throbber
(19) United States
`(12) Patent Application Publication (10) Pub. No.: US 2002/0065786 A1
`Martens et al.
`(43) Pub. Date:
`May 30, 2002
`
`US 20020065786A1
`
`(54) METHOD AND APPARATUS FOR
`DEPOSITING PAPER CHECKS FROM HOME
`OR OFFICE
`
`(76) Inventors: Marco Martens, Chappaqua, NY (US);
`Charles P. Tr
`New York, NY
`arles P. resser, New York,
`(US)
`
`'GWG.E.
`C
`OO s ite 1800
`GSEE,d
`McLean, VA 22102-3915 (US)
`
`(21) Appl. No.:
`22) Filled:
`(22) File
`
`09/920,740
`Aug. 3, 2001
`l. 3,
`Related U.S. Application Data
`(63) Non-provisional of provisional application No.
`60/252,584, filed on Nov. 24, 2000.
`
`Publication Classification
`
`(51) Int. Cl. ............................. H04K 1700; G06F 17/60
`
`(52) U.S. Cl. ................................. 705/70; 705/45; 705/50
`
`(57)
`
`ABSTRACT
`
`A form of paper checks, and the apparatus and method to
`handle them, allows deposit from home or office. The
`apparatus can be implemented with a Personal Computer
`(PC) having a Secure cryptography generator (SCG)
`installed. The process of depositing paper checks begins by
`the payee endorsing a check having printed thereon encryp
`tions in at least Selected locations where information is
`written by a payer. The act of writing by the payee obscuring
`Some of the encryptions. The payee then Scans the endorsed
`check with a Scanner to generate a digitized version of the
`check. The computer extracts from the digitized version of
`the check a concatenated branch number, account number
`s
`and check number and a corresponding digital Signature.
`The payee then transmits the extracted information together
`with the digitized version of the check for deposit. The
`checks a specially designed to prevent fraud Such alteration
`of the payee, amount and multiple deposits. In addition to
`the encryptions imprinted on the check, a Secret key and a
`luralitv of digital Signatures are generated based on the
`p
`y
`9.
`9.
`9.
`concatenated branch number, account number and check
`number.
`
`
`
`IBM 4758 PCI Cryptographic Coprocessor
`
`SYMBOLIC REPRESENTATION OF THE
`IBM 4758 PC CRYPTOGRAPHC COPROCESS
`N FURTHER FIGURES.
`
`Mitek Exhibit 1027, Page 001
`
`

`

`Patent Application Publication May 30, 2002 Sheet 1 of 11
`
`US 2002/0065786 A1
`
`
`
`IBM 4758 PCI Cryptographic Coprocessor
`
`SYMBOLIC REPRESENTATION OF THE
`IBM 4758 PC CRYPTOGRAPHIC COPROCESS
`N FURTHER FIGURES.
`
`FIG.1
`
`Mitek Exhibit 1027, Page 002
`
`

`

`Patent Application Publication May 30, 2002 Sheet 2 of 11
`
`US 2002/0065786 A1
`
`
`
`9
`y
`s
`
`:
`
`Mitek Exhibit 1027, Page 003
`
`

`

`Patent Application Publication May 30, 2002 Sheet 3 of 11
`
`US 2002/0065786 A1
`
`
`
`s
`
`"uoieae aebpu Kalu Seinea asaugo opes cy
`*ueeps in3es pue eu euneus
`uud-0131N e apnau usunoop sui uo seriee ?illu?
`
`goo NOLLwin93th XINvgaau3S3 viads.
`
`ANOSNOLnIIISNivionVNiduo
`SN. SIHL MO38 dWS/WNoS ON O.
`
`Mitek Exhibit 1027, Page 004
`
`

`

`Patent Application Publication May 30, 2002 Sheet 4 of 11
`
`US 2002/0065786 A1
`
`checki
`
`-
`
`1-108210
`
`.
`
`. .
`
`-
`
`'-'
`
`.
`
`Name of Banks
`LoGo
`is
`Address
`
`. . .
`
`
`
`Mitek Exhibit 1027, Page 005
`
`

`

`Patent Application Publication May 30, 2002 Sheet 5 of 11
`
`US 2002/0065786 A1
`
`
`
`(
`
`Mitek Exhibit 1027, Page 006
`
`

`

`Patent Application Publication
`
`May 30, 2002. Sheet 6 of 11
`
`US 2002/0065786 A1
`
`
`
`
`
`
`
`Mitek Exhibit 1027, Page 007
`
`

`

`Patent Application Publication May 30, 2002 Sheet 7 of 11
`
`US 2002/0065786 A1
`
`
`
`an
`
`ea X
`N
`
`D ap
`()
`O
`O
`s
`()
`
`000000000 coioico. OOOOOOo
`OOOOOO.oOoooooooooooo...OOO
`Okodoocoodcocoooooooooo
`00000000000000000000000000d
`didooooooooooooooooooooo.
`000000000 dooooooooooooooo
`BOOOOOOOO.o.o.oOoooooooooo.
`COOOOOOOOOOOOOOOOOOOOO
`000000000sooooooooooooooo
`
`Mitek Exhibit 1027, Page 008
`
`

`

`Patent Application Publication
`
`May 30, 2002 Sheet 8 of 11
`
`US 2002/0065786A1
`
`
`
`ssauppv.
`
`Mitek Exhibit 1027, Page 009
`
`

`

`Patent Application Publication May 30, 2002 Sheet 9 of 11
`
`US 2002/0065786 A1
`
`
`
`'uouelaue aeolpu! Kau seiniea, esau Joaouasqv
`."
`"ueeios Állinoes pue euleneufs
`ud-Ouols e apnjou hueunoop stun uo selinea) Aunoes
`3oo NoLivins3H3NV.g3AuSS34 vu3O34.
`
`3.
`
`OOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO
`OOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO.0000
`
`A
`
`00000000000000000000000000000 00000000
`OOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO.
`000000000 0000000000000 OOOOOOOOOO
`
`rts
`
`watts SSA’s WTTTYV
`
`BSH SOONS
`
`Mitek Exhibit 1027, Page 010
`
`

`

`Patent Application Publication May 30, 2002 Sheet 10 of 11
`
`US 2002/0065786 A1
`
`
`
`Mitek Exhibit 1027, Page 011
`
`

`

`Patent Application Publication May 30, 2002 Sheet 11 of 11
`
`US 2002/0065786 A1
`
`N1
`2
`s
`
`Od S.BB)\/d
`
`var
`visaas
`
`CD
`.
`
`Mitek Exhibit 1027, Page 012
`
`

`

`US 2002/0065786 A1
`
`May 30, 2002
`
`METHOD AND APPARATUS FOR DEPOSITING
`PAPER CHECKS FROM HOME OR OFFICE
`
`CROSS-REFERENCE TO RELATED
`APPLICATION
`0001) This application claims the benefit of U.S. Provi
`sional Application No. 60/252,584 filed Nov. 24, 2000.The
`Subject matter of this application is related to the disclosures
`in U.S. patent application Ser. No. 09/398,028 filed Sep.
`17, 1999,by G. Braudaway, P. D. Howard, P. V. Kamesam, H.
`E. Sachar, F. C. Mintzer, C. W. Wu, J. M. Socolofsky, S. W.
`Smith, and C. P. Tresser for “Method and System for Remote
`Printing of Duplication Resistant Documents” and U.S.
`patent application Ser. No. 09/398,029 filed Sep. 17, 1999,
`by C. Mengin, H. E. Sachar, M. Martens and C. P. Tresser
`for “Method and Apparatus for Secure Sale of Electronic
`Tickets”. patent applications Ser. No. 09/398,028 and
`09/398,029 are assigned to a common assignee herewith and
`their disclosures are incorporated herein by reference.
`
`DESCRIPTION
`
`BACKGROUND OF THE INVENTION
`0002) 1. Field of the Invention
`0003. The present invention generally relates to a method
`and apparatus for depositing paper checks from home or
`office and the checks used for Such deposit and, more
`particularly, to a method and apparatus which converts a
`Specially designed paper check to digital form and allows
`Secure electronic data transmission from a home or office
`computer to a bank for the purpose of depositing paper
`checks with the bank. A frequent fraud attempted against
`traditional check deposit is the So-called “amount fraud'
`where a dishonest perSon tries to change the amount of the
`check. The present invention also helps to protect against
`this fraud. More generally, the present invention makes
`fraud against checks harder, even when traditional methods
`of depositing are used.
`0004 2. Background Description
`0005 With the development of the World Wide Web
`(WWW) came the development of home banking. But there
`are still lots of basic banking operations which So far require
`one to go to a branch or to an Automated Teller Machine
`(ATM). The most important Such operation is depositing a
`check, and more precisely a paper check as they have existed
`since much before the electronic age. While most of the rest
`of the world moves away from checks (although at a rather
`Slow pace, about 4% per year in England, for instance), the
`use of checks is still growing in the U.S.A.
`0006 Allowing deposit from home or office would both
`be more practical for Some customers, which helps in
`particular the banks for their Customer Relationship Man
`agement, and leSS costly for the banks. In particular, a check
`from the payee's location (from home or from the office or,
`for that matter, any other location), assuming it would be
`reasonably automated, would represent a considerable value
`for a variety of Small, medium, and large businesses. In fact,
`even in countries where overall check traffic has been
`Significantly decreased, there are businesses which Still have
`to handle an increasing number of checks, which is very
`costly for them because of the work involved, and also to
`Some extent, because of the errors and frauds involved.
`
`0007 When we speak about deposit from home or office,
`we assume that from a paper check, indeed a little piece of
`the physical world-We also say an analog entity—we first
`create a digital entity (we also speak about the digital form
`of the check). A digital entity is basically a set of Symbols.
`Instead of an amorphous Set of Symbols, it might be more
`convenient to think of a Set of Symbols comprising groups of
`Symbols that carry tags. The tags refer to which part of real
`world the group of symbols refers to and/or describe the role
`of the group Symbol they are attached to, and/or describe the
`way this group relates to other groups of Symbols. Such tags
`can indeed be explicit, or be implicitly contained in the way
`the overall set of symbols is formatted.
`0008. The digital form of a check does not fully replace
`the check, as long as the check is not destroyed in the
`process. We will assume that destroying the paper checks
`would not be acceptable, and that paper forms of check may
`be used is Some lawsuit Settlements. Thus, recourse to the
`paper form will only play a role extremely rarely. Conse
`quently, for all practical purposes, we will in fact consider
`that the paper checks have been transformed to digital
`entities. Once in digital form, a check becomes quite close
`to an electronic check as the ones that have been considered
`by the Financial Services Technology Consortium (FSTC)
`(see http://www.fstc.org). Thus, most of the present disclo
`Sure will deal with two problems: generating checks from
`which Secure digital versions can be extracted and how this
`extraction can be done with Security and ease for all parties
`at hand (the payer, the payee, and their banks, and further
`parties as needed by the protocols) in the process of depos
`iting from home or office. Once in digital form, protocols
`previously developed for electronic checks, or other forms
`of electronic payment Systems, can be used in our context.
`On the other hand, what we will describe here to complete
`the deposit mechanism and its administration could be used
`for other Secure transformations of documents into corre
`sponding digital forms. Furthermore, the new kind of checks
`described in this invention will also make fraud much harder
`when traditional methods of depositing are used.
`0009. A few numbers will illustrate the size of check
`handling. In the U.S.A. in 1993, checks represented 80% of
`the noncash transaction volume for only 13% of the trans
`action value, with an average value per transaction of
`S1,150. While the use of checks has been declining in some
`countries, it is Still increasing in Some. The handling cost is
`huge for banks, and even more when bad checks are
`presented or frauds occur, Such as multiple deposit attempts.
`Beside reducing the processing cost, allowing checks to be
`transformed to digital entities before being deposited would
`also help the overall transition to more forms of electronic
`payment Systems.
`0010 For a general reference on electronic payment, see
`for instance Electronic Payment Systems by Donald
`O’Mahony, Michael Pierce, and Hitesh Tewari, Artech
`House, Boston (1997).
`
`Problems to Be Solved
`0011 AS we mentioned before, to deposit checks from
`home, we assume the checks will be converted from their
`analog form to Some digital form, in particular to allow data
`to flow using electronic means of communication. The
`problem is that the digital form allows easy data modifica
`
`Mitek Exhibit 1027, Page 013
`
`

`

`US 2002/0065786 A1
`
`May 30, 2002
`
`tion, a door open to easy counterfeiting. Furthermore, the
`very ease of data flow and copy in electronic form can also
`facilitate other forms of wrong doing.
`0012. The main problems to be solved can be formulated
`as follows:
`0013 1. No one should be able to create illegitimate
`checks. In particular, the reading of the paper check,
`involved in the transformation of the check into a
`digital form, should measure enough details of the
`check to assure that is it is very hard to make
`illegitimate checks that do pass the authenticity test
`based on the reading.
`0014 2. The amount should be very hard to change.
`0015 3. The payee’s name should be very hard to
`change.
`0016 4. Multiple deposit of any check should be
`very hard.
`0.017. As usual in the security business, very hard essen
`tially means So hard that the cost of defeating the System
`would most probably be much higher than the benefit. It is
`clear that check depositing from home is more open to fraud
`than traditional check deposit. By Solving the harder prob
`lem, the present invention also provides means to better
`protect against fraud in any form of check usage.
`
`SUMMARY OF THE INVENTION
`0.018. It is therefore an object of the present invention to
`provide a form of paper checks, and the apparatus and
`method to handle them, that allows deposit from home or
`office while solving all problems we have mentioned above.
`0.019 According to the invention, there is provided a
`method and apparatus, in combination with a special form of
`paper checks, which allows for the Secure deposit of paper
`checks from home or office; in other words, at a location
`other than the bank or an ATM. The apparatus can be
`implemented at the payee's home or office with a Personal
`Computer (PC) which has a scanner attached to it and
`connected to the World Wide Web (WWW) on the Internet.
`The process of depositing paper checks begins by the payee
`endorsing a check having printed thereon encryptions in at
`least Selected locations where information is written by a
`payer. The act of writing by the payee obscuring Some of the
`encryptions. The payee then Scans the endorsed check with
`a Scanner to generate a digitized version of the check. The
`computer extracts from the digitized version of the check a
`concatenated branch number, account number and check
`number and a corresponding digital Signature. The payee
`then transmits the extracted information together with the
`digitized version of the check for deposit. The checks are
`Specially designed to prevent fraud Such as alterations of the
`payee, amount and multiple deposits. In addition to the
`encryptions imprinted on the check, a Secret key and a
`plurality of digital Signatures are generated based on the
`concatenated branch number, account number and check
`number. Furthermore, the new kind of checks described in
`this invention will also make fraud much harder when
`traditional methods of depositing are used.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`0020. The foregoing and other objects, aspects and
`advantages will be better understood from the following
`
`detailed description of a preferred embodiment of the inven
`tion with reference to the drawings, in which:
`0021
`FIG. 1 is a pictorial representation of an actual
`IBM 4758 PCI Cryptographic Coprocessor;
`0022 FIG. 2 shows the front of a typical U.S.A. bank
`check and the various main area Visible there;
`0023 FIG. 3 shows the back of a typical U.S.A. bank
`check and the various main area Visible there;
`0024 FIG. 4 and FIG. 4A illustrate some of the visual
`Security mechanisms on the front of a U.S.A. check,
`0025 FIG. 5 is a flow diagram illustrating how the most
`protective features are calculated at the payer's bank or its
`trusted mint, according to the present invention;
`0026 FIG. 6 shows the new features that would appear
`on the front of checks according to the present invention;
`0027 FIG. 7 shows the new features that would appear
`on the back of checks according to the present invention;
`0028 FIG. 8 shows the front of a typical U.S. check as
`it would appear when modified according to the present
`invention;
`0029 FIG. 9 shows the back of a typical U.S. check as
`it would appear when modified according to the present
`invention;
`0030 FIG. 10 is a flow diagram illustrating the process
`of depositing a check from home with a database; and
`0031
`FIG. 11 is a flow diagram illustrating the process
`of depositing a check from home without a database.
`
`DETAILED DESCRIPTION OF PREFERRED
`EMBODIMENTS OF THE INVENTION
`0032. The present invention builds on a pair of technolo
`gies that we briefly discuss here. They are (1) a Secure
`cryptography generator, such as the IBM 4758 PCI Cryp
`tographic Coprocessor, and (2) the art of cryptography.
`0033) The IBM (International Business Machines Corp.)
`4758 PCI (Peripheral Component Interconnect) Crypto
`graphic Coprocessor (4758 for short) is a programmable,
`field upgradeable piece of Secure hardware that has a general
`purpose computational power about equivalent to a personal
`computer (PC) from the early 90's. It is designed to plug into
`an available PCI connector of the PCI bus of a PC to provide
`the PC with a Secure means of transmitting data over a
`standard telephone line. As shown in FIG. 1, the 4758
`comprises a Sealed processor 11 mounted to a printed circuit
`board (PCB) 12 having a PCI connector 13 along one edge.
`Abattery 14, also mounted on the PCB 12, provides standby
`power to the processor 11 when the computer in which it is
`installed is turned off. The purpose of the battery is to
`maintain data in non-volatile memory within the processor
`11. The PCB 12 is attached to a standard PC adapter
`mounting bracket 15 which fits into a slot at one end and is
`attached by a Screw at the other end in the backplane of the
`PC cabinet. An RS-232 DB-9 Serial connector 16 is mounted
`to the bracket 15 to permit connection from the 4758 to a
`modem. When configured in a PC, the 4758 occupies one of
`the serial port addresses, typically COM-1.
`
`Mitek Exhibit 1027, Page 014
`
`

`

`US 2002/0065786 A1
`
`May 30, 2002
`
`0034. The 4758 performs high speed cryptographic
`operations, and provides Secure key Storage. It is both
`cryptographically Secure and able to detect and protect itself
`against physical attacks (probe, Voltage, temperature, radia
`tion). It is in fact one of the only two devices that are Federal
`Information Processing Standard (FIPS) 140-1 overall 4
`certified (hardware and microcode: certificate #35), the other
`one coming integrated in IBM 390 mainframes (the IBM
`CMOS (Complementary Metal Oxide Semiconductor)
`Cryptographic Coprocessor: certificate #40-which is not
`programmable as is the 4758 while the price of a 4758 is
`about a couple of thousand dollars. The 4758 is indeed a
`popular PCI buS interface for Servers, and can Serve as
`device driver for Operating Systems (OS) such as Microsoft
`Windows NT, Linux, and IBM's AIX, OS/2, and OS/390
`Operating Systems. Typical use of cryptographic coproces
`SorS Such as the 4758, or Some Smart cards, include High
`Speed, Bulk Cryptography (for instance for digital movies,
`in-flight entertainment Systems, Secure databases, confiden
`tial video-conferences, telemedicine, telecommuting, etc.)
`and Security in Non Trusted Environments (for instance for
`Smart card personalization, electronic currency dispensers,
`electronic benefits transfer, Server-based Smart card Substi
`tutes, home banking, certification authorities, Secure data
`base key control, electronic postage (epostage) meters, elec
`tronic payments, Secret algorithms, Secure time Stamps,
`contest winner Selection, Software usage metering, elec
`tronic Securities trading, hotel room gaming, etc.).
`0035) We have described in great detail the virtues of the
`4758 because these virtues are the elements which are
`needed for the present invention to be implemented with the
`required level of high Security. Any device with Similar
`virtues could be used as well. The fact is that it is by no
`means obvious a priori that a machine with all these virtues
`could be built. We wanted to establish the feasibility-at the
`time of writing-of our overall invention by recalling in
`detail that assembling all the needed Virtues in a machine can
`indeed be done, and giving an example proving that.
`0036). In the sequel, we will use SCG as an acronym for
`Secure cryptography generator, an example of which is the
`4758. What we mean is a machine which is secure for both
`physical and cryptographic attackS.
`0037. The use of secret keys as a means to encrypt or
`digitally sign a file or document, of Secret encoding keys,
`and of Secure hash functions (such as SHA-1, as fully
`specified in the Federal Information Processing Standard
`Publication 180-1) are now well known. A description of
`these techniques with directions on how to use Several of
`their implementations can be found in Handbook of Applied
`Cryptography, by Alfred J. Menezes, Paul C. van Oorschot
`and Scott A. Vanstone, CRC Press, 1997.
`0.038. To fix the ideas, we recall that a digital signature
`Scheme is used in the form of a pair of functions Sign and
`Sign' which are inverse of each other, i.e., for a plain text
`X to be signed, Sign' (Sign(X))=X. The functions Sign and
`Sign' are kept Secret, being known only to Some legitimate
`owner of the Signature and his or her agents.
`0.039
`For definiteness, each time we use an encryption
`scheme, one can choose the Rivest-Shamir-Adleman (RSA)
`protocol as a method to generate a digital Signature, Several
`other methods could also be used (see, e.g., the Handbook of
`Applied Cryptography, cited above). In the case when the
`
`functions Sign and Sign' are produced according to the
`RSA protocol, it is now preferred to use at least 1024 digits
`for X and Sign(X) (the formerly often used 512 digits are no
`more considered as Secure). As a message may contain much
`more information than the length of the keys, Several meth
`ods can be used, possibly concurrently, as is well known in
`the art. For instance, one can Split the message in Several
`pieces, Some or all of which will be signed, or one can
`compress the information, for instance using a Secure hash
`function, or one can Select a Subset of the information, etc.
`It might be beneficial to use Several Signatures Schemes, Say
`Sign, Sign-2, . . .
`0040 Also notice that even if one wishes to use the
`benefits of cryptography, it may be useful to also hide Secret
`information in the messages, So that one could recognize that
`Someone has Succeeded to break the keys being used. This
`can be done in the form of Secret functions, Sec, Seca, . .
`. AS usual in the art, it is advisable to change the keys being
`used every So often, depending on the application, and to
`keep a list of former keys.
`0041 Another important enabler of secure electronic
`communication is the possibility to exchange Secret keys
`while eXchanging only messages which can be understood
`by third parties. Several protocols have been created to this
`effect such as the Diffie-Hellman protocol. Such protocols
`allow in particular several SCGs to have the same keys
`without the keys being compromised. The machines this
`way can also share one time pads, and other cryptographic
`function. In the Sequel, when we speak of a SCG, we speak
`either of a single machine, or a series of them working in a
`coordinated way, as a multi-component Single machine; i.e.,
`memory will have to be shared. The invention does not
`depend on the distinction between these two cases, as long
`as the multiple machines are managed properly, avoiding in
`particular independent signatures by the components.
`0042. For ease of adoption by a majority of banks in some
`countries, it is important that the checks resemble the checks
`in use presently, So that the check could easily be processed
`in the usual way. Nowadays, checks usually carry Several
`forms of counterfeiting protections to prevent in particular
`easy copy (which would allow multiple deposit) and alter
`ation of the amount, and possibly also of the payee. For
`instance, in the U.S.A., checks often have explicit warnings
`about the Security features that protect them, and a request
`to check theses features by whomever processes them. These
`will be described in more detail with reference to FIGS. 2
`and 3. Some other features would need to be added to allow
`acceptable Security levels in transfer to digital form.
`0043 Beside the current check data, usually of the form
`0044) “X=Bank Id number; Account Id number;
`Check number' shown at 21 on the front of the check
`in FIG. 2, the checks will carry a digital signature
`using a Signature or Sign, which can either be the
`property of the issuing bank, or common property to
`a set of banks. The checks will possibly also carry a
`Secret code encryption, using a key Seco, which is
`the property of a more restrictive community; i.e.,
`Sec, is a more secret key. All these data will be
`clearly readable with a currently cheaply available
`Scanner, and preferably also human readable. There
`may be machine readable entries and other entries
`that are human readable, or one can make the entry
`
`Mitek Exhibit 1027, Page 015
`
`

`

`US 2002/0065786 A1
`
`May 30, 2002
`
`readable both ways; this applies to Signo(X) and also
`possibly to Seco(X). AS mentioned before, one can
`use a plurality of Signatures and Secret functions.
`0.045. Other digital signatures and secret keys will be
`used to create numbers which will be finely printed in
`appropriately chosen areas, also called fields or critical
`fields. These include where the amounts (numbers and/or
`text) are written at 26 and 27, where the payee's name is
`written at 25, preferably also where the human Signatures
`(payer's signature and endorsement) are written 28, prefer
`ably also where the check is endorsed at 33 in FIG. 3, and
`preferably also where the date is written at 24 in FIG. 2.
`0046 All writing on the checks by the payer (in particular
`amounts, Signature, payee's name, and also preferably the
`date) will be made with dark, preferably wide, pens, So that
`if the amounts are changed on the digital copy, Some Secret
`bits of information cannot be recovered by the counterfeiter.
`0047 Using these three principles, any changed amount
`or changed payee's name can be recognized as invalid. For
`that, the Small prints in the payee and amounts areas will
`need to change from check to check.
`0.048
`Illegitimate signature protection is mostly about
`protecting against copying a signature from one check to
`another check (for instance after stealing or finding a blank
`check). An often used protection against copying human
`Signatures is to recognize that a signature is perfectly
`identical between several (two or more) checks. Especially
`in digital form, it is easy to change Slightly the shape and
`position on the check of a signature in order to defeat this
`protection, but then the fine print to be covered would be
`different. Thus, for better protection, the fine print in the
`Signature area will preferably change from check to check.
`For better protection, one might also consider the fine print
`covering the Sensitive areas to comprise Signatures of the
`form Sing(X) and the more secret Sec(X).
`0049 Similar protection for the date area is expected to
`play a leSS critical role, but could help defeating for instance
`using old checks which have expired.
`0050. The data of the check (X, payee's name, amount,
`date) will be registered on Some accessible write only
`database together with the name of the bank where the
`deposit will be made, before the deposit or as part of the
`deposit.
`0051) To avoid malignant use of the database by people
`Willing to block checks non-legitimately, it would be better
`to also register one or more of the digital Signatures on the
`checks at the same time as the check numbers.
`0.052 Since the full set of presently available data on
`checks indicate the emitting bank branch, the database can
`be partitioned, either logically or geographically, or both,
`according to these branches (with further partition corre
`sponding to the account number). This would allow easy and
`quick access to the database even when the database
`increases with usage.
`0.053 Such database could be administrated in several
`forms by Specialized institutions Such as clearing houses or
`by all or Some bankS.
`0054) One also needs to protect against fraud which
`consists of depositing a check both electronically and tra
`
`ditionally (at a bank or ATM). Thus, for the process of home
`depositing to marry well with regular paper check deposits
`at the branches or ATMS, numbers on regularly deposited
`checks would also be checked against the database, but then
`the digital signature(s) of the check data would not need to
`be registered, if the bank where the deposit is made registers
`itself to Verify the check data have been legitimately regis
`tered. In fact, such database would offer first level protection
`against multiple deposit in either the digital, mixed analog
`digital, or pure analog World.
`0055 Although the database approach we just described
`Seems the most appropriate way to go, we also describe a
`way to avoid the database protection using Secure hardware.
`Anyone or any company or company branch (anything that
`can be the payee of a check) will be allowed to get a single
`4758 (or similar SCG machine) with the special function of
`Signing the fact that check numbers are used only once.
`Replacement of the machine will be allowed only if proof
`can be made that the previous one will not be used anymore
`(e.g., exchange of the new machine when giving back the
`old one).
`0056. It will be important that payee's name be not left
`blank in the case Secure hardware is used as the protection
`against multiple deposit, while this is leSS relevant with the
`database protection approach.
`0057 So far, we have supposed that the circulation of
`data once the check is transformed to digital form follow the
`Same path as a paper check, in particular going from the
`payee to his or her bank. The FSTC has realized that once
`in electronic form, checks do not need to be handled the
`Same way as regular checks in terms of the data circulation.
`They distinguish between several forms of circulation (see
`for instance the previously mentioned book Electronic Pay
`ment Systems by D. O’Mahony et al.). For instance:
`0058. Deposit-and-clear mirrors the flow for real
`check, and is what we had in mind So far, in
`particular for the problem of multiple deposit pre
`vention.
`0059 Cash-and-transfer uses a direct link between
`the payee and the payer's bank, So that the multiple
`deposit is much easier to protect against, Since the
`emitter's bank can easily take care of its own data
`base.
`0060. There are further scenarios in the world of elec
`tronic checks. Some of them make these forms of payment
`further and further away from regular checks. Anyone
`versed in the art of payment Systems would easily adapt the
`principle of the present invention to any Such System, as
`what this invention provides is a way to create and use paper
`documents which allows for Secure and uniquely usable
`transfer to digital form.
`0061
`Referring again to FIGS. 2 and 3, a typical Ameri
`can check is represented, respectively, on the front and back
`SideS. There are Several distinctive fields on the check, also
`called critical fields. We call X the long number usually on
`the bottom left of the face of the check at 21, made by
`concatenating the branch number, the account number, and
`the check number for that account:
`0062) “X=Bank Id number; Account Id number;
`Check number'.
`
`Mitek Exhibit 1027, Page 016
`
`

`

`US 2002/0065786 A1
`
`May 30, 2002
`
`0.063. The check number itself is repeated, usually on the
`upper right comer of the face at 22. The name and address
`of the account owner (an individual or a company) is usually
`on the upper left of the face at 23, Sometimes also with a
`telephone number, and/or Some other Sorts of numbers in the
`case of a corporation. Different fields to be written on will
`carry the date at 24, the payee's name (individual or busi
`ness) at 25, the numerical amount at 26, and the written
`amount at 27. A field is designed to carry the Signature at 28.
`The name of the bank appears at 29. The logo of the bank
`appears at 30. A place to write what the check is for appears
`at 31. Sometime a notice is given that the check is equipped
`with counterfeiting adverse features appears at 32, Sending
`for the back of the check for more details.
`0064.
`In FIG. 3, on the back of the check, an area is
`reserved for endorsement at 33. And some description of the
`counterfeiting adverse features may be given at 34, as
`indicated at 32 (FIG. 2), with advices to people to reject the
`check if Some of these features are compromised.
`0065 FIG. 4, and the enlarged area shown in FIG. 4A,
`represents. Some of the Visual protections often used on a
`check. This is in the form of a screen (manifested by small
`color dots on the background of the check) and micro prints
`on some important lines, as shown in FIG. 4A. Checks will
`be

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket