Systems and methods for automated identity verification

ABSTRACT

A system and method in accordance with examples may include an identity verification kiosk. The identity verification kiosk may include a display comprising a user interface; a card reader; a document scanner; a printer; and a processor in data communication with a server and a database storing user information. The processor may be configured to receive an identification verification request from the user interface; receive user information via the document scanner or the card reader; retrieve user information from the database; verify the identity of a user; and print a unique identifier on a document using the printer.

FIELD OF THE DISCLOSURE

The present disclosure relates to systems and methods for automatedidentity verification.

BACKGROUND

Notarizing documents include interaction with a notary or a post office.In addition, interaction with an institution is needed to print acashier check. While these transactions are frequently used in manyfields associated with a variety of users, both transactions are oftenseparately processed, involve numerous applications, are susceptible tosecurity concerns such as forgery, and are subject to delay inprocessing.

These and other deficiencies exist. Accordingly, there is a need toprovide users with an appropriate solution that overcomes thesedeficiencies which provides increased security, more efficientprocessing, and enhanced user interaction experience.

SUMMARY OF THE DISCLOSURE

Embodiments of the present disclosure provide an identity verificationkiosk comprising: a display comprising a user interface; a card reader;a document scanner; a printer; and a processor in data communicationwith a server and a database storing user information. The processor maybe configured to receive an identification verification request from theuser interface; receive user information via the document scanner or thecard reader; retrieve user information from the database; verify theidentity of a user; and print a unique identifier on a document usingthe printer.

Embodiments of the present disclosure provide a kiosk for printingguaranteed funds checks comprising: a display presenting a userinterface; a card reader; a document scanner; a printer; and a processorin data communication with a database containing user information anduser account information. The processor may be configured to receive aguaranteed funds check request from the user interface; request userinformation from a user using the user interface; receive userinformation from one or more of the user interface, document scanner, orcard reader; verify the identity of a user; receive user accountinformation from the database; and upon determining the presence ofsufficient funds in a user account, print a guaranteed funds checkcomprising a unique identifier using the printer.

Embodiments of the present disclosure provide a method for recordingconfirmation of a user identity. The method may comprise receiving anidentification verification request from a user; scanning one or moreidentification documents; collecting identification informationassociated with the user; collecting live biometric data associated withthe user; verifying the identity of the user; scanning a document to bewitnessed; and witnessing the document by marking the document with aunique identifier.

BRIEF DESCRIPTION OF THE DRAWINGS

Various embodiments of the present disclosure, together with furtherobjects and advantages, may best be understood by reference to thefollowing description taken in conjunction with the accompanyingdrawings, in the several figures of which like reference numeralsidentify like elements, and in which:

FIG. 1A depicts a system according to an exemplary embodiment.

FIG. 1B depicts a kiosk according to an exemplary embodiment.

FIG. 2 depicts a kiosk configured to print guaranteed funds checksaccording to an exemplary embodiment.

FIG. 3 depicts a method for recording confirmation of a user identityaccording to an exemplary embodiment.

DETAILED DESCRIPTION

The following description of embodiments provides non-limitingrepresentative examples referencing numerals to particularly describefeatures and teachings of different aspects of the invention. Theembodiments described should be recognized as capable of implementationseparately, or in combination, with other embodiments from thedescription of the embodiments. A person of ordinary skill in the artreviewing the description of embodiments should be able to learn andunderstand the different described aspects of the invention. Thedescription of embodiments should facilitate understanding of theinvention to such an extent that other implementations, not specificallycovered but within the knowledge of a person of skill in the art havingread the description of embodiments, would be understood to beconsistent with an application of the invention.

As described herein, systems, such as a kiosk or automated tellermachine may be configured to verify identity of a user through, forexample a driver's license, passport, biometrics. Image recognition maybe performed by the kiosk to ensure that identification documents areindeed authentic. Once the determination is made that the documents arein fact authentic, the kiosk may determine one or more locations on thepages where a unique signature is to be signed and on the documents.Moreover, the kiosk may be used to print out cashier checks with aunique signature after verification of user identity.

FIG. 1A illustrates a system 100 according to an exemplary embodiment.As further discussed below, system 100 may include an identityverification kiosk 110; a network 120; a client device 130; a server140; and a database 150. Although FIG. 1A illustrates single instancesof components of system 100, system 100 may include any number ofcomponents.

System 100 may include an identity verification kiosk 110. The identityverification kiosk 110 is explained in further detail with reference toFIG. 1B.

System 100 may include a network 120. In some examples, network 120 maybe one or more of a wireless network, a wired network or any combinationof wireless network and wired network, and may be configured to connectto any one of components of system 100. For example, client device 130may be configured to connect to kiosk 110 via network 120. In someexamples, network 120 may include one or more of a fiber optics network,a passive optical network, a cable network, an Internet network, asatellite network, a wireless local area network (LAN), a Global Systemfor Mobile Communication, a Personal Communication Service, a PersonalArea Network, Wireless Application Protocol, Multimedia MessagingService, Enhanced Messaging Service, Short Message Service, TimeDivision Multiplexing based systems, Code Division Multiple Access basedsystems, D-AMPS, Wi-Fi, Fixed Wireless Data, IEEE 802.11b, 802.15.1,802.11n and 802.11g, Bluetooth, NFC, Radio Frequency Identification(RFID), Wi-Fi, and/or the like.

In addition, network 120 may include, without limitation, telephonelines, fiber optics, IEEE Ethernet 902.3, a wide area network, awireless personal area network, a LAN, or a global network such as theInternet. In addition, network 120 may support an Internet network, awireless communication network, a cellular network, or the like, or anycombination thereof Network 120 may further include one network, or anynumber of the exemplary types of networks mentioned above, operating asa stand-alone network or in cooperation with each other. Network 120 mayutilize one or more protocols of one or more network elements to whichthey are communicatively coupled. Network 120 may translate to or fromother protocols to one or more protocols of network devices. Althoughnetwork 120 is depicted as a single network, it should be appreciatedthat according to one or more examples, network 120 may comprise aplurality of interconnected networks, such as, for example, theInternet, a service provider's network, a cable television network,corporate networks, such as credit card association networks, and homenetworks.

System 100 may include a client device 130. For example, client device130, which may be a network-enabled computer. As referred to herein, anetwork-enabled computer may include, but is not limited to a computerdevice, or communications device including, e.g., a server, a networkappliance, a personal computer, a workstation, a phone, a handheld PC, apersonal digital assistant, a thin client, a fat client, an Internetbrowser, or other device. Client device 130 also may be a mobile device;for example, a mobile device may include an iPhone, iPod, iPad fromApple® or any other mobile device running Apple's iOS® operating system,any device running Microsoft's Windows® Mobile operating system, anydevice running Google's Android® operating system, and/or any othersmartphone, tablet, or like wearable mobile device.

The client device 130 device can include a processor and a memory, andit is understood that the processing circuitry may contain additionalcomponents, including processors, memories, error and parity/CRCcheckers, data encoders, anticollision algorithms, controllers, commanddecoders, security primitives and tamperproofing hardware, as necessaryto perform the functions described herein. The client device 130 mayfurther include a display and input devices. The display may be any typeof device for presenting visual information such as a computer monitor,a flat panel display, and a mobile device screen, including liquidcrystal displays, light-emitting diode displays, plasma panels, andcathode ray tube displays. The input devices may include any device forentering information into the user's device that is available andsupported by the user's device, such as a touch-screen, keyboard, mouse,cursor-control device, touch-screen, microphone, digital camera, videorecorder or camcorder. These devices may be used to enter informationand interact with the software and other devices described herein.

In some examples, client device 130 may execute one or moreapplications, such as software applications, that enable, for example,network communications with one or more components of system 100 andtransmit and/or receive data.

Client device 130 may be in communication with kiosk 110, one or moreservers 140 via one or more networks 120, and may operate as arespective front-end to back-end pair with server 140. Client device 130may transmit, for example from a mobile device application executing onclient device 130, one or more requests to kiosk 110. The one or morerequests may be associated with retrieving data from kiosk 110 or server140. Kiosk 110 or server 140 may receive the one or more requests fromclient device 130. Based on the one or more requests from client device130, kiosk 110 or server 140 may be configured to retrieve the requesteddata from one or more databases 150. Based on receipt of the requesteddata from the one or more databases 150, kiosk 110 or server 140 may beconfigured to transmit the received data to client device 130, thereceived data being responsive to one or more requests.

System 100 may include one or more servers 140. In some examples, server140 may include one or more processors, which are coupled to memory.Server 140 may be configured as a central system, server or platform tocontrol and call various data at different times to execute a pluralityof workflow actions. Server 140 may be configured to connect to the oneor more of kiosk 110, client device 130, and database 150.

System 100 may include a database 150. As explained above database 150may be called to retrieve data including user information. The data maybe requested by kiosk 110 or server 140 or client device 130. In someexamples, database 150 may be configured to communicate with one or morecomponents of system.

FIG. 1B illustrates a kiosk 110 according to an exemplary embodiment.The kiosk 110 may include kiosk 110 from FIG. 1A. The kiosk 110 maycomprise a display 101; a reader 103; a scanner 105; a printer 107; anda processor 109.

The display 101 may comprise a user interface 102. In some examples, oneor more requests from the user interface 102 may be transmitted toprocessor 109. For example, the processor 109 may be configured toreceive an identification verification request that is transmitted fromthe user interface 102.

The reader 103 may comprise a card reader. In some examples, reader 103may be configured to read and transmit data to processor 109. Forexample, the processor 109 may be configured to receive user informationvia the card reader 103.

The scanner 105 may comprise a document scanner. The document scannermay be configured to read and transmit data to processor 109. Forexample, the processor 109 may be configured to receive user informationvia the document scanner 105. In some examples, the document scanner 105may be configured to scan one or more documents after the printer 107has printed a unique identifier on the document.

The processor 109 may be in data communication with a server 140 and adatabase 150 storing information, including but not limited to userinformation. In some examples, the user information may comprise atleast one selected from the group of a first name, last name, date ofbirth, home address, work address, phone number, e-mail address, socialsecurity number, account number, driver's license number, passportnumber, identification card number, fingerprint identification, facialrecognition fingerprint, security challenge questions, and securitychallenge answers.

In some examples, the processor 109 may be configured to receive one ormore requests from the user interface 102. For example, the processor109 may be configured to receive an identification verification requestthat is transmitted from the user interface 102. In some examples, theprocessor 109 may be configured to receive user information via thedocument scanner 105. In other examples, the processor 109 may beconfigured to receive user information via the card reader 103. Theprocessor 109 may be configured to retrieve user information from viaserver 140 and/or the database 150. The processor 109 may be configuredto verify the identity of a user. The processor 109 may be configured tooutput information using one or more components of system 100. Forexample, the processor 109 may be configured to print a uniqueidentifier on a document using the printer 107. In some examples, afterthe printer 107 has printed a unique identifier on the document, thedocument scanner 105 may be configured to scan a document. In someexamples, the unique identifier may encode information associated withat least one of date, time, and location that the unique identifier wasprinted.

In some examples, the kiosk 110 may further comprise a finger printscanner 112. The finger print scanner 112 may be in data communicationwith the processor. The finger print scanner 112 may be configured toretrieve one or more finger print scans to verify the identity of theuser. In some examples, a first set of received one or more finger printscans may be compared by processor 109 to a second set of one or morereference finger print scans stored in database 150 and/or accessible toserver 140 to assist in identity verification of the user. In someexamples, kiosk 110 may be configured to capture biometric data andcompare it with one or more reference biometric data stored in database150 and/or accessible to server 140 to assist in the identityverification. In some examples, identity verification may beadditionally and/or alternatively performed by kiosk 110 based on photomatching associated with an identification card. For example, kiosk 110may be configured to capture one more images from an identification cardand compare it with one or more reference images stored in database 150and/or accessible to server 140 to assist in the identity verification.

In some examples, the kiosk 110 may further comprise an imaging device114 configured to gather image data associated with the user. Forexample, the processor 109 may be configured to receive image data fromthe imaging device 114 and verify the identity of the user based atleast in part on the received image data. The processor 109 may beconfigured to determine a fingerprint associated with the user. Forexample, the processor 109 may be configured to determine a real-time orlive facial recognition fingerprint associated with the user based onthe image data received from the imaging device 114. The processor 109may be configured to determine one or more fingerprints based on imagesassociated with documents. For example, the processor 109 may beconfigured to determine one or more identification facial recognitionfingerprints based on the one or more images associated with one or moreidentification documents and verify the identity of the user based inpart on comparing the one or more identification facial recognitionfingerprints to the live facial recognition fingerprint.

In some examples, the processor 109 may be configured to transmit one ormore factors to a device 130. For example, the processor 109 may beconfigured to transmit a second factor authentication to a mobile device130 associated with the user. In some examples, the second factorauthentication may comprise a request requiring a response from thedevice 130. For example, the second factor authentication may requestinput of at least one selected from the group of one or more usercredentials and biometric authorization. Upon receipt and determinationof authentication of the input transmitted from the device 130, theprocessor 109 may be configured to proceed with printing the uniqueidentifier on the document using the printer 107. In some examples, theprocessor 109 may be configured to account for timeout or delays duringscanning by requesting additional predetermined time for scan inputprior to restarting the scanning process. For example, the processor 109may be configured to cancel the transaction for security reasons shouldan error occur during scanning. In some examples, the error may beassociated with the user providing insufficient identity verificationinformation, as opposed to an outcome associated with a failure toidentify the user. In such a case, the processor 109 may be configuredto prompt additional identity verification information. In otherexamples, the error may be associated with an outcome indicative of theunavailability of the scanning for identity verification.

FIG. 2 illustrates a kiosk 200 configured to print guaranteed fundschecks. Although FIG. 2 illustrates single instances of components ofkiosk 200, kiosk 200 may include any number of components. FIG. 2 mayreference same or similar components of FIG. 1A and FIG. 1B. The kiosk200 may comprise a display 201; a reader 203; a scanner 205; a printer207; and a processor 209.

The display 201 may comprise a user interface 202. In some examples, oneor more requests from the user interface 202 may be transmitted toprocessor 209. For example, the processor 209 may be configured toreceive an identification verification request that is transmitted fromthe user interface 202.

The reader 203 may comprise a card reader. In some examples, reader 203may be configured to read and transmit data to processor 209. Forexample, the processor 209 may be configured to receive user informationvia the card reader 203.

The scanner 205 may comprise a document scanner. The document scannermay be configured to read and transmit data to processor 209. Forexample, the processor 209 may be configured to receive user informationvia the document scanner 205. In some examples, the document scanner 205may be configured to scan one or more documents after the printer 207has printed a unique identifier on the document.

The processor 209 may be in data communication with a server, such asserver 140 and a database, such as database 150, of FIG. 1A storinginformation, including but not limited to user information and useraccount information. Without limitation, the user information maycomprise at least one selected from the group of a first name, lastname, date of birth, home address, work address, phone number, e-mailaddress, social security number, account number, driver's licensenumber, passport number, identification card number, fingerprintidentification, facial recognition fingerprint, security challengequestions, and security challenge answers. Without limitation, the useraccount information may comprise at least one selected from the group ofchecking account, savings account, credit card, debit card, accountnumbers, transaction history, application information, and creditinformation.

In some examples, the processor 209 may be configured to receive one ormore requests from the user interface 202. For example, the processor209 may be configured to receive a guaranteed funds check request thatis transmitted from the user interface 202. In some examples, theprocessor 209 may be configured to request the user information from auser using the user interface 202. In some examples, the processor maybe configured to receive user information from the user interface 209.In some examples, the processor 209 may be configured to receive userinformation from the document scanner 205. In some examples, theprocessor may be configured to receive the user information from thecard reader 203. The processor 209 may be configured to verify theidentity of a user based on authenticated user information.

The processor 209 may be configured to retrieve user account informationfrom a database. The processor 209 may be configured to outputinformation using one or more components of kiosk 200. For example, theprocessor 209 may be configured to print, upon determining the presenceof sufficient funds in a user account, a guaranteed funds checkcomprising a unique identifier using the printer 207. The printedguaranteed funds check may be responsive to the guaranteed funds checkrequest from the user interface 202. In some examples, the uniqueidentifier may encode information associated with at least one of date,time, and location that the unique identifier was printed.

In some examples, the kiosk 200 may further comprise a finger printscanner 212. The finger print scanner 212 may be in data communicationwith the processor. The finger print scanner 212 may be configured toretrieve one or more finger print scans to verify the identity of theuser. In some examples, a first set of received one or more finger printscans may be compared by processor 209 to a second set of one or morereference finger print scans stored in database and/or accessible toserver to assist in identity verification of the user. In some examples,kiosk 200 may be configured to capture biometric data and compare itwith one or more reference biometric data stored in a database (similarto database 150) and/or accessible to a server (similar to server 140)to assist in the identity verification. In some examples, identityverification may be additionally and/or alternatively performed by kiosk200 based on photo matching associated with an identification card. Forexample, kiosk 200 may be configured to capture one more images from anidentification card and compare it with one or more reference imagesstored in the database and/or accessible to the server to assist in theidentity verification.

In some examples, the kiosk 200 may further comprise an imaging device214 configured to gather image data associated with the user. Forexample, the processor 209 may be configured to receive image data fromthe imaging device 214 and verify the identity of the user based atleast in part on the received image data. The processor 209 may beconfigured to determine a fingerprint associated with the user. Forexample, the processor may be configured to determine a real-time orlive facial recognition fingerprint associated with the user based onthe image data received from the imaging device 214. The processor 209may be configured to determine one or more fingerprints based on imagesassociated with documents. For example, the processor 209 may beconfigured to determine one or more identification facial recognitionfingerprints based on the one or more images associated with one or moreidentification documents and verify the identity of the user based inpart on comparing the one or more identification facial recognitionfingerprints to the live facial recognition fingerprint.

In some examples, the processor 209 may be configured to transmit one ormore factors to a device. For example, the processor may be configuredto transmit a second factor authentication to a mobile device associatedwith the user. In some examples, the second factor authentication maycomprise a request requiring a response from the device. For example,the second factor authentication may request input of at least oneselected from the group of one or more user credentials and biometricauthorization. Upon receipt and determination of authentication of theinput transmitted from the device, the processor 209 may be configuredto proceed with printing the unique identifier on the document using theprinter 207. In some examples, the second factor authentication may bepart of verifying identity of the user.

FIG. 3 illustrates a method 300 for recording confirmation of a useridentity. FIG. 3 may reference same or similar components of system 100of FIG. 1A, kiosk 110 of FIG. 1B, and kiosk 200 of FIG. 2 .

At block 305, method may include receiving an identificationverification request from a user.

At block 310, method may include scanning one or more identificationdocuments.

At block 315, method may include collecting identification informationassociated with the user. In some examples, method 300 may furthercomprise requesting consent from the user to collect identificationinformation or biometric information associated with the user. Forexample, the kiosk may be configured to transmit a request for consentto the device of the user in order to obtain at least one selected fromthe group of identification information and biometric informationassociated with the user.

At block 320, method may include collecting live biometric dataassociated with the user. In some examples, collecting live biometricdata associated with the user may comprise receiving image dataassociated with a user face and establishing a facial recognitionfingerprint based on image data. In some examples, collecting livebiometric data associated with the user may comprise recording dataassociated with one or more fingerprints of the user using a fingerprintscanner.

At block 325, method may include verifying the identity of the user. Insome examples, this may include comparison of collected live biometricdata with reference data. For example, method 300 may further comprisereceiving biometric information associated with the user from anidentification document and comparing the document biometric informationto the live biometric information. In some examples, method 300 mayfurther comprise comparing the collected identification informationassociated with the user to previously recorded identificationinformation associated with the user.

At block 330, method may include scanning a document to be witnessed.

At block 335, method may include witnessing the document by marking thescanned document with a unique identifier. For example, the uniqueidentifier may comprise a computer readable image and a timestamp. Insome examples, the unique identifier may comprise a non-sequentialpseudo-randomly generated identifier. Depending on jurisdictionalrequirements, notaries for a document may differ from those of certifiedcheck. Thus, depending on the document type, one or more selected fromthe group of the unique identifier, timestamp, stamp or seal, anddigital signature may be included for notarization purposes. Method 300may further comprise receiving information associated with a previouslyprinted unique identifier and determining differences between apreviously marked document and the scanned document to be witnessed.

In some examples, method 300 may further comprise applying a predictivemodel to determine where a document should be marked. For example, thepredictive model may be developed by machine learning using at least onealgorithm selected from the group of a gradient boosting machinealgorithm, a logistic regression algorithm, and a neural networkalgorithm.

It is further noted that the systems and methods described herein may betangibly embodied in one of more physical media, such as, but notlimited to, a compact disc (CD), a digital versatile disc (DVD), afloppy disk, a hard drive, read only memory (ROM), random access memory(RAM), as well as other physical media capable of data storage. Forexample, data storage may include random access memory (RAM) and readonly memory (ROM), which may be configured to access and store data andinformation and computer program instructions. Data storage may alsoinclude storage media or other suitable type of memory (e.g., such as,for example, RAM, ROM, programmable read-only memory (PROM), erasableprogrammable read-only memory (EPROM), electrically erasableprogrammable read-only memory (EEPROM), magnetic disks, optical disks,floppy disks, hard disks, removable cartridges, flash drives, any typeof tangible and non-transitory storage medium), where the files thatcomprise an operating system, application programs including, forexample, web browser application, email application and/or otherapplications, and data files may be stored. The data storage of thenetwork-enabled computer systems may include electronic information,files, and documents stored in various ways, including, for example, aflat file, indexed file, hierarchical database, relational database,such as a database created and maintained with software from, forexample, Oracle® Corporation, Microsoft® Excel file, Microsoft® Accessfile, a solid state storage device, which may include a flash array, ahybrid array, or a server-side product, enterprise storage, which mayinclude online or cloud storage, or any other storage mechanism.Moreover, the figures illustrate various components (e.g., servers,computers, processors, etc.) separately. The functions described asbeing performed at various components may be performed at othercomponents, and the various components may be combined or separated.Other modifications also may be made.

In the preceding specification, various embodiments have been describedwith references to the accompanying drawings. It will, however, beevident that various modifications and changes may be made thereto, andadditional embodiments may be implemented, without departing from thebroader scope of the invention as set forth in the claims that follow.The specification and drawings are accordingly to be regarded as anillustrative rather than restrictive sense.

We claim:
 1. A non-transitory computer-accessible medium containingexecutable instructions, wherein, when executed by a computer hardwarearrangement comprising a processor and a printer, and the computerhardware arrangement is configured to perform procedures comprising:applying a predictive model to determine a marking location on adocument; and printing a unique identifier at the marking location. 2.The non-transitory computer-accessible medium of claim 1, wherein thepredictive model is developed by machine learning using at least onealgorithm selected from the group of a gradient boosting machinealgorithm, a logistic regression algorithm, and a neural networkalgorithm to develop the predictive model.
 3. The non-transitorycomputer-accessible medium of claim 1, wherein the unique identifiercomprises a computer-readable image and a timestamp.
 4. Thenon-transitory computer-accessible medium of claim 1, wherein the uniqueidentifier comprises a non-sequential identifier.
 5. The non-transitorycomputer-accessible medium of claim 4, wherein the non-sequentialidentifier is pseudo-randomly generated.
 6. The non-transitorycomputer-accessible medium of claim 1, the procedures furthercomprising: collecting identification information associated with auser; and collecting live biometric data associated with the user. 7.The non-transitory computer-accessible medium of claim 6, the proceduresfurther comprising: receiving biometric information associated with theuser from an identification document; and comparing the documentbiometric information to the live biometric information.
 8. Thenon-transitory computer-accessible medium of claim 6, wherein:collecting live biometric data comprises receiving image data associatedwith the user's face, and the procedures further comprise establishing afacial recognition fingerprint based on image data.
 9. Thenon-transitory computer-accessible medium of claim 6, wherein:collecting live biometric data comprises receiving image data associatedwith the user's face, and the procedures further comprise establishing afacial recognition fingerprint based on image data.
 10. Thenon-transitory computer-accessible medium of claim 6, the proceduresfurther comprising requesting consent from the user to collectidentification information or biometric information associated with theuser.
 11. A system, comprising: a processor; and a printer, wherein theprocessor applies a predictive model to determine a marking location ona document, and wherein the printer prints a unique identifier at themarking location.
 12. The system of claim 11, wherein the uniqueidentifier encodes information associated with at least one selectedfrom the group of the date, time, and location the unique identifier wasprinted.
 13. The system of claim 11, further comprising: an input devicecomprising at least one selected from the group of a document scanner, acard reader, and a fingerprint scanner, wherein the processor receivesuser information from the input device, and wherein the processorcompares the received user information to previously received userinformation stored in a database.
 14. The system of claim 13, wherein:the input device comprises the fingerprint scanner, the processorreceives a fingerprint associated with the user from the fingerprintscanner, and the processor compares the received fingerprint with apreviously received fingerprint stored in the database.
 15. The systemof claim 11, wherein the document comprises at least one selected fromthe group of a cashier's check and a certified check.
 16. The system ofclaim 11, further comprising: a document scanner, wherein the documentscanner scans the document after the printer prints the uniqueidentifier.
 17. The system of claim 11, wherein the unique identifierencodes information associated with at least one selected from the groupof a date the unique identifier was printed, a time the uniqueidentifier was printed, and a location where the unique identifier wasprinted.
 18. A method, comprising: applying, by a processor, apredictive model to determine a marking location on a document; andprinting, by a printer, a unique identifier at the marking location. 19.The method of claim 18, wherein the unique identifier encodesinformation associated with at least one selected from the group of thedate, time, and location the unique identifier was printed.
 20. Themethod of claim 18, further comprising: receiving information associatedwith a previously printed unique identifier; and determining adifference between the document and a previously marked document.