US 12,387,515 B2
Document authentication using multi-tier machine learning models
Lawrence Douglas, McLean, VA (US)
Assigned to Capital One Services, LLC, McLean, VA (US)
Filed by Capital One Services, LLC, McLean, VA (US)
Filed on Jun. 30, 2022, as Appl. No. 17/809,920.
Prior Publication US 2024/0005688 A1, Jan. 4, 2024
Int. Cl. G06V 30/413 (2022.01); G06T 7/00 (2017.01); G06V 20/00 (2022.01); G06V 30/418 (2022.01)
CPC G06V 30/413 (2022.01) [G06T 7/0002 (2013.01); G06V 20/95 (2022.01); G06V 30/418 (2022.01); G06T 2207/20081 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A system for providing multi-tier machine learning model processing for document authenticity, the system comprising:
one or more processors; and
a non-transitory, computer-readable storage medium storing instructions, which when executed by the one or more processors cause the one or more processors to perform operations comprising:
receiving an image representing an instance of a document,
wherein the document is associated with a plurality of versions of the document,
wherein the plurality of versions of the document include:
a first version associated with a first plurality of security features for authenticating the document, and
a second version associated with a second plurality of security features for authenticating, and
wherein the second plurality of security features are different from the first plurality of security features;
inputting the image into a machine learning model that is trained to (1) determine, using a first tier of the machine learning model, a subset of the first plurality of security features which the instance of the document includes, (2) adjust parameters of a second tier of the machine learning model based on the subset of the first plurality of security features, and (3) determine, using the second tier of the machine learning model, whether the received image represents an authentic document;
receiving, from the machine learning model and based on inputting the image, a probability that the image represents an authentic instance of the document;
determining whether the probability that the image represents the authentic instance of the document meets a threshold;
based on determining that the probability that the image represents the authentic instance of the document meets the threshold, providing, to a user, an indication that the instance of the document is authentic; and
based on determining that the probability that the image represents the authentic instance of the document does not meet the threshold, providing, to the user, indications of one or more security features of the first plurality of security features associated with the first version of the document and instructions for authenticating the instance of the document using the one or more security features.