摘要 |
In one method according to the invention, a security document of an undetermined size within a range of sizes is processed by capturing images corresponding to a topside and bottomside thereof sufficient to encompass the largest possible sized document and then searching through the captured image data to locate an identification code which may have been formed on any location of the document. If a symbol is found that satisfies a predetermined criteria for being an identification code, then the symbol is decoded, and the identification code for the document is utilized to control further processing of the document. Further processing subroutines of the document may include subroutines which utilize one or multiple imaging systems to verify that the document is authentic, subroutines for validating the document, and subroutines for voiding the document.
|