System and method of identity verification

ABSTRACT

A system and method of verifying the identity of a user or registrant. The user or registrant provides identification information and registration information. The identification information may be a visual representation of an identifying item associated with location information. In some embodiments, the identification information may be a visual representation of a government issued identity. An identification module verifies the identification information and compares the verified identification information to the registration information.

INCORPORATION BY REFERENCE OF PRIORITY APPLICATIONS

Any and all applications for which a foreign or domestic priority claimis identified in the Application Data Sheet as filed with the presentapplication are hereby incorporated by reference under 37 CFR 1.57. Thisapplication is a continuation of U.S. application Ser. No. 17/239,386,filed Apr. 23, 2021, which is a continuation of U.S. application Ser.No. 14/967,083, filed Dec. 11, 2015, now U.S. Pat. No. 10,991,061, whichis a continuation of U.S. application Ser. No. 14/208,421, filed Mar.13, 2014, now U.S. Pat. No. 9,311,646, which claims the benefit ofpriority to U.S. Application No. 61/792,749, filed Mar. 15, 2013, theentire contents of which are hereby incorporated by reference.

BACKGROUND OF THE INVENTION Field

This disclosure relates to identity verification and mobileapplications. Specifically, the disclosure relates to verifying anindividual's identity using electronic means.

Background

Institutions are increasingly providing access for a user to conducttransactions and exchange information using an application available ona mobile electronic device or a home computer. Frequently, thetransactions or information is confidential, and may be subject toinstitutional or legal requirements, such as opening an account orsigning up with or to provide or receive services from an entity.Customers like the convenience and access offered by mobile applicationsand, the institutions like the simplified transactions and/or increasedrevenues. Transactions conducted online or via mobile applications oftenrequire a new customer to apply for enrollment which may includeapplying for an account. To apply for the enrollment, an applicanttypically must provide positive proof of identity. Providing proof ofidentity online or via a mobile application is made more difficult bygrowing concern regarding fraud. Identity thieves can steal or otherwisegain access to personal information of a victim and use the informationto fraudulently obtain an enrollment in a membership, a merchant or acommercial account, under a victim's name. Additionally, someinformation and transactions are regulated by state and/or federal lawsuch as, for example, information and transactions involving the U.S.Mail, or other entities.

Accordingly, a system for verifying identity online or through a mobileapplication is desirable.

SUMMARY

In one aspect described herein a system for verifying identity comprisesa server configured to receive registration information andidentification information from a registrant; an identification modulein communication with the server, wherein the identification module isconfigured to receive the registration information and theidentification information, and wherein the identification module isconfigured to verify the identification information, and to compare theverified identification information to the registration information; andwherein the server is configured to verify the identity of theregistrant based on the comparison of the verified identificationinformation to the registration information.

In some embodiments, the identification information comprises a visualindication of a government issued identification.

In some embodiments, the identification information comprises a visualrepresentation of an identifying item.

In some embodiments, the visual representation of the identifying itemis associated with location information.

In some embodiments, the identification module is configured to verifythe visual representation of the identifying item by comparing locationinformation in the identification module with the location informationassociated with the visual representation of the identifying item.

In some embodiments, the identification module comprises more than oneidentification module.

In some embodiments, wherein the identification module is incommunication with a third party verification database or governmentagency verification database.

In some embodiments, the identification module comprises a plurality ofidentification modules, and wherein another of the plurality ofidentification modules is in communication with a location verificationdatabase.

In another aspect, a system for verifying identity comprises a serverconfigured to receive registration information from a registrant; anidentity proofing system in communication with the server, wherein theidentity proofing system is configured to receive a first portion of theidentification information from the server and provide a firstverification of the first portion of the registration information to theserver; an identity database in communication with the server, whereinthe identity database is configured to receive a second portion of theidentification information from the server and provide a secondverification of the second portion of the registration information tothe server; and wherein the server is further configured to receive thefirst verification of the first portion of the identificationinformation from the identity proofing system, and the secondverification of the second portion of the identification informationfrom the identity database, and to verify the identity of the registrantbased on the first and second verifications.

In some embodiments, the registration and identification information isprovided for registration of an account.

In some embodiments, the server verifies the identity of the registrantthe server authorizes the creation of the account.

In some embodiments, the server is configured to receive registrationand identification information from a mobile application.

In some embodiments, the identity proofing system is in communicationwith a third party database, wherein the identity proofing system isconfigured to communicate the first portion of the identificationinformation to the third party database.

In some embodiments, the first portion of the identification informationcomprises identity information.

In some embodiments, the identity information comprises identityinformation available in the third party database.

In some embodiments, the identity information comprises driver licenseinformation.

In some embodiments, the second portion of the identificationinformation comprises a visual indication.

In some embodiments, the visual indication further comprises arepresentation of computer readable code.

In some embodiments, the visual indication is accompanied by a locationidentifier.

In some embodiments, the visual indication is an image of a mail piecehaving a barcode thereon.

In some embodiments, the identification database comprises addressinformation and location information.

In some embodiments, the system further comprises a biometric analysismodule in communication with the server, wherein the biometric analysismodule is configured to receive a third portion of the identificationinformation from the server, and the server is further configured toreceive verification information.

In some embodiments, the third portion of the identification informationcomprises a biometric identifier.

In some embodiments, the biometric identifier is a fingerprint.

In another aspect, a method of verifying an identity comprises receivingregistration information from a registrant; receiving identificationinformation from a registrant; communicating the identificationinformation to an identification verification module; verifying theidentification information; comparing the registration information withthe verified identification information; and verifying the identity ofthe registrant based on the comparison of the registration informationwith the verified identification information.

In some embodiments, verifying the identification information comprisescommunicating identification information to an identification module.

In some embodiments, the identification information comprises a visualrepresentation of a government issued identification.

In some embodiments, the identification module communicates with agovernment agency database.

In some embodiments, the identification information comprises a visualrepresentation of an identifying item.

In some embodiments, the visual representation of the identifying itemis associated with location information.

In some embodiments, the identification module communicates with adatabase of location identification information.

In some embodiments, the identity of the registrant comprises comparinglocation identification information with the location informationassociated with the visual representation of the identifying item.

In another aspect, a system for verifying identity comprises means forreceiving registration information from a registrant; means forreceiving identification information from a registrant; means forcommunicating the identification information to an identificationverification module; means for verifying the identification information;means for comparing the registration information with the verifiedidentification information; and means for verifying the identity of theregistrant based on the comparison of the registration information withthe verified identification information.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram depicting an embodiment of a system foridentity verification.

FIG. 2 is a flowchart describing a method for verifying a user'sidentity.

FIG. 3 is a diagram depicting a process for verifying identity.

DETAILED DESCRIPTION

The following detailed description is directed to certain specificembodiments of the development. In this description, reference is madeto the drawings wherein like parts or steps may be designated with likenumerals throughout for clarity. Reference in this specification to “oneembodiment,” “an embodiment,” or “in some embodiments” means that aparticular feature, structure, or characteristic described in connectionwith the embodiment is included in at least one embodiment of theinvention. The appearances of the phrases “one embodiment,” “anembodiment,” or “in some embodiments” in various places in thespecification are not necessarily all referring to the same embodiment,nor are separate or alternative embodiments mutually exclusive of otherembodiments. Moreover, various features are described which may beexhibited by some embodiments and not by others. Similarly, variousrequirements are described which may be requirements for someembodiments but not other embodiments.

Certain embodiments described herein can be used to verify the identityof a user who registers or requests an account with an entity. A user orregistrant, when requesting an account or registration online or via amobile application, may provide registration information, such as aname, phone number, email, address, and the like. In order to verify theidentity of the registrant, the provider of the account or registrationrequests additional identification information. The additionalidentification information, which may be provided electronically, maythen be used for verification of the user or registrant's identity. Theelectronic verification described herein can be used in lieu of anin-person verification, which may be inconvenient and time-consuming.

Some embodiments described herein use or compare the registrantidentification information with a variety of sources in order to verifythe identity of a user or applicant. As a non-limiting example, theUnited States Postal Service (USPS) may require that a user register andbe approved for an account for using the gopost system, which is asystem of secure parcel lockers, as described in U.S. ProvisionalApplication No. 61/738,085, filed Dec. 17, 2012, the entire contents ofwhich are hereby incorporated by reference. Because the mails areprotected by federal law, and because the USPS and individuals have avested interest in the security of items and articles sent through themails, the identity of a user registering for an account may desirablybe verified to minimize fraud and the sending of contraband articles.

In order to increase the convenience of a user or registrant duringaccount creation, a registration request, access request, authorizationrequest, transaction request, or any other request authorization, theuser or registrant may access the registration, account, authorization,or transaction request via a mobile application. The mobile applicationmay be implemented on, for example, a personal electronic device, mobilesmart phone, tablet computer, or the like. Where a user or registrantemploys a smart phone, tablet computer or similar mobile communicationdevice, the user or registrant may provide photographic, visual, andother types of identity information to the server 120 for verification.When using a location detection enabled mobile communication device(e.g., having GPS or network location features), a user or registrantmay also submit location information as part of the registrant'sinformation for use in verification.

FIG. 1 depicts a block diagram of a system for verifying identity. Anidentification system 100 comprises an application 110, a server 120, anidentity proofing system (IPS) 130, an identification module 140, and abiometric analysis module 150.

The application 110 comprises an electronic interface, such as isavailable on a website via the internet or via a mobile application. Theapplication 110 may be stored and/or accessed from a smart phone,personal digital assistant, tablet computer, laptop computer, or othermobile communication device. The application 110 is configured tointerface with the server 120 via a wired or wireless communicationmethod. Where the application 110 is available on a smart phone or othermobile communication device, the interface between the application 110and the server 120 may advantageously be via a cellular network, awireless fidelity network using an IEEE 802.11x protocol, a Bluetoothconnection, or any other desired wireless communication method.

The application 110 is configured to allow a user or registrant toprovide registration information to the server 120. The registrationinformation may be a name, address, phone number, email, and the like,which the registrant inputs as part of the registration or request foran account or other similar request. The application 110 may submit theuser provided registration information to the server 120.

The application 110 is additionally configured to request and receiveidentification information, such as identifying documents, from the useror registrant. In some embodiments, the identification information maycomprise visual depictions, such as photographs; location data, such asGPS coordinates; metadata; and account information, such as accountinformation relating to a cellular telephone account, a utility account,or account at a financial institution or other service provider. Theapplication is configured to submit the identification information tothe server 120 as part of a registration process for an account or otherservices where identity is desirably verified, where the identificationinformation is stored and/or processed.

The server 120 comprises a processor 121, a memory 122 storinginstructions for directing the operation of the processor, acommunications module 123, and an image processor 124. The processor 121directs the operation of the server, including the interface andcommunication of the server 120 with the various other components ofsystem 100. The communications module 123 is configured to send andreceive information from the various components of the system 100, andfacilitates communication between the server 120 with the variouscomponents of the system 100. The communication module may communicatevia wired and/or wireless methods and protocols as described herein. Theimage processor 124 may be configured to receive a visualrepresentation, such as a photograph, as identification information andmay be configured to analyze the visual information, including readingcomputer-readable codes, alphanumeric text, performing optical characterrecognition (OCR) of the visual information, and any other desiredvisual analysis. In some embodiments, the image processor 124 is furtherconfigured to receive, identify, and/or interpret location information,such as GPS coordinates, network location coordinates, or other locationinformation. In some embodiments, the location information may beprovided with the visual representation, such as, for example, attachedto a photograph as metadata, or in a separate transmission with thevisual representation.

In some embodiments, a registrant's or user's identity may be desirablyverified using multiple pieces of identification information. Theapplication 110 may request and receive more than one piece or portionof identification information, and transmit the more than one portion ofidentification information to the server 120. The server 120 isconfigured to identify and separate the pieces or portions ofinformation, and is configured to route the pieces of information to thecorresponding parts of the system 100. For example, where the registrantor user provides personal contact or third party account informationand/or a visual identifier, the server 120 may communicate the personalcontact or third party account information to the IPS 130 and the visualidentifier to the identification module 140. This process will bedescribed in greater detail below.

The IPS 130 is in communication with the server 120. In someembodiments, the IPS 130 is in further communication with an externalverification system 132, and a government verification system 134. Theexternal verification system 132 may be, for example, a database or thelike maintained by a cellular carrier, a financial institution, autility, a commercial entity such as a retailer or delivery service, anemail provider, or other similar entities. The government verificationsystem 134 may be a state driver license agency, a federal passportagency, a military agency, the postal service, the social securityadministration, or any other similar governmental entity.

The IPS 130 is configured to receive the registrant's identificationinformation from the server 120, which the processor 121 and/or theimage processor has modified from the form in which it was provided bythe user or registrant via the application 110. In some embodiments, theregistrant may provide information relating to an account the user haswith a third party or a governmental entity via application 110, whichthe server 120 would then communicate to the IPS 130. The IPS 130 isconfigured to receive the identification information, identifyingdocuments, and the like from the server and submit the information tothe external verification system 132 or the government verificationsystem 134, as appropriate.

In a non-limiting example, the identification information may comprise acellular telephone number or account number provided automatically bythe mobile communication device on which the application 110 is running,if the registrant is using a mobile communication device to access theapplication 110. The application 110 automatically submits the telephonenumber associated with the mobile communication device on which theapplication 110 is being used to the server. IPS 130 is configured toreceive the cellular telephone number from the server 120, and query theexternal verification system 132, which retrieves the contactinformation maintained by the cellular carrier associated with thecellular telephone number. The IPS 130 is then configured to compare thereceived contact information with the registration information providedby the registrant. If the information matches, the IPS 130 is configuredto verify the identification information and transmit a verification tothe server 120.

The IPS 130 is similarly configured to query the government agency. Aregistrant may submit a photograph or visual representation of agovernment issued identification, which is received into the server 120.The image processor 124 is configured to process the visualrepresentation and identify a security feature and/or a name, address,social security number, and other information contained on a governmentissued identification. The IPS 130 is configured to submit thisinformation to the government verification system 134. The governmentverification system 134 may provide a verification of a security featureor other verification, which the IPS 130 may transmit to the server 120.

The identification module 140 is configured to receive a portion of aregistrant's information from the server 120. For example, a registrantmay provide identification information and/or location information intothe application 110, which the server 120 provides to the identificationmodule 140. The identification module 140 verifies the receivedinformation with the information stored in an identification database145. In some embodiments, the identification information provided to theidentification module 140 may be a visual representation of anidentifying item, such as a mail piece, the facade of a home, a recentlyreceived item from a merchant, or any other desired identifying item.The identification module 140 may be configured to interface with theidentification database 145. The identification database 145 may containidentity and location information. In some embodiments, theidentification module 140 may be configured to receive a barcode and/ortext information from the server 120, such as from a visual imageprocessed by the image processor 124 as described elsewhere herein. Theidentification module 140 may be configured to query the identificationdatabase 145 using the received information from the server, and toassociate identity information, such as addresses, with locationinformation, such as GPS coordinates. The identification module 140 maythen compare identity and location information from the identificationdatabase 145 with the location information and any information receivedfrom the visual representation of the identifying item. This processwill be described in more detail below.

The biometric analysis module 150 may comprise a database of biometricinformation, and may be configured to perform biometric analysis on aportion of the information received from a registrant via theapplication 110. In some embodiments, the biometric analysis module 150may perform facial recognition of a photograph of a user's face,fingerprint analysis and matching, or other biometric analysis. Thebiometric analysis module 150 may be configured to access externaldatabases containing biometric information. The biometric analysismodule 150 may be configured to analyze the biometric information fromthe user or registrant, and compare the biometric information to verifythe identity of the user or registrant.

FIG. 2 is a flowchart depicting a process 200 for verifying identity ofa user or registrant. The process 200 beings in block 202 wherein theuser or registrant's information is received into the application 110.The user or registrant provides registration information as part of theregistration process, and the application 110 also requests and receivesidentification information. The identification information provided bythe user may comprise one or more portions. For example, in someverification situations, the application 110 may request or require twoseparate types of identification information in order to verify theidentity of the user or registrant. In some embodiments, theidentification information comprises a first portion and a secondportion.

In some embodiments, the first portion of the information may compriseidentity information such as the user's or registrant's unique mobiletelephone number, account number, or other similar identity information.In some embodiments, the information is provided using a mobileapplication on the user or registrant's smart phone. When using theapplication 110 to register for an account, the application 110 mayautomatically provide the user's mobile telephone number, cellularaccount number, or other information associated with the smart phone. Insome embodiments, the first portion may comprise a photograph of auser's government issued photo identification, such as a driver license,passport, military identification, or the like.

In some embodiments, the second portion of the identificationinformation may comprise location information. In some embodiments, theregistrant or user may provide a photograph or electronic image whichcontains location information. In some embodiments, a user or registrantsubmits a photograph of an identifying item, which may be taken on theuser's smart phone, the photograph containing location information, forexample, saved in metadata. For example, the user or registrant mayenable GPS tracking on his/her smart phone prior to taking a photographof the identifying item. The application 110 may submit the photographof the identifying item together with the GPS coordinates of the smartphone at the time the photograph is taken. In some embodiments, theidentifying item may be the government issued photo identification,described above. In some embodiments, the identifying item may be a mailpiece which has been delivered to the user or registrant's address andwhich displays the user or registrant's name and address, and may have abarcode. In some embodiments, the identifying item may be the facade ofa house, a unique household item, an item recently purchased from aretailer, and the like.

The process 200 moves to block 204 wherein the server 120 analyzes andpartitions the first and second portions of the identificationinformation and evaluates them. The image processor 124 may process animage, photograph, or electronic image provided as described above,including OCR of any written text. The server 120 partitions theinformation by determining which portion of the information is the firstportion and which is the second portion, and prepares each forcommunication to the appropriate part of the system 100. In someembodiments, the application 110 may be configured to submit the firstand second portions of the identification information in two distinctsubmissions, which are partitioned and communicated by the server 120.In some embodiments, the application 110 may submit all theidentification information and the server 120 partitions theidentification information based the particular information received.For example, if the server 120 receives and recognizes that some of theidentification information is a photograph of a driver license, theserver 120 partitions that portion of the information. If the server 120receives a photograph of an identifying item, the server 120 recognizesthe identifying item.

The process 200 proceeds to block 206 wherein the server 120 providesthe first portion of the registrant's identification information to theIPS 130. The process 200 then moves to block 208 wherein the server 120provides the second portion of the registrant's identificationinformation to the identification module 140.

The process next moves to block 210, wherein the IPS 130 compares thefirst portion of the identification information to the registrationinformation. In some embodiments, comparing the first portion of theidentification information comprises receiving and evaluating the firstportion of the identification information. For example, where the firstportion of information is a unique mobile number, a cellular account,bank account information, or similar information, the IPS 130 providesthat information to the external identification verification system 132,which may be, a third party institution such as, for example, a cellularprovider, a financial institution, or the like. The externalidentification system 132 receives the first portion of the informationand accesses a registrant or users stored information, and the externalidentification system provides the user's stored information to the IPS130. The IPS compares the stored information held by third partyinstitution and received from the external identification system 132 tothe identification information provided by the registrant. For example,the user or registrant may have provided initial identificationinformation when applying to create an account. The IPS 130 receives thecompares the account information associated with the unique mobilenumber or account information, such as a name, address, email address,phone number, etc., with the initial identification information. In someembodiments, the application 110 may instruct the third partyinstitution to contact the registrant via voice call, SMS message, emailwith a verification link, or the like, and provide the registrant theability to confirm or deny the attempt at registration. By informing apotential registrant of an attempt to register for an account to confirmthe registration, fraudulent registrations may be reduced, and thepotential registrant is alerted to the attempt by another to registerfor an account using another's information.

In some embodiments, the first portion of the identification informationis government issued identification. In this case, the IPS 130 providesthe information to the government verification system 134 for thegovernment organization which issued the identification, and requestsverification of the information or validity of the government issuedidentification. This may comprise providing an indication of a securityfeature, a computer readable code, and the like, which appears on thegovernment issued identification to the agency for verification that thegovernment issued identification is not counterfeit or otherwiseinvalid.

The process 200 moves to block 212, wherein the identification module140 compares the second portion of the information with the informationstored in the identification database. For example, the user orregistrant provides a visual representation or photograph of anidentifying item upon registration, and associated location information.In some embodiments, the location information comprises GPS coordinatesprovided by the GPS unit in a smart phone used to take the picture orgenerate the visual representation of the identifying item. In someembodiments, the location information is the current GPS coordinates ofthe smart phone at the time the visual representation of the identifyingitem is generated. The identification module 140 receives the visualrepresentation, or in some embodiments, information derived from thevisual representation, of the identifying item and the correspondinglocation information. The identification module 140 then compares thevisual representation, or the information derived from the visualrepresentation together with the location information, with data in theidentification database 145. For example, a user enables GPS on his/hersmart phone and takes a photograph of a piece of mail which has beendelivered to the user's address. The user takes the photograph of themail piece while the user is at the address on the mail piece. The imageprocessor 124 receives the photograph of the mail piece, and convertsthe information from the photograph to, for example, a name, address,and the like, for the user or registrant. The identification module 140then compares the GPS location received from the user or registrant withthe address obtained from the photograph of the mail piece. If the GPSlocation of the smart phone at the time the photograph of the mail piecewas taken matches the address obtained from the photograph of the mailpiece, the identification module 140 verifies the identity of the user,and provides verification to the server 120.

In some embodiments, the identifying item may be a photograph of auser's house or an item recently purchased from a vendor. Theidentification module 140 may compare the photograph with the image of ahouse corresponding to the address provided by the user. For example,the identification database 145 may comprise a collection of images ofhouses, such as that available on Google® maps. If the image containedin the identification database 145 matches the photograph of the houseand indicates the photograph was taken at the correct location, theidentification module 140 may verify the identity of the user, andprovide the verification to the server 120.

Where the identifying item is a recently purchased item, theidentification database 145 may comprise sales information from avendor, such as a list of recent purchases. If the vendor confirms thata purchase matching the description, dates, or timing of the item in thephotograph did occur, the identification module may verify the user'sinformation and provide the verification to the server 120.

The process 200 moves to decision state 214, wherein it is determinedwhether the first portion of the identification information is verifiedby the IPS 130 as described above. If the IPS 130 has verified the firstportion of the identification information, the process 200 moves todecision state wherein it is determined whether the identificationmodule 140 has verified the second portion of the information. If boththe first portion and the second portion of the information areverified, the process 200 moves to block 218, wherein the server 120grants registration, authorization for the requested transaction, opensthe account, or whatever other procedure the user or registrantrequested. In some embodiments, the server 120 communicates with anexternal computer or computer system to verify the user or registrantidentity and to communicate that the user or registrant's identity hasbeen verified, and an account can be opened, authorization can begranted, a transaction may be conducted, or the like.

In some embodiments, process 200, may require that only the first or thesecond portions, and not necessarily both, be verified in order toidentify the user or registrant. In some embodiments, for example,process 200 may not comprise blocks 206, 210 and 214. In someembodiments, process 200 may not comprise blocks 208, 212, and 216. Aperson of skill in the art will understand that process 200 isexemplary, and steps thereof may be omitted or performed in a differentorder without departing from the scope of the present development. Insome embodiments, the system may require verification of a third portionof the identification information using a biometric analysis module 150as described above.

The process 200 next moves to block 220, wherein the account creation iscommunicated to the application 110, whereupon the user or registrantmay receive the confirmation of the account creation, and may receiveany data associated with that, such as the account number, a username, apassword, and the like. Upon creation of the account, the applicationmay receive a computer readable code, such as a barcode or QR code whichuniquely identifies the registrant and encodes or is linked to theregistrant's credentials. The computer readable code can be received bythe application and graphically displayed on the registrant's mobilecommunication device, in the form of a virtual identification card. Thecomputer readable code may be stored on the mobile communication device,to be accessed by the registrant at a later time. The process ends inblock 222.

If the first or second portion of the identification information is notverified in block 214 or 216, the process moves to block 224, whereinthe server 120 communicates to the application 110 that the informationcould not be verified, and that an account is not opened or that aregistration has not been created. The process 200 next moves to block226 wherein the server 120 requests that additional information beprovided, or that the user or registrant resubmit the information.

The process 200 moves to decision state 228, wherein it is determined ifa user or registrant has provided additional information. If additionalinformation is not provided, the process 200 ends in block 230. If theuser provides additional information, the process returns to block 202,wherein the user or identification information is received into theserver 120, and the process continues as described above.

In some embodiments, the application 110 can be provided by and/or usedto access a distribution network, such as the United States PostalService (USPS). The application 110 can specifically be used to access asystem of secure parcel lockers as described in greater detail in theabove-referenced application. The mobile application may providefunctionality to allow a user to access and/or request information aboutthe system of secure parcel lockers and articles purchased by, orintended for delivery to, the user. For example, after identity isverified, the registrant accesses the mobile application which canprovide push notifications when an article is intended for delivery tothe registrant. The push notification can be an email, an SMSnotification, or any other desired notification. In some embodiments,the mobile application can send similar notifications to the shipper,sender, or originator of the item when the item has been shipped or whenthe registrant retrieves the item from a secure parcel locker.

The application 110 can display the location of secure parcel lockerswithin a registrant's geographic location by using GPS/A-GPS or Wi-Fiassisted location methods from the mobile computing device on which themobile application is running. A registrant may be able to storefavorite secure parcel locker locations in the application. In someembodiments, the mobile application can alert the registrant when theregistrant is within a certain distance of a secure parcel locker or aretailer who has a partnership with the secure parcel locker service. Insome embodiments, when a registrant is within a particular distance of apartner retailer, the mobile application can alert the registrant andidentify the partner retailer. The mobile application can then providethe option to purchase an article from the partner retailer, andidentify the secure parcel locker to which the article should bedelivered.

In some embodiments, a registrant may use the application to trackarticles that are intended for delivery to the recipient at a secureparcel locker. As part of the tracking functionality, the registrant canchange or alter the destination of an article which is intended fordelivery to the registrant. For example, after a registrant is informedof an article intended for delivery to the registrant, the registrantmay access the mobile application and specify an alternate destinationfor the article. If an article is to be delivered to a first secureparcel locker, and the registrant is located geographically nearer asecond secure parcel locker, the registrant may choose to have thearticle delivered to the second secure parcel locker. In someembodiments, the registrant may specify a pick-up time, or extend theallowable pick-up window at the secure parcel locker. In someembodiments, if an item has already been delivered to a secure parcellocker for the registrant, but the registrant is unable to pick up theitem from that secure parcel locker, the registrant may, via theapplication, request that the article be forwarded to a different secureparcel locker.

In some embodiments, the registrant may use the stored computer readablecode, or the virtual identification card, at a secure parcel locker. Thesecure parcel locker may have a scanner, and the registrant can scan thecomputer readable code displayed on the registrant's mobilecommunication device on the secure parcel locker's scanner. The secureparcel locker receives the scanned computer readable code, and if thesecure parcel locker recognizes the computer readable code and theregistrant's identity is confirmed, the registrant is allowed to accessthe secured parcel locker system and retrieve the article intended forthe registrant.

FIG. 3 provides a diagram depicting an identity verification processimplemented by the USPS. Process 300 starts in block 302 where aregistrant provides information to the application 110 for identityverification as described elsewhere herein. At the time registrantprovides information, the application 110 also captures networkinformation in block 304. The network information captured can beindicative of a network address or network location used by theapplication 110 for registration. For example, if the registrantregisters on a mobile communication device, the application 110 capturesthe network address and location from the cellular network or wirelessnetwork being accesses by the mobile communication device. Thisinformation is transmitted to the server 120 and/or the IPS 130.

As part of the registration process, the application 110 receives anelectronic version of an identity proofing form from the server 120, anddelivers the electronic document to the application 110. The identityproofing form comprises computer readable code which uniquely identifiesthe document, such as a barcode. The application 110 may also deliver aself-addressed registration document. The self-addressed registrationdocument is a document that the registrant can send to the USPS, havingthe registrant's address thereon, which the USPS can then send back tothe registrant. A registrant may be required to print the identityproofing form and the self-addressed registration document and providethe identity proofing form and the self-addressed registration documentvia physical mail to a designated USPS location. The registrant may alsobe required to mail other indicia of identity, such as a copy of agovernment issued photo identification, such as a driver license,passport, etc. In block 306, the registrant mails a physical copy of theidentity proofing form to the USPS along with any required copy of thegovernment issued photo identification. In some embodiments, thegovernment issued photo identification need not be mailed, but an imagethereof is provided to the application 110 as described elsewhereherein.

In block 308, the physical copy of the identity proofing form isreceived by the USPS and the computer readable code is scanned. Scandata generated by the mail processing equipment through which theidentity proofing form passed en route to the USPS location for theidentity proofing form is collected and processed. The collected scandata indicates the approximate geographic origin of the identityproofing form, which can be compared to the address provided by theregistrant while applying for an account. The scan data is then providedto the IPS 130 in block 310.

In block 312, the registration document provided by the registrant andreceived at the USPS is delivered back to the registrant by a postalcarrier 350. The postal carrier 350, physically present in person at thehome of the registrant, may show the self-addressed registrationdocument and request to see the identifying documents or identifyingitem provided or referenced during registration, such as the governmentissued photo identification or a utility bill showing the registrant'sname and address (matching the address provided at registration).

In block 314, the postal carrier 350 scans, photographs, or otherwiseobtains a copy of the documents (i.e., government issued photo id,utility bill, etc.). The postal carrier 350 may obtain a copy by takingan image of the identifying documents, such as a photo of theregistrant's driver license using a handheld camera, a camera-enabledsmartphone, or any other mobile communication device.

In block 316, the postal carrier 350 transmits the copy of theidentifying documents to the IPS 130. In blocks 318a and 318b, asdescribed elsewhere herein, the IPS 130 transmits information to theexternal verification system 132 and the government verification system134, and the information is processed.

In block 318c, the scan data for the identity proofing form, includingregistrant's name and address is provided to the identification module140, where it is compared to historical mail information stored in theidentification database 145. For example, if the identity proofing formoriginated at a location in or near the address provided by theregistrant, this is evidence that the registration information iscorrect, and not fraudulent.

In step 320, the IPS 130 authorizes registration based on all thereceived information, as described elsewhere herein. The authorizationmay be creation of credentials, such as a user name and password, whichare then mailed to the registrant. In some embodiments, theauthorization is an activation token transmitted to the mobilecommunication device on which the registrant wishes to use theapplication 110, the token allowing the registrant to access thefeatures of the application 110. As described with regard to FIG. 2 , ifthe identity is not verified based on the received information, thenon-verification is communicated to the registrant, similar to block224. Following either verification or non-verification, the processends.

It will be understood that the blocks of process 300 are not necessarilyperformed in sequence, but more than one block can be performedconcurrently or overlapping in time. One of skill in the art will alsounderstand that not all steps need be performed in order to verifyidentity. The amount of information required to verify a registrant'sidentity may vary based on the application, and/or according to a levelof assurance demanded by the provider of the application 110.

A person skilled in the art will recognize that each of thesesub-systems can be inter-connected and controllably connected using avariety of techniques and hardware and that the present disclosure isnot limited to any specific method of connection or connection hardware.

The technology is operational with numerous other general purpose orspecial purpose computing system environments or configurations.Examples of well-known computing systems, environments, and/orconfigurations that may be suitable for use with the invention include,but are not limited to, personal computers, server computers, hand-heldor laptop devices, multiprocessor systems, microprocessor-based systems,programmable consumer electronics, network PCs, minicomputers, mainframecomputers, distributed computing environments that include any of theabove systems or devices, and the like.

As used herein, instructions refer to computer-implemented steps forprocessing information in the system. Instructions can be implemented bya processor which can comprise software, firmware or hardware andinclude any type of programmed step undertaken by components of thesystem.

A processor may be any conventional general purpose single- ormulti-chip processor and/or microprocessor such as a Pentium® processor,a Pentium® Pro processor, a 8051 processor, a MIPS® processor, a PowerPC® processor, or an Alpha® processor. In addition, the microprocessormay be any conventional special purpose microprocessor such as a digitalsignal processor or a graphics processor. The microprocessor typicallyhas conventional address lines, conventional data lines, and one or moreconventional control lines.

The system may be used in connection with various operating systems suchas Linux®, UNIX® or Microsoft Windows®.

The system control may be written in any conventional programminglanguage such as C, C++, BASIC, Pascal, or Java, and ran under aconventional operating system. C, C++, BASIC, Pascal, Java, and FORTRANare industry standard programming languages for which many commercialcompilers can be used to create executable code. The system control mayalso be written using interpreted languages such as Perl, Python orRuby.

The foregoing description details certain embodiments of the systems,devices, and methods disclosed herein. It will be appreciated, however,that no matter how detailed the foregoing appears in text, the systems,devices, and methods can be practiced in many ways. As is also statedabove, it should be noted that the use of particular terminology whendescribing certain features or aspects of the invention should not betaken to imply that the terminology is being re-defined herein to berestricted to including any specific characteristics of the features oraspects of the technology with which that terminology is associated.

It will be appreciated by those skilled in the art that variousmodifications and changes may be made without departing from the scopeof the described technology. Such modifications and changes are intendedto fall within the scope of the embodiments. It will also be appreciatedby those of skill in the art that parts included in one embodiment areinterchangeable with other embodiments; one or more parts from adepicted embodiment can be included with other depicted embodiments inany combination. For example, any of the various components describedherein and/or depicted in the Figures may be combined, interchanged orexcluded from other embodiments.

With respect to the use of substantially any plural and/or singularterms herein, those having skill in the art can translate from theplural to the singular and/or from the singular to the plural as isappropriate to the context and/or application. The varioussingular/plural permutations may be expressly set forth herein for sakeof clarity.

It will be understood by those within the art that, in general, termsused herein are generally intended as “open” terms (e.g., the term“including” should be interpreted as “including but not limited to,” theterm “having” should be interpreted as “having at least,” the term“includes” should be interpreted as “includes but is not limited to,”etc.). It will be further understood by those within the art that if aspecific number of an introduced claim recitation is intended, such anintent will be explicitly recited in the claim, and in the absence ofsuch recitation no such intent is present. For example, as an aid tounderstanding, the following appended claims may contain usage of theintroductory phrases “at least one” and “one or more” to introduce claimrecitations. However, the use of such phrases should not be construed toimply that the introduction of a claim recitation by the indefinitearticles “a” or “an” limits any particular claim containing suchintroduced claim recitation to embodiments containing only one suchrecitation, even when the same claim includes the introductory phrases“one or more” or “at least one” and indefinite articles such as “a” or“an” (e.g., “a” and/or “an” should typically be interpreted to mean “atleast one” or “one or more”); the same holds true for the use ofdefinite articles used to introduce claim recitations. In addition, evenif a specific number of an introduced claim recitation is explicitlyrecited, those skilled in the art will recognize that such recitationshould typically be interpreted to mean at least the recited number(e.g., the bare recitation of “two recitations,” without othermodifiers, typically means at least two recitations, or two or morerecitations). Furthermore, in those instances where a conventionanalogous to “at least one of A, B, and C, etc.” is used, in generalsuch a construction is intended in the sense one having skill in the artwould understand the convention (e.g., “a system having at least one ofA, B, and C” would include but not be limited to systems that have Aalone, B alone, C alone, A and B together, A and C together, B and Ctogether, and/or A, B, and C together, etc.). In those instances where aconvention analogous to “at least one of A, B, or C, etc.” is used, ingeneral such a construction is intended in the sense one having skill inthe art would understand the convention (e.g., “a system having at leastone of A, B, or C” would include but not be limited to systems that haveA alone, B alone, C alone, A and B together, A and C together, B and Ctogether, and/or A, B, and C together, etc.). It will be furtherunderstood by those within the art that virtually any disjunctive wordand/or phrase presenting two or more alternative terms, whether in thedescription, claims, or drawings, should be understood to contemplatethe possibilities of including one of the terms, either of the terms, orboth terms. For example, the phrase “A or B” will be understood toinclude the possibilities of “A” or “B” or “A and B.”

All references cited herein are incorporated herein by reference intheir entirety. To the extent publications and patents or patentapplications incorporated by reference contradict the disclosurecontained in the specification, the specification is intended tosupersede and/or take precedence over any such contradictory material.

The term “comprising” as used herein is synonymous with “including,”“containing,” or “characterized by,” and is inclusive or open-ended anddoes not exclude additional, unrecited elements or method steps.

All numbers expressing quantities of ingredients, reaction conditions,and so forth used in the specification and claims are to be understoodas being modified in all instances by the term “about.” Accordingly,unless indicated to the contrary, the numerical parameters set forth inthe specification and attached claims are approximations that may varydepending upon the desired properties sought to be obtained by thepresent invention. At the very least, and not as an attempt to limit theapplication of the doctrine of equivalents to the scope of the claims,each numerical parameter should be construed in light of the number ofsignificant digits and ordinary rounding approaches.

The above description discloses several methods and materials of thepresent invention. This invention is susceptible to modifications in themethods and materials, as well as alterations in the fabrication methodsand equipment. Such modifications will become apparent to those skilledin the art from a consideration of this disclosure or practice of theinvention disclosed herein. Consequently, it is not intended that thisinvention be limited to the specific embodiments disclosed herein, butthat it cover all modifications and alternatives coming within the truescope and spirit of the invention as embodied in the attached claims.

What is claimed is:
 1. A system for providing access to a secure locker,the system comprising: a user interface configured to receiveregistration information and identification information; a server incommunication with the user interface, the server configured to: receivethe registration information and the identification information; verifythe identification information; compare the verified identificationinformation to the registration information; verify the identity of aregistrant based on the comparison of the verified identificationinformation to the registration information; and send a computerreadable code to the user interface; and a secure locker comprising: ascanner configured to scan the computer readable code from the userinterface; and an access module in communication with the scanner, theaccess module configured to: receive the computer readable code from thescanner; verify the computer readable code with the server; and provideaccess to the secure locker based on verifying the computer readablecode with the server.
 2. The system of claim 1, wherein theidentification information comprises address information and locationinformation indicative of registrant location at a time of registration.3. The system of claim 1, wherein the access module is in wirelesscommunication with the user interface.
 4. The system of claim 3, whereinthe wireless communication is via a low power radio frequencyconnection.
 5. The system of claim 1, wherein the computer readable codeis a digital token.
 6. The system of claim 5, wherein the digital tokenis received wirelessly by the scanner from a user device in proximity tothe secure locker.
 7. The system of claim 1, further comprising acompartment within the secure locker, wherein the compartment contains aparcel intended for a specific user.
 8. The system of claim 7, whereinthe access module is further configured to open the compartmentcontaining the parcel in response to receiving the computer readablecode.
 9. The system of claim 1, further comprising a mobile computingdevice, wherein the mobile computing device displays the user interface.10. The system of claim 9, wherein the scanner is configured to scan thecomputer readable code by scanning the user interface on the mobilecomputing device.
 11. The system of claim 1, wherein the user interfacereceives the registration information and the identification informationfrom the registrant.
 12. A method for providing access to a securelocker, the method comprising: receiving, in a user interface,registration information and identification information; sending theregistration information and the identification information to a server;verifying, by the server, the identity of a registrant based on thereceived identification information and the registration information;generating, by the server, a computer readable code in response to theverified identity; sending the computer readable code to the userinterface; scanning, by a scanner on a secure locker, the computerreadable code; transmitting, to the server, the computer readable codefrom an access module in communication with the scanner; verifying, bythe server, the computer readable code; and providing access to thesecure locker.
 13. The method of claim 12, wherein receiving theregistration information and the identification information comprisesreceiving the registration information and the identificationinformation from the registrant.
 14. The method of claim 12, wherein theuser interface is usable on a mobile computing device.
 15. The method ofclaim 14, wherein the computer readable code is a digital token storedon the mobile computing device.
 16. The method of claim 15, whereinscanning the digital token comprises receiving the digital token via alow power radio frequency connection between the mobile computing deviceand the scanner.
 17. The method of claim 16, wherein receiving thedigital token comprises automatically receiving the digital token whenthe registrant is in proximity to the scanner.
 18. The method of claim14, wherein scanning the computer readable code comprises scanning adisplayed graphic on the mobile computing device.
 19. The method ofclaim 12, further comprising receiving, in a compartment of the securelocker, a parcel.
 20. The method of claim 19, further comprising openingthe compartment containing the parcel in response to verifying thecomputer readable code.