Systems and methods for imaging identification information

ABSTRACT

The various embodiments described herein include methods, devices, and systems for imaging identification information. In one aspect, a method is performed at a client device having a camera and a display. The method includes: (1) obtaining information regarding a type of a document to be imaged; (2) obtaining a video stream of the document; (3) determining whether the video stream of the document meets one or more imaging criteria; (4) determining whether the document in the video stream has a document type that matches the obtained type; (5) if the imaging criteria are not satisfied or the credential document does not have a matching credential document type, presenting an indication that the document is not ready to be imaged; and (6) if the imaging criteria are satisfied and the document has a matching credential document type, presenting an indication that the document is ready to be imaged.

RELATED APPLICATIONS

This application relates to and claims priority to U.S. ProvisionalPatent Application No. 62/111,444, filed on Feb. 3, 2015, and titled“Systems and Methods for Imaging Identification Information,” which ishereby incorporated herein by reference in its entirety.

FIELD OF THE INVENTION

The disclosed subject matter relates generally to the field ofidentification and/or payment systems and methods, and more particularlyto imaging identification information.

BACKGROUND

User identification and payment verification are important fortransactions between consumers and merchants and service providers.Traditionally, merchants and service providers have implemented manyprocedures during in-store transactions to prevent identity and/orpayment fraud. For example, when a consumer pays for his/her shoppingwith a credit/debit card, sales personnel can request the consumer topresent signed photo identification. Sales personnel can then verifywhether or not the consumer is the authorized user of the tenderedcredit/debit card through one or more of the following procedures: (1)comparing the photograph on the photo identification with the consumer'sactual appearance; (2) comparing the name on the photo identificationwith the name on the credit/debit card; and (3) comparing the signatureon the photo identification with the signature on the credit/debit cardsale receipt. Additionally, sales personnel can visually inspect thephoto identification and the credit/debit card to assess whether or notthe documents are authentic.

The proliferation of online transactions presents significant challengesto merchants and service providers in terms of preventing fraud. Becausemerchants and service providers do not meet consumers in person duringonline transactions, many fraud-prevention procedures implemented duringin-store transactions are no longer practical for online transactions.In one case, merchants and service providers may ask consumers totransmit copies of their credential documents through facsimile, email,or other online communication methods. However, this alternative maydiscourage potential consumers due to its time-consuming nature and theprivacy concerns of transmitting sensitive documents. In another case,merchants and service providers may ask consumers to complete an onlineorder form, which typically requires, among other items, the name on acredit/debit card, the billing address, the card number, and the card'sexpiration date. This alternative, however, does not allow merchants orservice providers to crosscheck a consumer's payment credentialdocuments against the consumer's identification credential documents. Asillustrated by the previous two alternatives, during onlinetransactions, merchants and service providers must often make a tradeoffbetween transactional security and consumer convenience.

It has been proposed to allow users to scan identification credentialdocuments for use in on-line transactions. Problems occur when scanningsuch identification credential documents. Sometimes, for instance, auser does not capture all of the identification credential document orthe document is unreadable for some reason.

Therefore, there is a need in the art to overcome one or more of thedeficiencies set forth above.

SUMMARY

In accordance with the disclosed subject matter, systems and methods aredescribed for obtaining and using identification information.

One embodiment of the invention is a method of acquiring an image of auser's credential document through a user device. The method comprisescapturing information from a user interface regarding a particular typeof credential document to be imaged, receiving a video stream of theuser's credential document from a camera of the user device, displayingthe video stream on a display of the user device, and determiningwhether a set of criteria for capturing the image of the user'scredential document is satisfied. The criteria can include (1) the videostream including a complete surface of the user's credential document,(2) the video stream indicating that the user's credential document iswithin a threshold distance of the user device, (3) the video streamindicating that the user's credential document is in focus, and (4) thevideo stream of the user's credential document being recognized to matchthe particular type of credential document to be imaged from thecaptured information. If the criteria are not satisfied, the methodpresents a first indication on the user device that the user'scredential document is not ready to be imaged. If the criteria aresatisfied, the method presents a second indication on the user devicethat the user's credential document is ready to be imaged and capturesan image of the user's credential document.

Another embodiment of the invention is a non-transitory computerreadable medium that is configured to execute computer readableinstructions to cause a computer to perform the steps set forth above.

These and other capabilities of embodiments of the disclosed subjectmatter will be more fully understood after a review of the followingfigures, detailed description, and claims.

These together with the other objects of the disclosed subject matter,along with the various features of novelty which characterize thedisclosed subject matter, are pointed out with particularity in theclaims annexed to and forming a part of this disclosure. For a betterunderstanding of the disclosed subject matter, its operating advantagesand the specific objects attained by its uses, reference should be madeto the accompanying drawings and descriptive matter in which there areillustrated preferred embodiments of the disclosed subject matter.

BRIEF DESCRIPTION OF THE DRAWINGS

The disclosed subject matter is illustrated in the figures of theaccompanying drawings which are meant to be exemplary and not limiting,in which like references are intended to refer to like or correspondingpart, and in which:

FIG. 1 illustrates a block diagram of the system according to oneembodiment of the invention.

FIG. 2 illustrates a block diagram of the identification credentialagent 120 of the embodiment of FIG. 1.

FIG. 3 illustrates a flow chart according to one embodiment of theinvention.

FIG. 4 illustrates a block diagram of a user device according to theembodiment of FIG. 1.

FIG. 5 illustrates a user interface screen for use in capturinginformation regarding a particular type of user credential document.

FIG. 6 illustrates a second user interface screen for use in capturinginformation regarding a particular type of user credential document.

FIG. 7 illustrates a third user interface screen for use in capturinginformation regarding a particular type of user credential document.

FIGS. 8-9 illustrate embodiments in which a user's credential documentis not ready to be imaged.

FIGS. 10-11 illustrate embodiments in which a user's credential documentis ready to be imaged.

FIG. 12 illustrates an embodiment of the successful capture of a user'scredential document according to one embodiment of the invention.

FIG. 13 illustrates a display of information extracted from a user'scredential document according to one embodiment of the invention.

DETAILED DESCRIPTION

In the following description, numerous specific details are set forthregarding the systems and methods of the disclosed subject matter andthe environment in which such systems and methods may operate, in orderto provide a thorough understanding of the disclosed subject matter. Itwill be apparent to one skilled in the art, however, that the disclosedsubject matter may be practiced without such specific details, and thatcertain features, which are well known in the art, are not described indetail in order to avoid complication of the disclosed subject matter.In addition, it will be understood that the embodiments described beloware only examples, and that it is contemplated that there are othersystems and methods that are within the scope of the disclosed subjectmatter. Numerous changes in the details of implementation of thedisclosed subject matter can be made without departing from the spiritand scope of the disclosed subject matter. Features of the disclosedembodiments can be combined and rearranged in various ways.

The disclosed systems and methods enable a user to scanidentification/payment documents such as passports, driver's licenses,other identification cards, credit cards, or debit cards (collectivelyreferred to as user credential documents) by using a camera. Thecaptured information can be further processed and validated by aclient-server system. The disclosed methods and systems make it easierto capture an image of a user's credential document (or some other typeof document) so that it will be sufficient for optical characterrecognition (OCR) and other procedures used to capture information fromthe image. In addition, as discussed below largely in connection withFIG. 1, the imaged user credential document can be used as part of anidentification credential verification system.

FIG. 1 illustrates an exemplary client-server identification systemenvironment 100 in accordance with an embodiment of the disclosedsubject matter. The system environment 100 can include one or more userdevices 110 (also called client devices), an identification credentialserver 140, a storage medium 150 associated with the server 140, anauthentication authority 160, a third party 170, a cloud storage 180,and a third party token provider (TPTP) 190, which can all be coupled,directly or indirectly, to a network 130 via wired and/or wirelessconnection.

Each user device 110 can communicate with the identification credentialserver 140 to send data to, and receive data from, the identificationcredential server 140, e.g., across the network 130. Each user device110 can be directly coupled to the identification credential server 140;alternatively, each user device 110 can be connected to theidentification credential server 140 via any other suitable device,communication network, or combination thereof. For example, each userdevice 110 can be coupled to the identification credential server 140via one or more routers, switches, access points, and/or communicationnetwork (as described below in connection with the network 130). Eachuser device 110 can be in the form of, for example, a desktop computer,a mobile computer, a tablet computer, a cellular device, a smartphone,or any computing systems that are capable of performing computation.

Each user device 110 can include a camera 115, an identificationcredential agent 120, and a display device 125. The camera 115 cancapture an image of an identification document of a user. The camera 115can be embedded inside the client device 110 as a hardware component ora combination of both a hardware component and a software module.Alternatively, the camera 115 can be separate from but coupled to theuser device 110. The user device 110 can optionally process the capturedimage and then send the relevant information to the identificationcredential server 140 for further processing and validation. Forinstance, in some embodiments, the user device 110 can perform OCR onthe captured image of a credential document. As an example, the camera115 can be a camera in an embodiment in which the user device 110 is asmartphone. As another example, the camera 115 can be a web-camera in anembodiment in which the user device 110 is a desktop computer.

The identification credential agent 120 of the user device 110 can helpsupport a service of obtaining and using identification credentials. Theidentification credential agent 120 can be embedded inside the userdevice 110 as a software module, a hardware component, or a combinationof both. Alternatively, the identification credential agent 120 can beseparate from but coupled to the user device 110. The user device 110can communicate with the identification credential server 140 directlyor via its identification credential agent 120. The structures,functions, and features of the identification credential agent 120 aredescribed in detail later in this document.

The display device 125 of the user device 110 can help display thestatus of the camera 115 during the process that the camera 115 capturesan image of an identification document of a user. The display device 125can be embedded inside the user device 110 as a hardware component, or acombination of a hardware component and a software module.Alternatively, the display device 125 can be separate from but coupledto the user device 110. The display device 125 can be any outputdisplay, such as a consumer television, a computer monitor, a projector,or a display screen of any digital device. As an example, the displaydevice 125 can be a display screen in an embodiment in which the userdevice 110 is a smartphone. As another example, the display device 125can be an external monitor in an embodiment in which the user device 110is a desktop computer. The structures, functions, and features of thedisplay device 125 are described in detail later in this document.

The network 130 can include the Internet, a cellular network, atelephone network, a computer network, a packet switching network, aline switching network, a local area network (LAN), a wide area network(WAN), a global area network, or any number of private networkscurrently referred to as an Intranet, and/or any other network orcombination of networks that can accommodate data communication. Suchnetworks may be implemented with any number of hardware and softwarecomponents, transmission media and network protocols. Although FIG. 1illustrates the network 130 as a single network, the network 130 caninclude multiple interconnected networks listed above.

The identification credential server 140 can include an internal storagemedium and can also be coupled to an external storage medium (e.g., thestorage medium 150), which can be configured to store data for theidentification credential server 140. Any user device 110 can also storedata in, and access data from, the storage medium 150 via theidentification credential server 140. Although FIG. 1 shows theidentification credential server 140 and the storage medium 150 asseparate components, the identification credential server 140 and thestorage medium 150 can be combined together. In addition, although FIG.1 shows the identification credential server 140 as a single server, theidentification credential server 140 can include more than one physicaland/or logical servers. Moreover, although FIG. 1 shows the storagemedium 150 as a single storage medium, the storage medium 150 caninclude more than one physical and/or logical storage medium. Thestorage medium 150 can be located in the same physical location as theidentification credential server 140, at a remote location, or any othersuitable location or combination of locations. Each identificationcredential server 140 can be in the form of, for example, a desktopcomputer, a mobile computer, a tablet computer, a cellular device, asmartphone, or any computing systems that are capable of performingcomputation.

The authentication authority 160 can provide authentication service tothe user device 110, the identification credential server 140, or othercomponents of the system environment 100. The authentication authority160 can be operated by, controlled by, or associated with the sameentity that operates, controls, or is associated with the identificationcredential server 140; alternatively, the authentication authority 160can be operated by, controlled by, or associated with a differententity, which may or may not be related. Although FIG. 1 shows theauthentication authority 160 as a single server, the authenticationauthority 160 can include more than one physical and/or logical server.

The third party 170 can provide other relevant services to the userdevice 110, the identification credential server 140, or othercomponents of the system environment 100. The third party 170 can be anonline merchant or retailer from which users of the system environment100 can purchase products. For example, the third party 170 can be aretailer e-commerce web service (e.g., BestBuy.com, etc.) which may needto verify a user's identification credentials (e.g., name and address).The third party 170 can also be a service provider that can provide aservice to users of the system environment 100. For example, the thirdparty 170 can be an online entertainment provider (e.g., gamblingserver) which may need to verify a user's identification credentials(e.g., age and nationality) for the opening of an account. The thirdparty 170 can also be a service provider such as a bank, which may needto verify a user's identification credentials (e.g., age, currentaddress, and nationality) for the opening of an account. The third party170 can be operated by, controlled by, or associated with the sameentity that operates, controls, or is associated with the identificationcredential server 140 and/or the authentication authority 160;alternatively, the third party 170 can be operated by, controlled by, orassociated with a different entity, which may or may not be related.Although FIG. 1 shows the third party 170 as a single server, the thirdparty 170 can include more than one physical and/or logical server. Inaddition, although FIG. 1 shows only a single third party 170, numerousthird parties can be used within the scope of the invention.

The cloud storage 180 can store data from the storage medium 150 withthe same restrictions, security measures, authentication measures,policies, and other features associated with the storage medium 150.FIG. 1 shows the cloud storage 180 separate from the network 130;however, the cloud storage 180 can be part of the network 130 or anothernetwork. The identification credential server 140 can use only thestorage medium 150, only the cloud storage 180, or both. While FIG. 1shows only one cloud storage 180, more than one cloud storage or anysuitable combination thereof can be used.

The third party token provider (TPTP) 190 can provide tokens for theidentification system environment 100. The TPTP 190 can be operated by,controlled by, or associated with the same entity that operates,controls, or is associated with the identification credential server140, the authentication authority 160, and/or the third party 170;alternatively, the TPTP 190 can be operated by, controlled by, orassociated with a different entity, which may or may not be related.Although FIG. 1 shows the TPTP 190 as a single server, the TPTP 190 caninclude more than one physical and/or logical server. In addition,although FIG. 1 shows only one TPTP 190, numerous TPTP's can be usedwithin the scope of the invention.

One or more user devices (e.g., 110 in FIG. 1) can participate in aclient-server identification system environment (e.g., 100 in FIG. 1). Auser device 110 can include an identification credential agent (e.g.,120 in FIG. 1). An exemplary identification credential agent 120according to certain embodiments of the disclosed subject matter isillustrated in FIG. 2. The identification credential agent 120 caninclude a user interface 210, a host interface 220, an identificationcredential extractor 230, and a communication module 250. Anidentification credential agent 120 can have some or all of thesecomponents.

In use, the embodiment of FIG. 1 can be used to capture a user'scredential document information and transmit it through the network 130to the identification credential server 140, which can maintain lists ofidentification credential information associated with various users. Theidentification credential server 140 can thereafter be used to verifythe identity of a particular user through use of credential informationobtained through the user device 110 by imaging of a credential documentfor the user. Payment information (such as credit or debit cardinformation) can also be captured through the user device 110 and storedin the identification credential server 140 for use in transactions. Themaintenance of the user's identification information in theidentification credential server 140 can be useful for use in verifyingthe identification of the user in a variety of transactions.

FIG. 3 illustrates an exemplary operation 300 of obtainingidentification/payment credentials of a user through imaging of acredential document, according to certain embodiments of the disclosedsubject matter. The operation 300 can be modified by, for example,rearranging, changing, adding, or removing certain of the steps. FIG. 3illustrates, for example, a set of steps that can be performed by theuser device 110, the modules of the user device 110, or other modules ofthe client-server identification system environment 100. In onepreferred embodiment, these steps are performed by the user device 110.

At step 310, the user device 110 decides whether or not to capture auser's identification/payment credential information using the camera115 of FIG. 1. The decision can be based on one or more of a variety ofcriteria. For example, if a user of the client device 110 is performinga transaction, an application may require scanning of the user'scredential information. In this example, the application can trigger thesteps set forth herein. In other embodiments, a user can select anapplication for scanning or imaging of the user's identificationcredentials in order to trigger these steps.

If, at step 310, the user device 110 decides not to capture the user'sidentification/payment credential information, the operation 300 iscompleted, as represented by step 320. At step 320, the user interface210 may additionally display a message indicating that the operation 300is completed because no user's identification/payment credential needsto be captured. If, at step 310, the user device 110 decides to capturethe user's identification/payment credential, the operation 300 proceedsto step 330. In FIG. 3, each box immediately below a box above itrepresents a step that takes place if the step above that boxsuccessfully takes place.

At step 330, in some embodiments, the user device 110 prompts the userto select a type of credentials to be captured by the camera 115. Thecredentials can be identification credentials such as passports,driver's licenses, or other identification cards. The credentials canalso be payment credentials such as credit cards or debit cards. Theuser may be prompted to select a credential type from one of thefollowing options: (a) a passport; (b) a driver's license; (c) anidentification card; (d) a country's visa; (e) a credit card; or (f) adebit card. One or more of these options can be changed and/or removed.Additionally, more options can be added. In some embodiments, the userdevice 110 may prompt the user for additional information. As anexample, if the user selects “passport,” he/she may be prompted tochoose or enter a country that corresponds to the passport, such asUnited States, Canada, Austria, or Germany. As another example, if theuser selects “driver's license,” he/she may be prompted to choose orenter a both a country and a state or province that corresponds to thedriver's license, such as California, Massachusetts, or Ontario. Inaddition, the order of these selections can be changed, so that a userfirst enters a country and/or state or province for the document, andthen the credential type (i.e., passport, license, identification card,etc . . . ). As yet another example, if the user selects “credit card,”he/she may be prompted to choose or enter the type of credit card (suchas Visa or MasterCard) or a financial institution that issued the creditcard (such as U.S. Bank or Bank of America). In some embodiments, theuser device 110 may prompt the user to enter or select for additionalinformation.

FIGS. 5-7 illustrate three user interface screens for use in capturinginformation regarding a particular type of user credential document.FIG. 5, for example, prompts the user to select the issuing country of adocument to be verified. FIG. 6, in turn, prompts the user to select thetype of document the user wishes to scan. FIG. 7 then asks the userwhether the user wants to scan the front or the back of the documentchosen from FIGS. 5-6. In other embodiments, the user interface screensof FIGS. 5-7 can be presented in different orders. After the user makesa selection for each such screen, this information is saved within theuser device for later use.

Referring again to FIG. 3, at step 335, the user presents the credentialhe/she selected in front of the camera 115 of the user device 110, andthe camera 115 starts to receive a video stream of the credentialdocument. The user interface 210 can display the received video streamon a display screen of the user device 110. The user interface 210additionally renders a layer overlaying the displayed video stream. Insome embodiments, the layer is translucent and is in a first color. Insome embodiments, the layer is transparent and is surrounded by a framewith the first color. As an example, the first color can be red, whichindicates that the image is not yet ready to be captured.

Next, the user device 110 determines whether or not the video streamcaptured by the camera 115 includes a proper image of the credentialdocument. In one embodiment, the criteria can include whether: (1) thevideo stream includes a complete surface of the user's credentialdocument, (2) the video stream indicates that the user's credentialdocument is within a threshold distance of the user device, (3) thevideo stream indicates that the user's credential document is in focus,and (4) the video stream of the user's credential document is recognizedto match the particular type of credential document to be imaged fromthe captured information. In other embodiments, additional criteria canbe used, or fewer criteria can be used. In some embodiments, an analysisof the video stream of the credential document obtained using the camera115 can be used for the determination regarding whether each criterionis met.

Referring again to FIG. 3, at step 340, the user device determineswhether a complete surface of the credential document appears. Thepurpose of this step is to ensure that the entire credential documentwill be imaged if the image is captured with the camera 115. If, at step340, the user device 110 determines that the video stream does notinclude a complete image of the credential document, a first indicationis presented to the user at step 410. This first indication indicates tothe user that the image is not yet ready to be captured. In oneembodiment, this first indication is an overlay with a first color (suchas red) over the video stream. In some embodiments, the overlay has asimilar aspect ratio as the user's credential document, and theorientation of the overlay is changeable based on the orientation of theuser's credential document presented. As discussed above, in someembodiments, the overlay is translucent with the first color. In someembodiments, the overlay is transparent and is surrounded by a framewith the first color. This first indication can be, for example, a redshading to the overlay to indicate that the credential document is notready to be captured. The user can then adjust the distance between thecredential document and the camera 115. The user can continually adjustthis distance if needed. The user device 110 can continuallyre-determine whether or not the video stream includes the complete imageof the credential document. If, at step 340, the user device 110determines that the video stream includes the complete image of thecredential, the operation proceeds to step 350. As shown in FIG. 3, theflow diagram loops back to step 340 after step 410.

FIGS. 8-9 illustrate embodiments of a screen shot on the display of theuser device 110 in a case in which a user's credential document is notready to be imaged. In these figures, for instance, the credentialdocument is not properly placed in front of the camera 115, and a firstindication 800, 900 is placed on the screen to indicate this to theuser. In this specific case, an overlay that is a certain specifiedcolor (such as red) is displayed to indicate to the user that the imageis not ready to be captured.

At step 350, the user device 110 determines whether or not the distancebetween the credential document and the camera 115 is less than athreshold distance. As an example, the threshold distance can be in therange of 2 inches to 1 yard. The purpose of this determination is toensure that the credential document is large enough in the video streamso that it will be easily legible. The determination can be based on oneor more of pre-determined criteria. Some non-limiting examples of thepre-determined criteria for determining whether the credential documentis within a predetermined distance include: (1) the user device 110identifies all corners of the credential document captured in the videostream; (2) the user device 110 identifies all edges of the credentialdocument captured in the video stream; and (3) the aspect ratio of thecredential document captured in the video stream corresponds to theaspect ratio of the type of the credential document indicated by theuser. One or more of these criteria can be changed and/or removed.Additionally, more criteria can be added. Further, a simple estimationof the distance to the document can be used for this step. If thecredential document is not within the predetermined threshold distance,the first indication is presented to the user at step 410.

At step 360, the user device 110 determines whether the credentialdocument is in focus. This can be important because it may be difficultto OCR the credential document if it is not in focus. In addition, ifthe user does not steadily present the credential document in front ofthe camera, it may be difficult to get it in focus. If the credentialdocument is not in focus, the first indication is presented to the userat step 410.

At step 370, the user device 110 verifies whether or not the credentialdocument presented by the user is the same type as the user indicated atstep 330. The user device 110 may verify the type of the presentedidentification based on certain features or characteristics capturedwith the camera 115, such as a logo, a trademark, or a layout of thedocument. As an example, if the user presented a Massachusetts driver'slicense, and he/she indicated it as a California driver's license, thenstep 370 would not pass because one or more characteristics capturedwith the camera 115 about the Massachusetts driver's license do notconform with a California driver's license, and the first indicationwould be presented to the user at step 410. As another example, if theuser presented a passport, and he/she indicated it as a driver'slicense, then step 370 would not pass because one or morecharacteristics captured with the camera 115 about the passport do notconform with a driver's license, and the first indication would bepresented to the user at step 410. As yet another example, if the userpresented the back side of a credit card, and he/she indicated it as thefront side of a credit card, then step 370 would not pass because one ormore characteristics captured with the camera 115 about the back side ofthe credit card do not conform with the front side of the credit card,and the first indication would be presented to the user at step 410. Insome embodiments, the determination at step 370 can also involvecomparing a photo in the user's identification/payment credentialdocument to the user's actual face captured by the camera 115 of theuser device 110.

At step 380, if each of the criteria above are passed and the user'scredential document is in front of the camera 115 of the user device110, a second indication is presented to the user that indicates thatthe user's credential is ready to be captured. In one embodiment, thissecond indication is an overlay with a second color (such as green) overthe video stream. In some embodiments, the overlay has a similar aspectratio as the user's credential document, and the orientation of theoverlay is changeable based on the orientation of the user's credentialdocument presented. As discussed above, in some embodiments, the overlayis translucent with the second color. In some embodiments, the overlayis transparent and is surrounded by a frame with the second color. Thissecond indication can be, for example, a green shading to the overlay toindicate that the credential document is ready to be captured. The usercan then capture the image.

FIGS. 10-11 illustrate embodiments of a screen shot on the display ofthe user device 110 in a case in which a user's credential document isready to be imaged. In these figures, for instance, the credentialdocument is properly placed in front of the camera 115, and a secondindication 1000, 1010 is placed on the screen to indicate this to theuser. In this specific case, an overlay that is a certain specifiedcolor (such as green) is displayed to indicate to the user that theimage is ready to be captured. After the user activates the camera 115to capture the image, the captured image can be displayed to the user asshown in FIG. 12. In addition, in some embodiments, the user device 110can automatically capture the image when the criteria set forth aboveare satisfied. Further, after capturing the image, the user device 110can optionally perform OCR on the image and extract identificationinformation from it. Further, one or both of the extractedidentification information or the image of the credential documentitself can be transmitted to the identification credential server 140for use as discussed above.

As described above, the method and system of the invention helps toensure that captured user credential information is in a condition thatwill allow it to be easily OCR'd so that it can be used foridentification purposes. In other embodiments, a similar procedure canbe followed for credit or debit card purposes. The steps in FIG. 3 canbe carried out in a variety of orders, not merely in the order set forthin FIG. 3. In addition, steps 340, 350, 360, and 370 can be collectivelyanalyzed and a determination performed on them at essentially the sametime, or they can be analyzed sequentially in any desired order.

In addition to the steps set forth above, additional steps can also beused within the scope of the invention. For instance, the decision aboutwhether or not to capture a photo of the user's face by the camera 115can be based on one or more of pre-determined criteria. Somenon-limiting examples of the pre-determined criteria include whether:(1) the user's identification/payment credential captured by the camera115 does not contain a face image; (2) a photo of the user's face hasbeen previously acquired and validated; or (3) the underlyingtransaction does not additionally require a photo of the user's face.One or more of these criteria can be changed and/or removed.Additionally, more criteria can be added.

As set forth above, the camera 115 can be used to capture a photo of theuser's face. The camera may take additional steps to ensure the photo ofthe user's face satisfies one or more of the following criteria: (1) thephoto of the user's face captured by the camera 115 includes the user'scomplete face; (2) when the camera 115 captures the photo of the user'sface, the distance between the user's face and the camera 115 is withina threshold distance; (3) the photo of the user's face captured by thecamera 115 is in focus; (4) the user's face is of a live person beforethe image of the person's face is taken (to ensure that an image of aphotograph of a person's face is not taken instead of the person'sactual face). One or more of these criteria can be changed and/orremoved. Additionally, more criteria can be added.

In addition, the user device 110 can compare the photo in the user'sidentification/ payment credential document to the user's actual facecaptured by the camera 115. If the photo in the user'sidentification/payment credential document matches the user's actualface captured by the camera 115, this can help in verifying thecredential document. In addition, the user's captured face informationcan be used to determine whether the document type matches the type inthe video display (i.e., step 370 of FIG. 3).

In alternative embodiments, if the user device 110 determines that a setof criteria (e.g., one or more criteria described in steps 340-370) forcapturing the image of the user's credential document are satisfied, theuser device 110 can automatically capture the image of the user'scredential document without presenting the second indication asdescribed in step 380. In such alternative embodiments, the operation300 of FIG. 3 can remain as it is, with the exception of step 380, whichcan be changed from presenting a second image to automatically capturingthe image of the user's credential. In addition, in some embodiments,the first indication can simply be a box or overlay to indicate theproper outline of the identification credential to aid the user inmoving the camera so that the identification credential fits within thebox or overlay so that it can be captured by a photograph. For example,in one such embodiment, the first indication is such a box or overlay,and when each of the four criteria in steps 340-370 are satisfied, theuser device 110 can automatically capture the image of the user'scredential document. This saves the user from having to press a buttonto capture the image. In other such embodiments, less than all four ofthe criteria in steps 340-370 (such as one, two, or three) are requiredto be satisfied for such an automatic capturing of the image. In someembodiments, the box or overlay has a similar aspect ratio as the user'scredential document, and the orientation of the box or overlay ischangeable based on the orientation of the user's credential documentpresented. In some embodiments, the overlay is translucent. In someembodiments, the overlay is transparent and is surrounded by a frame. Insome embodiments, the overlay can also include a sample layout of thecredential document that is to be imaged. For example, if the userindicates that the front side of a credit card is to be imaged, then theoverlay can include a layout with typical content on the front side acredit card, such as a credit card number, an expiration date, and acardholder's name, in order to remind the user to present the properside of the credit card. In some embodiments, if the user device 110needs to capture the user's actual face, the overlay can have an outlineof human's face to aid the user in moving the camera 115 so that theuser's actual face fits within the overlay so that it can be captured bya photograph. Further, after the image is taken, the user device candisplay the captured image on the screen of the device and allow theuser to re-capture the image if desired.

As discussed above, after capturing the image of the user's credentialdocument, the user device 110 can optionally perform OCR on the imageand extract identification information from it. In some embodiments, theuser device 110 can display the extracted information, and the user canconfirm whether or not the extracted information is accurate.

FIG. 13 illustrates a display 1300 of information extracted from auser's credential document according to one embodiment of the invention.In FIG. 13, the user's credential document is a credit card. The display1300 includes the following five components: a credit card type 1310(e.g., Visa, MasterCard, American Express, etc.), a card number 1320, anexpiration date 1330, a cardholder's name 1340, and a confirmation 1350.In some embodiments, one or more of the components can be changed and/orremoved. Further, additional components can be added. For example, oneor more components can be added, removed, or changed if other types ofuser's credential documents are imaged. If the user confirms that theextracted information is accurate, the user can tap or click oncomponent 1350. The extracted identification information and/or theimage of the credential document itself can then be transmitted to theidentification credential server 140. In some embodiments, the extractedidentification information and/or the image of the credential documentitself can be alternatively or additionally saved locally on the userdevice 110.

Identification credential client devices and servers as set forth abovecan be implemented in various computing devices. FIG. 4 illustrates ablock diagram of a computing system that can be used to implement one ormore aspects of the functionality described herein. The computing system500 can host or serve as, for example, client device 110, anidentification credential server 140, or both, in an identificationsystem environment (e.g., 100 in FIG. 1). The computing system 500 caninclude at least one processor 502 and at least one memory 504. Theprocessor 502 can be hardware that is configured to execute computerreadable instructions such as software. The processor 502 can be ageneral processor or be an application specific hardware (e.g., anapplication specific integrated circuit (ASIC), programmable logic array(PLA), field programmable gate array (FPGA), or any other integratedcircuit). The processor 502 can execute computer instructions orcomputer code to perform desired tasks. The code, for instance, canperform the algorithm shown in FIG. 3 or the variants of this algorithmdescribed throughout this specification. The memory 504 can be atransitory or non-transitory computer readable medium, such as flashmemory, a magnetic disk drive, an optical drive, a programmableread-only memory (PROM), a read-only memory (ROM), or any other memoryor combination of memories. The computing system 500 can also include,for example, a user interface 506 and a file system module 508. As setforth in connection with FIG. 1, the system can also include a camera115, an identification credential agent 120, and a display device 125(which can be, for example, a touch screen capacitive sensor displaydevice).

It is to be understood that the disclosed subject matter is not limitedin its application to the details of construction and to thearrangements of the components set forth in the following description orillustrated in the drawings. The disclosed subject matter is capable ofother embodiments and of being practiced and carried out in variousways. In addition, it is to be understood that the phraseology andterminology employed herein are for the purpose of description andshould not be regarded as limiting.

As such, those skilled in the art will appreciate that the conception,upon which this disclosure is based, may readily be utilized as a basisfor the designing of other structures, systems, methods and media forcarrying out the several purposes of the disclosed subject matter. It isimportant, therefore, that the claims be regarded as including suchequivalent constructions insofar as they do not depart from the spiritand scope of the disclosed subject matter.

Although the disclosed subject matter has been described and illustratedin the foregoing exemplary embodiments, it is understood that thepresent disclosure has been made only by way of example, and thatnumerous changes in the details of implementation of the disclosedsubject matter may be made without departing from the spirit and scopeof the disclosed subject matter, which is limited only by the claimswhich follow.

What is claimed is:
 1. A method of acquiring an image of a credentialdocument, comprising: at a client device having a display, a camera, oneor more processors, and memory: obtaining, via a user interface,information regarding a type of the credential document to be imaged;obtaining a video stream of the credential document via the camera;determining whether the video stream of the credential document meetsone or more imaging criteria; determining whether the credentialdocument in the video stream has a credential document type that matchesthe obtained type of the credential document; in accordance with adetermination that the imaging criteria are not satisfied or that thecredential document in the video stream does not have a credentialdocument type that matches the obtained type of the credential document,presenting a first indication that the credential document is not readyto be imaged; and in accordance with a determination that the imagingcriteria are satisfied and that the credential document in the videostream does has a credential document type that matches the obtainedtype of the credential document, presenting a second indication that thecredential document is ready to be imaged.
 2. The method of claim 1,wherein the credential document is one of: an identification card; adriver's license; a passport; a credit card; or a debit card.
 3. Themethod of claim 1, wherein determining whether the credential documentin the video stream has the credential document type that matches theobtained type of the credential document includes determining whetherone or more visual characteristics of the credential document in thevideo stream conform with one or more visual characteristics for theobtained type of the credential document.
 4. The method of claim 1,wherein the user interface comprises a user interface for verifying acredential document, and the method further comprises displaying theuser interface on the display.
 5. The method of claim 1, furthercomprising obtaining, via the user interface, information regarding aside of the credential document to be imaged; and wherein determiningwhether the credential document in the video stream has the credentialdocument type that matches the obtained type of the credential documentincludes determining whether one or more visual characteristics of thecredential document in the video stream conform with the sideinformation.
 6. The method of claim 1, wherein the first indication andthe second indication are displayed as overlays on the video stream. 7.The method of claim 6, wherein the first indication is displayed with atleast one color distinct from colors of the second indication.
 8. Themethod of claim 1, further comprising applying an optical characterrecognition technique to the image to identify information on thecredential document.
 9. The method of claim 1, further comprising:acquiring an image of a user of the client device; and determiningwhether the acquired image matches a photo displayed on the credentialdocument.
 10. A non-transitory computer-readable storage medium storingone or more programs, the one or more programs comprising instructions,which when executed by a client device, cause the client device to:obtain, via a user interface, information regarding a type of thecredential document to be imaged; obtain a video stream of thecredential document via the camera; determine whether the video streamof the credential document meets one or more imaging criteria; determinewhether the credential document in the video stream has a credentialdocument type that matches the obtained type of the credential document;in accordance with a determination that the imaging criteria are notsatisfied or that the credential document in the video stream does nothave a credential document type that matches the obtained type of thecredential document, present a first indication that the credentialdocument is not ready to be imaged; and in accordance with adetermination that the imaging criteria are satisfied and that thecredential document in the video stream does has a credential documenttype that matches the obtained type of the credential document, presenta second indication that the credential document is ready to be imaged.11. The non-transitory computer-readable storage medium of claim 10,wherein determining whether the credential document in the video streamhas the credential document type that matches the obtained type of thecredential document includes determining whether one or more visualcharacteristics of the credential document in the video stream conformwith one or more visual characteristics for the obtained type of thecredential document.
 12. The non-transitory computer-readable storagemedium of claim 10, wherein the user interface comprises a userinterface for verifying a credential document, and the method furthercomprises displaying the user interface on the display.
 13. Thenon-transitory computer-readable storage medium of claim 10, wherein theone or more programs further comprise instructions for obtaining, viathe user interface, information regarding a side of the credentialdocument to be imaged; and wherein determining whether the credentialdocument in the video stream has the credential document type thatmatches the obtained type of the credential document includesdetermining whether one or more visual characteristics of the credentialdocument in the video stream conform with the side information.
 14. Thenon-transitory computer-readable storage medium of claim 10, wherein theone or more programs further comprise instructions for applying anoptical character recognition technique to the image to identifyinformation on the credential document.
 15. The non-transitorycomputer-readable storage medium of claim 10, wherein the one or moreprograms further comprise instructions for: acquiring an image of a userof the client device; and determining whether the acquired image matchesa photo displayed on the credential document.
 16. A client device,comprising: a display; a camera; one or more processors; and memorycoupled to the one or more processors, the memory storing one or moreprograms configured to be executed by the one or more processors, theone or more programs including instructions for: obtaining, via a userinterface, information regarding a type of the credential document to beimaged; obtaining a video stream of the credential document via thecamera; determining whether the video stream of the credential documentmeets one or more imaging criteria; determining whether the credentialdocument in the video stream has a credential document type that matchesthe obtained type of the credential document; in accordance with adetermination that the imaging criteria are not satisfied or that thecredential document in the video stream does not have a credentialdocument type that matches the obtained type of the credential document,presenting a first indication that the credential document is not readyto be imaged; and in accordance with a determination that the imagingcriteria are satisfied and that the credential document in the videostream does has a credential document type that matches the obtainedtype of the credential document, presenting a second indication that thecredential document is ready to be imaged.
 17. The client device ofclaim 16, wherein determining whether the credential document in thevideo stream has the credential document type that matches the obtainedtype of the credential document includes determining whether one or morevisual characteristics of the credential document in the video streamconform with one or more visual characteristics for the obtained type ofthe credential document.
 18. The client device of claim 16, wherein theuser interface comprises a user interface for verifying a credentialdocument, and the method further comprises displaying the user interfaceon the display.
 19. The client device of claim 16, wherein the one ormore programs further comprise instructions for obtaining, via the userinterface, information regarding a side of the credential document to beimaged; and wherein determining whether the credential document in thevideo stream has the credential document type that matches the obtainedtype of the credential document includes determining whether one or morevisual characteristics of the credential document in the video streamconform with the side information.
 20. The client device of claim 16,wherein the one or more programs further comprise instructions for:acquiring an image of a user of the client device; and determiningwhether the acquired image matches a photo displayed on the credentialdocument.