Identification verification system

ABSTRACT

A method and apparatus is provided for verifying the validity of ID cards. A card reading device reads an ID card and transmits a request to a database server. A database is queried and a reply is sent back to the card reading device indicating whether the ID is valid. If desired, the reply can include additional information, such as a description of the ID holder. The ID verification system can be used to help verify whether an ID belongs to the ID holder. The system can also log and timestamp events for future access.

CROSS REFERENCE TO RELATED APPLICATIONS

The present application is a continuation of and is related to andclaims the benefit of and priority to the earliest available effectivefiling date(s) from the following listed application(s): under 35 U.S.C.§ 120, co-pending commonly owned U.S. patent application Ser. No.16/377,055 filed Apr. 5, 2019, which is a continuation of U.S. patentapplication Ser. No. 15/636,406, filed on Jun. 28, 2017, now U.S. Pat.No. 10,297,100 issued on May 21, 2019 which is a continuation of U.S.patent application Ser. No. 15/005,253, filed on Jan. 25, 2016, now U.S.Pat. No. 9,697,667 issued on Jul. 4, 2017 which is a continuation ofU.S. patent application Ser. No. 14/011,166, filed on Aug. 27, 2013,which is a continuation of U.S. patent application Ser. No. 13/334,184filed Dec. 22, 2011, now U.S. Pat. No. 8,517,254 issued on Aug. 27,2013, which is a continuation of U.S. patent application Ser. No.12/769,606, filed on Apr. 28, 2010, now U.S. Pat. No. 8,083,130 issuedon Dec. 27, 2011, which is a continuation of co-pending commonly ownedU.S. patent application Ser. No. 10/440,058, filed on May 16, 2003, nowU.S. Pat. No. 7,708,189 issued on May 4, 2010, which claims priorityunder 35 U.S.C. § 119 to co-pending, commonly owned U.S. ProvisionalPatent Application Ser. No. 60/381,361 filed on May 17, 2002, entitled“IDENTIFICATION VERIFICATION SYSTEM”, all of which are incorporated byreference in their entirety.

FIELD OF THE INVENTION

This invention relates to the field of identification systems. Inparticular, this invention is drawn to a system and method for real-timeidentification verification.

BACKGROUND OF THE INVENTION

A typical identification (ID) card includes information about thecardholder such as name, address, a physical description, and picture.Most ID cards also contain some sort of machine-readable identifier suchas a magnetic stripe, a bar-code, a smart chip, etc. ID cards aretypically used to restrict access to areas or products to unauthorizedcardholders. For example, laws in every state require a person to be atleast a minimum age to purchase alcohol or tobacco products. Similarly,in most states, a patron must be at least a minimum age to enter a bar.Typically, to verify that a person meets age requirements, the personmust present an ID card prior to purchasing products or prior to beingadmitted to an establishment having age requirements.

There are numerous problems with using ID cards for the purposesmentioned above. One problem relates to fake or altered ID cards. It isvery common for under age people to obtain fake or altered ID cards thatshow that the cardholder meets a minimum age requirement. In addition,it is common for under age people to use a valid ID card belonging tosomeone else. The quality of many fake or altered ID cards is such thatit is extremely difficult to distinguish or determine the validity of anID card.

Another problem relating to ID cards is that it is cumbersome to verifytheir authenticity. For example, when a law-enforcement officer verifiesthe validity of an ID card, the officer typically gets on a radio andreads the ID number to a remote person who has the ability to verify thevalidity of the ID. This procedure is labor intensive and time-consumingfor the officer.

There is therefore a need for a system that quickly and easily verifiesthe validity of ID cards.

SUMMARY OF THE INVENTION

An apparatus of the invention is provided for verifying the validity ofID cards comprising: a web-enabled cellular telephone; a magnetic stripereader connected to the cellular telephone for reading ID numbers fromID cards; and software installed in the cellular phone to facilitate thetransmission of ID numbers to a remote database and the reception anddisplay of information relating to the transmitted ID numbers.

Another embodiment of the invention provides an apparatus for verifyingthe validity of ID cards comprising: an ID card input device forreceiving an ID number from an ID card; a wireless transceiver fortransmitting a messages to a remote database and receiving replies fromthe remote database; and a display for displaying information relatingto the replies.

Another embodiment of the invention provides a method of verifying thevalidity of ID cards comprising the steps of: providing a card readingdevice; providing a remote database containing ID information; readingan ID card using the card reading device; sending a message to theremote database; querying the database for a match to the read ID card;and in response to the message, sending a reply message back to the cardreading device, wherein the reply message contains information about theread ID card.

Other objects, features, and advantages of the present invention will beapparent from the accompanying drawings and from the detaileddescription that follows below.

BRIEF DESCRIPTION OF THE DRAWINGS

The present invention is illustrated by way of example and notlimitation in the figures of the accompanying drawings, in which likereferences indicate similar elements and in which:

FIG. 1 is a block diagram illustrating one example of an environment inwhich the present invention may be used.

FIG. 2 is a flowchart illustrating one example of the use of theinvention.

FIG. 3 is a view of one example of a card reading device of the presentinvention.

DETAILED DESCRIPTION

In general, the present invention provides a real-time identificationverification system and method that can be used to verify the validityof an ID, as well as help to verify that the ID belongs to the IDholder. The present invention has various optional features, as well asvarious uses, examples of which are described below.

The present invention may be used in numerous environments. FIG. 1 is ablock diagram illustrating one example of an environment in which thepresent invention may be used. FIG. 1 shows an ID card reading device 10that is in communication with a database 12 via the Internet 14 or someother manner (e.g., phone lines, etc.). The card reading device 10 maycommunicate with the database 12 wirelessly (e.g., via a cellularnetwork, WiFi (802.11b), radio, etc.), over a network, or in any otherdesired way. The ID card 16 shown in FIG. 1 may include at least one ofthe following: an ID number, a PIN number, a magnetic stripe, a smartchip, a bar code (1-dimensional, 2-dimensional, etc.) and/or aphotograph. The ID card reading device 10 is capable of reading (via amagnetic stripe reader, bar-code scanner, smart card reader, textrecognition system, voice recognition system, optical card readersystem, keypad for manual entry, querty keyboard, and/or any otherdesired device) the ID card 16 presented by an ID holder.

The present invention has many uses. Following is one example of a useof the identification verification system of the present invention. FIG.2 is a flowchart illustrating an example of the use of the invention.One example of when the process illustrated in FIG. 2 would be used iswhen an ID holder desires to enter an establishment or purchase aproduct that has age restrictions. The process begins at step 2-10 wherethe ID card reading device 10 reads the ID card. Next, at step 2-12, thedevice sends an ID number (or other read information) to the database 12of a service provider. Next, at step 2-14, the database 12 is thenqueried. At step 2-16, the process determines whether a match was found.If there is no match in the database, then a rejection message is sentback to the device at step 2-18. If a match was found, the processproceeds to step 2-20, where the process determines whether the ID isvalid. If the ID is not valid, then a rejection message is sent back tothe device at step 2-18. For a valid ID, the service provider respondsto the request at step 2-22 by sending back ID information to the device10. The ID information sent back to the ID reading device 10 may includeany desired information, such as a valid/invalid message, a name, anaddress, a photo, a physical description of the ID holder, etc.

In one example, biometric information is stored on an ID card. Prior toreading an ID card, biometric information from an ID card holder iscompared with the biometric information stored on the ID card to verifythat a person presenting an ID card matches the biometric informationstored on the ID card. Once a match is made, the process described abovecontinues (e.g., beginning with step 2-10 in FIG. 2).

If desired, the card reading device can selectively display or storevarious information. For example, a listing of the IDs read during aparticular time period can be read. Also, if desired, the card readingdevice can provide a listing of patrons in an establishment which can beused for things such as running promotions, marketing, building customerdatabases, etc. Similarly, data can be stored at the database forsimilar uses.

In one example, the present invention provides a web-enabled databasesystem as a tool to combat ID fraud and underage use of alcohol andtobacco. The invention enables bars, restaurants, package stores,convenience stores and all other retailers of alcohol and tobaccoproducts, as permitted users of this type of restricted data, to verifythe age of an individual and the validity of a state drivers license orID card presented as proof of age and/or identification.

In one example of the database of the present invention, the databasecontains all current state drivers licenses and identification cards,obtained from state departments (e.g., in Texas, from the TexasDepartment of Public Safety (DPS)). The database may include data frommultiple states, or from a national database. The database is loadedonto servers linked to the Internet. The database may be updated asfrequently as desired, or as frequently as the data is available fromstates. In addition, the database may contain state license/permitinformation that entities must have to sell liquor, tobacco, etc. Forexample, for a database in Texas, the database may contain all TexasAlcoholic Beverage Commission (“TABC”) license/permit information (“TABCPermit Number”) available from TABC. A web site may be provided on theInternet, allowing permitted users to have encrypted access to thedatabase.

A licensed establishment (“customer”), as a permitted user of theinvention for verification purposes, could use the invention (e.g., asillustrated in FIG. 2) to check both the age of an ID holder and thevalidity of an ID when an individual presents the ID to the customer (bytyping in the Drivers License or ID number, or by scanning theinformation from the card with a machine-readable device). The customerwill be able to choose the input device from a range of equipment,including, but not limited to, computers, PDA's, wireless devicesincluding cell phones, networked cash registers, etc. In one embodiment,the chosen equipment includes a web-enabled browser. One suitable inputdevice is comprised of a combination 3G cell phone/PDA that receives anID identification number (from a card reading device or from a manualentry) and generates the appropriate requests to be sent to the serviceprovider. FIG. 3 is a view of one example of a card reading device 20 ofthe present invention. FIG. 3 shows a PDA cell phone 22 (such as aKyocera model 6035 PDA phone). Of course, other devices may also beused, such as Palm Pilots, Compaq IPAC's, or a Blackberry, etc. The cellphone 22 may include voice capabilities, but such capabilities are notrequired. The PDA cell phone 22 includes conventional features such as adisplay 24, keypad 26, processor, transceiver (not shown), etc. Attachedto the phone (via connector 28 and cord 30) is a magnetic stripe readingdevice 32 which is capable of reading the magnetic stripe on an ID cardwhen the card is swiped through the slot 34. The embodiment shown inFIG. 3 provides one example of a real-time wireless ID verificationdevice. In some configurations, the magnetic stripe reading device maybe integrated into the cell phone/PDA case itself. Thus no wires will bevisible or present.

The functions of the card reading device are implemented using softwareapplications. For example, in the example of the PDA 3G phone, Javaapplications can be stored in the phone to execute the necessaryfunctions. Of course, many desired computer languages can be used (e.g.,C++ for Microsoft platforms).

In addition to, or in place of the display 24, the card reading devicecan use other user perceivable devices to convey received information toa user. In one example, one or more lights can be provided to conveycertain information. For example, when an ID is invalid or a person isunderage, a red light could be activated. Similarly, when an ID is validand/or a person is not underage, a green light could be activated. Inanother example, a speaker or headphone jack can be used to provideaudio information to a user. In this example, the device may alsoinclude recorded speech or a text to speech processor to generate verbalmessages (e.g., “ID valid”, “ID not valid”, “underage”, “legal age”,“arrest warrant outstanding”, “error reading ID”, “re-enter ID”, etc.)to a user, which would allow a user to receive information withouthaving to read a display. In another example, an infrared signal couldbe sent to a printing device and a ticket or authorization card could begiven to a patron or a visitor.

Referring back to the example above, after a patron's ID is entered, thedevice will transmit the ID number to the database server of a serviceprovider. The server will then compare the ID number to the driver'slicense and ID database. If the ID number is invalid, that informationwill be returned to the customer's device for display to the customer.If the ID is valid, the server will return to the customer's device, thepatron's name, birth date, calculated age and, if available in thedatabase, the patron's physical description or photograph as stored inthe database. The customer can then compare that information to thepresented ID and also to the presenter, to be certain that the personpresenting the ID is the person whose description appears on the ID.

In one example, when the server receives the information, a record isinserted into the database archive, including the permit number, thedrivers license or ID number, and a date and timestamp. This informationis available to the customer to answer inquiries made by stateauthorities relating to an infraction of a rule or law. Any desiredinformation relating to the transaction can be saved in the database. Inone example, no information is saved other than that created by thetimestamp procedure, and that information is erased from the database ifnot used within the time period specified by state or federal law or thestate alcoholic beverage commission for its statute of limitations forinfractions (in one example, six months) after it is saved. This featureof the invention has numerous applications. For example, a customer canuse the stored information to help reduce liability in the event thatthe customer is accused of some infraction of the law relating to thesale or alcohol or tobacco (i.e., the invention can be used to verifyperformance of age-compliance checks). In another example, a customermay be able to use the fact that the information is archived to reducethe cost of liability insurance (“Dram Shop” insurance). In anotherexample, the timestamped information that is stored can becross-referenced with timestamped video surveillance records in case thecustomer or law enforcement officials later need to determine whoactually presented a particular ID.

Another optional feature of the invention relates to sponsorship of IDverification devices. Sponsors who desire to be associated with theeffort to curb underage drinking and smoking can be invited tocontribute to help defray the customer's device cost and to providepromotional documentation to potential customers. Sponsors can becredited individually (e.g., on the web site, etc.) for theirparticipation in the effort to combat underage drinking and smoking. Inaddition, sponsors will be able to use their participation in theprogram for advertising as well as promotional activities.

The present invention may be implemented in numerous way, but followingis one example of implementation of the invention using a registrationprocess. A registration process may be included on the serviceprovider's web site. Following is an example of an exemplaryregistration process that may be provided. To register, a customer canprovide the customer's assigned license number, credit card informationfor billing purposes, and a signed Certificate of Permitted Use of thedata (where access to data in the database is restricted by law forapproved users or purposes). The customer can print out, sign and faxback the Certificate of Permitted Use found on the website or request aCertificate be faxed or mailed to customer from the service provider. Ineither case, the customer registration will not be complete, and thecustomer will be denied access to the data, until the signed Certificatereaches the service provider. The customer may be charged a one-timesetup fee and an annual license fee. Thereafter, the customer may becharged a monthly amount for usage based upon volume.

Following is another example of the use of the present invention. In theexample, a central site is established which contains email and databaseservers. The central site is located in a secure facility, with adequatepower and server redundancy. In fact, the secure facility may besufficient to meet FBI and/or INTERPOL requirements for a secure,encrypted environment. A customer registers for the service and obtainsfrom the service provider, or another source, a card reading device (forexample, a Kyocera 6035 mobile phone, a Motorola i88s, or aRIM/Blackberry, etc.) which will read, transmit and receive back the IDinformation. When a patron enters the customer's establishment (bar,restaurant, convenience store, grocery store, etc.), and theestablishment checks that person's ID, the drivers license or ID numberis entered into the device. In this example, the card reading device isalready loaded with the customer's permit number for the customer'slocation. The permit number and the read license number are transmittedto the central site email server over a wireless telephone network (forexample, a cellular network) using a Short Messaging System (SMS)message. The central site email server is continually polled forincoming messages. When received, the received message is parsed fordata. The license or ID number in the message is then matched to thedatabase. If a match is not found, an appropriate rejection message issent back to the sending device. If a match is found, a reply is sent tothe sending device, including, for example, license number, name, birthdate, calculated age, and if available and authorized by law, thecardholder's physical characteristics, including race, height, weight,hair color and eye color, and/or arrest warrant information. Aftertransmission, the database archive is updated with permit number (toidentify customer's establishment), drivers license or ID number, dateand time of the ID check, and all other desired data transmitted tocustomer's sending device. If required by law, archived data will bederived from the service provider's database, except perhaps thecustomer's Permit Number, which will be recorded from the data sent bythe sending device.

This age-verification and anti-fraud tool of the present invention isavailable for use by all establishments which have a need to verify apatron's age or the validity of a drivers license or ID offered by thepatron as identification.

In another example, the card reading device can include a fingerprintreader for reading the ID presenter's fingerprint. If an ID stores afingerprint, the scanned fingerprint can be compared to the fingerprinton the ID. Similarly, if the service provider sends back fingerprintinformation, the device can compare the fingerprint stored in thedatabase with the scanned fingerprint to ensure that the ID presenter isthe person identified on the ID. In one example, a person presents an IDcard with his/her fingerprint (or other biometric) template stored onthe card. A device attached to the card reader or a separate device isused to verify the card template to the live fingerprint/biometric. If amatch is positive, the device is then used to verify remote databaseinformation, and retrieve personal information or a photograph orinformation about what the person is allowed to do, i.e., load baggageinto an airplane cargo hold.

The present invention may be used for various applications in additionto what has been described above. For example, law enforcement officerscould use the invention to get drivers license information without beingin a squad car, or having to tell an operator the ID number over theradio, and INS officers could use the device at border crossings tocheck the validity of INS ID's issued to legal aliens who cross andrecross the border. In another example, movie theaters could use thepresent invention to verify whether someone is old enough to see arestricted move. Similarly, universities and colleges can use theinvention to verify student IDs. Also, private entities, such aswarehouse clubs, could use the invention to verify memberships, using aprivate database.

In another example, Homeland Security could verify the validity of aUnited States visa or visitor's card, etc. and determine the expirationdate and/or compare the expiration date of a visa or permit to theexpiration date of a valid US driver's license issued in the same name.The device could also compare the visa holder's permanent address withthe address presented on the driver's license.

The device can be used to uniquely identify each magnetic stripe cardusing, for example, a technology such as Magneprint, developed byMAGTEK. This property of every magnetic stripe card servers as a uniqueidentifier for each card. The Magneprint is sent to the card issuer sothat the card can be validated as the authentic original card. Followingthis verification, the device can then access the relevant database inthe manner described above.

As mentioned, the present invention can be used for numerousapplications. In addition to the examples mentioned above, the presentinvention can be used by airport security personnel, law enforcementofficials, private clubs, schools, etc.

In the preceding detailed description, the invention is described withreference to specific exemplary embodiments thereof. Variousmodifications and changes may be made thereto without departing from thebroader spirit and scope of the invention as set forth in the claims.The specification and drawings are, accordingly, to be regarded in anillustrative rather than a restrictive sense.

What is claimed is:
 1. A method implemented on a processor, comprising:receiving, from a mobile device, biometric information associated withan identification document; receiving biometric information relating toa user of the mobile device; determining whether there is a matchbetween the biometric information associated with the identificationdocument and the biometric information relating to the user of themobile device, including determining that there is not a match betweenthe biometric information associated with the identification documentand the biometric information relating to the user of the mobile device,and wherein generating at least an indication of the match between thebiometric information associated with the identification document andthe biometric information relating to the user of the mobile devicefurther comprises presenting at least one of a notification or an alertbased on determining that there is not a match between the biometricinformation associated with the identification document and thebiometric information relating to the user of the mobile device; andgenerating at least an indication of the match between the biometricinformation associated with the identification document and thebiometric information relating to the user of the mobile device.
 2. Themethod of claim 1, wherein the biometric information associated with theidentification document comprises face image data.
 3. The method ofclaim 1, wherein the biometric information relating to the user of themobile device comprises face image data.
 4. The method of claim 1,wherein determining whether there is a match between the biometricinformation associated with the identification document and thebiometric information relating to the user of the mobile devicecomprises comparing identification document face image data to faceimage data from the user of the mobile device.
 5. The method of claim 1,wherein the identification document comprises at least one personalidentification document.
 6. The method of claim 5, wherein the at leastone personal identification document comprises at least one of adriver's license or an identification card presented as proof ofidentification or age.
 7. The method of claim 1, wherein the biometricinformation relating to the user of the mobile device is generated bythe mobile device and received by a server.
 8. The method of claim 1,wherein the biometric information relating to the user of the mobiledevice is generated by the mobile device and received by anidentification application operating on the mobile device.
 9. Anon-transitory computer-readable medium carrying one or more sequencesof instructions, wherein execution of the one or more sequences ofinstructions by one or more processors causes the one or more processorsto perform a method, comprising: receiving, from a mobile device,biometric information associated with an identification document;receiving biometric information relating to a user of the mobile device;determining whether there is a match between the biometric informationassociated with the identification document and the biometricinformation relating to the user of the mobile device, includingdetermining that there is not a match between the biometric informationassociated with the identification document and the biometricinformation relating to the user of the mobile device, and whereingenerating at least an indication of the match between the biometricinformation associated with the identification document and thebiometric information relating to the user of the mobile device furthercomprises presenting at least one of a notification or an alert based ondetermining that there is not a match between the biometric informationassociated with the identification document and the biometricinformation relating to the user of the mobile device; and generating atleast an indication of the match between the biometric informationassociated with the identification document and the biometricinformation relating to the user of the mobile device.
 10. Thenon-transitory computer-readable medium of claim 9, wherein thebiometric information associated with the identification documentcomprises face image data.
 11. The non-transitory computer-readablemedium of claim 9, wherein the biometric information relating to theuser of the mobile device comprises face image data.
 12. Thenon-transitory computer-readable medium of claim 9, wherein determiningwhether there is a match between the biometric information associatedwith the identification document and the biometric information relatingto the user of the mobile device comprises comparing identificationdocument face image data to face image data from the user of the mobiledevice.
 13. The non-transitory computer-readable medium of claim 9,wherein the identification document comprises at least one personalidentification document.
 14. The non-transitory computer-readable mediumof claim 13, wherein the at least one personal identification documentcomprises at least one of a driver's license or an identification cardpresented as proof of identification or age.
 15. The non-transitorycomputer-readable medium of claim 9, wherein the biometric informationrelating to the user of the mobile device is generated by the mobiledevice and received by a server.
 16. The non-transitorycomputer-readable medium of claim 9, wherein the biometric informationrelating to the user of the mobile device is generated by the mobiledevice and received by an identification application operating on themobile device.