the client device prompting the user to provide the missing information by replying to the email or text message.
  • the method includes directing the client device application to a mobile website or application interface to re-enter the credit card details.
  • the method includes directing the client device application to a website to re-enter the credit card details.
  • FIG. 11 is a flowchart representation of an authentication server method.
  • the method is performed by a verification server system in order to facilitate authentication of an online financial transaction.
  • the method may be implemented on at least one of the two verification servers 151 and 161 .
  • the method includes receiving video stream data from a client device. Then one or more characteristics of the payment instrument are identified from the received video data as described below.
  • the method includes identifying the card type shown in the video stream data.
  • the card type may be identified as either a credit card or a debit card.
  • the card type may be identified as a specification type and/or brand of credit card issued by a particular issuer. Further the card type may be identified as a credit card with a particular prestige or membership level, etc.
  • the card type may be determined by assessing whether or not the video stream data includes a mark that is identifiable by comparing a detected mark against known marks stored in memory, and measuring the contrast between features included in the mark. The card type may also be determining by looking up the credit card number to determine what the issuer indicates the card type to be.
  • the method in response to identifying the type of card represented in the video stream data, as represented by block 11 - 3 , the method includes analyzing the video stream data to identify and track the change of shadow gradients across the surface of the card in the video stream data. In other embodiments, analyzing the video stream data to identify and track the change of shadow gradients across the surface of the card in the video stream data 11 - 3 occurs independently of identifying the card type 11 - 2 . In yet other embodiments tracking shadow gradients 11 - 3 is optionally not included. As represented by block 11 - 4 , the method includes determining whether or not the relative motion of the shadow gradients is consistent with the identified card type and/or that of a credit card in similar ambient lighting.
  • the method when the lighting permits, includes measuring the shades of the embossed and/or printed digits on the credit card. Additionally and/or alternatively, the method includes measuring and/or otherwise characterizing the reflection “hotspots” (i.e., the brightest reflections within the video stream data) on the card. The shadows and/or hotspots need to move and/or change in manner consistent with the measured rotation of the card. In some implementations, the changes of a holographic image and/or a hologram on the card are assessed to determine whether the changes are consistent with the expected changes cause by the rotation of the card in space.
  • the method includes rejecting the card as invalid. Additionally and/or alternatively, in some implementations, instead of immediately rejecting the card as invalid, the method includes assessing one or more additional verification criteria to determine a composite verification score. In turn, the composite verification score can be assessed to determine whether or not to reject the card as invalid.
  • the method includes updating an assessment score.
  • the method optionally includes measuring and/or estimating the edge thickness of the card in the video stream data.
  • the method includes determining whether or not the measured/estimated edge thickness is consistent with the identified card type and/or that of a credit card in similar ambient lighting. If the edge thickness is not within a threshold range indicative of the aforementioned consistency (“No” path from block 11 - 7 ), as represented by block 11 - 20 , the method includes rejecting the card as invalid. On the other hand, if the edge thickness is within the threshold range (“Yes” path from block 11 - 7 ), as represented by block 11 - 8 , the method includes updating an assessment score.
  • the method optionally includes measuring and/or estimating the edge thickness of the card in the video stream data.
  • the method includes determining whether or not the measured/estimated edge thickness is consistent with the identified card type and/or that of a credit card in similar ambient lighting. If the edge thickness is not within a threshold range indicative of the aforementioned consistency (“No” path from block 11 - 7 ), as represented by block 11 - 20 , the method includes rejecting the card as invalid. On the other hand, if the edge thickness is within the threshold range (“Yes” path from block 11 - 7 ), as represented by block 11 - 8 , the method includes updating the assessment score.
  • the method optionally includes assessing one or more characteristics of the edge of the card, such as, without limitation, the color gradient of the edge of the card.
  • the method includes determining whether or not the measured/estimated edge characteristic is consistent with the identified card type and/or that of a credit card in similar ambient lighting. If the edge characteristic is not within a threshold range indicative of the aforementioned consistency (“No” path from block 11 - 10 ), as represented by block 11 - 20 , the method includes rejecting the card as invalid. On the other hand, if the edge characteristic is within the threshold range (“Yes” path from block 11 - 10 ), as represented by block 11 - 11 , the method includes updating the assessment score.
  • the method optionally includes assessing one or more security features on the card (e.g. holograms, digital watermarks, etc.) in the video stream data.
  • the method includes determining whether or not the one or more security features are consistent with the identified card type and/or that of a credit card in similar ambient lighting. If the security features are not within a threshold range indicative of the aforementioned consistency (“No” path from block 11 - 13 ), as represented by block 11 - 20 , the method includes rejecting the card as invalid. On the other hand, if the security features are within the threshold range (“Yes” path from block 11 - 13 ), as represented by block 11 - 14 , the method includes updating the assessment score.
  • the method optionally includes identifying and correlating information on the card in the video stream data against related information, such as, without limitation, a mileage plan number included on the face of the card.
  • the method includes determining whether or not there is a match based on the correlation (e.g. determining that the mileage plan number is associated with the name on the card based on third party information). If the related information does not match (“No” path from block 11 - 16 ), as represented by block 11 - 20 , the method includes rejecting the card as invalid. On the other hand, if there is a match (“Yes” path from block 11 - 16 ), as represented by block 11 - 17 , the method includes updating the assessment score.
  • the method includes determining whether the updated assessment score satisfies a threshold level indicative of an assessment score for a valid credit card. Specifically, in some embodiments, the one or more identified characteristics described with respect to 11 - 2 through 11 - 17 above, are each compared to a corresponding verified characteristic, and together they are used produce an assessment score for the payment instrument. Then at 11 - 18 , the method includes determining whether the assessment score satisfies a validity threshold. In some embodiments, the one or more identified characteristics are compared to corresponding verified characteristics in order to determine whether there is a match based at least on one or of the more matching rules described with respect to 11 - 2 through 11 - 17 .
  • the assessment score comparison is based on verified characteristics which include authenticated card characteristics and/or card characteristics obtained from prior transactions in order to determine differences or matches. For example, in some implementations, an assessment threshold is generated that is fitted to a first set of transactions (e.g., the first $10 k in transactions) and/or authenticated card characteristics obtained from the user in a secure initialization process. The generated assessment threshold is then used for a number of subsequently transactions (e.g., the next $ 1 k in transactions). Subsequently, the assessment threshold is updated on a sliding transactions window basis (e.g., using the previous $10 k in transactions), and so on.
  • a first set of transactions e.g., the first $10 k in transactions
  • authenticated card characteristics obtained from the user in a secure initialization process.
  • the generated assessment threshold is then used for a number of subsequently transactions (e.g., the next $ 1 k in transactions).
  • the assessment threshold is updated on a sliding transactions window basis (e.g., using the previous $10 k in
  • the method includes rejecting the card as invalid.
  • the assessment score satisfies the threshold (“Yes” path from block 11 - 18 ), as represented by block 11 - 19 , the method includes accepting the card as valid.
  • FIG. 12 is a flowchart representation of an authentication server method.
  • the method is performed by a client device (e.g. smart-phone, tablet, laptop, personal computer, etc.) in order to facilitate authentication of an online financial transaction.
  • the method may be implemented on at least one of the two verification servers 151 and 161 .
  • the server method of FIG. 12 may be provided as an extension to the method provided in FIG. 11 .
  • the method includes determining whether the updated assessment score satisfies a threshold level indicative of an assessment score for a valid credit card. If the assessment score satisfies the threshold (“Yes” path from block 11 - 18 ), as represented by block 11 - 19 , the method includes provisionally accepting the card as valid.
  • the method includes retrieving from a database (e.g. the transactions database 166 of FIG. 1 ) prior transactions data associated with the credit card.
  • the prior transactions data includes not only the credit card number but also one or more indicators of the physical and/or optical characteristics of the credit card from previous transactions. For example, characteristics such as color, surface reflectivity, measurements between characters, and the respective arrangement and positions of trademarks and/or security features may be used.
  • the method includes determining whether the card in the video stream data matches the prior transactions data. If the card does not match the prior transaction data (“No” path from block 12 - 2 ), as represented by block 11 - 20 , the method includes rejecting the card as invalid.
  • the method includes assessing whether the credit card transaction is occurring in an acceptable location or if the location is out of the ordinary for the card holder. If the card does not match the prior location data (“No” path from block 12 - 3 ), as represented by block 11 - 20 , the method includes rejecting the card as invalid. On the other hand, if the card matches the prior location data (“Yes” path from block 12 - 3 ), as represented by block 12 - 4 , the method includes assessing whether the type of transaction matches the card holder's typical spending habits or if the purchase is out of the ordinary for the card holder.
  • the method includes rejecting the card as invalid.
  • the method includes assessing whether the card holder has presented valid identification and/or user credentials. If the user has not provided valid identification (“No” path from block 12 - 5 ), as represented by block 11 - 20 , the method includes rejecting the card as invalid. On the other hand, if the user has provided valid identification (“Yes” path from block 12 - 5 ), as represented by block 12 - 6 , the method includes accepting the card as valid and approving the use of the card for the transaction.
  • first first
  • second second
  • first contact first contact
  • first contact second contact
  • first contact second contact
  • the term “if” may be construed to mean “when” or “upon” or “in response to determining” or “in accordance with a determination” or “in response to detecting,” that a stated condition precedent is true, depending on the context.
  • the phrase “if it is determined [that a stated condition precedent is true]” or “if [a stated condition precedent is true]” or “when [a stated condition precedent is true]” may be construed to mean “upon determining” or “in response to determining” or “in accordance with a determination” or “upon detecting” or “in response to detecting” that the stated condition precedent is true, depending on the context.
  • Each of the above identified elements may be stored in one or more of the previously mentioned memory devices, and corresponds to a set of instructions for performing a function described above.
  • the above identified modules or programs i.e., sets of instructions
  • memory may store a subset of the modules and data structures identified above.
  • memory may store additional modules and data structures not described above.

Abstract

Systems, methods and devices described herein enable the enhancement of the security of online financial transactions by assessing the authenticity of payment instruments, such as credit cards, using video processing analysis. For example, systems, methods and devices are operable to assess various characteristics of credit cards from video data provided by a user. Additionally and/or alternatively, one or more card characteristics captured during an online transaction may be compared against one or more of the same characteristics available in a card database indexed by card issuer, and which stores credit card characteristics for a number of cards provided by various credit card issuers. Additionally and/or alternatively, one or more card characteristics captured during an online transaction may be compared against one or more of the same characteristics captured during previous transactions to verify that the credit card currently offered matches the card used in previous transactions.

Description

  • This application claims priority to the following U.S. Provisional Patent Application which is incorporated by reference herein in its entirety: U.S. Provisional Patent Application No. 61/683,623, filed Aug. 15, 2012.
  • TECHNICAL FIELD
  • The present disclosure generally relates to the security of online financial transactions, and in particular, to assessing the authenticity of payment instruments, such as credit and debit cards, using video processing analysis.
  • BACKGROUND
  • Online commerce has developed into a mainstream alternative to conventional in-store retail shopping and has also created opportunities for new online service offerings. So it is now common for a consumer to browse online product and service offerings, select, order, and pay for a product and/or a service in a financial transaction that is substantially all online. However, online transactions are vulnerable to security breaches and various forms of fraud.
  • In particular, one of the problems with a typical online credit card verification process is that it circumvents the customary signature and identification verification protocols that take place during an in-store retail transaction. For example, during a typical online transaction, a merchant provides an order form that requires a consumer to enter personal data such a name, a billing address, a telephone number, and credit card information. The consumer enters and sends the data requested in the form over the internet or some other data connection. The merchant verifies that the credit card information is valid and that the card can be charged the payment amount. The card verification is usually conducted over a proprietary billing center verification network, such as the VisaNet network. However, the personal data and the credit card information provided by the consumer may have been acquired illicitly. Neither the merchant nor the billing center is able to reliably verify that the individual providing the personal data and credit card information is the true authorized user of the credit card. Additionally, neither the merchant nor the billing center is able to reliably verify that the individual providing the credit card details has physical possession of the actual credit card, or assess whether such a card is authentic or a counterfeit.
  • By contrast, during an in-store transaction, a sales clerk can request signed photo identification in order to verify that the person tendering the credit card is the true authorized user of the credit card. The sales clerk can then compare the signatures on the credit card and the sales slip against the signature on the picture identification, and also verify that the consumer is the same person shown on the picture identification. Moreover, the possibility that picture identification may be requested serves as a potential deterrent against using an illicitly acquired payment instrument during an in-store transaction. And in some cases, sales personnel learn to recognize the names and faces of frequent customers. Additionally, given the nature of the transaction, the sales clerk can visually and physically inspect the credit card offered to assess whether or not the card is authentic or a counterfeit.
  • SUMMARY
  • Systems, methods, and devices described herein enable the enhancement of the security of online financial transactions by assessing the authenticity of payment instruments, such as credit and debit cards, using video processing analysis. Implementations of systems, methods, and devices within the scope of the appended claims each have several aspects, no single one of which is solely responsible for the desirable attributes described herein. Without limiting the scope of the appended claims, some prominent features are described herein. After considering this discussion, and particularly after reading the section entitled “Detailed Description” one will understand how the features of various implementations are used to assess the authenticity of payment instruments, such as credit and debit cards.
  • For example, in some implementations, systems, methods, and devices are operable to assess various characteristics (e.g. variations of shadows, surface reflectivity, holograms, security features, color gradients, aspect ratios, thickness and/or length measurements, etc.) of credit cards from video data provided by a user. Additionally and/or alternatively, one or more card characteristics captured during an online transaction may be compared against one or more of the same characteristics available in a card database indexed and/or otherwise searchable by card issuer, and which stores credit card characteristics for a number of cards provided by various credit card issuers (e.g. banks, etc.). Additionally and/or alternatively, one or more card characteristics captured during an online transaction may be compared against one or more of the same characteristics captured during previous transaction(s) to verify that the credit card being used during a transaction matches the card with the same information (i.e. credit card number) from previous transaction(s). Additionally and/or alternatively, a voice print record and/or location information may be combined with the use of the encoded and/or encrypted video data to provide additional security. Additionally and/or alternatively, images of signatures, electronic signatures and/or other biometric information may be combined with the use of the encoded and/or encrypted video data to provide additional security.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • So that the present disclosure can be understood in greater detail, a more particular description may be had by reference to the features of various implementations, some of which are illustrated in the appended drawings. The appended drawings, however, illustrate only some example features of the present disclosure and are therefore not to be considered limiting, for the description may admit to other effective features.
  • FIG. 1 is a block diagram of an example client-server environment.
  • FIG. 2 is a block diagram of an example implementation of a client system.
  • FIG. 3 is a block diagram of an example implementation of a server system.
  • FIG. 4 is a flowchart representation of a client device method.
  • FIG. 5 is a flowchart representation of a client device method.
  • FIG. 6 is a schematic drawing of an example credit card.
  • FIG. 7 is a schematic drawing of an example identification document/card.
  • FIG. 8 is a flowchart representation of a machine vision method.
  • FIG. 9 is a flowchart representation of a machine vision method.
  • FIG. 10 is a flowchart representation of a machine vision method.
  • FIG. 11 is a flowchart representation of an authentication server method.
  • FIG. 12 is a flowchart representation of an authentication server method.
  • In accordance with common practice the various features illustrated in the drawings may not be drawn to scale. Accordingly, the dimensions of the various features may be arbitrarily expanded or reduced for clarity. In addition, some of the drawings may not depict all of the components of a given system, method or device. Finally, like reference numerals may be used to denote like features throughout the specification and figures.
  • DETAILED DESCRIPTION
  • Numerous details are described herein in order to provide a thorough understanding of the example implementations illustrated in the accompanying drawings. However, the invention may be practiced without these specific details. And, well-known methods, procedures, components, and circuits have not been described in exhaustive detail so as not to unnecessarily obscure more pertinent aspects of the example implementations.
  • FIG. 1 is a block diagram of an example client-server environment 100. While certain example features are illustrated, those skilled in the art will appreciate from the present disclosure that various other features have not been illustrated for the sake of brevity and so as not to obscure more pertinent aspects of the implementations disclosed herein. To that end, the client-server environment 100 includes a billing center 150, a retailer/merchant (or service provider) 140, a third party verification service provider 160, a mobile phone operator 122 (i.e. wireless carrier), an internet service provider 120, and a communications network 104. Each of the billing center 150, the retailer 140, the third party verification service provider 160, the mobile phone operator 122, the internet service provider 120 are capable of being connected to the communication network 104 in order to exchange information with one another and/or other devices and systems. In some implementations, the mobile phone operator 122 and the internet service provider 120 are operable to connect client devices to the communication network 104 as well. For example, a smartphone 102 is operable with the network of the mobile phone operator 122, which includes for example, a base station 122 a. Similarly, for example, a laptop computer 103 (or tablet, desktop, workstation or the like) is connectable to the network provided by the internet service provider 120, which is ultimately connectable to the communication network 104. Moreover, while FIG. 1 only includes one of each of the aforementioned devices and systems, those skilled in the art will appreciate from the present disclosure that any number of such devices and/or systems may be provided in a client-server environment, and particular devices may be absent. In other words, the client-server environment 100 is merely an example provided to discuss more pertinent features of the present disclosure.
  • The communication network 104 may be any combination of wired and wireless local area network (LAN) and/or wide area network (WAN), such as an intranet, an extranet, including a portion of the internet. In some implementations, the communication network 104 uses the HyperText Transport Protocol (HTTP) to transport information using the Transmission Control Protocol/Internet Protocol (TCP/IP). HTTP permits the client device 102 to access various resources available via the communication network 104. However, the various implementations described herein are not limited to the use of any particular protocol.
  • The retailer 140, for example, includes an online customer sales application server 141 and a database 142. In some implementations, the retailer 140 includes a local customer sales application, such as a point-of-sale terminal within a department store. The retailer 140 may be an online service provider (e.g. a gambling website, a social networking website, a dating website, etc.) or a retailer of real and/or digital goods (e.g. clothing, music, etc.).
  • In some implementations, the billing center 150 is associated with at least one credit company associated with a credit card, a debit card, or other payment instrument. The billing center 150 may be a computerized system holding information relating to client accounts, billing conditions and history, transactions history, and personal and other details of each client and/or of each credit card associated with the billing center 150. To that end, the billing center 150 includes a verification server 151 and a database 152. The billing center 150 may be associated with one or more credit companies, enabling the retrieval of data from one or more third party databases (not shown) including such information. For example, in order to execute and/or authorize transactions, the verification server 151 retrieves data from the database 152 to check authorization of a transaction according to predefined authorization rules followed by the billing center 151.
  • In some implementations, the third party verification service provider 160 is provided to enable the enhancement of the security of online financial transactions by assessing the authenticity of payment instruments, such as credit and debit cards, using video processing analysis. To that end, the third party verification service provider 160 is enabled to receive and analyze video data from a client device (e.g. the smartphone 102 or laptop computer 104), and includes a verification server 161, an optional user authentication card database 162, a video/image database 164, and a transactions database 166.
  • As discussed below in greater detail with reference to FIG. 2, client devices, such as the computer 103 and smartphone 102, include a display and a camera. A mobile application is operated at least in part by the client device. In some implementations, the client devices 102 and/or 103 are enabled to communicate with the billing center 150, the third party verification service provider 160, and the retailer 140. For example, the computer may include at least one of an Ethernet enabled network adapter or interface, a WiFi enabled network adapter or interface, a cable modem, a DSL modem, a cellular wireless device, or the like.
  • In operation, a user may use a client device 102/103 to access the online customer sales application server 141 provided by the retailer 140. In order to make a purchase through the online customer sales application, the camera associated with the client device is used to obtain at least video data including representations of the credit card, which is processed according to one of the various methods described below. Briefly, the video data is sent to the third party verification server provider 160 to assess the authenticity of the credit card presented by the user in the video data. In some implementations, the verification server 161 receives the video data and is enabled to assess various characteristics of the credit card from the video data provided by the user. For example, without limitation, the assessed characteristics include at least one of variations of shadows, surface reflectivity, holograms, security features, color gradients, aspect ratios, thickness measurements, and/or length measurements obtainable from the video images. Moreover, to further ensure veracity of the video data, a timestamp and/or location data associated with the video data may be analyzed to ensure that the video data is current with respect to a particular transaction and/or that the location information associated with video data indicates a location proximate to where the user is purported to be based on an IP address or other information associated with the transaction. In other words, some implementations include inspecting one or more data fields included in the received video data to determine whether or not the video data was recorded within a time period proximate to the current process (e.g. 1-2 minutes) and/or whether the video data was recorded in a place proximate to where the user is purported to be. If the timestamp is not valid and/or the location information is questionable, the method includes taking remedial action or stopping the process altogether. For example, in some implementations a remedial action includes at least requesting additional video data. Additionally and/or alternatively, the rejected video data and any subsequently received video data may be compared to determine if there are any abnormalities or other signs of fraud on the process.
  • Additionally and/or alternatively, one or more card characteristics captured during an online transaction may be compared against one or more of the same characteristics available in the optional user authenticated card database 162. In some implementations, the optional user authenticated card database 162 is indexed and/or otherwise searchable by card number, and stores user authenticated credit card characteristics each card. In other words, the optional user authenticated card database 162 stores credit (and/or debit) card characteristics that can be used to validate cards issued to individual users. For example, as described below with reference to FIG. 6, each card may have precise colors, surfaces with precise reflectivity characteristics, optical security features (e.g. holograms), and precise arrangements of characters and/or information fields that can be measured and compared against cards offered by users with the same card number.
  • Additionally and/or alternatively, one or more card characteristics captured during an online transaction may be compared against one or more of the same characteristics captured during previous transaction(s) to verify that the credit card being used during a transaction matches the card with the same information (i.e. credit card number) from previous transaction(s). To that end, in some implementations the at least one of the video/image database 164 and the transactions database 166 can be used to store values representative of card characteristics obtained from previous transactions for a particular user card and/or actual portions of the video data received by the third part verification server provider 160.
  • Additionally and/or alternatively, a voice print record and/or location information may be combined with the use of the encoded and/or encrypted video data to provide additional security. Additionally and/or alternatively, images of signatures, electronic signatures and/or other biometric information may be combined with the use of the encoded and/or encrypted video data to provide additional security.
  • FIG. 2 is a block diagram of an example implementation of a client device (e.g. smartphone 102) discussed above with reference to FIG. 1. Again, while certain specific features are illustrated, those skilled in the art will appreciate from the present disclosure that various other features have not been illustrated for the sake of brevity and so as not to obscure more pertinent aspects of the implementations disclosed herein. To that end, the client device 102/103 includes one or more processing units (CPU's) 202, one or more network or other communications interfaces 208, memory 206, a camera 209, and one or more communication buses 204 for interconnecting these and various other components. The communication buses 204 may include circuitry (sometimes called a chipset) that interconnects and controls communications between system components. The memory 206 includes high-speed random access memory, such as DRAM, SRAM, DDR RAM or other random access solid state memory devices; and may include non-volatile memory, such as one or more magnetic disk storage devices, optical disk storage devices, flash memory devices, or other non-volatile solid state storage devices. The memory 206 may optionally include one or more storage devices remotely located from the CPU(s) 202. The memory 206, including the non-volatile and volatile memory device(s) within the memory 206, comprises a non-transitory computer readable storage medium.
  • In some implementations, the memory 206 or the non-transitory computer readable storage medium of the memory 206 stores the following programs, modules and data structures, or a subset thereof including an operating system 216, a network communication module 218, and a transactions processing module 231.
  • The operating system 216 includes procedures for handling various basic system services and for performing hardware dependent tasks.
  • The network communication module 218 facilitates communication with other devices via the one or more communication network interfaces 208 (wired or wireless) and one or more communication networks, such as the internet, other wide area networks, local area networks, metropolitan area networks, and so on.
  • The transactions processing module 231 is configured to cooperate with instructions sent from a verification server (e.g. verification server 161). To that end, the transactions processing module 231 includes a video processing module 210 and an optional voice and location data verification module 211. The video processing module 210 facilitates the capture and encoding of video and/or image data to be sent to the verification server. To that end, the video processing module 210 includes a set of instructions 210 a and heuristics and metadata 210 b. Similarly, the voice and location data verification module 211 facilitates the capture and encoding of voice and location data requested by the verification server. To that end, the voice and location data verification module 211 includes a set of instructions 211 a and heuristics and metadata 211 b.
  • FIG. 3 is a block diagram of an example implementation of a verification server system 151/161 (e.g. verification server 151 or 161). While certain specific features are illustrated, those skilled in the art will appreciate from the present disclosure that various other features have not been illustrated for the sake of brevity and so as not to obscure more pertinent aspects of the implementations disclosed herein. To that end, the server system 151/161 includes one or more processing units (CPU's) 302, one or more network or other communications interfaces 308, memory 306, and one or more communication buses 304 for interconnecting these and various other components. The communication buses 304 may include circuitry (sometimes called a chipset) that interconnects and controls communications between system components. The memory 306 includes high-speed random access memory, such as DRAM, SRAM, DDR RAM, or other random access solid state memory devices; and may include non-volatile memory, such as one or more magnetic disk storage devices, optical disk storage devices, flash memory devices, or other non-volatile solid state storage devices. The memory 306 may optionally include one or more storage devices remotely located from the CPU(s) 302. The memory 306, including the non-volatile and volatile memory device(s) within the memory 306, comprises a non-transitory computer readable storage medium. In some implementations, the memory 306 or the non-transitory computer readable storage medium of the memory 306 stores the following programs, modules, and data structures, or a subset thereof including an operating system 316, a network communication module 318, a verification processing module 301, an optional user authenticated card database 162, a video/image database 164, and a transactions database 166.
  • The operating system 316 includes procedures for handling various basic system services and for performing hardware dependent tasks.
  • The network communication module 318 facilitates communication with other devices via the one or more communication network interfaces 308 (wired or wireless) and one or more communication networks, such as the internet, other wide area networks, local area networks, metropolitan area networks, and so on.
  • The verification processing module 301 includes video processing module 310 and an optional voice and location data verification module 311. The video processing module 310 facilitates the processing of video and/or image data received from the client device. To that end, the video processing module 310 includes a set of instructions 310 a and heuristics and metadata 310 b. Similarly, the voice and location data verification module 311 facilitates the processing of voice and location data received from the client device. To that end, the voice and location data verification module 311 includes a set of instructions 311 a and heuristics and metadata 311 b. The instrument verification module 312 facilitates the processing of instrument data received from the client device. To that end, the instrument verification module 312 includes a set of instructions 312 a and heuristics and metadata 312 b.
  • In some implementations, the optional user authenticated card database 162 is indexed and/or otherwise searchable by card number, and stores credit card characteristics for a number of cards on a per card basis. For example, as shown in FIG. 3, the optional user authenticated card database 162 includes card number data sets 331 a, . . . , 331 n. Each issuer card number data set includes a master or clean list of (and/or debit) card characteristics for a respective credit card obtained during a secure activation process involving the true user of the credit card. For example, the card number data set 331 a includes credit card characteristics of the respective credit card issued to the true user, which are, in some implementations, obtained during a secure activation process involving the true user.
  • In some implementations, the video/image database 164 is indexed by credit card (and/or debit card) number, and stores values representative of card characteristics obtained from previous transactions for a particular user card and/or actual portions of the video data received by the third part verification server 151/161. For example, the record for credit card number 333 includes characteristics 334. Additionally and/or alternatively, in some implementations, the transactions database 166 stores data related to transaction locations 335, types of payment instruments used 336, and/or identification document characteristics 337.
  • Although FIG. 3 shows an example implementation of a server system, FIG. 3 is intended more as a functional description of the various features which may be present in a set of servers than as a structural schematic of the embodiments described herein. In practice, and as recognized by those of ordinary skill in the art, items shown separately could be combined and some items could be separated. For example, some items shown separately in FIG. 3 could be implemented on single servers and single items could be implemented by one or more servers. The actual number of servers used to implement a server system and how features are allocated among them will vary from one implementation to another, and may depend in part on the amount of data traffic that the system must handle during peak usage periods as well as during average usage periods.
  • FIG. 4 is a flowchart representation of a client device method. In some implementations, the method is performed by a client device (e.g. smart-phone, tablet, laptop, personal computer, etc.), having an associated digital camera, in order to facilitate authentication of an online financial transaction. For example, with reference to FIG. 1, the method may be implemented on at least one of the two client devices 102 and 103 as a part of an online commerce client application. To that end, as represented by block 4-1, the method includes receiving a transaction request in which the user will present a credit or debit card to the camera associated with the client device. For example, an application running on the client device 103 detects when a user is attempting to complete a purchase by, for example, receiving an input from a web-browser and/or a sub-routine of the application operable to prompt a user for an input and subsequently receive an input indicative of the user attempting to make a purchase. In response to receiving the transaction request, as represented by block 4-2, the method optionally includes forcing a light into an “on” state so that the camera included on and/or associated with the client device is able to acquire well lit video data including a credit card (or debit card) presented by the user. As represented by block 4-3, the method includes starting the video capture process by activating the camera associated with the client device. As described in greater detail below with reference to FIG. 8, as represented by block 4-4, in some embodiments the method includes focusing the digital camera using a known feature, such as a logo or trademark. In some implementations, the method includes focusing the digital camera using a previously unknown feature, so that cards that have unknown and/or exotic features can be processed.
  • In response to sufficiently focusing the camera, as represented by block 4-5, the method includes capturing an image of the credit card presented by the user from the video stream produced by the digital camera. As represented by block 4-6, the method optionally includes applying an optical character recognition (OCR) technique to the image of the credit card in order to identify and extract the credit card details. One or more of the segments of the image may include characters relating to the credit card details (e.g. segment of each group of four to six numbers of the card number, another segment of the expiry date of the card and yet another segment of the name of the card holder). The image analysis may also include recognizing the characters in each identified segment. Additionally, the analysis may also include an optional verification process that includes verifying whether all pertinent segments have been identified and the relevant characters recognized. Additionally and/or alternatively, in some implementations, the image may be sent to a server, where the OCR process is applied to the image.
  • To that end, as represented by block 4-7, the method includes determining whether all of the pertinent credit card details have been obtained. If any of the pertinent credit card details are missing or could not be extracted from the image (“No” path from block 4-7), as represented by block 4-8, the method includes reverting to a fallback procedure to obtain the pertinent credit card details. On the other hand, if all of the pertinent credit card details have been extracted and/or otherwise provided by the user (“Yes” path from block 4-7), as represented by block 4-9, the method includes displaying at least some of the credit card details to the user on the client device 103. As represented by block 4-10, the method includes receiving a payment confirmation input from the user in response to displaying the credit card details. As represented by block 4-11, the method includes transmitting video data to the authentication or verification server as a part of an authentication request to enhance the security of the transaction. In some embodiments, the pertinent cretid card details, extracted from the captured image and/or received from the user are also transmitted along with the video data at 4-11. As represented by block 4-12, the method includes receiving an authentication message indicating whether or not the transaction can/has been confirmed based on an authentication process in which the authenticity of the credit card presented was assessed.
  • FIG. 5 is a flowchart representation of a client device method. As will be apparent, some of the steps described below are functionally the same or similar to those described in FIG. 4, and as such the description of the method has been truncated. For more details regarding these steps, one should refer to the description of FIG. 4. In some implementations, the method is performed by a client device (e.g. smart-phone, tablet, laptop, personal computer, etc.) in order to facilitate authentication of an online financial transaction. For example, with reference to FIG. 1, the method may be implemented on at least one of the two client devices 102 and 103 as a part of an online commerce client application. To that end, as represented by block 5-1, the method includes receiving a transaction request in which the user will present a credit or debit card to the camera associated with the client device. In response to receiving the transaction request, as represented by block 5-2, the method includes starting the video capture process by activating the camera associated with the client device. Optionally any of the steps 4-4 through 4-9 are also performed. As represented by block 5-3, the method includes one of encrypting and compressing the video stream captured by the camera. As represented by block 5-4, the method includes transmitting the encrypted and/or compressed video data to an authentication server (i.e. verification server) as a part of an authentication request to enhance the security of the transaction. As represented by block 5-5, the method includes receiving an authentication message indicating whether or not the transaction can/has been confirmed based on an authentication process in which the authenticity of the credit card presented was assessed.
  • As represented by block 5-6, the method includes determining whether the authentication message indicates that the card presented by the user is likely to be valid based on the analysis of the credit card details and/or video data by the authentication server. If the authentication message indicates that the credit card is not likely authentic or that there is a question about the authenticity of the card (“No” path from block 5-6), as represented by block 5-7, the method includes ending the transaction and transmitting a message reporting a possible fraud to at least one of the card issuer and a security service. In some implementations, the method is implemented so as to use location based tracking available on a smartphone and/or IP address based tracking so that the fraud report includes an indication of where the suspected fraud is taking place. In some implementations, the use of location and/or IP address based tracking is concealed from the user of the client device. On the other hand, if the authentication message indicates that the credit card is likely authentic (“Yes” path from block 5-6), as represented by block 5-8, the method includes displaying a positive card authentication message to the user on the client device and prompting the user to confirm the transaction/purchase. Additionally and/or alternatively, in some implementations, the authentication message indicates that the card is likely authentic and that the transaction has been processed. As represented by block 5-9, the method includes determining whether or not the user has provided an input indicative of a transaction/purchase confirmation. If the user has not provided such an input within a threshold amount of time and/or if the user has provided an input indicative of cancelling the transaction/purchase, as represented by block 5-10, the method includes ending the transaction. On the other hand, if the user has provided an input indicative of a transaction/purchase confirmation (“Yes” path from block 5-9), as represented by block 5-11, the method includes completing the transaction/purchase by transmitting a confirmation message to one of the online retailer, the billing center, and/or the authentication server.
  • FIG. 6 is a schematic drawing of an example credit card 620 provided to describe the various characteristics that may be identified from an image of a credit card. As is typical of a credit card, the credit card 620 may include a cardholder name 621 (i.e. the true authorized user of the card), a credit card number 622, an expiry date 623, a rewards number 624 (e.g. airline miles reward number or the like), a card issuer name or logo 611 (e.g. Bank of Somewhere), one or more security features 612 (e.g. a hologram), a logo for the card type 614 (e.g. VISA or MasterCard), and a background color and/or pattern 651. Additionally, the credit card may also include a Card Verification Value Code (CVV or CVC), which is typically printed or engraved one either the front or back surface of the card. Additionally, these features are typically arranged in a very precise way and have other precise characteristics associated with them, which can be checked to ensure that the credit card 620 is authentic.
  • For example, with respect to the cardholder name 621, the credit card number 622, the expiry date 623, the rewards number 624, the card issuer name/log 611, characteristics such as font size, spacing, color, shadows, reflections, reflectivity, thickness, and the like may be measured and compared against authenticated card characteristics and/or card characteristics obtained from prior transactions in order to determine differences or matches. Similarly, card measurements, such as the offset 643 of the card issuer name/logo 611 from the edge of the card, the spacing 642 between the card issuer name/logo 611, the spacing 641 between the credit card number 622 and the security feature 612, and the height 644 of the credit card may be measured from an image of the credit card 620, and compared against authenticated card characteristics and/or card characteristics obtained from prior transactions in order to determine differences or matches. Additionally and/or alternatively, the background 651 may include a distinctive color, a pattern, a watermark, a translucent security feature, etc., which may be evaluated to determine differences or matches as a part of the verification process.
  • Moreover, the aforementioned characteristics discussed are merely examples of some of the many characteristics that may be measured from images of a credit card (or other payment instrument or identification document). As such, those skilled in the art will appreciate from the present disclosure that numerous other characteristics may be considered and used for verification purposes.
  • FIG. 7 is a schematic drawing of an example driver license 720 (i.e. an identification card or document). Similar to the schematic of the credit card 620 of FIG. 6, the driver license 720 includes a number of characteristic features that are typical of a driver license or the like. For example, the driver license 720 includes a photo 731, an indicator of the jurisdiction 711, an indicator of the license 714, a security feature 712 (e.g. hologram or semi-transparent picture, etc.), first and second license holder information fields 721, 722, and a background color and/or pattern 751. Additionally and/or alternatively, characteristics such as a respective birth date, font size, spacing, color, shadows, reflections, reflectivity, thickness, and the like may be measured and compared against the identification issuer's verified specifications in order to determine differences or matches. As described above with reference to FIG. 6, each of these features, individually and/or in combination, may be evaluated from an image of the driver license 720 (or other identification document) sent from a client device to a verification server.
  • FIG. 8 is a flowchart representation of a machine vision method. In some implementations, the method is performed by a client device (e.g. smart-phone, tablet, laptop, personal computer, etc.) in order to facilitate authentication of an online financial transaction. For example, with reference to FIG. 1, the method may be implemented on at least one of the two client devices 102 and 103 as a part of an online commerce client application. To that end, as represented by block 8-1, the method includes receiving the video stream captured by the digital camera. As represented by block 8-2, the method includes detecting a known mark and/or a mark that is likely to be included on the surface of a credit card. For example, the mark may be a logo, a trademark indicating the type of credit card (e.g. VISA, Mastercard, American Express, etc.), a likely sequence of numbers and/or letters, a feature such as a smart-chip, etc. As represented by block 8-3, the method includes assessing whether the mark is in focus within a threshold range or other parameter. For example, assessing whether or not the mark is in focus may include, without limitation, comparing the detected mark against known marks stored in memory, and measuring the contrast between features included in the mark (e.g. measuring how sharp the lines are). If the mark is not in focus within a threshold or the like (“No” path from block 8-3), as represented by block 8-4, the method includes adjusting the focus incrementally and then re-assessing the focus of the mark. On the other hand, if the mark is determined to be in focus (“Yes” path from block 8-3), as represented by block 8-5, the method includes capturing and/or selecting an image from the video stream.
  • FIG. 9 is a flowchart representation of a machine vision method. In some implementations, the method is performed by a client device (e.g. smart-phone, tablet, laptop, personal computer, etc.) in order to facilitate authentication of an online financial transaction. For example, with reference to FIG. 1, the method may be implemented on at least one of the two client devices 102 and 103 as a part of an online commerce client application. To that end, as represented by block 9-1, the method includes receiving the video stream captured by the digital camera. As represented by block 9-2, the method includes identifying the edges, corners and aspect ratio of the card within the video stream. As represented by block 9-3, the method includes identifying a credit or debit card in the video stream based on an expected aspect ratio for the card.
  • As represented by block 9-4, the method includes assessing whether one or more of the edges of the card are in focus. If the edges of the card are not in focus within a threshold or the like (“No” path from block 9-4), as represented by block 9-5, the method includes adjusting the focus incrementally and then re-assessing the focus of the edges. In some implementations, the device may not allow incremental adjustment of the camera focus. As such, additionally and/or alternatively, in some implementations, the method includes triggering the autofocus of the camera on the area where the card is expected and/or estimated to be. On the other hand, if the edges are determined to be in focus (“Yes” path from block 9-4), as represented by block 9-6, the method includes assessing whether one or more of the corners are the card are in focus. If the corners are not n focus within a threshold or the like (“No” path from block 9-6), as represented by block 9-7, the method includes adjusting the focus incrementally and then re-assessing the focus of the corners. On the other hand, if the corners are determined to be in focus (“Yes” path from block 9-6), as represented by block 9-8, the method includes capturing an image from the video stream.
  • FIG. 10 is a flowchart representation of a machine vision method. In some implementations, the method is performed by a client device (e.g. smart-phone, tablet, laptop, personal computer, etc.) in order to facilitate authentication of an online financial transaction. For example, with reference to FIG. 1, the method may be implemented on at least one of the two client devices 102 and 103 as a part of an online commerce client application. To that end, as represented by block 10-1, the method includes receiving and/or capturing an image of a credit or debit card with a digital camera.
  • As represented by block 10-2, the method includes applying an OCR technique to the image of the credit card in order to identify and extract the credit card details. One or more of the segments of the image may include characters relating to the credit card details (e.g. segment of each group of four to six numbers of the card number, another segment of the expiry date of the card and yet another segment of the name of the card holder). The image analysis may also include recognizing the characters in each identified segment. Additionally, the analysis may also include an optional verification process that includes verifying whether all pertinent segments have been identified and the relevant characters recognized.
  • To that end, as represented by block 10-3, the method includes determining whether all of the pertinent credit card details have been obtained by determining if all the necessary characters have been recognized within a certainty estimate above a threshold. For example, in some implementations, a measurement of contrast may be used to estimate the certainty of the estimate. The certainty estimate would be greater if there is a high degree of contrast between the text and the background color. If all of the pertinent credit card details have been extracted and/or otherwise provided by the user (“Yes” path from block 10-3), as represented by block 10-4, the method includes displaying the credit card details to the user on the client device. On the other hand, if any of the pertinent credit card details are missing or could not be extracted from the image (“No” path from block 10-3), as represented by block 10-5, the method includes identifying the one or more character fields with missing and/or uncertain information.
  • In response to identifying the fields with the missing information, the method includes a number of fallback procedures that may be used to obtain the missing information. For example, as represented by block 10-6 a, in some implementations, the method includes restricting the possible selections for the missing data to those selections that are likely or possible. For example, if the missing information is in the expiry date field, only future dates may be provided as selections. In another example, as represented by block 10-6 b, in some implementations, the method includes allowing the user to manually enter the missing information while not allowing the user to tamper and/or change the information that was successfully extracted by the OCR process.
  • As represented by block 10-7, the method includes determining whether or not the missing information has been received using one or more of the fallback procedures. If all of the pertinent credit card details have been successfully provided by the user (“Yes” path from block 10-7), as represented by block 10-4, the method includes displaying the credit card details to the user on the client device. On the other hand, if the missing information has not been successfully retrieved by one of the fallback procedures (“No” path from block 10-7), the method includes a secondary set of fallback procedures. For example, as represented by block 10-8 a, in some implementations, the method includes sending an email, text message and/or instant message to the client device prompting the user to provide the missing information by replying to the email or text message. In another example, in some implementations, as represented by block 10-8 b, the method includes directing the client device application to a mobile website or application interface to re-enter the credit card details. In another example, in some implementations, as represented by block 10-8 c, the method includes directing the client device application to a website to re-enter the credit card details.
  • FIG. 11 is a flowchart representation of an authentication server method. In some implementations, the method is performed by a verification server system in order to facilitate authentication of an online financial transaction. For example, with reference to FIG. 1, the method may be implemented on at least one of the two verification servers 151 and 161. To that end, as represented by block 11-1, the method includes receiving video stream data from a client device. Then one or more characteristics of the payment instrument are identified from the received video data as described below. As represented by block 11-2, in some embodiments, the method includes identifying the card type shown in the video stream data. For example, the card type may be identified as either a credit card or a debit card. Additionally and/or alternatively, the card type may be identified as a specification type and/or brand of credit card issued by a particular issuer. Further the card type may be identified as a credit card with a particular prestige or membership level, etc. The card type may be determined by assessing whether or not the video stream data includes a mark that is identifiable by comparing a detected mark against known marks stored in memory, and measuring the contrast between features included in the mark. The card type may also be determining by looking up the credit card number to determine what the issuer indicates the card type to be.
  • In some embodiments in response to identifying the type of card represented in the video stream data, as represented by block 11-3, the method includes analyzing the video stream data to identify and track the change of shadow gradients across the surface of the card in the video stream data. In other embodiments, analyzing the video stream data to identify and track the change of shadow gradients across the surface of the card in the video stream data 11-3 occurs independently of identifying the card type 11-2. In yet other embodiments tracking shadow gradients 11-3 is optionally not included. As represented by block 11-4, the method includes determining whether or not the relative motion of the shadow gradients is consistent with the identified card type and/or that of a credit card in similar ambient lighting. In some implementations, when the lighting permits, the method includes measuring the shades of the embossed and/or printed digits on the credit card. Additionally and/or alternatively, the method includes measuring and/or otherwise characterizing the reflection “hotspots” (i.e., the brightest reflections within the video stream data) on the card. The shadows and/or hotspots need to move and/or change in manner consistent with the measured rotation of the card. In some implementations, the changes of a holographic image and/or a hologram on the card are assessed to determine whether the changes are consistent with the expected changes cause by the rotation of the card in space.
  • If the measured gradient motion is not within a threshold range indicative of the aforementioned consistency (“No” path from block 11-4), as represented by block 11-20, the method includes rejecting the card as invalid. Additionally and/or alternatively, in some implementations, instead of immediately rejecting the card as invalid, the method includes assessing one or more additional verification criteria to determine a composite verification score. In turn, the composite verification score can be assessed to determine whether or not to reject the card as invalid.
  • On the other hand, if the measured gradient motion is within the threshold range (“Yes” path from block 11-4), as represented by block 11-5, the method includes updating an assessment score. As represented by block 11-6, the method optionally includes measuring and/or estimating the edge thickness of the card in the video stream data. As represented by block 11-7, the method includes determining whether or not the measured/estimated edge thickness is consistent with the identified card type and/or that of a credit card in similar ambient lighting. If the edge thickness is not within a threshold range indicative of the aforementioned consistency (“No” path from block 11-7), as represented by block 11-20, the method includes rejecting the card as invalid. On the other hand, if the edge thickness is within the threshold range (“Yes” path from block 11-7), as represented by block 11-8, the method includes updating an assessment score.
  • As represented by block 11-6, the method optionally includes measuring and/or estimating the edge thickness of the card in the video stream data.
  • As represented by block 11-7, the method includes determining whether or not the measured/estimated edge thickness is consistent with the identified card type and/or that of a credit card in similar ambient lighting. If the edge thickness is not within a threshold range indicative of the aforementioned consistency (“No” path from block 11-7), as represented by block 11-20, the method includes rejecting the card as invalid. On the other hand, if the edge thickness is within the threshold range (“Yes” path from block 11-7), as represented by block 11-8, the method includes updating the assessment score.
  • As represented by block 11-9, the method optionally includes assessing one or more characteristics of the edge of the card, such as, without limitation, the color gradient of the edge of the card. As represented by block 11-10, the method includes determining whether or not the measured/estimated edge characteristic is consistent with the identified card type and/or that of a credit card in similar ambient lighting. If the edge characteristic is not within a threshold range indicative of the aforementioned consistency (“No” path from block 11-10), as represented by block 11-20, the method includes rejecting the card as invalid. On the other hand, if the edge characteristic is within the threshold range (“Yes” path from block 11-10), as represented by block 11-11, the method includes updating the assessment score.
  • As represented by block 11-12, the method optionally includes assessing one or more security features on the card (e.g. holograms, digital watermarks, etc.) in the video stream data. As represented by block 11-13, the method includes determining whether or not the one or more security features are consistent with the identified card type and/or that of a credit card in similar ambient lighting. If the security features are not within a threshold range indicative of the aforementioned consistency (“No” path from block 11-13), as represented by block 11-20, the method includes rejecting the card as invalid. On the other hand, if the security features are within the threshold range (“Yes” path from block 11-13), as represented by block 11-14, the method includes updating the assessment score.
  • As represented by block 11-15, the method optionally includes identifying and correlating information on the card in the video stream data against related information, such as, without limitation, a mileage plan number included on the face of the card. As represented by block 11-16, the method includes determining whether or not there is a match based on the correlation (e.g. determining that the mileage plan number is associated with the name on the card based on third party information). If the related information does not match (“No” path from block 11-16), as represented by block 11-20, the method includes rejecting the card as invalid. On the other hand, if there is a match (“Yes” path from block 11-16), as represented by block 11-17, the method includes updating the assessment score.
  • As represented by block 11-18, the method includes determining whether the updated assessment score satisfies a threshold level indicative of an assessment score for a valid credit card. Specifically, in some embodiments, the one or more identified characteristics described with respect to 11-2 through 11-17 above, are each compared to a corresponding verified characteristic, and together they are used produce an assessment score for the payment instrument. Then at 11-18, the method includes determining whether the assessment score satisfies a validity threshold. In some embodiments, the one or more identified characteristics are compared to corresponding verified characteristics in order to determine whether there is a match based at least on one or of the more matching rules described with respect to 11-2 through 11-17. In some implementations, the assessment score comparison is based on verified characteristics which include authenticated card characteristics and/or card characteristics obtained from prior transactions in order to determine differences or matches. For example, in some implementations, an assessment threshold is generated that is fitted to a first set of transactions (e.g., the first $10 k in transactions) and/or authenticated card characteristics obtained from the user in a secure initialization process. The generated assessment threshold is then used for a number of subsequently transactions (e.g., the next $ 1 k in transactions). Subsequently, the assessment threshold is updated on a sliding transactions window basis (e.g., using the previous $10 k in transactions), and so on. If the assessment score does not satisfy the threshold (“No” path from block 11-18), as represented by block 11-20, the method includes rejecting the card as invalid. On the other hand, if the assessment score satisfies the threshold (“Yes” path from block 11-18), as represented by block 11-19, the method includes accepting the card as valid.
  • FIG. 12 is a flowchart representation of an authentication server method. In some implementations, the method is performed by a client device (e.g. smart-phone, tablet, laptop, personal computer, etc.) in order to facilitate authentication of an online financial transaction. For example, with reference to FIG. 1, the method may be implemented on at least one of the two verification servers 151 and 161. Moreover, the server method of FIG. 12 may be provided as an extension to the method provided in FIG. 11. To that end, with reference to FIGS. 11 and 12, the method includes determining whether the updated assessment score satisfies a threshold level indicative of an assessment score for a valid credit card. If the assessment score satisfies the threshold (“Yes” path from block 11-18), as represented by block 11-19, the method includes provisionally accepting the card as valid.
  • As represented by block 12-1, the method includes retrieving from a database (e.g. the transactions database 166 of FIG. 1) prior transactions data associated with the credit card. In some implementations, the prior transactions data includes not only the credit card number but also one or more indicators of the physical and/or optical characteristics of the credit card from previous transactions. For example, characteristics such as color, surface reflectivity, measurements between characters, and the respective arrangement and positions of trademarks and/or security features may be used. As represented by block 12-2, the method includes determining whether the card in the video stream data matches the prior transactions data. If the card does not match the prior transaction data (“No” path from block 12-2), as represented by block 11-20, the method includes rejecting the card as invalid. On the other hand, if the card matches the prior transaction data (“Yes” path from block 12-2), as represented by block 12-3, the method includes assessing whether the credit card transaction is occurring in an acceptable location or if the location is out of the ordinary for the card holder. If the card does not match the prior location data (“No” path from block 12-3), as represented by block 11-20, the method includes rejecting the card as invalid. On the other hand, if the card matches the prior location data (“Yes” path from block 12-3), as represented by block 12-4, the method includes assessing whether the type of transaction matches the card holder's typical spending habits or if the purchase is out of the ordinary for the card holder. If the card does not match the prior spending habits (“No” path from block 12-4), as represented by block 11-20, the method includes rejecting the card as invalid. On the other hand, if the card matches the prior spending habits (“Yes” path from block 12-4), as represented by block 12-5, the method includes assessing whether the card holder has presented valid identification and/or user credentials. If the user has not provided valid identification (“No” path from block 12-5), as represented by block 11-20, the method includes rejecting the card as invalid. On the other hand, if the user has provided valid identification (“Yes” path from block 12-5), as represented by block 12-6, the method includes accepting the card as valid and approving the use of the card for the transaction.
  • Various aspects of implementations within the scope of the appended claims are described above. It should be apparent that the aspects described herein may be embodied in a wide variety of forms and that any specific structure and/or function described herein is merely illustrative. Based on the present disclosure one skilled in the art should appreciate that an aspect described herein may be implemented independently of any other aspects and that two or more of these aspects may be combined in various ways. For example, an apparatus may be implemented and/or a method may be practiced using any number of the aspects set forth herein. In addition, such an apparatus may be implemented and/or such a method may be practiced using other structure and/or functionality in addition to or other than one or more of the aspects set forth herein.
  • It will also be understood that, although the terms “first,” “second,” etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first contact could be termed a second contact, and, similarly, a second contact could be termed a first contact, which changing the meaning of the description, so long as all occurrences of the “first contact” are renamed consistently and all occurrences of the second contact are renamed consistently. The first contact and the second contact are both contacts, but they are not the same contact.
  • The terminology used herein is for the purpose of describing particular implementations only and is not intended to be limiting of the claims. As used in the description of the implementations and the appended claims, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will also be understood that the term “and/or” as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
  • As used herein, the term “if” may be construed to mean “when” or “upon” or “in response to determining” or “in accordance with a determination” or “in response to detecting,” that a stated condition precedent is true, depending on the context. Similarly, the phrase “if it is determined [that a stated condition precedent is true]” or “if [a stated condition precedent is true]” or “when [a stated condition precedent is true]” may be construed to mean “upon determining” or “in response to determining” or “in accordance with a determination” or “upon detecting” or “in response to detecting” that the stated condition precedent is true, depending on the context.
  • Each of the above identified elements may be stored in one or more of the previously mentioned memory devices, and corresponds to a set of instructions for performing a function described above. The above identified modules or programs (i.e., sets of instructions) need not be implemented as separate software programs, procedures or modules, and thus various subsets of these modules may be combined or otherwise re-arranged in various embodiments. In some embodiments, memory may store a subset of the modules and data structures identified above. Furthermore, memory may store additional modules and data structures not described above.
  • The foregoing description, for purpose of explanation, has been described with reference to specific embodiments. However, the illustrative discussions above are not intended to be exhaustive or to limit the invention to the precise forms disclosed. Many modifications and variations are possible in view of the above teachings. The embodiments were chosen and described in order to best explain the principles of the invention and its practical applications, to thereby enable others skilled in the art to best utilize the invention and various embodiments with various modifications as are suited to the particular use contemplated.

Claims (20)

What is claimed is:
1. A computer-implemented method of verifying an online financial transaction using video data, the method comprising:
at a device including one or more processors and memory storing one or more programs for execution by the one or more processors:
receiving the video data including a representation of a payment instrument;
identifying one or more characteristics of the payment instrument from the received video data;
comparing one or more of the identified characteristics to corresponding verified characteristics to produce an assessment score;
determining whether the assessment score satisfies a validity threshold; and
providing an authorization indicator in response to the determination.
2. The method of claim 1, wherein:
the authorization indicator indicates that the online transaction or service cannot be authorized in response to determining that the validity threshold is not reached; and
the authorization indicator indicates that the online transaction or service is authorized in response to determining the validity threshold is reached.
3. The method of claim 1, further comprising initiating a remedial process in response to determining that the validity threshold is not reached.
4. The method of claim 1, further comprising:
receiving a transaction request; and
transmitting a request for the video data in response to receiving the transaction request.
5. The method of claim 4, wherein the transaction request is received from a merchant application server.
6. The method of claim 1, further comprising checking a timestamp of the received video data.
7. The method of claim 6, further comprising requesting taking remedial action when the timestamp is not valid.
8. The method of claim 1, further comprising checking location information associated with the received video data.
9. The method of claim 8, further comprising assessing:
assessing whether the location information is out of the ordinary for payment instrument; and
providing a fraud report including the location information as an indication of where the suspected fraud is taking place.
10. The method of claim 1, further comprising:
acquiring an image from the received video data;
applying an optical character recognition technique to the image; and
identifying payment instrument data from the image after applying the optical character recognition technique.
11. The method of claim 1, wherein identifying one or more characteristics of the payment instrument from the video data includes identifying a change of shadow gradients across the surface of the card in the video stream data.
12. The method of claim 1, wherein identifying one or more characteristics of the payment instrument from the video data includes identifying a change of a holographic image and/or a hologram on the payment instrument.
13. The method of claim 1, wherein identifying one or more characteristics of the payment instrument from the video data includes identifying an edge thickness of the payment instrument.
14. A computer-implemented method of verifying an online financial transaction using video data, the method comprising:
at a device including one or more processors and memory storing one or more programs for execution by the one or more processors:
receiving the video data including a representation of a payment instrument;
identifying one or more characteristics of the payment instrument from the received video data;
comparing the one or more identified characteristics to corresponding verified characteristics in order to determine whether there is a match based at least on one or more matching rules; and
providing an authorization indicator in response to the determination.
15. The method of claim 14, wherein:
the authorization indicator indicates that the online transaction or service cannot be authorized in response to determining that there is no match for at least one of the matching rules.
16. The method of claim 14, further comprising initiating a remedial process in response to determining that there is no match.
17. A system, for verifying an online financial transaction using video data, comprising:
one or more processors; and
memory storing one or more programs to be executed by the one or more processors;
the one or more programs comprising instructions for:
receiving the video data including a representation of a payment instrument;
identifying one or more characteristics of the payment instrument from the received video data;
comparing one or more of the identified characteristics to corresponding verified characteristics to produce an assessment score;
determining whether the assessment score satisfies a validity threshold; and
providing an authorization indicator in response to the determination.
18. A non-transitory computer readable storage medium storing one or more programs configured for execution by a computer, the one or more programs comprising instructions for:
receiving the video data including a representation of a payment instrument;
identifying one or more characteristics of the payment instrument from the received video data;
comparing one or more of the identified characteristics to corresponding verified characteristics to produce an assessment score;
determining whether the assessment score satisfies a validity threshold; and
providing an authorization indicator in response to the determination.
19. A computer-implemented method of facilitating verification of a payment instrument for an online financial transaction using video data, the method comprising:
at a device including one or more processors and memory storing one or more programs for execution by the one or more processors:
obtaining video data including a representation of a payment instrument;
capturing an image of the payment instrument from the video stream;
applying OCR to optical character recognition (OCR) technique to the captured image in order to identify and extract the payment device details;
verifying that sufficient payment device details have been identified and extracted from the payment device;
transmit video data and payment device details to a verification system; and
receiving an authentication message from the verification system indicating whether or not the transaction is confirmed.
20. The computer-implemented method of claim 19, further comprising of encrypting and compressing the video data and prior to transmission.
US13/968,164 2012-08-15 2013-08-15 Image Processing For Credit Card Validation Abandoned US20140052636A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
PCT/US2013/055195 WO2014028769A2 (en) 2012-08-15 2013-08-15 Image processing for credit validation
US13/968,164 US20140052636A1 (en) 2012-08-15 2013-08-15 Image Processing For Credit Card Validation
US15/689,389 US10878274B2 (en) 2012-08-15 2017-08-29 Systems and methods of image processing for remote validation
US17/104,570 US11455786B2 (en) 2012-08-15 2020-11-25 Systems and methods of image processing for remote validation

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201261683623P 2012-08-15 2012-08-15
US13/968,164 US20140052636A1 (en) 2012-08-15 2013-08-15 Image Processing For Credit Card Validation

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/689,389 Continuation US10878274B2 (en) 2012-08-15 2017-08-29 Systems and methods of image processing for remote validation

Publications (1)

Publication Number Publication Date
US20140052636A1 true US20140052636A1 (en) 2014-02-20

Family

ID=50100783

Family Applications (3)

Application Number Title Priority Date Filing Date
US13/968,164 Abandoned US20140052636A1 (en) 2012-08-15 2013-08-15 Image Processing For Credit Card Validation
US15/689,389 Active 2034-08-12 US10878274B2 (en) 2012-08-15 2017-08-29 Systems and methods of image processing for remote validation
US17/104,570 Active 2033-08-30 US11455786B2 (en) 2012-08-15 2020-11-25 Systems and methods of image processing for remote validation

Family Applications After (2)

Application Number Title Priority Date Filing Date
US15/689,389 Active 2034-08-12 US10878274B2 (en) 2012-08-15 2017-08-29 Systems and methods of image processing for remote validation
US17/104,570 Active 2033-08-30 US11455786B2 (en) 2012-08-15 2020-11-25 Systems and methods of image processing for remote validation

Country Status (3)

Country Link
US (3) US20140052636A1 (en)
EP (1) EP2885751A4 (en)
WO (1) WO2014028769A2 (en)

Cited By (56)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150006387A1 (en) * 2013-06-28 2015-01-01 Google Inc. Preventing fraud using continuous card scanning
US20150023604A1 (en) * 2013-07-19 2015-01-22 Google Inc. Card art display
US20150078671A1 (en) * 2013-09-19 2015-03-19 IDChecker, Inc. Automated document recognition, identification, and data extraction
US20150287002A1 (en) * 2013-03-12 2015-10-08 Google Inc. Extraction of financial account information from a digital image of a card
US20150348019A1 (en) * 2014-05-30 2015-12-03 Visa International Service Association Image Analysis for Account Authorization
US20150347859A1 (en) * 2014-05-30 2015-12-03 Apple Inc. Credit Card Auto-Fill
US9251431B2 (en) 2014-05-30 2016-02-02 Apple Inc. Object-of-interest detection and recognition with split, full-resolution image processing pipeline
WO2016025071A1 (en) * 2014-08-14 2016-02-18 Alibaba Group Holding Limited Method and system for verifying user identity using card features
US9277123B2 (en) 2014-05-30 2016-03-01 Apple Inc. Systems and methods for exposure metering for timelapse video
US9324376B2 (en) 2014-09-30 2016-04-26 Apple Inc. Time-lapse video capture with temporal points of interest
US9367753B2 (en) 2013-06-03 2016-06-14 Alipay.Com Co., Ltd Method and system for recognizing information on a card
US9426409B2 (en) 2014-09-30 2016-08-23 Apple Inc. Time-lapse video capture with optimal image stabilization
US20160321664A1 (en) * 2015-04-28 2016-11-03 Ronald R. Erickson System and method for secure transactions using images
US9495586B1 (en) 2013-09-18 2016-11-15 IDChecker, Inc. Identity verification using biometric data
US9565370B2 (en) 2014-05-30 2017-02-07 Apple Inc. System and method for assisting in computer interpretation of surfaces carrying symbols or characters
US9584475B1 (en) * 2014-03-10 2017-02-28 T. Ronald Theodore System and method for optical security firewalls in computer communication systems
US9665754B2 (en) 2014-05-28 2017-05-30 IDChecker, Inc. Identification verification using a device with embedded radio-frequency identification functionality
WO2017114289A1 (en) * 2015-12-29 2017-07-06 中国银联股份有限公司 Bank-card information authentication method, client terminal, and banking system
US20170372320A1 (en) * 2016-06-23 2017-12-28 Custombike Ag System and method for executing remote electronic authentication
US9992443B2 (en) 2014-05-30 2018-06-05 Apple Inc. System and methods for time lapse video acquisition and compression
US10008099B2 (en) 2015-08-17 2018-06-26 Optimum Id, Llc Methods and systems for providing online monitoring of released criminals by law enforcement
WO2018118212A1 (en) * 2016-12-20 2018-06-28 Mastercard International Incorporated Systems and methods for processing a payment transaction authorization request
US10176371B2 (en) 2015-02-03 2019-01-08 Jumio Corporation Systems and methods for imaging identification information
US10225248B2 (en) 2014-06-11 2019-03-05 Optimum Id Llc Methods and systems for providing online verification and security
US10249013B2 (en) 2015-02-03 2019-04-02 Alibaba Group Holding Limited Method and system for wireless payment of public transport fare
US10275813B2 (en) 2014-07-08 2019-04-30 Alibaba Group Holding Limited Method and system for providing a transaction platform for pre-owned merchandise
US10275613B1 (en) * 2018-04-20 2019-04-30 Capital One Services, Llc Identity breach notification and remediation
US10296636B2 (en) 2015-10-09 2019-05-21 Alibaba Group Holding Limited Efficient navigation category management
US20190180267A1 (en) * 2016-08-15 2019-06-13 Huawei Technologies Co., Ltd. Method and apparatus for binding bank card in payment application
US10325088B2 (en) 2014-07-03 2019-06-18 Alibaba Group Holding Limited Method and system for information authentication
US10331291B1 (en) * 2014-12-31 2019-06-25 Morpho Trust USA, LLC Visual verification of digital identifications
US20190272540A1 (en) * 2017-02-16 2019-09-05 SmarTBotHub LLC Computer-Implemented System And Method For Performing Social Network Secure Transactions
US10438210B1 (en) 2019-02-19 2019-10-08 Capital One Services, Llc Determining whether a user has possession of a transaction card and/or whether the user is authorized to possess the transaction card
AU2017226429B2 (en) * 2016-03-02 2019-10-10 Ping An Technology (Shenzhen) Co., Ltd. Automatic extraction method, device and system for driving licence expiration date, and storage medium
US10475038B1 (en) 2018-11-26 2019-11-12 Capital One Services, Llc Systems and methods for visual verification
US10552697B2 (en) * 2012-02-03 2020-02-04 Jumio Corporation Systems, devices, and methods for identifying user data
US10558967B2 (en) 2008-07-14 2020-02-11 Jumio Corporation Mobile phone payment system using integrated camera credit card reader
US10579973B2 (en) 2015-01-19 2020-03-03 Alibaba Group Holding Limited System for efficient processing of transaction requests related to an account in a database
US20200104834A1 (en) * 2018-10-02 2020-04-02 Comenity Llc Using a customer id in a mobile wallet to make a transaction
WO2020089907A1 (en) 2018-11-04 2020-05-07 Au10Tix Limited A system, method and computer program product for differentiating images comprising original scans of documents, from images of documents that are not original scans
US10685347B1 (en) 2019-02-25 2020-06-16 Capital One Services, Llc Activating a transaction card
US10691929B2 (en) * 2017-10-20 2020-06-23 Alibaba Group Holding Limited Method and apparatus for verifying certificates and identities
US10747868B2 (en) 2015-10-23 2020-08-18 Joel N. Bock System and method for authenticating a mobile device
US10755345B2 (en) 2014-12-03 2020-08-25 Alibaba Group Holding Limited System and method for secure account transfer
US10769638B2 (en) * 2013-07-08 2020-09-08 Visa International Service Association Bank account number validation
WO2020249554A1 (en) * 2019-06-10 2020-12-17 Fastforward Labs Ltd Payment encryption system
US11170362B2 (en) 2019-07-17 2021-11-09 Mastercard International Incorporated Methods, systems, and networks for authentication based on physical condition of a mobile device
US11200411B2 (en) * 2019-10-16 2021-12-14 The Toronto-Dominion Bank Training a card type classifier with simulated card images
US20220043645A1 (en) * 2020-08-04 2022-02-10 Mastercard Technologies Canada ULC Distributed user agent information updating
US11461567B2 (en) 2014-05-28 2022-10-04 Mitek Systems, Inc. Systems and methods of identification verification using hybrid near-field communication and optical authentication
US11526344B2 (en) 2020-08-04 2022-12-13 Mastercard Technologies Canada ULC Distributed GeoIP information updating
US11538039B2 (en) 2018-02-12 2022-12-27 Advanced New Technologies Co., Ltd. Method and system for facilitating risk control of an online financial platform
CN115953239A (en) * 2023-03-15 2023-04-11 无锡锡商银行股份有限公司 Surface examination video scene evaluation method based on multi-frequency flow network model
US11640582B2 (en) 2014-05-28 2023-05-02 Mitek Systems, Inc. Alignment of antennas on near field communication devices for communication
US11816714B2 (en) 2018-03-19 2023-11-14 Advanced New Technologies Co., Ltd. Service verification method and apparatus
US11941609B2 (en) 2019-04-04 2024-03-26 Bread Financial Payments, Inc. Adding a credit account to a mobile wallet to make a transaction when the physical card associated with the credit account is unavailable

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10515266B1 (en) 2019-08-16 2019-12-24 Capital One Services, Llc Document verification by combining multiple images
US20210136064A1 (en) * 2019-10-30 2021-05-06 Governor's Office of Information Technology Secure use of authoritative data within biometry based digital identity authentication and verification

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5930767A (en) * 1997-05-28 1999-07-27 Motorola, Inc. Transaction methods systems and devices
US6363380B1 (en) * 1998-01-13 2002-03-26 U.S. Philips Corporation Multimedia computer system with story segmentation capability and operating program therefor including finite automation video parser
US6726094B1 (en) * 2000-01-19 2004-04-27 Ncr Corporation Method and apparatus for multiple format image capture for use in retail transactions
US20080306839A1 (en) * 2006-04-28 2008-12-11 Myecheck, Inc. Method and apparatus for online check processing
US20100048242A1 (en) * 2008-08-19 2010-02-25 Rhoads Geoffrey B Methods and systems for content processing
US20100150458A1 (en) * 2008-12-12 2010-06-17 International Business Machines Corporation Generating Cohorts Based on Attributes of Objects Identified Using Video Input
US7978900B2 (en) * 2008-01-18 2011-07-12 Mitek Systems, Inc. Systems for mobile image capture and processing of checks
US8543823B2 (en) * 2001-04-30 2013-09-24 Digimarc Corporation Digital watermarking for identification documents
US20130335554A1 (en) * 2012-06-14 2013-12-19 Qualcomm Incorporated Adaptive estimation of frame time stamp latency
US8688579B1 (en) * 2010-06-08 2014-04-01 United Services Automobile Association (Usaa) Automatic remote deposit image preparation apparatuses, methods and systems

Family Cites Families (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7953671B2 (en) * 1999-08-31 2011-05-31 American Express Travel Related Services Company, Inc. Methods and apparatus for conducting electronic transactions
US20030018897A1 (en) 2001-07-20 2003-01-23 Psc Scanning, Inc. Video identification verification system and method for a self-checkout system
US20050156046A1 (en) * 2004-01-15 2005-07-21 Beyong Technologies Ltd. Method and apparatus for validation/identification of flat items
JP2005284565A (en) 2004-03-29 2005-10-13 Glory Ltd Automatic transaction apparatus
US8290220B2 (en) 2006-03-01 2012-10-16 Nec Corporation Face authenticating apparatus, face authenticating method, and program
WO2008042023A2 (en) * 2006-05-18 2008-04-10 Florida Atlantic University Methods for encrypting and compressing video
WO2008012905A1 (en) 2006-07-27 2008-01-31 Panasonic Corporation Authentication device and method of displaying image for authentication
US20130085935A1 (en) * 2008-01-18 2013-04-04 Mitek Systems Systems and methods for mobile image capture and remittance processing
US7912785B1 (en) * 2008-04-07 2011-03-22 United Services Automobile Association (Usaa) Video financial deposit
US9269010B2 (en) * 2008-07-14 2016-02-23 Jumio Inc. Mobile phone payment system using integrated camera credit card reader
US8635155B2 (en) * 2010-06-18 2014-01-21 Fiserv, Inc. Systems and methods for processing a payment coupon image
US8244638B2 (en) * 2011-01-12 2012-08-14 Bank Of America Corporation Automatic image analysis and capture
US8811711B2 (en) * 2011-03-08 2014-08-19 Bank Of America Corporation Recognizing financial document images
US20130024300A1 (en) * 2011-07-21 2013-01-24 Bank Of America Corporation Multi-stage filtering for fraud detection using geo-positioning data
CN102298781B (en) * 2011-08-16 2014-06-25 长沙中意电子科技有限公司 Motion shadow detection method based on color and gradient characteristics
US8959359B2 (en) 2012-07-11 2015-02-17 Daon Holdings Limited Methods and systems for improving the security of secret authentication data during authentication transactions
US20140037183A1 (en) * 2012-08-06 2014-02-06 Nikolai D. Gorski Systems and methods for recognizing information in financial documents using a mobile device
US20150319170A1 (en) 2012-12-21 2015-11-05 Didier Grossemy Computer implemented frameworks and methodologies for enabling identification verification in an online environment
KR101443021B1 (en) 2013-03-08 2014-09-22 주식회사 슈프리마 Apparatus and method for registering face, and Apparatus for guiding pose, and Apparatus for recognizing face
US9602483B2 (en) 2013-08-08 2017-03-21 Google Technology Holdings LLC Adaptive method for biometrically certified communication
US9495586B1 (en) 2013-09-18 2016-11-15 IDChecker, Inc. Identity verification using biometric data
KR101472845B1 (en) 2014-03-21 2014-12-17 한국인식산업(주) System, terminal, system control method, and terminal control method for authenticating user identity using facial photo
US10225248B2 (en) 2014-06-11 2019-03-05 Optimum Id Llc Methods and systems for providing online verification and security
GB2511259B (en) 2014-06-16 2015-10-07 Andersen Cheng System and method for management of persistent and irrefutable instant messages
CA2902093C (en) 2014-08-28 2023-03-07 Kevin Alan Tussy Facial recognition authentication system including path parameters
US9584510B2 (en) 2014-09-30 2017-02-28 Airwatch Llc Image capture challenge access
KR101680598B1 (en) 2015-06-12 2016-12-12 주식회사 네오시큐 Apparatus and method for face authenticating which provides with optimum face guidance
US9449217B1 (en) 2015-06-25 2016-09-20 West Virginia University Image authentication
KR20170029301A (en) 2015-09-07 2017-03-15 주식회사 신한은행 Method, banking server and banking terminal for providing financial service
US10706266B2 (en) 2015-09-09 2020-07-07 Nec Corporation Guidance acquisition device, guidance acquisition method, and program
CN105528602A (en) 2015-10-30 2016-04-27 小米科技有限责任公司 Region identification method and device
US10615973B2 (en) 2016-12-27 2020-04-07 Fotonation Limited Systems and methods for detecting data insertions in biometric authentication systems using encryption

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5930767A (en) * 1997-05-28 1999-07-27 Motorola, Inc. Transaction methods systems and devices
US6363380B1 (en) * 1998-01-13 2002-03-26 U.S. Philips Corporation Multimedia computer system with story segmentation capability and operating program therefor including finite automation video parser
US6726094B1 (en) * 2000-01-19 2004-04-27 Ncr Corporation Method and apparatus for multiple format image capture for use in retail transactions
US8543823B2 (en) * 2001-04-30 2013-09-24 Digimarc Corporation Digital watermarking for identification documents
US20080306839A1 (en) * 2006-04-28 2008-12-11 Myecheck, Inc. Method and apparatus for online check processing
US7978900B2 (en) * 2008-01-18 2011-07-12 Mitek Systems, Inc. Systems for mobile image capture and processing of checks
US20100048242A1 (en) * 2008-08-19 2010-02-25 Rhoads Geoffrey B Methods and systems for content processing
US20100150458A1 (en) * 2008-12-12 2010-06-17 International Business Machines Corporation Generating Cohorts Based on Attributes of Objects Identified Using Video Input
US8688579B1 (en) * 2010-06-08 2014-04-01 United Services Automobile Association (Usaa) Automatic remote deposit image preparation apparatuses, methods and systems
US20130335554A1 (en) * 2012-06-14 2013-12-19 Qualcomm Incorporated Adaptive estimation of frame time stamp latency

Cited By (92)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10558967B2 (en) 2008-07-14 2020-02-11 Jumio Corporation Mobile phone payment system using integrated camera credit card reader
US10552697B2 (en) * 2012-02-03 2020-02-04 Jumio Corporation Systems, devices, and methods for identifying user data
US10318835B2 (en) 2013-03-12 2019-06-11 Google Llc Extraction of data from a digital image
US20150287002A1 (en) * 2013-03-12 2015-10-08 Google Inc. Extraction of financial account information from a digital image of a card
US10614334B2 (en) 2013-03-12 2020-04-07 Google Llc Extraction of data from a digital image
US10210415B2 (en) 2013-06-03 2019-02-19 Alipay.Com Co., Ltd Method and system for recognizing information on a card
US9367753B2 (en) 2013-06-03 2016-06-14 Alipay.Com Co., Ltd Method and system for recognizing information on a card
US10963730B2 (en) 2013-06-28 2021-03-30 Google Llc Comparing extracted card data using continuous scanning
US10152647B2 (en) 2013-06-28 2018-12-11 Google Llc Comparing extracted card data using continuous scanning
US9767355B2 (en) 2013-06-28 2017-09-19 Google Inc. Comparing extracted card data using continuous scanning
US10515290B2 (en) 2013-06-28 2019-12-24 Google Llc Comparing extracted card data using continuous scanning
US20150006387A1 (en) * 2013-06-28 2015-01-01 Google Inc. Preventing fraud using continuous card scanning
US10769638B2 (en) * 2013-07-08 2020-09-08 Visa International Service Association Bank account number validation
US20150023604A1 (en) * 2013-07-19 2015-01-22 Google Inc. Card art display
US9514359B2 (en) * 2013-07-19 2016-12-06 Google Inc. Card art display
US20170053162A1 (en) * 2013-07-19 2017-02-23 Google Inc. Card art display
US9495586B1 (en) 2013-09-18 2016-11-15 IDChecker, Inc. Identity verification using biometric data
US9740926B2 (en) 2013-09-18 2017-08-22 IDChecker, Inc. Identity verification using biometric data
US8995774B1 (en) * 2013-09-19 2015-03-31 IDChecker, Inc. Automated document recognition, identification, and data extraction
US9373030B2 (en) * 2013-09-19 2016-06-21 IDChecker, Inc. Automated document recognition, identification, and data extraction
US20150078671A1 (en) * 2013-09-19 2015-03-19 IDChecker, Inc. Automated document recognition, identification, and data extraction
US20150199568A1 (en) * 2013-09-19 2015-07-16 IDChecker, Inc. Automated document recognition, identification, and data extraction
US9584475B1 (en) * 2014-03-10 2017-02-28 T. Ronald Theodore System and method for optical security firewalls in computer communication systems
US10372950B2 (en) 2014-05-28 2019-08-06 IDChecker, Inc. Identification verification using a device with embedded radio-frequency identification functionality
US11640582B2 (en) 2014-05-28 2023-05-02 Mitek Systems, Inc. Alignment of antennas on near field communication devices for communication
US9665754B2 (en) 2014-05-28 2017-05-30 IDChecker, Inc. Identification verification using a device with embedded radio-frequency identification functionality
US10747971B2 (en) 2014-05-28 2020-08-18 IDChecker, Inc. Identification verification using a device with embedded radio-frequency identification functionality
US11461567B2 (en) 2014-05-28 2022-10-04 Mitek Systems, Inc. Systems and methods of identification verification using hybrid near-field communication and optical authentication
US9277123B2 (en) 2014-05-30 2016-03-01 Apple Inc. Systems and methods for exposure metering for timelapse video
US9992443B2 (en) 2014-05-30 2018-06-05 Apple Inc. System and methods for time lapse video acquisition and compression
US20150348019A1 (en) * 2014-05-30 2015-12-03 Visa International Service Association Image Analysis for Account Authorization
US20150347859A1 (en) * 2014-05-30 2015-12-03 Apple Inc. Credit Card Auto-Fill
US9449239B2 (en) * 2014-05-30 2016-09-20 Apple Inc. Credit card auto-fill
US9251431B2 (en) 2014-05-30 2016-02-02 Apple Inc. Object-of-interest detection and recognition with split, full-resolution image processing pipeline
US9565370B2 (en) 2014-05-30 2017-02-07 Apple Inc. System and method for assisting in computer interpretation of surfaces carrying symbols or characters
US10225248B2 (en) 2014-06-11 2019-03-05 Optimum Id Llc Methods and systems for providing online verification and security
US10325088B2 (en) 2014-07-03 2019-06-18 Alibaba Group Holding Limited Method and system for information authentication
US10275813B2 (en) 2014-07-08 2019-04-30 Alibaba Group Holding Limited Method and system for providing a transaction platform for pre-owned merchandise
WO2016025071A1 (en) * 2014-08-14 2016-02-18 Alibaba Group Holding Limited Method and system for verifying user identity using card features
TWI678638B (en) * 2014-08-14 2019-12-01 香港商阿里巴巴集團服務有限公司 Method, device and system for identity verification using card characteristics
CN105450411A (en) * 2014-08-14 2016-03-30 阿里巴巴集团控股有限公司 Method, device and system for utilizing card characteristics to perform identity verification
US10248954B2 (en) 2014-08-14 2019-04-02 Alibaba Group Holding Limited Method and system for verifying user identity using card features
US9324376B2 (en) 2014-09-30 2016-04-26 Apple Inc. Time-lapse video capture with temporal points of interest
US9426409B2 (en) 2014-09-30 2016-08-23 Apple Inc. Time-lapse video capture with optimal image stabilization
US10755345B2 (en) 2014-12-03 2020-08-25 Alibaba Group Holding Limited System and method for secure account transfer
US10331291B1 (en) * 2014-12-31 2019-06-25 Morpho Trust USA, LLC Visual verification of digital identifications
US10579973B2 (en) 2015-01-19 2020-03-03 Alibaba Group Holding Limited System for efficient processing of transaction requests related to an account in a database
US10572729B2 (en) 2015-02-03 2020-02-25 Jumio Corporation Systems and methods for imaging identification information
US11468696B2 (en) 2015-02-03 2022-10-11 Jumio Corporation Systems and methods for imaging identification information
US10176371B2 (en) 2015-02-03 2019-01-08 Jumio Corporation Systems and methods for imaging identification information
US10776620B2 (en) 2015-02-03 2020-09-15 Jumio Corporation Systems and methods for imaging identification information
US10249013B2 (en) 2015-02-03 2019-04-02 Alibaba Group Holding Limited Method and system for wireless payment of public transport fare
US20160321664A1 (en) * 2015-04-28 2016-11-03 Ronald R. Erickson System and method for secure transactions using images
US20210201320A1 (en) * 2015-04-28 2021-07-01 Ronald R. Erickson System and method for secure transactions using images
US10008099B2 (en) 2015-08-17 2018-06-26 Optimum Id, Llc Methods and systems for providing online monitoring of released criminals by law enforcement
US10296636B2 (en) 2015-10-09 2019-05-21 Alibaba Group Holding Limited Efficient navigation category management
US10747868B2 (en) 2015-10-23 2020-08-18 Joel N. Bock System and method for authenticating a mobile device
WO2017114289A1 (en) * 2015-12-29 2017-07-06 中国银联股份有限公司 Bank-card information authentication method, client terminal, and banking system
AU2017226429B2 (en) * 2016-03-02 2019-10-10 Ping An Technology (Shenzhen) Co., Ltd. Automatic extraction method, device and system for driving licence expiration date, and storage medium
US20170372320A1 (en) * 2016-06-23 2017-12-28 Custombike Ag System and method for executing remote electronic authentication
US10504119B2 (en) * 2016-06-23 2019-12-10 Custombike Ag System and method for executing remote electronic authentication
US10937016B2 (en) * 2016-08-15 2021-03-02 Huawei Technologies Co., Ltd. Method and apparatus for binding bank card in payment application
US20190180267A1 (en) * 2016-08-15 2019-06-13 Huawei Technologies Co., Ltd. Method and apparatus for binding bank card in payment application
WO2018118212A1 (en) * 2016-12-20 2018-06-28 Mastercard International Incorporated Systems and methods for processing a payment transaction authorization request
US20190272540A1 (en) * 2017-02-16 2019-09-05 SmarTBotHub LLC Computer-Implemented System And Method For Performing Social Network Secure Transactions
US10922688B2 (en) * 2017-02-16 2021-02-16 Smartbothub, Inc. Computer-implemented system and method for performing social network secure transactions
US11636479B2 (en) 2017-02-16 2023-04-25 Smartbothub, Inc. Computer-implemented system and method for performing social network secure transactions
US10691929B2 (en) * 2017-10-20 2020-06-23 Alibaba Group Holding Limited Method and apparatus for verifying certificates and identities
US11538039B2 (en) 2018-02-12 2022-12-27 Advanced New Technologies Co., Ltd. Method and system for facilitating risk control of an online financial platform
US11816714B2 (en) 2018-03-19 2023-11-14 Advanced New Technologies Co., Ltd. Service verification method and apparatus
US10275613B1 (en) * 2018-04-20 2019-04-30 Capital One Services, Llc Identity breach notification and remediation
US11822694B2 (en) 2018-04-20 2023-11-21 Capital One Services, Llc Identity breach notification and remediation
US11093637B2 (en) 2018-04-20 2021-08-17 Capital One Services, Llc Identity breach notification and remediation
US20200104834A1 (en) * 2018-10-02 2020-04-02 Comenity Llc Using a customer id in a mobile wallet to make a transaction
WO2020089907A1 (en) 2018-11-04 2020-05-07 Au10Tix Limited A system, method and computer program product for differentiating images comprising original scans of documents, from images of documents that are not original scans
US10475038B1 (en) 2018-11-26 2019-11-12 Capital One Services, Llc Systems and methods for visual verification
US11749049B2 (en) 2018-11-26 2023-09-05 Capital One Services, Llc Systems and methods for visual verification
US11004085B2 (en) 2018-11-26 2021-05-11 Capital One Services, Llc Systems and methods for visual verification
US11763587B2 (en) 2019-02-19 2023-09-19 Capital One Services, Llc Determining whether a user has possession of a transaction card and/or whether the user is authorized to possess the transaction card
US11037165B2 (en) 2019-02-19 2021-06-15 Capital One Services, Llc Determining whether a user has possession of a transaction card and/or whether the user is authorized to possess the transaction card
US10438210B1 (en) 2019-02-19 2019-10-08 Capital One Services, Llc Determining whether a user has possession of a transaction card and/or whether the user is authorized to possess the transaction card
US10685347B1 (en) 2019-02-25 2020-06-16 Capital One Services, Llc Activating a transaction card
US11941609B2 (en) 2019-04-04 2024-03-26 Bread Financial Payments, Inc. Adding a credit account to a mobile wallet to make a transaction when the physical card associated with the credit account is unavailable
WO2020249554A1 (en) * 2019-06-10 2020-12-17 Fastforward Labs Ltd Payment encryption system
US11170362B2 (en) 2019-07-17 2021-11-09 Mastercard International Incorporated Methods, systems, and networks for authentication based on physical condition of a mobile device
US11580762B2 (en) * 2019-10-16 2023-02-14 The Toronto-Dominion Bank Training a card type classifier with simulated card images
US20220051008A1 (en) * 2019-10-16 2022-02-17 The Toronto-Dominion Bank Training a card type classifier with simulated card images
US11200411B2 (en) * 2019-10-16 2021-12-14 The Toronto-Dominion Bank Training a card type classifier with simulated card images
US11526344B2 (en) 2020-08-04 2022-12-13 Mastercard Technologies Canada ULC Distributed GeoIP information updating
US11487526B2 (en) * 2020-08-04 2022-11-01 Mastercard Technologies Canada ULC Distributed user agent information updating
US20220043645A1 (en) * 2020-08-04 2022-02-10 Mastercard Technologies Canada ULC Distributed user agent information updating
CN115953239A (en) * 2023-03-15 2023-04-11 无锡锡商银行股份有限公司 Surface examination video scene evaluation method based on multi-frequency flow network model

Also Published As

Publication number Publication date
US20180082145A1 (en) 2018-03-22
US11455786B2 (en) 2022-09-27
US20210166050A1 (en) 2021-06-03
WO2014028769A3 (en) 2014-05-08
US10878274B2 (en) 2020-12-29
WO2014028769A2 (en) 2014-02-20
EP2885751A4 (en) 2016-03-30
EP2885751A2 (en) 2015-06-24

Similar Documents

Publication Publication Date Title
US11455786B2 (en) Systems and methods of image processing for remote validation
US20130204786A1 (en) Verification of Online Transactions
US11699158B1 (en) Reducing false positive fraud alerts for online financial transactions
US11651337B2 (en) System and process for automatically analyzing currency objects
US9836726B2 (en) Internet payment system using credit card imaging
US10552697B2 (en) Systems, devices, and methods for identifying user data
US10055734B2 (en) Systems and methods for processing customer purchase transactions using biometric data
US11282086B1 (en) Systems and methods for counterfeit check detection
US20170372304A1 (en) Systems, devices and methods for remote authentication of a user
US20090313129A1 (en) System and method for verifying user identity information in financial transactions
CA2883010A1 (en) Systems and methods relating to the authenticity and verification of photographic identity documents
KR101635074B1 (en) Financial service providing method and system using mobile non-contact type real name confirmation
US20060131389A1 (en) Data card authentication system and method
US20150348019A1 (en) Image Analysis for Account Authorization
CN112487982A (en) Merchant information auditing method, system and storage medium
US20150235225A1 (en) Security System and Method for a Payment Card
US11756147B1 (en) Systems and methods for verifying the authenticity of documents
GB2576521A (en) Systems and methods for remotely verifying user identities
Erwin et al. Implementing Facial Recognition in Malaysia Point of Sale (POS) System

Legal Events

Date Code Title Description
AS Assignment

Owner name: JUMIO INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MATTES, DANIEL;REEL/FRAME:031024/0566

Effective date: 20130815

AS Assignment

Owner name: CLOWER, AS SECURITY AGENT, CHRISTOPHER JOSEPH, SIN

Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:JUMIO INC.;REEL/FRAME:037221/0740

Effective date: 20151121

AS Assignment

Owner name: JUMIO BUYER, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:JUMIO INC.;REEL/FRAME:038639/0590

Effective date: 20160509

Owner name: JUMIO INC., CALIFORNIA

Free format text: ORDER AUTHORIZING SALE FREE AND CLEAR OF LIENS;ASSIGNOR:UNITED STATES BANKRUPTCY COURT FOR THE DISTRICT OF DELAWARE;REEL/FRAME:038756/0431

Effective date: 20160506

AS Assignment

Owner name: JUMIO CORPORATION, CALIFORNIA

Free format text: CHANGE OF NAME;ASSIGNOR:JUMIO BUYER, INC.;REEL/FRAME:042017/0803

Effective date: 20160520

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION