Single step transaction authentication using proximity and biometric input
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-021/32
G06F-021/31
G06F-021/34
H04L-029/06
H04W-012/06
출원번호
US-0745249
(2007-05-07)
등록번호
US-9542542
(2017-01-10)
발명자
/ 주소
Giobbi, John J.
Brown, David L.
Hirt, Fred S.
출원인 / 주소
Proxense, LLC
대리인 / 주소
Patent Law Works LLP
인용정보
피인용 횟수 :
2인용 특허 :
135
초록▼
A system and method provide efficient, secure and highly reliable authentication for transaction processing and/or access control applications in which only biometric input is required from the user. A Personal Digital Key stores a biometric profile that comprises a representation of physical or beh
A system and method provide efficient, secure and highly reliable authentication for transaction processing and/or access control applications in which only biometric input is required from the user. A Personal Digital Key stores a biometric profile that comprises a representation of physical or behavioral characteristics that are uniquely associated with an individual that owns and carries the PDK. The PDK wirelessly transmits the biometric profile over a secure wireless transaction to a Reader for use in a biometric authentication process. The Reader compares the received biometric profile to a biometric input acquired at the point of transaction in order to determine if the transaction should be authorized.
대표청구항▼
1. A method for electronic transaction processing comprising: automatically and wirelessly receiving, using one or more processors, a first biometric sample from a first personal digital key device after the first personal digital key device has entered a proximity zone within a readable coverage ar
1. A method for electronic transaction processing comprising: automatically and wirelessly receiving, using one or more processors, a first biometric sample from a first personal digital key device after the first personal digital key device has entered a proximity zone within a readable coverage area, wherein the first personal digital key device includes the first biometric sample and a first biometric profile associated with a valid user of the first personal digital key device, wherein the first biometric sample is a subset of the first biometric profile;automatically and wirelessly receiving, using the one or more processors, a second biometric sample from a second personal digital key device after the second personal digital key device has entered the proximity zone within the readable coverage area, wherein the second personal digital key device includes the second biometric sample and a second biometric profile associated with a valid user of the second personal digital key device, wherein the second biometric sample is a subset of the second biometric profile;receiving, using the one or more processors, a biometric input from a user;comparing, using the one or more processors, the biometric input to a collection of biometric samples received from and associated with personal digital key devices within the proximity zone for a match, the collection of biometric samples including the first biometric sample and the second biometric sample when the first personal digital key device and the second personal digital key device are within the proximity zone within the readable coverage area;determining, using the one or more processors, that the biometric input from the user matches the first biometric sample from the first personal digital key device;based on the biometric input matching the first biometric sample from the first personal digital key device in the collection of biometric samples received from and associated with personal digital key devices within the proximity zone, determining, using the one or more processors, that the first personal digital key device from personal digital key devices within the proximity zone is to be associated with a transaction;after determining that the first personal digital key device is associated with the transaction, determining, using the one or more processors, whether the biometric input of the user matches the first biometric profile associated with the valid user of the first personal digital key device;authenticating, using the one or more processors, without user intervention, the first personal digital key device after the first personal digital key device has entered the readable coverage area; andauthorizing, using the one or more processors, the transaction responsive to the authentication of the first personal digital key device and determining that the biometric input matches the first biometric profile associated with the valid user of the first personal digital key device. 2. The method of claim 1, wherein receiving the biometric input includes performing at least one of a fingerprint scan, a retinal scan, an iris scan, a facial scan, a palm scan, a DNA analysis, a signature analysis, and a voice analysis. 3. The method of claim 1, wherein the user provides the biometric input and the transaction is authorized without further action by the user. 4. The method of claim 1, wherein the first personal digital key device includes a personal digital key identification number and one or more of financial information, credit card information and personal identification information. 5. The method of claim 1, wherein authenticating the first personal digital key device begins before comparing the biometric input. 6. The method of claim 1, wherein comparing the biometric input is received before authenticating the first personal digital key device. 7. The method of claim 1, wherein authenticating the first personal digital key device includes receiving data from the first personal digital key device and comparing it against an external system. 8. The method of claim 1, wherein the first personal digital key device determines that the biometric input of the user matches the biometric profile associated with the valid user of the first personal digital key device. 9. The method of claim 1, further comprising the steps of: obtaining, responsive to the biometric input matching the first biometric sample from the first personal digital key device and determining that the first personal digital key device is associated with the transaction, the biometric profile associated with the valid user of the first personal digital key device from the first personal digital key device. 10. The method of claim 1, wherein the proximity zone and the readable coverage area are associated with a reader device and wherein receiving the biometric input, authenticating the first personal digital key device, and comparing the biometric input to the first biometric profile are performed by the reader device. 11. The method of claim 1, wherein the biometric input received is a calculated representation of one or more of a physical and a behavioral characteristic based on input received by a biometric sensor. 12. The method of claim 1, wherein authorizing the transaction comprises: communicating with another system to authorize and approve the transaction; andpresenting a status for the transaction. 13. The method of claim 1, further comprising the steps of: receiving a first picture profile from the first personal digital key device, the first picture profile including a picture associated with the valid user of the first personal digital key device; anddisplaying the picture profile associated with the valid user of the first personal digital key device to an administrator. 14. The method of claim 1, further comprising: using at least one of financial information, credit card information and personal identification information received from the first personal digital key to complete the transaction, wherein the transaction is a financial transaction, the first personal digital key device including the at least one of the financial information, the credit card information and the personal identification information. 15. A system comprising: one or more processors; anda memory including instructions that when executed by the one or more processors cause the one or more processors to: automatically and wirelessly receive a first biometric sample from a first personal digital key device after the first personal digital key device has entered a proximity zone within a readable coverage area, the first personal digital key device including the first biometric sample and a first biometric profile associated with a valid user of the first personal digital key device, wherein the first biometric sample is a subset of the first biometric profile;automatically and wirelessly receive a second biometric sample from a second personal digital key device after the second personal digital key device has entered the proximity zone within the readable coverage area, the second personal digital key device including the second biometric sample and a second biometric profile associated with a valid user of the second personal digital key device, wherein the second biometric sample is a subset of the second biometric profile;receive a biometric input from a user;compare the biometric input to a collection of biometric samples received from and associated with personal digital key devices within the proximity zone for a match, the collection of biometric samples including the first biometric sample and the second biometric sample when the first personal digital key device and the second personal digital key device are within the proximity zone within the readable coverage area;determine that the biometric input from the user matches the first biometric sample from the first personal digital key device;based on the biometric input matching the first biometric sample from the first personal digital key device in the collection of biometric samples received from and associated with personal digital key devices within the proximity zone, determine that the first personal digital key device is associated with a transaction;after determining that the first personal digital key device is associated with the transaction, determine whether the biometric input of the user matches the biometric profile associated with the valid user of the first personal digital key device;authenticate, without user intervention, the first personal digital key device after the first personal digital key device has entered the readable coverage area; andauthorize the transaction responsive to the authentication of the first personal digital key device and determining that the biometric input matches the first biometric profile associated with the valid user of the first personal digital key device. 16. The system of claim 15, wherein the user provides the biometric input and the transaction is authorized without further action by the user. 17. The system of claim 15, the instructions when executed further causing the system to use at least one of financial information, credit card information and personal identification information received from the first personal digital key to complete the transaction, wherein the transaction is a financial transaction, the first personal digital key device including the at least one of the financial information, the credit card information and the personal identification information. 18. The system of claim 15, wherein the authentication of the first personal digital key device includes comparing a personal digital key device identifier associated with the first personal digital key device against an external system, the external system including one or more of a central registry, a validation database and a private registry. 19. The system of claim 15, wherein authorizing the transaction comprises: communicating with another system to authorize and approve the transaction; and presenting a status for the transaction. 20. The system of claim 15, wherein the biometric input received is a calculated representation of one or more of a physical and a behavioral characteristic based on input received by a biometric sensor.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (135)
Yap, Sue-Ken; Yourlo, Zhenya Alexander, Apparatus and method for distributing audio and video content.
Van Tilburg Johan,NLX ; Hekstra Andries Pieter,NLX, Authentication system wherein definition signals of two devices are altered, communicated between the two devices, and compared.
Matsuyama, Shinako; Ishibashi, Yoshihito; Futamura, Ichiro; Kon, Masashi; Watanabe, Hideaki, Content distribution system, content distribution method, information processing apparatus, and program providing medium.
Hatakeyama, Takahisa; Yoshioka, Makoto; Miyazawa, Yuji, Content usage control system, content usage apparatus, computer readable recording medium with program recorded for computer to execute usage method.
Steven T. Ansell ; Andrew R. Cherenson ; Mark E. Paley ; Steven B. Katz ; John Michael Kelsey, Jr. ; Bruce Schneier, Copy security for portable music players.
Jones, Thomas C.; Brackenridge, Billy, Digital content distribution, transmission and protection system and method, and portable device for use therewith.
Johnson, Barry W.; Olvera, Kristen R.; Russell, David C.; Tillack, Jonathan A., In-circuit security system and methods for controlling access to and use of sensitive data.
Rosin Robert ; Hsu P. Robert ; Sonoda Yumie ; Niijima Makoto,JPX ; Nakano Hiroaki, Internet content and television programming selectively displaying system.
Hammersley Scott D. (Rochester MN) Smet Arthur D. (Rochester MN) Wottreng Peter M. (Rochester MN), Method and apparatus for intraprocess locking of a shared resource in a computer system.
Adams, William Mark; Coyne, John Robert; Coyne, Christopher Andrew; Wallace, Raymond Munson, Method and system for creating and operating biometrically enabled multi-purpose credential management devices.
Schena, Robert J.; Anderer, Mike; Ritz, Peter B.; Bernstein, Mike, Method for managing printed medium activated revenue sharing domain name system schemas.
Graunke Gary L. ; Carbajal John ; Maliszewski Richard L. ; Rozas Carlos V., Method for securely distributing a conditional use private key to a trusted entity on a remote system.
Kato Naotaka,JPX ; Kanada Yoshihisa,JPX, Methods and apparatus for downloading data between an information processing device and an external device via a wireless communications technique.
Naotaka Kato JP; Yoshihisa Kanada JP, Methods and apparatus for downloading data between an information processing device and an external device via a wireless communications technique.
Blair William (1154 W. Lunt ; Apt. 302 Chicago IL 60626) Brooks Stanley J. (P.O. Box 906 Douglas GA 31533), Microprocessor controlled security system for computers.
Maes Stephane Herman ; Sedivy Jan,CSX, Portable information and transaction processing system and method utilizing biometric authorization and digital certificate security.
Campinos Arnaldo,FRX ; Fischer Jean-Bernard,FRX, Process for protecting an information item transmitted from a security element to a decoder and protection system using such a process.
Bowers John H. ; Clare Thomas J., RFID tags which are virtually activated and/or deactivated and apparatus and methods of using same in an electronic security system.
Handelman Doron (Givataim ILX) Kranc Moshe (Jerusalem ILX) Fink David (Jerusalem ILX) Zucker Arnold (Ramat Modiim ILX) Smith Perry (Jerusalem ILX) Bar-On Gerson (Kohav Hashahar ILX), Secure access systems and methods utilizing two access cards.
Kamibayashi,Tooru; Yamada,Hisashi; Iwasaki,Hiroshi; Tamura,Masafumi; Ishibashi,Yasuhiro; Kato,Taku; Tatebayashi,Makoto; Harada,Shunji; Katsuta,Noboru, Storage medium and contents protection method using the storage medium.
Michael S. Kupka ; Michael G. Lundgren, System for prepayment of electronic content using removable media and for prevention of unauthorized copying of same.
Getsin, Evgeniy M.; Lamkin, Allan B.; Collart, Todd R., System, method and article of manufacture for remote unlocking of local content located on a client device.
Bianco Peter Garrett ; Boon William Taylor ; Sterling Robert Brewster ; Ware Karl Roger, System, method and computer program product for allowing access to enterprise resources using biometric devices.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.