Systems and methods for automated identity verification

ABSTRACT

A system and method in accordance with examples may include an identity verification kiosk. The identity verification kiosk may include a display comprising a user interface; a card reader; a document scanner; a printer; and a processor in data communication with a server and a database storing user information. The processor may be configured to receive an identification verification request from the user interface; receive user information via the document scanner or the card reader; retrieve user information from the database; verify the identity of a user; and print a unique identifier on a document using the printer.

FIELD OF THE DISCLOSURE

The present disclosure relates to systems and methods for automatedidentity verification.

BACKGROUND

Notarizing documents include interaction with a notary or a post office.In addition, interaction with an institution is needed to print acashier check. While these transactions are frequently used in manyfields associated with a variety of users, both transactions are oftenseparately processed, involve numerous applications, are susceptible tosecurity concerns such as forgery, and are subject to delay inprocessing.

These and other deficiencies exist. Accordingly, there is a need toprovide users with an appropriate solution that overcomes thesedeficiencies which provides increased security, more efficientprocessing, and enhanced user interaction experience.

SUMMARY OF THE DISCLOSURE

Embodiments of the present disclosure provide an identity verificationkiosk comprising: a display comprising a user interface; a card reader;a document scanner; a printer; and a processor in data communicationwith a server and a database storing user information. The processor maybe configured to receive an identification verification request from theuser interface; receive user information via the document scanner or thecard reader; retrieve user information from the database; verify theidentity of a user; and print a unique identifier on a document usingthe printer.

Embodiments of the present disclosure provide a kiosk for printingguaranteed funds checks comprising: a display presenting a userinterface; a card reader; a document scanner; a printer; and a processorin data communication with a database containing user information anduser account information. The processor may be configured to receive aguaranteed funds check request from the user interface; request userinformation from a user using the user interface; receive userinformation from one or more of the user interface, document scanner, orcard reader; verify the identity of a user; receive user accountinformation from the database; and upon determining the presence ofsufficient funds in a user account, print a guaranteed funds checkcomprising a unique identifier using the printer.

Embodiments of the present disclosure provide a method for recordingconfirmation of a user identity. The method may comprise receiving anidentification verification request from a user; scanning one or moreidentification documents; collecting identification informationassociated with the user; collecting live biometric data associated withthe user; verifying the identity of the user; scanning a document to bewitnessed; and witnessing the document by marking the document with aunique identifier.

BRIEF DESCRIPTION OF THE DRAWINGS

Various embodiments of the present disclosure, together with furtherobjects and advantages, may best be understood by reference to thefollowing description taken in conjunction with the accompanyingdrawings, in the several figures of which like reference numeralsidentify like elements, and in which:

FIG. 1A depicts a system according to an exemplary embodiment.

FIG. 1B depicts a kiosk according to an exemplary embodiment.

FIG. 2 depicts a kiosk configured to print guaranteed funds checksaccording to an exemplary embodiment.

FIG. 3 depicts a method for recording confirmation of a user identityaccording to an exemplary embodiment.

DETAILED DESCRIPTION

The following description of embodiments provides non-limitingrepresentative examples referencing numerals to particularly describefeatures and teachings of different aspects of the invention. Theembodiments described should be recognized as capable of implementationseparately, or in combination, with other embodiments from thedescription of the embodiments. A person of ordinary skill in the artreviewing the description of embodiments should be able to learn andunderstand the different described aspects of the invention. Thedescription of embodiments should facilitate understanding of theinvention to such an extent that other implementations, not specificallycovered but within the knowledge of a person of skill in the art havingread the description of embodiments, would be understood to beconsistent with an application of the invention.

As described herein, systems, such as a kiosk or automated tellermachine may be configured to verify identity of a user through, forexample a driver's license, passport, biometrics. Image recognition maybe performed by the kiosk to ensure that identification documents areindeed authentic. Once the determination is made that the documents arein fact authentic, the kiosk may determine one or more locations on thepages where a unique signature is to be signed and on the documents.Moreover, the kiosk may be used to print out cashier checks with aunique signature after verification of user identity.

FIG. 1A illustrates a system 100 according to an exemplary embodiment.As further discussed below, system 100 may include an identityverification kiosk 110; a network 120; a client device 130; a server140; and a database 150. Although FIG. 1A illustrates single instancesof components of system 100, system 100 may include any number ofcomponents.

System 100 may include an identity verification kiosk 110. The identityverification kiosk 110 is explained in further detail with reference toFIG. 1B.

System 100 may include a network 120. In some examples, network 120 maybe one or more of a wireless network, a wired network or any combinationof wireless network and wired network, and may be configured to connectto any one of components of system 100. For example, client device 130may be configured to connect to kiosk 110 via network 120. In someexamples, network 120 may include one or more of a fiber optics network,a passive optical network, a cable network, an Internet network, asatellite network, a wireless local area network (LAN), a Global Systemfor Mobile Communication, a Personal Communication Service, a PersonalArea Network, Wireless Application Protocol, Multimedia MessagingService, Enhanced Messaging Service, Short Message Service, TimeDivision Multiplexing based systems, Code Division Multiple Access basedsystems, D-AMPS, Wi-Fi, Fixed Wireless Data, IEEE 802.11b, 802.15.1,802.11n and 802.11g, Bluetooth, NFC, Radio Frequency Identification(RFID), Wi-Fi, and/or the like.

In addition, network 120 may include, without limitation, telephonelines, fiber optics, IEEE Ethernet 902.3, a wide area network, awireless personal area network, a LAN, or a global network such as theInternet. In addition, network 120 may support an Internet network, awireless communication network, a cellular network, or the like, or anycombination thereof. Network 120 may further include one network, or anynumber of the exemplary types of networks mentioned above, operating asa stand-alone network or in cooperation with each other. Network 120 mayutilize one or more protocols of one or more network elements to whichthey are communicatively coupled. Network 120 may translate to or fromother protocols to one or more protocols of network devices. Althoughnetwork 120 is depicted as a single network, it should be appreciatedthat according to one or more examples, network 120 may comprise aplurality of interconnected networks, such as, for example, theInternet, a service provider's network, a cable television network,corporate networks, such as credit card association networks, and homenetworks.

System 100 may include a client device 130. For example, client device130, which may be a network-enabled computer. As referred to herein, anetwork-enabled computer may include, but is not limited to a computerdevice, or communications device including, e.g., a server, a networkappliance, a personal computer, a workstation, a phone, a handheld PC, apersonal digital assistant, a thin client, a fat client, an Internetbrowser, or other device. Client device 130 also may be a mobile device;for example, a mobile device may include an iPhone, iPod, iPad fromApple® or any other mobile device running Apple's iOS® operating system,any device running Microsoft's Windows® Mobile operating system, anydevice running Google's Android® operating system, and/or any othersmartphone, tablet, or like wearable mobile device.

The client device 130 device can include a processor and a memory, andit is understood that the processing circuitry may contain additionalcomponents, including processors, memories, error and parity/CRCcheckers, data encoders, anticollision algorithms, controllers, commanddecoders, security primitives and tamperproofing hardware, as necessaryto perform the functions described herein. The client device 130 mayfurther include a display and input devices. The display may be any typeof device for presenting visual information such as a computer monitor,a flat panel display, and a mobile device screen, including liquidcrystal displays, light-emitting diode displays, plasma panels, andcathode ray tube displays. The input devices may include any device forentering information into the user's device that is available andsupported by the user's device, such as a touch-screen, keyboard, mouse,cursor-control device, touch-screen, microphone, digital camera, videorecorder or camcorder. These devices may be used to enter informationand interact with the software and other devices described herein.

In some examples, client device 130 may execute one or moreapplications, such as software applications, that enable, for example,network communications with one or more components of system 100 andtransmit and/or receive data.

Client device 130 may be in communication with kiosk 110, one or moreservers 140 via one or more networks 120, and may operate as arespective front-end to back-end pair with server 140. Client device 130may transmit, for example from a mobile device application executing onclient device 130, one or more requests to kiosk 110. The one or morerequests may be associated with retrieving data from kiosk 110 or server140. Kiosk 110 or server 140 may receive the one or more requests fromclient device 130. Based on the one or more requests from client device130, kiosk 110 or server 140 may be configured to retrieve the requesteddata from one or more databases 150. Based on receipt of the requesteddata from the one or more databases 150, kiosk 110 or server 140 may beconfigured to transmit the received data to client device 130, thereceived data being responsive to one or more requests.

System 100 may include one or more servers 140. In some examples, server140 may include one or more processors, which are coupled to memory.Server 140 may be configured as a central system, server or platform tocontrol and call various data at different times to execute a pluralityof workflow actions. Server 140 may be configured to connect to the oneor more of kiosk 110, client device 130, and database 150.

System 100 may include a database 150. As explained above database 150may be called to retrieve data including user information. The data maybe requested by kiosk 110 or server 140 or client device 130. In someexamples, database 150 may be configured to communicate with one or morecomponents of system.

FIG. 1B illustrates a kiosk 110 according to an exemplary embodiment.The kiosk 110 may include kiosk 110 from FIG. 1A. The kiosk 110 maycomprise a display 101; a reader 103; a scanner 105; a printer 107; anda processor 109.

The display 101 may comprise a user interface 102. In some examples, oneor more requests from the user interface 102 may be transmitted toprocessor 109. For example, the processor 109 may be configured toreceive an identification verification request that is transmitted fromthe user interface 102.

The reader 103 may comprise a card reader. In some examples, reader 103may be configured to read and transmit data to processor 109. Forexample, the processor 109 may be configured to receive user informationvia the card reader 103.

The scanner 105 may comprise a document scanner. The document scannermay be configured to read and transmit data to processor 109. Forexample, the processor 109 may be configured to receive user informationvia the document scanner 105. In some examples, the document scanner 105may be configured to scan one or more documents after the printer 107has printed a unique identifier on the document.

The processor 109 may be in data communication with a server 140 and adatabase 150 storing information, including but not limited to userinformation. In some examples, the user information may comprise atleast one selected from the group of a first name, last name, date ofbirth, home address, work address, phone number, e-mail address, socialsecurity number, account number, driver's license number, passportnumber, identification card number, fingerprint identification, facialrecognition fingerprint, security challenge questions, and securitychallenge answers.

In some examples, the processor 109 may be configured to receive one ormore requests from the user interface 102. For example, the processor109 may be configured to receive an identification verification requestthat is transmitted from the user interface 102. In some examples, theprocessor 109 may be configured to receive user information via thedocument scanner 105. In other examples, the processor 109 may beconfigured to receive user information via the card reader 103. Theprocessor 109 may be configured to retrieve user information from viaserver 140 and/or the database 150. The processor 109 may be configuredto verify the identity of a user. The processor 109 may be configured tooutput information using one or more components of system 100. Forexample, the processor 109 may be configured to print a uniqueidentifier on a document using the printer 107. In some examples, afterthe printer 107 has printed a unique identifier on the document, thedocument scanner 105 may be configured to scan a document. In someexamples, the unique identifier may encode information associated withat least one of date, time, and location that the unique identifier wasprinted.

In some examples, the kiosk 110 may further comprise a finger printscanner 112. The finger print scanner 112 may be in data communicationwith the processor. The finger print scanner 112 may be configured toretrieve one or more finger print scans to verify the identity of theuser. In some examples, a first set of received one or more finger printscans may be compared by processor 109 to a second set of one or morereference finger print scans stored in database 150 and/or accessible toserver 140 to assist in identity verification of the user. In someexamples, kiosk 110 may be configured to capture biometric data andcompare it with one or more reference biometric data stored in database150 and/or accessible to server 140 to assist in the identityverification. In some examples, identity verification may beadditionally and/or alternatively performed by kiosk 110 based on photomatching associated with an identification card. For example, kiosk 110may be configured to capture one more images from an identification cardand compare it with one or more reference images stored in database 150and/or accessible to server 140 to assist in the identity verification.

In some examples, the kiosk 110 may further comprise an imaging device114 configured to gather image data associated with the user. Forexample, the processor 109 may be configured to receive image data fromthe imaging device 114 and verify the identity of the user based atleast in part on the received image data. The processor 109 may beconfigured to determine a fingerprint associated with the user. Forexample, the processor 109 may be configured to determine a real-time orlive facial recognition fingerprint associated with the user based onthe image data received from the imaging device 114. The processor 109may be configured to determine one or more fingerprints based on imagesassociated with documents. For example, the processor 109 may beconfigured to determine one or more identification facial recognitionfingerprints based on the one or more images associated with one or moreidentification documents and verify the identity of the user based inpart on comparing the one or more identification facial recognitionfingerprints to the live facial recognition fingerprint.

In some examples, the processor 109 may be configured to transmit one ormore factors to a device 130. For example, the processor 109 may beconfigured to transmit a second factor authentication to a mobile device130 associated with the user. In some examples, the second factorauthentication may comprise a request requiring a response from thedevice 130. For example, the second factor authentication may requestinput of at least one selected from the group of one or more usercredentials and biometric authorization. Upon receipt and determinationof authentication of the input transmitted from the device 130, theprocessor 109 may be configured to proceed with printing the uniqueidentifier on the document using the printer 107. In some examples, theprocessor 109 may be configured to account for timeout or delays duringscanning by requesting additional predetermined time for scan inputprior to restarting the scanning process. For example, the processor 109may be configured to cancel the transaction for security reasons shouldan error occur during scanning. In some examples, the error may beassociated with the user providing insufficient identity verificationinformation, as opposed to an outcome associated with a failure toidentify the user. In such a case, the processor 109 may be configuredto prompt additional identity verification information. In otherexamples, the error may be associated with an outcome indicative of theunavailability of the scanning for identity verification.

FIG. 2 illustrates a kiosk 200 configured to print guaranteed fundschecks. Although FIG. 2 illustrates single instances of components ofkiosk 200, kiosk 200 may include any number of components. FIG. 2 mayreference same or similar components of FIG. 1A and FIG. 1B. The kiosk200 may comprise a display 201; a reader 203; a scanner 205; a printer207; and a processor 209.

The display 201 may comprise a user interface 202. In some examples, oneor more requests from the user interface 202 may be transmitted toprocessor 209. For example, the processor 209 may be configured toreceive an identification verification request that is transmitted fromthe user interface 202.

The reader 203 may comprise a card reader. In some examples, reader 203may be configured to read and transmit data to processor 209. Forexample, the processor 209 may be configured to receive user informationvia the card reader 203.

The scanner 205 may comprise a document scanner. The document scannermay be configured to read and transmit data to processor 209. Forexample, the processor 209 may be configured to receive user informationvia the document scanner 205. In some examples, the document scanner 205may be configured to scan one or more documents after the printer 207has printed a unique identifier on the document.

The processor 209 may be in data communication with a server, such asserver 140 and a database, such as database 150, of FIG. 1A storinginformation, including but not limited to user information and useraccount information. Without limitation, the user information maycomprise at least one selected from the group of a first name, lastname, date of birth, home address, work address, phone number, e-mailaddress, social security number, account number, driver's licensenumber, passport number, identification card number, fingerprintidentification, facial recognition fingerprint, security challengequestions, and security challenge answers. Without limitation, the useraccount information may comprise at least one selected from the group ofchecking account, savings account, credit card, debit card, accountnumbers, transaction history, application information, and creditinformation.

In some examples, the processor 209 may be configured to receive one ormore requests from the user interface 202. For example, the processor209 may be configured to receive a guaranteed funds check request thatis transmitted from the user interface 202. In some examples, theprocessor 209 may be configured to request the user information from auser using the user interface 202. In some examples, the processor maybe configured to receive user information from the user interface 209.In some examples, the processor 209 may be configured to receive userinformation from the document scanner 205. In some examples, theprocessor may be configured to receive the user information from thecard reader 203. The processor 209 may be configured to verify theidentity of a user based on authenticated user information.

The processor 209 may be configured to retrieve user account informationfrom a database. The processor 209 may be configured to outputinformation using one or more components of kiosk 200. For example, theprocessor 209 may be configured to print, upon determining the presenceof sufficient funds in a user account, a guaranteed funds checkcomprising a unique identifier using the printer 207. The printedguaranteed funds check may be responsive to the guaranteed funds checkrequest from the user interface 202. In some examples, the uniqueidentifier may encode information associated with at least one of date,time, and location that the unique identifier was printed.

In some examples, the kiosk 200 may further comprise a finger printscanner 212. The finger print scanner 212 may be in data communicationwith the processor. The finger print scanner 212 may be configured toretrieve one or more finger print scans to verify the identity of theuser. In some examples, a first set of received one or more finger printscans may be compared by processor 209 to a second set of one or morereference finger print scans stored in database and/or accessible toserver to assist in identity verification of the user. In some examples,kiosk 200 may be configured to capture biometric data and compare itwith one or more reference biometric data stored in a database (similarto database 150) and/or accessible to a server (similar to server 140)to assist in the identity verification. In some examples, identityverification may be additionally and/or alternatively performed by kiosk200 based on photo matching associated with an identification card. Forexample, kiosk 200 may be configured to capture one more images from anidentification card and compare it with one or more reference imagesstored in the database and/or accessible to the server to assist in theidentity verification.

In some examples, the kiosk 200 may further comprise an imaging device214 configured to gather image data associated with the user. Forexample, the processor 209 may be configured to receive image data fromthe imaging device 214 and verify the identity of the user based atleast in part on the received image data. The processor 209 may beconfigured to determine a fingerprint associated with the user. Forexample, the processor may be configured to determine a real-time orlive facial recognition fingerprint associated with the user based onthe image data received from the imaging device 214. The processor 209may be configured to determine one or more fingerprints based on imagesassociated with documents. For example, the processor 209 may beconfigured to determine one or more identification facial recognitionfingerprints based on the one or more images associated with one or moreidentification documents and verify the identity of the user based inpart on comparing the one or more identification facial recognitionfingerprints to the live facial recognition fingerprint.

In some examples, the processor 209 may be configured to transmit one ormore factors to a device. For example, the processor may be configuredto transmit a second factor authentication to a mobile device associatedwith the user. In some examples, the second factor authentication maycomprise a request requiring a response from the device. For example,the second factor authentication may request input of at least oneselected from the group of one or more user credentials and biometricauthorization. Upon receipt and determination of authentication of theinput transmitted from the device, the processor 209 may be configuredto proceed with printing the unique identifier on the document using theprinter 207. In some examples, the second factor authentication may bepart of verifying identity of the user.

FIG. 3 illustrates a method 300 for recording confirmation of a useridentity. FIG. 3 may reference same or similar components of system 100of FIG. 1A, kiosk 110 of FIG. 1B, and kiosk 200 of FIG. 2.

At block 305, method may include receiving an identificationverification request from a user.

At block 310, method may include scanning one or more identificationdocuments.

At block 315, method may include collecting identification informationassociated with the user. In some examples, method 300 may furthercomprise requesting consent from the user to collect identificationinformation or biometric information associated with the user. Forexample, the kiosk may be configured to transmit a request for consentto the device of the user in order to obtain at least one selected fromthe group of identification information and biometric informationassociated with the user.

At block 320, method may include collecting live biometric dataassociated with the user. In some examples, collecting live biometricdata associated with the user may comprise receiving image dataassociated with a user face and establishing a facial recognitionfingerprint based on image data. In some examples, collecting livebiometric data associated with the user may comprise recording dataassociated with one or more fingerprints of the user using a fingerprintscanner.

At block 325, method may include verifying the identity of the user. Insome examples, this may include comparison of collected live biometricdata with reference data. For example, method 300 may further comprisereceiving biometric information associated with the user from anidentification document and comparing the document biometric informationto the live biometric information. In some examples, method 300 mayfurther comprise comparing the collected identification informationassociated with the user to previously recorded identificationinformation associated with the user.

At block 330, method may include scanning a document to be witnessed.

At block 335, method may include witnessing the document by marking thescanned document with a unique identifier. For example, the uniqueidentifier may comprise a computer readable image and a timestamp. Insome examples, the unique identifier may comprise a non-sequentialpseudo-randomly generated identifier. Depending on jurisdictionalrequirements, notaries for a document may differ from those of certifiedcheck. Thus, depending on the document type, one or more selected fromthe group of the unique identifier, timestamp, stamp or seal, anddigital signature may be included for notarization purposes. Method 300may further comprise receiving information associated with a previouslyprinted unique identifier and determining differences between apreviously marked document and the scanned document to be witnessed.

In some examples, method 300 may further comprise applying a predictivemodel to determine where a document should be marked. For example, thepredictive model may be developed by machine learning using at least onealgorithm selected from the group of a gradient boosting machinealgorithm, a logistic regression algorithm, and a neural networkalgorithm.

It is further noted that the systems and methods described herein may betangibly embodied in one of more physical media, such as, but notlimited to, a compact disc (CD), a digital versatile disc (DVD), afloppy disk, a hard drive, read only memory (ROM), random access memory(RAM), as well as other physical media capable of data storage. Forexample, data storage may include random access memory (RAM) and readonly memory (ROM), which may be configured to access and store data andinformation and computer program instructions. Data storage may alsoinclude storage media or other suitable type of memory (e.g., such as,for example, RAM, ROM, programmable read-only memory (PROM), erasableprogrammable read-only memory (EPROM), electrically erasableprogrammable read-only memory (EEPROM), magnetic disks, optical disks,floppy disks, hard disks, removable cartridges, flash drives, any typeof tangible and non-transitory storage medium), where the files thatcomprise an operating system, application programs including, forexample, web browser application, email application and/or otherapplications, and data files may be stored. The data storage of thenetwork-enabled computer systems may include electronic information,files, and documents stored in various ways, including, for example, aflat file, indexed file, hierarchical database, relational database,such as a database created and maintained with software from, forexample, Oracle® Corporation, Microsoft® Excel file, Microsoft® Accessfile, a solid state storage device, which may include a flash array, ahybrid array, or a server-side product, enterprise storage, which mayinclude online or cloud storage, or any other storage mechanism.Moreover, the figures illustrate various components (e.g., servers,computers, processors, etc.) separately. The functions described asbeing performed at various components may be performed at othercomponents, and the various components may be combined or separated.Other modifications also may be made.

In the preceding specification, various embodiments have been describedwith references to the accompanying drawings. It will, however, beevident that various modifications and changes may be made thereto, andadditional embodiments may be implemented, without departing from thebroader scope of the invention as set forth in the claims that follow.The specification and drawings are accordingly to be regarded as anillustrative rather than restrictive sense.

1-20. (canceled)
 21. A method for recording confirmation of a useridentity, comprising: scanning one or more identification documents;verifying the identity of the user; scanning a document to be witnessed;applying a predictive model to determine a marking location on thedocument; and witnessing the document by marking the document at themarking location with a unique identifier.
 22. The method of claim 21,wherein the unique identifier comprises a computer-readable image and atimestamp.
 23. The method of claim 21, wherein the predictive model isdeveloped by machine learning using at least one algorithm selected fromthe group of a gradient boosting machine algorithm, a logisticregression algorithm, and a neural network algorithm to develop thepredictive model.
 24. The method of claim 21, further comprising:collecting identification information associated with the user, andcollecting live biometric data associated with the user.
 25. The methodof claim 24, further comprising: receiving biometric informationassociated with the user from an identification document; and comparingthe document biometric information to the live biometric information.26. The method of claim 24, wherein collecting live biometric dataassociated with the user comprises: receiving image data associated withthe user's face, and establishing a facial recognition fingerprint basedon image data.
 27. The method of claim 24, wherein collecting livebiometric data associated with the user comprises recording dataassociated with one or more fingerprints of the user using a fingerprintscanner.
 28. The method of claim 24, further comprising comparing thecollected identification information associated with the user topreviously recorded identification information associated with the user.29. The method of claim 21, further comprising requesting consent fromthe user to collect identification information or biometric informationassociated with the user.
 30. The method of claim 21, furthercomprising: receiving information associated with a previously printedunique identifier; and determining differences between a previouslymarked document and the scanned document to be witnessed.
 31. Anidentity verification kiosk, comprising: an input device; a printer; anda processor in data communication with a server and a database storinguser information, wherein the processor is configured to: verify theidentity of a user, apply a predictive model to determine a markinglocation for placement of a unique identifier on a document, and printthe unique identifier on the document at the marking location using theprinter.
 32. The identity verification kiosk of claim 31, wherein theinput device comprises at least one selected from the group of adocument scanner, a card reader, and a finger print scanner.
 33. Theidentity verification kiosk of claim 32, wherein the processor isfurther configured to: receive user information via the input device;and retrieve user information from the database.
 34. The identityverification kiosk of claim 31, further comprising an imaging deviceconfigured to gather image data associated with the user, wherein theprocessor is configured to receive image data from the imaging deviceand verify the identity of the user based at least in part on the imagedata received.
 35. The identity verification kiosk of claim 34, whereinthe processor is further configured to determine a live facialrecognition fingerprint associated with the user based on the image datareceived from the imaging device.
 36. The identity verification kiosk ofclaim 35, wherein the processor is further configured to determine oneor more identification facial recognition fingerprints based on one ormore images associated with one or more identification documents andverify the identity of the user based in part on comparing the one ormore identification facial recognition fingerprints to the live facialrecognition fingerprint.
 37. The identity verification kiosk of claim31, wherein the processor is further configured to transmit a secondfactor authentication to a mobile device associated with the user.
 38. Anon-transitory computer-accessible medium containing executableinstructions, wherein, when executed by a computer hardware arrangementcomprising a processor, a document scanner, and a printer, the computerhardware arrangement is configured to perform procedures comprising:scanning one or more identification documents; verifying the identity ofthe user; scanning a document to be witnessed; applying a predictivemodel to determine a marking location on the document; and witnessingthe document by marking the document at the marking location with aunique identifier.
 39. The non-transitory computer-accessible medium ofclaim 38, wherein the unique identifier encodes information associatedwith at least one selected from the group of the date, time, andlocation the unique identifier was printed.
 40. The non-transitorycomputer-accessible medium of claim 38, wherein the unique identifiercomprises a non-sequential pseudo-randomly generated identifier.