Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
SECURITY AND IDENTIFICATION DEVICE
Document Type and Number:
WIPO Patent Application WO/1995/023708
Kind Code:
A1
Abstract:
There is decribed a security device (10) and a method for verifying the identity of a person making a transaction. The security device (10) comprises a document (12) bearing a picture of the intended user (14) of the security device (10), said picture (14) having been produced by printing of said picture (14) by printer means activated by computer memory means in which a likeness of the intended user is stored. The devices (10) may be self adhesive for attachment to a second document and be provided in a form comprising a plurality of said devices.

Inventors:
RAJA YOGENDRA KHIMJI (GB)
Application Number:
PCT/GB1995/000456
Publication Date:
September 08, 1995
Filing Date:
March 02, 1995
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
RAJA YOGENDRA KHIMJI (GB)
International Classes:
B42D15/10; (IPC1-7): B42D15/10
Foreign References:
GB2159461A1985-12-04
EP0195104A11986-09-24
US3650210A1972-03-21
Download PDF:
Claims:
CLAIMS
1. A security identification device for verifying the identity of a person, the device comprising a first document bearing at least a likeness of said person, said first document being adapted to be permanently attached to a second document.
2. A security identification device according to claim 1 wherein said likeness is produced by printer means from computer memory means in which said likeness is digitally stored.
3. A method of verifying the identity of a person, the method comprising the steps of storing at least a likeness of said person in computer memory means said likeness being printed from said computer memory means onto a first document which is adapted to be attached to a second document, visual correspondence between said likeness and said person being assessed at the time of a potential transaction.
4. A method according to claim 3 wherein the data and/or likeness may be displayed on a VDU monitor at or adjacent the terminal.
5. A method according to either claim 3 or claim 4 wherein the likeness is produced and stored in the computer memory means by viewing the intended user by video camera or by scanning of a photograph of the intended user with a scanning device connected to a computer.
6. A method according to any one of preceding claims 3 to 5 wherein the likeness is either monochrome or colour.
7. A device according to claim 1 wherein said picture is produced by a high speed printing technique.
8. A device according to claim 7 wherein the high speed printing technique is either laser printing or ink jet printing.
9. A device according to any one of preceding claims 1 or 6 to 8 wherein the device is provided in the form of a book having a plurality of said devices therein.
10. A device according to any one of preceding claims 1 or 7 to 9 wherein the device is provided as a peeloff document having a selfadhesive property for attachment to other documents.
11. A device according to any one of preceding claims 1 or 7 to 10 wherein the device comprises an area bearing a picture of the intended user and an area for receiving at least a part of the signature of the intended user.
12. A device according to any one of preceding claims 1 or 7 to 11 wherein said device has an adhesive layer.
Description:
SECURITY AND IDENTIFICATION DEVICE

The present invention relates to a security device for identifying a person making a transaction and to a method of verifying the identity of a person making a transaction.

Many financial transactions are nowadays carried out by means of cheques with guarantee cards, store cards or credit cards of various kinds. Hereinafter, all such cards will be referred to as credit cards. Mostly, the only means of identification that the credit card actually belongs to the person making the transaction is the apparent correspondence between the signatures on the credit card and that made by the person on the transaction slip at the point of sale, for example. Where credit cards have been stolen from the owner, it is relatively easy for a criminal to forge a signature to obtain goods or cash. However, not only are signed credit cards stolen from individuals, but also unsigned credit cards are intercepted by criminals between the source of the credit card and the person to whom they are being issued. Thus crime is even easier as there is no signature to copy.

Huge sums of money are lost each year by this form of fraudulent use of credit cards.

The use of fingerprints taken at the time of a transaction as a unique identifying feature has been proposed. Systems to include a persons finger print on a credit card and electronic finger print readers at the point of transaction or sale to check correspondence of finger prints between card and person have been proposed. Such systems do not appear to actually be in use owing to the tremendous technical complexity and cost involved. There are considerable technical problems involved with the storing and reading of fingerprints such as to make this method impractical, uneconomic and unpopular. Furthermore, there is great public resistance to such schemes.

Other proposals have been made to produce credit cards or identity cards having a likeness of the user thereon. However, such cards can be fraudulently produced and, when used in a transaction, are subsequently taken away by the user, thus, no evidence of the user remains with any of the transaction documents or with the victim of the crime.

It is an object of the present invention to provide a security device which is economic, does not have great technical complexity and does not involve the use of fingerprints and consequently does not have the same widespread public resistance to its use.

According to one aspect of the present invention there is provided a security identification device for verifying the identity of a person, the device comprising a first document bearing at least a likeness of said person, said first document being adapted to be permanently attached to a second document.

According to another aspect of the present invention there is provided a security identification device, the device comprising a first document bearing a likeness of the intended user of the security device, said likeness having been produced by printing of said likeness by printer means activated by computer memory means in which said likeness of the intended user is stored, said document being adapted for attachment to a second document.

According to a further aspect of the present invention, there is provided a method of verifying the identity of a person, the method comprising the steps of storing at least a likeness of said person in computer memory means said likeness being printed from said computer memory means on to a first document which is adapted to be attached to a second document, visual correspondence between said likeness on said first document and said person being assessed when said first document is attached to said second document.

The likeness may be produced and stored in the computer memory means by viewing the person or intended user by video camera or by scanning of a photograph of the person or intended user with a scanning device connected to a computer for example.

The likeness may be monochrome or colour.

It is possible with modern technology to produce high quality reproductions of photographs by scanning and storing the results of such scanning in computer memory means for printing by high speed printing means such as a laser printer or ink jet printer. The cost of printing personal security identification devices can thus be very low. The provision of such a security device would allow a sales person, for example, at the point of sale to easily confirm that the person making the transaction was entitled to be in possession of the devices and a credit card to which they may relate. Unless there is good visual correspondence between the likeness on the security device and the person actually making the transaction at the point of sale, the transaction will not proceed.

Because of the ease and speed with which such pictures may be produced, it would be cost effective to update the computer record of the user on a regular basis to allow for changes in appearance caused by age or fashion for example. The computer picture of the person may be stored with other data relating to that person and may be available on-line to, for example, a VDU monitor at the point of sale or in a bank and be

triggered by an associated credit card, cheque guarantee card, payment card or whatever other magnetically activated means of payment the user were to proffer.

In one embodiment of the present invention, the device comprises a first document which is adapted to be affixed to a second document such as a record of a financial transaction, for example. Examples of the latter type of document may include a credit card transaction slip in a shop or the withdrawal of money by cheque at a bank, for example. The device may be adapted to be affixed to another document by the provision of an adhesive surface to the device, for example.

The device may also include other data relating to the person, such as address, bank details, a facsimile of their signature or any other desired data. Some or all of such additional data may be magnetically encoded on said device.

The device may be provided in the form of a "book" having a plurality of the devices therein. The devices may be provided as a book of "peel off" documents having a self-adhesive property for attachment to other documents. Alternatively, the devices may be included in a book or folder separated from each other or joined to a spine by perforations and may have an adhesive which requires moistening to activate.

The device may comprise a bank cheque for example, wherein the likeness of the person or intended user is provided thereon with his/her necessary details such as account number, for example, as with known cheques.

Where the device is attached to another document, the person's signature may span the junction between the device and the document to which the device is attached.

A particular advantage of the present invention is that a likeness or picture of the person making the transaction remains with the provider of the goods or services. Thus, if a crime or fraud has been committed, there is a much greater likelihood of being able to eventually trace the person. This is true even if a considerable time elapses between the crime being committed and it being recognised as such.

Although examples have been given above of financial transactions such as the purchasing of goods or withdrawing money, it is intended that the device according to the present invention has far wider application than merely such transactions. It is intended that the device according to the present invention may be used wherever it is required that the identity of the user should be verified. Examples may include the cashing of welfare benefit cheques or attachment to or incorporation in a driving licence for example. Indeed, this

is a further particular advantage of the present invention in that it is extremely versatile enabling the receiver to verify the persons identity in whatever transaction is being conducted.

The device comprises an area bearing a likeness of the person and may also comprise an area for receiving at least a part of the signature of the person, an area for receiving information about the particular transaction such as the date, value or any other pertinent information, an area bearing personal data such as a specimen signature for example.

Digitally stored visual images of a person may be analysed by computer means. Therefore, if a digital image of a person were stored on computer with, for example, his National Insurance number in the case of the United Kingdom, then if one or the other is known, i.e., his picture on a transaction document by means of the security identification device of the present invention, the other data relating to that person may be found by computer analysis of the picture. It should be understood that such computer analysis is also able to "strip away" disguises which people may apply so as to reveal the true underlying identity of the person. Thus, the person who leaves even a disguised picture of himself on a transaction document is eventually likely to be traced.

Clearly, in other countries, identifying data other than a UK National Insurance number may be used.

It is intended that the devices of the present invention are permanently attached to a second, or transaction document.

In order that the present invention may be more fully understood, examples will now be described by way of illustration only with reference to the accompanying drawings, of which:

Figure 1 shows a first embodiment of a device according to the present invention;

Figure 2 shows a second embodiment of a device according to the present invention;

Figure 3 shows a third embodiment of a device according to the present invention;

Figure 4 shows a schematic representation for producing a device according to the present invention from a photograph;

Figure 5 shows a schematic representation for producing a device according to the present invention with a video camera; and

Figure 6 which shows a schematic representation of a method according to the present invention of verifying the identity of a person.

Referring now to Figure 1 and where a first embodiment of a security identification device is shown generally at 10. The device comprises a document 12 which has an adhesive layer (not shown) on its reverse side, the adhesive layer possibly being protected by a peel-off backing sheet (not shown). On the document 12 is printed a likeness 14 of the intended user. The device may be permanently attached to a credit card transaction document or to a cheque for example at the time of making a transaction. The user may sign the device such that his/her signature spans the junction 16 of the device and the document 20 (indicated in part only by wavy line) to which it is attached as indicated at 18.

The likeness at 14 in Figure 1 may be produced according to either of the methods represented schematically at Figures 4 or 5.

In Figure 4, a recent photograph 30 of the user is placed in a scanning device 32 which is linked to computer 34 which is in turn linked to a printer 36. Once stored in the computer 34, security devices according to that described above with reference to Figure 1 may be rapidly and economically printed together with any required personal data relating to the user in known manner.

In Figure 5, the scanning device 32 is replaced by a video camera 40 for viewing the intended user or person, the camera being similarly linked to a computer 34 and printer 36.

In similar manner, the computer which stores the digital representation of the user's likeness 14 may also store a digital representation of a specimen of the user's signature which may be included in the device 10 and indicated at 22 in Figure 1.

Figure 2 shows a basic form of device according to the present invention and comprises a computer generated likeness 50 which could be used for example on the records held by hospitals or chemists in order to assist in preventing medicines being given to the wrong people, or in Government Department records relating to welfare and benefit claimants. The device 52 may have any or all of the features of the device shown in Fig.l or as hereinbefore described.

Figure 3 shows a device 60 which could be issued by credit card companies or banks for example. The device includes a likeness 62 and the number 64 of the relevant credit card or guarantee card to which the device relates.

It is believed that the security device would greatly reduce the amount of spontaneous crime currently perpetrated by thieves who steal credit cards and use them quickly before the card can be cancelled by the credit card company. The requirement that the card be used in conjunction with a device such as shown in Figure 3, for example, would greatly reduce the level of this type of crime.

In some types of transactions, it would further improve security if the one of the types of security devices described above were attached to a transaction document by both parties, i.e. the person receiving goods, services or money, for example, and the person supplying same. This would serve to reduce the possibility of collusion between receiver and supplier.

All of the devices shown in Figures 1 to 3 may be provided in the form of a book, the devices comprising the pages and able to be peeled off a backing or torn along a perforated line. The devices can be self adhesive or have an adhesive which needs to be moistened to activate for example. The devices may alternatively be provided on a sheet in the form of peel off stamps or in any convenient form.

Figure 6 shows a schematic representation of apparatus for carrying out a method of verifying the identity of a person making a transaction. A computer is shown at 70, the computer being a central data base of, for example, a credit card company and containing the details of its customers including a computer generated likeness such as might be produced as shown with reference to Figures 4 or 5. When conducting a transaction, the purchaser (not shown) would present his/her credit card 72 to the sales person (not shown) who would insert the card 72 into a card reading device 74 linked to the computer 70. The computer 70 would then transmit information, including a likeness appropriate to the card account in

question, to a terminal 76 at the site where the transaction is being conducted. The recorded likeness is then displayed on a VDU monitor screen 78 whereupon the sales person can compare the purchaser with the displayed likeness and confirm or otherwise that the purchaser is the authorised holder of the card.

As known in the computer art, the devices 74, 76 and 78 may all be comprised in one piece of apparatus but, may nevertheless carry out the functions described.

A particular advantage of the kind of computer stored likenesses envisaged herein is that the size of the image may be increased or reduced at will so that particular features may be examined in detail, thus facilitating recognition.




 
Previous Patent: CALENDER

Next Patent: SHARPENER FOR SOFT ELEMENT PENCILS