Methods and apparatuses for performing secure transactions without transmitting biometric information
First Claim
1. A biometric passkey device configured to perform one or more transactions with a remote computer system without transmitting any biometric information to that remote computer system, the passkey device being configured to:
- (a) authenticate the identity of a user by comparing the user'"'"'s unique biometric information with biometric information stored with the passkey device;
(b) transmit unique passkey device information to the remote computer system to authenticate the identity of the passkey device; and
(c) perform one or more transactions with the remote computer system if the identity of the user is first authenticated by the passkey device and the identity of the passkey device is next authenticated by the remote computer system.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, systems, and devices for performing secure transactions with remote computer systems. User authentication acts independently of any remote computer system with which the person may communicate. The authenticating device itself may be registered with remote computer systems with which the user wishes to obtain access. The device need not pass any biometric information to any remote computer system. Instead, biometric authentication may be initiated and completed on the device itself. What is passed from the device to the remote computer system is device-specific information, which identifies the device to the remote computer system.
51 Citations
28 Claims
-
1. A biometric passkey device configured to perform one or more transactions with a remote computer system without transmitting any biometric information to that remote computer system, the passkey device being configured to:
-
(a) authenticate the identity of a user by comparing the user'"'"'s unique biometric information with biometric information stored with the passkey device;
(b) transmit unique passkey device information to the remote computer system to authenticate the identity of the passkey device; and
(c) perform one or more transactions with the remote computer system if the identity of the user is first authenticated by the passkey device and the identity of the passkey device is next authenticated by the remote computer system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for performing secure transactions between a biometric passkey device and a remote computer system without transmitting any biometric information to that remote computer system, the system comprising:
-
(a) a biometric passkey device configured to (i) authenticate the identity of a user by comparing the user'"'"'s unique biometric information with biometric information stored with the passkey device; and
(ii) transmit unique passkey device information to the remote computer system; and
(b) a remote computer system configured to (i) authenticate the identity of the passkey device by comparing the unique passkey device information with device information stored on the remote computer system; and
(ii) allow the passkey device to perform one or more transactions on the remote computer system if the identity of the user is first authenticated by the passkey device and the identity of the passkey device is next authenticated by the remote computer system. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method for performing secure transactions between a biometric passkey device and a remote computer system without transmitting any biometric information to that remote computer system, the method comprising:
-
(a) authenticating the identity of a user by comparing the user'"'"'s unique biometric information with biometric information stored with the passkey device;
(b) transmitting unique passkey device information to the remote computer system;
(c) authenticating the identity of the passkey device by comparing the unique passkey device information with device information stored on the remote computer system; and
(d) performing one or more transactions on the remote computer system if the identity of the user is first authenticated by the passkey device and the identity of the passkey device is next authenticated by the remote computer system. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28)
-
Specification