Identification Verification Using a Device with Embedded Radio-Frequency Identification Functionality

ABSTRACT

A method for identification (ID) verification using a device with embedded radio-frequency identification (RFID) functionality is disclosed. The method comprises capturing, by a camera associated with a client device, an image of an ID document having an embedded RFID chip. The image is transmitted to a server for optical character recognition to extract and recognize printed data associated with the ID document. The client device can receive the printed data from the server and use the printed data to unlock the RFID chip by an RFID reader. Digital data associated with the ID document can be retrieved from the RFID chip and compared to the printed data. If the digital data and the printed data match, the ID document is verified. Otherwise, the ID document is rejected.

CROSS-REFERENCE TO RELATED APPLICATIONS

The present utility patent application is a continuation of and claimspriority benefit of U.S. patent application Ser. No. 14/722,058, filedon May 26, 2015, which is related to and claims priority benefit of U.S.provisional application No. 62/004,101, filed on May 28, 2014 under 35U.S.C. 119(e). The contents of these applications are incorporatedherein by reference for all purposes to the extent that such subjectmatter is not inconsistent herewith or limiting hereof.

TECHNICAL FIELD

The present disclosure relates generally to data processing and, morespecifically, to identification (ID) verification using a device withembedded radio-frequency identification (RFID) functionality.

BACKGROUND

Use of RFID systems to transfer data has opened new possibilities incomputing and business. One such possibility is the use of RFID chips inbiometric documents. A biometric document is a combined paper andelectronic document (for example, a biometric passport) that containsbiometric information and can be used to authenticate the identity ofits holder. The RFID chip can be embedded in the front or back cover orcenter page of the biometric document. RFID enabled systems can readinformation from documents with embedded RFID chips using contactlesstechnology. The use of RFID enabled ID documents can preventfalsification of ID documents as well as tampering, fraud, and othercrimes using false documents.

SUMMARY

This summary is provided to introduce a selection of concepts in asimplified form that are further described below in the DetailedDescription. This summary is not intended to identify key features oressential features of the claimed subject matter, nor is it intended tobe used as an aid in determining the scope of the claimed subjectmatter.

Provided are methods and systems for ID document verification. Ingeneral, the disclosed methods and systems are related to dataprocessing and scanning RFID chips to retrieve data and verify an IDdocument. In the present disclosure, a system is provided that assists auser in verifying authenticity of the ID document. Additionally, thedisclosed methods and systems can facilitate entering data related to IDdocuments.

According to one example embodiment of the disclosure, a system for IDdocument verification is provided. The system includes a processorassociated with a client device and an RFID reader (or a near-fieldcommunication (NFC) reader). The RFID reader may be embedded in a clientdevice or can be an external device communicating with the client devicevia a headphone port or wirelessly (e.g. Bluetooth). The processor maybe configured to receive an image of an ID document. The ID document mayinclude an embedded RFID chip storing digital data associated with theID document. The processor may further be configured to transmit theimage to a server to retrieve printed data associated with the IDdocument and receive the printed data from the server. Using the printeddata, the RFID reader may unlock the RFID chip and retrieve the digitaldata from the RFID chip. The digital data can be transmitted to theprocessor. The processor may analyze the digital data and, based on theanalysis, provide a verification result for the ID document.Furthermore, the processor may generate a key to activate the embeddedRFID chip.

Other example embodiments of the disclosure and aspects will becomeapparent from the following description taken in conjunction with thefollowing drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

Embodiments are illustrated by way of example and not limitation in thefigures of the accompanying drawings.

FIG. 1 illustrates an environment within which systems and methods forID document verification are implemented.

FIG. 2 is a block diagram showing a system for ID document verification.

FIG. 3 is a process flow diagram showing a method for ID documentverification.

FIG. 4 illustrates accessing digital data related to an ID document.

FIG. 5 illustrates a diagrammatic representation of a computing devicefor a machine in the exemplary electronic form of a computer system,within which a set of instructions for causing the machine to performany one or more of the methodologies discussed herein can be executed.

DETAILED DESCRIPTION

The following detailed description includes references to theaccompanying drawings, which form a part of the detailed description.The drawings show illustrations in accordance with exemplaryembodiments. These exemplary embodiments, which are also referred toherein as “examples,” are described in enough detail to enable thoseskilled in the art to practice the present subject matter. Theembodiments can be combined, other embodiments can be utilized, orstructural, logical, and electrical changes can be made withoutdeparting from the scope of what is claimed. The following detaileddescription is, therefore, not to be taken in a limiting sense, and thescope is defined by the appended claims and their equivalents.

Identity verification is important in enabling and securing financialoperations, hiring processes, health care, professional services, and soforth. However, ID documents can be tampered with and falsified forfraudulent purposes. To provide an additional protective measure, anRFID chip can be embedded in the ID document. Digital data stored on theRFID chip can duplicate data printed on the ID document. The digitaldata can be authenticated via Public Key Infrastructure, which makesforgery difficult and expensive. However, conventional digitalverification using RFID chip requires special purpose readers.

A system for ID document verification is provided. The system for IDdocument verification can allow verification of ID documentation havingan embedded RFID chip. An image of the ID document can be captured usinga camera associated with a client device. The client device can transmitthe ID document image to a server for processing for retrieval ofprinted data represented by the ID document (e.g., holder's name, age,fingerprints, document number, and expiration date). The retrieved datamay be sent back to the client device and further to a server. Thesystem for ID document verification residing on the client device mayuse the retrieved data as a key to unlock the RFID chip and accessdigital data stored in the RFID chip. The digital data may betransmitted to the server, where the system for ID document verificationcompares the printed and digital data to determine whether the printedand digital data are identical. Additionally, the system for ID documentverification may perform a facial recognition using the printed anddigital data. Based on the comparison and/or recognition, similaritiesbetween the printed and digital data may be ascertained. Suchverification can establish whether printed data in the ID document wasaltered and whether the ID document is authentic.

In some embodiments, the system for ID document verification can alsoallow for personal information extraction from a physical ID document.

FIG. 1 illustrates an environment 100 within which the systems andmethods for ID document verification can be implemented, in accordanceto some embodiments. A system 200 for ID document verification mayinclude a server-based distributed application, which may include acentral component residing on a server 150 and one or more clientapplications residing on a client device 120 and communicating with thecentral component via a network 110. A user may communicate with thesystem 200 via a client application available through the client device120. In other embodiments, the system 200 may be a cloud-basedapplication with the central component residing on the server 150 andaccessible via a web browser on the client device 120.

The network 110 may include the Internet or any other network capable ofcommunicating data between devices. Suitable networks may include orinterface with any one or more of, for instance, a local intranet, aPersonal Area Network, a Local Area Network (LAN), a Wide Area Network(WAN), a Metropolitan Area Network (MAN), a Virtual Private Network(VPN), a storage area network, a frame relay connection, an AdvancedIntelligent Network connection, a synchronous optical networkconnection, a digital T1, T3, E1 or E3 line, Digital Data Serviceconnection, Digital Subscriber Line connection, an Ethernet connection,an Integrated Services Digital Network (ISDN) line, a dial-up port suchas a V.90, V.34 or V.34b is analog modem connection, a cable modem, anAsynchronous Transfer Mode connection, or an Fiber Distributed DataInterface or Copper Distributed Data Interface connection. Furthermore,communications may also include links to any of a variety of wirelessnetworks, including Wireless Application Protocol, General Packet RadioService, Global System for Mobile Communication, Code Division MultipleAccess or Time Division Multiple Access, cellular phone networks, GlobalPositioning System (GPS), cellular digital packet data, Research inMotion, Limited duplex paging network, Bluetooth radio, or an IEEE802.11-based radio frequency network. The network 110 can furtherinclude or interface with any one or more of an RS-232 serialconnection, an IEEE-1394 (Firewire) connection, a Fiber Channelconnection, an infrared port, a Small Computer Systems Interfaceconnection, a Universal Serial Bus (USB) connection or other wired orwireless, digital or analog interface or connection, mesh, or Digi®networking. The network 110 may include a network of data processingnodes that are interconnected for the purpose of data communication. Thenetwork may include a Software-defined Networking (SDN). The SDN mayinclude one or more of the above network types. Generally, the network110 may include a number of similar or dissimilar devices connectedtogether by a transport medium enabling communication between thedevices by using a predefined protocol. Those skilled in the art willrecognize that the present disclosure may be practiced within a varietyof network configuration environments and on a variety of computingdevices.

An ID document 140 can include a document having an embedded RFID chip(for example, a biometric passport, digital passport, government issuedID, drivers' license, and so forth).

To verify the ID document 140, a user can cause the system 200 capturean image 130 of the ID document 140 by using a camera associated withthe client device 120 (smart phone, a notebook, a personal computer(PC), a tablet PC, or the like). An image 130 associated with the IDdocument 140 may be transmitted to the server 150 either via a mobileapplication, a stand-alone web application, or via a fully integratedservice (XML, i-frame). The image 130 may be captured by a cameraassociated with the client device 120, e.g. a phone camera, a tablet PCcamera, and so forth. The server 150 may receive and analyze the image130 to recognize printed data associated with the ID document 140 (forexample, issue date, holder's name, age, gender, holder's fingerprint,and so forth). Printed data can be recognized by optical characterrecognition (OCR).

The results of the printed data analysis can be transmitted back to theclient device 120. The client device 120 may scan the RFID chip embeddedin the ID document 140 using an RFID reader (or an NFC reader). The RFIDreader can be a part of the client device 120 or it can be detachablyattached to the client device 120 via one of the ports. Alternatively,the RFID reader can be a stand-alone device and the client device 120can communicate with it wirelessly (for example, via Bluetooth).

The retrieved printed data can be used as a key to access the digitaldata on the RFID chip of the ID document 140. By matching the digitaland printed data, the system 200 for ID document verification mayconfirm authenticity of the ID document 140.

FIG. 2 shows a detailed block diagram of the system 200 for ID documentverification, in accordance with an example embodiment. The system 200may include a processor 210, an RFID reader 220, and an optionaldatabase 230. The processor 210 may be configured to receive an imageassociated with an ID document. The image may be captured by the cameraassociated with the client device. The processor 210 may transmit theimage to a remote server. The server processes the image using OCR todetect various zones on the image containing data associated with the IDdocument and a holder of the ID document and extract printed data fromthe image. The processor 210 may be further configured to receive theextracted printed data from the server. The RFID reader 220 may use theprinted data as a key to access the RFID chip of the ID document. Insuch a way, the RFID reader 220 may retrieve digital data from the RFIDchip. The processor 210 may analyze the digital data and match thedigital and printed data to check if they are identical. Alternatively,a server may perform the analysis. The server may further perform facialrecognition based on photos from the digital data (e.g., RFIDpassphoto), from the printed data (e.g., passphoto ID), and/or a photoof the user captured by the client device. If the digital and printeddata proves identical, the ID document may be verified. If the digitaland printed data differ or are absent or nonstandard, the ID documentmay be refused.

An optional database 230 may be configured to store printed data anddigital data as well as verification results.

The processor 210 may comprise, or may be in communication with, media(for example, computer-readable media) that stores instructions that,when executed by the processor 210, cause the processor 210 to performthe elements described herein. Furthermore, the processor 210 mayoperate any operating system capable of supporting locally executedapplications, client-server based applications, and/or browser orbrowser-enabled applications.

FIG. 3 is a process flow diagram showing a method 300 for ID documentverification within the environment described with reference to FIG. 1.The method 300 may commence with receiving an image of an ID documentthat has an embedded RFID chip at operation 310. The ID document mayinclude a government issued ID, a student ID, an employment ID, adriver's license, a passport, a travel document, and so forth. Thereceived image may include a picture, a scan, and so forth. The imagemay be captured by a camera associated with the user (for example, astandalone camera; a camera of a user device, such as a smart phone, aPC, a tablet PC; and so forth).

The method 300 may proceed with transmitting the image to a server forprocessing at operation 320. The processing can include opticalcharacter recognition to obtain printed data. The printed data mayinclude holder's name, date of birth, gender, fingerprint, documentnumber, and so forth. The printed data obtained as a result ofprocessing may be received from the server at operation 330 and used tounlock the RFID chip at operation 340. After unlocking the RFID chip(for example, using any recognized text as a key to access the RFIDchip), digital data (or biometric data) stored in the RFID chip may beretrieved at operation 350.

At operation 360, the digital data may be analyzed to check theauthenticity of the ID document. The digital data in general duplicatesthe printed data. By comparing the digital data from the RFID chip andthe recognized printed data, the system for ID document verification canensure that printed data was not altered and the ID document is notforged. Based on the analysis, the system may determine that the digitaldata and printed data are identical and verify the ID document.Alternatively, according to the analysis, the system may determine oneor more evidences of forgery (for example, a difference of the printeddata and the digital data, an absence of the digital data, nonstandarddigital data, and so forth). On the determining the one or moreevidences of forgery, the system may reject the ID document. Averification result may be provided at operation 370.

In some embodiments, data of the verified ID document may be used toautomatically populate an electronic form, fields associated with a webresource, and so forth. Thus, filling in forms, may be facilitated andaccelerated. Moreover, automatic filling in of electronic forms orblanks allows avoiding mistakes and misprints pertaining to manualentry.

FIG. 4 illustrates accessing digital data 400 in a RFID chip associatedwith the ID document, in accordance with some embodiments. A user maycapture an image 406 of an ID document 402 using a camera embedded in orconnected to a client device 404. The image 406 may be automaticallytransmitted to a server 408. The image 406 received by the server 408may be subjected to OCR. Printed information in the image 406 may beanalyzed to extract textual and/or other relevant data associated withthe ID document 402 and the holder of the ID document 402 (e.g.,holder's date of birth, first name, last name, and the like). Theresults of the analysis 410 can be transmitted back to the client device404.

The client device 404 can scan an RFID chip 416 in the ID document 402using an RFID reader 418 (or an NFC reader). The RFID reader 418 can beeither embedded in the client device 404 or detachably attached to theclient device 404 via a port of the client device 404. The digital data414 in the RFID chip 416 may be encrypted, so the retrieved printed datacan be used as a key to access the digital data 414.

The digital data 414 and printed data can be compared on the clientdevice 404 to verify ID document identity. Additionally, the digitaldata 414 can be used to fill-in forms, employment forms, medicalrecords, and so forth.

FIG. 5 shows a diagrammatic representation of a computing device for amachine in the exemplary electronic form of a computer system 500,within which a set of instructions for causing the machine to performany one or more of the methodologies discussed herein can be executed.In various exemplary embodiments, the machine operates as a standalonedevice or can be connected (e.g., networked) to other machines. In anetworked deployment, the machine can operate in the capacity of aserver or a client machine in a server-client network environment, or asa peer machine in a peer-to-peer (or distributed) network environment.The machine can be a PC, a tablet PC, a set-top box, a cellulartelephone, a digital camera, a portable music player (e.g., a portablehard drive audio device, such as an Moving Picture Experts Group AudioLayer 3 player), a web appliance, a network router, a switch, a bridge,or any machine capable of executing a set of instructions (sequential orotherwise) that specify actions to be taken by that machine. Further,while only a single machine is illustrated, the term “machine” shallalso be taken to include any collection of machines that individually orjointly execute a set (or multiple sets) of instructions to perform anyone or more of the methodologies discussed herein.

The example computer system 500 includes a processor or multipleprocessors 502, a hard disk drive 504, a main memory 506, and a staticmemory 508, which communicate with each other via a bus 510. Thecomputer system 500 may also include a network interface device 512. Thehard disk drive 504 may include a computer-readable medium 520, whichstores one or more sets of instructions 522 embodying or utilized by anyone or more of the methodologies or functions described herein. Theinstructions 522 can also reside, completely or at least partially,within the main memory 506, the static memory 508, and/or within theprocessors 502 during execution thereof by the computer system 500. Themain memory 506 and the processors 502 also constitute machine-readablemedia.

While the computer-readable medium 520 is shown in an exemplaryembodiment to be a single medium, the term “computer-readable medium”should be taken to include a single medium or multiple media (e.g., acentralized or distributed database, and/or associated caches andservers) that store the one or more sets of instructions. The term“computer-readable medium” shall also be taken to include any mediumthat is capable of storing, encoding, or carrying a set of instructionsfor execution by the machine and that causes the machine to perform anyone or more of the methodologies of the present application, or that iscapable of storing, encoding, or carrying data structures utilized by orassociated with such a set of instructions. The term “computer-readablemedium” shall accordingly be taken to include, but not be limited to,solid-state memories, optical and magnetic media. Such media can alsoinclude, without limitation, hard disks, floppy disks, NAND or NOR flashmemory, digital video disks (DVDs), Random Access Memory (RAM),Read-Only Memory (ROM), and the like.

The exemplary embodiments described herein can be implemented in anoperating environment comprising computer-executable instructions (e.g.,software) installed on a computer, in hardware, or in a combination ofsoftware and hardware. The computer-executable instructions can bewritten in a computer programming language or can be embodied infirmware logic. If written in a programming language conforming to arecognized standard, such instructions can be executed on a variety ofhardware platforms and for interfaces to a variety of operating systems.

In some embodiments, the computer system 500 may be implemented as acloud-based computing environment, such as a virtual machine operatingwithin a computing cloud. In other embodiments, the computer system 500may itself include a cloud-based computing environment, where thefunctionalities of the computer system 500 are executed in a distributedfashion. Thus, the computer system 500, when configured as a computingcloud, may include pluralities of computing devices in various forms, aswill be described in greater detail below.

In general, a cloud-based computing environment is a resource thattypically combines the computational power of a large grouping ofprocessors (such as within web servers) and/or that combines the storagecapacity of a large grouping of computer memories or storage devices.Systems that provide cloud-based resources may be utilized exclusivelyby their owners, or such systems may be accessible to outside users whodeploy applications within the computing infrastructure to obtain thebenefit of large computational or storage resources.

The cloud may be formed, for example, by a network of web servers thatcomprise a plurality of computing devices, such as a client device, witheach server (or at least a plurality thereof) providing processor and/orstorage resources. These servers may manage workloads provided bymultiple users (e.g., cloud resource customers or other users).Typically, each user places workload demands upon the cloud that vary inreal-time, sometimes dramatically. The nature and extent of thesevariations typically depends on the type of business associated with theuser.

It is noteworthy that any hardware platform suitable for performing theprocessing described herein is suitable for use with the technology. Theterms “computer-readable storage medium” and “computer-readable storagemedia” as used herein refer to any medium or media that participate inproviding instructions to a central processing unit (CPU) for execution.Such media can take many forms, including, but not limited to,non-volatile media, volatile media and transmission media. Non-volatilemedia include, for example, optical or magnetic disks, such as a fixeddisk. Volatile media include dynamic memory, such as system RAM.Transmission media include coaxial cables, copper wire, and fiberoptics, among others, including the wires that comprise one embodimentof a bus. Transmission media can also take the form of acoustic or lightwaves, such as those generated during radio frequency (RF) and infrared(IR) data communications. Common forms of computer-readable mediainclude, for example, a floppy disk, a flexible disk, a hard disk,magnetic tape, any other magnetic medium, a CD-ROM disk, DVD, any otheroptical medium, any other physical medium with patterns of marks orholes, a RAM, a Programmable Read-Only Memory (PROM), an ErasableProgrammable Read-Only Memory (EPROM), an Electrically ErasableProgrammable Read-Only Memory (EEPROM), a FlashEPROM, any other memorychip or data exchange adapter, a carrier wave, or any other medium fromwhich a computer can read.

Various forms of computer-readable media may be involved in carrying oneor more sequences of one or more instructions to a CPU for execution. Abus carries the data to system RAM, from which a CPU retrieves andexecutes the instructions. The instructions received by system RAM canoptionally be stored on a fixed disk either before or after execution bya CPU.

Computer program code for carrying out operations for aspects of thepresent technology may be written in any combination of one or moreprogramming languages, including an object oriented programming languagesuch as Java, Smalltalk, C++ or the like and conventional proceduralprogramming languages, such as the “C” programming language or similarprogramming languages. The program code may execute entirely on theuser's computer, partly on the user's computer, as a stand-alonesoftware package, partly on the user's computer and partly on a remotecomputer or entirely on the remote computer or server. In the latterscenario, the remote computer may be connected to the user's computerthrough any type of network, including a LAN or a WAN, or the connectionmay be made to an external computer (for example, through the Internetusing an Internet Service Provider).

The corresponding structures, materials, acts, and equivalents of allmeans or steps plus function elements in the claims below are intendedto include any structure, material, or act for performing the functionin combination with other claimed elements as specifically claimed. Thedescription of the present technology has been presented for purposes ofillustration and description, but is not intended to be exhaustive orlimited to the disclosure. Many modifications and variations will beapparent to those of ordinary skill in the art without departing fromthe scope and spirit of the disclosure. Exemplary embodiments werechosen and described in order to best explain the principles of thepresent technology and its practical application, and to enable othersof ordinary skill in the art to understand the disclosure for variousembodiments with various modifications as are suited to the particularuse contemplated.

Aspects of the present technology are described above with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems), and computer program products according to embodiments of thedisclosure. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer program instructions. These computer program instructions maybe provided to a processor of a general purpose computer, specialpurpose computer, or other programmable data processing apparatus toproduce a machine, such that the instructions, which execute via theprocessor of the computer or other programmable data processingapparatus, create means for implementing the functions/acts specified inthe flowchart and/or block diagram block or blocks.

These computer program instructions may also be stored in a computerreadable medium that can direct a computer, other programmable dataprocessing apparatus, or other devices to function in a particularmanner, such that the instructions stored in the computer readablemedium produce an article of manufacture including instructions whichimplement the function/act specified in the flowchart and/or blockdiagram block or blocks.

Thus, computer-implemented methods and systems for identificationdocument verification are described. Although embodiments have beendescribed with reference to specific exemplary embodiments, it will beevident that various modifications and changes can be made to theseexemplary embodiments without departing from the broader spirit andscope of the present application. Accordingly, the specification anddrawings are to be regarded in an illustrative rather than a restrictivesense.

What is claimed is:
 1. A computer-implemented method for identification(ID) verification using a device with embedded radio-frequencyidentification (RFID) functionality, the method comprising: receiving,by a client device, an image of an ID document, wherein the ID documentincludes an RFID chip storing digital data associated with the IDdocument, the RFID chip being embedded in the ID document; transmitting,by the client device, the image to a server to retrieve printed dataassociated with the ID document; receiving, from the server, the printeddata; unlocking, by an RFID reader, the RFID chip using the printeddata; retrieving, by the RFID reader, the digital data from the RFIDchip; sending, by the client device, the digital data retrieved from theRFID chip to the server; comparing, by the server, the digital data fromthe RFID chip of the ID document with the printed data associated withthe ID document; based on the comparing, determining, by the server,that the digital data and the printed data are identical; and based onthe determining, verifying, by the server, the ID document.
 2. Themethod of claim 1 further comprising capturing, by a camera associatedwith the client device, the image of the ID document.
 3. The method ofclaim 1 further comprising scanning, by an external device associatedwith the client device, the ID document to obtain the image of the IDdocument.
 4. The method of claim 1, wherein the retrieving of theprinted data includes recognizing the printed data by optical characterrecognition.
 5. The method of claim 1, wherein the retrieving of theprinted data includes detecting at least one zone on the image, whereinthe at least one zone contains the printed data associated with the IDdocument of a holder, and extracting the printed data from the image. 6.The method of claim 1, wherein the retrieving the digital data from theRFID chip includes decrypting the digital data using the printed data asa key.
 7. The method of claim 1, wherein the printed data includes aname of a holder, a date of birth of the holder, a gender of the holder,a fingerprint of the holder, a number of the ID document, and anexpiration date of the ID document.
 8. The method of claim 1, whereinthe digital data from the RFID chip duplicates the printed dataretrieved from the server.
 9. The method of claim 1, further comprising,based on the comparing, providing, by the server, a verification resultfor the ID document.
 10. The method of claim 9, further comprising,transmitting, by the server, the verification result to the clientdevice.
 11. The method of claim 9, further comprising, based on theverification result, automatically populating, by the client device, afill-in form with the digital data retrieved from the RFID chip.
 12. Asystem for identification (ID) document verification, the systemcomprising: a processor associated with a client device and configuredto: receive an image of an ID document, wherein the ID document includesa radio-frequency identification (RFID) chip storing digital dataassociated with the ID document, the RFID chip being embedded in the IDdocument; transmit the image to a server to retrieve printed dataassociated with the ID document; receive the printed data from theserver; send the digital data retrieved from the RFID chip to theserver, the server configured to: compare the digital data from the RFIDchip of the ID document with the printed data associated with the IDdocument; based on the comparing, determining that the digital data andthe printed data are identical; and based on the determining, verifyingthe ID document.
 13. The system of claim 12, further comprising a cameraconfigured to capture the image of the ID document, wherein the camerais connected to the client device or is a standalone camera.
 14. Thesystem of claim 12, wherein a RFID reader is a part of the clientdevice, detachably attached to the client device via a port of theclient device or communicating with the client device wirelessly. 15.The system of claim 12, wherein the client device includes at least oneof the following: a smart phone, a laptop, a tablet personal computer,and a personal computer.
 16. The system of claim 12, wherein the IDdocument includes at least one of the following: a biometric passport, adigital passport, a government issued ID document, a student IDdocument, an employment ID document, a travel document, and a driver'slicense.
 17. The system of claim 12, wherein the printed data includesat least one of the following: a name of a holder, a date of birth ofthe holder, a gender of the holder, a fingerprint of the holder, anumber of the ID document, and an expiration date of the ID document.18. The system of claim 12, wherein the server is further configured toprovide, based on the comparing, a verification result for the IDdocument.
 19. The system of claim 18, further comprising a database incommunication with the processor and configured to store at least theprinted data, the digital data, and the verification result.
 20. Asystem for identification (ID) document verification, the systemcomprising: a camera configured to capture an image of an ID document,wherein the camera is connected to a client device; a processorassociated with the client device and configured to: receive the imageof the ID document, wherein the ID document includes a radio-frequencyidentification (RFID) chip storing digital data associated with the IDdocument, the RFID chip being embedded in the ID document; transmit theimage to a server; send the digital data retrieved from the RFID chip tothe server, the server configured to: compare the digital data from theRFID chip of the ID document with printed data associated with the IDdocument; and based on the comparing, provide a verification result forthe ID document.