U.S. patent application number 16/459582 was filed with the patent office on 2019-10-24 for identification scan in compliance with jurisdictional or other rules.
This patent application is currently assigned to Intellicheck, Inc.. The applicant listed for this patent is Intellicheck, Inc.. Invention is credited to Russell T. Embry, Billy Joe White.
Application Number | 20190325675 16/459582 |
Document ID | / |
Family ID | 55853248 |
Filed Date | 2019-10-24 |
United States Patent
Application |
20190325675 |
Kind Code |
A1 |
White; Billy Joe ; et
al. |
October 24, 2019 |
IDENTIFICATION SCAN IN COMPLIANCE WITH JURISDICTIONAL OR OTHER
RULES
Abstract
Methods and systems for displaying information derived from
identification documents associated with individuals are disclosed.
In some embodiments, the system first scans or retrieves
identification information from an identification document. The
system then receives information of an issuer of the identification
document, information of a current location of the identification
document, and information of a proposed use of the identification
information. The system then receives a set of rules from a
database based on the information of the issuer, the current
location, and the proposed use. Based on the set of rules, the
system processes the retrieved identification information so as to
form redacted or processed identification information. The system
then displays the redacted identification information.
Inventors: |
White; Billy Joe; (Melville,
NY) ; Embry; Russell T.; (Melville, NY) |
|
Applicant: |
Name |
City |
State |
Country |
Type |
Intellicheck, Inc. |
Melville |
NY |
US |
|
|
Assignee: |
Intellicheck, Inc.
Melville
NY
|
Family ID: |
55853248 |
Appl. No.: |
16/459582 |
Filed: |
July 1, 2019 |
Related U.S. Patent Documents
|
|
|
|
|
|
Application
Number |
Filing Date |
Patent Number |
|
|
14530568 |
Oct 31, 2014 |
10373409 |
|
|
16459582 |
|
|
|
|
Current U.S.
Class: |
1/1 |
Current CPC
Class: |
G07C 9/20 20200101; G06K
9/00 20130101; G07C 9/27 20200101; G06K 7/10415 20130101; G06K 7/00
20130101 |
International
Class: |
G07C 9/00 20060101
G07C009/00; G06K 9/00 20060101 G06K009/00; G06K 7/00 20060101
G06K007/00; G06K 7/10 20060101 G06K007/10 |
Claims
1-34. (canceled)
35. A system comprising: a document scanner; memory storing one or
more computer executable instructions; and a processor configured
to execute the one or more computer executable instructions to
perform operations including at least: scanning an identification
document using the document scanner; analyzing a layout or a format
of the identification document to identify a jurisdiction that
issued the identification document; determining a location
associated with the identification document indicative of where the
identification document was scanned and a proposed use of the
identification document indicative of why the identification
document was scanned; and processing identification information
associated with the identification document in compliance with one
or more most restrictive aspects of one or more rules associated
with the jurisdiction, the location, or the proposed use.
36. The system of claim 35, wherein the scanning an identification
document using the document scanner comprises: scanning at least
one of the following types of identification documents using the
document scanner: drivers license, state ID, passport, military ID,
corporate ID, school ID, or loyalty card.
37. The system of claim 35, wherein the scanning an identification
document using the document scanner comprises: scanning one or more
of the following from an identification document using the document
scanner: bar code, magnetic stripe, near field communications (NFC)
chip, photograph, or text.
38. The system of claim 35, wherein the scanning an identification
document using the document scanner comprises: scanning an
identification document using one or more of the following types of
scanners: barcode reader, camera, character reader, magnetic stripe
reader, image scanner, or chip reader.
39. The system of claim 35, wherein the scanning an identification
document using the document scanner comprises: scanning an
identification document using the document scanner to retrieve one
or more of the following: image, text, embedded information, or
coded information.
40. The system of claim 35, wherein the processor is further
configured to execute the one or more computer executable
instructions to perform an operation comprising: determining
whether to enable scanning of the identification document based at
least partly on location and/or purpose information.
41. The system of claim 35, wherein the processor is further
configured to execute the one or more computer executable
instructions to perform an operation comprising: determining prior
to scanning whether to enable scanning of the identification
document based at least partly on manually entered issuer
information.
42. The system of claim 35, wherein the scanning an identification
document using the document scanner comprises: scanning an
identification document using the document scanner to retrieve at
least one or more of the following types of identification
information: expiration date, photograph, identification number,
name, address, sex/gender, height, weight, eye color, or date of
birth.
43. The system of claim 35, wherein the processor is further
configured to execute the one or more computer executable
instructions to perform an operation comprising: retrieving the
identification information at least partly in response to a
determination of whether to enable collection of the identification
information for one or more of the following actions: display,
storage, or display and storage.
44. The system of claim 35, wherein the analyzing a layout or a
format of the identification document to identify a jurisdiction
that issued the identification document comprises: analyzing a
layout or a format of the identification document to identify at
least one of the following types of jurisdictions that issued the
identification document: government, non-government, state,
province, territory, federal, or military.
45. The system of claim 35, wherein the determining a location
associated with the identification document comprises: determining
a location associated with the identification document at least
partly using one or more of GPS data or IP address location, manual
entry, device configuration, or a record.
46. The system of claim 35, wherein the determining a proposed use
of the identification document comprises: determining one or more
of the following proposed uses of the identification document:
loyalty program use, age restricted purchase, age verification,
access restriction, loan application, mailing list addition,
product return, account collection, credit card application,
transaction processing, credit verification, identity verification,
criminal conduct review, fraud prevention, or marketing.
47. The system of claim 35, wherein the processing identification
information associated with the identification document in
compliance with one or more most restrictive aspects of one or more
rules associated with the jurisdiction, the location, or the
proposed use comprises: storing identification information
associated with the identification document in compliance with one
or more most restrictive aspects of one or more rules associated
with the jurisdiction, the location, or the proposed use.
48. The system of claim 35, wherein the processing identification
information associated with the identification document in
compliance with one or more most restrictive aspects of one or more
rules associated with the jurisdiction, the location, or the
proposed use comprises: redacting identification information
associated with the identification document in compliance with one
or more most restrictive aspects of one or more rules associated
with the jurisdiction, the location, or the proposed use.
49. The system of claim 35, wherein the processing identification
information associated with the identification document in
compliance with one or more most restrictive aspects of one or more
rules associated with the jurisdiction, the location, or the
proposed use comprises: enabling a transaction using identification
information associated with the identification document in
compliance with one or more most restrictive aspects of one or more
rules associated with the jurisdiction, the location, or the
proposed use.
50. The system of claim 35, wherein the processing identification
information associated with the identification document in
compliance with one or more most restrictive aspects of one or more
rules associated with the jurisdiction, the location, or the
proposed use comprises: enabling physical access using
identification information associated with the identification
document in compliance with one or more most restrictive aspects of
one or more rules associated with the jurisdiction, the location,
or the proposed use.
51. The system of claim 35, wherein the processing identification
information associated with the identification document in
compliance with one or more most restrictive aspects of one or more
rules associated with the jurisdiction, the location, or the
proposed use comprises: verifying an identity of an individual
using identification information associated with the identification
document in compliance with one or more most restrictive aspects of
one or more rules associated with the jurisdiction, the location,
or the proposed use.
52. The system of claim 35, wherein the processing identification
information associated with the identification document in
compliance with one or more most restrictive aspects of one or more
rules associated with the jurisdiction, the location, or the
proposed use comprises: processing identification information
associated with the identification document in compliance with one
or more most restrictive aspects of one or more rules associated
with the jurisdiction, the location, or the proposed use, wherein
the processing includes one or more of the following: redacting,
displaying, alerting, transmitting, masking, removing, not storing,
not transmitting, enabling limited use, deleting, hiding, or
editing.
53. The system of claim 35, wherein the processing identification
information associated with the identification document in
compliance with one or more most restrictive aspects of one or more
rules associated with the jurisdiction, the location, or the
proposed use comprises: processing identification information
associated with the identification document in compliance with one
or more most restrictive aspects of one or more rules associated
with the jurisdiction, the location, or the proposed use, based at
least partly on one or more specified priorities for the one or
more rules.
54. The system of claim 35, wherein the processing identification
information associated with the identification document in
compliance with one or more most restrictive aspects of one or more
rules associated with the jurisdiction, the location, or the
proposed use comprises: processing identification information
scanned from the identification document in compliance with one or
more most restrictive aspects of one or more rules associated with
the jurisdiction, the location, or the proposed use.
Description
PRIORITY CLAIM
[0001] This application claims priority under 35 U.S.C. 120 to
copending U.S. patent application Ser. No. 14/530,568, filed Oct.
31, 2014, entitled IDENTIFICATION SCAN IN COMPLIANCE WITH
JURISDICTIONAL OR OTHER RULES. Application Ser. No. 14/530,568 is
incorporated by reference in its entirety as if fully set forth
herein.
BACKGROUND
[0002] Identity verification is critical for various transactions
or activities, such as transactions of age-restricted merchandise
or access control activities for certain restricted areas. In a
traditional fashion, a sales clerk or gate keeper can manually
check an identification document of an individual who is involved
in a transaction or wants to have access to a restricted area.
Unfortunately, manual verification can be a time-consuming process
and can be subject to inaccuracies due to human errors.
[0003] One way to overcome the problems with manual identification
checks is to utilize an automatic scanning system that can quickly
scan and accurately verify an identification document. However,
various jurisdictions have different rules and regulations
regarding the scanning of identification documents and the
retention of information gained from the scans. For example, some
jurisdictions may prohibit retention or dissemination of
information retrieved from identification documents by electronic
scans, while other jurisdictions may allow the same. For entities
having activities in multiple jurisdictions, it is cumbersome and
difficult to comply with all applicable rules and regulations in
all jurisdictions where they operate. In addition, not every
individual or business entity is capable of keeping track of
related rules (not to mention corresponding updates) in various
jurisdictions. As a result, many companies err on the side of
caution and do not use or store much of the information that can be
obtained from an identification document. Alternatively, some
companies may manually enter information that is read from a
document, which is prone to errors, rather than rely on a scan.
Both solutions are sub-optimal from the standpoint of the business
operator.
BRIEF DESCRIPTION OF THE DRAWINGS
[0004] FIG. 1 is a flowchart illustrating a method implemented by
an identification scanning system for retrieving identification
information from an identification document and sequentially
applying applicable rules to the retrieved information.
[0005] FIG. 2 is a flowchart illustrating a method implemented by
an identification scanning system for retrieving identification
information from an identification document and applying applicable
rules in parallel to the retrieved information.
[0006] FIG. 3 is a flowchart illustrating a method implemented by
an identification scanning system for identifying applicable rules
to retrieve information from an identification document and then
retrieving the information in accordance with the rules.
[0007] FIG. 4 is a schematic diagram illustrating a system for
performing identification scans in compliance with jurisdictional
or other rules.
[0008] FIG. 5 is a schematic diagram illustrating a scanning device
and an identification document.
[0009] FIG. 6 is a schematic diagram illustrating a user interface
for the system for performing identification scans in compliance
with jurisdictional or other rules.
DETAILED DESCRIPTION
[0010] Identity verification plays an important role in
transactions, activities, or interactions among parties who are not
familiar with one another. To make sure that an individual standing
in front of you is "authentic" or "the right person" to deal with,
identification documents (e.g., a driver license, an identification
card, a passport, or other suitable documents containing sufficient
information to help verify the identity of an individual) are
frequently used to verify the holders' identifies. Systems that can
automatically read identification documents are increasingly used
by businesses, governments, or individuals because they provide a
fast, convenient and accurate solution for identity verification.
Due to the increasing use of identity document scans and privacy
concerns over the use of information obtained from those scans,
however, more and more jurisdictions (e.g., countries, states,
provinces, counties, cities, or other suitable administrative
districts) have specific rules to regulate conduct involving
collecting identification information via electronic scans of
identification documents. Therefore, simply using an automatic
identify verification system runs the risk of violating such rules
in various jurisdictions.
[0011] The present system and method provide a convenient way to
automatically verify identity of an identification document holder
while maintaining compliance with applicable electronic scanning
rules of various jurisdictions. More particularly, the present
system and method enable scanning, processing, and utilizing (by,
for example, presenting and/or storing) identification information
derived from identification documents in a rule-compliant fashion.
The scanning process includes a manual or automatic process of
capturing any suitable information (including but not limited to
images, embedded information, coded information, layout
information, etc.) by a suitable scanning device. The system
utilizes a database that contains relevant rules and regulations
from various jurisdictions. The database can be centralized (e.g.,
a network-accessible database having all relevant rules) or
decentralized (e.g., databases having relevant rules stored in
various devices). In some embodiments, the system can retrieve
(e.g., by a scanning device) identification information from an
identification document and then receive applicable rules (of
various jurisdictions) from the database. In other embodiments, the
system can first receive applicable rules from the database and
then retrieve identification information from an identification
document.
[0012] Applicable rules can be determined or identified based on
various factors. The factors include, for example, an issuer of the
identification document, a current location where the
identification document is being read, and a proposed use of the
information contained in the identification document by an operator
of a document scanner. The issuer of an identification document can
be a state government, a federal government, a national or local
agency (e.g., a military service, a government agency), a
corporation, or other suitable entity. The issuer can have its own
rules or regulations associated with how the information may be
used from the identification documents issued by it. For example,
Jurisdiction A may prohibit transmission of identification
information retrieved from any Jurisdiction A driver licenses to a
third party. The current location of the identification document
when it is being scanned can be another factor. Various
jurisdictions have rules on electronic scans of identification
documents that happen within their territories. For example,
Jurisdiction B can prohibit a seller from recording or maintaining
certain sensitive information (e.g., name and address) derived from
electronic scans of identification documents. Proposed uses of the
scanned information by the operator of the document scanner can be
another factor to consider. For example, Jurisdiction C may
expressly prohibit the storage and use of identification
information derived from electronic scans of identification
documents for mailing list purposes.
[0013] After identifying applicable rules, the present technology
can process the retrieved identification information based on the
applicable rules. The "processing" of scanned identification
information includes applying use restrictions specified by the
applicable rules to the identification information, such as
redacting, masking, removing, not storing, not transmitting, using
only for limited purposes, etc. some of the retrieved
identification information. For example, the system can delete,
hide, mask, obscure, or edit the retrieved identification
information, so as to make sure that an operator of the system
(e.g., a sales clerk scanning a customer's identification document
for a loyalty program) is in compliance with the applicable rules.
The system can further present the processed identification
information to a user via a user interface (e.g., on a display). In
some embodiments, the system can present an indication showing that
the identification information has been processed and is being
presented in compliance with the applicable rules. In some
embodiments, the system can maintain a record of how the
identification information has been processed and utilized for
purposes of a subsequent audit to show that the system has been
compliant with the applicable rules. The system disclosed herein
can be implemented by a suitable software product or various types
of applications.
[0014] The system includes an input device (e.g., an identification
scanner) configured to receive identification information. The
system includes a processing module configured to process the
received identification information based on multiple rules. As
noted previously, the rules can be determined or identified at
least based on an issuer of the identification document (e.g., a
driver license issued by Jurisdiction A), a current location of the
identification document (e.g., a used-car dealer's office in
Jurisdiction B), and a proposed use of information from the
identification document (e.g., to verify the identity of a
potential used-car buyer for an application for a loan). In some
embodiments, the rules can be predetermined and stored in the
system before the system retrieves the identification information.
In other embodiments, the rules can be determined after the system
retrieves the identification information. For example, the system
can identify the issuer of the identification document after
retrieving the identification information, and the system can
communicate with a database that stores relevant rules in various
jurisdictions via a network. The system disclosed herein can be
implemented in a dedicated scanning device, in a multi-purposes
portable device (e.g., a smartphone, a notebook, a tablet, a
phablet), or in other suitable devices, either fixed or mobile.
[0015] Various embodiments of the invention will now be described.
The following description provides specific details for a thorough
understanding and an enabling description of these embodiments. One
skilled in the art will understand, however, that the invention may
be practiced without many of these details. Additionally, some
well-known structures or functions may not be shown or described in
detail, so as to avoid unnecessarily obscuring the relevant
description of the various embodiments. The terminology used in the
description presented below is intended to be interpreted in its
broadest reasonable manner, even though it is being used in
conjunction with a detailed description of certain specific
embodiments of the invention.
[0016] FIG. 1 is a flowchart illustrating a method 100 implemented
by an identification scanning system for displaying information
derived from an identification document to a user of the
identification scanning system. At block 101, the system retrieves
identification information from an identification document
associated with an individual. In some embodiments, the
identification document can be a local government issued
identification document (e.g., a driver's license, a state ID), a
federal government issued identification document (e.g., a
passport, a military identification), a non-government-issued
identification document (e.g., a corporate ID, a school ID), or
other suitable identification documents. In some embodiments, the
identification information can be retrieved by a scanning device.
The identification information is encapsulated, embedded, or
reflected in an identification document by visible text, barcodes,
magnetic stripes, embedded data chips, etc. that are printed on,
attached to, or contained in the identification document. The
scanning device retrieves the identification information via image
capture and optical character recognition (OCR), barcode reader,
magnetic stripe reader, NFC chip reader, or other complementary
technology. Additional details about techniques for scanning
identification documents are described in commonly-owned U.S. Pat.
No. 5,864,623, filed on Jul. 15, 1996 and entitled, "AUTHENTICATION
SYSTEM FOR DRIVERS LICENSES" and U.S. Pat. No. 8,322,605, filed on
Aug. 22, 2007 and entitled, "DYNAMIC IDENTITY MATCHING IN RESPONSE
TO THREAT LEVELS," which are incorporated by reference herein in
their entirety. At block 103, the system receives information
regarding an issuer of the identification document. For example,
the system can identify that the scanned identification document is
a document issued by Jurisdiction A based on embedded information
readable/accessible through a scan of a barcode, a magnetic stripe,
a read of an embedded data chip, or an analysis of the layout of
the identification document. More particularly, for example, the
system can recognize that the scanned identification document is a
Jurisdiction-A ID by comparing the layout or format of the scanned
identification document with an ID database that stores layout or
format information of ID cards issued by various jurisdictions. In
another example, the system can recognize textual content (e.g., a
description of "JURISDICTION A--DRIVER LICENSE") located at a
specific portion (e.g., the upper portion) of the scanned
identification document and learn the issuer information. In other
embodiments, the system can identify the issuer information by
retrieving or reading information that is coded or embedded in the
scanned identification document. In some embodiments, the issuer
information can also be received from a user input. That is, a user
of the system may manually enter information into the system which
characterizes the issuer of identification document that is being
scanned.
[0017] At decision block 105, the system determines whether there
exist any applicable rules based on the issuer. For example,
Jurisdiction A may have specific rules regarding retention and use
of data derived from any identification cards issued by it. In some
embodiments, relevant rules are maintained and stored in a
centralized database, and the system can access the centralized
database system via a wired or wireless network. In some
embodiments, the relevant rules can be stored in a local scanning
device or at a local computing system at a point of sale.
[0018] In an event that one or more applicable issuer rules are
identified, the system continues at block 107 to apply the
identified rules to the retrieved identification information. For
example, Jurisdiction A may prohibit use of gender and age
information derived from Jurisdiction-A-issued identification cards
by electronic scans. In this example, the system can apply
Jurisdiction A's rule by processing the retrieved identification
information to delete the gender and age information retrieved from
a Jurisdiction-A-issued identification card. In an event that no
applicable rule has been identified, processing proceeds to block
109 directly.
[0019] At block 109, the system receives a current location of the
identification document. The current location can be generated,
determined, or identified from various sources. The current
location of the identification document being scanned can be
determined using one or more methods, including: (1) accessing a
database that contains the location where the system implementing
the method 100 is installed (e.g., a record shows that a relevant
software product was installed in a computing device located in a
city such as Moab, Utah); (2) accessing a database containing a
location of a physical building containing the point of sale (e.g.,
the current scanning operation occurs at a store located in
Jurisdiction B); (3) using a service that converts a (network)
virtual address to a physical location (e.g., a service shows that
an Internet Protocol (IP) address of a computing device utilized in
the scanning operation has a physical location in Jurisdiction B);
or (4) using a global positioning system (GPS) or other similar
location-determining technology to determine the current location
of the scanning device (e.g., a GPS shows that a computing device
utilized in the scanning operation is located in Jurisdiction B).
In some embodiments, the current location can be determined using
one method and then can be further verified by another method.
[0020] After the location information is received, the system
proceeds to decision block 111 to determine whether there exist any
applicable rules based on the location. For example, Jurisdiction B
may have specific rules regarding electronic scans of
identification documents within its jurisdiction. Examples of
specific rules include: (1) a prohibition of retention of any
scanned data after use, (2) a prohibition of dissemination of
scanned data to third parties, (3) a prohibition of using the
scanned data for more than one purpose (e.g., using the scanned
customer information for the purpose of age-restricted purchase and
adding to a mailing list, (4) restrictions on the types of
information that can be collected (e.g., a date of birth, an
identification number, an expiration date, a name, or an address),
and (5) a prohibition of storing certain types of information
(e.g., a photograph, a social security number, a height, a weight,
a race, or a signature).
[0021] In an event that one or more applicable rules based on
location are identified at block 111, the system continues at block
113 to apply the identified rules to the retrieved identification
information. For example, if Jurisdiction B prohibits retention of
age information from electronic scans of any identification
documents, the system can apply this rule by processing the
retrieved identification information to delete the age information
retrieved from an identification card issued by any jurisdiction.
In an event that no applicable rule has been identified at block
111, processing proceeds to block 115 directly.
[0022] At block 115, the system receives a proposed use of the
identification document. The proposed use can be based on a
predetermined system setting. For example, a system installed at a
point of sale may be configured so that the proposed use of scanned
information is for purposes of consummating a sale. As another
example, a system at a car dealership may be configured so that the
proposed use of the scanned information is to prevent fraud in loan
applications. In some embodiments, the proposed use is received
from a user input. For example, a cashier may indicate that the
scanned information is to be used for purposes of signing up for a
loyalty program. After the proposed use is determined, processing
proceeds to decision block 117 where the system determines whether
there exist any applicable rules based on the proposed use. For
example, Jurisdiction C may only allow information electronically
scanned from identification documents to be stored or shared for
specific purposes (e.g., product returns, account collection
activities, establishing contractual relationships, credit card
applications, credit verification, identity verification, fraud
prevention, criminal conduct prevention, advancing law enforcement,
etc.) but prohibited for other activities (e.g., activities
relating to general marketing or customer loyalty programs). In an
event that no applicable rule has been identified at block 117,
processing proceeds to block 121 directly.
[0023] In an event that one or more applicable rules are
identified, at block 119 the system applies the identified rules to
the retrieved identification information. For example, if
Jurisdiction C only allows use of electronically-scanned gender and
age information for law enforcement purposes, the system can apply
this rule by processing the retrieved identification information to
delete the gender and age information retrieved from an
identification card if the proposed use is not for law
enforcement.
[0024] At block 121, the system displays the processed
identification information based on the applied rules. In some
embodiments, the system presents the processed identification
information to an operator or a user of the system (e.g., a sales
clerk, a gate keeper, a used-car dealer, a loan officer, a police
officer, or other suitable individual). The information may be
presented on a computing device display or in a printout of a form
or other document, stored for subsequent reference, and/or
transmitted to other computing systems for additional processing.
In some embodiments, the processed identification information is a
redacted version of the identification information. In other words,
some identification information is stripped out and not presented
to the user. The system ensures that the electronic scans of
identification documents are in compliance with the identified
applicable rules. In some embodiments, the system can present the
processed identification information along with an indication
showing the reasons why the identification information has been
redacted or restricted in some fashion (e.g., a description of
"State Law Prohibits Electronic Scan of Age for Marketing").
[0025] In some embodiments, the system generates and maintains a
record regarding the scanned identification documents and resulting
use of the scanned information for purposes of future review and
audit. By providing an audit trail associated with a scanned
document, the system enables system users to provide evidence to
appropriate authorities that demonstrate compliance with applicable
rules. It will be appreciated that in the illustrated embodiment of
FIG. 1, the sequence of receiving the information of the issuer,
the current location, and the proposed use (and
identifying/applying applicable rules) can be varied. For example,
receiving the proposed use and identifying/applying applicable
rules can be performed before receiving the issuer and the current
location, depending on various designs.
[0026] FIG. 2 is a flowchart illustrating a method 200 implemented
by an identification scanning system for displaying information
derived from an identification document. The system starts at block
201 to retrieve identification information from an identification
document associated with an individual. In some embodiments, the
identification information can be retrieved by a scanning device,
as discussed above. The system also receives information regarding
an issuer of the identification document, a current location of the
identification document, and a proposed use of the information from
the identification document in parallel at blocks 203, 205, and
207. In a similar fashion to the operation of the system discussed
above in connection with FIG. 1, the issuer of the identification
document can be received from a user input. The current location
can be generated, determined, or identified from various sources.
And the proposed use can be based on a predetermined setting or
received from a user input.
[0027] After receiving the information regarding the issuer, the
current location, and the proposed use of the identification
document, the system-determines whether there are any applicable
rules based on the received information in parallel at decision
blocks 209, 211, and 213. In an event that no applicable rule has
been identified, processing proceeds to block 223 directly. In an
event that one or more applicable rules are identified at decision
blocks 209, 211, and 213, the system continues at block 215 to
retrieve the identified applicable rules (e.g., from a local
database or a centralized database, as discussed above). After
retrieving the applicable rules, processing proceeds to decision
block 217 to determine whether there is any conflict among the
identified applicable rules. For example, conflicts may arise
between a federal rule and a state rule. If there is a conflict,
the system continues to block 219 to prioritize the identified
applicable rules in conflict. For example, a federal rule may
prevail when it conflicts with a state rule, and therefore a high
priority is assigned to the federal rule while a low priority is
assigned to the state rule. As another example, if two rules
conflict, the system may selectively apply the most restrictive
aspects of each of the rules to ensure that the system abides by
the minimum requirements of both rules. For example, if one rule
indicates that information can be used for marketing purposes but
not for loyalty purposes, and another rule indicates that the
information can be used for loyalty purposes but not marketing
purposes, the system may bar the use of scanned information for
either marketing purposes or for loyalty purposes. By applying the
most conservative interpretation, the system helps ensure that all
applicable rules are being met. If there is no conflict among the
identified rules, processing proceeds to block 221 directly.
[0028] Processing continues to block 221 to apply identified rules
to the identification information. If there is a conflict of rules,
then the rules are applied based on the priorities thereof. For
example, when a rule with high priority conflicts with a rule with
low priority, the rule with high priority is applied and the rule
with low priority is ignored. As discussed above, applying the
applicable rules can include processing (e.g., delete, hide, mask,
obscure, or edit) the identification information. In some
embodiments, an operator of the system can modify the rules
manually (e.g., override an identified rule). In such case, the
system can provide a warning to the operator so as to inform the
operator that a manual modification may result in a violation of
the identified rule.
[0029] At block 223, the system presents the processed
identification information based on the applied rules (e.g., it is
presented to an operator of the system or stored for a future use
such as a royalty program). In some embodiments, the presented
identification information can be a stripped version of the
identification information. The system can make sure that the whole
process (e.g., including electronic scans of identification
documents and further uses of the retrieved information) involving
identification documents from various jurisdictions is in
compliance with identified applicable rules. In some embodiments,
the system can present the processed identification information
along with an indication showing the reasons why the identification
information needs to be processed. In some embodiments, the system
can generate and maintain a record regarding the whole process
involving electronic scans of identification documents for purposes
of a subsequent audit to show that the system has been compliant
with the applicable rules.
[0030] FIG. 3 is a flowchart illustrating a method 300 implemented
by an identification scanning system for displaying information
derived from an identification document. At block 301, the system
receives information regarding an issuer of the identification
document. In some embodiments, the issuer of the identification
document can be retrieved by a scanning device. In some
embodiments, the issuer of the identification document can be
received from a user input. Processing continues at decision block
303 to determine whether there exist any applicable rules based on
the issuer of the identification document. In some embodiments,
relevant rules from various jurisdictions are maintained and stored
in a centralized database, and the system can access to the
centralized database system via a wired or wireless network. In
some embodiments, the relevant rules are stored in a local scanning
device or at a local computing system at a point of sale, visitor
center or restricted area. In an event that one or more applicable
rules are identified, the rules are "remembered" or stored.
Processing then continues at block 307.
[0031] At block 307, the system receives information regarding a
current location of the identification document. The current
location can be generated from various sources, as discussed above.
After the current location is received, processing proceeds to
decision block 309 to determine whether there exist any applicable
rules based on the second set of information. In an event that one
or more applicable rules are identified at decision block 309, the
rules are "remembered" or stored. The system continues at block
313.
[0032] At block 313, the system receives information regarding a
proposed use of the identification document. The proposed use can
be received from a predetermined setting or a user input. After the
proposed use is received, processing proceeds to decision block 315
to determine whether there exist any applicable rules on the
proposed use based on the issuer and/or location. In an event that
one or more applicable rules are identified, the rules are
"remembered." The system then continues at block 319.
[0033] At decision block 319, the system determines whether there
is any conflict among identified "remembered" applicable rules
(e.g., a federal rule may conflict with a state rule for certain
types of conduct). If there is no conflict among the identified
rules, processing proceeds to block 323 directly. If there is a
conflict among identified rules, processing proceeds to block 321
to prioritize the identified rules in conflict. The system
continues to block 323 to retrieve identification information from
the identification document in accordance with the "remembered"
applicable rules. For example, Jurisdiction A may prohibit
retrieving address information by electronic scanning an
identification document for any purposes. In this case, the system
would not retrieve the address information from the identification
document (e.g., the system can identify the field of "Address" and
skip it in the process of information retrieval).
[0034] At block 325, the system displays the processed
identification information to an operator. In some embodiments, the
processed identification information can be presented as a stripped
or "sanitized" version of the identification information. The
system can make sure that the whole process involving
identification documents from various jurisdictions is in
compliance with applicable rules. In some embodiments, the system
can present the processed identification information along with an
indication showing the reasons why the identification information
needs to be processed. In some embodiments, the system can generate
and maintain a record regarding the whole process involving
electronic scans of identification documents for purposes of future
review and audit (e.g., as evidence for compliance of applicable
rules). In some embodiments, the system can generate a statement
stating that the use of the information scanned by the system has
remained compliant with the applicable rules. The statement can be
used to let an identification document holder (e.g., a customer at
a store) know that the identification scan performed by the system
is compliant with the applicable rules.
[0035] FIG. 4 is a schematic diagram illustrating a system 400. As
shown in FIG. 4, the system 400 can include a processor 401, a
memory 402, an input device 403, a processing module 405, a display
module 407, a communication module 409, and a data storage unit
411. In some embodiments, the system 400 can be a portable device
(e.g., a smartphone, a notebook, a tablet, a phablet, or other
suitable devices). The system 400 can communicate with an external
database 411 via a network 413. In some embodiments, the network
413 can include the Internet, a corporate intranet, a wireless
network, or other suitable networks. In the illustrated
embodiments, the database 415 can store multiple electronic
scanning rules or regulations from various jurisdictions. In some
embodiments, the database 415 can be a distributed database. The
processor 401 is coupled to other components and configured to
control the same. The memory 402 is configured to temporarily (or
non-transitorily) store data or instructions processed by the
processor 401.
[0036] In the illustrated embodiment, the input device 403 can
receive a user input (e.g., the issuer, the current location, and
the proposed use for identifying applicable rules as discussed
above). In some embodiments, the input device 403 can be a scanning
device for retrieving identification information from an
identification document associated with an individual. In some
embodiments, the input device 403 can be configured to have
embedded information regarding a location or a proposed use. For
example, the input device 403 can be designed or programmed to use
only in a certain jurisdiction (e.g., a store located in
Jurisdiction A). As another example, the input device 403 can be
designed or programmed for a specific purpose, such as a customer
royalty program. The embedded information can be used to determine
one of the factors (e.g., the "location" factor and the "proposed
use" factor discussed above) that are used to identify applicable
rules in various jurisdictions. The processing module 405 is
configured to process the retrieved identification information
based on identified applicable rules (e.g., these rules can be
identified at and received from the database 415 based on
predetermined criteria such as the issuer, the current location,
and the proposed use). In some embodiments, the processing module
405 can delete, hide, mask, obscure, or edit the retrieved
identification information based on multiple identified applicable
rules. The display module 407 is configured to present the
processed identification information to an operator or a user of
the system 400 (e.g., a sales clerk uses the system 400 to scan a
customer's identification document for identity verification). In
some embodiments, the identified applicable rules can be stored in
the data storage unit 411, such that the system 400 can have access
to the identified applicable rules without accessing the network
413. This arrangement enables the system 400 to function normally
without network connection. In some embodiments, the data storage
unit 411 can be used to store the redacted or processed
identification information for a future process. For example, the
stored redacted identification information can be used for an
analysis of consumer behavior, a consumer royalty program, a
marketing activity, or other suitable processes.
[0037] FIG. 5 is a schematic diagram illustrating a scanning device
500 and an identification document. As shown in FIG. 5, the
scanning device can be connected with a database 529 via a network
527. In some embodiments, the network 527 can include the Internet,
a corporate intranet, a wireless network, or other suitable
networks. In the illustrated embodiments, the database 529 can
store multiple rules or regulations regarding electronic scans from
various jurisdictions. In some embodiments, the database 529 can be
a distributed database. The scanning device 500 is configured to
receive identification information from an identification card,
which includes a front side 501 and a back side 503. In the
illustrated embodiment, the identification information can include
an expiration date 505 of the identification card, a photograph
507, an identification number 511, a name 513, an address 515, a
set of personal information 517 (including sex/gender, height,
weight, and eye color), and a date of birth 519. The scanning
device 500 can retrieve the identification information by scanning
one-dimension barcodes 509 and 525, a two-dimensional barcode 521,
a magnetic stripe 523 and/or an embedded data chip (not shown). In
other embodiments, the scanning device 500 can retrieve the
identification information by scanning other suitable types of data
carriers. The scanning device 500 can identify or recognize the
identification information retrieved from identification documents
in various ways (e.g., based on embedded information
readable/accessible through a scan or the layout of the scanned
identification document).
[0038] FIG. 6 is a schematic diagram illustrating a user interface
for the system for performing identification scans in compliance
with jurisdictional rules. As shown in FIG. 6, the user interface
600 presents a set of processed identification information (e.g.,
the processed identification information discussed in connection
with FIGS. 1-4 above) in a display area 601. The display area 601
further includes a first stripped area 603 and a second stripped
area 605. The first stripped area 603 indicates that address
information (e.g., the address 615 shown in FIG. 6) cannot be
presented to a user due to certain rules. Similarly, the second
stripped area 605 indicates that personal information (e.g., the
set of personal information 616 shown in FIG. 6) cannot be
presented to a user due to certain rules. An indication 607 can be
presented adjacent to the display area 601. In the illustrated
embodiment, the indication 607 includes a description "Data
Stripped Due to State Law," which explains the reason of the
existence of the first stripped area 603 and the second stripped
area 605. In some embodiments, the indication 607 can be removed
from the interface 600. In some embodiments, the indication can
include various forms including blinking signals, sounds, or other
suitable indicators.
[0039] It will be appreciated by those skilled in the art that the
components or modules that are part of the system or interact with
the system may be implemented by computer-executable instructions,
such as program modules, executed by one or more computers or other
devices. Those skilled in the art will further appreciate that the
system or aspects of the system disclosed herein may be implemented
on any computing system or device. Suitable computing systems or
devices include server computers, multiprocessor systems,
microprocessor-based systems, network devices, minicomputers,
mainframe computers, distributed computing environments that
include any of the foregoing, and the like. Such computing systems
or devices may include one or more processors that execute software
instructions to perform the functions described herein. Processors
include programmable general-purpose or special-purpose
microprocessors, programmable controllers, application specific
integrated circuits (ASICs), programmable logic devices (PLDs), or
a combination of such devices. Software may be stored in a memory,
such as a random access memory (RAM), a read-only memory (ROM), a
flash memory, or a combination of such devices. Software may also
be stored in one or more storage devices, such as magnetic or
optical based disks, flash memory devices, or any other type of
non-volatile storage medium for storing data. Software may include
one or more program modules which include routines, programs,
objects, components, data structures, and so on that perform
particular tasks or implement particular abstract data types. The
functionality of the program modules may be combined or distributed
as desired in various embodiments.
[0040] From the foregoing, it will be appreciated that specific
embodiments of the invention have been described herein for
purposes of illustration, but that various modifications may be
made without deviating from the spirit and scope of the present
disclosure. Accordingly, the present technology is not limited
except as by the appended claims.
* * * * *