The invention is directed towards methods, systems and apparatuses, see FIG. 1, (100) for providing secure and private interactions. The invention provides capability for verifying the identity of a party initiating an electronic interaction with another party through data input module (140) which i
The invention is directed towards methods, systems and apparatuses, see FIG. 1, (100) for providing secure and private interactions. The invention provides capability for verifying the identity of a party initiating an electronic interaction with another party through data input module (140) which is verified by the identity verification module (150), which further includes a self-destruct mechanism (153). Embodiments of the invention include secure methods for conducting transactions and for limiting the transfer and distribution of personal data to only those data that are absolutely necessary for the completion of the transactions. The invention facilitates the transfer of additional personal data contingent upon an agreement that appropriately compensates the provider of the personal data.
대표청구항▼
1. An apparatus comprising: a housing;an identity verification module carried by the housing and comprising a biometric sensor configured to receive a biometric input from a user,a memory configured to store a control designation and a biometric template associated with the user, anda first processo
1. An apparatus comprising: a housing;an identity verification module carried by the housing and comprising a biometric sensor configured to receive a biometric input from a user,a memory configured to store a control designation and a biometric template associated with the user, anda first processor comprising a comparator configured to authenticate the user based upon matching of the biometric input with the biometric template;a user input device; anda second processor carried by the housing and cooperating with the first processor to initiate a financial transaction based upon authentication of the user and having a user non-negotiable constraint associated with the financial transaction, the user non-negotiable constraint relating to a number of personal data fields to be provided for participating in the transaction and a minimum discount set by the user prior to initiating the transaction to be received in exchange for providing the personal data fields;receive a first public key associated with an information processor from a certification repository database responsive to initiating the financial transaction,encrypt the control designation along with date and time information using the first public key and send the encrypted control designation to the information processor,receive a challenge message from the information processor encrypted using a second public key associated with the apparatus,decrypt the encrypted challenge message using the a second private key associated with the apparatus, andre-encrypt the challenge message using the first public key, send the re-encrypted challenge message to the information processor for verification to perform the transaction based upon the original challenge message and the re-encrypted challenge message, and send the user non-negotiable constraint to the information processor as a pre-condition for participation in the transaction. 2. The apparatus of claim 1 wherein the second processor is further configured to initiate a security access transaction. 3. The apparatus of claim 1 wherein the second processor is further configured to initiate an inventory system transaction. 4. The apparatus of claim 1 wherein the second processor is further configured to initiate a computer network access transaction. 5. The apparatus of claim 1 wherein said biometric sensor comprises a fingerprint sensor, and wherein the biometric template comprises a fingerprint template. 6. A method for using an apparatus comprising a housing, a user input device carried by the housing, and an identity verification module carried by the housing, the identity verification module comprising a biometric sensor configured to receive a biometric input from a user, a memory configured to store a control designation and a biometric template associated with the user, and a first processor comprising a comparator, and wherein the apparatus further comprises a second processor carried by the housing, the method comprising: using the comparator to authenticate the user based upon matching of the biometric input with the biometric template; andusing the second processor to initiate a financial transaction based upon authentication of the user and having a user non-negotiable constraint associated with the financial transaction, the user non-negotiable constraint relating to a number of personal data fields to be provided for participation in the transaction and a minimum discount set by the user prior to initiating the transaction to be received in exchange for providing the personal data field;receive a first public key associated with an information processor from a certification repository database responsive to initiating the financial transaction;encrypt the control designation along with date and time information using the first public key and sending the encrypted control designation to the information processor;receive a challenge message from the information processor encrypted using a second public key associated with the apparatus;decrypt the encrypted challenge message using a second private key associated with the apparatus;re-encrypt the challenge message using the first public key; andsend the re-encrypted challenge message to the information processor for verification to perform the transaction based upon the original challenge message and the re-encrypted challenge message, and sending the user non-negotiable constraint to the information processor as a pre-condition for participation in the transaction. 7. The method of claim 6 further comprising using the second processor to initiate a security access transaction. 8. The method of claim 6 further comprising using the second processor to initiate an inventory system transaction. 9. The method of claim 6 further comprising using the second processor to initiate a computer network access transaction. 10. The method of claim 6 wherein the biometric sensor comprises a fingerprint sensor, and wherein the biometric template comprises a fingerprint template. 11. A non-transitory computer-readable medium for an apparatus comprising a housing, a user input device carried by the housing, and an identity verification module carried by the housing, the identity verification module comprising a biometric sensor configured to receive a biometric input from a user, a memory configured to store a control designation and a biometric template associated with the user, and a first processor comprising a comparator, and wherein the apparatus further comprises a second processor carried by the housing, the non-transitory computer-readable medium having computer-executable instructions for causing the apparatus to perform steps comprising: using the comparator to authenticate the user based upon matching of the biometric input with the biometric template; andusing the second processor to initiate a financial transaction based upon authentication of the user and having a user non-negotiable constraint associated with the financial transaction, the user non-negotiable constraint relating to a number of personal data fields to be provided for participation in the transaction and a minimum discount set by the user prior to initiating the transaction to be received in exchange for providing the personal data field;receive a first public key associated with an information processor from a certification repository database responsive to initiating the financial transaction;encrypt the control designation along with date and time information using the first public key and sending the encrypted control designation to the information processor;receive a challenge message from the information processor encrypted using a second public key associated with the apparatus;decrypt the encrypted challenge message using a second private key associated with the apparatus;re-encrypt the challenge message using the first public key; andsend the re-encrypted challenge message to the information processor for verification to perform the transaction based upon the original challenge message and the re-encrypted challenge message, and sending the user non-negotiable constraint to the information processor as a pre-condition for participation in the transaction. 12. The non-transitory computer-readable medium of claim 11 further having computer-executable instructions for causing the second processor to initiate a security access transaction. 13. The non-transitory computer-readable medium of claim 11 further having computer-executable instructions for causing the second processor to initiate an inventory system transaction. 14. The non-transitory computer-readable medium of claim 11 further having computer-executable instructions for causing the second processor to initiate a computer network access transaction. 15. The non-transitory computer-readable medium of claim 11 wherein said biometric sensor comprises a fingerprint sensor, and wherein the biometric template comprises a fingerprint template.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (143)
Edward M. Scheidt ; Ersin L. Domangue, Access control and authorization system.
Berson William (Westport CT) Zemlok Kenneth C. (Shelton CT), Apparatus for verifying an identification card and identifying a person by means of a biometric characteristic.
Richards, Bruce G.; Drummond, Jay Paul; Blackson, Dale; Cichon, Bob A.; Ess, Joseph C.; Moales, Mark A.; Weis, David W.; Smith, Mark D.; Church, James, Automated banking machine and system.
Green, Patrick C.; Smith, Mark; Ramachandran, Natarajan; Delaney, Daniel J.; Barker, David A.; Theriault, Franklin M.; Herrera, Elizabeth; Hill, Jeffrey A.; Douglas, Mark, Automated transaction system and method.
Bernstein Robert J. (First Options ; One Financial Plz. 440 S. LaSalle St. Chicago IL 60605), Automatic portable account controller for remotely arranging for payment of debt to a vendor.
Booth, Kevin E.; Popolow, Harry N.; Ford, Richard R.; Johnson, Edward E.; Loftin, Jon S.; Osborne, Lance C.; Johnson, David W., Electronically-controlled locker system.
Ort James R. (Kenmore NY) Lange Douglas L. (Snyder NY) Kiefer Frederick W. (Williamsville NY) Dennison Raymond J. (West Seneca NY), Fingerprint identification system.
Wood, David L.; Weschler, Paul; Norton, Derk; Ferris, Chris; Wilson, Yvonne; Soley, William R., Log-on service providing credential level change without loss of session continuity.
Campbell, Bruce S.; Strauss, III, Burton M.; Dolecki, Myron C., Method and system for partitioned service-enablement gateway with utility and consumer services.
Bolle, Rudolf Maarten; Nunes, Sharon Louise; Pankanti, Sharathchandra; Ratha, Nalini Kanta; Smith, Barton Allen; Zimmerman, Thomas Guthrie, Method for biometric-based authentication in wireless communication for access control.
Lambert Howard Shelton,GBX ; Orchard James Ronald Lewis,GBX, Method for controlling access to electronically provided services and system for implementing such method.
Bezama Raschid J. ; Casey Jon A. ; Pavelka John B. ; Pomerantz Glenn A., Method of forming a multilayer electronic packaging substrate with integral cooling channels.
Yap Chas Hock Eng,MYX ; Chua Foong Mei,MYX, Method of making an improved security identification document including contactless communication insert unit.
Drummond, Jay Paul; Blackson, Dale; Cichon, Bob A.; Ess, Joseph C.; Moales, Mark A.; Weis, David W.; Smith, Mark D.; Church, James, Method of using an automated banking machine.
Gopalakrishnan, Ponani S.; Kanevsky, Dimitri; Maes, Stephane Herman, Methods and apparatus for restricting access of a user using random partial biometrics.
Johnson, Richard C., Methods and systems for carrying out directory-authenticated electronic transactions including contingency-dependent payments via secure electronic bank drafts.
Johnson, Richard C., Methods and systems for single sign-on authentication in a multi-vendor e-commerce environment and directory-authenticated bank drafts.
Puhl Larry C. (Sleepy Hollow IL) Comroe Richard A. (Dundee IL) Furtaw Robert W. (Arlington Heights IL) Cantarutti Tracey L. (Barrington IL), Portable authentification system.
Maes Stephane Herman ; Sedivy Jan,CSX, Portable information and transaction processing system and method utilizing biometric authorization and digital certificate security.
Kennedy Paul Roy ; Hall Timothy Gerard ; Yip William Chunhung, Radio telecommunication device and method of authenticating a user with a voice authentication token.
McClurg, George William; Brunell, David; Scott, Walter Guy, Rechargeable mobile hand-held fingerprint scanner with a data and power communication interface.
Kolls, H. Brock, System and method of processing credit card, e-commerce, and e-business transactions without the merchant incurring transaction processing fees or charges worldwide.
Lapsley, Philip Dean; Lee, Jonathan Alexander; Pare, Jr., David Ferrin; Hoffman, Ned, Tokenless biometric electronic financial transactions via a third party identicator.
Hoffman Ned (Berkeley CA) Pare ; Jr. David F. (Berkeley CA) Lee Jonathan A. (Berkeley CA), Tokenless identification system for authorization of electronic transactions and electronic transmissions.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.