A method for deterring forgeries and authenticating signatures placed on any document or other object (collectively "item") is disclosed. A first two dimensional bar code or forgery-proof diffraction grating pattern or similar information bearing medium (Electronic Fingerprint or "EF") is issued to a person whose signature is being protected ("principal") by a central registrar ("CR"). A personal identification number ("PIN") which has been assigned by the CR to the principal is encoded on the EF. The PIN remains constant and is encoded on all EFs distributed to the principal.

Patent
   RE38044
Priority
Apr 04 1996
Filed
Dec 01 2000
Issued
Mar 25 2003
Expiry
Apr 04 2016

TERM.DISCL.
Assg.orig
Entity
Small
0
7
all paid
0. 7. A forgery and authentication method for a signature on an item, comprising the steps of:
a. signing the item by a principal;
b. registering with a central registrar a facsimile signature of the principal; and
c. placing an information bearing medium having at least one numbered code on the item with a tamper proof adhesive.
0. 15. A forgery deterrent and authentication method for a signature on an item, comprising the steps of:
a. signing the item by a principal;
b. registering with a central registrar a facsimile signature of the principal;
c. placing an information bearing medium having at least one numbered code on the item with a tamper proof adhesive;
d. registering the at least one numbered code with the central registrar;
e. reading the at least one numbered code using the central registrar;
f. identifying the principal through the at least one numbered code by the central registrar;
g. identifying the item through the at least one numbered code by the central registrar; and
h. maintaining a database by the central registrar that identifies the principal and the item.
1. A forgery deterrent and authentication method for signatures, comprising the steps of:
a. registering the a principal with a central registrar that issues to the principal an information bearing medium that includes an encoded personal identification number and a second numbered code and facsimile signature;
b. placing the information bearing medium on an item by the principal next to the principal's signature with a tamper proof adhesive;
c. reading of the principal's information bearing medium placed on the item using the central registrar;
d. identifying the principal through the principal's personal identification number by the central registrar;
e. identifying of the item through the second numbered code by the central registrar;
f. identifying of the item through the facsimile signature by the central registrar;
g. providing a certificate of authenticity by the central registrar including thereon a second information bearing medium with an identical personal identification number and second numbered code; and
h. maintaining a database that identifies principals, items, the current known holder of an item and the date of issuance of a certificate of authenticity.
2. The method of claim 1, wherein step c is performed by an agent.
3. The method of claim 1, wherein step d is performed by an agent.
4. The method of claim 1, wherein step e is at least one of the items include a signature and performed by an agent.
5. The method of claim 1, wherein step a includes the information bearing medium having a facsimile signature.
6. The method of claim 1, wherein step e includes the step of identifying the items through the facsimile signature by the central registrar.
0. 8. The forgery deterrent and authentication method of claim 7, wherein the information bearing medium having at least one numbered code is placed on the item prior to the item being signed by the principal.
0. 9. The forgery deterrent and authentication method of claim 7, wherein the information bearing medium having at least one numbered code is placed on the item prior to the item being registered with the central registrar.
0. 10. The forgery deterrent and authentication method of claim 7, further comprising the step of maintaining a database that identifies the principal and the item.
0. 11. The forgery deterrent and authentication method of claim 10, wherein the database identifies a current known holder of the item.
0. 12. The method of claim 11, further including the step of providing a certificate of authenticity by the central registrar including thereon the facsimile signature.
0. 13. The method of claim 10, further including the step of providing a certificate of authenticity by the central registrar including thereon the facsimile signature.
0. 14. The method of claim 7, further including the step of providing a certificate of authenticity by the central registrar including thereon the facsimile signature.
0. 16. The method of claim 15, further including the step of providing a certificate of authenticity by the central registrar including thereon the facsimile signature.
0. 17. The forgery deterrent and authentication method of claim 15, wherein the information bearing medium having at least one numbered code is placed on the item prior to the item being signed by the principal.
0. 18. The forgery deterrent and authentication method of claim 15, wherein the information bearing medium having at least one numbered code is placed on the item prior to the item being registered with the central registrar.
0. 19. The forgery deterrent and authentication method of claim 15, wherein the database identifies a current known holder of the item.
0. 20. The method of claim 19, further including the step of providing a certificate of authenticity by the central registrar including thereon the facsimile signature.

This application is a continuation-in-part of U.S. application Ser. No. 08/628,600, filed Apr. 4, 1996, by Robert Kruckemeyer, entitled "Method for Deterring Forgeries and Authenticating Signatures"

The present invention is to enable any person to place his or her own unique EF on any Item at any time to deter forgeries and to authenticate his or her own signature. The present invention does not require that the signing of the Item be witnessed by an Agent on the CR. Because the EF contains a PIN unique to the Principal and also contains a Code unique to the particular EF, it is more secure against forgery. A forger would have to match not only the PIN to the Principal but also the Code to the particular Item onto which the EF was placed in order to complete a forgery.

Another preferred embodiment of the present invention is to enable any Principal to have any signature or mark that they have placed on an Item scanned and encoded into an EF. Therefore an exact Facsimile Signature of the actual signature the Principal has placed on the particular Item is encoded into EF along with the Principal's PIN and the sequential Code. The EF can be affixed to the Item or an accompanying article. In this embodiment a forger would have to match not only the PIN to the Principal and the Code to the Item, but would also have to exactly duplicate the Facsimile Signature that has been encoded into EF onto the forged Item in order to complete the forgery.

As a first preferred embodiment, Principal, as depicted by a name, 10 is presumed to desire to utilize a system to verify his or her signature by contacting a CR, depicted by a signature, 90. The CR 90 would issues to the Principal 10 a unique PIN 31. The CR 90 would also encode all EFs 30 issued to the Principal 10 with the PIN 31 of Principal 10 and also sequentially encodes each EF 30 with a unique Code 32. The EFs 30 provided to the Principal 10, preferably by hand delivery of an Agent, have a tamper proof adhesive. Once the Principal 10 obtains physical possession of the EFs 30, he or she must contact the CR 90 and verify through relating his or her PIN 31 that he or she has obtained physical possession of the EFs 30 before the CR 90 will consider the EFs 30 to be valid. After verification by the Principal, the CR 90 will show the delivered EFs 30 to be valid.

An exemplary document in the form of a Last Will and Testament ("Will") 20 is illustrated in FIG. 1. The Will 20 in this example has a Signature 11 thereon of the Principal 10. After the Principal 10 signs his or her Will 20, he or she would affix an EF 30 to the Will 20 in close proximity to the Signature 11. The EF 30 is preferably comprised of a two dimensional bar code or alternatively a forgery proof diffraction grating pattern, such as shown in U.S. Pat. No. 5,379,131, dated Jan. 3, 1995 to Yamazaki, into which is encoded the Principal's PIN 31 and a Code 32. The EF 30 is affixed to the Will 20 with an adhesive (not shown but as is known in the art) so as to be tamper proof. Once placed, the EF 30 cannot be removed from the Will 20 without destroying the EF 30. The EF 30 cannot be duplicated and the PIN 31 and Code 32 cannot be read without the use of the computer program that encoded them. Therefore the PIN 31 and Code 32 can only be read and recognized by the computer database maintained in the CR 90. Remote reading of the EF 30 by an Agent 91 of the CR 90 is achieved by connecting to the computer database in the CR 90 via a modem.

A Principal 10 desiring to obtain a CA 60 (FIG. 2) of the Signature 11 placed on the Will 20 takes the Will 20 to an Agent 91 of the CR 90 (FIG. 4). The Agent 91 connects the computer 71 of Agent 91 to a computer 70 of CR 90 via modem 73 and mechanically or optically 72 reads the EF 30. The computer 71 of Agent 91 will not display the PIN 31 but will only display the name of the Principal 10. Therefore, the Principal 10 and Agent 91 together will immediately know if the EF 30 confirms that the EF 30 was issued to the Principal 10. Assuming the EF 30 has been issued to the Principal 10 whose signature 11 is subscribed on the Will 20, the Agent 91 describes the Will 20 to the CR 90 so that the Code 32 encoded on the EF 30 and known only to the CR 90 is thereafter associated with the description of the Item 61--the Will 20. The CR 90 prepares a CA 60 (FIG. 2) which contains: the name of the Principal 10, a description of the Item 61, the name of the original Registrant 62, the date of the original registration 63, a place to identify subsequent registrants 62A and subsequent registration dates 63A, the name of the present registrant 62B and present registration date 63B, the date of the issuance 64 of the CA 60 and the name of the CR 90. The CR 90 prepares an EF 30A that is identical to the EF 30 found on the Will 20 and attaches it to the CA 60 with a tamper proof adhesive. The CA 60 is then delivered to the Principal 10. The CA 60 recites that the Principal 10 whose Signature 11 is subscribed on the Will 20 either signed the Will 20 and affixed the EF 30 to the Will 20 in the presence of the Agent 91 of the CR 90 or that the Principal 10 verified to the Agent 91 of the CR 90 that the signature 11 and the EF 30 were his or hers.

As a second preferred embodiment, a Holder 10A of the Will 20 on which an EF 30 has been placed but which has not been previously registered by the Principal 10 desiring to obtain another type of certificate of authenticity 60A (FIG. 3) of the Signature 11 placed on the Will 20 takes the Will 20 to an Agent 91 of the CR 90 (FIG. 4). The Agent 91 connects the computer 71 of Agent 91 to the computer 70 of CR 90 via modem 73 and mechanically or optically 72 reads the EF 30. The computer 71 of Agent 91 will display the name of the Principal 10 to whom the EF 30 had been issued. Therefore, the Holder 10A and Agent 91 will immediately know if the EF 30 confirms that the EF 30 was issued to the Principal 10. Assuming the EF 30 has been issued to the Principal 10 whose Signature 11 is subscribed on the Will 20, the Agent 91 describes the Will 20 to the CR 90 so that the Code 32 encoded on the EF 30 and known only to the CR 90 is thereafter associated with the Will 20. The CR 90 prepares a CA 60A (FIG. 3) which contains: the name of the Principal 10, a description of the Item 61, the name of the original registrant 62, the date of the original registration 63, a place to identify subsequent registrants 62A and subsequent registration dates 63A, the name of the present registrant 62B and present registration date 63B, the date of the issuance 64 of the CA 60A and the name of the CR 90. The CR 90 prepares an EF 30A that is identical to the EF 30 found on the Will 20 and attaches it to the CA 60A with a tamper proof adhesive. The CA 60A is then delivered to the Holder 10A who now becomes the present registrant 62B. The CA 60A recites that the EF 30 affixed to the Will 20 was issued to the Principal 10 whose Signature 11 is found on the Will 20.

A subsequent Holder 10B of the Will 20 can take the Will 20 and the CA 60 (FIG. 2) or CA 60A (FIG. 3) to an Agent 91 who can authenticate both the EF 30 found on the Will 20 and the EF 30A found on the CA 60 or CA 60A. As the Will 20 has already been registered with the CR 90, the computer 71 of Agent 91 would display not only the name of the Principal 10 but also a description of the Item 61, the name of the original registrant 62, the date of the original registration 63, the name of the subsequent registrant 62A and subsequent registration dates 63A, the name of the present registrant 62B and the date of the present registration 63B. The subsequent Holder 10B could then become the present registrant 62B and have a new CA 60A issued in his or her name.

FIG. 4 is a flow diagram illustrating the authentication process described above wherein the Agent 91 mechanically or optically 72 reads the EF 30 and the computer 71 of Agent 91 communicates with computer 70 of CR 90 via a modem 73. The computer 71 of Agent 91 will not display the PIN 31 or the Code 32 but only displays the name of the Principal 10, and if already registered, a description of the Item 61 the Will 20, the name of the original registrant 62, the date of the original registration 63 of the Item 61, the Will 20, the name of subsequent registrants 62A and dates of subsequent registrations 63A, and the name of the present registrant 62B and date of present registration 63B. The database of CR 90 will include the PIN 31 and Code 32 in addition to the name of the Principal 10 and if registered, the name of the Item 61, the Will 20, the name of the original registrant 62, the date of the original registration 63, the name of subsequent registrants 62A and the date of the subsequent registrations 63A, and the name of the present registrant 62B and date of present registration 63B.

As a third preferred embodiment, Principal 10, as depicted by a name, is presumed to desire to utilize the system to authenticate his or her own signature by contacting a CR 90, depicted by a signature. THE CR 90 would issue to the Principal 10 a unique PIN 31. The CR 90 would also encode all EFs 30 issued to the Principal 10 with the PIN 31 of Principal 10 and also sequentially encode each EF 30 with a unique Code 32.

An exemplary document in the form of a Will 20 is illustrated in FIG. 1A. The Will 20 in this example has a Signature 11 thereon of the Principal 10. After the Principal 10 signs the Will 20, the Agent 91 of the CR 90 scans the Signature 11 with the Image/Bar Code reader 72. An EF 30 is printed that contains an exact Facsimile Signature 33 of the Signature 11 that has been placed on the Will 20 along with the Principal's PIN 31 and the Code 32. The EF 30 is then placed on the Will 20 with an adhesive (not shown but is known in the art) so as to be tamper proof. The EF 30 cannot be duplicated and the PIN 31, Code 32 and Facsimile Signature 33 cannot be read without the use of the computer program that encoded them. Therefore, the PIN 31, Code 32 and Facsimile Signature 33 can only be read and recognized by the computer database maintained by the CR 90. Remote encoding and reading of the EF 30 by an Agent 91 of the CR 90 is achieved by connecting to the computer database via modem 73. The scanning of the Signature 11 and encoding into a two dimensional bar code 32 can be accomplished by a Model IR-2000 Image/Bar Code Reader manufactured by Metanetics Corporation of Fort Myers, Fla.

A Holder 10A desiring to obtain a CA 60B (FIG. 2A) of the Signature 11 placed on the Will 20 takes the Will 20 to an Agent 91 of the CR 90 (FIG. 4A). The Agent 91 connects the computer 71 of Agent 91 to a computer 70 of the CR 90 via modem 73 and mechanically or optically 72 reads the EF 30. The computer 71 of the Agent 91 will display the name of the Principal 10, a description of the Item 61, the name of the original registrant 62, the date of the original registration 63, the name of the subsequent registrant 62A and subsequent registration dates 63A, the name of the present registrant 62B and the date of the present registration 63B and the Facsimile Signature 33. The Agent 91 can verify the information encoded in the EF 30 and can compare the Signature 11 found on the Will 20 with the Facsimile Signature 33 displayed on the Agent 91 computer 71. The CR 90 prepares an EF 30A that is identical to the EF 30 found on the Will 20 and attaches it to the CA 60B with a tamper proof adhesive. The CA 60B is then delivered to the Holder 10A. The CA 60B recites that the Principal 10 whose Signature 11 is subscribed to the Will 20 signed the Will 20 in the presence of the then Agent 91 of the CR 90 and that the Facsimile Signature 33 of the Principal 10 found on the EF 30 exactly matches the Signature 11 of the Principal 10 found on the Will 20. An EF 30A is attached to the CA 60B that is identical to EF 30 attached to or accompanying the Item.

Accordingly, the present invention provides Principal 10 with a unique PIN 31, Code 32 and if desired Facsimile Signature 33 to be used by the Principal 10 to deter forgery of, and to authenticate his or her signature. Principals 10 and Holders 10A, 10B of Items 61 desiring to authenticate the signature of the Principal 10 take the Item 61 to an Agent 91 who mechanically or optically reads the EF 30 attached to the Item 61. Once an Item 61 is authenticated a CA 60, 60A or 60B can be issued by the CR 90. The CR 90 can also maintain a record of the chain of title to the Item 61.

Although the preferred embodiments of the invention described above uses two dimensional bar codes or alternatively a forgery proof diffraction grating pattern, many other information bearing media that are difficult to decode and replicate can also be used. For example a random dot matrix pattern may be used. However whatever method is used it must be capable of cryptically storing information in the form of PINs, Codes and Facsimile Signatures that can be read mechanically or optically. All of these media are currently available and can be applied to any Item to which a signature can be applied with a tamper proof adhesive such that attempted removal of the EF will result in destruction of the EF.

It will be apparent to those skilled in the art that the forgery deterrent and authentication system of the present invention may be modified in numerous ways and may assume many embodiments other than the preferred forms specifically set out and described above. Accordingly it is intended by the appended claims to cover all such modifications of the invention which fall within the broad scope of the invention disclosed above.

In another preferred embodiment of the present invention, the Principal's Signature that has been placed on an Item in the presence of an Agent of the CR is scanned by the Agent. The Signature is encoded into the EF along with the Principal's PIN and Code. When the EF is subsequently read the Facsimile Signature displayed on the Agent's computer screen will show exactly how the Signature placed on the Item should look. The EF is printed by the Agent and placed on the Item or an accompanying article. Registration takes place at the time the EF is placed on the Item. CA's are available from the CR as described above. With this preferred embodiment, a subsequent Holder of the Item will be able to not only verify that the Item has an appropriate EF but will also be able to compare the Signature found on the Item to the Facsimile Signature encoded on the EF.

Kruckemeyer, Robert J.

Patent Priority Assignee Title
Patent Priority Assignee Title
3571957,
4926325, Aug 23 1988 Moneyfax, Inc. Apparatus for carrying out financial transactions via a facsimile machine
5267756, Sep 30 1992 UPPER DECK COMPANY LLC, THE Authentication system
5380047, Sep 30 1992 UPPER DECK COMPANY LLC, THE Authentication system
5396559, Aug 24 1990 Anticounterfeiting method and device utilizing holograms and pseudorandom dot patterns
5561282, Apr 30 1993 RELIANCE DATA, L P Portable signature capture pad
5737886, Apr 04 1996 LEGENDS, INC Method for determining forgeries and authenticating signatures
/
Executed onAssignorAssigneeConveyanceFrameReelDoc
Dec 01 2000Legends, Inc.(assignment on the face of the patent)
Date Maintenance Fee Events
Jul 30 2003M2551: Payment of Maintenance Fee, 4th Yr, Small Entity.
Aug 15 2003ASPN: Payor Number Assigned.
Aug 03 2007M2552: Payment of Maintenance Fee, 8th Yr, Small Entity.
Aug 11 2011M2553: Payment of Maintenance Fee, 12th Yr, Small Entity.


Date Maintenance Schedule
Mar 25 20064 years fee payment window open
Sep 25 20066 months grace period start (w surcharge)
Mar 25 2007patent expiry (for year 4)
Mar 25 20092 years to revive unintentionally abandoned end. (for year 4)
Mar 25 20108 years fee payment window open
Sep 25 20106 months grace period start (w surcharge)
Mar 25 2011patent expiry (for year 8)
Mar 25 20132 years to revive unintentionally abandoned end. (for year 8)
Mar 25 201412 years fee payment window open
Sep 25 20146 months grace period start (w surcharge)
Mar 25 2015patent expiry (for year 12)
Mar 25 20172 years to revive unintentionally abandoned end. (for year 12)