×

Biometric authentication system

  • US 10,038,555 B2
  • Filed: 03/15/2013
  • Issued: 07/31/2018
  • Est. Priority Date: 03/15/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method of secure transaction, comprising:

  • receiving, by a personal electronic device (PED), transaction information;

    capturing, by the PED, first biometric information from a user;

    identifying, by the PED, if the user is an authorized user of the PED based on the captured first biometric information; and

    if the captured first biometric information identifies an authorized user, performing, by the PED, the steps of;

    enabling a first transaction request cryptographic key stored on the PED, the first transaction request cryptographic key corresponding to the authenticated user;

    generating, using the enabled first transaction request cryptographic key, a digital signature;

    generating and transmitting, via a computer network, a purchase data bundle comprising the received transaction information, the generated digital signature and a second transaction request cryptographic key complementary to the first transaction request cryptographic key;

    receiving, by the PED via the computer network, a purchase approval confirmation comprising a first transaction approval cryptographic key; and

    determining whether the received purchase approval confirmation corresponds to the authenticated user according to the first transaction approval cryptographic key of the received purchase approval confirmation and a second transaction approval cryptographic key stored on the PED, the second transaction approval cryptographic key corresponding to the authenticated user;

    capturing, by the PED, second biometric information;

    performing, by the PED, user authentication based on the captured second biometric information;

    presenting, by the PED, the received confirmation when the first transaction approval cryptographic key is complementary to the second transaction approval cryptographic key and when the user is successfully authenticated based on the captured second biometric information; and

    disabling the first transaction request cryptographic key upon generating the digital signature.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×