Secure verification system
First Claim
1. A secure verification system comprising:
- a first user input terminal, the first user input terminal comprising a user input device for enabling a user to input at least three different types of personal identification information and a transceiver for transmitting the input personal identification information;
a key generating device for generating and issuing a key associated with the input personal identification information wherein the key comprises information which is stored in a card which can be carried by a user of the verification system;
a server, the server comprising a transceiver for receiving and transmitting the personal identification information and information indicative of the key, storage means for storing the received personal identification information and the information indicative of the key associated with the received personal identification information; and
a second user input terminal comprising means for authenticating the issued key, means for retrieving the personal identification information associated with the key from the storage means and verification means for verifying the identity of the user of the second user input terminal using the personal identification information.
0 Assignments
0 Petitions
Accused Products
Abstract
A secure verification system 1 and a method of providing a secure verification system 1, the system 1 including a first user input terminal 5, a key generating device 29, a server 3 and a second user input terminal 7. The first user input terminal 5 enables a user to input at least three different types of personal identification information and transmit the input personal identification information to the server 3 for storage. The key generating device 29 generates and issues a key associated with the input personal identification information. The personal identification information and the information indicative of the key are stored at the server 3. The second user input terminal 7 enables the issued key to be authenticated and the stored personal identification information associated with the key to be retrieved from the server 3 and used to verify the identity of a user of the second user input terminal 7.
6 Citations
21 Claims
-
1. A secure verification system comprising:
-
a first user input terminal, the first user input terminal comprising a user input device for enabling a user to input at least three different types of personal identification information and a transceiver for transmitting the input personal identification information; a key generating device for generating and issuing a key associated with the input personal identification information wherein the key comprises information which is stored in a card which can be carried by a user of the verification system; a server, the server comprising a transceiver for receiving and transmitting the personal identification information and information indicative of the key, storage means for storing the received personal identification information and the information indicative of the key associated with the received personal identification information; and a second user input terminal comprising means for authenticating the issued key, means for retrieving the personal identification information associated with the key from the storage means and verification means for verifying the identity of the user of the second user input terminal using the personal identification information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method of providing a secure verification system comprising;
-
inputting at least three different types of personal identification information at a first terminal; generating and issuing a key associated with the input personal identification information wherein the key comprises information which is stored in a card which can be carried by a user of the verification system; transmitting the personal identification information to a server; storing the personal identification information and the information indicative of the associated key at the server; authenticating the key at a second terminal; and in response to the authentication of the key, retrieving the personal identification information associated with the key from the server and verifying the identity of the user of the second user input terminal using the retrieved information. - View Dependent Claims (17, 18, 19, 20, 21)
-
Specification