Siccolla Identity Verification Architecture and Tool
First Claim
1. An identity verification system comprising:
- a) A Point-of-Transaction Transmission Module b) A Biometric module for reading biometric data from a prospective customer c) An ID Verification Transactional Backend module capable of receiving data from the Biometric module and that performs processing to confirm or deny the identity of the prospective customer d) A Financial Services Processing backend module that is capable of receiving data from either or both of the ID Verification Transaction Backend module and the Point-of-Transaction Transmission Module e) A Point-of-Transaction Receiver Module that is capable of data input from either or both of the ID Verification Transaction Backend Module and the Financial Services Processing Backend Module
2 Assignments
0 Petitions
Accused Products
Abstract
Siccolla is an identity verification architecture utilizing wireless phones as an identity verification tool. The wireless phone has a specialized built-in fingerprint sensor, camera, and blood sensor to acquire high quality images of biometrics, including but not limited to the iris, face and fingerprints, as well as DNA sampling, to perform identity verification via biometric recognition to secure credit card/debit card/financial instruments and general multi-purpose local and/or remote identity verification transactions at the Point-of-Sale terminals (POS), online for E-Commerce, and at any general purpose point of transaction at which a positive identity verification in real time must occur to prevent identity theft and financial fraud and enable commerce, E-Commerce, or general access or business to proceed and prosper. In doing so the system also feeds the biometrics obtained of all those individuals fraudulently attempting to utilize someone else'"'"'s identity into a database, creating a watch list of fraudsters against which institutions can verify any and all of the identity of any and all individuals that they come across in the line of their business, to protect themselves from financial losses, fraud, and/or physical events or actions which may cause harm to themselves, their physical and logical facilities, as well as all their customers, employees, and/or innocent bystanders.
-
Citations
2 Claims
-
1. An identity verification system comprising:
a) A Point-of-Transaction Transmission Module b) A Biometric module for reading biometric data from a prospective customer c) An ID Verification Transactional Backend module capable of receiving data from the Biometric module and that performs processing to confirm or deny the identity of the prospective customer d) A Financial Services Processing backend module that is capable of receiving data from either or both of the ID Verification Transaction Backend module and the Point-of-Transaction Transmission Module e) A Point-of-Transaction Receiver Module that is capable of data input from either or both of the ID Verification Transaction Backend Module and the Financial Services Processing Backend Module - View Dependent Claims (2)
Specification