UNIVERSAL SECURE REGISTRY
First Claim
1. A method of authenticating an identity of a first entity, comprising the acts of:
- wirelessly transmitting from a first device, first encrypted authentication information of the first entity;
receiving with a second device the wirelessly transmitted first encrypted authentication information;
decrypting with the second device, the first wirelessly encrypted authentication information to provide the first authentication information of the first entity to the second device;
authenticating the identity of the first entity based upon the first authentication information; and
acting based on the authenticated identity of the first entity.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method for validating an identity of a user to enable or prevent an occurrence of an event is disclosed. In one embodiment, the system includes a first device including a wireless transmitter which is configured to transmit validation information, a second device including a wireless receiver configured to receive the validation information and to further transmit the validation information, and a secure system in communication with the second device. The secure system includes a database configured to receive the validation information transmitted from the second device, and to transmit additional information to the second device following a receipt of the validation information to assist the second device in either enabling or preventing the occurrence of the event.
102 Citations
75 Claims
-
1. A method of authenticating an identity of a first entity, comprising the acts of:
-
wirelessly transmitting from a first device, first encrypted authentication information of the first entity;
receiving with a second device the wirelessly transmitted first encrypted authentication information;
decrypting with the second device, the first wirelessly encrypted authentication information to provide the first authentication information of the first entity to the second device;
authenticating the identity of the first entity based upon the first authentication information; and
acting based on the authenticated identity of the first entity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
-
41. A system for validating an identity of a first entity, comprising:
-
a first wireless device comprising;
a first wireless transmitter and receiver configured to transmit a first wireless signal including first encrypted authentication information;
a first processor configured to compare stored biometric data with detected biometric data of the first entity and configured to enable or disable use of the first device based on a result of the comparison, and configured to encrypt first authentication information with a first private key into the first encrypted authentication information;
a first biometric detector for detecting biometric data of the first entity; and
a first memory for storing biometric data of the first entity, a private key of the first entity authorized to use the first device, and the first authentication information. - View Dependent Claims (42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66)
-
-
67. A first wireless device, comprising:
-
a processor configured to enable operation of the first wireless device if it receives an enablement signal validating first biometric information of a first entity and configured to generate a non-predictable signal from the biometric information;
a first wireless transmitter and receiver configured to transmit a first wireless signal including first encrypted biometric information of the first entity and to receive the enablement signal; and
a first biometric detector for detecting the first biometric information of the first entity. - View Dependent Claims (68, 69, 70, 71, 72, 73, 74, 75)
-
Specification