Software – Charles Lee Oakes, III, Randy Ray Morlen, Bharat Prasad, Troy Bartlette Huth, United Services Automobile Association USAA

Abstract for “Systems and Methods for Remote Deposit of Checks”

A financial institution can facilitate remote deposit of checks. The customer’s general-purpose computer and an image capture device can be used to capture a check image and send it to electronic financial institutions. As needed, additional data may be required for the transaction. The images and data can be used to automatically complete the transaction.

Background for “Systems and Methods for Remote Deposit of Checks”

“The described embodiments include a system, method, and computer-readable medium that contains computer-executable instructions to remotely redeem a negotiable instruments. A novel embodiment may involve delivering a software component to a customer controlled general purpose computer via a public computer network. The customer is asked to identify an account using said computer and to provide an image at least of the front side of a checked image. This can be done by scanning the check, rotating the image appropriately, cropping it as needed, or even scanning it. The image is transferred from the scanner or other image capture device to the software component. This software manages delivery to banks servers.

“Another embodiment of the novel method could include receiving, at an server computer, a request from customer for customer capability to make at most one check deposit using a customer-controlled general-purpose computer. The customer is then provided with the software component to facilitate the check image capture process. An image of the front side of a check and customer identification are received. The optical character recognition (OCR), is then performed on the Magnetic Ink Character Recognition line location of each image. You can use the OCR information and the received information to complete your deposit.

“Another embodiment may involve receiving customer identification for an account, receiving a first picture of the front side of a cheque, and where said first image is in a file format such as JPEG. JPEG and said first image is sent from a customer-controlled, general purpose computer. The second image of the front of the check can then be created by converting the first image to a second file format (e.g. A bi-tonal TIFF. One or more images from said first and second images may be combined with other information that could be useful in processing and/or troubleshooting the transaction.

“Additional benefits and features of this invention are described below.”

“The following description and figures provide an in-depth understanding of different embodiments of the invention. To avoid obscure the different embodiments of the invention, certain well-known details that are often associated with software technology and computing are not included in the following disclosure. Those of ordinary skill in relevant art will be able to practice other embodiments without needing any of the details below. Finally, although various methods are described in the following disclosure with reference to specific steps and sequences, this description is intended to provide a clear implementation for embodiments of the invention. The steps and sequences should not be considered necessary to practice the invention.

“General purpose computer 111 may also be ?customer-controlled.? A typical computer found in a private home is an example of a customer-controlled machine. A customer-controlled computer is one that the owner can install and configure programs as they like, but must adhere to security restrictions set by software or hardware manufacturers. However, a customer-controlled computer does not have to be in a private home. For example, computers in college dormitories, in workplace offices, and so forth may also be considered to be ?customer-controlled.?”

An ATM machine that is usually controlled by a bank or another business would be one example of a computer that could not be considered customer-controlled. The ATM machine cannot be accessed by customers. However, they can access it and use it. The scope of customer-controlled operations, as well as the extent to which the customer has the ability to reconfigure the machine by adding software or hardware components are key factors in determining whether the ATM machine is customer-controlled.

“An image capture unit 112 could be communicatively connected to the computer 112. An image capture device could be, for instance, a scanner, or digital camera. The software in computer 111 could allow the user to manage certain operations on the image capture device 112 via the computer 111. Modern scanner users might be familiar with TWAIN software, which is used to control image capture on a computer 111. Digital cameras are often shipped with software that allows you to move images from your camera to a computer 110. It may also include additional functions such as cropping and rotating.

“Financial institution 130, 140 and 150 could be any entity that can process a transaction involving negotiable instruments. Financial institutions 130, 140, and 150 could be retail banks, investment banks, investment companies, regional branches of the Federal Reserve, clearinghouse banks, and/or correspondent banks. A negotiable Instrument is a contract that requires one party to pay a certain amount of money to another. A check, draft or bill of exchange can be negotiable instruments.

“Financial institution 130” is shown as being associated with server 131. Financial institution 130 could maintain and operate server 131, in order to communicate with customers 110. Or, the server could be managed and operated by third-party vendors, who may act under the direction of financial institution 130 but have the skills and resources to be more efficient in the operation of electronic devices. These arrangements are common in the industry. In this instance, the server 131 is still considered to be “associated”. With the financial institution 130.”

“Account owner 110” could be an individual who has account 160. This account may be kept at financial institution 130. Account owner 110 could be considered a customer of financial institution130. An account 160 can be any type account that allows you to deposit funds. This could include a checking account, savings account, brokerage account or checking account. 110 account owner may communicate with 130 financial institution via communication network 120. This network may include an intranet or the Internet, a large area network (LAN), wide area network(WAN), public switched telephone network (?PSTN?), cellular network, voice over internet protocol network (VoIP), and other networks. Account owner 110 can communicate with financial institution 130 via phone, email, instant messaging and facsimile.

“Network 120, in one embodiment, is a public network, such as the Internet. It can be accessed from private residences as well as public places like airports, colleges, coffee shops and restaurants across the United States and other countries. There are many technologies that can be used to establish secure connections over a public network. Data transmitted between computer 110 and server 131 associated at the institution 130 will remain inaccessible or unintelligible by third parties who may intercept it. Any security technology may be used in the invention.

“Financial institutions 130-140 and 150 can communicate with one another via network 125. Network 125 could be a public network like 120. Network 125 could also have characteristics that are different from network 120 due to bank-to-bank communication requirements. One might imagine certain access restrictions and security features being more important in bank to bank communications.

“In one embodiment, account owner 110 might wish to deposit a check drawn from account 170 at financial institutions 150. Account owner 110 can deposit the check into 160 by converting it into electronic data, and then sending it to financial institution 130. Systems and methods that account owner 110 uses to perform the invention’s various aspects may include his computer 111 and the computer 111. Systems and methods that enable the account owner 110 to deposit money may also be included in aspects of the invention.

“For example, account owners 110 and 110 can convert a check into a digital picture by scanning the front or back of the check with an image capture device 1112. The image can then be sent to 130 by account owner 110 using the methods and systems described herein. Refer to FIG. 2. and the corresponding description to see an exemplary embodiment of systems, methods and procedures for processing and facilitating a check deposit transaction. The image can be received by financial institution 130. Financial institution 130 can clear the check by presenting the image digitally to an intermediary bank such as a regional branch or clearinghouse bank.

“For example, a check can be cleared by showing the digital image to financial institution 140. This may be a regional branch or the Federal Reserve. The regional branch of Federal Reserve may have accounts for financial institution 130 or 150. Financial institution 130 can create a substitute cheque using the account owner’s image 110. The substitute check may then be presented to financial institution 140 for processing. Financial institution 140 can identify financial institution 150 (e.g. the bank from which the cheque was drawn) upon receiving the substitute check. A nine-digit routing number may be used to do this. It is located in the bottom left corner of the check. Every financial institution in the United States is assigned a unique routing number. Financial institution 140 can present the substitute check to financial institutions 150 and request payment. Financial institution 150 may verify the check and authorize financial institution 140 to pay the check. This will allow financial institution 140 to debit financial institution 150 and credit financial institution 130 with the funds. Financial institution 150 can then debit funds from account 170.

“It is understood that the examples given are only for illustration and explanation and that an embodiment does not have to be limited to these examples. Financial institution 150 could be considered a correspondent bank, i.e., it may be in partnership with financial institution 130. Financial institution 130 could bypass the Federal Reserve regional branch and clear the check directly at financial institution 150. Account 160 and 170 can be both held at financial institution 130. In this case, the check could be cleared internally.

“FIG. 2. illustrates a process for depositing a check using a general-purpose computer controlled by the customer. FIG. 2 outlines the steps involved in depositing a check from a customer-controlled general purpose computer. 2. may be considered to have been performed by a server computer that is associated with a financial institution and a software component which operates from a customer controlled general purpose computer. The server may perform some of these steps, but the software component can do other steps.

“In FIG. 2 The darker boxes signify steps that the server performs, such as delivering information to the user via the browser. Effectively delivering information to customers via a browser from a server is called “delivering?” This information is necessary for the purposes this document. The lighter boxes in 211 represent steps performed by the software component as it executes on customer’s computer. Skilled users will be able to recognize that it is possible to create alternative configurations by shifting functions from one server to another or vice versa.

“The server might first deliver a component of software to the customer’s general-purpose computer 200. This could be in response to customer requests for the ability to make deposits from his computer. One embodiment may only offer this capability to customers who meet certain criteria. It may be necessary that customers have a set number of financial services with the financial institution, such as: customer accounts in good standing, customer relationships that last a certain amount of time, and that they have a predetermined number. bank accounts, mortgages, insurance policies, etc. The customer must have a set amount of assets with the financial institution.

After downloading the software component and accepting it, the customer can now make deposits using his computer. The customer may point his browser to a bank site, and a link might be provided that allows the bank server to initiate deposit transaction 201. A customer might be asked to log on using a username and password.

“The customer might be asked to choose an account in which the deposit will be made. 202 You can do this by giving a website that lists all available accounts and an instruction on how to choose an account. A box can be provided in which the customer can type an account number and an instruction on how to select the account. It doesn’t have to be the customer account. However, it’s possible that large amounts of customer deposits could be made into the account. In such cases, it may be useful to limit the accounts allowed to customers’ accounts. Step 202 could be eliminated if the customer only has one account with the financial institution. In this case, the only allowed account is the customer’s own account.

“The customer might be asked to identify the amount of a check or any other negotiable instruments he wants to deposit into the chosen account 203. This can be done in a similar fashion to step 202. The webpage will contain a box where the customer can enter the amount and the appropriate instructions. You can also instruct the customer to endorse the check 204.

“The customer might be asked to take an image of the front of a check 205 using an image capture device. One embodiment may instruct the customer to place the check face-down on a flatbed scanner. The customer may also be instructed about the orientation and location of the check on that scanner. The customer might be asked to take a digital photo of the check with a digital camera. This may include instructions about the location and orientation of the check as well as lighting and angle, distance, focal length (zoom), and other details. This is where the software component can be helpful in providing a visual illustration of how the customer should submit the image. Customers may also be provided instructions on how to activate and/or move an image from the device to a general-purpose computer.

“In one embodiment, the software component is designed to control the transaction and transaction data in all aspects of the transaction. The software component could open a folder on a storage location such as the hard disk of a general-purpose computer. It may also work with any other software that interfaces to the image capture device to deposit an image in the folder. This can be done in a secure way to avoid any image manipulation or diversion. Although the hard drive of the general-purpose machine is considered to be the storage location controlled by the customer-controlled general-purpose computer, other storage locations, such as networked drives and disk drives, may also be effective controlled by the general-purpose machine.

“The software component can perform certain operations, such as opening folders and placing images within them. Or it may instruct the customer or other applications to accomplish such operations. Software operates in some way under the control of and with the support a general-purpose computer operating system. This support is appropriate for embodiments of the invention.

“The software component might cause the check image to be presented to customer for editing, e.g. Ask the customer to rotate and crop the check image in a predetermined orientation. A scanner may generate an image of the scanner bed or a larger image. The customer might be asked to indicate where the check was placed on the scanner bed’s top left corner. If this is the case, the scan image could be cropped to only include the check image. This would remove a portion from the original image.

“A properly edited image of the check can be placed in the storage area 207. Additional images may be required 208. Steps 205-207 can be repeated as needed. The customer might be asked to sign and attach an image of the check’s back. The customer might be asked to sign ‘void? in order to ensure that the check is properly voided. You can also scan the front of your check by writing?void?

“A log file can be created 209 to record data for processing or troubleshooting the transaction. Refer to FIGS. 4 and 5. 4. and 5. You can place the log file in the storage location with all the images from the check.”

Once the images have been edited and collected, they can be sent to the server for deposit 210. You may also receive the log file at this point. These files may be deleted from the customer?s general-purpose computer after they are delivered. If the server decides that the images and any associated data are sufficient, the customer may have their account provisionally credited. A confirmation page may also be sent to the customer through the customer’s browser application, 212. The server may instruct the customer to destroy, e.g. The customer may be instructed to destroy, e.g., the original physical check or any other negotiable instruments. The current US check handling procedures do not require the processing of a physical check. Neither is it necessary to keep the original checks in bank records or customer records.

“FIG. “FIG. FIG. The method of FIG. 2. To illustrate the steps that could be taken by a server, or any other electronic operated by a financial institution, before, during and after the various steps in FIG. 2 are performed.”

“In general, the FIG. 3. Such server might receive a request to deposit at home capability 300A and may then deliver a component of software to the customer 300B. As shown in FIG. As shown in FIG. 2, intermediate steps could include determining if the customer qualifies for remote deposit and ensuring that the customer has a suitable virtual machine environment installed on their personal computer. In embodiments where software requires such an environment,

A transaction can be initiated 301 after a customer indicates that they wish to make a deposit transaction. Per FIG. 2, the customer is directed to identify an account. 2. The financial institution electronics then receive an account identification (ID) 302. Similarly, financial institution electronics receive check amount 303. The software component handles image capture, which may or not involve the server until check images are received 304.”

“Upon receipt check images, an Optical Character Recognition process (OCR) may be invoked in order to determine certain information about check. OCR can be used to identify information like the payor bank routing number, account numbers, and check numbers. To verify that the bank routing number corresponds with a legitimate bank, it may be compared 306 to a list of valid routing codes. In some embodiments, it may also be verified to ensure that it corresponds with a United States bank. One embodiment of the OCR is performed in real-time, i.e. Before confirming the customer’s deposit transaction, the OCR is conducted in real time. Other embodiments may allow for certain efficiency by using a batch? OCR operations can be performed at a later date.”

“In one embodiment, OCR can be used to apply OCR to an image of the back side of a check as well as to the image of the check’s front side. There may be a problem if the customer submits two front images instead of one. OCR may be used to verify that the alleged image of the back side of the check does not contain a MICR mark. It is more likely that the alleged check’s back side is the actual check, even if there is no MICR line at such location.

OCR can also be used to locate the endorsement on the back side of a check. OCR can be used in certain embodiments to verify that the signature matches the signature of the drafter or payor of the check. Sometimes, however, signatures can be difficult to read. It is possible to identify a signature or mark in the endorsement area on the back of a check in one embodiment.

An error 317 may occur if the routing number calculated using OCR is not valid. The deposit transaction can be aborted. A customer can receive an error message 314, informing them that the transaction was not processed.

To determine if the check has been deposited previously, a duplicate checking procedure can be used. Although determining whether a check has been duplicated can be time-consuming and memory-intensive (and therefore expensive), this operation should be performed quickly and with minimal accuracy. After the deposit transaction has been confirmed 314, a more thorough duplicate detection can be done. In one embodiment, a duplicate detection process could be initiated as shown in FIG. 6.”

“FIG. “FIG. 3. Check identification data can be used to compare check deposit data 601. This could include, for instance, comparing check MICR information with MICR lines for all check deposits into the customer’s account during the past two weeks. There are other possible embodiments. For example, one could ensure that a MICR number does not contain a money amount. This is because money amounts in MICR lines indicate that a check has been deposited. One might scan the check for a return stamp. You might also search for a number 4 at position 44 on the MICR line. Banks will only make images of checks by placing a 4 at position 44. An image of the check is generally taken in advance. Therefore, it might be beneficial to make sure that the check has not been presented twice.

“Accordingly to step 602, appropriate check identification data may be added to previous deposits to identify duplicate checks.

There are many possibilities for duplicate checking to turn up false positives. This is why it can be advantageous to continue with a deposit transaction in certain embodiments, despite the possibility that a duplicate might initially be identified. FIG. FIG. 3 shows that a duplicate transaction can be detected and flagged for further inspection 315. The transaction may then be allowed to continue as illustrated in FIG. If the duplicate is not found, the transaction does not need to be flagged as abnormal. Step 315 is unnecessary.

“Returning back to FIG. 3. OCR may also be performed on check amount location 306, where the amount determined by OCR can be compared to the customer-entered amount received pursuant step 303. An error 316 may be issued if the amounts are not in line. This will result in the transaction being terminated and the customer receiving the appropriate information. OCR can also be applied to any other aspect of the check image if this is necessary in certain embodiments.

“The server can also receive and modify the deposit transaction log file 310. Alternate versions of images may be created and placed in the log file. The Check 21 regulations require that a bi-tonal TIFF-formatted image be created. This is generally a lower-quality format than other image formats. In some cases, it may be desirable to preserve both a good? and a good? image. Image in an initial format (e.g. JPEG) and modified bi-tonal IDF required by Check 21. If any troubleshooting is required, a good image can be saved.

“In certain embodiments, a stamp from the bank may be placed on the back image of the check 311, as if it were physically deposited at the bank. The appropriate images can be sent to the bank that will pay 312, while the customer’s account is provisionally credited with the check 313. The customer can receive a confirmation 314.

“At 312, the bank may forward an image (or more) to a payor banking. Provisionally crediting customer account 513 and delivering confirmation to customer-controlled general purpose computers 514 can be done prior, after, or concurrently with step 312. A provisional credit is generally subject to check clearing. This could be done by receiving confirmation from the payor bank that the check will clear. It may take some time to receive the confirmation from the bank. The confirmation 514 and provisionally crediting the customers account 513 can be sent to the customer to confirm that the transaction will go through, even if it does not succeed.

“In one embodiment, a transaction that involves an Automated Clearinghouse(ACH) transaction may allow for the forwarding of an image or set of images to a bank 512. ACH transactions usually include instructions for payment to debit or credit an account. ACH service providers are often used by banks to settle ACH transactions. ACH service providers can be identified as the Federal Reserve’s regional branches and the Electronic Payments Network (EPN).

In an ACH transaction, the payee (customer) bank can be referred as the originating financial institution (ODFI). After receiving the appropriate information from the bank, the payee may credit funds to their account and generate an ACH debit entry for the payor’s account. This may be presented to ACH service providers for processing.

“The ACH service provider can process the debit entry by identifying which account and bank the check was drawn. A receiving depository financial institution (RDFI) is the bank from which the check was drawn, i.e. the bank of the payor. The ACH service provider can settle the transaction by debiting and crediting the bank of the payor if the bank verifying the transaction. The bank of the payor may debit the account.

“A substitute check is a paper copy of an original check. It may also be considered the legal equivalent of the original. The Check Clearing for the 21st Century Act authorized substitute checks. Commonly known as Check 21, these substitute checks are also allowed. This Act was created to ease the process of clearing checks by allowing banks the ability to send electronic images (e.g. substitute checks) to other bank accounts rather than sending original paper checks. The Check 21 does not require banks to use substitute checks. Many banks will accept electronic images of check checks in voluntary agreements. However, the images may not be eligible for substitute checks under Check 21. A bank that does not have a voluntary agreement or refuses to accept an image of a check is required by Check 21 to accept a replacement check.

“The bank can process the ACH debit transaction, substitute check, or electronic image. The bank can present the ACH debit transaction to an ACH service provider (e.g. EPN), which could be responsible for settling transactions between the payee’s and payor’s banks. To complete the check clearing process, the bank may also convert the digital image to a substitute check. If the bank of the payor and the bank of the payee are identical, the transaction can be completed internally at the bank by debiting one customer’s account and crediting another. An intermediate step could be to identify if the payor and payee banks are the same or operate in close cooperation.

“FIGS. “FIGS. FIG. FIG. 4 shows how a bank server can be contacted to request a ‘deposit at home? Remote deposit capability 400A and deliver the software component to the customer’s general-purpose computer 400B, as described above. A transaction can begin at 401 and continue as described in FIGS. 2. 2 and 3. The three dots in FIG. 4 represent steps that could occur during a deposit transaction. A log file may be generated during a transaction. This could be done by a software component installed on a customer-controlled, general purpose computer. The software component may deliver the log file to the server. It can include log file data. Log file data could include, for instance, the data shown in FIG. 500. 5.”

One embodiment allows a financial institution server to receive check images 404 and log file data from the software component 405 in one embodiment. Other embodiments will be easily recognized as possible, including placing the images into the log file and merging steps 404 and 405 or streaming raw data without any type of file structure and allowing the server generate a file after receiving such data.

Step 406 is the conversion of an image from a primary format to a secondary format. One embodiment uses the first format to refer to a high-quality Joint Photographic Experts Group format (JPEG). This format might have been generated initially by an image capture device that was used by a customer to create the check image. This image is a great tool to troubleshoot a deposit transaction due to its high quality. It might be possible to determine if the image is a check that has been deposited previously by simply examining both images.

The second format, in one embodiment is a format that meets bank-to-bank image-transfer requirements. Check 21 currently requires that the image format be the bi-tonal Tag Image File Form (TIFF). The second format could be, for instance, a bi-tonal tag image file format (TIFF).

“In another embodiment, images in both formats can also be saved, such as in the log file. Each image can be used for its own purpose: the first is for troubleshooting and the second for regulatory compliance or business necessity. Step 407 shows how to create a log file using log file data and images. The term “generating” may be interchanged for “modifying?” The term?generating? may be used in place of?modifying? In some embodiments, such as. In some embodiments, e.g. Each step to generate an aspect of the log file 500 can be broken down into multiple steps. 5.”

Referring to FIG. “Referring now to FIG. A log file may contain the identification of an image capture tool used to create an image of a check. This could include a scanner model and make, as well as a digital camera model and other information, such a Global Unique Identifier for image capture devices (GUID). The identification information could also include the identification of the software associated with it, such as the TWAIN drivers, which can be used with scanners and digital cameras, or other image capture devices.

“Furthermore with regard to logfile 500, a customer operating systems can include an identification of the operating software used by the customer’s general-purpose computer. A customer browser version may include the browser that is used by the customer’s main computer. The image capture device model, make, and model can include the type of device used, manufacturer, model number, and device name. ?JAVA version? ?JAVA version? Transaction data can include information like transaction ID, account number and customer name. It may also include check routing numbers, check numbers, check numbers, check account numbers, and so on. If an error occurs, the reason for it may be given. For example, an invalid check routing number or different amounts identified by customers and the OCR process. The?good? image (customer generated image) and the?required? The?good?image (customer-generated image) and the “required?” image (required for bank-to-bank image transfer) may be included. image (required to transfer image bank-to-bank) may also be included.

A troubleshooting, or log file viewing app 501 may consume log file 500. This application can be used to help solve specific deposits problems and view log files. Application 501 can also gather statistical information, the like, about all log files.

The various techniques described in this document can be implemented using either hardware or software, or, where appropriate, a combination of both. The disclosed methods and apparatus, or some aspects or portions thereof may be implemented with hardware or software. For program code execution on programmable computer, the computer generally includes a processor, storage medium readable (including volatile memory and/or storage element), at least 1 input device, and at most one output device. To communicate with a computer, one or more programs should be implemented in high-level procedural or object-oriented programming languages. If desired, however, the program(s), can be implemented in either assembly or machine language. The language can be either a compiled language or an interpreted language and may be combined with hardware implementations.

The described methods and apparatus can also be implemented in the form program code. This code is transmitted over any transmission medium, including electrical wiring, cabling, fiber optics, or other transmission media. When the program code is received, loaded into, and executed by a machine such as an EPROM or gate array, a programmeable logic device (PLD), client computers, a video recorder, or the like, it becomes an apparatus for practicing and implementing the invention. The program code is combined with the general-purpose processor to create a unique apparatus capable of performing the disclosed embodiments.

“In addition to the implementations specifically set forth herein,” the specification will make it clear to those skilled in art that there are other aspects and implementations. The specification and illustrated implementations should be considered examples and not the whole of the claims.

Summary for “Systems and Methods for Remote Deposit of Checks”

“The described embodiments include a system, method, and computer-readable medium that contains computer-executable instructions to remotely redeem a negotiable instruments. A novel embodiment may involve delivering a software component to a customer controlled general purpose computer via a public computer network. The customer is asked to identify an account using said computer and to provide an image at least of the front side of a checked image. This can be done by scanning the check, rotating the image appropriately, cropping it as needed, or even scanning it. The image is transferred from the scanner or other image capture device to the software component. This software manages delivery to banks servers.

“Another embodiment of the novel method could include receiving, at an server computer, a request from customer for customer capability to make at most one check deposit using a customer-controlled general-purpose computer. The customer is then provided with the software component to facilitate the check image capture process. An image of the front side of a check and customer identification are received. The optical character recognition (OCR), is then performed on the Magnetic Ink Character Recognition line location of each image. You can use the OCR information and the received information to complete your deposit.

“Another embodiment may involve receiving customer identification for an account, receiving a first picture of the front side of a cheque, and where said first image is in a file format such as JPEG. JPEG and said first image is sent from a customer-controlled, general purpose computer. The second image of the front of the check can then be created by converting the first image to a second file format (e.g. A bi-tonal TIFF. One or more images from said first and second images may be combined with other information that could be useful in processing and/or troubleshooting the transaction.

“Additional benefits and features of this invention are described below.”

“The following description and figures provide an in-depth understanding of different embodiments of the invention. To avoid obscure the different embodiments of the invention, certain well-known details that are often associated with software technology and computing are not included in the following disclosure. Those of ordinary skill in relevant art will be able to practice other embodiments without needing any of the details below. Finally, although various methods are described in the following disclosure with reference to specific steps and sequences, this description is intended to provide a clear implementation for embodiments of the invention. The steps and sequences should not be considered necessary to practice the invention.

“General purpose computer 111 may also be ?customer-controlled.? A typical computer found in a private home is an example of a customer-controlled machine. A customer-controlled computer is one that the owner can install and configure programs as they like, but must adhere to security restrictions set by software or hardware manufacturers. However, a customer-controlled computer does not have to be in a private home. For example, computers in college dormitories, in workplace offices, and so forth may also be considered to be ?customer-controlled.?”

An ATM machine that is usually controlled by a bank or another business would be one example of a computer that could not be considered customer-controlled. The ATM machine cannot be accessed by customers. However, they can access it and use it. The scope of customer-controlled operations, as well as the extent to which the customer has the ability to reconfigure the machine by adding software or hardware components are key factors in determining whether the ATM machine is customer-controlled.

“An image capture unit 112 could be communicatively connected to the computer 112. An image capture device could be, for instance, a scanner, or digital camera. The software in computer 111 could allow the user to manage certain operations on the image capture device 112 via the computer 111. Modern scanner users might be familiar with TWAIN software, which is used to control image capture on a computer 111. Digital cameras are often shipped with software that allows you to move images from your camera to a computer 110. It may also include additional functions such as cropping and rotating.

“Financial institution 130, 140 and 150 could be any entity that can process a transaction involving negotiable instruments. Financial institutions 130, 140, and 150 could be retail banks, investment banks, investment companies, regional branches of the Federal Reserve, clearinghouse banks, and/or correspondent banks. A negotiable Instrument is a contract that requires one party to pay a certain amount of money to another. A check, draft or bill of exchange can be negotiable instruments.

“Financial institution 130” is shown as being associated with server 131. Financial institution 130 could maintain and operate server 131, in order to communicate with customers 110. Or, the server could be managed and operated by third-party vendors, who may act under the direction of financial institution 130 but have the skills and resources to be more efficient in the operation of electronic devices. These arrangements are common in the industry. In this instance, the server 131 is still considered to be “associated”. With the financial institution 130.”

“Account owner 110” could be an individual who has account 160. This account may be kept at financial institution 130. Account owner 110 could be considered a customer of financial institution130. An account 160 can be any type account that allows you to deposit funds. This could include a checking account, savings account, brokerage account or checking account. 110 account owner may communicate with 130 financial institution via communication network 120. This network may include an intranet or the Internet, a large area network (LAN), wide area network(WAN), public switched telephone network (?PSTN?), cellular network, voice over internet protocol network (VoIP), and other networks. Account owner 110 can communicate with financial institution 130 via phone, email, instant messaging and facsimile.

“Network 120, in one embodiment, is a public network, such as the Internet. It can be accessed from private residences as well as public places like airports, colleges, coffee shops and restaurants across the United States and other countries. There are many technologies that can be used to establish secure connections over a public network. Data transmitted between computer 110 and server 131 associated at the institution 130 will remain inaccessible or unintelligible by third parties who may intercept it. Any security technology may be used in the invention.

“Financial institutions 130-140 and 150 can communicate with one another via network 125. Network 125 could be a public network like 120. Network 125 could also have characteristics that are different from network 120 due to bank-to-bank communication requirements. One might imagine certain access restrictions and security features being more important in bank to bank communications.

“In one embodiment, account owner 110 might wish to deposit a check drawn from account 170 at financial institutions 150. Account owner 110 can deposit the check into 160 by converting it into electronic data, and then sending it to financial institution 130. Systems and methods that account owner 110 uses to perform the invention’s various aspects may include his computer 111 and the computer 111. Systems and methods that enable the account owner 110 to deposit money may also be included in aspects of the invention.

“For example, account owners 110 and 110 can convert a check into a digital picture by scanning the front or back of the check with an image capture device 1112. The image can then be sent to 130 by account owner 110 using the methods and systems described herein. Refer to FIG. 2. and the corresponding description to see an exemplary embodiment of systems, methods and procedures for processing and facilitating a check deposit transaction. The image can be received by financial institution 130. Financial institution 130 can clear the check by presenting the image digitally to an intermediary bank such as a regional branch or clearinghouse bank.

“For example, a check can be cleared by showing the digital image to financial institution 140. This may be a regional branch or the Federal Reserve. The regional branch of Federal Reserve may have accounts for financial institution 130 or 150. Financial institution 130 can create a substitute cheque using the account owner’s image 110. The substitute check may then be presented to financial institution 140 for processing. Financial institution 140 can identify financial institution 150 (e.g. the bank from which the cheque was drawn) upon receiving the substitute check. A nine-digit routing number may be used to do this. It is located in the bottom left corner of the check. Every financial institution in the United States is assigned a unique routing number. Financial institution 140 can present the substitute check to financial institutions 150 and request payment. Financial institution 150 may verify the check and authorize financial institution 140 to pay the check. This will allow financial institution 140 to debit financial institution 150 and credit financial institution 130 with the funds. Financial institution 150 can then debit funds from account 170.

“It is understood that the examples given are only for illustration and explanation and that an embodiment does not have to be limited to these examples. Financial institution 150 could be considered a correspondent bank, i.e., it may be in partnership with financial institution 130. Financial institution 130 could bypass the Federal Reserve regional branch and clear the check directly at financial institution 150. Account 160 and 170 can be both held at financial institution 130. In this case, the check could be cleared internally.

“FIG. 2. illustrates a process for depositing a check using a general-purpose computer controlled by the customer. FIG. 2 outlines the steps involved in depositing a check from a customer-controlled general purpose computer. 2. may be considered to have been performed by a server computer that is associated with a financial institution and a software component which operates from a customer controlled general purpose computer. The server may perform some of these steps, but the software component can do other steps.

“In FIG. 2 The darker boxes signify steps that the server performs, such as delivering information to the user via the browser. Effectively delivering information to customers via a browser from a server is called “delivering?” This information is necessary for the purposes this document. The lighter boxes in 211 represent steps performed by the software component as it executes on customer’s computer. Skilled users will be able to recognize that it is possible to create alternative configurations by shifting functions from one server to another or vice versa.

“The server might first deliver a component of software to the customer’s general-purpose computer 200. This could be in response to customer requests for the ability to make deposits from his computer. One embodiment may only offer this capability to customers who meet certain criteria. It may be necessary that customers have a set number of financial services with the financial institution, such as: customer accounts in good standing, customer relationships that last a certain amount of time, and that they have a predetermined number. bank accounts, mortgages, insurance policies, etc. The customer must have a set amount of assets with the financial institution.

After downloading the software component and accepting it, the customer can now make deposits using his computer. The customer may point his browser to a bank site, and a link might be provided that allows the bank server to initiate deposit transaction 201. A customer might be asked to log on using a username and password.

“The customer might be asked to choose an account in which the deposit will be made. 202 You can do this by giving a website that lists all available accounts and an instruction on how to choose an account. A box can be provided in which the customer can type an account number and an instruction on how to select the account. It doesn’t have to be the customer account. However, it’s possible that large amounts of customer deposits could be made into the account. In such cases, it may be useful to limit the accounts allowed to customers’ accounts. Step 202 could be eliminated if the customer only has one account with the financial institution. In this case, the only allowed account is the customer’s own account.

“The customer might be asked to identify the amount of a check or any other negotiable instruments he wants to deposit into the chosen account 203. This can be done in a similar fashion to step 202. The webpage will contain a box where the customer can enter the amount and the appropriate instructions. You can also instruct the customer to endorse the check 204.

“The customer might be asked to take an image of the front of a check 205 using an image capture device. One embodiment may instruct the customer to place the check face-down on a flatbed scanner. The customer may also be instructed about the orientation and location of the check on that scanner. The customer might be asked to take a digital photo of the check with a digital camera. This may include instructions about the location and orientation of the check as well as lighting and angle, distance, focal length (zoom), and other details. This is where the software component can be helpful in providing a visual illustration of how the customer should submit the image. Customers may also be provided instructions on how to activate and/or move an image from the device to a general-purpose computer.

“In one embodiment, the software component is designed to control the transaction and transaction data in all aspects of the transaction. The software component could open a folder on a storage location such as the hard disk of a general-purpose computer. It may also work with any other software that interfaces to the image capture device to deposit an image in the folder. This can be done in a secure way to avoid any image manipulation or diversion. Although the hard drive of the general-purpose machine is considered to be the storage location controlled by the customer-controlled general-purpose computer, other storage locations, such as networked drives and disk drives, may also be effective controlled by the general-purpose machine.

“The software component can perform certain operations, such as opening folders and placing images within them. Or it may instruct the customer or other applications to accomplish such operations. Software operates in some way under the control of and with the support a general-purpose computer operating system. This support is appropriate for embodiments of the invention.

“The software component might cause the check image to be presented to customer for editing, e.g. Ask the customer to rotate and crop the check image in a predetermined orientation. A scanner may generate an image of the scanner bed or a larger image. The customer might be asked to indicate where the check was placed on the scanner bed’s top left corner. If this is the case, the scan image could be cropped to only include the check image. This would remove a portion from the original image.

“A properly edited image of the check can be placed in the storage area 207. Additional images may be required 208. Steps 205-207 can be repeated as needed. The customer might be asked to sign and attach an image of the check’s back. The customer might be asked to sign ‘void? in order to ensure that the check is properly voided. You can also scan the front of your check by writing?void?

“A log file can be created 209 to record data for processing or troubleshooting the transaction. Refer to FIGS. 4 and 5. 4. and 5. You can place the log file in the storage location with all the images from the check.”

Once the images have been edited and collected, they can be sent to the server for deposit 210. You may also receive the log file at this point. These files may be deleted from the customer?s general-purpose computer after they are delivered. If the server decides that the images and any associated data are sufficient, the customer may have their account provisionally credited. A confirmation page may also be sent to the customer through the customer’s browser application, 212. The server may instruct the customer to destroy, e.g. The customer may be instructed to destroy, e.g., the original physical check or any other negotiable instruments. The current US check handling procedures do not require the processing of a physical check. Neither is it necessary to keep the original checks in bank records or customer records.

“FIG. “FIG. FIG. The method of FIG. 2. To illustrate the steps that could be taken by a server, or any other electronic operated by a financial institution, before, during and after the various steps in FIG. 2 are performed.”

“In general, the FIG. 3. Such server might receive a request to deposit at home capability 300A and may then deliver a component of software to the customer 300B. As shown in FIG. As shown in FIG. 2, intermediate steps could include determining if the customer qualifies for remote deposit and ensuring that the customer has a suitable virtual machine environment installed on their personal computer. In embodiments where software requires such an environment,

A transaction can be initiated 301 after a customer indicates that they wish to make a deposit transaction. Per FIG. 2, the customer is directed to identify an account. 2. The financial institution electronics then receive an account identification (ID) 302. Similarly, financial institution electronics receive check amount 303. The software component handles image capture, which may or not involve the server until check images are received 304.”

“Upon receipt check images, an Optical Character Recognition process (OCR) may be invoked in order to determine certain information about check. OCR can be used to identify information like the payor bank routing number, account numbers, and check numbers. To verify that the bank routing number corresponds with a legitimate bank, it may be compared 306 to a list of valid routing codes. In some embodiments, it may also be verified to ensure that it corresponds with a United States bank. One embodiment of the OCR is performed in real-time, i.e. Before confirming the customer’s deposit transaction, the OCR is conducted in real time. Other embodiments may allow for certain efficiency by using a batch? OCR operations can be performed at a later date.”

“In one embodiment, OCR can be used to apply OCR to an image of the back side of a check as well as to the image of the check’s front side. There may be a problem if the customer submits two front images instead of one. OCR may be used to verify that the alleged image of the back side of the check does not contain a MICR mark. It is more likely that the alleged check’s back side is the actual check, even if there is no MICR line at such location.

OCR can also be used to locate the endorsement on the back side of a check. OCR can be used in certain embodiments to verify that the signature matches the signature of the drafter or payor of the check. Sometimes, however, signatures can be difficult to read. It is possible to identify a signature or mark in the endorsement area on the back of a check in one embodiment.

An error 317 may occur if the routing number calculated using OCR is not valid. The deposit transaction can be aborted. A customer can receive an error message 314, informing them that the transaction was not processed.

To determine if the check has been deposited previously, a duplicate checking procedure can be used. Although determining whether a check has been duplicated can be time-consuming and memory-intensive (and therefore expensive), this operation should be performed quickly and with minimal accuracy. After the deposit transaction has been confirmed 314, a more thorough duplicate detection can be done. In one embodiment, a duplicate detection process could be initiated as shown in FIG. 6.”

“FIG. “FIG. 3. Check identification data can be used to compare check deposit data 601. This could include, for instance, comparing check MICR information with MICR lines for all check deposits into the customer’s account during the past two weeks. There are other possible embodiments. For example, one could ensure that a MICR number does not contain a money amount. This is because money amounts in MICR lines indicate that a check has been deposited. One might scan the check for a return stamp. You might also search for a number 4 at position 44 on the MICR line. Banks will only make images of checks by placing a 4 at position 44. An image of the check is generally taken in advance. Therefore, it might be beneficial to make sure that the check has not been presented twice.

“Accordingly to step 602, appropriate check identification data may be added to previous deposits to identify duplicate checks.

There are many possibilities for duplicate checking to turn up false positives. This is why it can be advantageous to continue with a deposit transaction in certain embodiments, despite the possibility that a duplicate might initially be identified. FIG. FIG. 3 shows that a duplicate transaction can be detected and flagged for further inspection 315. The transaction may then be allowed to continue as illustrated in FIG. If the duplicate is not found, the transaction does not need to be flagged as abnormal. Step 315 is unnecessary.

“Returning back to FIG. 3. OCR may also be performed on check amount location 306, where the amount determined by OCR can be compared to the customer-entered amount received pursuant step 303. An error 316 may be issued if the amounts are not in line. This will result in the transaction being terminated and the customer receiving the appropriate information. OCR can also be applied to any other aspect of the check image if this is necessary in certain embodiments.

“The server can also receive and modify the deposit transaction log file 310. Alternate versions of images may be created and placed in the log file. The Check 21 regulations require that a bi-tonal TIFF-formatted image be created. This is generally a lower-quality format than other image formats. In some cases, it may be desirable to preserve both a good? and a good? image. Image in an initial format (e.g. JPEG) and modified bi-tonal IDF required by Check 21. If any troubleshooting is required, a good image can be saved.

“In certain embodiments, a stamp from the bank may be placed on the back image of the check 311, as if it were physically deposited at the bank. The appropriate images can be sent to the bank that will pay 312, while the customer’s account is provisionally credited with the check 313. The customer can receive a confirmation 314.

“At 312, the bank may forward an image (or more) to a payor banking. Provisionally crediting customer account 513 and delivering confirmation to customer-controlled general purpose computers 514 can be done prior, after, or concurrently with step 312. A provisional credit is generally subject to check clearing. This could be done by receiving confirmation from the payor bank that the check will clear. It may take some time to receive the confirmation from the bank. The confirmation 514 and provisionally crediting the customers account 513 can be sent to the customer to confirm that the transaction will go through, even if it does not succeed.

“In one embodiment, a transaction that involves an Automated Clearinghouse(ACH) transaction may allow for the forwarding of an image or set of images to a bank 512. ACH transactions usually include instructions for payment to debit or credit an account. ACH service providers are often used by banks to settle ACH transactions. ACH service providers can be identified as the Federal Reserve’s regional branches and the Electronic Payments Network (EPN).

In an ACH transaction, the payee (customer) bank can be referred as the originating financial institution (ODFI). After receiving the appropriate information from the bank, the payee may credit funds to their account and generate an ACH debit entry for the payor’s account. This may be presented to ACH service providers for processing.

“The ACH service provider can process the debit entry by identifying which account and bank the check was drawn. A receiving depository financial institution (RDFI) is the bank from which the check was drawn, i.e. the bank of the payor. The ACH service provider can settle the transaction by debiting and crediting the bank of the payor if the bank verifying the transaction. The bank of the payor may debit the account.

“A substitute check is a paper copy of an original check. It may also be considered the legal equivalent of the original. The Check Clearing for the 21st Century Act authorized substitute checks. Commonly known as Check 21, these substitute checks are also allowed. This Act was created to ease the process of clearing checks by allowing banks the ability to send electronic images (e.g. substitute checks) to other bank accounts rather than sending original paper checks. The Check 21 does not require banks to use substitute checks. Many banks will accept electronic images of check checks in voluntary agreements. However, the images may not be eligible for substitute checks under Check 21. A bank that does not have a voluntary agreement or refuses to accept an image of a check is required by Check 21 to accept a replacement check.

“The bank can process the ACH debit transaction, substitute check, or electronic image. The bank can present the ACH debit transaction to an ACH service provider (e.g. EPN), which could be responsible for settling transactions between the payee’s and payor’s banks. To complete the check clearing process, the bank may also convert the digital image to a substitute check. If the bank of the payor and the bank of the payee are identical, the transaction can be completed internally at the bank by debiting one customer’s account and crediting another. An intermediate step could be to identify if the payor and payee banks are the same or operate in close cooperation.

“FIGS. “FIGS. FIG. FIG. 4 shows how a bank server can be contacted to request a ‘deposit at home? Remote deposit capability 400A and deliver the software component to the customer’s general-purpose computer 400B, as described above. A transaction can begin at 401 and continue as described in FIGS. 2. 2 and 3. The three dots in FIG. 4 represent steps that could occur during a deposit transaction. A log file may be generated during a transaction. This could be done by a software component installed on a customer-controlled, general purpose computer. The software component may deliver the log file to the server. It can include log file data. Log file data could include, for instance, the data shown in FIG. 500. 5.”

One embodiment allows a financial institution server to receive check images 404 and log file data from the software component 405 in one embodiment. Other embodiments will be easily recognized as possible, including placing the images into the log file and merging steps 404 and 405 or streaming raw data without any type of file structure and allowing the server generate a file after receiving such data.

Step 406 is the conversion of an image from a primary format to a secondary format. One embodiment uses the first format to refer to a high-quality Joint Photographic Experts Group format (JPEG). This format might have been generated initially by an image capture device that was used by a customer to create the check image. This image is a great tool to troubleshoot a deposit transaction due to its high quality. It might be possible to determine if the image is a check that has been deposited previously by simply examining both images.

The second format, in one embodiment is a format that meets bank-to-bank image-transfer requirements. Check 21 currently requires that the image format be the bi-tonal Tag Image File Form (TIFF). The second format could be, for instance, a bi-tonal tag image file format (TIFF).

“In another embodiment, images in both formats can also be saved, such as in the log file. Each image can be used for its own purpose: the first is for troubleshooting and the second for regulatory compliance or business necessity. Step 407 shows how to create a log file using log file data and images. The term “generating” may be interchanged for “modifying?” The term?generating? may be used in place of?modifying? In some embodiments, such as. In some embodiments, e.g. Each step to generate an aspect of the log file 500 can be broken down into multiple steps. 5.”

Referring to FIG. “Referring now to FIG. A log file may contain the identification of an image capture tool used to create an image of a check. This could include a scanner model and make, as well as a digital camera model and other information, such a Global Unique Identifier for image capture devices (GUID). The identification information could also include the identification of the software associated with it, such as the TWAIN drivers, which can be used with scanners and digital cameras, or other image capture devices.

“Furthermore with regard to logfile 500, a customer operating systems can include an identification of the operating software used by the customer’s general-purpose computer. A customer browser version may include the browser that is used by the customer’s main computer. The image capture device model, make, and model can include the type of device used, manufacturer, model number, and device name. ?JAVA version? ?JAVA version? Transaction data can include information like transaction ID, account number and customer name. It may also include check routing numbers, check numbers, check numbers, check account numbers, and so on. If an error occurs, the reason for it may be given. For example, an invalid check routing number or different amounts identified by customers and the OCR process. The?good? image (customer generated image) and the?required? The?good?image (customer-generated image) and the “required?” image (required for bank-to-bank image transfer) may be included. image (required to transfer image bank-to-bank) may also be included.

A troubleshooting, or log file viewing app 501 may consume log file 500. This application can be used to help solve specific deposits problems and view log files. Application 501 can also gather statistical information, the like, about all log files.

The various techniques described in this document can be implemented using either hardware or software, or, where appropriate, a combination of both. The disclosed methods and apparatus, or some aspects or portions thereof may be implemented with hardware or software. For program code execution on programmable computer, the computer generally includes a processor, storage medium readable (including volatile memory and/or storage element), at least 1 input device, and at most one output device. To communicate with a computer, one or more programs should be implemented in high-level procedural or object-oriented programming languages. If desired, however, the program(s), can be implemented in either assembly or machine language. The language can be either a compiled language or an interpreted language and may be combined with hardware implementations.

The described methods and apparatus can also be implemented in the form program code. This code is transmitted over any transmission medium, including electrical wiring, cabling, fiber optics, or other transmission media. When the program code is received, loaded into, and executed by a machine such as an EPROM or gate array, a programmeable logic device (PLD), client computers, a video recorder, or the like, it becomes an apparatus for practicing and implementing the invention. The program code is combined with the general-purpose processor to create a unique apparatus capable of performing the disclosed embodiments.

“In addition to the implementations specifically set forth herein,” the specification will make it clear to those skilled in art that there are other aspects and implementations. The specification and illustrated implementations should be considered examples and not the whole of the claims.

Click here to view the patent on Google Patents.

How to Search for Patents

A patent search is the first step to getting your patent. You can do a google patent search or do a USPTO search. Patent-pending is the term for the product that has been covered by the patent application. You can search the public pair to find the patent application. After the patent office approves your application, you will be able to do a patent number look to locate the patent issued. Your product is now patentable. You can also use the USPTO search engine. See below for details. You can get help from a patent lawyer. Patents in the United States are granted by the US trademark and patent office or the United States Patent and Trademark office. This office also reviews trademark applications.

Are you interested in similar patents? These are the steps to follow:

1. Brainstorm terms to describe your invention, based on its purpose, composition, or use.

Write down a brief, but precise description of the invention. Don’t use generic terms such as “device”, “process,” or “system”. Consider synonyms for the terms you chose initially. Next, take note of important technical terms as well as keywords.

Use the questions below to help you identify keywords or concepts.

  • What is the purpose of the invention Is it a utilitarian device or an ornamental design?
  • Is invention a way to create something or perform a function? Is it a product?
  • What is the composition and function of the invention? What is the physical composition of the invention?
  • What’s the purpose of the invention
  • What are the technical terms and keywords used to describe an invention’s nature? A technical dictionary can help you locate the right terms.

2. These terms will allow you to search for relevant Cooperative Patent Classifications at Classification Search Tool. If you are unable to find the right classification for your invention, scan through the classification’s class Schemas (class schedules) and try again. If you don’t get any results from the Classification Text Search, you might consider substituting your words to describe your invention with synonyms.

3. Check the CPC Classification Definition for confirmation of the CPC classification you found. If the selected classification title has a blue box with a “D” at its left, the hyperlink will take you to a CPC classification description. CPC classification definitions will help you determine the applicable classification’s scope so that you can choose the most relevant. These definitions may also include search tips or other suggestions that could be helpful for further research.

4. The Patents Full-Text Database and the Image Database allow you to retrieve patent documents that include the CPC classification. By focusing on the abstracts and representative drawings, you can narrow down your search for the most relevant patent publications.

5. This selection of patent publications is the best to look at for any similarities to your invention. Pay attention to the claims and specification. Refer to the applicant and patent examiner for additional patents.

6. You can retrieve published patent applications that match the CPC classification you chose in Step 3. You can also use the same search strategy that you used in Step 4 to narrow your search results to only the most relevant patent applications by reviewing the abstracts and representative drawings for each page. Next, examine all published patent applications carefully, paying special attention to the claims, and other drawings.

7. You can search for additional US patent publications by keyword searching in AppFT or PatFT databases, as well as classification searching of patents not from the United States per below. Also, you can use web search engines to search non-patent literature disclosures about inventions. Here are some examples:

  • Add keywords to your search. Keyword searches may turn up documents that are not well-categorized or have missed classifications during Step 2. For example, US patent examiners often supplement their classification searches with keyword searches. Think about the use of technical engineering terminology rather than everyday words.
  • Search for foreign patents using the CPC classification. Then, re-run the search using international patent office search engines such as Espacenet, the European Patent Office’s worldwide patent publication database of over 130 million patent publications. Other national databases include:
  • Search non-patent literature. Inventions can be made public in many non-patent publications. It is recommended that you search journals, books, websites, technical catalogs, conference proceedings, and other print and electronic publications.

To review your search, you can hire a registered patent attorney to assist. A preliminary search will help one better prepare to talk about their invention and other related inventions with a professional patent attorney. In addition, the attorney will not spend too much time or money on patenting basics.

Download patent guide file – Click here