Systems and methods to modify a negotiable instrument

ABSTRACT

When the deposit of a negotiable instrument, such as a check, is done electronically by using a digital image of the negotiable instrument rather than the negotiable instrument itself, during the process, at least two negotiable instruments may exist: the physical negotiable instrument and the digital image of the negotiable instrument. To change the physical negotiable instrument to a non-negotiable instrument, a bank or other financial institution may send a transmission to modify the appearance of the negotiable instrument, thus effectively “voiding” the physical negotiable instrument. The negotiable instrument may have various inks or mechanisms that facilitate the modification of the appearance through the application of a stimulus, such as heat or light. The financial institution may cause the application of the stimulus to modify the appearance of the negotiable instrument.

COPYRIGHT NOTICE AND PERMISSION

A portion of the disclosure of this patent document may contain material that is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent files or records, but otherwise reserves all copyright rights whatsoever. The following notice shall apply to this document: Copyright© 2007 USAA.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is related by subject matter to the subject matter disclosed in the following commonly assigned applications, the entirety of which are hereby incorporated by reference herein: U.S. patent application Ser. No. 11/927,814, U.S. patent application Ser. No. 11/927,859, U.S. patent application Ser. No. 11/927,940, and U.S. patent application Ser. No. 11/928,017, each filed on Oct. 30, 2007, and each entitled “Systems and Methods to Modify a Negotiable Instrument.”

BACKGROUND

Upon the passage of the Check Clearing for the 21st Century Act (Check 21), the use of digital images for check presentment has increased dramatically, as the process typically reduces the time taken for a check to clear and the cost associated with moving paper checks from location to location. In lieu of using a physical check to clear the check clearinghouse, a scanned image is used in the process. A person, such as a bank teller, scans the physical check upon presentment by a customer at a bank. The scan creates a digital image of the check. The digital image, along with other electronic information such as amount and account holder, is submitted electronically to the federal check clearinghouse system. The system processes the digital image of the check rather than processing the physical check itself.

Banks and other institutions that process checks have realized significant benefits by using electronic presentment of checks. For example, both a reduction of the need to transport paper from the bank of presentment to the federal clearinghouse, as well as a reduction in the processing time that is necessary to clear checks has been achieved. At issue when presenting checks electronically is that the physical check may exist at the same time as the digitized form, i.e. the digital image, of the check. If the check is not destroyed, or otherwise altered, the physical check may be fraudulently presented again at either the same location or another location. Even though the check image may have been submitted for processing with the federal check clearinghouse system, the physical check may be stolen and fraudulently altered and re-presented at another location for payment. Thus, there could be multiple check items going through the clearinghouse that originate from the same physical check.

SUMMARY

This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.

In consideration of the above-identified shortcomings of the art, the present subject matter addresses the shortcomings of the prior art and provides additional benefits through the use of a modifiable negotiable instrument, such as a check. The negotiable instrument may have a modifiable ink on at least one of the surfaces of the negotiable instrument. The modifiable ink changes when a stimulus is applied to the modifiable ink. When a digital image of the negotiable instrument is used to deposit funds of the negotiable instrument into a financial account, a stimulus may be applied to the modifiable ink of the negotiable instrument to change the ink. The modification changes the appearance of the physical form of the negotiable instrument. The stimulus may be, but is not limited to, a heat source, an electromagnetic signal such as light or radio waves, or a sound.

In one exemplary and non-limiting embodiment, the physical form of the negotiable instrument is voided after receiving a request to deposit an electronic form of the negotiable instrument into an account, the electronic form being a digital image of the physical negotiable instrument. The request may comprise a digital image of the negotiable instrument. After the request is received, at least one surface of the negotiable instrument is modified. In another exemplary and non-limiting embodiment, a digital image file of the negotiable instrument is created, the digital image file comprising a digital image of the negotiable instrument. A request to deposit the negotiable instrument is sent and the negotiable instrument is voided by modifying at least a surface of the negotiable instrument.

In another exemplary and non-limiting embodiment, a digital image of the negotiable instrument is received. The negotiable instrument has at least one surface with a modifiable ink which is sensitive to a stimulus. After receipt of the digital image, a communication is transmitted to apply the stimulus to negotiable instrument. In another and non-limiting embodiment, a first electronic data and a second electronic data of a negotiable instrument are received. The first electronic data is a digital image of at least one side of the negotiable instrument. The second electronic data is an amount of money to be deposited and a magnetic ink character recognition information of the negotiable instrument. The first electronic data and the second electronic data are verified and a void signal is transmitted to void the negotiable instrument. In one embodiment, the void signal causes the creation of the stimulus.

In another exemplary and non-limiting embodiment, a negotiable instrument is received. The negotiable instrument has at least one surface with modifiable ink which is sensitive to a stimulus. The stimulus causes the modifiable ink to change. A scan is initiated to generate a first electronic data and a second electronic data of the negotiable instrument. The first electronic data may be an image of at least one surface of the negotiable instrument and the second electronic data may be an amount of money to be deposited and a magnetic ink character recognition information of the negotiable instrument. The first and second electronic data are transmitted to a financial institution. A void signal is received to void the negotiable instrument. The void signal causes the application of the stimulus to the modifiable ink. The negotiable instrument may then be voided.

Other features of the subject matter are described below.

BRIEF DESCRIPTION OF THE DRAWINGS

The foregoing summary, as well as the following detailed description of preferred embodiments, is better understood when read in conjunction with the appended drawings. For the purposes of illustration, there is shown in the drawings exemplary embodiments; however, these embodiments are not limited to the specific methods and instrumentalities disclosed. In the drawings:

FIG. 1 is a block diagram representing an exemplary and non-limiting computing device suitable for use in conjunction with the present subject matter;

FIG. 2 illustrates an exemplary and non-limiting networked computing environment in which many computerized processes may be implemented to provide the present subject matter;

FIG. 3 a is an exemplary and non-limiting modifiable negotiable instrument prior to a deposit;

FIG. 3 b is an exemplary and non-limiting modifiable negotiable instrument after a deposit;

FIG. 3 c is an exemplary and non-limiting modifiable negotiable instrument using a removable cover;

FIG. 4 is an exemplary and non-limiting diagram illustrating a system for voiding a negotiable instrument;

FIG. 5 is an exemplary and non-limiting flow diagram illustrating how a user may deposit a modifiable negotiable instrument;

FIG. 6 is an exemplary and non-limiting flow diagram illustrating how a financial institution may process a deposit of a modifiable negotiable instrument;

FIG. 7 is an exemplary and non-limiting flow diagram illustrating the modification of a modifiable negotiable instrument using a scanning process;

FIG. 8 is an exemplary and non-limiting system for modifying a negotiable instrument using a radio signal; and

FIG. 9 is an exemplary and non-limiting system for modifying a negotiable instrument using a deposit machine.

DETAILED DESCRIPTION

Certain specific details are set forth in the following description and figures to provide a thorough understanding of various embodiments of the subject matter. Certain well-known details often associated with computing and software technology are not set forth in the following disclosure to avoid unnecessarily obscuring the various embodiments of the subject matter. Further, those of ordinary skill in the relevant art will understand that they can practice other embodiments of the subject matter without one or more of the details described below. Finally, while various methods are described with reference to steps and sequences in the following disclosure, the description as such is for providing a clear implementation of embodiments of the subject matter, and the steps and sequences of steps should not be taken as required to practice this subject matter.

Referring to FIG. 1, shown is a block diagram representing an exemplary computing environment suitable for use in conjunction with implementing the processes described below. For example, the computer executable instructions that carry out the processes and methods for providing the subject matter of the present disclosure may reside and/or be executed in such a computing environment as shown in FIG. 1. The computing system environment 220 is only one example of a suitable computing environment and is not intended to suggest any limitation as to the scope of use or functionality of the subject matter. Neither should the computing system environment 220 be interpreted as having any dependency or requirement relating to any one or combination of components illustrated in the exemplary computing system environment 220. For example a computer game console may also include items such as those described below for use in conjunction with implementing the processes described above.

Aspects of the subject matter are operational with numerous other general purpose or special purpose computing system environments or configurations. Examples of well known computing systems, environments, and/or configurations that may be suitable for use with the subject matter include, but are not limited to, personal computers, server computers, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.

Aspects of the subject matter may be implemented in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. Aspects of the subject matter may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media, including memory storage devices.

An exemplary system for implementing aspects of the subject matter includes a general purpose computing device in the form of a computer 241. Components of computer 241 may include, but are not limited to, a processing unit 259, a graphical processing unit 229 (GPU), a video memory 230, a graphics interface 231, a system memory 222, and a system bus 221 that couples various system components including the system memory 222 to the processing unit 259. The system bus 221 may be any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, and a local bus, using any of a variety of bus architectures. By way of example, and not limitation, such architectures include Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus (also known as Mezzanine bus).

Computer 241 typically includes a variety of computer-readable media. Computer-readable media can be any available media that can be accessed by computer 241 and they include both volatile and nonvolatile media, removable and non-removable media. By way of example, and not limitation, computer-readable media may comprise computer-storage media and communication media. Computer-storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer-storage media includes, but is not limited to, random access memory (RAM), read-only memory (ROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to store the desired information and that can accessed by computer 241. Communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal, such as a carrier wave or other transport mechanism, and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, radio frequency (RF), infrared and other wireless media. Combinations of any of the above should also be included within the scope of computer-readable media.

The system memory 222 includes computer-storage media in the form of volatile and/or nonvolatile memory such as ROM 223 and RAM 260. A BIOS (basic input/output system) 224 containing the basic routines that help to transfer information between elements within computer 241, such as during start-up, is typically stored in ROM 223. RAM 260 typically contains data and/or program modules that are immediately accessible to and/or presently being operated on by processing unit 259. By way of example, and not limitation, FIG. 1 illustrates operating system 225, application programs 226, other program modules 227, and program data 228.

The computer 241 may also include other removable/non-removable, volatile/nonvolatile computer storage media. By way of example only, FIG. 1 illustrates a hard disk drive 238 that reads from or writes to non-removable, non-volatile magnetic media, a magnetic disk drive 239 that reads from or writes to a removable, nonvolatile magnetic disk 254, and an optical disk drive 240 that reads from or writes to a removable, nonvolatile optical disk 253 such as a CD ROM or other optical media. Other removable/non-removable, volatile/nonvolatile computer-storage media that can be used in the exemplary operating environment include, but are not limited to, magnetic tape cassettes, flash memory cards, DVDs, digital video tape, solid state RAM, solid state ROM, and the like. The hard disk drive 238 is typically connected to the system bus 221 through a non-removable memory interface such as non-removable non-volatile memory interface 234, and magnetic disk drive 239. Optical disk drive 240 is typically connected to the system bus 221 by a removable memory interface, such as removable non-volatile memory interface 235.

The drives and their associated computer-storage media, discussed above and illustrated in FIG. 1, provide storage of computer-readable instructions, data structures, program modules and other data for the computer 241. In FIG. 1, for example, hard disk drive 238 is illustrated as storing operating system 258, application programs 257, other program modules 256, and program data 255. Note that these components can either be the same as or different from operating system 225, application programs 226, other program modules 227, and program data 228. Operating system 258, application programs 257, other program modules 256, and program data 255 are given different numbers here to illustrate that, at a minimum, they are different copies. A user may enter commands and information into the computer 241 through input devices such as a keyboard 251 and pointing device 252, commonly referred to as a mouse, trackball, or touch pad. Other input devices (not shown) may include a microphone, joystick, game pad, satellite dish, scanner, or the like. These and other input devices are often connected to the processing unit(s) 259 through a user input interface 236 that is coupled to the system bus 221, but may be connected by other interface and bus structures, such as a parallel port, game port or a universal serial bus (USB). A monitor 242 or other type of display device is also connected to the system bus 221 via an interface, such as a video interface 232. In addition to the monitor 242, computer 241 may also include other peripheral output devices such as speakers 244 and printer 243, which may be connected through an output peripheral interface 233.

The computer 241 may operate in a networked environment using logical connections to one or more remote computers, such as a remote computer 246. The remote computer 246 may be a personal computer, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to the computer 241, although only a memory storage device 247 has been illustrated in FIG. 1. The logical connections depicted in FIG. 1 include a local area network (LAN) 245 and a wide area network (WAN) 249, but may also include other networks. Such networking environments are commonplace in offices, enterprise-wide computer networks, intranets and the Internet.

When used in a LAN networking environment, the computer 241 is connected to the LAN 245 through a network interface 237. When used in a WAN networking environment, the computer 241 typically includes a modem 250 or other means for establishing communications over the WAN 249, such as the Internet. The modem 250, which may be internal or external, may be connected to the system bus 221 via the user input interface 236 or other appropriate mechanism. In a networked environment, program modules depicted relative to the computer 241, or portions thereof, may be stored in the remote memory storage device. By way of example, and not limitation, FIG. 1 illustrates remote application programs 248 as residing on memory storage device 247. It will be appreciated that the network connections shown are exemplary and that other means of establishing a communications link between the computers may be used.

It should be understood that the various techniques described herein may be implemented in connection with hardware or software or, where appropriate, with a combination of both. Thus, the methods and apparatus of the subject matter, or certain aspects or portions thereof, may take the form of program code (i.e., instructions) embodied in tangible media, such as floppy diskettes, CD-ROMs, hard drives, or any other machine-readable storage medium wherein, when the program code is loaded into and executed by a machine, such as a computer, the machine becomes an apparatus for practicing the subject matter. In the case of program code execution on programmable computers, the computing device generally includes a processor, a storage medium readable by the processor (including volatile and non-volatile memory and/or storage elements), at least one input device, and at least one output device. One or more programs may implement or utilize the processes described in connection with the subject matter, e.g., through the use of an API, reusable controls, or the like. Such programs are preferably implemented in a high-level procedural or object-oriented programming language to communicate with a computer system. However, the program(s) can be implemented in assembly or machine language, if desired. In any case, the language may be a compiled or interpreted language, and may be combined with hardware implementations.

Although exemplary embodiments may refer to utilizing aspects of the subject matter in the context of one or more stand-alone computer systems, the subject matter is not so limited, but rather may be implemented in connection with any computing environment, such as a network or distributed computing environment. Still further, aspects of the subject matter may be implemented in or across a plurality of processing chips or devices, and storage may similarly be effected across a plurality of devices. Such devices might include personal computers, network servers, handheld devices, supercomputers, or computers integrated into other systems such as automobiles and airplanes.

In light of the diverse computing environments that may be built according to the general framework provided in FIG. 1, the systems and methods provided herein cannot be construed as limited in any way to a particular computing architecture. Instead, the subject matter should not be limited to any single embodiment, but rather should be construed in breadth and scope in accordance with the appended claims.

Referring next to FIG. 2, shown is an exemplary networked computing environment in which many computerized processes may be implemented to perform the processes described above. For example, parallel computing may be part of such a networked environment with various clients on the network of FIG. 2 using and/or implementing the processes for providing the subject matter of the present disclosure. One of ordinary skill in the art can appreciate that networks can connect any computer or other client or server device, or that computers may be connected in a distributed computing environment. In this regard, any computer system or environment having any number of processing, memory, or storage units, and any number of applications and processes occurring simultaneously, is considered suitable for use in connection with the systems and methods provided.

Distributed computing provides sharing of computer resources and services by exchange between computing devices and systems. These resources and services include the exchange of information, cache storage, and disk storage for files. Distributed computing takes advantage of network connectivity, allowing clients to leverage their collective power to benefit the entire enterprise. In this regard, a variety of devices may have applications, objects, or resources that may use the processes described herein.

FIG. 2 provides a schematic diagram of an exemplary networked or distributed computing environment. The environment comprises computing devices 271, 272, 276, and 277 as well as objects 273, 274, and 275, and database 278. Each of these computing devices 271, 272, 273, 274, 275, 276, 277 and 278 may comprise or make use of programs, methods, data stores, programmable logic, etc. The computing devices 271, 272, 273, 274, 275, 276, 277 and 278 may span portions of the same or different devices such as personal data assistants (PDAs), audio/video devices, MP3 players, personal computers, etc. Each computing device 271, 272, 273, 274, 275, 276, 277 and 278 can communicate with another computing device 271, 272, 273, 274, 275, 276, 277 and 278 by way of the communications network/bus 270. In this regard, any entity may be responsible for the maintenance and updating of a database 278 or other storage element.

The communications network 270 may itself comprise other computing entities that provide services to the system of FIG. 2, and may itself represent multiple interconnected networks. In accordance with an aspect of the subject matter, each computing device 271, 272, 273, 274, 275, 276, 277 and 278 may contain discrete functional program modules that might make use of an API, or other object, software, firmware and/or hardware, to request services of one or more of the other computing devices 271, 272, 273, 274, 275, 276, 277 and 278.

It can also be appreciated that an object, such as 275, may be hosted on another computing device 276. Thus, although the physical environment depicted may show the connected devices as computers, such illustration is merely exemplary and the physical environment may alternatively be depicted or described comprising various digital devices such as PDAs, televisions, MP3 players, etc., or software objects such as interfaces, COM objects, and the like.

There are a variety of systems, components, and network configurations that support distributed computing environments. For example, computing systems may be connected by wired or wireless systems, by local networks or widely distributed networks. Currently, many networks are coupled to the Internet, which provides an infrastructure for widely distributed computing and encompasses many different networks. Any such infrastructures, whether coupled to the Internet or not, may be used in conjunction with the systems and methods provided.

A network infrastructure may enable a host of network topologies such as client/server, peer-to-peer, or hybrid architectures. The “client” is a member of a class or group that uses the services of another class or group to which it is not related. In computing, a client is a process, i.e., roughly a set of instructions or tasks, that requests a service provided by another program. The client process utilizes the requested service without having to “know” any working details about the other program or the service itself. In a client/server architecture, particularly a networked system, a client is usually a computer that accesses shared network resources provided by another computer, e.g., a server. In the example of FIG. 2, any entity 271, 272, 273, 274, 275, 276, 277 and 278 can be considered a client, a server, or both, depending on the circumstances.

A server is typically, though not necessarily, a remote computer system accessible over a remote or local network, such as the Internet. The client process may be active in a first computer system, and the server process may be active in a second computer system, the computer systems communicating with one another over a communications medium, thus providing distributed functionality and allowing multiple clients to take advantage of the information-gathering capabilities of the server. Any software objects may be distributed across multiple computing devices or objects.

Client(s) and server(s) communicate with one another utilizing the functionality provided by protocol layer(s). For example, HyperText Transfer Protocol (HTTP) is a common protocol that is used in conjunction with the World Wide Web (WWW), or “the Web.” Typically, a computer network address such as an Internet Protocol (IP) address or other reference such as a Universal Resource Locator (URL) can be used to allow server or client computers to identify each other. The network address can be referred to as a URL address. Communication can be provided over a communications medium, e.g., client(s) and server(s) may be coupled to one another via TCP/IP connection(s) for high-capacity communication.

In light of the diverse computing environments that may be built according to the general framework provided in FIG. 2 and the further diversification that can occur in computing in a network environment such as that of FIG. 2, the systems and methods provided herein cannot be construed as limited in any way to a particular computing architecture or operating system. Instead, the subject matter should not be limited to any single embodiment, but rather should be construed in breadth and scope in accordance with the appended claims.

When a negotiable instrument is deposited using electronic means, there may arise the situation when the physical negotiable instrument “transforms” to exist in essentially two forms: the original physical negotiable instrument and the newly generated digital form. While the newly generated digital form may undergo processing through the federal check clearinghouse, the physical form is typically left in possession of the bearer of the negotiable instrument, e.g. the person that deposited the check. Although a financial institution may send instructions to the depositor to destroy or transfer possession of the physical negotiable instrument upon transmission of the digital form, the financial institution may have little to no way to force the depositor to actually destroy the negotiable instrument without limiting access to the funds. Unless the depositor destroys the negotiable instrument, the duality described above may continue to propagate, i.e. both the physical negotiable instrument and the digital form may continue to exist contemporaneously.

Thus, a financial institution may wish to cause the alteration of the physical negotiable instrument with or without the assistance of the depositor to render the physical form of the negotiable instrument non-negotiable. In other words, the financial institution may cause the alteration of the appearance of the physical negotiable instrument to a point that makes it difficult or impossible to present the physical negotiable instrument in another transaction, thus effectively destroying the negotiable instrument, with or without the participation of the depositor. For example, the appearance of the negotiable instrument may be changed to show the term, “VOID”. Thus, if the negotiable instrument is presented again, the term may indicate that the holder negotiable instrument has previously deposited or attempted to deposit the negotiable instrument. The negotiable instrument may be altered in other ways and is not limited to the term used above.

FIG. 3 a in combination with FIG. 3 b are illustrative of the modification of a negotiable instrument. Shown in FIG. 3 a is check 300 having redemption amount section 304, which indicates the amount of funds to be deposited into an account, and magnetic ink character recognition (MICR) section 306. The MICR section typically includes account information of the negotiable instrument, namely the routing number of the bank that holds the account and the account number the negotiable instrument is to be drawn against, e.g. the bank and the account from which the funds are to be withdrawn. The MICR information is typically printed using a magnetic ink or toner containing iron oxide. In a deposit process, the image of check 300 may be a first electronic data of the check as well as other information, such as sections 306 or 304, which may be second electronic data.

Check 300 also has unmodified modifiable section 302. Unmodified modifiable section 302 may use various types of modifiable inks or other mechanisms so that when a stimulus is applied to unmodified modifiable section 302, the ink or mechanism changes in appearance or structure to indicate a deposit process may have occurred. The change may be permanent or temporary. There are various types of ink that may be used, the present disclosure not being limited to any one particular type. Some examples of modifiable inks are inks sensitive to light, heat or sound. An ink that is sensitive to light may be configured to modify based upon exposure to a certain magnitude of light for a certain period of time. For example, a light sensitive ink may change its appearance based upon a bright light, such as a light from a scanner, being applied for a long period of time. The time may be determined based upon various scan speeds of a typical scanner. For example, the scan speed of a scanner at a high resolution may be slower than the scan speed of a scanner at a low resolution.

If the ink is sensitive to heat, the ink may be configured to modify its appearance based upon the heat generated by the application of a bright light source, such as one that may be found in a scanner. If the light source is applied for a long period of time, the ink may be configured such that the heat generated by the absorption of the light by the ink will create a certain amount of heat within the ink, thus causing the change in the ink. Unmodified modifiable section 302 may also have a mechanism sensitive to other types of stimuli, such as a radio frequency identification (RFID) tag. When the RFID tag receives a particular radio signal, the RFID tag may be modified. When the RFID tag is read at a later time, the modification may indicate that the deposit of the negotiable instrument may have occurred. The RFID tag may also, among other uses, be used to track the location of check 300.

FIG. 3 b illustrates an exemplary and non-limiting way in which a negotiable instrument may be modified. Check 300 has modified modifiable section 308, which in FIG. 3 a was unmodified modifiable section 302. After the application of a stimulus to unmodified modifiable section 302, the ink or mechanism within unmodified modifiable section 302 may be changed to show modified modifiable section 308. Check 300 now shows the term, “VOID” within modified modifiable section 308. The change may be used to provide information to prevent a second or subsequent presentment of check 300 for deposit.

FIG. 3 c illustrates an ink sensitive to various stimuli that modifies after removal of a protective cover. Check 300 has removable coating 310 a which seals modifiable ink section 310 b from exposure to stimuli. The stimuli may be of various types, including, but not limited to, air or light. For example, prior to deposit of the negotiable instrument, there may be a requirement to remove coating 310 a to indicate the underlying code, which in FIG. 3 c is shown as “VO”. Upon removal of coating 310 a, ink section 310 b is exposed to light, causing the ink to modify to show “VO”. Thus, coating 310 a may be of a range of materials that blocks the exposure of section 310 b to a stimulus.

Once exposed, ink section 310 b may be permanently or temporarily modified Ink section 310 b indicia may also be encoded to increase the difficulty of defeating the void process. For example, ink section 310 b may be a bar code unique to check 300 itself and may be designed in a manner that is difficult to determine what the bar code will be. In order to deposit check 300, coating 310 a may be removed to show the encoded indicia. If the indicia is encoded, the user may be forced to remove coating 310 a because of the difficulty of determining the code without exposing the indicia by removing coating 310 a.

FIG. 4 illustrates a system to deposit a check into an account. In one exemplary and non-limiting embodiment, account owner 410 has account 460 with bank 430. Account owner 410 opens a communication pathway with bank 430 via Internet connection 420 to send a deposit request to deposit check 414 into account 460. Account owner 410 scans at least one surface of check 414 using scanner 412. Scanner 412 creates a digital image of the surface of check 414 that was scanned and saves that digital image as a digital image file. The digital image file may also contain other information about check 414, including MICR information, account information, or deposit amount. Account owner 410 transmits the digital image file to bank 430, which processes the deposit.

After the deposit is processed, bank 430 may wish to prevent the use of check 414 in another deposit operation. In one exemplary and non-limiting embodiment, bank 430 may cause the modification of check 414 to prevent a subsequent presentment of check 414. Bank 430 may send a communication to account owner 410 to void the check. The communication may be directed at scanner 412 with or without the knowledge of account owner 410. In other words, bank 430 may not complete the deposit operation if account owner 410 intercedes in the void operation. Bank 430 may send a signal to scanner 412 to scan a surface of check 414 at a speed to cause the modification of an ink section on check 414, as described above. Once the scan operation is completed, bank 430 may wait to complete the deposit operation until a communication or notice is received that check 414 was voided. The notice may include the slow scanned image showing the modification of check 414.

FIG. 5 illustrates a deposit process using a modifiable check. A user receives 500 a check from another individual, for example, if the user is owed money or the check is used as payment for a good or service. The user endorses 502 the check by signing the check, thus indicating the intent to deposit the check into an account. The user generates 504 a digital image file by scanning at least one surface of the check using a scanner. The user sends 506 the digital image file to the bank which controls the user's account. After processing the deposit request, a communication is generated and transmitted to void 508 the check. The communication may be directed to the user and/or may be directed to another mechanism. For example, the communication may be directed to the user's scanner with or without the knowledge of the user. The communication may contain instructions to re-scan the check at a certain speed to cause the application of a stimulus to modify the check.

FIG. 6 illustrates processing a deposit request. The bank receives 600 a deposit request from a user. After acknowledging the deposit request, the bank then receives 602 a digital image of the check. The digital image may be used by the bank to process the deposit request. The digital image may be used alone or in conjunction with additional information such as MICR information. After verifying 604 the digital information, the bank processes 606 the deposit request. The verification may include, but is not limited to, the verification of the quality of the digital image, the verification of any data retrieved from the digital image, the verification of additional information received along with the digital image, and/or the verification that the check has not been deposited before. After the bank verifies 604 the digital information received and processes 606 the deposit request, the bank then may transmit 608 a void signal to void the check. As described earlier, there may be various manners in which to void the check, including, but not limited to, the application of a stimulus such as light, heat or sound. Upon application of the stimulus, the check is voided 610.

As described earlier, there may be various ways in which a check that is modifiable by the application of a stimulus is voided. FIG. 7 illustrates one such way: a scanner is used to apply the stimulus. A bank receives 700 a deposit request. The bank then receives 702 a digital image of the check and account information. The bank verifies 704 the information and processes 706 the deposit request. After the deposit is in process, to complete the process, the bank transmits 708 a void signal to the user's scanner. The void signal may contain instructions to rescan a surface of the check at a certain speed to cause the application of a stimulus. The ink may be modified based upon the application of a certain magnitude or brightness of light, or heat may be generated by that brightness of light, for a certain amount of time, which may correspond to a scan speed. After the stimulus is applied, the bank deposits 710 the funds into the user's account.

The present disclosure may incorporate a check modifiable by various stimuli. FIG. 8 illustrates a system that uses radio waves to modify a check. Check 814 has embedded RFID tag 804. RFID tag 804 is an object that is sensitive to radio signals and can be incorporated into check 814. RFID tag 804 can be read and modified at various distances. Typically, an RFID tag, such as RFID tag 804, has two parts: an integrated circuit for storing and processing information as well as receiving instructions via radio waves and an antenna for receiving and transmitting a signal. Some RFID tags do not have the integrated circuit, thus reducing cost and bulk of using an RFID tag.

The RFID tag may be programmed to initially indicate that check 814 has not been deposited. Account owner 802 may use scanner 812 to deposit check 814 into account 860 of bank 830 using communication pathway 820. After check 814 is deposited into account 860, bank 830 may wish to modify RFID tag 804 to indicate that check 814 has been deposited. Thus, when the information contained by RFID tag 804 is subsequently read, RFID tag 804 may indicate that check 814 has previously been deposited. Bank 830 may cause radio transmitter 806 to transmit a radio communication, through communication connection 840, to RFID tag 804 of check 814. The radio signal may cause RFID tag 804 to modify its information to indicate that check 814 has been previously deposited. Communication connection 840 may be of various types, including, but not limited to, a wireless cellular connection or an internet connection. Additionally, radio transmitter 806 may be of various types, including, but not limited to, a local internet access point and a cellular transceiver.

The type of scanner used may also be of various types. FIG. 9 illustrates the use of a scanner designed for the deposit and voiding of checks through remote means. Deposit machine 912 is configured to provide deposit services. Deposit machine 912 may be an integrated machine or a system having various parts, including a scanner to create a digital image of a check, such as check 914 and a stimulus generator to cause the application of a stimulus to check 914. Account owner 902 initiates deposit machine 912 to generate a digital image of check 914, the image being transmitted to bank 930 via communication connection 920 for deposit into account 960. After the bank processes the deposit of check 914, bank 930 may transmit a void signal to deposit machine 912 to initiate a void process.

The void signal may be transmitted using various communication methods, including, but not limited to, an internet connection, a telephone connection such as a wireless telephone, or a facsimile transmission if deposit machine 912 is configured to receive facsimile messages. Deposit machine 912 may void check 914 according to the configuration of deposit machine 912 and/or the void message received. For example, deposit machine 912 may be configured to apply an ultraviolet light in response to a void signal. Deposit machine 912 may also be configured to rescan check 914 and send the rescanned digital image to bank 930 to show that the void stimulus has been applied and that check 914 has been voided.

The methods and apparatus of the present subject matter may also be embodied in the form of program code that is transmitted over some transmission medium, such as over electrical wiring or cabling, through fiber optics, or via any other form of transmission, wherein, when the program code is received and loaded into and executed by a machine, such as an EPROM, a gate array, a programmable logic device (PLD), a client computer, a video recorder or the like, the machine becomes an apparatus for practicing the subject matter. When implemented on a general-purpose processor, the program code combines with the processor to provide a unique apparatus that operates to perform the functionality of the present subject matter.

While the present subject matter has been described in connection with the preferred embodiments of the various figures, it is to be understood that other similar embodiments may be used or modifications and additions may be made to the described embodiment for performing the same function of the present subject matter without deviating therefrom. Furthermore, it should be emphasized that a variety of computer platforms, including handheld device operating systems and other application specific hardware/software interface systems, are herein contemplated, especially as the number of wireless networked devices continues to proliferate. Therefore, the present subject matter should not be limited to any single embodiment, but rather construed in breadth and scope in accordance with the appended claims.

Finally, the disclosed embodiments described herein may be adapted for use in other processor architectures, computer-based systems, or system virtualizations, and such embodiments are expressly anticipated by the disclosures made herein and, thus, the present subject matter should not be limited to specific embodiments described herein but instead construed most broadly. 

1. A processor-implemented method of voiding a physical negotiable instrument, comprising: receiving a digital image of a physical negotiable instrument at a server computer from a user's scanner, wherein the physical negotiable instrument comprises at least one surface having a modifiable ink, wherein the modifiable ink is sensitive to a stimulus, wherein the digital image is generated by the user's scanner, wherein the server computer is remotely located from the user, wherein the stimulus is a heat or light source of the scanner; verifying the received digital image of the physical negotiable instrument at the server computer; transmitting a communication to the user's scanner subsequent to successful verification of the digital image of the physical negotiable instrument; and the user's scanner generating and applying the stimulus to the modifiable ink on the at least one surface of the physical negotiable instrument, the generated stimulus permanently modifying the negotiable instrument.
 2. The method of claim 1, wherein the physical negotiable instrument is a check.
 3. The method of claim 1, wherein the stimulus is the heat source of the scanner.
 4. The method of claim 1, wherein the digital image is generated through a scanning process performed at the scanner, wherein the stimulus of the modifiable ink is the scanner light source applied to the modifiable ink for a period of time.
 5. The method of claim 4, further comprising: receiving the communication to apply the stimulus; and configuring the scanner to scan the physical negotiable instrument at a predetermined scan speed, wherein the pre-determined scan speed is adequate to apply the scanner light source for the period of time.
 6. The method of claim 1, wherein the digital image is generated through a scanning process performed at a scanner, wherein the stimulus of the modifiable ink is the heat source of the scanner applied to the modifiable ink for a period of time.
 7. A system for voiding a physical negotiable instrument, comprising: a processor; a server including the processor; and a memory disposed in communication with the processor and storing processor-executable instructions, the instructions and the processor configured to: receive a digital image of the physical negotiable instrument at the server from a user's scanner, wherein the physical negotiable instrument comprises at least one surface having a modifiable ink, wherein the modifiable ink is sensitive to a stimulus, wherein the server is remotely located from the user, wherein the digital image is generated by the user's scanner, wherein the stimulus is a heat or light source of the scanner; verify the received digital image of the physical negotiable instrument at the server; and transmit a communication to the user's scanner subsequent to successful verification of the digital image of the physical negotiable instrument; generate and apply, by the scanner, the stimulus to the modifiable ink on the at least one surface of the physical negotiable instrument, the generated stimulus permanently modifying the physical negotiable instrument.
 8. The system of claim 7, wherein the physical negotiable instrument is a check.
 9. The system of claim 7, wherein the stimulus is the heat source of the scanner.
 10. The system of claim 7, wherein the digital image is generated through a scanning process performed at the scanner, wherein the stimulus of the modifiable ink is the scanner light source applied to the modifiable ink for a period of time.
 11. The system of claim 10, further comprising a third subsystem that: receives the communication to apply the stimulus; and configures the scanner to scan the physical negotiable instrument at a predetermined scan speed, wherein the pre-determined scan speed is adequate to apply the scanner light source for the period of time.
 12. The system of claim 7, wherein the digital image is generated through a scanning process performed at the scanner, wherein the stimulus of the modifiable ink is the heat source of the scanner applied to the modifiable ink for a period of time.
 13. A non-transitory computer-readable storage medium comprising computer-executable instructions for voiding a physical negotiable instrument, the computer-readable instructions comprising instructions to: receive a digital image of the physical negotiable instrument at a server from a user's scanner, wherein the physical negotiable instrument comprises at least one surface having a modifiable ink, wherein the modifiable ink is sensitive to a stimulus, wherein the server is remotely located from the user, wherein the digital image is generated by the user's scanner, wherein the stimulus is a heat or light source of the scanner; verify the received digital image of the physical negotiable instrument at the server; and transmit a communication to the user's scanner subsequent to successful verification of the digital image of the physical negotiable instrument; generate and apply, by the scanner, the stimulus to the modifiable ink on the at least one surface of the physical negotiable instrument, the generated stimulus permanently modifying the physical negotiable instrument.
 14. The non-transitory computer-readable storage medium of claim 13, wherein the physical negotiable instrument is a check.
 15. The non-transitory computer-readable storage medium of claim 13, wherein the stimulus is a the heat source of the scanner.
 16. The non-transitory computer-readable storage medium of claim 13, wherein the digital image is generated through a scanning process performed at the scanner, wherein the stimulus of the modifiable ink is the light source of the scanner applied to the modifiable ink for a period of time.
 17. The non-transitory computer-readable storage medium of claim 16, further comprising instructions to: receive the communication to apply the stimulus; and configure the scanner to scan the physical negotiable instrument at a predetermined scan speed, wherein the pre-determined scan speed is adequate to apply the scanner light source for the period of time.
 18. The non-transitory computer-readable storage medium of claim 13, wherein the digital image is generated through a scanning process performed at the scanner, wherein the stimulus of the modifiable ink is the heat source of the scanner applied to the modifiable ink for a period of time. 