SYSTEMS AND METHODS FOR ESTABLISHING A SECURE COMPUTING ENVIRONMENT FOR PERFORMING ONLINE TRANSACTIONS
First Claim
1. A system for establishing a secure computing environment for performing online transactions, the system comprising:
- a host computer; and
a handheld device comprising, an interface configured to couple to the host computer, a biometric sensor configured to receive user identification information, operating system instructions for execution by the host computer during the performance of one or more secure online transactions, a memory configured to store the operating system instructions; and
a processor in communication with the memory and the biometric sensor, the processor configured to authenticate the user identification information and to communicate the operating system instructions to the host computer after authentication of the user identification information in order to perform the one or more secure online transactions.
2 Assignments
0 Petitions
Accused Products
Abstract
A portable, biometrically-secured device for facilitating various different types of in-person and online transactions. For example, the portable, biometrically-secured device can be used to safely perform in-person financial transactions, such as credit card transactions, in which the user'"'"'s identity is biometrically authenticated. The portable, biometrically-secured device can also be used for performing biometrically-secured online transactions. For example, the portable, biometrically-secured device can be used to create a secure platform from which to make the online transactions by loading a secure operating system from the device to a host computer'"'"'s volatile memory. Biometrically-secured online transactions can then be performed using the host computer. In one embodiment, the portable, biometrically-secured device facilitates online financial transactions that can be performed without transmitting a user'"'"'s financial information to the online merchant.
-
Citations
20 Claims
-
1. A system for establishing a secure computing environment for performing online transactions, the system comprising:
-
a host computer; and
a handheld device comprising, an interface configured to couple to the host computer, a biometric sensor configured to receive user identification information, operating system instructions for execution by the host computer during the performance of one or more secure online transactions, a memory configured to store the operating system instructions; and
a processor in communication with the memory and the biometric sensor, the processor configured to authenticate the user identification information and to communicate the operating system instructions to the host computer after authentication of the user identification information in order to perform the one or more secure online transactions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of establishing a secure computing platform from which to perform transactions, the method comprising:
-
establishing a connection between a handheld device and a host computer, the host computer having a first operating system;
receiving biometric information with the portable device;
authenticating the biometric information;
loading operating system instructions from the handheld device to the host computer after said authenticating, wherein said loading causes the host computer to execute the operating system instructions in place of the first operating system during the performance of one or more network transactions. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A handheld device for facilitating secure transactions, the portable device comprising:
-
means for communicating with a host computer having a first operating system;
means for storing operating system instructions;
means for receiving biometric information from a user;
means for determining whether the biometric information corresponds to a selected biometric signature; and
means for loading the operating system instructions to a volatile memory of the host computer when the biometric information corresponds to the selected biometric signature, the operating system instructions being configured to independently control the host computer during the performance of an online transaction so as to prevent the host computer from loading the first operating system and from accessing non-volatile memory of the host computer. - View Dependent Claims (20)
-
Specification