throbber
Doc Cade: TRACKT. REQ
`Docirnent Description: TrackOne Request
`
`PTOVAIBN2S(05-14)
`
`CERTIFICATION AND REQUEST FOR PRIORITIZED EXAMINATION
`UNDER 37 CFR 1.102(e) (Page 1 of 1)
`
`First Nai
`
`awn ed
`
`Nonprovisional
`
`fornmys are submilfed.
`
`one Application Number {i
`Charles Lee Oakes
`DIGITAL CAMERA PROCESSING SYSTEM
`
`Hication
`
`Number
`
`(if
`
`APPLICANT HEREBY CERTIFIES THE FOLLOWING AND REQUESTS PRIORITIZED EXAMINATION FOR
`THE ABOVE-IDENTIFIED APPLICATION,
`
`1. The processing fee set forth in 37 CFR 1.470)(1) and the prioritized examination fee set forth in
`37 CFR 4.17({c} have been filed with the request. The publication fee requirement is met
`because that fee, set forth in 37 CFR 1.18{d), is currently $0. The basic filing fee, search fee,
`and examination fee are fled with the request or have been already been paid.
`| understand
`thai any required excess claims fees or apphcation size fee must be paid for the application.
`
`iunderstand that ihe application may not cantain, or be amended to cantain, more than four
`independent claims, more than thirly total claims, or any multiple dependent claims, and that
`any request for an extension of ime will cause an outstanding Track | request to be dismissed,
`
`3. Theapplicable box is checked below:
`
`i.
`
`fa) The application is an original nonprovisional utility application filed under 35 U.S.C. 1114).
`This certification and request is being filed with the ullity application via EFS-Web.
`---OR---
`(6) The application is an original nonprovisional plant application filed under 35 ULS.C. 111{a}.
`This certification and request is being fled with the plant application in paper.
`
`An executed inventor's oath or declaration under 37 CFR 1.63 or 37 CFR 1.64 for each
`inventor, or the application data sheet meeting the conditions specified in 37 CFR TS53(f(S)ii Is
`fied with the application.
`
`A request for continued examination has been fled with, or prior to, this form.
`ffthe application is a ullly application, this certification and request is being filed wa EFS-Wehb.
`.
`i}. The application is an original nonprovisional utility application fled under 35 U.S.C. 111(a}, oris
`a national stage entry under 35 U.S.C. 371.
`iv. This certification and requestis being filed prior to the mailing of a first Office action responsive
`to the request for continued examination.
`No prior request for continued examination has been granted priariized examination status
`under 37 CFR 1.102{e\(2).
`
`/Kent E. Genin/
`Kent E. Genin
`
`Name
`(PontTyoed}
`
`“ae July 28, 2017
`| Practitioner
`37834
`| Registration Nuriber
`
`Note: This form musi be signed in eccordance with 27 CFA 1.33. See 37 OFR tad) for signeiure requirements and certifications.
`Submit sfipie fonns if more than ane signature is regutrad *
`
`tofse
`
`PNC 1013
`PNC 1013
`
`1 of 54
`
`

`

`PrivacyAct Statement
`
`The Privacy Actof 1074 (PL. 23-879) requires that you be given certain information in corineciion wilh your
`submission of the attached formrelated fo a patent application or patent. Accordingly, pursuant to the racuiraments of
`the Act, please be advised that: (1) the general authority for the collection of this information is 35 LS.0. 2ibh2k (2)
`furnishing of the information solicited is voluntary: and (3) the principal purpose for which the information is used by the
`U.S. Patent and Tractemark Office is to pracess anclfor examine your submission related to a patent apphoalian or
`patent.
`Hf you do not furnish the requested information, the US. Patent and Trademark Office maynot be able to
`process and/or eecamine your subrnission, which may result in fermination of proceedings or abandonment of the
`application or expiration of the patent.
`
`Theinformation provided by you in this inrm will be subpect to the following mutine uses:
`
`4. The information on this form wil be ireated confidentially fo the extent allowed underthe Freecom of
`information Act (6 ULS.C, 852) and the Privacy Act (5 U.S.C §52a). Records from this sysiem of records may
`be disclosed fo the Departrnent of Justice to determine whether disclosure of these records is required by the
`Freecom af information Act.
`A record frorn this systern of records may be disclosed, as a roulinie use, in the course of presenting evidence
`fo a courl, magistrate, or adrniristrative tribunal, including clisciasures fo opposing counsel in the course of
`settlement negotiations.
`A record in this system of records mebe disclosed, as @ noutine use, to a Mernber of Congress submitting a
`request involving an individual, to wham the record pertains, when the individual has requested assistance fram
`ihe Member with respect fe the subject matter of the record.
`A record in this system of records may be disclosed, as a routine use, to a contractor of the Agenoy having
`need for the information in order to perform a contract. Recipients of information shall be required io comply
`with the requirements of the Privacy Act of 1974, as amended, pursuant ie 5 U.S.C. 552afm}.
`A record related fo an Imternetional Application filed under the Patent Cooperation Trealy in this systern of
`records may be disclosed, as a routine use, to the International Bureau of the World Intellectual Properly
`Organization, pursuant to the Patent Cooperation Treaty.
`A record in this system of records may be disclosed, as a routine use, ia another federal agericy for purpases
`of National Security review (35 LUS.C. 184) and for review pursuant! to the Atomic Energy Act (42 U.S.C.
`2idich.
`A record fram this system of records may be disciosed, ag a routine use, to the Administralor, General
`Services, or histher designee, during an inspection of records conducted by GSA as par of thal agency's
`responsibilty fo recommend improvements in recards management praciices and programs, under authoniy of
`44 1}.5.0, 2804 and 2908. Such disclosure shall be made in accordance with the GSA requiations governing
`inspection of raourds for this ourpase, and any other relevant (ie., GSA or Commerce) directive. Such
`disclosure shall not be usec to make determinations about individuals.
`A record fromthis systemof recorcds may be disclosed, as a routine use, to the public after either publication of
`the application pursuant to 35 U.S.C. 122{b) or issuance of a patent pursuant to 93 U.S.C. 151, Further, a
`record may be disclosed, subject to the limitations of 37 CFR 1.14, as a routine use, to ihe public if the record
`was filed in an application which becarne abandoned or in which the proceedings were terminated and which
`application ps referenced by ether @ published! application, an apptication open to public inspection or an issuect
`patent.
`A record fromthis system of records may be disclosed, as a routine use, to a Federal, State, or local law
`anfarcament agenoy, ifthe USPTO becomes aware of a violation or potential violation of law or regulation.
`
`2 of 54
`
`2 of 54
`
`

`

`DIGITAL CAMERA PROCESSING SYSTEM
`
`[0001] Checks typically provide a safe and convenient method for an individual to purchase
`
`goods and/or services. To use a check, the individual usually must open a checking account, or
`
`other similar account, at a financial institution and deposit funds, which are then available for
`
`later withdrawal. To pay for goods and/or services with a check, the payor(i.e., the buyer)
`
`usually designates a payee(i.e., the seller) and an amount payable on the check.In addition, the
`
`payor often signs the check. Once the check has been signed,it is usually deemed negotiable,
`
`meaning the check may be validly transferred to the payee upon delivery. By signing and
`
`transferring the check to the payee, the payor authorizes funds to be withdrawn from the payor's
`
`account on behalf of the payee in return for the goods and/or services provided by the payee.
`
`[0002] Checks havecertain advantages over other forms of payment, such as cash. For
`
`example, while often considered the most liquid type of asset, cash also may be the least secure.
`
`Unlike a check, cash is usually freely transferable and does not have to be endorsed. Thus, the
`
`ownerand possessor of cash is most often the same individual. Because cashis freely
`
`transferable, cash that is lost or stolen typically cannot be recovered. Therefore, the risks
`
`associated with cash transactions are often unacceptable, particularly with respect to transactions
`
`not conducted in person (e.g., by mail) and/or involving large sums of money. A check, on the
`
`other hand, provides a payor with more security because the check usually requires a payor to
`
`specify both the person and amountto be paid. Furthermore, as noted above, the checkis usually
`
`not valid until it is properly signed by the payor. These safeguards help to reduce the risk that
`
`money will be lost and/or stolen and ensure that the proper payee receives the proper amount of
`
`money.
`
`[0003] Cash may haveother disadvantages as well. For example, becausecashis freely
`
`transferable, there may be little or no verifiable transaction history. It is often desirable for a
`
`payor and/or payee to have physical proofthat a particular transaction took place. This typically
`
`requires that the payor receive a receipt. However, receipts may contain errors and can be easily
`
`misplaced. In contrast, a bank processing a check will ordinarily create a transaction history,
`
`which may include the identity of the payee, the amountto be paid, the date of the payment, and
`
`the signature of the payor. This enables both a payor and payee to independently verify the
`
`accuracy of most transactions involving a paymentby check.
`
`3 of 54
`
`3 of 54
`
`

`

`[0004] While a check mayprovide a payor with a convenient and secure form of payment,
`
`receiving a check may put certain burdens on the payee, such as the time and effort required to
`
`deposit the check. For example, depositing a check typically involves going to a local bank
`
`branch and physically presenting the check to a bankteller. In addition to the time commitment
`
`that may be required, visiting a bank branch may be problematic for the payee if the bank's hours
`
`of operation coincide with the payee's normal hours of employment. Thus, the payee may be
`
`required to leave work early and/or change work schedules.
`
`[0005] A check maypose other burdens for the payee. As noted above, a check may not be
`
`freely transferable, thereby limiting the payee's ability to use funds from the check. For
`
`example, it is usually difficult to for the payee to purchase goods and/or services using a check
`
`issued by the payor. While the check may be endorsed and acceptedbyathird party, such
`
`transactions are often disfavored because the third party may not know the payor and, thus, may
`
`not be willing to accept the risk that the payor has insufficient funds to cover the check.
`
`Therefore, the payee may not have access to the funds from the check until the payee deposits
`
`the check at the bank, the check has cleared and the funds have been credited to the payee's
`
`account. The payee may haveto wait even longerif the payee chooses to deposit the check by
`
`mail. Therefore, there is a need for a convenient method of remotely depositing a check while
`
`enabling the payee to quickly access the funds from the check.
`
`[0006]
`
`The described embodiments contemplate a system, method and computer-readable
`
`medium with computer-executable instructions for remotely redeeming a negotiable instrument.
`
`In an embodiment, a novel system mayinclude financial institution electronics, such as a server
`
`equipped with appropriate hardware and software for facilitating deposit of a check. Such
`
`electronics may be configured for receiving from a customer computeran identification of an
`
`accountfor deposit of a check, and an amountof said check. They may be further configured for
`
`receiving an image ofa front side of said check, and for analyzing said imageto determineifit
`
`meets at least one criterion. The criterion could be, for example, image size, imagelegibility,
`
`image orientation, image format, presence of certain image features that indicate the image in
`
`fact represents a check, and so forth. Financial institution electronics may be also configured for
`
`determining if there is an error in a deposit transaction. Numerouserrors are possible candidates
`
`for detection, and several exemplary errors are provided herein. If there are no errors that warrant
`
`aborting the transaction, then such electronics may be further configuredto initiate a deposit of
`
`4 of 54
`
`4 of 54
`
`

`

`the check.
`
`[0007]
`
`In another embodiment, a novel system may include, for example, a computer readable
`
`medium bearing instructions that can configure a customer's general purpose computerto
`
`facilitate a check deposit. Acting under direction of such instructions, the general purpose
`
`computer may instruct a customer, for example via a display coupled such computer, in utilizing
`
`an image capture device to generate an electronic imageof a front side of a check, such that said
`
`electronic image of a front side of a check meetsat least one first criterion such as imagesize,
`
`imagelegibility, image orientation, image quality, and location and/or orientation of the check
`
`within the image. Instructions may further be provided for receiving the imageofa front side of
`
`a check from said image capture device, and optionally instructing the customer to process the
`
`image, e.g., by approving the image and/or modifying it to meet at least one secondcriterion. A
`
`secondcriterion might also be, for example, one or more of imagesize, imagelegibility, image
`
`orientation, image quality, and location and/or orientation of the check within the image. Finally,
`
`the customer computer, acting under direction of the instructions, may deliver an approved
`
`electronic imageto financial institution electronics.
`
`[0008] Additional advantages and features of the invention are described below.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`[0009]
`
`The systems and methods for remote deposit of checks in accordance with the present
`
`disclosure are further described with reference to the accompanying drawings in which:
`
`[0010]
`
`Figure 1 illustrates a broad view of a system in which the described embodiments may
`
`be employed.
`
`[0011]
`
`Figure 2 an exemplary general purpose computing device that is communicatively
`
`coupled to financial institution electronics as well as an image capture device.
`
`[0012]
`
`Figure 3 illustrates an exemplary schematic architecture of an image capture device as
`
`may be used in connection with various embodiments of the invention.
`
`[0013]
`
`Figure 4 illustrates an exemplary network architecture as may connect the customer's
`
`general purpose computerto financial institution electronics and may also serve to connect
`
`componentsof financial institution electronics as well as variousfinancialinstitutions to one
`
`another.
`
`[0014]
`
`Figure 5 illustrates financial institution electronics coupled to a computer 530, and the
`
`various aspects of electronics 500 and computer 530 that may operate to implement the novel
`
`5 of 54
`
`5 of 54
`
`

`

`systems, methods, and computer readable mediaset forth herein.
`
`[0015]
`
`Figure 6 illustrates a view of the invention with particular focus on the software
`
`component 600 which may perform certain operations in connection with embodiments of the
`
`invention.
`
`DETAILED DESCRIPTION
`
`[0016] Certain specific details are set forth in the following description and figures to provide
`
`a thorough understanding of various embodiments of the invention. Certain well-known details
`
`often associated with computing and software technologyare notset forth in the following
`
`disclosure, however, to avoid unnecessarily obscuring the various embodiments of the invention.
`
`Further, those of ordinary skill in the relevant art will understand that they can practice other
`
`embodiments of the invention without one or more ofthe details described below.Finally, while
`
`various methods are described with reference to steps and sequences in the following disclosure,
`
`the description as suchis for providing a clear implementation of embodiments of the invention,
`
`and the steps and sequencesof steps should not be taken as required to practice this invention.
`
`[0017]
`
`Fig. 1 illustrates an example system in which the described embodiments may be
`
`employed. System 100 may include account owner110, e.g., a bank customer who may be
`
`located, for example, at the customer's private residence. The account owner 110 may be
`
`utilizing a customer-controlled, general purpose computer 111. General purpose computer may
`
`be coupled to an image capture device 112. Customer 110 may use the image capture device 112
`
`to generate an image of a negotiable instrument such as a check, and may send the image, along
`
`with any other data as appropriate, via a publicly accessible network 120 to financial institution
`
`130 electronics such as server 131.
`
`[0018]
`
`In one embodiment, the financial institution controlling electronics 131 is also the
`
`institution at which the customer has an account 160. Financial institution 130 may perform a
`
`variety of steps to process the incoming check image andother data. For example,financial
`
`institution may ensure the checkis valid, ensuring the check imageis in proper form for
`
`electronic handling, ensureit is not a duplicate of a previously deposited check, and so forth.
`
`Financial institution 130 may also forward the image over a network 125 to one or more other
`
`entities 140, 150, which may be associated with an account 170 on which the check was drawn.
`
`[0019] A general purpose computer 111 is generally a Personal Computer (PC) running one of
`
`the well-known WINDOWS® brand operating systems made by MICROSOFT® Corp., or a
`
`6 of 54
`
`6 of 54
`
`

`

`MACINTOSH®(Mac) brand computer, running any of the APPLE® operating systems. General
`
`purpose computers are ubiquitous today and the term should be well understood. A general
`
`purpose computer 111 may be in a desktop or laptop configuration, and generally has the ability
`
`to run any numberof applications that are written for and compatible with the computer's
`
`operating system. The term "general purpose computer" specifically excludes specialized
`
`equipment as may be purchased by a business or other commercial enterprise, for example, for
`
`the specialized purpose of high-speed, high-volume check deposits. A particular advantage of
`
`embodiments of the invention is its ability to operate in conjunction with electronics that today's
`
`consumersactually own or can easily acquire, such as a general purpose computer, a scanner,
`
`and a digital camera.
`
`[0020] An exemplary general purpose computer 111 as may be utilized in conjunction with
`
`embodiments of the invention is illustrated in Fig. 2. Device electronics 200 are illustrated in Fig.
`
`2, and a schematic blowup 202 is providedtoillustrate an exemplary internal architecture of the
`
`device. Computing architecture 202 includes one or more processors or processing units 204, a
`
`system memory 206, and a bus 208 that couples various system components including the
`
`system memory 206 to processors 204. The bus 208 represents one or more of any of several
`
`types of bus structures, including a memory bus or memory controller, a peripheral bus, an
`
`accelerated graphics port, and a processoror local bus using any of a variety of bus architectures.
`
`The system memory 206 includes read only memory (ROM)212 and random access memory
`
`(RAM) 210. A basic input/output system (BIOS) 214, containing the basic routines that help to
`
`transfer information between elements within computing device 200, such as duringstart-up, is
`
`stored in ROM 212.
`
`[0021] Computing architecture 202 further includes a hard disk drive 226, and may include a
`
`magnetic disk drive 2218 for reading from and writing to a removable magnetic disk 220, and an
`
`optical disk drive 222 for reading from or writing to a removable optical disk 224 such as a CD
`
`ROMorother optical media. The hard disk drive 226, magnetic disk drive 218, and optical disk
`
`drive 224 are connected to the bus 208 by appropriate interfaces. The drives andtheir associated
`
`computer-readable media provide nonvolatile storage of computer-readable instructions, data
`
`structures, program modules and other data for computing device 200. Although the exemplary
`
`environment described herein employs a hard disk, a removable magnetic disk 218 and a
`
`removable optical disk 224, other types of computer-readable media such as magnetic cassettes,
`
`7 of 54
`
`7 of 54
`
`

`

`flash memory cards, digital video disks, random access memories (RAMs), read only memories
`
`(ROMs), and the like, may also be used in the exemplary operating environment.
`
`[0022] A numberof program modules maybe stored on the hard disk 226, magnetic disk 218,
`
`optical disk 224, ROM 212, or RAM 210, including an operating system 227, one or more
`
`application programs 228, other program modules 230, and program data 232. A user may enter
`
`commandsand information into computing device 200 through input devices such as a keyboard
`
`234 and a pointing device 236. An image capture device 246 may also be coupledto the general
`
`purpose computer 200 as an input device. Other input devices 238 may include a microphone,
`
`joystick, game pad,satellite dish, or the like. These and other input devices are connected to the
`
`processing unit 204 through interfaces 240 that are coupled to the bus 208. A monitor 242 or
`
`other type of display device is also connected to the bus 208 via an interface 224, such as a video
`
`adapter 224.
`
`[0023] Generally, the data processors of computing device 200 are programmed by means of
`
`instructions stored at different times in the various computer-readable storage media of the
`
`computer. Programs and operating systems may be distributed, for example, on floppy disks,
`
`CD-ROMs,orelectronically, and are installed or loaded into the secondary memory ofa
`
`computer. At execution, the programs are loadedatleast partially into the computer's primary
`
`electronic memory 206.
`
`[0024] Computing device 200 may operate in a networked environmentusing logical
`
`connections to one or more remote computers, such as financial institution electronics 248. The
`
`financial institution electronics 248 may be one or more server computers, routers, network PCs,
`
`and so forth, which typically include manyorall of the elements described aboverelative to
`
`computing device 200. Thefinancial institution electronics 248 may run remote application
`
`programs 258 which mayoperate in concert with application programs 228 that execute on the
`
`computer 200. For example, a "software component" as described herein may, in one
`
`embodiment, execute pursuant to commands from a remote application program 258. The
`
`software component may of course also operate in a more autonomous manner, performing
`
`certain tasks and then communicating data as necessary back to the remote application programs
`
`258.
`
`[0025] When used in a LAN networking environment, a computer 200 is connected to a local
`
`network 250 through a network interface or adapter 254. When used in a WAN networking
`
`8 of 54
`
`8 of 54
`
`

`

`environment, computing device 200 typically includes a modem 256 or other means for
`
`establishing communications over the wide area network 252, such as the Internet. The modem
`
`256, which maybe internal or external, can be connected to the bus 208 for example via a serial
`
`port interface, or by sending a signal to a wireless router which then broadcasts and receives
`
`wireless signals to and from a wireless card that is connected to the computer 200.
`
`[0026]
`
`In anetworked environment, program modules depictedrelative to the computing
`
`device 200, or portions thereof, may be stored in the remote memory storage device. It will be
`
`appreciated that the network connections shown are exemplary and other meansofestablishing a
`
`communications link between the computers may be used.
`
`[0027] A general purpose computer such as 200 mayalso be "customer-controlled." A
`
`common example of a customer-controlled computer would be a typical computer located in a
`
`private residence. The ownerof such a computertypically has the powerto install programs and
`
`configure the computeras they wish, subject to certain security restrictions that may be imposed
`
`by the hardware or software manufacturers. A customer-controlled computer need not be located
`
`in a private residence, however. For example, computers in college dormitories, in workplace
`
`offices, and so forth may also be considered to be "customer-controlled."
`
`[0028] An example of a computer that would not be considered customer-controlled would be
`
`an Automatic Teller Machine (ATM)thatis typically controlled by a bank or other business.
`
`Although a customer may access and utilize an ATM machine, the ATM machineis not
`
`customer-controlled because the allowed uses of the ATM machineare highly restricted.
`
`Relevant factors in determining whether a machine is customer controlled are thus the scope of
`
`operations that a customer may perform using the machine, and extent to which the customer can
`
`reconfigure the machine in some way by adding software and/or hardware components.
`
`[0029]
`
`Oneof the applications 228 that may run on a general purpose computer 200 in
`
`connection with the invention is a browser. Commonbrowsersin use today are, for example, the
`
`popular INTERNET EXPLORER®line of browsers made by MICROSOFT® Corp., the
`
`FIREFOX® browsersdistributed via the MOZILLA® open source project, and the NETSCAPE
`
`NAVIGATOR®browsersalso distributed via the MOZILLA® opensource project. Browsers
`
`generally allow users to point to a Uniform Resource Locator (URL), and thereby retrieve
`
`information such as a web page. For example, a browser application on computer 200 could
`
`retrieve a web pagethat is kept at server associated with financial institution electronics 248, and
`
`9 of 54
`
`9 of 54
`
`

`

`display the web page on display 242 to the account owner 110 (Fig. 1), as is generally known
`
`and appreciated in the industry and by the general public.
`
`[0030] Another application 228, or set of applications, that may run on a general purpose
`
`computer 200 in connection with the invention comprises "virtual machine" technologies such as
`
`the JAVA®virtual machine software distributed by SUN MICROSYSTEMS® Corp, and
`
`.NET® Framework distributed by MICROSOFT® Corp. In general, such applications facilitate
`
`execution of further application programs 228 in a variety of computing environments. For
`
`example, a JAVA® applet is a computer program (which maybe alternatively referred to herein
`
`as a "software component") that can execute on any computer running the JAVA®virtual
`
`machine software. The applet may be provided to virtual machine software in a "source code"
`
`format, and may be compiled by a "just in time" compiler, so as to put the applet in a form that
`
`can be executed by the hardware associated with the particular computing device. These
`
`technologies are knownin the art and may be utilized in connection with certain embodiments of
`
`the invention as described herein.
`
`[0031] Referring back to Fig. 1, an image capture device 112 may be communicatively
`
`coupled to the computer 111. Image capture device 112 may be, for example, a scannerordigital
`
`camera. Computer 111 may comprise software that allows the user to control certain operations
`
`of the image capture device 112 from the computer 111. For example, modern scannerusers may
`
`be familiar with the TWAIN®software is often used to control image capture from a computer
`
`111. Similarly, digital cameras often ship along with software that allows users to move images
`
`from the camera to a computer 111, and may also provide additional functions, such as photo
`
`editing functions crop androtate.
`
`[0032] Referring now to Fig. 3, a schematic illustration of an exemplary image capture device
`
`architecture 300 is illustrated. As with the general purpose computer 200 of Fig. 2, an image
`
`capture device may comprise a processing unit 302 and memory 303. Depending on the exact
`
`configuration and type of image capture device, memory 303 may be volatile (such as RAM),
`
`non-volatile (such as ROM,flash memory, etc.) or some combination of the two. Additionally,
`
`image capture device 300 may have mass storage (removable 304 and/or non-removable 305)
`
`such as magnetic or optical disks or tape. Image capture device 300 may have image capture
`
`apparatus 307 such as a scannerbed, cameralens, and so forth. Finally, image capture device
`
`300 may include communication connections 308 to other devices, computers, networks, servers,
`
`8
`10 of 54
`
`10 of 54
`
`

`

`etc. using either wired or wireless media. In particular, communication connections 308 may
`
`serve to communicatively couple device to a general purpose computer such as provided in Fig.
`
`2.
`
`[0033] Referring back to Fig. 1, financial institutions 130, 140 and 150 maybe any type of
`
`entity capable of processing a transaction involving a negotiable instrument. For example,
`
`financial institutions 130, 140 and 150 maybe a retail bank, investment bank, investment
`
`company, regional branch of the Federal Reserve, clearinghouse bank and/or correspondent
`
`bank. A negotiable instrumentis usually a type of contract that obligates one party to pay a
`
`specified sum of moneyto another party. By way of example, and notlimitation, negotiable
`
`instruments may include a check,draft, bill of exchange, promissory note, and the like.
`
`[0034]
`
`Financial institution 130 is illustrated as associated with a server 131. Financial
`
`institution 130 may maintain and operate server 131 for the purposes of communicating with
`
`customers such as 110. Alternatively, such server may be maintained and operated by one or
`
`more third party vendors whoact underthe instructionsof the financial institution 130, but
`
`possess skills and resources that may be moreeffective in competent operation of electronics.
`
`Such arrangements are well knownin the industry and in this case the server 131 is nonetheless
`
`considered to be "associated" with the financial institution 130.
`
`[0035] Account owner 110 maybe an individual who ownsaccount 160, which may be held at
`
`financial institution 130. As such, account owner 110 may be described as a customerof
`
`financial institution 130 and/or a "payee" becauseit is contemplated that customer 110 may
`
`deposit a check made out to him- or herself. Embodiments of the invention are also possible,
`
`however, in which the customer deposits a check madeto another payee, in which case the
`
`customer and payee are not one and the same. Account 160 maybe any type of account for
`
`depositing funds, such as a savings account, checking account, brokerage account, andthelike.
`
`Account owner 110 may communicate with financial institution 130 by way of communication
`
`network 120, which mayinclude an intranet, the Internet, a local area network (LAN), a wide
`
`area network (WAN), a public switched telephone network (PSTN), a cellular network, a voice
`
`overinternet protocol (VoIP) network, and the like. Account owner 110 may communicate with
`
`financial institution 130 by phone, email, instant messaging, facsimile, andthelike.
`
`[0036]
`
`In one contemplated embodiment, network 120 is a publicly accessible network such as
`
`the Internet, which can presently be accessed from many private residences and many public
`
`9
`11 of 54
`
`11 of 54
`
`

`

`places such as college campuses,airports, coffee shops, and restaurants throughout the United
`
`States as well as many other countries of the world. A variety of technologies are available to
`
`establish secure connections over such a public network, so that data transmitted between
`
`computer 111 and a server 131 associated with the institution 130 remainseither inaccessible or
`
`indecipherable by third parties that may intercept such data. The invention may make use of any
`
`such security technologies.
`
`[0037]
`
`Financial institutions 130, 140 and 150 may communicate with each other via a
`
`network 125. Network 125 may bea publicly accessed network such as 120. Alternatively,
`
`network 125 may havecertain characteristics that differ from network 120, dueto the different
`
`requirements of bank-to-bank communications. For example, one might envision certain security
`
`features and access restrictions being more important in bank-to-bank communications.
`
`[0038]
`
`Fig. 4 illustrates an exemplary computer network as may be implemented in connection
`
`with 120 and 125. One of ordinary skill in the art can appreciate that networks can connect any
`
`computeror other client or server device, or in a distributed computing environment.In this
`
`regard, any computer system or environment having any numberof processing, memory, or
`
`storage units, and any numberofapplications and processes occurring simultaneously is
`
`considered suitable for use in connection with the systems and methodsprovided.

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket