Biometric personal data key (PDK) authentication
DCFirst Claim
1. A method comprising:
- receiving, at a smartphone, an identification (ID) code from a third-party trusted authority, the ID code uniquely identifying the smartphone among a plurality of smartphones;
persistently storing biometric data and the ID code on the smartphone, wherein the biometric data is one selected from a group consisting of facial recognition, a fingerprint scan, and a retinal scan of a legitimate user;
receiving, at the smartphone, scan data from a biometric scan using the smartphone;
comparing, using the smartphone, the scan data to the biometric data;
determining whether the scan data matches the biometric data; and
responsive to a determination that the scan data matches the biometric data, wirelessly sending, from the smartphone, the ID code for comparison by the third-party trusted authority against one or more previously registered ID codes maintained by the third-party trusted authority, a transaction being completed responsive to the third-party trusted authority successfully authenticating the ID code, wherein the transaction being completed includes accessing one or more from a group consisting of a casino machine, a keyless lock, an ATM machine, a web site, a file and a financial account.
1 Assignment
Litigations
1 Petition
Reexamination
Accused Products
Abstract
Systems and methods verifying a user during authentication of an integrated device. In one embodiment, the system includes an integrated device and an authentication unit. The integrated device stores biometric data of a user and a plurality of codes and other data values comprising a device ID code uniquely identifying the integrated device and a secret decryption value in a tamper proof format, and when scan data is verified by comparing the scan data to the biometric data, wirelessly sends one or more codes and other data values including the device ID code. The authentication unit receives and sends the one or more codes and the other data values to an agent for authentication, and receives an access message from the agent indicating that the agent successfully authenticated the one or more codes and other data values and allows the user to access an application.
-
Citations
9 Claims
-
1. A method comprising:
-
receiving, at a smartphone, an identification (ID) code from a third-party trusted authority, the ID code uniquely identifying the smartphone among a plurality of smartphones; persistently storing biometric data and the ID code on the smartphone, wherein the biometric data is one selected from a group consisting of facial recognition, a fingerprint scan, and a retinal scan of a legitimate user; receiving, at the smartphone, scan data from a biometric scan using the smartphone; comparing, using the smartphone, the scan data to the biometric data; determining whether the scan data matches the biometric data; and responsive to a determination that the scan data matches the biometric data, wirelessly sending, from the smartphone, the ID code for comparison by the third-party trusted authority against one or more previously registered ID codes maintained by the third-party trusted authority, a transaction being completed responsive to the third-party trusted authority successfully authenticating the ID code, wherein the transaction being completed includes accessing one or more from a group consisting of a casino machine, a keyless lock, an ATM machine, a web site, a file and a financial account. - View Dependent Claims (2, 3, 4)
-
-
5. A smartphone comprising:
-
a persistent storage having an input that receives an identification (ID) code from a third-party trusted authority, and biometric data, wherein the biometric data is one selected from a group consisting of facial recognition, a fingerprint scan, and a retinal scan, of a legitimate user, the ID code uniquely identifying the smartphone among a plurality of smartphones, the persistent storage storing the biometric data and the ID code, the persistent storage having an output configured to provide a first set of biometric data and the ID code for use on the smartphone; a validation module, coupled to communicate with the persistent storage to receive the biometric data from the persistent storage, the validation module having a scan pad to capture scan data from a biometric scan, the validation module comparing the scan data to the biometric data to determine whether the scan data matches the biometric data; and a wireless transceiver that, responsive to a determination that the scan data matches the biometric data, sends the ID code for comparison by the third-party trusted authority against one or more previously registered ID codes maintained by the third-party trusted authority, a transaction being completed responsive to the third-party trusted authority successfully authenticating the ID code, wherein the transaction being completed includes accessing one or more from a group consisting of a casino machine, a keyless lock, an ATM machine, a web site, a file and a financial account. - View Dependent Claims (6)
-
-
7. A system, comprising:
-
a smartphone that persistently stores biometric data and an ID code, wherein the biometric data is one selected from a group consisting of facial recognition, a fingerprint scan, and a retinal scan data of a legitimate user, and the ID code is received from a third-party trusted authority, the ID code uniquely identifying the smartphone among a plurality of smartphones, the smartphone configured to indicate that a biometric authentication is requested, the smartphone configured to wirelessly send the ID code to the third-party trusted authority for authentication responsive to determining that scan data from a biometric scan performed using the smartphone matches the biometric data of the legitimate user, wherein a transaction is completed responsive to successful authentication of the ID code by the third-party trusted authority, wherein the transaction being completed includes accessing one or more from a group consisting of a casino machine, a keyless lock, an ATM machine, a web site, a file and a financial account; and the third-party trusted authority operated by a third party, the third-party trusted authority storing a plurality of legitimate ID codes and authenticating the ID code received based on a comparison of the ID code received and the legitimate ID codes included in the plurality of the legitimate ID codes. - View Dependent Claims (8, 9)
-
Specification