Notice of Revocation System for Revocable or Modifiable Documents

ABSTRACT

A revocable or modifiable document is affixed with a unique identification that is stored in a database with a status indicator. The principal who executed the document may be able to monitor and change the status indicator. A third party who might rely on the document may query the database to ensure the status of the document prior to accepting the document at face value. In some cases, a system may monitor queries made by third parties and enable the principal or their representative to monitor any activities related to the document. Examples of such documents are not limited to but include medical, financial, and other powers of attorney, advanced directives, wills, living wills, trusts, and documents used in secured transactions

BACKGROUND OF THE INVENTION

Revocable documents are often difficult to control and trace, with aprime example being financial powers of attorney. Such documents cangive an agent wide reaching powers that a principal may need to monitor,control, or revoke over time. There are many cases where an agent hasoverstepped their bounds and has caused financial havoc for theprincipal. Specifically, there have been many cases in elder law whereelderly persons have had their bank accounts mismanaged by agents whoabused the power of attorney.

Third parties, such as banks or other institutions, businesses, personsoften rely on a written power of attorney to issue funds from anaccount, open a loan, sell or purchase property, or conduct othertransactions. In some cases, the third parties may be defrauded when awritten power of attorney has been revoked, limited, or otherwisemodified.

SUMMARY OF THE INVENTION

A revocable or modifiable document is affixed with a uniqueidentification that is stored in a database with a status indicator. Theprincipal who executed the document may be able to monitor and changethe status indicator. A third party who might rely on the document mayquery the database to ensure the status of the document prior toaccepting the document at face value. In some cases, a system maymonitor queries made by third parties and enable the principal or theirrepresentative to monitor any activities related to the document.Examples of such documents are not limited to but include medical,financial, and other powers of attorney, advanced directives, wills,living wills, trusts, and documents used in secured transactions

BRIEF DESCRIPTION OF THE DRAWINGS

In the drawings,

FIG. 1 is a diagrammatic illustration of an embodiment showing arevocable document management process.

FIG. 2 is a diagrammatic illustration of an embodiment showing arevocable document management system.

FIG. 3 is a flowchart illustration of an embodiment showing a method forautomated document creation.

FIG. 4 is a flowchart illustration of an embodiment showing a method fordocument creation.

FIG. 5 is a flowchart illustration of an embodiment showing a method forobtaining the status of a document by a third party.

FIG. 6 is an illustration of an embodiment showing a revocable document.

FIG. 7 is a flowchart illustration of an embodiment showing a method formonitoring the use of a revocable document.

DETAILED DESCRIPTION OF THE INVENTION

Specific embodiments of the subject matter are used to illustratespecific inventive aspects. The embodiments are by way of example only,and are susceptible to various modifications and alternative forms. Theappended claims are intended to cover all modifications, equivalents,and alternatives falling within the spirit and scope of the subjectmatter as defined by the claims.

Throughout this specification, like reference numbers signify the sameelements throughout the description of the figures.

When elements are referred to as being “connected” or “coupled,” theelements can be directly connected or coupled together or one or moreintervening elements may also be present. In contrast, when elements arereferred to as being “directly connected” or “directly coupled,” thereare no intervening elements present.

The subject matter may be embodied as devices, systems, methods, and/orcomputer program products. Accordingly, some or all of the subjectmatter may be embodied in hardware and/or in software (includingfirmware, resident software, micro-code, state machines, gate arrays,etc.) Furthermore, the subject matter may take the form of a computerprogram product on a computer-usable or computer-readable storage mediumhaving computer-usable or computer-readable program code embodied in themedium for use by or in connection with an instruction execution system.In the context of this document, a computer-usable or computer-readablemedium may be any medium that can contain, store, communicate,propagate, or transport the program for use by or in connection with theinstruction execution system, apparatus, or device.

The computer-usable or computer-readable medium may be, for example butnot limited to, an electronic, magnetic, optical, electromagnetic,infrared, or semiconductor system, apparatus, device, or propagationmedium. By way of example, and not limitation, computer readable mediamay comprise computer storage media and communication media.

Computer storage media includes volatile and nonvolatile, removable andnon-removable media implemented in any method or technology for storageof information such as computer readable instructions, data structures,program modules or other data. Computer storage media includes, but isnot limited to, RAM, ROM, EEPROM, flash memory or other memorytechnology, CD-ROM, digital versatile disks (DVD) or other opticalstorage, magnetic cassettes, magnetic tape, magnetic disk storage orother magnetic storage devices, or any other medium which can be used tostore the desired information and which can accessed by an instructionexecution system. Note that the computer-usable or computer-readablemedium could be paper or another suitable medium upon which the programis printed, as the program can be electronically captured, via, forinstance, optical scanning of the paper or other medium, then compiled,interpreted, of otherwise processed in a suitable manner, if necessary,and then stored in a computer memory.

Communication media typically embodies computer readable instructions,data structures, program modules or other data in a modulated datasignal such as a carrier wave or other transport mechanism and includesany information delivery media. The term “modulated data signal” means asignal that has one or more of its characteristics set or changed insuch a manner as to encode information in the signal. By way of example,and not limitation, communication media includes wired media such as awired network or direct-wired connection, and wireless media such asacoustic, RF, infrared and other wireless media. Combinations of the anyof the above should also be included within the scope of computerreadable media.

When the subject matter is embodied in the general context ofcomputer-executable instructions, the embodiment may comprise programmodules, executed by one or more systems, computers, or other devices.Generally, program modules include routines, programs, objects,components, data structures, etc. that perform particular tasks orimplement particular abstract data types. Typically, the functionalityof the program modules may be combined or distributed as desired invarious embodiments.

Throughout this specification, the term “comprising” shall be synonymouswith “including,” “containing,” or “characterized by,” is inclusive oropen-ended and does not exclude additional, unrecited elements or methodsteps. “Comprising” is a term of art which means that the named elementsare essential, but other elements may be added and still form aconstruct within the scope of the statement. “Comprising” leaves openfor the inclusion of unspecified ingredients even in major amounts.

FIG. 1 illustrates an embodiment 100 showing a system for management ofrevocable documents. A principal 102 may create a document 104. Thedocument may be a power of attorney or some other type of document. Anagent 106 or 108 may present the document to a third party 110 in orderto perform a transaction.

When the document is created, an identification generator 112 is queriedand a unique identification is generated 114 and incorporated into thedocument 104. The unique identification is also stored in a database116. When the document is presented to a third party 110, the thirdparty may query 118 the database 116 to return the document status 120.

The principal 102 may use a document modification system 122 to updatethe status 124 of the document. The status may be, for example, that thedocument is revoked. In such a case, the third party may check thestatus, find out that the document has been revoked, and may not acceptthe document.

The principal 102 may also use a monitoring system 126 to periodicallyquery 128 the database 116 to generate usage reports 130. In some cases,the usage reports 130 may be generated automatically.

The embodiment 100 illustrates a system for managing revocabledocuments. Such documents are created by a principal and are used by anagent in transactions with a third party. In many cases, a principal maywish that the document be useful for certain circumstances or for alimited period of time. The period of time may be extended or shortenedbased on circumstances as they occur over time. Further, some parametersset forth in the document may be modified, added, or eliminated duringthe useful life of the document.

Many documents may be executed, given to an agent, but may be difficultto effectively revoke. This is because the documents are out of thecontrol of the principal and in the hands of one or more agents. Theagents may use the documents to make financial, medical, or otherarrangements when third parties rely on the document. Because theprincipal cannot notify all potential third parties if the document hasbeen revoked, the agent may be able to maliciously or unwittinglycontinue using the document even when the principal wants to revoke ormodify the document.

One situation where such a problem exists today is with financial powersof attorney executed by our elderly citizens. Often, a financial powerof attorney or general power of attorney may be executed by an elderlyprincipal so that an agent, such as a younger relative, may make somefinancial arrangements on behalf of the principal. Unfortunately, manyelderly citizens are taken advantage of by unscrupulous agents with sucha power of attorney.

In such a situation, the elderly principal has very little ability toeffectively revoke or modify the document. An agent may rightfully makecopies of the document which are generally treated with the same respectas the originals, and several people may be vested with powers affordedby the document. Third parties that rely on the document may enter intoarrangements from which it may be costly for them to extract. Even ifthe principal requests that the documents and all copies be returned forrevocation, obtaining all the copies may be difficult.

For example, an elderly gentleman may create a financial power ofattorney and give it to his nephew. The nephew, full of youthfulexuberance, may present the power of attorney to a bank to establish anaccount in his uncle's name but unbeknownst to his uncle, the principal.The bank may make a copy of the financial power of attorney and place itin their file. At some point, the uncle may wish to revoke the financialpower of attorney and request that the nephew return all copies. Sincethe uncle does not know about the bank account, he does not know tonotify the bank of the revocation. The bank may be relying on their copyof the financial power of attorney to continue to allow the nephew toexercise control of the bank account.

In this all too frequent scenario, the uncle may be able to access thedatabase 116 to revoke the power of attorney. Because the third party,the bank in this example, may have an affirmative duty to periodicallyquery 118 the database 116, any revocation of the power of attorneywould be communicated to the bank regardless if the nephew notified thebank.

The document 104 may be any type of negotiable document, power ofattorney, will, trust agreement, or any other document where a principalcreates the document and an agent presents the document to a thirdparty. By way of example, the document may be a living will, advanceddirective, medical power of attorney, or other document giving an agentthe power to make medical decisions for the principal. In anotherexample, the document may give an agent the power to act in thefinancial affairs of the principal. Such a document may be a generalpower of attorney, a financial power of attorney, or a document used ina secured transaction, such as a negotiable instrument, bearer paper,promissory note, investment securities, documents of title, or any otherdocument that gives an agent a direct or beneficial financial interestor power.

In some cases, the document may be a contract, will, or trustinstrument.

The document 104 may contain a provision whereby a contract term orother adjustable or modifiable variable may be obtained through a queryto the database 116. For example, a financial power of attorney maycontain a maximum limit authorized for a transaction. In anotherexample, a contract may contain a provision that adds certainlimitations or requirements to the contract as defined in an entry inthe database 116. The terms of the contract or agreement may change overtime, and those terms may be valid for a predetermined period of timeafter the third party makes the query 118.

In some embodiments, the document 104 may transfer the responsibility orduty of verifying the status of the document to the third party. Ratherthan relying on the face of the document alone, the document may haveterms that require that every time the document is relied upon, thethird party must perform a query 118 and receive an appropriate documentstatus 120 in order for the document to have effect.

Some embodiments may provide an authentication document along with thedocument status 120. The authentication document may include a timestamp, and may also include a unique identifier that is provided by thequery system. The unique identifier may be an encrypted time stamp, arandom number, or other identifier that may be used by the third partyto authenticate the authentication document.

The identification generator, database, and other components of theoverall system may be accessible through a web interface, a telephoneinterface, or any other type of interface. The principal and third partymay each have a separate web interface through which each may performtheir various functions. In some embodiments, a phone number, forexample a tool free phone number, or the postal mail may be used byeither or both the principal or the third party to perform theirinteractions with the database 116.

In some embodiments, the entire document may be created through a webinterface, where a principal may enter his or her name, an agent's name,the nature of the document, and other information sufficient for thesystem to generate the entire document ready for the principal to printout on paper and sign or otherwise authenticate.

In other embodiments, an attorney or other document preparer may procurea series of preprinted labels with unique identification numbers foreach label. When the attorney drafts the document, he or she may affixone of the preprinted labels on the document when the principal executesthe document. In some cases, the label may include tamper resistantfeatures, including anti-copying features, features that destroy ordisfigure the document if the label were removed, or other features thatwould deter unauthorized tampering with the document. Some embodimentsmay include a label with a semi-transparent area having preprintedwriting or images that is placed over other writing on the document.Such an embodiment may prevent an agent from copying the document anderasing or covering up the portions of the document that require thethird party to check the status of the document.

The principal 102 may use a modification system 122 to update the status124 of the document. The system may require the principal 102 toauthenticate himself or herself to the system. For example, a principalmay be required to enter a password or other authentication if thesystem has a web or other computer interface. In some cases, theprincipal may contact his or her personal attorney who may be authorizedto update the status of the document. In such a case, the attorney mayauthenticate that the principal is indeed making the requested change.

In some situations, the principal 102 may be required to periodicallyupdate the status 124 to keep the document current. For example, a powerof attorney may be valid for a three month period, but may be extendedif and only if the principal uses the document modification system 122to extend the period of validity. Such a term may be incorporated in theface of the document or may be a security feature of the database 116,where the document is rendered invalid without repeated contact by theprincipal.

The principal 102 may be able to monitor the activity of the documentthrough a monitoring system 126 that performs a query 128 on thedatabase 116 and returns a usage report 130. In some cases, a thirdparty may be required to authenticate prior to receiving a documentstatus 120. When performing the authentication, the third party mayenter their name, business, address, phone number, nature of theinquiry, or any other information. Some or all of such information maybe returned to the principal in the usage reports 130.

The monitoring system 126 may enable a principal 102 to track the usageof the document. Using the example of a power of attorney, the principalmay wish to know where the power has been presented and for whatpurpose. In some cases, the monitoring function 126 may be used bygovernment or other regulatory and monitoring authorities toperiodically check for fraud.

The usage reports 130 may be triggered by a specific request of theprincipal, by a periodic report generator, or by predetermined triggersset in the database system. Examples of the triggers may be that arequest for a certain size or type of transaction was attempted, that acertain frequency of requests were made, that a geographical boundarywas exceeded, or any other type of abnormality. In some cases, everyquery by a third party may trigger an email message or other type ofnotification.

In some embodiments, the principal 102 may not interface directly withthe various elements of the system, but an attorney or otherrepresentative acting on the principal's behalf may. For example, anattorney may draft the text of the document 104, but the attorney or aparalegal may access the identification generator 112 to retrieve theunique identification 114 that is incorporated in the text of thedocument. The attorney, acting on instructions from the principal, mayengage the document modification system 122 to change the documentstatus. Further, the attorney may perform periodic monitoring of thedocument usage and report back to the principal.

FIG. 2 is a diagrammatic illustration of an embodiment 200 showing asystem for revocable document management. A document generation system202 interacts with a unique identification generator 204 to produce adocument. The entry system 206 may be used to enter the documentinformation into the database 208. In some instances, the documentgeneration system may be bypassed and a user may use the entry system206 to interact with the unique identification generator 204 and storedocument information in the database 208. The embodiment 200 may alsoinclude a query system 210 useful for determining the status of thedocument from the database 208, a modification system 212 for changingthe document status or other parameters in the database 208, and amonitoring system 214 for monitoring the activity relating to a documentin the database 208.

The embodiment 200 may be a computerized and highly automated systemwhereby all interactions between the users of the system, such as theprincipal or third party, and the embodiment 200 are automated. Someembodiments, on the other hand, may use a manual system of recording,storing, and querying data. For example, a manual system may include acentral repository where paper copies of each document and pertinentinformation about the document are stored in a bank of filing cabinets.A manual system may employ clerks who search the filing cabinets for theappropriate document in response to a query by a third party orprincipal.

The embodiment 200 may be system with a web-based interface, where anyof the various users, such as principals, third parties, agents,principal's representatives, government regulators, or any other personmay interface with the various components using a web browser on acomputer connected to the Internet. In such a case, the document anddata storage and retrieval may be highly automated.

Some embodiments may provide secondary mechanisms for interfacing withthe system. For example, in lieu of or in addition to a web interface, athird party may be able to place a phone call to perform a query. Thephone interface may be fully automated where the third party may pressvarious keys on the phone or speak to activate menus, enter documentidentification, or perform any of the various steps. The phone interfacemay include a live operator who will converse with the third party toperform the interaction.

The specific form and technology used to interface with the embodiment200 may be different for the specific applications, and those skilled inthe art may use any useful technology to accomplish the goals of thesystem.

The document generation system 202 may be an automated system that takesspecific information from the principal and other parties and generatesa word-processed document. The document may be a predetermined form thatis automatically filled out by the document generation system 202, ormay have several different clauses, options, or other language that aprincipal or attorney may select during document creation. In someembodiments, the document generation system 202 may create legallybinding documents without an attorney's involvement, while in otherembodiments, an attorney may use such a system as a starting point fordrafting a document for a client.

The unique identification generator 204 may generate a unique serialnumber or other identifier that can be used during the query process todetermine the status of the document. In some cases, the uniqueidentifier may be a single numeric, alpha-numeric, or text string thatis assigned to the document. In other cases, an identifier may includeimages, shapes, or other human identifiable features. In still othercases, an identifier may include any type of machine readable feature,such as a barcode, magnetic strip, radio frequency identifier, or otherfeature that may be scanned by a device to provide an identifier. In yetother cases, the identifier may include an audio or visual playbackdevice that transmits a prerecorded message, tone, or sequence that canbe understood and interpreted by a human or a device.

The entry system 206 may be a dedicated web interface that enables auser to enter specific data about the document. During the documententry process, the entry system 206 may interact with the uniqueidentification generator 204 and provide the unique identifier to theuser of the entry system 206. The user may then add the uniqueidentifier to the document. In some cases, the user may print a labelwith the unique identifier.

The database system 208 may be a computer operating any type of databasemanagement system in any useful configuration. The database 208 mayinclude various forms of authentication, security, encryption,redundancy, or other systems, features, or mechanisms used by thoseskilled in the art for similar type databases. In some embodiments, thedatabase 208 could include a paper copy repository or othernon-electronic mechanism for document storage and retrieval.

The query system 210 may be any mechanism by which a third party maydetermine the status of the document. In some cases, the third party maybe authenticated, such as by providing a name and email address. Thethird party may be authenticated by replying to an automated email, byentering a credit card, or by any other mechanism. In some cases, thequery system 210 may afford an authenticated user a more detaileddescription or provide different features than with a non-authenticateduser. For example, an authenticated user may be able to sign up fornotifications if and when the document status changes, whereas anon-authenticated user may not be offered such an opportunity.

The query system 210 may monitor and record various information about aproposed transaction. For example, a query concerning a financial powerof attorney may include the dollar amount of a transaction, the locationof the transaction, and other details.

The modification system 212 is the means by which a principal may changethe status of the document. The modification system 212 may require ahigh level of authentication of the principal or the principal'srepresentative. The level of authentication may be commensurate with thelegal powers enabled by the document. In some cases, two or more personsmay be required to change the document status. For example, theprincipal and the principal's attorney may be required to authenticateany changes made to the document status. In the case of a documentissued by a corporation, two or more people vested with the power tosign for the corporation may be required to authenticate any changes tothe document.

After authenticating the principal or someone authorized to act onbehalf of the principal, the modification system 212 may allow theprincipal to perform several different operations on the document. Inthe case of a revocable document, the principal may be able tocompletely revoke the document. In other cases, the principal may beable to add limitations, provisions or clauses, or remove suchlimitations, provisions or clauses.

The principal may be able to change different variable portions of thedocument. For example, if the document is a power of attorney, aprovision in the power may state that the authorized amount of moneythat can be transacted with the power may the amount stored in thedatabase 208. The principal may be able set such an amount through themodification system 212.

The monitoring system 214 may be useful for either a third party, aprincipal, or anyone else to monitor any activity that occurs with thedocument. The monitoring system 214 may be able to produce reports fromeach query made regarding the document, produce timelines of activities,or provide administrative functions. Reports may include the persons,businesses, or locations from where queries were made through the querysystem 210.

When an authenticated third party uses the monitoring system 214, thethird party may be able to generate a report showing the status of allthe documents with which the third party is associated, even if thedocuments are from different principals.

The monitoring system 214 may also provide alerts notifications based oncertain activities or parameters. For example if a query is from a thirdparty located outside a state boundary or if a query proposes a verylarge financial transaction, an alert may be generated. Such an alertmay be sent to the principal, the principal's attorney, an executor ofan estate, a court or other government agency, or anyone else.

FIG. 3 is a flowchart illustration of embodiment 300 showing a methodfor automated document creation. The process begins in block 302.Details for the document are obtained in block 304, including the typeof document, information about the principal, information about theagent, and any additional restrictions. In block 306, a uniqueidentifier is generated for the document, and in block 308, the documentis generated. In some cases, the document may be edited in block 310.Information about the document, as well as the unique identifier for thedocument, are stored in a database in block 312. The document is printedin block 314, authenticated in block 316, and used in block 318. Theprocess ends in block 320.

The embodiment 300 illustrates how an automated document creation systemmay be used to create a revocable document. The method may be used togenerate legally binding documents, such as a financial power ofattorney, a general power of attorney, a trust instrument, a documentused in a secured transaction, a medical power of attorney, an advanceddirective, an organ donor registration, a living will, a will, acontract, or any other document.

In some cases, a user may create the document through a web-basedinterface. By entering in the appropriate information to the website andselecting different options from the website, the user may create aprintable document that is ready to be signed or otherwise authenticatedby a principal. Such a system may be used by attorneys or paralegals increating a first draft of a document that may be edited in block 310.

Because the document may be created by the system, much of theinformation necessary to create the system may be readily stored in adatabase for later retrieval by a third party. The information mayinclude a status field. In some embodiments, the status field may be setto indicate that the document is not valid, and the principal may berequired to authenticate himself or herself to the system in order tochange the status field to indicate that the document is valid.

The document may include instructions for a third party. Theinstructions may include language that express or implies that the thirdparty cannot rely on the document until a query has been successfullymade to the database and the query returns a valid status. In such acase, the third party may rely on the face of the document at his or herown peril unless such a query is performed. The instructions may includea website address for a query system, a telephone number for a querysystem, or other directions for performing a query on the database.

FIG. 4 is a flowchart illustration of an embodiment 400 showing a methodfor document creation. A document may be drafted by an attorney in block402, where the attorney may incorporate the principal information, agentinformation, and any restrictions into the document. Alternatively, adocument may be created by starting with a form document in block 404,entering information about the principal in block 406, and enteringinformation about the agent in block 408. The document information maybe entered into the identification generator in block 410 and a uniqueidentifier for the document may be returned in block 412. The uniqueidentifier may be incorporated onto the document face in block 414 byincorporating the identifier in the text of the document, or applying anadhesive label with the unique identifier onto the document.Instructions for operating the query system are incorporated in thedocument in block 416. The document is authenticated in block 418. Acopy of the authenticated document may be stored in a database in block420.

The embodiment 400 illustrates some of the techniques that can be usedto generate a document that may be revoked through the systems ofembodiments 100, 200, and the like. A unique identifier is incorporatedinto the document, and that identifier, along with other informationabout the document, may be stored in a database. A principal may updatethe status of the document or other parameters relating to the documentin the database, from which a third party may gather up-to-date statusof the document. The unique identifier may be used by the database tofind the status or other parameters pertaining to the document.

FIG. 5 is a flowchart illustration of an embodiment 500 showing a methodfor obtaining the status of a document by a third party. The document ispresented to the third party in block 502. In block 504, the querysystem is entered by the third party using instructions on the face ofthe document. The third party is optionally authenticated in block 506,and the unique identifier is entered in block 508. The status of thedocument is received in block 510. A status document is received inblock 512, where the status document may have a time stamp and a uniqueidentifier. In block 514, the third party may receive an image of theoriginal revocable document, and may accept or reject the document basedon the status and/or image in block 516.

Embodiment 500 is a method by which a revocable document may be handledby a third party. In the embodiment, the third party uses instructionson the face of the document to perform a query. The query returns astatus and may produce a status document and an image of the originalrevocable document. Based on these items, the third party may choose torely on the document.

The process may shift the burden or risk of pursuing a transaction awayfrom the third party, when the document is properly queried and asuccessful result is returned. In such a case, the third party may begiven a timestamped document that may have a traceable and verifiableidentifier that is issued when the query is made to the database. Such astatus document may provide the third party with the assurance that thedocument is authentic so that a transaction may proceed. A copy of thestatus document, along with a record of the query, may also be stored inthe database for later recall.

In some systems, an image of the original revocable document may bestored in the database. The image may be viewed or printed by a thirdparty when a query is made, enabling the third party to inspect andverify that the presented document has not been altered or changed.

FIG. 6 is an illustration of an embodiment 600 showing a revocabledocument. A preprinted label 602 contains a unique identifier 604 andinstructions for performing a verification query 606. The instructionsinclude a web address or link 607. The label may also include asignature block for the principal 608. The label 602 may be affixed tothe face of the revocable document 610 in the area 612.

The embodiment 600 uses a preprinted label to communicate the uniqueidentifier 604 as well as instructions 606 for verifying the status ofthe document. The label may be preprinted well in advance with uniqueidentifiers, but the drafter of the document 610 may enter the uniqueidentifier and other particulars about the document 610 into an entrysystem that stores a record of the document 610 in a database.

In some cases, the label 602 may have several features that make itdifficult for someone to fraudulently copy the document and erase theinstructions 606 and unique identifier 604. For example, the label 602may be printed on a transparent or semi-transparent label stock and havea background image or pattern printed on the label. The label may beplaced over some text on the document 610, making it more obvious if thelabel were covered up or removed. In some embodiments, such a backgroundimage may only be readily visible when the document 610 is copied usinga photocopier. In some embodiments, the label 602 may have a transparentportion that covers the principal's signature area.

The label 602 may have various other tamper-proof or tamper-resistantfeatures. For example, the label 602 may be constructed so that anyattempt to remove the label severely damages the underlying document.

FIG. 7 is a flowchart illustration of an embodiment 700 showing a methodfor monitoring the use of a revocable document. The document ispresented to a third party in block 702, whereupon the third partyexecutes a query in block 704. The query is stored in a monitoringdatabase in block 706. If the query does not exceed a predeterminedthreshold or fit a pattern of fraud in block 708, the process ends inblock 710, otherwise a report is generated in block 712 and the reportis transmitted to the principal or regulatory agency in block 714.

The embodiment 700 illustrates how the queries about a document may bestored, monitored, and various notifications generated if the querypresents a potential problem. In some cases, the thresholds may be setso that every query generates a report that is viewed by the principal.In other cases, the query in block 708 may include sophisticatedalgorithms, pattern checking routines, or queries to various databasesto determine if a query fits the potential for fraud. For example, aquery from an offshore bank known for illegitimate or shady transactionsmay create an immediate notification that may be sent to a principal andpossibly to governmental regulatory agencies.

The various embodiments disclosed herein are examples of how documents,including legally enforceable documents, may be created, used, andrevoked. By using a database and query system, a principal thatauthorized a document may be able to serve notice to those third partiesthat potentially rely on the document. The notice may include whether ornot the document has been revoked in its entirety, and the system mayprevent the third party from relying on the document and entering into atransaction from which it should not have.

The foregoing description of the invention has been presented forpurposes of illustration and description. It is not intended to beexhaustive or to limit the invention to the precise form disclosed, andother modifications and variations may be possible in light of the aboveteachings. The embodiment was chosen and described in order to bestexplain the principles of the invention and its practical application tothereby enable others skilled in the art to best utilize the inventionin various embodiments and various modifications as are suited to theparticular use contemplated. It is intended that the appended claims beconstrued to include other alternative embodiments of the inventionexcept insofar as limited by the prior art.

1. A system comprising: a database; an identification generation systemadapted to generate a unique identification for a revocable document,said unique identification being attached to said document, saidrevocable document being authorized by a principal; an entry systemadapted to store said unique identification in said database; a querysystem adapted to return a status for said revocable document using saidunique identification; a modification system adapted to modify saidstatus and further adapted to authenticate said principal.
 2. The systemof claim 1 further comprising: a monitoring system adapted to store arecord for a query performed by said query system.
 3. The system ofclaim 2 wherein said monitoring system is further adapted to notify saidprincipal of said record.
 4. The system of claim 1 wherein saidrevocable document is at least one of a group composed of: a financialpower of attorney, a general power of attorney, a trust instrument, adocument used in a secured transaction, a medical power of attorney, anadvanced directive, an organ donor registration, a living will, and awill.
 5. The system of claim 1 wherein said unique identification isattached to said revocable document by a label.
 6. The system of claim 5wherein said label comprises at least one of a group composed of: atamper resistant feature and at least a portion that is at leastsemi-transparent.
 7. The system of claim 5 wherein said adhesive labelis attached to copies of said revocable instrument.
 8. The system ofclaim 1 wherein said identification system comprises a world wide webinterface.
 9. The system of claim 1 wherein said identification systemis adapted to create said revocable document by a method comprising:taking said principal's name; taking an agent's name; generating textfor said revocable document; incorporating said unique identificationinto said text of said revocable document; and delivering said text in aprintable format.
 10. The system of claim 9 wherein said method furthercomprises: incorporating a reference for said query system in said textfor said revocable document.
 11. The system of claim 10 wherein saidreference for said query system comprises a website address throughwhich said query system may be engaged.
 12. The system of claim 9further comprising: delivering said text in an editable format.
 13. Thesystem of claim 9 wherein said identification system comprises a webinterface.
 14. The system of claim 1 wherein said query system isfurther adapted to display an image of said revocable document.
 15. Thesystem of claim 1 wherein said query system is further adapted to beoperated through at least one of a group composed of: a web interface, atelephone interface, and an email interface.
 16. The system of claim 1wherein said query system is further adapted to generate a statusdocument showing said status and having a second unique identifier. 17.The system of claim 1 wherein said modification system is adapted toenable said principal to amend said revocable document.
 18. A methodcomprising: taking a principal's name; taking an agent's name;generating the text of a revocable document, said text comprising saidprincipal's name and said agent's name; incorporating a uniqueidentification on said revocable document; storing said uniqueidentification and a status in a database; and incorporating an addresson said revocable document, said address being to a website adapted toquery said database and return said status.
 19. The method of claim 18further method comprising: receiving a query for a status for arevocable document, said query being to a database comprising a uniqueidentifier that is incorporated on the face of said revocable document;storing said query; and generating a notification of said query.
 20. Arevocable document comprising: an authentication by a principal for saiddocument; a unique identifier attached to the face of said document,said unique identifier being stored in a database, said databasecomprising a status related to said document, said database beingfurther accessible by said principal through a modification system suchthat said principal may change said status of said document, said uniqueidentifier being generated using an identification system; and astatement on said document transferring a duty to a third party toperform a query on said database to obtain said status prior to relyingon said document, said query being performed using a query system.