Systems and methods for verification of remotely deposited checks

ABSTRACT

Verification of remotely deposited checks may be conducted in a system or for electronically receiving check images from customers and automatically initiating a deposit of funds associated with such check. Verification may comprise analyzing an image to detecting a presence of signatures, e.g. a payor signature and an endorsement, on a received check image so as to validate a check. Verification may further comprise conducting “face recognition” of a received check image to verify it&#39;s authenticity and/or detecting MICR line indications that a check is no longer valid.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is related by subject matter to U.S. patent application Ser. No. 11/686,930, filed Mar. 15, 2007, and U.S. patent application Ser. No. 11/686,922, filed Mar. 15, 2007.

BACKGROUND

As described in U.S. patent application Ser. No. 11/321,025, checks typically provide a safe and convenient method for an individual to purchase goods and/or services. To use a check, the individual usually must open a checking account, or other similar account, at a financial institution and deposit funds, which are then available for later withdrawal. To pay for goods and/or services with a check, the payor (i.e., the buyer) usually designates a payee (i.e., the seller) and an amount payable on the check. In addition, the payor often signs the check. Once the check has been signed, it is usually deemed negotiable, meaning the check may be validly transferred to the payee upon delivery. By signing and transferring the check to the payee, the payor authorizes funds to be withdrawn from the payor's account at a payor bank on behalf of the payee in return for the goods and/or services provided by the payee.

Checks have certain advantages over other forms of payment, such as cash. For example, while often considered the most liquid type of asset, cash also may be the least secure. Unlike a check, cash is usually freely transferable and does not have to be endorsed. Thus, the owner and possessor of cash is most often the same individual. Because cash is freely transferable, cash that is lost or stolen typically cannot be recovered. Therefore, the risks associated with cash transactions are often unacceptable, particularly with respect to transactions not conducted in person (e.g., by mail) and/or involving large sums of money. A check, on the other hand, provides a payor with more security because the check usually requires a payor to specify both the person and amount to be paid. Furthermore, as noted above, the check is usually not valid until it is properly signed by the payor. These safeguards help to reduce the risk that money will be lost and/or stolen and ensure that the proper payee receives the proper amount of money.

Cash may have other disadvantages as well. For example, because cash is freely transferable, there may be little or no verifiable transaction history. It is often desirable for a payor and/or payee to have physical proof that a particular transaction took place. This typically requires that the payor receive a receipt. However, receipts may contain errors and can be easily misplaced. In contrast, a bank processing a check will ordinarily create a transaction history, which may include the identity of the payee, the amount to be paid, the date of the payment, and the signature of the payor. This enables both a payor and payee to independently verify the accuracy of most transactions involving a payment by check.

While a check may provide a payor with a convenient and secure form of payment, receiving a check may put certain burdens on the payee, such as the time and effort required to deposit the check. For example, depositing a check typically involves going to a local bank branch and physically presenting the check to a bank teller. In addition to the time commitment that may be required, visiting a bank branch may be problematic for the payee if the bank's hours of operation coincide with the payee's normal hours of employment. Thus, the payee may be required to leave work early and/or change work schedules.

A check may pose other burdens for the payee. As noted above, a check may not be freely transferable, thereby limiting the payee's ability to use funds from the check. For example, it is usually difficult to for the payee to purchase goods and/or services using a check issued by the payor. While the check may be endorsed and accepted by a third party, such transactions are often disfavored because the third party may not know the payor and, thus, may not be willing to accept the risk that the payor has insufficient funds to cover the check. Therefore, the payee may not have access to the funds from the check until the payee deposits the check at the bank, the check has cleared and the funds have been credited to the payee's account. The payee may have to wait even longer if the payee chooses to deposit the check by mail.

Systems and methods for remotely depositing checks can advantageously address a variety of the above listed burdens on the payee, and thereby promote the use of checks and the various advantages attached thereto. A variety of high-speed, special purpose check deposit systems for commercial use are available on the market today. Also, as described in U.S. patent application Ser. No. 11/321,025 and U.S. patent application Ser. No. 11/591,014, future systems may emerge allowing individuals to remotely deposit checks using, for example, a customer controlled home telephone or customer controlled general purpose consumer. Such remote deposit systems may prove advantageous for banks and bank customers alike, in part because they are adapted for today's mobile lifestyles experienced by individuals in military, government, and private sector careers, and in part because they successfully leverage electronic communications advances allowing unprecedented automation, speed, and security in deposit transactions.

However, satisfactory systems for verifying check validity in such systems for remote deposit have so far remained out of reach. Sufficient automation is required for efficient processing of hundreds, even thousands or more remotely deposited checks per day as may be received by a large financial institution. Efficiency and speed must be accomplished without sacrificing accuracy, however, and without opening opportunities for fraud. Therefore, there is a need in the industry for automated approaches to verify the validity of remotely deposited checks.

SUMMARY

The described embodiments contemplate a system, method and computer-readable medium with computer-executable instructions for verifying validity of remotely deposited checks in a system for electronically receiving check images from customers, said check images corresponding to at least one payor check, and for automatically initiating a deposit of funds associated with said payor check into a customer account.

In a first embodiment, the novel method may be directed to detecting the presence of signatures on a received check image. Upon electronically receiving an image of a front side of a payor check and/or a back side of said payor check, an electronic analysis may be automatically performed to determine whether a payor signature is present on the front side of said payor check and whether an endorsement signature is present the a back side of said payor check. The electronic analysis my go further by comparing the detected signatures to signature verification files and performing a variety of other operations as disclosed herein.

In another embodiment, the novel method may include a “face recognition” process that may be performed on an image of a deposited check to verify its authenticity. Upon electronically receiving an image of a payor check, at least a portion of said image can be automatically electronically compared to a payor check verification image, or some other data that specifies with sufficient accuracy the desired properties of a valid check from the payor or a class of payors including a payor in question.

In still another embodiment, a check Magnetic Ink Character Recognition (MICR) line may be inspected for indications that a check is no longer valid. Upon electronically receiving an image of a payor check, a MICR line portion of said image can be automatically electronically analyzed to determine if said MICR line comprises at least one predetermined feature, and if so, an appropriate action can be taken such as terminating the deposit transaction and notifying a customer that the check will not be deposited.

Additional advantages and features of the invention are described below.

BRIEF DESCRIPTION OF THE DRAWINGS

The foregoing summary, as well as the following detailed description of preferred embodiments, is better understood when read in conjunction with the appended drawings. For the purposes of illustration, there is shown in the drawings exemplary embodiments; however, the invention is not limited to the specific methods and instrumentalities disclosed. In the drawings:

FIG. 1 illustrates a broad view of a system in which the described embodiments may be employed.

FIG. 2 illustrates a method for facilitating deposit of a check from a customer-controlled general purpose computer.

FIG. 3 illustrates a method for processing a check deposit.

FIG. 4 illustrates a method comprising detecting the presence of signatures on a received check image so as to validate a check.

FIG. 5 illustrates an method comprising conducting “face recognition” of a received check image to verify it's authenticity.

FIG. 6 illustrates an exemplary method comprising detecting MICR line indications that a check is no longer valid

DETAILED DESCRIPTION

Certain specific details are set forth in the following description and figures to provide a thorough understanding of various embodiments of the invention. Certain well-known details often associated with computing and software technology are not set forth in the following disclosure, however, to avoid unnecessarily obscuring the various embodiments of the invention. Further, those of ordinary skill in the relevant art will understand that they can practice other embodiments of the invention without one or more of the details described below. Finally, while various methods are described with reference to steps and sequences in the following disclosure, the description as such is for providing a clear implementation of embodiments of the invention, and the steps and sequences of steps should not be taken as required to practice this invention.

In general, it is contemplated that the various systems, methods, and computer readable media disclosed herein will be implemented within a system for processing remote deposit of checks. Such a system will generally include subsystems for electronically receiving check images from customers, said check images corresponding to at least one payor check, and for automatically initiating a deposit of funds associated with said payor check into a customer account. Such a system may also beneficially automatically initiate a process for clearing the payor check with a payor bank.

FIGS. 1, 2, and 3 are generally directed to a variety of aspects of a system for processing remote deposit of checks as contemplated for use in connection with various embodiments of the invention. FIG. 1 illustrates an exemplary system in which the described embodiments may be employed. System 100 may include account owner 110, e.g., a bank customer who may be located, for example, at the customer's private residence. The account owner 110 may be utilizing a customer-controlled, general purpose computer 111. A general purpose computer 111 is generally a Personal Computer (PC) running one of the well-known WINDOWS® brand operating systems made by MICROSOFT® Corp., or a MACINTOSH® (Mac) brand computer, running any of the APPLE® operating systems. General purpose computers are ubiquitous today and the term should be well understood. A general purpose computer 111 may be in a desktop or laptop configuration, and generally has the ability to run any number of applications that are written for and compatible with the computer's operating system. The term “general purpose computer” specifically excludes specialized equipment as may be purchased by a business or other commercial enterprise, for example, for the specialized purpose of high-speed, high-volume check deposits. A particular advantage of a system as illustrated in FIG. 1 is its ability to operate in conjunction with electronics that today's consumers actually own or can easily acquire, such as a general purpose computer, a scanner, and a digital camera.

General purpose computer 111 may also be “customer-controlled.” A common example of a customer-controlled computer would be a typical computer located in a private residence. The owner of such a computer typically has the power to install programs and configure the computer as they wish, subject to certain security restrictions that may be imposed by the hardware or software manufacturers. A customer-controlled computer need not be located in a private residence, however. For example, computers in college dormitories, in workplace offices, and so forth may also be considered to be “customer-controlled.”

An example of a computer that would not be considered customer-controlled would be an Automatic Teller Machine (ATM) that is typically controlled by a bank or other business. Although a customer may access and utilize an ATM machine, the ATM machine is not customer-controlled because the allowed uses of the ATM machine are highly restricted. Relevant factors in determining whether a machine is customer controlled are thus the scope of operations that a customer may perform using the machine, and extent to which the customer can reconfigure the machine in some way by adding software and/or hardware components. In general, any customer ability to add software and/or hardware components is adequate to qualify a computer as customer-controlled.

One of the applications that may run on a general purpose computer 111 in connection with the invention is a browser. Common browsers in use today are, for example, the popular INTERNET EXPLORER® line of browsers made by MICROSOFT® Corp., the FIREFOX® browsers distributed via the MOZILLA® open source project, and the NETSCAPE NAVIGATOR® browsers also distributed via the MOZILLA® open source project. Browsers generally allow users to point to a Uniform Resource Locator (URL), and thereby retrieve information such as a web page. For example, a browser application on computer 111 could retrieve a web page that is kept at server 131, and display the web page to the account owner 110, as is generally known and appreciated in the industry and by the general public.

Another application, or set of applications, that may run on a general purpose computer 111 in connection with the invention comprises “virtual machine” technologies such as the JAVA® virtual machine software distributed by SUN MICROSYSTEMS® Corp, and .NET® Framework distributed by MICROSOFT® Corp. In general, such applications facilitate execution of computer programs in a variety of computing environments. For example, a JAVA® applet is a computer program (which may be alternatively referred to herein as a “software component”) that can execute on any computer running the JAVA® virtual machine software. The applet may be provided to virtual machine software in a “source code” format, and may be compiled by a “just in time” compiler, so as to put the applet in a form that can be executed by the hardware associated with the particular computing device. These technologies are known in the art and may be utilized in connection with a system as illustrated in FIG. 1.

An image capture device 112 may be communicatively coupled to the computer 112. Image capture device may be, for example, a scanner or digital camera. Computer 111 may comprise software that allows the user to control certain operations of the image capture device 112 from the computer 111. For example, modern scanner users may be familiar with the TWAIN software often used to control image capture from a computer 111. Similarly, digital cameras often ship along with software that allows users to move images from the camera to a computer 111, and may also provide additional functions, such as photo editing functions crop and rotate.

Financial institutions 130, 140 and 150 may be any type of entity capable of processing a transaction involving a negotiable instrument. For example, financial institutions 130, 140 and 150 may be a retail bank, investment bank, investment company, regional branch of the Federal Reserve, clearinghouse bank and/or correspondent bank. A negotiable instrument may be described as a contract that obligates one party to pay a specified sum of money to another party. By way of example, and not limitation, negotiable instruments may include a check, draft, bill of exchange, promissory note, and the like.

Financial institution 130 is illustrated as associated with a server 131. Financial institution 130 may maintain and operate server 131 for the purposes of communicating with customers such as 110. Alternatively, such server may be maintained and operated by one or more third party vendors who act under the instructions of the financial institution 130, but possess skills and resources that may be more effective in competent operation of electronics. Such arrangements are well known in the industry and in this case the server 131 is nonetheless considered to be “associated” with the financial institution 130.

Account owner 110 may be an individual who owns account 160, which may be held at financial institution 130. As such, account owner 110 may be described as a customer of financial institution 130. Account 160 may be any type of account for depositing funds, such as a savings account, checking account, brokerage account, and the like. Account owner 110 may communicate with financial institution 130 by way of communication network 120, which may include an intranet, the Internet, a local area network (LAN), a wide area network (WAN), a public switched telephone network (PSTN), a cellular network, a voice over internet protocol (VoIP) network, and the like. Account owner 110 may communicate with financial institution 130 by phone, email, instant messaging, facsimile, and the like.

In one contemplated embodiment, network 120 is a publicly accessible network such as the Internet, which can presently be accessed from many private residences and many public places such as college campuses, airports, coffee shops, and restaurants throughout the United States as well as many other countries of the world. A variety of technologies are available to establish secure connections over such a public network, so that data transmitted between computer 111 and a server 131 associated with the institution 130 remains either inaccessible or indecipherable by third parties that may intercept such data. The invention may make use of any such security technologies.

Financial institutions 130, 140 and 150 may communicate with each other via a network 125. Network 125 may be a publicly accessed network such as 120. Alternatively, network 125 may have certain characteristics that differ from network 120, due to the different requirements of bank-to-bank communications. For example, one might envision certain security features and access restrictions being more important in bank-to-bank communications.

In an embodiment, account owner 110 may wish to deposit a check that is drawn from payor account 170 at financial institution 150. Account owner 110 may deposit the check into customer account 160 by converting the check into electronic data, e.g., an image, and sending the data to financial institution 130. Various embodiments of the invention described herein may be carried out by financial institution 130 electronics such as server 131 upon receipt of a check image from computer 111. However, those of skill in computing and software technologies will appreciate that functionality can be distributed across a variety of devices and therefore some of the method steps, subsystems, and computer readable media associated with the invention may in some embodiments be located outside of the range of what would be considered financial institution 130 electronics, e.g., might be located at computer 111 or elsewhere in the network 120.

Account owner 110 may convert the check into a digital image by scanning the front and/or back of the check using image capture device 112. Account owner 110 may then send the image to financial institution 130. Sending the image may be referred to as “presenting” the check. Upon receipt of the image, financial institution 130 may credit the funds to account 160 in a “soft post” operation. In a soft post operation, the funds appear to be available for use by a customer, and may in fact be available for use, but at the very least some indication is retained to note that the funds have not actually been received from the payor bank. When the funds are received from the payor bank, the “soft post” is converted to a “hard post” and the indication is removed, along with any further restriction on the use of the funds. Financial institution 130 may clear the check by presenting the digital image to an intermediary bank, such as a regional branch of the Federal Reserve, a correspondent bank and/or a clearinghouse bank.

For example, the check may be cleared by presenting the digital image to financial institution 140, which may be a regional branch of the Federal Reserve, along with a request for payment. Financial institution 130 and 150 may have accounts at the regional branch of the Federal Reserve. As will be discussed in greater detail below, financial institution 130 may create a substitute check using the image provided by account owner 110 and present the substitute check to financial institution 140 for further processing. Upon receiving the substitute check, financial institution 140 may identify financial institution 150 as the paying bank (e.g., the bank from which the check is drawn). This may be accomplished using a nine-digit routing number located on the bottom left hand corner of the check. A unique routing number is typically assigned to every financial institution in the United States. Financial institution 140 may present the substitute check to financial institution 150 and request that the check be paid. If financial institution 150 verifies the check (i.e., agrees to honor the check), financial institution 140 may then settle the check by debiting funds from financial institution 150 and crediting funds to financial institution 130. Financial institution 150 may then debit funds from account 170.

It will be appreciated that the preceding examples are for purposes of illustration and explanation only, and that embodiments of the invention are not specifically limited to such examples. For example, financial institution 150 may be a correspondent bank (i.e., engaged in a partnership with financial institution 130). Thus, financial institution 130 may bypass the regional branch of the Federal Reserve and clear the check directly with financial institution 150. In addition, account 160 and account 170 may both be held at financial institution 130, in which case the check may be cleared internally.

FIG. 2 illustrates a method for facilitating deposit of a check from a customer-controlled general purpose computer. The various steps of FIG. 2 may be viewed as performed by a server computer associated with a financial institution, in conjunction with a software component that operates from a customer-controlled general purpose computer. Various of the steps are contemplated as performed by the server, while various other steps are contemplated as performed by the software component.

In the embodiment illustrated in FIG. 2, the darker boxes indicate steps that are performed by the server, for example by delivering information to the user through the user's browser application. Making information available on a server to customers with a browser is considered to be effectively “delivering” such information for the purposes of this document. The lighter boxes inside 211 indicate steps that are performed by the software component, as it executes on the customer computer. Those of skill will recognize that alternative configurations are readily achievable by moving functions from server to software component or vice-versa.

The server may first deliver a software component to the customer-controlled general purpose computer 200. This may be done in response to a customer request for the capability of making deposits from his computer. In one embodiment, the financial institution may provide such capability only to customers that meet predetermined criteria of trustworthiness. For example, it can be required that the customer's accounts are in good standing, that the customer relationship has lasted a predetermined amount of time, that the customer has a predetermined number of financial service products with the financial institution (e.g. bank accounts, mortgages, insurance policies, etc.), that the customer has a predetermined level of assets with the financial institution, and so forth.

The software component may be configured to facilitate the deposit transaction in a variety of ways as illustrated herein. In one embodiment, the software component may be compatible with the JAVA® or .NET® technologies described above. Such configurations allow for widespread dissemination and successful operation in a wide variety of computing environments as may exist on customer-controlled general purpose computers.

Where the software component is written for JAVA®, .NET®, or any other such technology, it is useful in step 200 to first determine whether the customer-controlled general purpose computer has an appropriate virtual machine application installed, e.g. JAVA® Virtual Machine (JVM) or .NET® framework. If the computer does not have the appropriate application installed, such application may be automatically installed, or the customer may be directed to a location from which such application may be downloaded and installed. The software component may then be delivered 200, and should work as intended. The various other steps of FIG. 2 may now take place, or may take place at some subsequent time using the software component as previously downloaded.

After downloading or otherwise accepting the software component, and assuming the customer has an appropriate image capture device, the customer now has the capability to make deposits from his general purpose computer. For example, the customer points his browser to a bank website, where a link may be available that causes the bank server to initiate a deposit transaction 201. The customer may be asked to log in using a user name and password.

The customer may next be instructed to identify an account into which the deposit will be made 202. This can be done, for example, by providing a webpage that lists the available accounts, along with an instruction to select an account. Alternatively, a box may be provided into which the customer may type an account number, along with an appropriate instruction to type the number of the desired account. The account may be any account, and need not necessarily be the customer's own account, although it is contemplated that a large number of customer deposits may be made into the transacting customer's account, and embodiments may find it useful to restrict the allowed accounts to the customer's own accounts. In such embodiments, if the customer has just one account with the financial institution, step 202 may be eliminated because the only available allowed account would be the customer's single account.

The customer may next be instructed to identify an amount of a check or other negotiable instrument he wishes to deposit into the selected account 203. In one embodiment, this can be done similarly to step 202 by providing a webpage with a integer entry box into which the customer may type an amount, along with an appropriate instruction to type the amount of the check. The customer may also be instructed to endorse the check 204.

The customer may next be instructed to provide an image of a front side of a check 205, for example, by using an image capture device. In one embodiment, the customer may be instructed to place the check face down on a flatbed scanner, and may further be instructed as to the location and orientation of the check on the scanner. If the customer is instructed to take a digital photograph of the check using a digital camera, the customer may be instructed as to the position and orientation of the check, lighting, angle of camera, distance and focal length (zoom) of camera, and so forth. The software component may be useful at this point in providing a graphical illustration of just how the customer should provide the image. The customer may further be given instructions as to how to activate the image capture device and/or move the image from the device to the general purpose computer.

In one embodiment, it is contemplated that the software component allows for control of transaction flow and transaction data throughout the various aspects the transaction. For example, the software component may open a folder in a storage location, such as the hard drive of the general-purpose computer, and may work in conjunction with any software that interfaces with the image capture device to deposit the image in such folder. This may advantageously be conducted in a secure manner to prevent any unwanted image diversion or tampering. The hard drive of the general-purpose computer is considered to be a storage location that is controlled by said customer-controlled general purpose computer, but other storage locations such as disk drives, networked drives, and so forth may also be effectively controlled by the general purpose computer.

The software component may itself perform operations such as opening a folder and placing the images therein, or may effectively achieve such operations by instructing the customer and/or other applications to do so. All software operates to some extent under the control and with the support of an operating system and/or virtual machine framework running on the general purpose computer, and such support is of course appropriate in embodiments of the invention.

The software component may next cause the image of the check to be presented to the customer for editing, e.g. by asking the customer to crop and/or rotate the check image to a predetermined orientation 206. In embodiments using a scanner, an image of the entire scanner bed, or some otherwise too large image may be generated. If the check was placed in the top left corner of the scanner bed, the customer may be asked to indicate the bottom right corner of the check image, and the image may be automatically cropped to contain only the check image in the rectangular area between the customer's selected point and the top left corner of the scanner bed, thereby removing a portion of the originally obtained image.

An appropriately edited image of the check may be placed in the storage location 207. If further images are necessary 208, steps 205-207 may be repeated as necessary. For example, the customer may be instructed to endorse and provide an image of the back side of a check. To ensure the check is appropriately voided, the customer may be asked to write “void” on the check and re-scan the front of the check. However, it will be appreciated that a “void” instruction could be easily spoofed, for example by photocopying the check and voiding the photocopy, or by placing a transparent material over the check that bears the void. Therefore, regardless of whether the customer is instructed to re-capture an image of a voided check, there is some possibility of representment, i.e. attempting to rescan and represent the check at a later time. Various techniques for “duplicate detection,” may be used to identify and address such attempts, as described in U.S. Patent Application (client reference US-0159.01/USAA 0187).

A log file may be generated 209 to collect data for processing or troubleshooting the deposit transaction. The log file may be placed in the storage location along with the various images of the check.

Once the desired images are collected and edited, they may be delivered to the server for processing the deposit 210. The log file may also be delivered at this time. Once such files are delivered, they may be deleted from the customer's general purpose computer. If the server determines that the delivered images and any corresponding data are sufficient to go forward with the deposit, the customer's account may be provisionally credited with a soft post, and a confirmation page may be delivered to the customer via the customer's browser application 212. The customer may be instructed to destroy, e.g. by shredding, the actual physical check or other negotiable instrument, however as described above such a requirement is unenforceable and some risk of representment remains which can be addressed as described below. Under the current check handling procedures in the United States, the physical check is not necessary in processing a deposit, nor is it necessary to keep the original check in bank or customer records.

FIG. 3 illustrates a method for processing a check deposit. The method of FIG. 3 is designed to complement that of FIG. 2 and to illustrate exemplary steps that may be carried out by a server or other electronics operated by a financial institution before, during, and after the various steps of FIG. 2 are carried out.

In general, as illustrated in FIG. 3, such server may receive a request for deposit at home capability 300A, and in response to such request may deliver a software component to the requesting customer 300B. As with FIG. 2, intermediate steps may comprise determining if the customer is in fact eligible for a remote deposit program, and ensuring the customer has an appropriate virtual machine environment installed on their general purpose computer—in embodiments where the software component requires such an environment.

A transaction may be initiated 301 upon receiving a customer indication that a deposit transaction is desired. The customer is instructed to identify an account per FIG. 2, and as a result the financial institution electronics receive an account identifier (ID) 302. Similarly, financial institution electronics receive check amount 303. At this juncture the software component at the customer computer handles image capture processes, which may or may not involve the financial institution's server and other electronics in some capacity until such time as check image(s) are received 304.

Upon receipt of check images, they may be analyzed 305 to obtain check identification information. For example, an Optical Character Recognition (OCR) process or Digital Signal Processing (DSP) process may be invoked to determine certain information about the check. Such information may be validated 306 by comparing information so obtained against a variety of other data and/or rules governing permissible (or, conversely, impermissible) aspects of checks identification data. A more in-depth discussion of validation procedures that may be implemented in steps such as 305 and 306 is provided below with reference to FIGS. 4, 5, and 6.

If the check identification data obtained in step 305 cannot be validated in step 306, an error may result 317, and the deposit transaction can be flagged, delayed, or aborted 315. If terminated, an error message can be delivered to the customer 314, explaining the action taken and optionally providing a reason that the transaction for the action. If the transaction is flagged, it will be allowed to proceed through the various other steps and result in a soft post 313 to the customer account. If delayed, the soft post 313 will be made only after further scrutiny of the transaction, or will be avoided entirely. In each of the above scenarios, a notification of action taken may also be sent to the customer, optionally including an explanation for the reason the action was taken and steps for correcting the error.

Representment and kiting detection processes may be carried out to determine whether the check was previously deposited or is suspected to be part of a kiting operation 307. As illustrated in FIG. 3, if a representment or kiting operation is detected in 307, the transaction may be flagged, delayed, or terminated 315.

OCR may further be performed on a check amount location 306, and the amount as determined using OCR may be compared against the customer-entered amount received pursuant to step 303. If the amounts do not match, an error 316 can result, terminating the transaction and delivering appropriate information concerning the error to the customer 314. OCR may further be performed on any other aspects of the check image at this time if it is advantageous in specific embodiments to do so.

The server may further receive and modify a deposit transaction log file 310. Alternative versions of the images received may be generated and placed in the log file. Check 21 regulations require a bi-tonal TIFF formatted image, which is generally a low-quality image format as compared to other available image formats. Therefore, it is desirable in some embodiments to retain both a “good” image in an initial format, e.g., in a JPEG format, as well as the modified bi-tonal TIFF required by Check 21. This way, if any troubleshooting is necessary, a good image of the check remains available.

In some embodiments, a bank stamp may be overlaid on the image of the back of the check 311, just as if the check was physically deposited at a bank. Appropriate images may be forwarded to the payor bank for payment 312, and meanwhile, the customer's account may be provisionally credited in the amount of the check 313. A confirmation can be delivered to the customer 314.

At 312, in one embodiment, the bank may forward an image or images to a payor bank. Provisionally crediting the customer account 513 with a “soft post” and delivering a confirmation to the customer-controlled general purpose computer 514 may be done before, after, or contemporaneously with step 312.

In one embodiment, forwarding an image or images to a payor bank 312 may be performed pursuant to an Automated Clearinghouse (ACH) transaction. ACH transactions typically include payment instructions to debit and/or credit an account. Banks often employ ACH service providers to settle ACH transactions. Examples of ACH service providers include regional branches of the Federal Reserve and the Electronic Payments Network (EPN).

In an ACH transaction, the payee's (customer's) bank may be referred to as the originating depository financial institution (ODFI). Upon receipt of appropriate check information, the payee's bank may credit funds to the payee's account and generate an ACH debit entry to the payor's account, which may be presented to the ACH service provider for processing.

The ACH service provider may process the debit entry by identifying the account and bank from which the check is drawn. The bank from which the check is drawn (i.e., the payor's bank) may be referred to as a receiving depository financial institution (RDFI). If the payor's bank verifies the transaction, the ACH service provider may settle the transaction by debiting the payor's bank and crediting the payee's bank. The payor's bank may then debit the payor's account.

A substitute check is typically a paper reproduction of an original check and may be the legal equivalent of the original check. Substitute checks were authorized under The Check Clearing for the 21st Century Act, commonly known as Check 21. The Act was enacted to facilitate the check clearing process by allowing banks to transmit electronic images of checks (e.g., substitute checks) to other banks rather than physically sending the original paper checks. Check 21 does not require that banks use substitute checks. In fact, many banks may have voluntary agreements to accept certain electronic images of checks even though the images may not qualify as substitute checks under Check 21. If a bank does not have a voluntary agreement and/or refuses to accept an electronic image, the financial institution is required under Check 21 to accept a substitute check in lieu of the original check.

The bank may process the ACH debit entry, substitute check, and/or electronic image. As noted above, the bank may present the ACH debit entry to an ACH service provider (e.g., EPN), which may be responsible for settling the transaction between the payee's bank and the payor's bank. The bank also may convert the digital image into a substitute check and present the substitute check to an intermediary bank (e.g., a regional branch of the Federal Reserve) to complete the check clearing process. If the payor's bank and the payee's bank are the same, the transaction can be handled internally at the payor bank by simply debiting the account of one customer and crediting the account of another. Thus, an intermediate step may comprise identifying if the payor bank and the payee bank are one and the same, or otherwise operating in a closely cooperative manner.

Each of FIGS. 4, 5, and 6 provide exemplary methods for analyzing an validating an image of a remotely deposited check received by financial institution electronics as may be carried out in a system comprising features as disclosed in FIGS. 1, 2, and 3, and in particular as part of steps 305 and 306 in FIG. 3. However, it should be emphasized that while the various aspects of FIGS. 1, 2, and 3 provide useful context for FIGS. 4, 5, and 6, the disclosed aspects of FIGS. 1, 2, and 3 are in no way required to carry out the steps of FIGS. 4, 5, and 6.

Furthermore, while FIGS. 4, 5, and 6 are illustrated and discussed as methods, it will be acknowledged that they also disclose corresponding systems and computer readable media designed to carry out such methods. FIGS. 4, 5, and 6 may be carried out by electronic subsystems within financial institution electronics such as server 131, which may comprise a variety of other electronics such as routers, switches, and modems. The steps of FIGS. 4, 5, and 6 may also be recorded as instructions on computer readable media designed for causing financial institution electronics to carry out the disclosed methods.

FIG. 4 generally contemplates a novel method for detecting the presence of signatures on a received check image. Embodiments may analyze a check for the mere presence of any signature marking, or may go further to compare a detected signature to a signature verification file.

A software component may be electronically sent to a customer controlled general purpose computer 401, said software component configured to facilitate electronically sending an image of a front side of a payor check and/or an image of a back side of said payor check. As described above, said software component is advantageously configured for execution by a virtual machine framework. The software component can manage capture and delivery of check images as discussed above.

An image of a front side of the payor check is thus electronically received 402 by financial institution electronics. An image of a back side of the payor check may also be electronically received 403. Signatures may be present on the front and back sides of a check as is well known. A signature line is typically present on the bottom right of personal checks, and an endorsement location is typically marked off at the top back of personal checks. Of course, other signature locations may be customary in business checks or other negotiable instruments and the invention can be modified as necessary to adapt to appropriate signature locations.

An electronic analysis of the image of a front side of said payor check may be automatically performed 404 to determine whether a payor signature is present. Similarly, if an image of the back of the check is also received, an electronic analysis of the back side may be automatically performed 405 to determine whether an endorsement signature is present.

The electronic analysis performed to determine whether a payor signature is present may comprise determining a presence of any signature marking at a predetermined location on the image of a front side of said payor check. The predetermined location may be, for example, a location in the bottom right corner of a front side of a check typically used as a signature line. Similarly, The electronic analysis performed to determine whether an endorsement is present may comprise determining a presence of any signature marking at a predetermined location on the image of a back side of said payor check. The predetermined location may be, for example, the endorsement area provided on the back side of checks. Such embodiments are possible when many checks generally conform to predetermined size and arrangement specifications. Alternatively, more robustly adaptable embodiments are feasible in which the entirety of a check image may be scanned and any presence of a signature is adaptively discovered.

Alternatively, the electronic analysis performed to determine whether a payor signature is present may comprise comparing, for example, a predetermined portion said image of a front side of said payor check to a payor signature verification image. For example, if the receiving bank has access to a file comprising an image of the payor's signature, such file may be electronically compared to the portion of the check image bearing such signature. Image comparison techniques are generally known in the art and may be set to require various levels of similarity between compared images. As might be expected, one signature often differs from another to some degree, even if both are authentic. Thus, signature matching techniques should be appropriately set to allow for differences. In one embodiment, signature image modification may be performed prior to comparison, so as to more easily identify certain more easily identifiable characteristics of a signature.

In general, the use of a signature verification may entail, in one embodiment, identifying a payor, looking up a payor identifier such as payor name in a database, retrieving a payor signature verification image, and finally comparing said verification image to a payor signature gathered from a predetermined location of a received check image. Similarly, a payee may be identified, the payee signature verification image may be retrieved, and said verification image may be compared to a predetermined location on the received image of the back side of the check.

Similarly, the electronic analysis performed to determine whether an endorsement is present may comprise comparing a predetermined portion said image of a back side of said payor check to an endorsement signature verification image. For example, if the receiving bank has access to a file comprising an image of the customer's signature, such file may be electronically compared to the portion of the check image bearing such signature.

If the payor signature is not present on said image of a front side of said payor check or if said endorsement signature is not present on said image of a back side of said payor check, then a customer may be automatically notified 406. For example, the customer may be automatically notified that said payor check will not be deposited.

If a correctable error is discovered, for example if no endorsement signature is detected, the customer may be automatically instructed correct such error 407. The customer may be automatically instructed to endorse said payor check and to resend said image of a back side of said payor check.

If the payor signature is present on the image of a front side of said payor check and, in embodiments that also check for an endorsement signature, if said endorsement signature is present on said image of a back side of said payor check, then subject to other processing that may occur, the check deposit may be automatically soft posted to a customer account 408.

FIG. 5 generally contemplates a novel method for conducting a “face recognition” on a check to verify it's authenticity. An image of a front side of the payor check is electronically received 501 by financial institution electronics. An image of a back side of the payor check may also be electronically received 502.

At least a portion of said image of a front side of said payor check may be automatically electronically compared to a payor check verification image 503. A payor check verification image may comprise, for example, an image of a previous check drafted by said payor, an image of a signature portion of a previous check drafted by said payor, an image of a name and address portion of a previous check drafted by said payor, and/or an image retrieved from said payor bank.

An electronic analysis of said image of a back side of said payor check may be automatically performed to determine whether an endorsement signature is present on said image of a back side of said payor check 504.

A customer may be automatically notified 505 if the check cannot be validated. For example, a customer may be automatically notified if said at least a portion of said image of a front side of said payor check is not substantially similar to said payor check verification image. In one embodiment, the customer may be notified that the check will not be deposited. In another embodiment, the customer may be given an opportunity to correct any errors that may have been identified.

An amount of said check may be electronically received 506 from said customer, and said image of a front side of said payor check may be automatically electronically analyzed to determine a “second” amount of said check 507. When the amount data received from the customer and the amount as determined by the image analysis are compared, they should match. If they do not match, i.e. if said first amount differs from said second amount, then the customer may be notified of the error 508, for example by automatically notifying a customer that a deposit cannot proceed. The customer may be instructed to correct the error 509, for example by instructing said customer to resend said first amount of said check.

FIG. 6 generally contemplates a novel method for detecting MICR line indications that a check is no longer valid. An image of a front side of the payor check is electronically received 601 by financial institution electronics. An image of a back side of the payor check may also be electronically received 602.

An electronic analysis of a MICR line portion of said image of a front side of said payor check may be automatically performed 603 to determine if said MICR line comprises at least one predetermined feature. Examples of predetermined feature include generally aspects of a MICR line that indicate a check was previously presented to a bank and therefore is likely no longer valid. A predetermined feature may comprise, for example, a number 4 in position 44 on said MICR line. In another embodiment, a predetermined feature may comprise an identification of an amount of said check in said MICR line.

The term “electronic analysis,” as used herein, generally refers to image analysis using Digital Signal Processing (DSP). OCR can be thought of as one form of DSP in which the signals processed are determined to be numbers or letters, and a file is generated with the numerals and/or text that is recognized.

OCR may be performed on the check's MICR line location 305 to determine information such as payor bank routing number, account number, and check number. The bank routing number may then be validated 306 against a list of valid routing numbers to ensure that it corresponds to a legitimate bank, and in some embodiments, to ensure it corresponds to a United States bank. In one embodiment, the OCR is conducted in real time, i.e. prior to confirming the deposit transaction for the customer, so as to validate some initial deposit information immediately, and thereby filter transactions that may result in errors were the OCR to be conducted at some later time. In other embodiments, certain efficiencies may be gained by performing “batch” OCR operations at some later time.

In one embodiment, an OCR process can conveniently be applied to an image of a back side of a check in addition to performing OCR on the image of the front side of said check. One problem that may occur involves customer submission of two front images, instead of one front image and one back image. OCR may be performed on a MICR line location of an alleged image of a back side of said check to confirm that said alleged image of a back side of said check does not bear a MICR line. If no MICR line is present in such location then it is more likely that the alleged image of a back side of said check is in fact the back, and not the front, of the check.

Another advantageous use of OCR is on the endorsement location on the back of a check. By performing OCR, it may be possible in some embodiments to determine that the signature matches that of the payor or drafter of the check. However, often signatures are illegible. Thus in one embodiment it is advantageous to determine that some mark or signature is present in the endorsement location on the back of the check, without conducting any further signature identification procedures.

As with above described embodiments, the electronic analysis may also include determining whether a payor signature is present on said image of a front side of said payor check. Also, an electronic analysis of said image of a back side of said payor check may be automatically performed to determine whether and endorsement signature and/or a return stamp is present. A predetermined portion said image of a front and/or back side of said payor check may be compared to a signature verification image.

If the MICR line comprises said at least one predetermined feature, a customer can be automatically notified of the error, for example in a notification that due to MICR line error, said payor check will not be deposited. Similarly, a customer may be automatically notified that said payor check will not be deposited if said return stamp is present on said image of a back side of said payor check. The presence of a return stamp indicates that a check was already deposited with a bank and therefore is likely no longer valid.

If said MICR line does not comprise said at least one predetermined feature, and subject to any further processing that may occur, the check is verified and a deposit can be automatically soft posted to the customer's account.

The various techniques described herein may be implemented with hardware or software or, where appropriate, with a combination of both. Thus, the methods and apparatus of the disclosed embodiments, or certain aspects or portions thereof, may take the form of program code (i.e., instructions) embodied in tangible media, such as floppy diskettes, CD-ROMs, hard drives, or any other machine-readable storage medium, wherein, when the program code is loaded into and executed by a machine, such as a computer, the machine becomes an apparatus for practicing the disclosed embodiments. In the case of program code execution on programmable computers, the computer will generally include a processor, a storage medium readable by the processor (including volatile and non-volatile memory and/or storage elements), at least one input device and at least one output device. One or more programs are preferably implemented in a high level procedural or object oriented programming language to communicate with a computer system. However, the program(s) can be implemented in assembly or machine language, if desired. In any case, the language may be a compiled or interpreted language, and combined with hardware implementations.

The described methods and apparatus may also be embodied in the form of program code that is transmitted over some transmission medium, such as over electrical wiring or cabling, through fiber optics, or via any other form of transmission, wherein, when the program code is received and loaded into and executed by a machine, such as an EPROM, a gate array, a programmable logic device (PLD), a client computer, a video recorder or the like, the machine becomes an apparatus for practicing the invention. When implemented on a general-purpose processor, the program code combines with the processor to provide a unique apparatus that operates to perform the processing of the disclosed embodiments.

In addition to the specific implementations explicitly set forth herein, other aspects and implementations will be apparent to those skilled in the art from consideration of the specification disclosed herein. It is intended that the specification and illustrated implementations be considered as examples only, with a true scope and spirit of the following claims. 

What is claimed:
 1. A server implemented method for processing a check, comprising: receiving, by a server, a request from a customer-controlled device, the customer-controlled-device including a general purpose image capture device, to initiate a session; transmitting, by the server to the customer-controlled device, software facilitating the session for processing the check; and upon determining, by the server, if a customer meets at least one criteria of trustworthiness based on information included in the request, initiating the session by the server, wherein the server is further configured to facilitate the session by: receiving an image of a first side of the check captured by the general purpose image capture device of the customer-controlled device during the session, wherein the image of the first side includes information identifying a Magnetic Ink Character Recognition (MICR) line portion; analyzing in real time the image of the first side during the session; identifying the MICR line portion based on the analysis during the session; determining whether to process the check for a deposit transaction based on the identified MICR line portion during the session; in response to successfully identifying the MICR line portion, transmitting a notification to the customer-controlled device that the check will be processed for the deposit transaction; and processing the check to complete the deposit transaction.
 2. The server implemented method of claim 1, wherein the image of the first side further includes monetary amount information, and the server further facilitates the session by: identifying the monetary amount information based on the analysis; determining whether to process the check for a deposit transaction based on the identified monetary amount information; and in response to successfully identifying the MICR line portion and the monetary amount information, transmitting the notification to the customer-controlled device that the check will be processed for the deposit transaction.
 3. The server implemented method of claim 1, wherein the server further facilitates the session by: receiving an image of a second side of the check captured by the general purpose image capture device of the customer-controlled device, wherein the image of the second side includes an endorsement.
 4. The server implemented method of claim 3, wherein the server further facilitates the session by: analyzing in real time the image of the second side; identifying the endorsement based on the analysis; comparing the identified endorsement against an endorsement verification image to determine whether the identified endorsement matches the endorsement verification image; and determining whether to process the check for a deposit transaction based on the comparison.
 5. The server implemented method of claim 4, wherein the server further facilitates the session by: in response to determining that the identified endorsement matches the endorsement verification image, transmitting the notification to the customer-controlled device that the check will be processed for the deposit transaction.
 6. The server implemented method of claim 3, wherein the server further facilitates the session by: analyzing in real time the image of the second side; identifying the endorsement based on the analysis; and determining whether to process the check for a deposit transaction based on the identified endorsement.
 7. The server implemented method of claim 6, wherein the server further facilitates the session by: in response to successfully identifying the MICR line portion and the endorsement, transmitting the notification to the customer-controlled device that the check will be processed for the deposit transaction.
 8. The server implemented method of claim 1, wherein the server further facilitates the session by: identifying whether the image of the first side includes an endorsement based on the analysis; determining whether to process the check for a deposit transaction based on the identified endorsement; and in response to successfully identifying the MICR line portion and the endorsement, transmitting the notification to the customer-controlled device that the check will be processed for the deposit transaction.
 9. The method of claim 1, wherein the criteria of trustworthiness comprises at least one of the customer's account standing, the customer's level of assets, the duration of the customer's relationship, or the number of financial service products held by the customer.
 10. A server for processing a check, comprising: a processor; an interface in communication with the processor; and wherein the processor is configured to: receive a request from a customer-controlled device, the customer-controlled device including a general purpose image capture device, to initiate a session for processing a check; transmit, from the server to the customer-controlled device, software facilitating the session for processing the check; receive an image of a first side of the check, wherein the image of the first side includes information identifying a Magnetic Ink Character Recognition (MICR) line portion; and determine whether a customer meets at least one criteria of trustworthiness based on information included in the request from the customer-controlled device, and when the customer meets the at least one criteria, initiate the session by the processor, wherein the processor is further configured to: analyze in real time the image of the first side during the session; identify the MICR line portion based on the analysis during the session; determine whether to process the check for a deposit transaction based on the identified MICR line portion during the session; in response to successfully identifying the MICR line portion, cause the transmission of a notification to the customer-controlled device that the check will be processed for the deposit transaction during the session; and process the check to complete the deposit transaction.
 11. The server of claim 10, wherein the image of the first side further includes monetary amount information, and the processor is further configured to facilitate the session to: identify the monetary amount information based on the analysis; determine whether to process the check for a deposit transaction based on the identified monetary amount information; and in response to successfully identifying the MICR line portion and the monetary amount information, cause the transmission of the notification to the customer-controlled device that the check will be processed for the deposit transaction.
 12. The server of claim 10, wherein the processor is further configured to facilitate the session to: receive an image of a second side of the check captured by the general purpose image capture device of the customer-controlled device, wherein the image of the second side includes an endorsement.
 13. The server of claim 12, wherein the processor is further configured to facilitate the session to: analyze in real time the image of the second side; identify the endorsement based on the analysis; compare the identified endorsement against an endorsement verification image to determine whether the identified endorsement matches the endorsement verification image; and determine whether to process the check for a deposit transaction based on the comparison.
 14. The server of claim 13, wherein the processor is further configured to facilitate the session to: in response to determining that the identified endorsement matches the endorsement verification image, cause a transmission of the notification to the customer-controlled device that the check will be processed for the deposit transaction.
 15. The server of claim 12, wherein the processor is further configured to facilitate the session to: analyze in real time the image of the second side; identify the endorsement based on the analysis; and determine whether to process the check for a deposit transaction based on the identified endorsement.
 16. The server of claim 15, wherein the processor is further configured to facilitate the session to: in response to successfully identifying the MICR line portion and the endorsement, cause the transmission of the notification to the customer-controlled device that the check will be processed for the deposit transaction.
 17. The server of claim 10, wherein the processor is further configured to facilitate the session to: analyze in real time the image of the first side; identify whether the image of the first side includes an endorsement based on the analysis; determine whether to process the check for a deposit transaction based on the identified endorsement; and in response to successfully identifying the MICR line portion and the endorsement, cause the transmission of the notification to the customer-controlled device that the check will be processed for the deposit transaction.
 18. The server of claim 10, wherein the criteria of trustworthiness comprises at least one of the customer's account standing, the customer's level of assets, the duration of the customer's relationship, or the number of financial service products held by the customer.
 19. A non-transitory computer readable medium storing instructions executable by a processor of a server, the processor of the server executing the instructions to: receive a request from a customer-controlled computing device, the customer-controlled device including a general purpose image capture device, to initiate a session; transmit, from the server to the customer-controlled device, software facilitating the session for processing a check; determine whether a customer meets at least one criteria of trustworthiness based on information included in the request, and when the customer meets the at least one criteria, initiate the session by the processor of the server, wherein the processor of the server is further configured to facilitate the session by executing instructions to: receive an image of a first side of the check during the session, wherein the image of the first side includes information identifying a Magnetic Ink Character Recognition (MICR) line portion; analyze in real time the image of the first side during the session; identify the MICR line portion based on the analysis during the session; determine whether to process the check for a deposit transaction based on the identified MICR line portion during the session; in response to successfully identifying the MICR line portion, cause a transmission of a notification to the customer-controlled device that the check will be processed for the deposit transaction during the session; and process the check to complete the deposit transaction.
 20. The non-transitory computer readable medium of claim 19, wherein the image of the first side further includes monetary amount information, and the processor of the server further executing the instructions to facilitate the session to: identify the monetary amount information based on the analysis; determine whether to process the check for a deposit transaction based on the identified monetary amount information; and in response to successfully identifying the MICR line portion and the monetary amount information, cause the transmission of the notification to the customer-controlled device that the check will be processed for the deposit transaction.
 21. The non-transitory computer readable medium of claim 19, the processor of the server further executing the instructions to facilitate the session to: receive an image of a second side of the check captured by the general purpose image capture device of the customer-controlled device, wherein the image of the second side includes an endorsement.
 22. The non-transitory computer readable medium of claim 21, the processor of the server further executing the instructions to facilitate the session to: analyze in real time the image of the second side; identify the endorsement based on the analysis; compare the identified endorsement against an endorsement verification image to determine whether the identified endorsement matches the endorsement verification image; and determine whether to process the check for a deposit transaction based on the comparison.
 23. The non-transitory computer readable medium of claim 22, the processor of the server further executing the instructions to facilitate the session to: in response to determining that the identified endorsement matches the endorsement verification image, cause a transmission of the notification to the customer-controlled device that the check will be processed for the deposit transaction.
 24. The non-transitory computer readable medium of claim 21, the processor of the server further executing the instructions to facilitate the session to: analyze in real time the image of the second side; identify the endorsement based on the analysis; and determine whether to process the check for a deposit transaction based on the identified endorsement.
 25. The non-transitory computer readable medium of claim 24, the processor of the server further executing the instructions to facilitate the session to: in response to successfully identifying the MICR line portion and the endorsement, cause the transmission of the notification to the customer-controlled device that the check will be processed for the deposit transaction.
 26. The non-transitory computer readable medium of claim 19, the processor of the server further executing the instructions to facilitate the session to: analyze in real time the image of the first side; identify whether the image of the first side includes an endorsement based on the analysis; determine whether to process the check for a deposit transaction based on the identified endorsement; and in response to successfully identifying the MICR line portion and the endorsement, cause the transmission of the notification to the customer-controlled device that the check will be processed for the deposit transaction.
 27. The non-transitory computer readable medium of claim 19, wherein the criteria of trustworthiness comprises at least one of the customer's account standing, the customer's level of assets, the duration of the customer's relationship, or the number of financial service products held by the customer. 